Fujitsu Limited has made every effort to ensure the accuracy and completeness of this document. However, as ongoing
development efforts are continually improving the capabilities of our products, we cannot guarantee the accuracy of the
contents of this document. We disclaim liability for errors, omissions, or future changes.
LifeBook is a trademark of Fujitsu Limited.
Microsoft, Windows, MS, MS-DOS, and Windows NT are registered trademarks of the Microsoft Corporation of the United
States in the United States and other countries.
Intel is a registered trademark of the Intel Corporation of the United States.
Celeron is a trademark of the Intel Corporation of the United States.
ATI is registered trademark of ATI Technologies INC.
Macrovision :-
This product incorporates copyright protection technology that is protected by method claims of certain U.S. patents and
other intellectual property rights owned by Macrovision Corporation and other rights owners. Use of this copyright protection
technology must be authorized by Macrovision Corporation, and is intended for home and other limited viewing uses
only unless otherwise authorized by Macrovision Corporation. Reverse engineering or disassembly is prohibited. Apparatus
Claims of U.S. Patent Nos. 4,631,603, 4,577,216, 4,819,098 and 4,907,093 licensed for limited viewing uses only.
Dolby :-
Manufactured under license from Dolby Laboratories. "DOLBY", "PRO LOGIC," and the double-D symbol are trademarks
Operations are subject to the following two conditions: (1) This device may not be allowed to cause harmful interference,
(2) This device must accept any interference received, including interference that may cause undesired operation.
Website : www.fujitsu-pc-asia.com
i
IMPORTANT SAFETY INSTRUCTIONS
1. Read these instructions carefully. Save these instructions for future reference.
2. Follow all warnings and instructions marked on the product.
3. Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners.
Use a damp cloth for cleaning.
4. Do not use this product near water.
5. Do not place this product on an unstable cart, stand, or table. The product may fall, causing serious
damage to the product.
6. Slots and openings in the cabinet and the back or bottom are provided for ventilation; to ensure reliable
operation of the product and to protect it from overheating, these openings must not be blocked or
covered. The openings should never be blocked by placing the product on a bed, sofa, rug, or other
similar surface. This product should never be placed near or over a radiator or heat register, or in a builtin installation unless proper ventilation is provided.
7. This product should be operated from the type of power indicated on the marking label. If you are not
sure of the type of power available, consult your dealer or local power company.
8. This product is equipped with a 3-wire grounding-type plug, a plug having a third (grounding) pin. This
will only plug into a grounding-type power outlet. This is a safety feature. If you are unable to insert the
plug into the outlet, contact your electrician to replace your obsolete outlet. Do not defeat the purpose
of the grounding-type plug.
9. Do not allow anything to rest on the power cord. Do not locate this product where persons will walk on
the cord.
10. If an extension cord is used with this product, make sure that the total ampere rating of the equipment
plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure
that the total rating of all products plugged into the wall outlet does not exceed 15 amperes.
11. Never push objects of any kind into this product through cabinet slots as they may touch dangerous
voltage points that could result in a fire or electric shock. Never spill liquid of any kind on the product.
12. Do not attempt to service this product yourself, as opening or removing covers may expose you to
dangerous voltage points or other risks. Refer all servicing to qualified service personnel.
13. Unplug this product from the wall outlet and refer servicing to qualified service personnel under the
following conditions:
a. When the power cord or plug is damaged or frayed.
b. If liquid has been spilled into the product.
c. If the product has been exposed to rain or water.
d. If the product does not operate normally when the operating instructions are followed. Adjust
only those controls that are covered by the operating instructions since improper adjustment of
other controls may result in damage and will often require extensive work by a qualified tech-
nician to restore the product to normal condition.
e. If the product has been dropped or the cabinet has been damaged.
f. If the product exhibits a distinct change in performance, indicating a need for service.
14. CAUTION. When replacing the battery , be sure to install it with the polarities in the correct posi-
tion. There is a danger of explosion if the battery is replaced with an incorrect type or is mistreated. Do not recharge, disassemb le or dispose of in fire. Replace only with the same or equiv alent type recommeded by the manufacturer . Dispose of the used battery accor ding to the manufacturer’s instructions.
15. Use only the proper type of power supply cord set (provided in your accessories box) for this unit. It
should be a detachable type: UL listed/CSA certified, BS1363,ASTA,SS145 certified, rated 10A 250V
minimum, VDE approved or its equivalent. Maximum length is 15 feet (4.6 meters).
ii
High Safety Required Use
This Product is designed, developed and manufactured as contemplated for general use, including
without limitation, general office use, personal use, household use and ordinary industrial use, but is
not designed,developed and manufactured as contemplated for use accompanying fatal risks or
dangers that, unless extremely high safety is secured, could lead directly to death, personal
injury,severe physical damage or other loss (hereinafter ‘High Safety Required Use’), including without limitation, nuclear power reactioncore control in nuclear atomic facility, airplane automatic aircraft
flight control, air traffic control, operation control in mass transport control system,medical instrument
for life support system, missile launching control in weapon system. You shall not use this Product
without securing the sufficient safety required for the High Safety Required Use.
iii
Data Storage Media
and Customer Responsibilities
The only effective protection for the data stored in a computer, such as on a hard disk, is for you,
Purchaser to regularly back up the data. Fujitsu and its affiliates, suppliers, service providers and
resellers shall not be responsible for any software programs, data or other information stored or used
on any media or part of any Product returned to Fujitsu or its service providers for Warranty Service
or other repair, including but not limited to the costs of recovering such programs, data or other
information. It is solely your responsibility as the Purchaser to back up any software programs, data,
or information stored on any storage media or any part of a Product returned for Warranty Service or
repair to the designated service centers.
iv
AUSTRALIAN W ARNINGS
WARNING
FOR SAFETY REASONS, ONLY CONNECT EQUIPMENT WITH A TELECOMMUNICATIONS
COMPLIANCE LABEL. THIS INCLUDES CUSTOMER EQUIPMENT PREVIOUSLY LABELLED
PERMITTED OR CERTIFIED.
Connection of Non Certified/Approved peripherals may result in the equipment operating
outside the Australian EMI Standards.
Modems connected to the Australian telecommunications network must be operated in accordance with the
Labelling Notice. This modem has been specifically configured to ensure compliance with the ACA Standards.
Do not adjust your modem or software outside the values indicated below. To do so would result in your
modem being operated in a non-compliant manner.
Call Attempts/Retries:
Applications software shall be configured so that no more than 3 attempts are made to establish a connection
to a given number (Note: if the modem can detect service tones, up to 10 attempts can be made). If the call
sequence is unsuccessful, there shall be a delay of at least 30 minutes before attempting to call the number
again.
Failure to set the modem, and any application software used with the modem, to the values shown above
will result in the modem being operated in a non-compliant manner. Consequently, this would be in violation
of the Labelling Notice for this equipment, and the Telecommunications Act 1997 prescribes penalties for
the connection of non-compliant equipment.
v
NEW ZEALAND WARNINGS
The grant of a Telepermit for any item of terminal equipment indicates only that Telecom has accepted
that the item complies with minimum conditions for connection to its network. It indicates no endorsement
of the product by Telecom, nor does it provide any sort of warranty. Above all, it provides no assurance
that any item will work correctly in all respects with another item of Telepermitted equipment of a different
make or model, nor does it imply that any product is compatible with all of Telecom’s network services.
This equipment is not capable under all operating conditions of correct operation at the higher speeds
for which it is designed. 56 KBPS connections are likely to be restricted to lower bit rates when connected
to some PSTN implementations. Telecom will accept no responsibility should difficulties arise in such
circumstances.
Immediately disconnect this equipment should it become physically damaged, and arrange for its
disposal or repair.
This equipment shall not be used in any manner, which could constitute a nuisance to other Telecom
customers.
This equipment shall not be set to make automatic calls to the Telecom “111” Emergency Service.
This device is equipped with pulse dialing while the New Zealand standard is DTMF tone dialing. There
is no guarantee that Telecom lines will always continue to support pulse dialing. It is strongly
recommended that pulse dialing is not used.
Some parameters required for compliance with Telecom’s Telepermit requirements are dependent on
the equipment (PC) associated with this device. The associated equipment shall be set to operate
within the following limits for compliance with Telecom’s Specifications:
For repeat calls to the same number.
There shall be no more than 10 call attempts to the same number within any 30 minute period
for any single manual call initiation, and
The equipment shall go on-hook for a period of not less than 30 seconds between the end of
one attempt and the beginning of the next attempt.
