User’s Manual Gateway NE572/NV572 - 1
T A B LE OF C ON TENTS Starting your computer 4 Battery pack..................................................... 37 Wireless connection ........................................... 4 Registration ........................................................ 5 Software installation ........................................... 6 Recovery ............................................................ 6 Having trouble? ..................................................
Recovering from a recovery backup ......... 79 Frequently asked questions 83 Tips and hints for using Windows 8 ................. 86 Three concepts you might want to keep in mind.............................................. 86 How do I access the charms?................... 86 How do I get to Start? ............................... 86 How do I jump between apps?.................. 87 How do I turn off my computer?................ 87 Why is there a new interface?...................
S T A R T I N G Y O U R COMPUTER Thank you for purchasing this Gateway computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience. After setting up and starting your computer, as shown in the setup instructions, it will ask you questions that will help you connect to the Internet. Your computer will then configure installed software.
Alternatively, use a network cable to connect directly to a network port on your router. Please refer to your ISP or router’s guide. REGISTRATION When using your computer for the first time, it is recommended that you register it. This gives you access to some useful benefits, such as: • Faster service from our trained representatives. • Membership in the Gateway community: receive promotions and participate in customer surveys. • The latest news from Gateway.
SOFTWARE INSTALLATION Your computer will automatically install software and prepare your computer for use. This may take some time, please do not turn off your computer; wait until the installation has finished. RECOVERY You should create recovery discs as soon as you are able. The Gateway Recovery Management program allow you to create recovery discs and then to restore or reinstall applications and drivers provided by Gateway. HAVING TROUBLE? Gateway provides several options to support your purchase.
Warranty and contact information You can find information about the warranty for your computer and how to contact technical support in your computer’s Warranty.
C OMPUTER B ASICS SAFETY AND COMFORT Safety precautions Please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment Make sure that the computer: • Is used on a stable surface, stand or table. A fall can seriously damage the computer. • Is not used on a surface that vibrates, or used when taking part in sport, exercise or other activities in a dynamic environment.
Please note • Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface. This product should never be placed near or over a radiator or heat register, or in a built-in installation unless proper ventilation is provided.
• The power cable is connected to the computer before connecting the power cable to the AC power outlet. • The power cable is unplugged from the power outlet before disconnecting the power cable from the computer. • Three-pin power cords are connected to a grounded power outlet. • The power outlet is easily accessible and as close to the computer as possible (do not overload it with too many adapters). If your computer uses an external AC adapter: • Do not cover or place objects on the AC adapter.
protect unused slots from dust, metal objects or other particles. Save the dummies for use when no cards are in the slots. Servicing your computer Do not attempt to service your computer yourself, as opening or removing covers may expose you to dangerous voltage or other risks. Refer all servicing to qualified service personnel.
• Your device and its enhancements may contain small parts. Keep them out of the reach of small children. • The computer and accessories may contain small parts. Keep them out of the reach of small children. • If you work or play for hours at a time, then make sure you take regular breaks. Look away from the computer's screen once in a while. Do not use your computer if you are tired. • Arrange your computer so that you can work in a natural and relaxed position.
• Ensure that the computer’s ventilation slots and openings are never obstructed or covered. Do not place the computer on a soft surface (such as a carpet, chair or bed) that may block ventilation slots. • Do not push objects of any kind into ventilation or case slots as they may touch dangerous voltage points or short-out parts that may result in a fire or electric shock.
G ETTING T O KNOW Y O U R COMPUTER After setting up your computer, as illustrated in the setup instructions, let us show you around your new Gateway computer.
TOP VIEW - DISPLAY 1 2 3 # Icon Item Description 1 Webcam Web camera for video communication. A light next to the Webcam indicates that the webcam is active. 2 Display screen Also called Liquid-Crystal Display (LCD), displays computer output. 3 Microphone Internal microphone for sound recording.
TOP VIEW - KEYBOARD 1 2 3 4 # Icon Item 1 Power button / indicator 2 Keyboard 3 Touchpad Description Turns the computer on and off. Indicates the computer's power status. For entering data into your computer. - See "Using the keyboard" on page 24. Touch-sensitive pointing device which functions like a computer mouse. - .See "Touchpad" on page 29.
FRONT VIEW 1 # Icon 2 Item Description Accepts Secure Digital (SD) cards. 1 Card reader Power indicator - Push to remove/install the card. Only one card can operate at any given time. Indicates the computer's power status. Indicates the computer's battery status. Battery indicator 2 - Charging: The light shows amber when the battery is charging. - Fully charged: The light shows blue when in AC mode. HDD indicator Indicates when the hard disk drive is active.
