User's Manual
Table Of Contents
- Starting right
- Getting to know your tablet
- Knowing the tablet parts
- Keyboard dock
- Releasing the tablet from the keyboard dock
- Labels
- Changing your tablet's settings
- Using TouchPad gestures
- Using touch screen gestures
- Setting Touch screen preferences
- Using the on-screen keyboard
- Using the digital pen (select models only)
- Finding your hardware and software information
- Connecting to a network
- Enjoying entertainment features
- Navigating using the keyboard, touch gestures and pointing devices
- Managing power
- Initiating Sleep and Hibernation
- Setting password protection on wakeup
- Using the power meter and power settings
- Selecting a power plan
- Running on battery power
- Running on external AC power
- Refreshing your software content with Intel Smart Connect Technology (select models only)
- Shutting down (turning off) the tablet
- Managing and sharing information
- Maintaining your tablet
- Securing your tablet and information
- Using Setup Utility (BIOS) and System Diagnostics
- Backing up, restoring, and recovering
- Specifications
- Electrostatic Discharge
- Index
Installing HP and third-party software updates
HP recommends that you regularly update the software and drivers that were originally installed on
your tablet. To download the latest versions, go to
http://www.hp.com/support. At this location, you
can also register to receive automatic update notifications when they become available.
If you have installed third-party software after you purchased your tablet, regularly update the
software. Software companies provide software updates to their products to correct security problems
and improve functionality of the software.
Securing your wireless network
When you set up your wireless network, always enable security features. For more information, see
Protecting your WLAN on page 28.
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently
lost or damaged through a virus attack or a software or hardware failure. For more information, see
Backing up, restoring, and recovering on page 63.
Securing your wireless network 59