For Automatic calls to different numbers.
The equipment shall go on-hook for a period of not less than 5 seconds between the end of one
attempt and the beginning of the next attempt.
For Automatically answered Incoming Calls
Incoming calls shall be answered between 3 and 30 seconds from the start of the ringing.
For correct operation, the total of the RNs of all devices connected to a single line at anytime should not
exceed 5. The RN of this Equipment is 0.5.
WARNING
Connection of Non Certified/Approved peripherals may result in the equipment operating
outside the New Zealand EMI Standards.
vi
Note: Modem setting in Windows 98 / Windows Me
The default modem setting in Windows 98 / Windows Me operating system is United States of America.
If you are residing in Australia or New Zealand, please choose the appropriate country where you are
located.
Dial type must be set to Tone Dialing if you are either in Australia or New Zealand.
Please see below instruction for quick modem setup.
A. If you are located in Australia
1. Go to Control panel, select modem icon.
2. Choose Australia in “What country/region
are you in now?”
3. Select Phone system as “Tone Dialing”
4. Close
B. If you are located in New Zealand
1. Go to Control panel, select modem icon.
2. Choose New Zealand in “What country/
region are you in now?”
3. Select Phone system as “Tone Dialing”
4. Close
vii
Note: Modem setting in Windows XP
A. If you are located in Australia
1. Click Start select Control panel select "Phone and
Modem Options".
2. Double click New Location.
3. Choose "Australia" in Country/region pull down
menu bar.
4. Select Phone system as “Tone Dialing”.
5. Click OK and Apply.
B. If you are located in New Zealand
1. Click start select Control panel select "Phone and
Modem Options".
2. Double click New Location.
3. Choose "New Zealand" in Country/region pull down
menu bar.
4. Select Phone system as “Tone Dialing”.
5. Click OK and Apply.
Note:
The screens and illustrations shown in this examples may slightly vary depending on the operating
environment that you have installed.
viii
NOTATION IN THIS DOCUMENT
Warnings
This manual uses a variety of icons as visual marks so that you can use this computer safely and
correctly and avoid damage and danger to yourself and to others. These icons and their meanings
are as follows. Please learn these icons before reading this manual. Learning these icons will be
useful for understanding this manual.
IconMeaning
WARNING
CAUTION
The symbols below are used together with the icons above to indicate what type of danger or
damage is involved.
SymbolMeaning
Incorrect handling or ignoring this warning can cause a dangerous
situation that could result in death or severe injury.
Incorrect handling or ignoring this warning can cause a dangerous
situation that could result in moderate or minor injury or could result in
equipment damage.
The symbol indicates a w arning or caution. The symbol inside the
indicates the concrete nature of the warning. (The example on the left
is a caution for electric shock.)
The circle and slash indicates prohibited behavior. The symbol inside
the circle indicates the concrete nature of the prohibition. (The
example on the left indicates that disassembly is prohibited.)
The indicates instructions that must be followed. The symbol inside
indicates the concrete nature of those instructions. (The example on
the left tells you to unplug the power plug from the socket.)
Key notation and operation methods
Explanations of key operations do not show all the characters on the keyboard. Instead they
indicate just the keys necessary to the explanation as follows.
Examples: [Ctrl] key, [Enter] key, [ → ] key
When multiple keys are to be pressed at the same time, this is indicated by connecting them with
[+].
Examples: [Ctrl] + [F3] keys; [Shift] + [ ↑ ] key
Screen examples
The screens shown in this manual are examples. Please understand that the file names and
screens you use may be different.
ix
Notation in text
Here is what symbols in text mean.
SymbolMeaning
Critical Points
Indicates a point necessary for correctly operating the hardware or
software.
Gives the meaning and brief explaination of a term.
Column
→ Indicates the page to see elsewhere in this manual.
Command input (key input)
Within the text of this manual, command input (giving commands to the computer by pressing
keys) is indicated as follows.
Example:
In the position indicated in the example above by the ↑, the space left between the characters
indicates that a space needs to be left in the entry by pressing the space bar (the long key with
nothing written on it at the center of the front of the keyboard). Commands are written in this
manual as lowercase latin letters, but uppercase letters may be used.
Product names
The following product names are abbreviated as follows in this manual.
“Microsoft® Windows XP® operating system” is written as “Windows XP”.
“Microsoft® Windows® 2000 operating system” is written as “Windows 2000”.
“Microsoft® Millennium® Edition operating system” is written as “Windows Me”.
“Microsoft® Windows® 98 operating system” is written as “Windows 98”.
“Microsoft® MS-DOS® operating system Version 6.2/V” is written as “MS-DOS”.
“Microsoft® Windows® operating system Version 3.1” is written as “Windows 3.1”.
“Microsoft® Windows NT® Server network operating system Version 3.5” and “Microsoft® Windows
NT® Workstation operating system Version 3.5” are both written as “Windows NT 3.5”.
“Microsoft® Windows NT® Server network operating system Version 3.51” and “Microsoft® Windows
NT® Workstation and NT Server Version 4.0” are both written as “Windows NT 4.0”.
“Windows NT 3.51” and “Windows NT 4.0” are both written as Windows NT.
“Fujitsu LifeBook” is written as “this computer” or “the computer main unit”.
dir c:
↑
x
Configuration of this Manual
SECTION 1
This section explains basic operations and basic items for using this computer, including the
names of the parts and their functions, Flat Point Operations and battery operation.
SECTION 2
This section explains installation of options for this computer.
SECTION 3
This section explains what to do when trouble occurs with this computer and when messages are
displayed. Read this section as the necessity arises.
SECTION 1
SECTION 2
SECTION 3
xi
CONTENTS
SECTION 1
1. Names of the Parts and their Functions .............................2
2. Status LCDs.........................................................................12
SECTION 2
1. Before Installing Peripheral Equipment ............................16
This chapter gives the names of
the parts and their functions.
SECTION 1
SECTION 1
1.
Names of the Parts and their Functions
Front of Computer
1. Latch
This latch locks so that the LCD display does not open accidentally.
To open the LCD display, slide the latch to the right to unlock it.
2. LCD display
This is the display screen for this computer.
2
Critical Point
Characteristics of the LCD display
Please understand that the following performance is characteristic of the LCD display and
does not indicate a problem with the display.
• This computer’s TFT color LCD display uses high-level technology and comprises over
2.35 million pixels (dots) (for a resolution of 1024 x 768). Therefore, there may be a few
dots that never light up or never go out.
• Due to the manufacturing process, there may be some difference in the colors among
different units of this model and temperature change may result in a certain unevenness
of the color on a single computer’s screen.
3. Closed Cover Switch
This switch puts the computer on standby and makes it resume and switches the LCD display
backlight Off/On when the cover is closed/opened.
4. Status display LCD
Shows the status of this computer.
5. LifeBook Security/Application Panel
The LifeBook Security/Application Panel provide hardware security and one-touch application
launch capability.
6. Infrared Mouse Receiver
This IR Mouse Receiver allows you to use a Fujitsu IR mouse.
7. Power button
This button switches On the power for this computer and puts the computer on standby and
makes it resume.
8. Keyboard
The keyboard is used to input text and give commands to the computer.
9. Touch pad
Serves as the mouse. When you install the “Alps Pointing Device Driver” that comes with this
computer, you can install the center scroll button. When you press the center scroll button, the
screen scrolls up/down.
SECTION 1
Critical Point
You can not scroll with this scroll button in some applications.
10. Speakers
Outputs the sound for this computer.
CAUTION
HEARING LOSS
Turn the volume on the computer all the way down by pressing the “Fn” + “F8” keys when
connecting to the mic jack or headphone jack. Connecting with the volume up can damage
audio equipment or cause irritating noise that has a negative impact on your hearing.
3
11. IEEE 1394 Port
The 1394 port allows you to connect devices that are compliant with IEEE standard 1394.
12. Microphone Jack
This is the jack for connecting any ordinary 3.5-mm miniplug microphone and recording (in
monaural).
Note that certain types of ordinary microphones (dynamic microphones) will not work correctly
with this jack. Please check before purchasing a microphone.
13. Headphone jack/Optical digital audio output terminal
This is the jack for connecting any ordinary 3.5-mm miniplug headphone. Note that some
headphones have plugs shaped in such a way that they can not be used with this jack. Check this
before purchasing a headphone. This terminal can also be used as an optical digital output
terminal to connect the computer to the optical digital input terminal of an MD player, etc. (with a
3.5-mm fiber-optic mini plug).