LEFT VIEW 1 # Icon 2 Item Kensington lock slot 3 4 5 6 7 Description Connects to a Kensington-compatible computer security lock. - Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. 1 2 Ventilation and cooling fan Allows the computer to stay cool. 3 External display (VGA) port Connects to a display device (e.g.
# Icon Item Description Connects to USB devices. 6 7 USB port Headphones / speaker jack - If a port is black, it is USB 2.0 compatible, if it is blue it is also USB 3.0 compatible (see below). Connects to audio line-out devices (e.g., speakers, headphones). - Supports compatible 3.5 mm headsets with built-in microphone (e.g. Acer smart handheld headsets). Information on USB 3.0 • Compatible with USB 3.0 and earlier devices. • For optimal performance, use USB 3.0-certified devices.
RIGHT VIEW Note: Depending on configuration, your system may not be equipped with an optical (CD/DVD) drive. 1 # Icon Item 2 3 4 5 6 Description Connects to USB devices. - If a port is black, it is USB 2.0 compatible, if it is blue it is also USB 3.0 compatible (see below). 1 USB ports 2 Optical drive Internal optical drive; accepts CDs or DVDs. 3 Optical disk access indicator Lights up when the optical drive is active. 4 Optical drive eject button Ejects the optical disk from the drive.
# 6 Icon Item DC-in jack Description Connects to your computer’s AC adapter. Information on USB 3.0 • Compatible with USB 3.0 and earlier devices. • For optimal performance, use USB 3.0-certified devices. • Defined by the USB 3.0 specification (SuperSpeed USB).
BASE VIEW 5 1 4 2 3 # 1 Icon Item Description Battery release latch Releases the battery for removal. Insert a suitable tool and slide to release. Memory compartment Houses the computer's main memory. Hard disk bay Houses the computer's hard disk (secured with screws). Speakers Deliver stereo audio output.
# Icon Item Description 4 Ventilation and cooling fan Allows the computer to stay cool. 5 Battery bay Houses the computer's battery pack. - Do not cover or obstruct the openings.
U SING TH E KEYBOARD The keyboard has full-sized keys and a numeric keypad, separate cursor, Windows, function and special keys. Lock keys and numeric keypad Note: Information in this section may not apply to your computer. The keyboard has three lock keys which you can toggle on and off. Lock key Caps Lock Num Lock Description When Caps Lock is on, all alphabetic characters typed are in uppercase. When Num Lock is on, the keypad is in numeric mode.
Special keys Your computer’s keyboard includes keys that activate special functions. The function of each key is clearly marked with an icon. Icon Function Description Fn Hotkey for second function Activates a second function on certain keys. E.g. press the Fn key to activate the F1 to F12 keys. Help Opens the help menu. Backup Allows you to create backup copies of your computer; either the entire system or only selected files and folders.
Icon Function Description Stop Stop playing the selected media file. Previous Return to the previous media file. Next Jump to the next media file. Brightness down Decreases the screen brightness. Brightness up Increases the screen brightness. Social Networking Opens the Social Networks application. If this application is not installed, the key will start your instant messenging application. Volume up Increases the sound volume. Volume down Decreases the sound volume.
Hotkeys The computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the Fn key (bottom left) before pressing the other key in the hotkey combination. Hotkey Function Fn + Special keys Function (see page 25) keys Description Activates the F1 to F12 keys. Fn + Home Scrolls to the beginning of a document. Fn + End Scrolls to the end of a document. Fn + Page up Scrolls up a page in a document.
Windows keys The keyboard has two keys that perform Windows-specific functions. Key Description Pressed alone it returns to the Start screen. Windows key It can also be used with other keys for special functions, please check Windows Help. This key has the same effect as clicking the right Application mouse button; it opens the application's context key menu.
T OUCHPAD TOUCHPAD BASICS The touchpad controls the arrow (or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement. Press the left or right side of the button located beneath the touchpad to perform selection and execution functions. These two areas are similar to the left and right buttons on a mouse. Tapping on the touchpad is the same as clicking the left side of the button.
TOUCHPAD GESTURES Windows 8 and many applications support touchpad gestures that use one or more fingers. Note: Support for touchpad gestures depends on the active application. These allow you to control applications with a few simple gestures, such as: • Swipe in from edge: Access Windows tools by swiping into the center of the touchpad from the right, top or left. • Swipe in from right edge: Toggle the charms. • Swipe in from top edge: Toggle the app commands.
