Home > Acer > Notebook > Acer G3-571-77QK User Manual

Acer G3-571-77QK User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Acer G3-571-77QK User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 720 Acer manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Frequently asked questions - 71
    Where can I get more information?
    For more information please visit the following pages:• Windows 10 information:  go.acer.com/windows-tutorial
    •Support FAQs: support.acer.com 
    						
    							72 - Frequently asked questions
    Troubleshooting
    This chapter shows you how to deal with common system 
    problems.  
    Read it before calling a technician if a problem occurs. 
    Solutions to more serious problems require opening up the 
    computer. Do not attempt to  open the computer yourself; 
    contact your dealer or authorized service center for 
    assistance.
    Troubleshooting tips
    This computer incorporates an  advanced design that delivers 
    onscreen error message reports  to help you solve problems.
    If the system reports an  error message or an error 
    symptom occurs, see "Error messages" below. If the problem 
    cannot be resolved, contact your dealer.
    Error messages
    If you receive an error message, note the message and take 
    the corrective action. The fo llowing table lists the error 
    messages in alphabetical order together with the 
    recommended course of action.
    Error messagesCorrective action
    CMOS battery 
    bad Contact your dealer or an authorized 
    service center.
    CMOS checksum 
    error Contact your dealer or an authorized 
    service center.
    Disk boot failure Insert a system (bootable) disk, then 
    press 
    Enter to reboot.
    Equipment 
    configuration 
    error Press 
    F2 (during POST) to enter the 
    BIOS utility, then press  Exit in the BIOS 
    utility to reboot.
    Hard disk 0 error Contact your dealer or an authorized 
    service center.
    Frequently asked questions 
    						
    							Frequently asked questions - 73
    If you still encounter problems after going through the 
    corrective measures, please co ntact your dealer or an 
    authorized service center for assistance. Hard disk 0 
    extended type 
    error
    Contact your dealer or an authorized 
    service center.
    I/O parity error Contact your dealer or an authorized 
    service center.
    Keyboard error or 
    no keyboard 
    connected Contact your dealer or an authorized 
    service center.
    Keyboard 
    interface error Contact your dealer or an authorized 
    service center.
    Memory size 
    mismatch Press 
    F2 (during POST) to enter the 
    BIOS utility, then press  Exit in the BIOS 
    utility to reboot.
    Error messagesCorrective action 
    						
    							74 - Internet and online security
    INTERNET AND ONLINE 
    SECURITY
    First steps on the net
    Protecting your computer
    It is vital to protect your computer from viruses and attacks 
    over the internet (see Internet security software on 
    page 78 ).  
    A comprehensive internet securi ty program is offered when 
    you first start your computer. You should activate this 
    protection as soon as possible , certainly before you connect 
    to the internet.
    Choose an Internet Service Provider
    Using the internet has become a natural part of 
    daily computing. Just a few simple steps can 
    connect you to a vast collection of knowledge 
    and communication tools.  To accomplish these 
    steps you should first select an  Internet 
    Service Provider  (ISP), which supplies the 
    connection between your computer and the 
    internet. You should research  the ISPs available in your 
    region, not forgetting to talk to friends and family about 
    their experiences or to check reviews and consumer reports. 
    The ISP you select will provid e instructions on how to 
    connect to the internet (you ma y need additional software or 
    a special ‘box’ that connec ts to your phone line).
    Connection types
    Depending on your computer model, your location and your 
    communication needs, you have several ways to connect to 
    the internet.  
    						