CAUTION
HEARING LOSS
Be careful not to turn the volume up too high when using headphones. Listening for
prolonged periods to irritatingly loud volumes can damage your hearing.
HEARING LOSS
Do not leave on headphones while switching the power On or Off. The irritating noise
that can result can damage your hearing.
4
Right Side of Computer
1. Mobile multi-bay
One of the following is installed, depending on the model.
• Internal CD-ROM drive unit
• Internal CD-R/RW drive unit
• Internal DVD-ROM & CD-R/RW drive unit
• SuperDisk or 2nd Hard Disk. (Optional)
• Weight Saver. (Optional)
The unit installed in the multi-bay can be replaced.
2. Mobile multi-bay unit eject lever
To remove the unit installed in the mobile multi-bay, raise this lever.
SECTION 1
5
Left Side of Computer
1
1. Wireless LAN On/Off Switch
(On wireless LAN models only)
The Wireless LAN On/Off Switch turns the wireless LAN device on and off.
2. Fan Exhaust
The fan exhaust assists in the proper cooling of the system. This fan rotates if the temperature
inside the computer reaches a certain level.
2
3
4
65
CAUTION
Breakdown
Do not block the cooling fan hole. If you do, heat can build up within the computer and
cause breakdown.
6
3. Modem connector (Modem (RJ-11) Telephone Jack)
Some models have a modem connector. The modem (RJ-11) telephone jack is for attaching a
telephone line to the internal modem.
4. Anti-theft Lock
This anti-theft lock allow you to attach an optional physical lock down device.
Critical Point
This theft prevention lock supports the Kensington Microsaver Security System.
Product name: Microsaver (security wire)
5. PC card slots
These are the slots for loading PC cards. The bottom slot is Slot 1 and the top slot is Slot 2.
Critical Point
Some OSs treat Slot 1 (bottom) as Slot 0 and Slot 2 (top) as Slot 1.
6. PC card eject buttons
Press here to eject a PC card.
SECTION 1
7
Rear Panel
1. Serial connector
This is the connector for equipment with an RS-232C interface.
2. Parallel connector
This is the connector for a printer or other device using a parallel interface.
3. External display connector
This is the connector for a CRT display or other external display.
4. Infrared communications port
This is the interface for infrared communications.
Critical Point
The infrared communications port is used with “Wireless Link”.
When using infrared communications, keep the AC adaptor and any external display device
away from the infrared communications port. They can cause noise and malfunctions.
8
5. PS/2 Port
This PS/2 port allows you to connect an external keyboard, numeric keypad or mouse.
6. Air intake hole
This hole allows the cooling fan to take in air.
CAUTION
BREAKDOWN
Do not block the cooling fan hole. If you do, heat can build up within the computer and
cause breakdown.
7. LAN connector
A LAN cable can be connected here.
8. S-Video Out Port
The S-Video port allows you to connect and used directly any S-Video device,such as a VCR or
Television. (This port have 7 pins but you can use the 4 pins S-Video cable to connect.)
9. USB connectors
You can connect USB peripheral equipment, such as USB printers, to these these connectors.
10. DC-IN connector
This is the connector for the AC adaptor.
IMPORTANT
• When connecting peripheral equipment to this computer, always check that the connector is
facing the correct direction and push straight in.
SECTION 1
9
Bottom of Computer
1. Internal battery pack
This is the internal battery pack.
2. Expansion RAM module slot
This is the slot for installing memory in this computer.
10
Port Replicator
Anti-theft Lock
PS/2 Port for keyboard
PS/2 Port for Mouse
Parallel Port
External Monitor Port
Serial Port
External Floppy Disk Drive Port
(Not applicable for this model)
SECTION 1
Lan (RJ-45) Port
DC Power Jack
USB Port
Docking Port
Port Replicator
Release Latch
Line-out Jack
Line-in Jack
11
SECTION 1
2.
Status LCDs
Critical Point
When the power is switched off, the status LCDs go out except for the charging indicator.
1. SUS/RES indicator ( )
When this computer is running, this icon lights up and when the computer is on standby, this
lamp flashes.
2. AC Adapter indicator ( )
Lights up to show that the computer is running on power from the AC adaptor.
3. Battery mounting display (1, 2 )
Lights up when a battery is installed. 1 is the internal battery and 2 is an expansion battery in the
mobile multi-bay.
4. Battery charge display ( )
Lights up when the battery is being charged. If the charging stops to let the battery cool off
because it is too hot, this display flashes.
5. Battery remaining capacity display ()
Indicates the amount of battery capacity remaining.
“Hardware” – “Checking the remaining battery capacity”.
12
6. CD access display ()
Lights up when the CD is being accessed.
7. Hard disk access display ( )
Lights up when the internal hard disk is being accessed.
8. Diskette access display ( )
Lights up when a diskette or superdisk is being accessed.
IMPORTANT
• The diskette access display in the status display LCDs does not light up if the mobile multi-bay
FDD unit is installed and accessed. To check whether or not that unit is being accessed, check
its own access lamp. Always make sure that the access lamp is out before removing a diskette.
9. PC card access display ( , )
Lights up when a PC card is being accessed. The bottom slot is Slot 1 and the top slot is Slot 2.
10. Num Lock display ( )
Lights up when the keyboard is in numeric lock mode. Switch numeric lock mode On/Off by
pressing the “Num Lk” key.
11. Caps Lock display ( )
Lights up when the caps lock is on. (This is the state in which keys pressed are input as uppercase
letters.)
Switch the Caps Lock on/off by pressing “Caps Lock”.
12. Scroll Lock display ( )
Lights up when the screen is locked so that it does not scroll. Switch the scroll lock On/Off by
pressing the “Fn” + “Num Lk” keys at the same time.
How the display operates during a scroll lock depends on the application.
13. Security display ( )
When a password is set with the accompanying “Security Button”, this lights up when the password
is required. If the security display lights up when this computer’s power is switched On or when it
resumes operation, input the password.
SECTION 1
Critical Point
Never press the Power button while the hard disk access or diskette access display is lit!
Doing so can destroy data on the hard disk or diskette or superdisk.
Some OSs treat Slot 1 (bottom) as Slot 0 and Slot 2 (top) as Slot 1.
13
SECTIONSECTION
SECTION
SECTIONSECTION
SECTIONSECTION
SECTION
SECTIONSECTION
22
2
22
22
2
22
This chapter covers basic
handling of peripheral equipment
installed in this computer and
that can be installed on this
computer.
SECTION 2
SECTION 2
1.Before Installing P eripheral Equipment
Peripheral Equipment That Can Be Used
USB mouse
PC card
Numeric keypad
Memory
Mouse
Printer
Memory
Internal
CD-ROM
drive unit
Internal CD-R/RW
drive unit
Internal DVD-ROM
& CD-R/RW drive
unit
16
Cautions for Handling
Please note these cautions before installing peripheral equipment.
• Some peripheral equipment requires setup on the computer
Some peripheral equipment can not be operated by just connecting it to the computer. Such
peripheral equipment requires that settings be made on the computer after the peripheral
equipment is connected. For example, when you use a printer or PC card, after you install it,
you must install the driver. There is also equipment that requires no settings, for example memory.
When connecting peripheral equipment, read this manual carefully so that you can connect the
peripheral equipment correctly.
• Read the manual for the peripheral equipment too
The installation methods given in this manual are just examples. Always read the manual for the
peripheral equipment together with this manual.
• Use original Fujitsu peripheral equipment
The “System Configuration Diagram” shows the original Fujitsu peripheral equipment available
for this computer. Correct operation of products from other companies can not be assured.
When using peripheral equipment from other companies, we recommend that you inquire with
the manufacturer of the peripheral equipment.
Questions concerning peripheral equipment from another company can best be answered by
that company.
• Use peripheral equipment that supports ACPI
This computer is set to ACPI mode. If you use peripheral equipment that does not support ACPI
mode, the power conservation and other functions may not operate correctly.
Also, this computer does not support low-level standby (ACPI S1). If any peripheral equipment
that you use only supports low-level standby, do not put this computer on standby or hibernate
when using such peripheral equipment.
• Cautions for Installation/Removal
When installing peripheral equipment other than a PS/2 mouse, complete the operation system
setup first. If you install such peripheral equipment before setting up the operating system, the
operating system may not be set up correctly. For details on operating system setup, see the
“User’s Manual”.
IMPORTANT
• When connecting peripheral equipment to this computer, always check that the connector is
facing the correct direction and push straight in.
• When installing multiple pieces of peripheral equipment, install and complete the settings for
one piece of peripheral equipment at a time.