U PGRADING YOUR COMPUTER EXPANDING THROUGH OPTIONS Your computer offers you many options for a complete computing experience. Connectivity options Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section. Memory card reader Memory cards are used in a wide selection of digital cameras, PDAs, MP3 players and mobile phones. Inserting a memory card 1.
to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card. SD, SDHC and SDXC cards Different types of SD cards cover different capacities, while using the same overall design. SD cards contain up to 4 GB, SDHC cards contain up to 32 GB, and SDXC cards can contain up to 2048 GB (2 TB).
Built-in networking The built-in networking allows you to connect your computer to an Ethernet-based network. Connect an Ethernet cable from the Ethernet (RJ-45) port on the chassis of the computer to a network jack or hub on your network. Universal Serial Bus (USB) The USB port is a high-speed serial bus which allows you to connect USB peripherals without taking up system resources. Certain computers may include one or more USB 3.0 ports.
cable is usually included with the monitor. Follow these steps to connect an monitor to your computer: 1. Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. Secure the cable connection with the screws provided. 3. Connect the monitor power cable and plug it into a properly grounded wall outlet. 4. Follow any setup instructions in the monitor's user's guide. 5. Turn on power to the monitor, then the computer. 6.
High-Definition Multimedia Interface (only for certain models) HDMI (High-Definition Multimedia Interface) is an industry-supported, uncompressed, all-digital audio/video interface. HDMI provides an interface between any compatible digital audio/ video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable. Use the HDMI port on your computer to connect with high-end audio and video equipment.
P OWER SUPPLY AC POWER ADAPTER Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time. Caution: Do not cover or place objects on the AC adapter. Keeping the adapter clear of objects allows the adapter to cool properly during use.
Warning: The AC adapter and the underside of the computer can become hot after prolonged use. This is normal, but may cause injury with prolonged contact. BATTERY PACK The computer uses a battery pack that gives you extended use between charges. Battery pack characteristics The battery pack has the following characteristics: • Employs current battery technology standards. • Delivers a battery-low warning. The battery is recharged whenever you connect the computer to the AC adapter.
To maximize your battery’s life, you are advised to adhere to the recommendations set out below. Conditioning a new battery pack Before you use a battery pack for the first time, there is a “conditioning” process that you should follow: 1. Insert the new battery without turning the computer on. 2. Connect the AC adapter and fully charge the battery. 3. Disconnect the AC adapter. 4. Turn on the computer and operate using battery power. 5. Fully deplete the battery. 6.
In addition, the useful lifespan of the battery is adversely affected by the following usage patterns: • Using the computer on constant AC power with the battery inserted. If you want to use constant AC power, you are advised to remove the battery pack after it is fully charged. • Not discharging and recharging the battery to its extremes, as described above. • Frequent use; the more you use the battery, the faster it will reach the end of its effective life.
To install a battery pack: 1. Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2. Slide the battery into the battery bay and gently push until the battery locks in place. To remove a battery pack: 1. Slide the battery release latch to release the battery. 2. Pull the battery from the battery bay.
Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below: • Purchase an extra battery pack. • Use AC power whenever possible, reserving battery for on-the-go use. • Eject a PC Card if it is not being used, as it will continue to draw power (for selected models). • Store the battery pack in a cool, dry place.
When the battery-low warning appears, the recommended course of action depends on your situation: Situation The AC adapter and a power outlet are available. Recommended Action 1. Plug the AC adapter into the computer, and then connect to the mains power supply. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. An extra fully charged 1. Save all necessary files. battery pack is 2. Close all applications. available. 3.
P OWER MANAGEMENT This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy.
Your computer will also not start if it receives an instruction to start over a network (Wake on LAN). 1. Open the Desktop. 2. Click Power Options in the Notification area. 3. Select More Power Options. 4. Select Choose what the power buttons do. 5. To access Shutdown Settings, select Change settings that are currently unavailable.
6. Scroll down and disable Turn on fast startup. 7. Select Save changes.
S OFTWARE USING WINDOWS AND YOUR SOFTWARE Gateway computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Internet security offer It is vital to protect your computer from viruses and attacks over the Internet (see Security on page 53). An comprehensive Internet security suite, including a free trial subscription period, is offered when you first start your computer.