    							Internet and online security - 75
    Dial-up
    Some computers include a telephone dial-up (‘modem’) 
    connector. This allows you to connect to the internet using 
    your telephone line. With a di al-up connection, you cannot 
    use the modem and the telephone simultaneously on a 
    single phone line. This type of connection is recommended 
    only if you have limited use of  the internet as the connection 
    speed is low and connection ti me is typically charged per 
    hour. 
    DSL (e.g. ADSL)
    DSL (Digital Subscriber Line)  is an ‘always-on’ connection 
    that runs over the phone line . As DSL and phone do not use 
    the same frequencies, you can use your telephone at the 
    same time you are connected to the internet (this requires a 
    ‘micro-filter’ on each telephone  socket to avoid interference). 
    To be eligible for DSL, you must be located near an DSL-
    equipped phone exchange (servi ce is sometimes unavailable 
    in rural areas). Connection sp eeds vary depending on your 
    location, but DSL generally prov ides very fast and reliable 
    internet connection. As the conn ection is always-on, it is 
    generally charged at fixed monthly rates.
    Cable
    A cable connection provides fast and always-on internet 
    service via a cable television line. This service is generally 
    available in large cities. You can use your telephone and 
    watch cable TV at the same time you are connected to the 
    internet. 
    Cellular
    A cellular connection allows you to use cellular networks 
    (such as those used by a mobile phone) to connect to the 
    Note
    A DSL connection requires an ap propriate modem. A modem is 
    usually provided by the ISP when  you register. Many of these 
    modems include an ‘router’ th at provides network and Wi-Fi 
    access. 
    						
    							76 - Internet and online security
    internet while away from home. The socket for a SIM card 
    may be built in to your computer, or may require an external 
    device, such as a USB modem or even an appropriately 
    equipped mobile phone.
    Network connections
    A LAN (Local Area Network) is a group of computers (for 
    example, within an office building or home) that share a 
    common communications line and resources. When you set 
    up a network, you can share files, peripheral devices (such 
    as a printer) and an internet connection. You can set up a 
    LAN using wired technologies (s uch as Ethernet) or wireless 
    technologies (such as Wi-Fi or Bluetooth). 
    Wireless networks
    A wireless LAN or WLAN is a wireless local area network, 
    which may link two or more co mputers without using wires. 
    Setting up a wireless network is easy and allows you to 
    share files, peripheral device s and an internet connection. 
    What are benefits of a wireless network?
    Mobility
    Wireless LAN systems allow you and other users of your 
    home network to share access to files and devices 
    connected to the network, for example a printer or scanner.
    Also you can share an internet connection with other 
    computers in your home.
    Installation speed and simplicity
    Installing a wireless LAN system can be fast and easy and 
    eliminates the need to pull cabl es through walls and ceilings. 
    Note
    If your computer includes a SIM card slot, you require a 
    compatible SIM card and a cont ract with a cellular provider. 
     
    Before using the cellular feat ures, check with your service 
    provider to see if any additional  charges will be incurred, especially 
    roaming charges. 
    						
    							Internet and online security - 77
    Components of a wireless LAN
    To set up your Wireless network at home you need to have 
    the following:
    Access point (router)
    Access points (routers) are two-way transceivers that 
    broadcast data into the surrounding environment. Access 
    points act as a mediator between wired and wireless 
    network. Most routers have a built-in DSL modem that will 
    allow you access to a high speed DSL internet connection. 
    The ISP (Internet Service Provider) you have chosen 
    normally supplies a modem/rout er with the subscription to 
    their services. Read carefully  the documentation supplied 
    with your Access point/router for detailed setup 
    instructions.
    Network cable (RJ45)
    A network cable (also called RJ45 cable) is used to connect 
    the host computer to the ac cess point (see illustration 
    below); this type of cable may also be used to connect 
    peripheral devices to the access point.
    Wireless adapter
    Most computers feature a wireless module and Wi-Fi button 
    that turns the network connectio n on or off. You may also 
    turn your wireless network on or off, or control what is 
    shared over the network with the network management 
    options.  Search ’HomeGroup’ and then click on HomeGroup .
    Warning
    Using wireless devices while flying in aircraft may be prohibited. 
    Switch off all devices before boarding an aircraft; they may be 
    dangerous to the operation of the aircraft, disrupt 
    communications, and even be illegal. After take off, ask the cabin 
    crew if you may enable Wi-Fi. 
    						