SECTION 2
17
SECTION 2
2.Battery
Charging the Battery
1. Connect the AC adaptor.
When you connect the AC adaptor, charging starts and the status LCD battery charging display
( ) and the remaining capacity display ( ) light up.
2. Check that the battery charging display in the status LCDs goes out before disconnecting
the AC adaptor . {You may continue to run the computer on AC power as long as y ou wish.}
Critical Point
When using the computer for the first time after purchase, when the battery has not been
charged for a month or more, and when the remaining battery capacity is low, charge the
battery before using the computer.
Charge the battery fully. The charging is complete when the battery charging display
( ) goes out and the remaining battery capacity at the left end stops flashing and stays
lit. Charge the battery fully ( ), allowing enough time for the battery to be charged fully
( ).
When the remaining battery capacity is over 90%, even if you connect the AC adaptor, the
battery is not recharged. It is recharged when the remaining capacity is 89% or less.
When the power is switched off, a while after the charging is completed, all the LCDs go out.
The charging capacity of the battery is lower when the ambient temperature is too high or
too low.
In such cases as recharging immediately after running this computer on the battery, the
battery can heat up so much that the battery protection function is triggered and charging is
stopped. (The LCD flashes.) The charging starts after the battery temperature has
dropped.
If an expansion battery is installed in the mobile multi-bay, it is charged in parallel with the
internal battery.
18
Running This Computer on the Battery
This section explains how to run this computer on the battery.
1. Disconnect the AC adaptor and press the Power button.
lights up.
Power button
Critical Point
The battery life is shorter at low temperatures.
When you have used the battery many times, its capacity to hold a charge becomes less
and the battery operating time becomes shorter. When the battery operating time becomes
extremely short, replace the battery.
If an expansion battery is installed in the mobile multi-bay, it is used (discharged) in parallel
with the internal battery.
SECTION 2
19
Checking the Remaining Battery Capacity
You can check the remaining battery capacity while the power is on and during charging with the
battery charge/remaining capacity display among the status LCDs.
Remaining battery capacity display
Indicates remaining battery capacity between about 76% and 100%.
Indicates remaining battery capacity between about 50% and 75%.
Indicates remaining battery capacity between about 26% and 50%.
Indicates remaining battery capacity between about 13% and 25%. (During
recharging, indicates remaining battery capacity between 0% and about 25%.)
Indicates that the battery is low. (Remaining battery capacity of about 12% or
less) flashes.
Indicates that the battery is drained. (0% remaining capacity)
Critical Point
Due to the characteristics of the lithium ion battery and the usage environment (temperature
conditions, number of times the battery has been charged and discharged, etc.), the remaining
battery capacity display ( ) sometimes differs from the actual remaining battery capacity.
When the remaining battery capacity is over 90%, even if you connect the AC adaptor, the
battery is not recharged. It is recharged when the remaining capacity is 89% or less.
The 1 on the battery mounting display () indicates the internal battery.
Battery Fault Display
This indicates that the battery can not be charged properly.
Critical Point
If flashes, shut down the computer, switch off the power, then remove the battery and
reinstall it. If still flashes, there is a fault with the battery. Replace it.
20
Low Battery State
This section explains the low battery state and what to do about it.
Low Battery State Display
The Battery charge/remaining capacity display flashes ( ) and the warning alarm sounds.
Critical Point
When you switch the speaker Off, you cannot hear the alarm.
Pressing the “Fn” + “F3” keys at the same time switches the speaker On/Off. The system
beeps when the speaker is switched On but does not when it is switched Off.
The alarm sound is set with the Windows power-conservation functions.
Handling the Low Battery State
1. Connect the AC adaptor.
When you connect the AC adaptor, the battery is charged.
Critical Point
If you continue to use this computer with the low battery, the data being worked on or being
saved may be lost. Connect the AC adaptor quickly. If it is not possible to connect the AC
adaptor, save any data you are working on, close any applications you are running, then
switch off the power.
Reading from and writing to the hard disk uses large amounts of power. When storing data
to the hard disk with the battery low, connect the AC adaptor.
If you leave the computer running with the battery low, the computer will go on standby
automatically. However, the computer will complete all data reading/writing for the hard disk
or other media before going on standby.
This computer is set to go on standby automatically when the remaining battery capacity
reaches approximately 3%. To change this setting, deselect the check box for the appropriate
following item.
Control Panel → “Power Option Properties” → window “Alarm” Tab → “Critical battery alarm”
→ “Activate critical battery alarm when power level reaches:”
Note that if you change this setting, the power will be cut off the instant the battery runs out.
Therefore, data being stored or being worked on may be lost and operation of the computer
may become unstable.
SECTION 2
21
Cautions for Handling
WARNING
ELECTRIC SHOCK
This battery is an extremely delicate product. Do not drop it or otherwise subject it to
strong mechanical shock when installing or removing it. Also, for the sake of safety, do
not use a battery that has been subject to strong mechanical shock.
Do not disassemble this battery.
Disassembling this battery and touching the inside can result in electrical shock and fire.
Discharge
• After the battery has been charged, even if it is not used, it slowly discharges naturally, so we
recommend charging the battery immediately before use.
• When you will be leaving this computer unused for a prolonged period of time (more than a
month or so), remove the battery and store it in a cool location. Leaving the battery installed
for a prolonged period when the computer is not being used can result in over-discharge and
shorten the battery service life.
Service life
• Even if this computer is left unused for a prolonged period of time, the battery wears out and
deteriorates. Run this computer on the battery once per month to check the state of the
battery.
• The battery wears out and deteriorates faster when left at high temperatures.
• This battery is a consumable part, so after it has been used for a long time, its capacity to
hold a charge falls. When its capacity has fallen drastically, replace the battery.
• When the battery operating time becomes extremely short, the battery has reached the end
of its service life.
• When the battery has reached the end of its service life, remove it from the computer. Leaving
a used up battery installed in the computer can result in electrical shock and fire.
Disposal
When disposing of the battery, cover the battery pack connectors with insulating tape in
order to prevent shorts.
Battery operating time
• The battery operating time is affected by the ambient temperature. The battery operating
time may be shorter at low temperature.
Use the AC adaptor in the following cases.
• When using the hard disk, CD, DVD, or other drive frequently
• When using the LAN or modem frequently
• When restoring this computer to its factory state
Pay attention to the remaining battery capacity in the following cases.
• When using the wireless LAN or other wireless equipment
22
Replacing the Battery Pack
Store all programs and data to the hard disk or other medium before replacing the internal battery
pack. This section explains how to replace the internal battery pack.
W ARNING
ELECTRIC SHOCK
When replacing the battery pack, always switch off the power for the computer and
disconnect the AC adaptor. Never touch the computer or battery pack connectors.
Doing so can result in electrical shock and breakdown.
1. Switch off the power for the computer and disconnect the AC adaptor.
2. Close the LCD display and turn the computer upside down.
3. Remove the internal battery pack.
While pressing the two battery hooks, remove the internal battery pack.
Internal battery pack
Hooks
SECTION 2
23
4. Install the new internal battery pack.
Insert the new internal battery pack diagonally from above and press it securely into place.
Internal battery pack
IMPORTANT
• Cover the connectors on the removed battery pack with insulating tape in order to prevent
shorts. Do not mix the removed battery pack with ordinary batteries. This battery pack (lithium
ion battery) is a valuable resource. Please recycle it.
24
SECTION 2
3.PC Cards
Cautions on Handling
CAUTION
BREAKDOWN
A PC card comprises parts that are extremely vulnerable to static electricity and can
even be destroyed by the amount of static electricity that can build up on a human
body. Before handling the PC card, touch your hands to something metal and
discharge any static electricity.
In order to prevent damage, please observe the following points carefully when using
PC cards.
Do not leave PC cards in locations with high temperatures or that are subject to
direct sunlight.
Do not subject PC cards to strong mechanical shock.
Do not place heavy objects on top of PC cards.
Be careful not to let coffee or any other liquid get on a PC card.
When storing a PC card, always place it in its special case.
Critical Point
Some communication PC cards can only be used one at a time. You can check this in the
manual that comes with the PC card.
Some LAN cards may not work with this computer. Also, some modem cards may not work
with the modem-equipped models of this computer.
This computer only supports PC cards running at 3.3 V or 5 V. It does not support PC cards
that run at 12 V.
SECTION 2
Loading PC Cards
This section explains how to load a PC card.
W ARNING
INJURY
Do not stick your fingers in the PC card slot while loading a PC card. This can cause
injury.