I NTERNET FIRST STEPS ON THE NET Protecting your computer It is vital to protect your computer from viruses and attacks over the Internet (see Internet security offer on page 46 and Security on page 53). A comprehensive Internet security program is offered when you first start your computer. You should activate this protection as soon as possible, certainly before you connect to the Internet. Choose an Internet Service Provider Using the Internet has become a natural part of daily computing.
Connection types Depending on your computer model, your location and your communication needs, you have several ways to connect to the Internet. Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the Internet using your telephone line. With a dialup connection, you cannot use the modem and the telephone simultaneously on a single phone line.
Cable A cable connection provides fast and always-on Internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the Internet. 3G (WWAN or 'Wireless Wide-Area Network') A 3G connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Internet while away from home.
Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an Internet connection. What are benefits of a wireless network? Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner.
router with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point. Wireless adapter An internal wireless adapter is normally already installed in your computer.
Diagram of a working network 1. Access point/router 4 2. Desktop computer 3. Modem 4. Printer 5 1 5. Portable computer 3 6. PDA/Smartphone 7. Network cables (RJ45) 7 2 6 Turning on/off a wireless network connection Most computers feature a ‘WiFi’ button that turns the network connection on or off.
Surf the Net! To surf the Internet, you need a program called an Internet browser. Internet Explorer provides an easy and secure web browsing experience. As soon as you have your Internet access installed and you are connected, from Start, click the Internet Explorer tile or the icon located on Desktop and take your Internet experience to a new level! Gateway website To get you started why not visit our website, www.gateway.com. Gateway is dedicated to provide you with on-going personalized support.
Definitions What is a virus? Malicious software, typically called ‘viruses’, are programs designed to infect and damage computers. Most viruses are transmitted over the Internet, emails or malicious Web sites. A typical virus will replicate and pass itself undetected to multiple computers. Other forms of nuisance, such as Trojan horses, worms or spam can infect your computer in various ways, using up resources or clogging up a network.
What is malware? Malicious software, also known as malware, is software designed to deliberately harm your computer. For example, viruses, worms, and Trojan horses are malicious software. To help protect your computer against malware, make sure it is using up-to-date antivirus and antimalware software. What is a personal firewall? A personal firewall is a software program designed to prevent unauthorized access to or from a private network.
Keep your computer current with the latest patches and updates One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block attackers from being able to take advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system.
The next line of defense many times is your antivirus software, which monitors all online activities such as email messages and Web browsing and protects an individual from viruses, worms, Trojan horse and other types of malicious programs. Your antivirus and antispyware software should be configured to update itself, and it should do so every time you connect to the Internet.
following as your password: your login name, anything based on your personal information such as your last name, and words that can be found in the dictionary, especially "password". Try to select especially strong, unique passwords for protecting activities like online banking. • Keep your passwords in a safe place and try not to use the same password for every service you use online. • Change passwords on a regular basis, at least every 90 days.
update your security, or urge you to provide information immediately or else something bad will happen. Don't take the bait. • Don't respond to email messages that ask for personal information. Legitimate companies will not use email messages to ask for your personal information. When in doubt, contact the company by phone or by typing in the company Web address into your Web browser. Don't click on the links in these messages as they make take you to fraudulent, malicious Web sites.
even downloading images ensures you will be added to their lists for more of the same messages in the future. Also be careful when posting your email address online in newsgroups, blogs or online communities. Online offers that look too good to be true usually are The old saying "there's no such thing as a free lunch" still rings true today.
sudden start buying refrigerators in Budapest). In order to confirm these out of the ordinary purchases, they might call you and ask you to confirm them. Don't take these calls lightly; this is your hint that something bad may have happened and you should take necessary action. Protect your computer with Windows security tools Windows provides a variety of protection applications.
R ECOVERY If you are having trouble with your computer, and the frequently asked questions (see page 83) do not help, you can 'recover' your computer - i.e. return it to an earlier state. This section describes the recovery tools available on your computer. Gateway provides Gateway Recovery Management, which allows you to create a recovery backup, a drivers and applications backup, and to start recovery options, either using Windows tools, or the recovery backup.
Note: Since the recovery backup requires at least 16 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 32 GB or larger. 1. From Start, type 'Recovery' and then click Gateway Recovery Management in the list of apps. 2. Click Create Factory Default Backup.
opens. Make sure Copy contents from the recovery partition to the recovery drive is selected. This provides the most complete and safest recovery backup. 3. Plug in the USB drive then click Next.