    							78 - Internet and online security
    Surf the Net!
    To surf the internet, you need a program called 
    an internet browser. Microsoft Edge provides an 
    easy and secure web browsing experience. As 
    soon as you have your in ternet access installed 
    and you are connected, from the Start Menu, 
    click the Microsoft Edge tile or the icon located 
    in the taskbar and take your internet experience to a new 
    level!
    Predator website
    To get you started why  not visit our website, www.acer.com.
    Predator is dedicated to  provide you with on-going 
    personalized support. Check out our  Support section to get 
    help tailored to your needs.
    www.acer.com  is your portal to a world of online activities 
    and services: visit us regularly  for the latest information and 
    downloads! 
    Internet security software
    To help you stay ahead of cybercriminals, Acer has 
    partnered with Norton to offe r you security for all your 
    devices. 
    Select Acer computers include protection by Norton 
    Security
    Norton Security is pre-installed on select Acer computers, 
    protecting your identity and  financial data from viruses, 
    spyware, malware and other online threats. Learn more 
    about how to stay safe online and how to stay protected 
    after your introductory subscription ends.
    Staying ahead of cybercriminals
    Stay ahead of hackers and cybe rcriminals by understanding 
    the tactics they use to access your private data.  
    						
    							Internet and online security - 79
    Ensure your software is up to date
    Cybercriminals rely heavily upon software or platform 
    vulnerabilities, as they are the easiest way to sneak malware 
    into a user's device unnoticed, sometimes with little action 
    on the user's part. Imme diately after a software 
    manufacturer announces an update, hackers are ready with 
    malware that can breach holes in the software that would 
    have been patched if the update was installed. 
    How to stay safe:  Perform any and all software updates as 
    soon as they are available.
    Keep a lookout for fake or phishing emails
    Beware of emails that appear to  be from a friend or business 
    colleague that you know but seem a little odd. Maybe they 
    didn't capitalize your name or there are misspellings. The 
    email might be from cybercriminals who are trying to fool 
    you into sending them your credit card number, social 
    security number, or logging into a fake bank website that 
    looks like yours but really isn't. 
    How to stay safe:  Use a strong antispam filter. If an email 
    looks strange, don't click on anything and delete it 
    immediately. Instead manually launch a browser and type in 
    your bank's website address and log-in yourself.
    Don't be fooled if someone calls your phone
    A tech support scam is a form of online fraud where people 
    call you on the phone saying they're Technical Support from 
    a trusted company like Norton  or Microsoft and that you 
    have a virus. The main motive behind these scams is to 
    extort money from the victim. Cybercriminals can also install 
    malware such as keylogging software or backdoor Trojans in 
    order to gain access to personal information.
    How to stay safe:  Don't fall for phone calls that tell you 
    your software or computer isn't working. Never give your 
    personal information like social security or credit card 
    numbers to someone that you don't know over the phone.  
    						
    							80 - Internet and online security
    Common threats cybercriminals use
    Now you know a few very common ways cybercriminals try 
    to sneak onto your device or trick you into providing private 
    information to them directly. Here are a few of the types of 
    malware they like to deploy once they've got into a device 
    and what to do if you're ever infected.
    Ransomware
    A form of malware that will en crypt personal data files on 
    your computer and attached de vices. Encryption converts 
    files into another format, that can only be opened with a 
    specific decryption key. Once the ransomware installs itself, 
    it will display a warning message that the computer is now 
    locked. The user is given a spec ific amount of money to pay 
    as a "fine" and a timeframe in wh ich to pay. Even if paid, the 
    criminal might choose to not  unencrypt the files anyway!
    What to do if you're infected:  Avoid getting infected in the 
    first place by staying protected with internet security 
    software like Norton Security. Also, perform regular 
    backups of all your data either online or to a separate 
    external hard drive that is  only attached to your computer 
    while performing the backup. Ransomware has been known 
    to lock access to external hard drives attached to the 
    computer. 
    If you are infected with ransomware, think twice before you 
    pay the ransom. There is no guarantee the cybercriminal will 
    unlock your files and you'll be funding them to prey upon 
    another innocent victim. 
    Botnets
    A botnet is a string of infected, connected computers 
    coordinated together to perform a task. Botnets gain access 
    to your machine through some piece of malicious coding. 
    Once the software is down loaded, the botnet will now 
    contact its master computer and  let it know that everything 
    is ready to go. Now your computer, phone, tablet, or IoT 
    device is entirely under th e control of the person who 
    created the botnet. Most people who are infected with  
    						
    All Acer manuals Comments (0)

    Related Manuals for Acer G3-571-77QK User Manual