Critical Point
Regardless of the operating system, there are some PC cards that require that the power be
cut off before they are loaded and some PC cards that require installation of the device
driver. Check this in the manual for the PC card.
For Windows 2000, the PC card slot numbers displayed on the operating system screen
differ from the PC card slot numbers on the status display LCD.
25
1. Set the PC card in place.
Insert the PC card into the PC card slot with the product name facing upward.
PC card
2. If this is the first time that this PC card has been loaded in this computer, install any
required drivers.
Some PC cards require the drivers be installed. Check the manual for the PC card and install any
required drivers.
Critical Point
Handle any section where a cord connects to the PC card very carefully. Do not place anything
on this connector section or bump it. Rough handling of the connector section can break the
PC card.
Removing PC Cards
This section explains the method for removing PC cards for each operating system.
Critical Point
When removing a PC card that has a cord, do not hold on the PC card cord. Doing so can
break the PC card.
When removing a PC card, use the following procedure. Failure to follow this procedure can
cause breakdown.
Some PC cards require that the power be switched off before they are removed. Check this
in the manual for the PC card.
26
Windows XP
CAUTION
HIGH TEMPERA TURE
A PC card can be quite hot immediately after it is used. When removing a PC card,
Injury
Do not stick your fingers in the PC card slot while removing a PC card. This can
after Step 3, wait a while before removing the card. Failure to do so can result in
burns.
cause injury.
1. Click the “Safe removal of hardware” icon on the taskbar.
Critical Point
Do not double-click the “Safe removal of hardware” icon on the taskbar, click “Stop” on the
“Safe removal of hardware” window displayed, then remove the PC card. Doing so can make
operation of the computer unstable.
2. Click “Safely remove XXXXX”.
The name of the PC card you are using is displayed at “XXXXX”.
3. Check that the “It is safe to remove this hardware” message is displayed.
4. Press the PC card eject button.
When you gently press the PC card eject button once, the button pops out slightly.
PC card eject button
5. Remove the PC card.
Remove the PC card by pressing the PC card eject button that has popped out slightly.
SECTION 2
PC card
PC card eject button
27
Windows 2000
CAUTION
HIGH TEMPERA TURE
A PC card can be quite hot immediately after it is used. When removing a PC card,
after Step 3, wait a while before removing the card. Failure to do so can result in
burns.
Injury
Do not stick your fingers in the PC card slot while removing a PC card. This can
cause injury.
1. Click the “Remove hardware” icon on the taskbar.
2. Click “Stop XXXXX”.
The name of the PC card you are using is displayed at “XXXXX”.
3. Click “OK”.
4. Remove the PC card.
Use the procedure in Steps 4-5 for Windows XP.
28
SECTION 2
4.Memory
Installing/Removing Memory
This section explains how to install/remove memory on this computer.
W ARNING
ELECTRIC SHOCK
Always switch off the power and disconnect the AC adaptor before installing/removing
memory.
Failure to do so can cause electrical shock.
CHOKING
The cover, cap, screws, etc. removed when installing/removing memory are small and
small children could choke on them. Be careful to keep such small parts somewhere
that small children can not reach.
If any such part were to be swallowed by a child, seek immediate medical assistance.
CAUTION
BREAKDOWN
When installing/removing memory, hold the memory by its edge so that you do not
touch any terminal or IC. Also, do not touch any parts or terminals within the computer.
Oils from your fingers can cause contact defects.
SECTION 2
BREAKDOWN
Memory is extremely vulnerable to static electricity and can even be destroyed by the
amount of static electricity that can build up on human body. Before handling memory,
touch your hands to something metal and discharge any static electricity.
BREAKDOWN
Always switch off the power before installing/removing memory. If you install/remove
memory with the computer on standby or hibernating, data can be lost and the computer
and memory can be damaged.
IMPORTANT
• When removing screws from this computer, use the No. 1 Phillips screwdriver that matches the
size of the screws (M2). Using a different size screwdriver can strip the head of the screw.
• Only install memory whose usage is supported by this computer.
29
Critical Point
When installing memory and checking the memory capacity, look at the “Memory Slot” item
in the BIOS setup “Information” menu. The capacity of the installed memory is displayed, for
example “128MB DDR SDRAM”. If the memory is installed correctly, but this computer does
not start up, the memory is broken or defective. Contact the “Contact point for inquiries
concerning Fujitsu personal products” or whoever you purchased the memory from.
Be careful not to drop any of the removed screws or other parts into the computer. This can
cause a breakdown.
To increase the memory, it is necessary to remove the memory already installed in the
computer and replace it.
Installing Memory
1. Switch off the power for the computer and disconnect the AC adaptor.
2. Remove the internal battery pack.
Steps 1-3 of “Replacing the Battery Pack”.
3. Remove the cover.
Remove the screw on the bottom of the computer, then remove the cover.
4. Install the memory.
Line up the notch on the memory with the projection on the connector, insert securely at an angle
from above, then flip down into place until the memory audibly clicks into place.
Standard slot (DDR1)
Expansion slot (DDR2)
30
5. Install the cover.
Install the screws removed in Step 3.
6. Install the internal battery pack.
Step 4 of “Replacing the Battery Pack”.
IMPORTANT
• If the memory is not installed correctly, when you switch on the power, the “Expansion memory
error” message may be displayed or nothing at all may be displayed on the screen. If that
happens, switch off the power and re-install the memory.
Removing Memory
1. Switch off the power for the computer and disconnect the AC adaptor.
2. Remove the internal battery pack.
Steps 1-3 of “Replacing the Battery Pack” .
3. Remove the cover.
Remove the screw on the bottom of the computer, then remove the cover.
SECTION 2
31
4. Remove the memory.
Open the hooks holding the memory on both sides, then take the memory out of its slot.
5. Install the cover.
Install the cover removed in Step 3.
6. Install the internal battery pack.
Step 4 of “Replacing the Battery Pack”.
32
SECTION 2
5.Mobile Multi-Bay
Cautions on Handling
The internal CD-ROM drive unit, internal CD-R/RW drive unit, internal DVD-ROM & CD-R/
RW drive unit, internal superdisk unit, and internal FDD drive unit (provisional) are extremely
delicate units that rotate the disk at high speed. When any of these disks is being accessed,
do not carry the computer around or subject it to mechanical shock or vibration. Doing so can
destroy the unit or lose data.
If the internal superdisk drive unit is handled in certain ways, the data on the disk may be lost.
Always back up critical data.
Avoid storing the computer and mobile multi-bay unit in extremely hot or cold locations and
locations subject to severe temperature changes.
Avoid storing the computer and mobile multi-bay unit in locations subject to direct sunlight
and near heaters.
Avoid storing the computer and mobile multi-bay unit in locations subject to mechanical shock
and vibration.
Avoid storing the computer and mobile multi-bay unit in humid and dusty locations.
Never use a multi-bay unit that liquid, metal object, or other foreign object has gotten into. If
any kind of foreign object gets into a mobile multi-bay unit, contact the “Contact point for
inquiries concerning Fujitsu personal products” or whoever you purchased the unit from.
Wipe off any soiling with a soft, dry cloth or with a soft cloth dipped in water or neutral
cleaning agent diluted with water. Never use benzene, paint thinner, or any volatile chemical.
Never disassemble or take apart a mobile multi-bay unit.
Avoid using or storing a mobile multi-bay unit near any magnets or equipment that generates
magnetic fields.
SECTION 2
33
Replacing a Mobile Multi-Bay Unit
This section explains how to replace the mobile multi-bay unit.
IMPORTANT
• Do not use this computer with the mobile multi-bay empty. Doing so can cause breakdown.
• Only lift up the mobile multi-bay removal lever when removing the mobile multi-bay unit. Raising
the lever unlocks the mobile multi-bay unit. If you lift the lever up by mistake, switch off the
power for the computer, remove the mobile multi-bay unit, then reinstall it.
Critical Point
When booting from a diskette in the internal floppy disk drive unit (provisional) or the internal
superdisk drive unit, change the BIOS setup.
• “Main” – “Floppy disk A”: Do not use.
• “Details” – “USB settings” – “Legacy USB support”: Use.
If the power is on, before removing the expansion internal battery unit, check that the remaining
capacity of the internal battery is adequate. If the remaining capacity of the internal battery
is not adequate, connect the AC adapter.
If the “Safe removal of hardware” or “Hardware removal” icon is displayed on the taskbar,
execute the procedure from Step 1; if the icon is not displayed, execute the procedure from
Step 4.
For Windows 2000, switch off the power for the computer before removing the internal super
drive unit.