• Since the recovery backup requires at least 16 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 32 GB or larger. 4. You will be shown the backup progress on the screen. 5. Follow the process until it completes. 6. After creating the recovery backup, you can choose to delete the recovery information on your computer.
7. Unplug the USB drive and label it clearly. Important: Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember.
a USB storage drive or, if your computer features a DVD recorder, one or more blank recordable DVDs. 1. From Start, type 'Recovery' and then click Gateway Recovery Management in the list of apps. 2. Click Create Drivers and Applications Backup. Plug in the USB drive or insert a blank DVD into the optical drive, then click Next.
• If you are using a USB drive, make sure your USB drive has enough capacity before continuing. • If using DVDs, it will also show the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs.
3. Click Start to copy files.You will be shown the backup progress on the screen. 4. Follow the process until it completes: • If you are using optical discs, the drive ejects each disc as it completes burning it. Remove the disc from the drive and mark it with a permanent marker. If multiple discs are required, insert a new disc when prompted, then click OK. Continue until the process is complete. • If you are using a USB drive, unplug the drive and label it clearly.
solved by returning your system to a previous state when everything was working correctly. For instructions, see Returning to an earlier system snapshot on page 73. 3. Reset your operating system. If nothing else has solved the problem and you want to reset your system, but keep your user information, see Returning your system to its factory condition on page 74. 4. Reset your system to its factory condition.
If you are reinstalling using Windows and the recovery information stored on your computer: • From Start, type 'Recovery' and then click Gateway Recovery Management in the list of apps. • Click Reinstall Drivers or Applications.
• You should see the Contents section of the Gateway Resource Center. • Click the install icon for the item you want to install, then follow the onscreen instructions to complete the installation. Repeat this step for each item you want to reinstall. If you are reinstalling from a Drivers and Applications Backup on a DVD or USB drive: 1. Insert the Drivers and Applications Backup into the disc drive or connect it to a free USB port. • If you inserted a DVD wait for Gateway Resource Center to start.
• If you are using a USB drive, press the Windows key + , then double-click on the drive that contains the backup. Double-click on ResourceCenter. 2. You should see the Contents section of the Gateway Resource Center. 3. Click the install icon for the item you want to install, then follow the onscreen prompts to complete the installation. Repeat this step for each item you want to reinstall.
Windows automatically creates an additional restore point each day, and also each time you install software or device drivers. Note: For more information about using Microsoft System Restore, from Start, type 'Help' and then click Help and Support in the list of apps. Type 'Windows system restore' in the Search Help box, then press Enter. Returning to a restore point 1. From Start, type 'Control Panel' and then click Control Panel in the list of apps. 2.
• If you can still run Windows and have not deleted the recovery partition, see Recovering from Windows on page 75. • If you cannot run Windows, your original hard drive has been completely re-formatted or you have installed a replacement hard drive, see Recovering from a recovery backup on page 79. Recovering from Windows Start Gateway Recovery Management: • From Start, type 'Recovery' and then click Gateway Recovery Management in the list of apps.
Store). See Customized Restore with Gateway Recovery Management on page 78. Restore Factory Settings with Gateway Recovery Management 1. Click Restore Factory Settings. Caution: 'Restore Factory Settings' will erase all files on your hard drive. 2. The Reset your PC window opens.
Images for reference only. 3. Click Next, then choose how to erase your files: a. Just remove my files quickly erases all files before restoring your computer and takes about 30 minutes. b. Fully clean the drive completely cleans the drive after each file is erased, so no files can be viewed after the recovery. Cleaning the drive takes much longer, up to 5 hours, but is much more secure as old files are completely removed. 4. Click Reset. 5.
Customized Restore with Gateway Recovery Management 1. Click Customized Restore (Retain User Data). 2. The Refresh your PC window opens. 3. Click Next, then Refresh. 4. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This process takes about 30 minutes.
Recovering from a recovery backup To recover from a recovery backup on a USB drive: 1. Find your recovery backup. 2. If your computer does not have a built-in keyboard, make sure a keyboard is attached to your computer. 3. Plug in the USB drive and turn on your computer. 4. If it is not already enabled, you must enable the F12 Boot Menu: a. Press when starting your computer. b. Use the left or right arrow keys to select the Main menu. c.
7. Select Troubleshoot and then choose the type of recovery to use: a. Click Advanced then System Restore to start Microsoft System Restore: Microsoft System Restore periodically takes a 'snapshot' of your system settings and saves them as restore points. In most cases of hard-to-resolve software problems, you can return to one of these restore points to get your system running again. b.
