Acer G3-571-77QK User Manual
Have a look at the manual Acer G3-571-77QK User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 720 Acer manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Frequently asked questions - 71 Where can I get more information? For more information please visit the following pages:• Windows 10 information: go.acer.com/windows-tutorial •Support FAQs: support.acer.com
72 - Frequently asked questions Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer. Do not attempt to open the computer yourself; contact your dealer or authorized service center for assistance. Troubleshooting tips This computer incorporates an advanced design that delivers onscreen error message reports to help you solve problems. If the system reports an error message or an error symptom occurs, see "Error messages" below. If the problem cannot be resolved, contact your dealer. Error messages If you receive an error message, note the message and take the corrective action. The fo llowing table lists the error messages in alphabetical order together with the recommended course of action. Error messagesCorrective action CMOS battery bad Contact your dealer or an authorized service center. CMOS checksum error Contact your dealer or an authorized service center. Disk boot failure Insert a system (bootable) disk, then press Enter to reboot. Equipment configuration error Press F2 (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. Hard disk 0 error Contact your dealer or an authorized service center. Frequently asked questions
Frequently asked questions - 73 If you still encounter problems after going through the corrective measures, please co ntact your dealer or an authorized service center for assistance. Hard disk 0 extended type error Contact your dealer or an authorized service center. I/O parity error Contact your dealer or an authorized service center. Keyboard error or no keyboard connected Contact your dealer or an authorized service center. Keyboard interface error Contact your dealer or an authorized service center. Memory size mismatch Press F2 (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. Error messagesCorrective action
74 - Internet and online security INTERNET AND ONLINE SECURITY First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 78 ). A comprehensive internet securi ty program is offered when you first start your computer. You should activate this protection as soon as possible , certainly before you connect to the internet. Choose an Internet Service Provider Using the internet has become a natural part of daily computing. Just a few simple steps can connect you to a vast collection of knowledge and communication tools. To accomplish these steps you should first select an Internet Service Provider (ISP), which supplies the connection between your computer and the internet. You should research the ISPs available in your region, not forgetting to talk to friends and family about their experiences or to check reviews and consumer reports. The ISP you select will provid e instructions on how to connect to the internet (you ma y need additional software or a special ‘box’ that connec ts to your phone line). Connection types Depending on your computer model, your location and your communication needs, you have several ways to connect to the internet.
Internet and online security - 75 Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a di al-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the internet as the connection speed is low and connection ti me is typically charged per hour. DSL (e.g. ADSL) DSL (Digital Subscriber Line) is an ‘always-on’ connection that runs over the phone line . As DSL and phone do not use the same frequencies, you can use your telephone at the same time you are connected to the internet (this requires a ‘micro-filter’ on each telephone socket to avoid interference). To be eligible for DSL, you must be located near an DSL- equipped phone exchange (servi ce is sometimes unavailable in rural areas). Connection sp eeds vary depending on your location, but DSL generally prov ides very fast and reliable internet connection. As the conn ection is always-on, it is generally charged at fixed monthly rates. Cable A cable connection provides fast and always-on internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the internet. Cellular A cellular connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Note A DSL connection requires an ap propriate modem. A modem is usually provided by the ISP when you register. Many of these modems include an ‘router’ th at provides network and Wi-Fi access.
76 - Internet and online security internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Network connections A LAN (Local Area Network) is a group of computers (for example, within an office building or home) that share a common communications line and resources. When you set up a network, you can share files, peripheral devices (such as a printer) and an internet connection. You can set up a LAN using wired technologies (s uch as Ethernet) or wireless technologies (such as Wi-Fi or Bluetooth). Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more co mputers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral device s and an internet connection. What are benefits of a wireless network? Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner. Also you can share an internet connection with other computers in your home. Installation speed and simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cabl es through walls and ceilings. Note If your computer includes a SIM card slot, you require a compatible SIM card and a cont ract with a cellular provider. Before using the cellular feat ures, check with your service provider to see if any additional charges will be incurred, especially roaming charges.