1. Click the “Safe removal of hardware” or “Hardware removal” icon on the taskbar.
2. Click “Safely remove XXX” or “Stop XXX”.
3. For Windows 2000, click “OK”.
4. Remove the unit.
Raise the mobile multi-bay unit removal lever (1), then remove the mobile multi-bay unit (2).
Mobile multi-bay unit
removal lever
34
5. Install the new unit.
With its connector facing into the computer, push the unit firmly all the way into the bay.
Critical Point
Immediately after the mobile multi-bay unit has been replaced, the drive display may disappear
from the “My Computer” window. After a short while, it will reappear and the newly installed
unit can now be used.
SECTION 2
35
SECTION 2
6.About the Integrated Wireless Lan
(For selected model)
Before Using This Device
Thank you for purchasing a Fujitsu LifeBook with an Integrated Wireless LAN. This manual describes
the basic operating procedures for the Wireless LAN (referred to as the “device” in this manual) and
how to set up a wireless LAN network. Before using this device, read this manual carefully to ensure
correct operation of the device. Keep this manual in a safe place for reference while using the device.
Characteristics of the Device
This device consists of a wireless LAN card that is attached to the computer via a mini-PCI slot. The
main characteristics are as follows:
• It uses the power saving communications system in the 2.4 GHz band, and does not require any
license for radio communication.
• It uses Direct Sequence Spread Spectrum (DS-SS), which is resistant to noise.
• The Wireless LAN Mini-PCI module complies with Wi-Fi, and is able to communicate at the
maximum transfer rate of 11 Mbps.
• The maximum communication range is approximately 80 feet (25 meters) inside a building. The
range may be shorter depending upon the installation factors, such as walls and columns.
• Unauthorized access can be prevented with the use of SSID and encryption key.
Wireless Lan Modes
Using This Device
AdHoc Mode
The “AdHoc Mode” refers to the network connecting two computers using wireless LAN cards. This
connection is called an “AdHoc network.”
Using an AdHoc network, you can obtain a network connection easily and at a low cost.
In the AdHoc mode, you can use the function supported by Microsoft Network, such as File and Print
Sharing to exchange files and share a printer or other peripheral devices.
To use the AdHoc Mode, you must set the same SSID and the same encryption key for all the
computers that are connected. All connected computers can communicate.
Infrastructure Mode
If a number of computers are connected simultaneously in the AdHoc mode, the transfer rate may be
reduced, communications may become unstable, or the network connection could fail. This is because
all wireless LAN cards are using the same radio frequency in the network.
To improve this situation, you can use a wireless LAN access point, which is sold separately. The
wireless LAN network is in the “Infrastructure mode” when it uses an access point, and such a
connection is called the “Infrastructure Network.”
By using an access point, you can set and use a different communication channel for each network
group. Each channel is given a different radio frequency, and it eliminates the collision of
communications and provides a more stable communications environment.
Infrastructure mode is most suitable when you are configuring multiple wireless LAN networks on the
same floor. To connect a wireless LAN network to a wired LAN, you need an access point.
How to Handle This Device
The Integrated Wireless LAN device is already installed in your LifeBook computer. Under normal
circumstances, it should not be necessary for you to remove or re-install it. The LAN has been
configured to support the operating system with which your system shipped.
36
SECTION 2
Connecting Windows® 98/2000 Systems
This chapter describes how to set the wireless LAN connection for computers running Windows 98 or
Windows 2000.
Critical Point
When you receive your LifeBook, the integrated wireless LAN device and drivers have already
been installed. This procedure outlines the steps for setting the device parameters.
Workflow
The proper setup of the wireless LAN requires several steps which must be performed in the proper
order. Following is a general outline of the steps that must be performed. Each step is detailed later
in this procedure.
1. Setting parameters
• Setting the profile
• Setting the encryption
2. Network settings
• Setting the protocol and checking the network
• Setting file and printer sharing
• Checking the connection
Setting Parameters
1 Click [Start] → [Settings] → [Control Panel].
2 Double-click the [PRISM Settings] icon. The [PRISM Wireless Settings] appears.
3 Set the profile as specified in Table 1. Ask y our network administrators to chec k the setting.
4 When you finish your entry, click [Apply].
SECTION 2
Item
Profile
Mode
SSID
Transmit Rate
Power Save
Enabled
AdHoc
Channel
Table 1: Profile Parameters
5 Click the [Encryption] tab.
Description
Enter the system file name in which the parameter information is to be saved.
Ad Hoc Network
Infrastructure Network
Enter the network name to which you want to connect.
Obtain the information from your network administrator. If you do not have a
network administrator, select “Fully Automatic”.
Not supported.
AdHoc Network
If there is more than one wireless LAN nearby (such as on the same floor),
we recommend that the channels for each LAN be 5 numbers apart (e.g., if
there are two other LANs nearby, the channels used should be 1, 6, and 11).
Infrastructure Network
: Click the down arrow and select “802.11 AdHoc”.
: Click the down arrow and select “Infrastructure”.
: Select the same channel, 1-13, for all connected computers.
: Not an option.
37
6 Set the encryption items in accordance with Table 2.
•AdHoc Network: Specify the same value for all the computers for which the encryption key is
used for connection.
•Infrastructure Network: Specify the identical encryption keys to the encryption keys set for
the access point. For instructions on how to check the encryption keys set for the access
point, refer to the access point manual.
Critical Point
Make sure that you specify the encryption keys. If you do not specify the keys, any computer
with a wireless LAN card can be connected. This presents a risk that your data may be
stolen or destroyed.
Item
Encryption
(WEP)
Create Keys
with
Passphrase
Passphrase
Create Keys
Manually
(Hexadecimal
Input)
ASCII Input
Default Key
Description
Click the down arrow and select an encryption option.
•
Disable
: Disables the encryption. In this case, “Create keys with Passphrase”
and subsequent items are greyed out, and you cannot enter anything.
•
64 bit
: The encryption is set. Select either “Create keys with Passphrase”,
“Create keys manually”, or “ASCII Input”, and enter the encryption keys.
•
128 bit
: The encryption is set. Select either “Create keys with Passphrase”,
“Create keys manually”, or “ASCII Input”, and enter the encryption keys.
Not supported.
Not supported.
Select this to use hexadecimal character codes to set the encryption keys
(Keys 1 - 4).
Enter a 10-digit value when you have selected [64 bit] for the encryption. Enter
a 26-digit value when you have selected [128 bit] for the encryption.
Select to use the ASCII codes to set encryption keys (Keys 1 - 4). Select this if
network does not contain other wireless LAN cards that are set with encryption
key using character codes.
Enter a 5-digit value when you have selected [64 bit] for the encryption.
Enter a 13-digit value when you have selected [128 bit] for the encryption.
You can use the following characters: 0 - 9, A - Z, a - z, _ (underscore).
For example, to set “ABC12” for the encryption key, enter “ABC12.”
Click the down arrow, and select a key from Keys 1 - 4.
Table 2: Encryption Key Setup
38
7 When you finish your entry, click [Apply].
8 Click [OK]. [PRISM Wireless Settings] closes.
You have completed the parameter settings.
Critical Point
When you are using ADSL (PPPoE) with the infrastructure network to connect to the Internet,
you need to change the MTU size set for the computer. To change the MTU size, refer to the
manual that comes with the access point.
SECTION 2
39
SECTION 2
Network Connection: Windows 98
The section describes how to set the network connection if your computer running Windows 98.
Network Settings
In this section, you set “TCP/IP Settings,” and complete “Checking Computer Name and Workgroup”
required for the network connection.
TCP/IP Settings
1 Click [Start] → [Settings] → [Control Panel].
2 Double-click the [Network] icon. [Network] appears.
3 Perform the following steps.
•Click [TCP/IP].
•Click [Properties].
Critical Point
If you have more than one [TCP/IP...] entry, select [TCP/IP Æ Intersil PRISM Wireless LAN
PCI Card]. [TCP/IP Properties] appears.
4 Set an IP address. (When y ou are done, ask your netw ork administrator to check the setting).
•AdHoc Network: Select [IP address], and enter a value for [IP address] and [Subnet Mask].
•Infrastructure Network: Select [Obtain an IP address automatically].
5 Click [OK]. [Network] appears again.
In the next step, you will check the computer name and workgroup.
Checking the Computer Name and Workgroup
1 Click the [Identification] tab on the [Network] window.
Critical Point
If this tab is not found on the [Network] window, click [Start] Æ [Settings] Æ [Control Panel],
and double-click the [Network] icon.