Reset your PC from the recovery backup Caution: Reset your PC will erase all files on your hard drive. 1. The Reset your PC window opens. Images for reference only. 2. Click Next. 3. Select the operating system to recover (normally only one option is available). 4. Choose to keep any changes to the hard drive: a. If you have deleted the recovery partition or otherwise changed the partitions on the hard drive and want to keep these changes, select No. b.
drive takes much longer, up to 5 hours, but is much more secure as old files are completely removed. 6. Click Reset. 7. After the recovery has finished, you can start using your computer by repeating the first-start process. Refresh your PC from the recovery backup 1. The Refresh your PC window opens. 2. Click Next. 3. Select the operating system to recover (normally only one option is available). 4. Click Refresh. 5.
F REQUENTLY ASKED QUESTIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up Look at the power indicator: • If it is not lit, no power is being supplied to the computer. Check the following: • If you are using on the battery, it may be low and unable to power the computer. Connect the AC adapter to recharge the battery pack.
• The brightness level might be too low. Press brightness level. (increase) to adjust the • The display device might be set to an external monitor. Press toggle the display back to the computer. to • If the Sleep indicator is lit, the computer is in Sleep mode. Press and release the power button to resume. No audio is heard from the computer Check the following: • The volume may be muted. In Windows, look at the volume control (speaker) icon on the taskbar.
The printer does not work Check the following: • Make sure that the printer is connected to a power outlet and that it is turned on. • Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer.
TIPS AND HINTS FOR USING WINDOWS 8 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started. Three concepts you might want to keep in mind 1. Start The Start button is no longer available; you can launch apps from the Start screen. 2. Tiles Live tiles are similar to thumbnails of the apps. 3. Charms Charms allow you to perform useful functions, such as sharing content, turning off your PC or changing settings.
How do I jump between apps? Move the cursor to the left-hand edge of the screen to view thumbnails of apps that are currently running. You may also press the Windows key + to open and scroll through the current apps. How do I turn off my computer? Press the Windows key + , click Settings > Power and select the action you'd like to take. Alternatively, from Desktop, click Gateway Power Button and select the action you'd like to take.
How do I unlock my computer? Press the any key and click on a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. How do I personalize my computer? You can personalize Start with a different background image or by arranging the tiles to suit your personal needs. To change the background, press the Windows key + and click Settings > Change PC settings > Personalize.
To change the background, press the Windows key + and click Settings > Change PC settings > Personalize. Click Lock screen at the top of the page and select the image and apps you would like to see on the lock screen. So, how do I close an app? Move the cursor to the top of the screen and click and drag the window downwards to close the app. You can close apps from the thumbnails on the left-hand edge of the screen by right-clicking on a thumbnail and selecting Close.
To view the complete list of apps, press the space bar or the Menu key and click All apps. How do I make an app appear on Start? If you're in All apps and you want to make an app appear on Start, you can select the app and right-click on it. Select Pin to Start from the menu that appears at the bottom of the screen. How do I remove a tile from Start? Right-click the tile and click Unpin from Start from the menu that appears at the bottom of the screen.
What is a Microsoft ID (account)? A Microsoft account is an email address and password that you use to sign in to Windows. You can use any email address, but it is best if you choose the one you already use to communicate with friends and sign in to your favorite websites. When you sign in to your PC with a Microsoft account, you'll connect your PC to the people, files, and devices you care about.
How do I check for Windows updates? Press the Windows key + and click Settings > Change PC settings > Windows Updates. Click Check for updates now. Where can I get more information? For more information please visit: • Windows 8 tutorials: www.gateway.com/windows8-tutorial • Support FAQs: support.gateway.
R EGULATORY INFORMATION PREVENTION OF HEARING LOSS - Caution: Permanent hearing loss may occur if earphones or headphones are used at high volume for prolonged periods of time. - A pleine puissance, l’écoute prolongée du baladeur peut endommager l’oreille de l’utilisateur. CAUTION when listening: To protect your hearing, follow these instructions. - Increase the volume gradually until you can hear clearly and comfortably. - Do not increase the volume level after your ears have adjusted.