Internet and online security - 77 Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network. Most routers have a built-in DSL modem that will allow you access to a high speed DSL internet connection. The ISP (Internet Service Provider) you have chosen normally supplies a modem/rout er with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the ac cess point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point. Wireless adapter Most computers feature a wireless module and Wi-Fi button that turns the network connectio n on or off. You may also turn your wireless network on or off, or control what is shared over the network with the network management options. Search ’HomeGroup’ and then click on HomeGroup . Warning Using wireless devices while flying in aircraft may be prohibited. Switch off all devices before boarding an aircraft; they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. After take off, ask the cabin crew if you may enable Wi-Fi.
78 - Internet and online security Surf the Net! To surf the internet, you need a program called an internet browser. Microsoft Edge provides an easy and secure web browsing experience. As soon as you have your in ternet access installed and you are connected, from the Start Menu, click the Microsoft Edge tile or the icon located in the taskbar and take your internet experience to a new level! Predator website To get you started why not visit our website, www.acer.com. Predator is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs. www.acer.com is your portal to a world of online activities and services: visit us regularly for the latest information and downloads! Internet security software To help you stay ahead of cybercriminals, Acer has partnered with Norton to offe r you security for all your devices. Select Acer computers include protection by Norton Security Norton Security is pre-installed on select Acer computers, protecting your identity and financial data from viruses, spyware, malware and other online threats. Learn more about how to stay safe online and how to stay protected after your introductory subscription ends. Staying ahead of cybercriminals Stay ahead of hackers and cybe rcriminals by understanding the tactics they use to access your private data.
Internet and online security - 79 Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action on the user's part. Imme diately after a software manufacturer announces an update, hackers are ready with malware that can breach holes in the software that would have been patched if the update was installed. How to stay safe: Perform any and all software updates as soon as they are available. Keep a lookout for fake or phishing emails Beware of emails that appear to be from a friend or business colleague that you know but seem a little odd. Maybe they didn't capitalize your name or there are misspellings. The email might be from cybercriminals who are trying to fool you into sending them your credit card number, social security number, or logging into a fake bank website that looks like yours but really isn't. How to stay safe: Use a strong antispam filter. If an email looks strange, don't click on anything and delete it immediately. Instead manually launch a browser and type in your bank's website address and log-in yourself. Don't be fooled if someone calls your phone A tech support scam is a form of online fraud where people call you on the phone saying they're Technical Support from a trusted company like Norton or Microsoft and that you have a virus. The main motive behind these scams is to extort money from the victim. Cybercriminals can also install malware such as keylogging software or backdoor Trojans in order to gain access to personal information. How to stay safe: Don't fall for phone calls that tell you your software or computer isn't working. Never give your personal information like social security or credit card numbers to someone that you don't know over the phone.
80 - Internet and online security Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected. Ransomware A form of malware that will en crypt personal data files on your computer and attached de vices. Encryption converts files into another format, that can only be opened with a specific decryption key. Once the ransomware installs itself, it will display a warning message that the computer is now locked. The user is given a spec ific amount of money to pay as a "fine" and a timeframe in wh ich to pay. Even if paid, the criminal might choose to not unencrypt the files anyway! What to do if you're infected: Avoid getting infected in the first place by staying protected with internet security software like Norton Security. Also, perform regular backups of all your data either online or to a separate external hard drive that is only attached to your computer while performing the backup. Ransomware has been known to lock access to external hard drives attached to the computer. If you are infected with ransomware, think twice before you pay the ransom. There is no guarantee the cybercriminal will unlock your files and you'll be funding them to prey upon another innocent victim. Botnets A botnet is a string of infected, connected computers coordinated together to perform a task. Botnets gain access to your machine through some piece of malicious coding. Once the software is down loaded, the botnet will now contact its master computer and let it know that everything is ready to go. Now your computer, phone, tablet, or IoT device is entirely under th e control of the person who created the botnet. Most people who are infected with