2 Check the entry for [Computer name] and [Workgroup]. Ask your network administrator
and check the setting, if you have a network administrator.
40
Item
Computer
Name
Workgroup
Computer
Description
Description
A name to identify the computer on the network. You can specify any name for
any computer. Use up to 15 single-byte characters. For easiest identification,
use the model name or user name.
The name of the network group. Use up to 15 single-byte characters.
•
AdHoc Network
network.
•
Infrastructure Network
Additional description for the computer. This is not necessary.
: Specify the same name to all computers within the same
: Specify a workgroup name to connect to.
Table 3: Computer Name and Workgroup
Critical Point
Including a period or other special characters may prevent you from connecting to the network.
3 Click [OK]. When a message appears prompting you to restart the computer, click [Yes].
Sharing
In this section, you set sharing of the drive, folder, and printer.
You need to set this only when you are sharing files or a printer with other computers on the
network.
When you share a drive, folder, or printer, you can use these from any computer on the network.
Setting File and Printer Sharing for Networks
1 Click [Start] → [Settings] → [Control Panel].
2 Double-click the [Network] icon. The [Network] window appears.
3 Click [File and Print Sharing...]. [File and Print Sharing] appears.
4 Click and check one or both of the options.
5 Click [OK]. [File and Printer Sharing for Microsoft Netw orks] is added under [The following
network].
SECTION 2
41
Sharing Files
The following example shows how to set sharing the “Work” folder on the c drive.
1 Double-click [My Computer] → [C: drive] on the desktop.
2 Right-click the “Work” folder, then click [Sharing] from the menu that appears. The [Work
Properties] window appears.
3 Click [Sharing], and select items, as specified in Table 4.
Item
Share Name
Access Type
Passwords
Table 4: Password Setup
4 Click [OK]. The folder is set for sharing, and the “Work” folder icon changes.
Printer Sharing
1 Click [Start] → [Settings] → [Printers]. [Printers] appears, showing the printers that are
connected.
2 Right click the printer that y ou want to share, and then click [Sharing] fr om the men u that
appears.
3 Click [Sharing], and select necessary items.
Description
Specify a share name for the drive or folder that you want to share.
Limits the read/write permission for the drive to be shared.
• Read-Only Password: Specifies read-only for the drive to be shared.
• Full Access Password: Allows read and write for the drive to be shared.
• Depends On Password: Identifies either Read-Only or Full, depending upon
the password.
A password used for [Access Type].
• Read-Only Password: Specify a password to allow read.
• Full Access Password: Specify a password to allow read and write.
42
Item
Not Shared
Shared as
Share Name
Comment
Passwords
Table 5: Printer Sharing
4 Click [OK]. The folder is set for sharing, and the “Work” folder icon changes.
Checking the Connection
After the network setting is completed, access the shared drive on another computer to check
the connectivity of the wireless LAN network.
Accessing Another Computer
1 Double-click the [Netw ork Neighborhood] on the desktop. The computers that are connected
to the network are displayed.
2 Double-clic k the computer that you want to access. The drive that you set with “Sharing”
is displayed. The drive is not displayed unless it is set for sharing, even if it exists.
3 Double-clic k the drive that you want to access. The drive is display ed showing its contents
and made available to y ou. If you have a question or prob lem, refer to “Troubleshooting”.
Description
Disables printer sharing.
Enables printer sharing.
Specifies a share name for the printer to be shared.
Enter a description of the printer to be shared.
Specify passwords. If you specify a password, you need to enter it when
using the printer.
SECTION 2
Checking the Connectivity
1 Click [Start] → [Settings] → [Control Panel].
2 Double-click the [PRISM Settings] icon. [PRISM Wireless Settings] appears.
3 Check the connectivity on the [Link] tab. The current condition of connection is displa yed.
43
Item
State
Current
Channel
Current Tx
Rate
[Radio Off]/
[Radio On]
Rescan
Throughput
(Bytes/sec)
Link Quality
Signal
Strength
Table 6: Connectivity Condition
Description
Shows the current condition of connection.
The MAC address of the other computer that you are connected to is
displayed, when the connection is successfully made. If you are connected
to more than one computer, the computer that has the best connectivity is
displayed.
Shows the current channel used for the connection.
Shows the current transfer rate in Mbits/sec.
Click [Radio Off] to disconnect. Click [Radio On] to connect to network.
Click to search for others to connect to.
Shows the actual transfer rate of the transfer data for send (Tx) and receive
(Rx).
Shows [Excellent], [Good], [Fair], [Poor], or [Not Connected], depending on
the link quality. This is not shown for the AdHoc connection.
Shows [Excellent], [Good], [Fair], [Poor], or [Not Connected], depending on
the signal strength. This is not shown for the AdHoc connection.
Network Connection: Windows 2000
The section describes how to set the network connection for a computer with Windows 2000.
Network Settings
In this section, you set “TCP/IP Settings,” and complete
2 Double-click the [Network and Dial-up Connections] icon. The [Network and Dial-up
Connections] window appears.
3 Right click the [Local Area Connection], then click [Pr operties] from the menu that appears.
The [Local Area Connection Properties] window appears.
Critical Point
More than one network adapter is installed in your system if more than one [Local Area
Connection] entry is displayed. In this case, select the [Local Area Connection] entry with
[Intersil PRISM Wireless LAN PCI Card] displayed under [Device Name].
4 Perform the following steps.
•Click [Internet Protocol (TCP/IP)].
•Click [Properties]. The [Internet Protocol (TCP/IP) Properties] window appears.
44
5 Set an IP address as indicated in Table 7. Ask your network administrator to check the
setting.
Item
For AdHoc
Network
For
Infrastructure
Network
Description
Set the IP address and subnet mask:
Click [Use the following IP address], and enter a value for [IP address] and
[Subnet mask].
Select [Obtain an IP address automatically]:
For the DNS server, select [Obtain DNS server address automatically].
For the IP address, DNS server, and default gateway, follow the network
administrator’s instructions, if any.
Table 7: Setting an IP Address
6 Click [OK]. The [Local Area Connection Properties] window appears again.
7 Click [OK]. When a message appears prompting you to restart the computer, click [Yes].
Checking the full computer name and workgroup
1 Click [Start] → [Settings] → [Control Panel].
4 Check [Full computer name] and [W orkgroup]. Ask your netw ork administrator and check
the setting.
Item
Full
Computer
Name
Workgroup
Table 8: Checking computer name and workgroup
5 Click [OK]. When a message appears prompting you to restart the computer, click [Yes].
Description
A name to identify the computer on the network. You can specify any name to
each computer.
For easier identification, use the model name or user name.
A name for the network group:
•
AdHoc Network
network.
•
Infrastructure Network
To change the setting, click [Properties], and follow the instructions on the
screen. [System Properties] appears again.
: Specify the same name to all computers within the same
: Specify a workgroup name to connect to.
SECTION 2
45
Sharing
In this section, you set sharing of the drive, folder, and printer.
You only need to set this when you are sharing files or a printer with other computers on the network.
When you share a drive, folder, or printer, you can use them from any computer on the network.
Setting [File and Printer Sharing for Microsoft Networks]
1 Click [Start] → [Settings] → [Control Panel].
2 Double-click the [Network and Dial-up Connections] icon. The [Network and Dial-up
Connections] windows appears.
3 Right click the [Local Area Connection], then clic k [Properties] from the menu that appears.
[Local Area Connection Properties] appears.
Critical Point
More than one network adapter is installed in your system if more than one [Local Area
Connection] entry.
4 If [File and Printer Sharing for Microsoft Networks] is displayed in the list, make sure that
it is checked. If it is not checked, check it and click [OK]. You do not have to perform the
following steps. Go to the next section, entitled “Sharing Files.”
If [File and Printer Sharing for Microsoft Networks] is not found in the list, clic k [Install],
and perform Step 5 and subsequent steps. When you click [Install], the [Select Network
Component Type] window appears.
5 Perform the following steps.
•Click [Service].
•Click [Add]. The [Select Network Service] window appears.
6 Perform the following steps.
•Click [File and Printer Sharing for Microsoft Networks].
•Click [OK]. You will go back to [Local Area Connection Properties], and [File and Printer
Sharing for Microsoft Networks] is added to the list.
7 Click [OK].
Critical Point
If you have changed the setting, [Close] is shown instead. Click [Close].
46
Sharing Files
The following example shows how to set sharing the “ Work” folder on the c: drive.