日本 (JAPAN) 本装置は、第二種情報装置(住宅地域またはその隣接した地域において使用されるべき 情報装置)デ住宅地域での電波障害防止を目的とした情報装置等電波障害自主規制協議 会 (VCCI)基準に適合しております。 しかし、本装置をラジオ、テレビジョン受信機に、近接してご使用になると、受信障害 の原因となることがあります。本書の説明にしたがって正しい取り扱いをしてくださ い。 WIRELESS ADAPTER REGULATORY INFORMATION USA — FCC and FAA The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment.
- The use of wireless adapters in hospitals is restricted to the limits set forth by each hospital. Antenna Use In order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a minimum distance of 20 cm (8 inches) or more from the body of all persons or at a minimum distance as specified by the FCC module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization website at https://fjallfoss.fcc.gov/ oetcf/eas/reports/GenericSearch.
- Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g and 802.11n wireless LAN devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g and 802.11n products are designed for use only in specific countries, and are not allowed to be operated in countries other than those of designated use.
proprietor of the building or responsible representatives of the applicable organization. Examples of such situations may include: - Using the wireless adapter on board airplanes, or - Using the wireless adapter in any other environment where the risk of interference with other devices or services is perceived or identified as being harmful.
minimum separation distance as specified by the FCC grant conditions, and the antenna that is built into the computer. Details of the authorized configurations can be found at www.fcc.gov/oet/ea/ by entering the FCC ID number on the device. Interference Statement This wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
- Caution: When machine supports and using IEEE 802.11a wireless LAN, this product is restricted to indoor use due to its operation in the 5.15- to 5.25 GHz frequency range. Industry Canada requires this product to be used indoors for the frequency range of 5.15 GHz to 5.25 GHz to reduce the potential for harmful interference to co-channel mobile satellite systems. High power radar is allocated as the primary user of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands.
"To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing." « Pour empêcher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit être utilisé a l'intérieur et devrait être placé loin des fenêtres afin de fournir un écran de blindage maximal.
The low band 5.15 -5.35 GHz is for indoor use only. This equipment complies with the essential requirements of the European Union directive 1999/5/EC. See Statements of European Union Compliance, and more details refer to the attached Declaration of Conformity. English Hereby, ACER INC., declares that this devise is in compliance with the essential requirements and other relevant provisionns of Directive 1999/5/EC. Česky [Czech] ACER INC.
Español [Spanish] Por medio de la presente ACER INC. declara que el dispositivo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. Ελληνικά [Greek] Δια του παρόντος η ACER INC. δηλώνει ότι η παρούσα συσκευή συμμορφώνεται προς τις ουσιώδεις απαιτήσεις και τις λοιπές διατάξεις της Οδηγίας 1999/5/ ΕΚ. Français [French] Par la présente ACER INC.
Lietuvių [Lithuanian] Šiuo ACER INC. deklaruoja, kad šis įrenginys atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Malti [Maltese] Hawnhekk, ACER INC., jiddikjara li dan jikkonforma mal- ti ijiet essenzjali u ma provvedimenti o rajn relevanti li he mm fid-Dirrettiva 1999/5/EC. Magyar [Hungarian] Alulírott, ACER INC. nyilatkozom, hogy a készülék megfelel a vonatkozó alapveto követelményeknek és az 1999/5/EC irányelv egyéb eloírásainak.
Slovensko [Slovenian] ACER INC. izjavlja, da je ta naprava skladna z bistvenimi zahtevami in ostalimi relevantnimi določili Direktive 1999/5/ES. Slovensky [Slovak] ACER INC. týmto vyhlasuje, že zariadenie spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] ACER INC. vakuuttaa täten että tämä laite on direktiivin 1999/ 5/EY oleellisten vaatimusten ja sitä koskevienn direktiivin muiden ehtojen mukainen. Svenska [Swedish] Härmed intygar ACER INC.
L'utilisation de cet equipement (2,4 GHz WLAN) est soumise à certaines restrictions : - La puissance maximale autorisée en intérieur est de 100 mW pour 2400 2483,5 MHz. - La puissance maximale autorisée est de 100 mW en extérieur pour 2400 2454 MHz. - La puissance maximale autorisée est de 10 mW en extérieur, 2454 - 2483,5 MHz. Pour les dernières restrictions, voir www.art-telecom.fr. Italy The use of these equipments is regulated by: 1.D.L.gs 1.8.2003, n.
Brazil Este equipamento opera em caráter secundário, isto é, não tem direito a proteção contra interferência prejudicial, mesmo de estações do mesmo tipo, e não pode causar interferência a sistemas operando em caráter primário. Pakistan Pakistan Telecommunication Authority (PTA) Approved. Morocco The operation of this product in the radio channel 2 (2417 MHz) is not authorized in the following cities: Agadir, Assa-Zag, Cabo Negro, Chaouen, Goulmima, Oujda, Tan Tan, Taourirt, Taroudant and Taza.
