Acer G3-571-77QK User Manual
Here you can view all the pages of manual Acer G3-571-77QK User Manual. The Acer manuals for Notebook are available online for free. You can easily download all the documents as PDF.
Page 71
Frequently asked questions - 71 Where can I get more information? For more information please visit the following pages:• Windows 10 information: go.acer.com/windows-tutorial •Support FAQs: support.acer.com
Page 72
72 - Frequently asked questions Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer. Do not attempt to open the computer yourself; contact your dealer or authorized service center for assistance. Troubleshooting tips This computer incorporates an advanced design that delivers onscreen error message reports to help you solve problems. If the...
Page 73
Frequently asked questions - 73 If you still encounter problems after going through the corrective measures, please co ntact your dealer or an authorized service center for assistance. Hard disk 0 extended type error Contact your dealer or an authorized service center. I/O parity error Contact your dealer or an authorized service center. Keyboard error or no keyboard connected Contact your dealer or an authorized service center. Keyboard interface error Contact your dealer or an authorized...
Page 74
74 - Internet and online security INTERNET AND ONLINE SECURITY First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 78 ). A comprehensive internet securi ty program is offered when you first start your computer. You should activate this protection as soon as possible , certainly before you connect to the internet. Choose an Internet Service Provider Using the internet has become a...
Page 75
Internet and online security - 75 Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a di al-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the internet as the connection speed is low and connection ti me is typically charged per hour. DSL (e.g. ADSL) DSL (Digital Subscriber Line)...
Page 76
76 - Internet and online security internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Network connections A LAN (Local Area Network) is a group of computers (for example, within an office building or home) that share a common communications line and resources. When you set up a network, you can share files, peripheral devices (such as a printer) and an...
Page 77
Internet and online security - 77 Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network. Most routers have a built-in DSL modem that will allow you access to a high speed DSL internet connection. The ISP (Internet Service Provider) you have chosen normally...
Page 78
78 - Internet and online security Surf the Net! To surf the internet, you need a program called an internet browser. Microsoft Edge provides an easy and secure web browsing experience. As soon as you have your in ternet access installed and you are connected, from the Start Menu, click the Microsoft Edge tile or the icon located in the taskbar and take your internet experience to a new level! Predator website To get you started why not visit our website, www.acer.com. Predator is dedicated to...
Page 79
Internet and online security - 79 Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action on the user's part. Imme diately after a software manufacturer announces an update, hackers are ready with malware that can breach holes in the software that would have been patched if the update was installed. How to stay safe: Perform any and...
Page 80
80 - Internet and online security Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected. Ransomware A form of malware that will en crypt personal data files on your computer and attached de vices. Encryption converts files into another...