MODIFICATIONS TO THE PRODUCT CE Marking Gateway cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product with the CE Marking. Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment.
You must unplug the power supply cord and remove or disable the battery to disconnect the equipment from the power supply. In that aim, the socket-outlet should be installed near to the equipment and should be easily accessible. Input rating: Refer to the rating label on the bottom of the computer and ensure that your power adapter complies with the specified rating. Under no circumstances should the user attempt to disassemble the power supply. The power supply has no user-replaceable parts.
Use only UL Listed No. 26AWG or larger telecommunication cords. Only Ethernet LAN or RTC modem cable can have length exceeding 3 metres. Gateway recommends that you add a ferrite core round clip to each cable connecting your computer to a hardware device that was not included with your computer. - Ferrite reference: 28A-2029 from Steward (two loops) During product certification, Gateway used the following cable quality: - USB2.
The optical devices installed in your computer are designed for use solely as components of such electronic product and therefore do not comply with the appropriate requirements of Code of Federal Regulation Sec. 1040.10 and Sec. 1040.11 for COMPLETE laser products. Because exposure to laser radiation is extremely hazardous, under no circumstances should the user attempt to disassemble the laser device.
E NVIRONMENT OUR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Gateway is committed to limit the environmental impact of its products during product life cycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc. Suppliers are asked, for each part of any product, to respect all regulations.
Battery disposal (when applicable) Before disposing of your equipment ensure that you have removed any batteries that may be fitted in the equipment. European law states that batteries must be collected for disposal separately from household waste. Do not throw your used batteries in the dustbin. Dispose of your used batteries via a battery collection scheme where available, or ask your distributor or local authority what infrastructures you can use.
- wake from "Sleep" mode if the keyboard is pressed or mouse is moved. - save more than 80% energy when in "Sleep" mode. ENERGY STAR and the ENERGY STAR mark are registered U.S. marks.
S OFTWARE LICENSE - Note: Most of the software applications are already preinstalled on your Gateway computer. They are ready to use or to set up. However, some titles require a CD or DVD to run. You will find these discs in your computer's packaging. Gateway License Agreement (CD and/or DVD Products). This copy of the original is your proof of license. Please treat it as valuable property. Important! Read carefully before installing the software. The following License Agreement applies to you.
using the SOFTWARE concurrently does no exceed the number of Licenses. If the SOFTWARE is permanently installed on the hard disk or the storage device of a computer (other than a network server) and one person uses that computer more than 80% of the time it is in use, then that person may also use the SOFTWARE on a portable or home computer. 2. Copyright The SOFTWARE is owned by Gateway or its suppliers and is protected by United States copyright laws and international treaty provision.
write to the free Software Foundation, Inc. and request a copy. The address of the Free Software Foundation, Inc is: 59 Temple Place - Suite 330, Boston, MA, 02111-1307, USA. For a period of three (3) years as commencing from your receipt of this software, you may obtain a complete machine-readable copy of the source code for the Free Software under the terms of the GPL without charge except for the cost of media, shipping, and handling, upon a written request to us.
I NDEX A audio troubleshooting ................................. 84 B Batteries ................................................. 112 low conditions ................................... 42 battery disposal ..................................... 112 maximizing life .................................. 37 battery pack optimizing.......................................... 41 battery-low warning........................... 41 removing ........................................... 40 characteristics ...................
E Environment ........................................... 111 Epilepsy warning ..................................... 13 F FAQ. See frequently-asked questions frequently-asked questions .................... 83 Firewall ..................................................... 55 front view ................................................. 17 G Gateway Recovery Management ........... 46 H Health precautions .................................. 11 hotkeys ....................................................
N network ..................................................... 33 num lock .................................................. 24 Network connections ............................... 49 numeric keypad embedded ......................................... 24 Norton Internet Security ................... 53, 57 P ports ......................................................... 31 problems .................................................. 83 Power cords ............................................... 9 display ...
V view front .................................................... 18 left ..................................................... 18 right ................................................... 20 W Warranty..................................................... 7 Windows Using Windows................................. 46 WiFi ................................................... 49, 50 Windows automatic updates ........... 61 Windows keys ......................................... 28 120 - Index Ver.: 01.01.