1 On the desktop, double-click [My Computer] → C: drive.
2 Right-click the “ Work” folder, then click [Sharing] from the menu. The [Work Properties]
window appears.
3 Click [Share this folder] and set necessary items, as indicated in the following table.
Item
Share Name
Comment
User limit
Table 9: Sharing Files
4 Click [OK]. The folder is set shared, and the “ Work” folder icon changes.
Printer Sharing
1 Click [Start] → [Settings] → [Printers]. The Printer s window appears, showing the printers
that are connected.
2 Right click the printer that you want to share, then c lick [Sharing] from the menu that
appears.
3 Click [Sharing], and select necessary items.
Item
Not Shared
Shared As
Share Name
Comment
Passwords
Table 10: Printer Sharing
Description
You can specify a share name for the drive or folder that you want to share.
You can enter the description for the drive or folder that you want to share.
Specifies the limit for the number of sharing users.
Description
Disables printer sharing.
Enables printer sharing.
Specifies a share name of the printer to be shared.
Enter the description of the printer to be shared.
If you specify a password, you need to enter it when using the printer.
SECTION 2
4 Click [OK]. The printer sharing is set, and the icon changes.
47
Checking the Connection
After the network setting is completed, access the shared drive on another computer to check the
connectivity of the wireless LAN network.
Accessing Another Computer
1 Double-clic k the [My Network Places] icon on the desktop. [My Netw ork Places] appears.
2 Double-clic k [Computers near me]. The computers that are connected to the network are
displayed.
3 Double-clic k the computer that y ou want to access. The drive that you set with “Sharing”
are displayed.
4 Double-clic k the drive that you want to access. The drive is displayed sho wing its contents
and made available to you.
Checking the Connectivity
1 Click [Start] → [Settings] → [Control Panel].
2 Double-click the [PRISM Settings] icon.
3 Check the connectivity on the [Link] tab. The current condition of connection is displa yed.
Item
State
Current
Channel
Current Tx
Rate
[Radio Off]/
[Radio On]
[Rescan]
button
Throughput
(Bytes/sec)
Link Quality
Signal
Strength
Table 11: Checking the Connectivity
Description
Shows the current condition of connection.
The MAC address of the other computer to which you are connected is
displayed when the connection is successful. If you are connected to more
than one computer, the computer that has the best connectivity is displayed.
Shows the current channel used for the connection.
Shows the current transfer rate in Mbits/sec.
Click [Radio Off] to disconnect.
Click [Radio On] to connect to the network.
Click this button to search for others to connect to.
Shows the actual transfer rate of the data transfer for send (Tx) and receive
(Rx).
Shows either [Excellent], [Good], [Fair], [Poor], or [Not Connected],
depending on the link quality.
Not shown for AdHoc connection.
Shows either [Excellent], [Good], [Fair], [Poor], or [Not Connected],
depending on the signal strength.
Not shown for AdHoc connection.
48
SECTION 2
Connecting Windows XP Systems
This chapter describes how to set up the wireless LAN connection for computers that are
running Windows XP.
Critical Point
When you receive your LifeBook, the integrated wireless LAN device and drivers have already
been installed. This procedure outlines the steps for setting the device parameters.
Workflow
The proper setup of the wireless LAN connection requires that several steps be performed in the
proper order. Following is a general outline of the steps to be performed. Each step is detailed later
in this procedure.
1 Setting parameters
•Setting the profile
•Setting the encryption
2 Network settings
•Setting the protocol and checking the network
•Setting file and printer sharing
•Checking the connection
SECTION 2
Setting Parameters
1 Click [Start] → [Control Panel].
2 Click [Network and Internet connection].
3 Click [Network connection]. A list of networks that are currently installed is displayed.
4 Right clic k [Intersil PRISM Wireless LAN PCI Card] in the list, and c lick [Properties] from
the menu that is displayed. [Wireless Network Connection 2 Properties] appears.
5 Click the [Wireless Networks] tab. The [Wireless Networks] tab appears.
6 Perform the following steps.
•Make sure that [Use Windows to configure my wireless network settings] is checked.
•Click [Add] under [Preferred networks]. [Wireless Network Properties] appears.
7 Set parameters.
•For the AdHoc network, specify the same value to all the computers, for which the encryption
key is used for connection.
•For the infrastructure network, specify the encryption key (network key) with the same value
to the encryption key of the access point. For how to check the encryption keys set for the
access point, refer to the manual supplied with the access point.
49
Critical Point
Be sure to specify the encryption keys. If you do not specify the keys, any computer with a
wireless LAN card can be connected. This presents a risk that other users may steal or
destroy your data.
Item
Network Name
SSID
Key Format
Table 12: Setting parameters
8 When you finish your entry , click [OK]. [Wireless Network Connection 2 Properties] appears
again.
9 Make sure the network name you specified for the......
Description
Enter the network name to which you want to connect. This is a required item.
For the network name, ask your LAN administrator.
AdHoc network
connected.
Infrastructure network: Specify the same name as that specified on the
access
point that is to be connected. For access point instructions, refer to the
manual that comes with the access point.
Click the down arrow and select the input for the Network key.
ASCII characters
Select this when using ASCII characters for the Network Key. Characters
that can be used follow: 0-9, A-Z, a-z, and _ (underscore)
the key to “ABC12” , input “ABC12” .
Hexa-decimal characters
Select this when using hexadecimal characters for the Network Key.
Use this if there is a wireless LAN card in the network that has the Network
Key set to a character code. In ‘Network Key’, input the same value as the
other wireless LAN card.
: Set the same name for all of the computers that are to be
Example
: To set
Network Connection
The section describes how to set the network connection for a computer running Windows XP.
Network Settings
In this section, you set “ TCP/IP Settings,” and complete “Checking Computer Name and Workgroup”
required for the network connection.
TCP/IP Settings
1 On [Wireless Network Connection Properties], click [General].
50
Critical Point
If [Wireless Network Connection 2 Properties] is not displayed, click [Start] Æ [Settings] Æ
[Control Panel], and double-click the [Network Connection] icon.
Right click the [Wireless Network Connection], and then click [Properties] from the menu
that appears.
3 Set an IP address. Ask your network administrator and check the setting.
Item
AdHoc
Network
For
Infrastructure
Network
Table 13: Setting an IP address
5 Click [OK].
Description
Set the IP address and subnet mask. Click [Use the following IP address].
Enter a value for [IP address] and [Subnet mask].
Select [Obtain an IP address automatically]. For the DNS server, select
[Obtain DNS server address automatically]. For the IP address, DNS server,
and default gateway, follow the network administrator’s instructions, if any.
Critical Point
If you have changed the setting, [Close] is shown...
Checking the Full Computer Name and Workgroup
1 Click [Start] → [Control Panel]. Make sure the Classic View is selected.
2 Double-click the [System] icon. [System Properties] appears.
3 Click the [Computer Name] tab.
4 Check [Full computer name] and [W orkgroup]. Ask your netw ork administrator and check
the setting.
SECTION 2
51
Item
Computer
Name
Workgroup
Table 14: Setting computer name and workgroup
To change the setting, click [Change], and follow the instructions on the screen. [System Properties]
appears again.
5 Click [OK]. When a message appears prompting you to restart the computer, click [Yes].
Description
A name to identify the computer on the network. You can specify any name to
each computer. Use up to 15 single-byte characters. For easier identification,
use the model name or user name.
A name of the network group. Use up to 15 single-byte characters.
AdHoc Network
network.
Infrastructure Network
: Specify the same name to all computers within the same
: Specify workgroup name to connect to.
Sharing
In this section, you set sharing of the drive, folder, and printer.
You need to set this only when you are sharing files or a printer with other computers on the network.
When you share a drive, folder, or printer, you can use these from any computer on the network.
Setting [File and Printer Sharing for Microsoft Networks]
1 Click [Start] → [Control Panel]. Make sure the Classic View is selected.
2 Double-click the [Network Connection] icon. Make sure that it is checked. If it is not
checked, check it, and click [OK]. You do not have to perform the following steps. Go to
the next section, “Sharing Files.”
If [File and Printer Sharing for Microsoft Networks] is not found in the list, clic k [Install],
and perform Step 5 and the subsequent steps. When you click [Install], [Select Network
Component Type] appears.
5 Perform the following steps.
•Click [Service].
•Click [Add]. [Select Network Service] appears.
6 Perform the following steps.
•Click [File and Printer Sharing for Microsoft Networks].
•Click [OK]. You will go back to [Wireless Network Connection 2 Properties], and [File and
Printer Sharing for Microsoft Networks] is added to the list.
7 Click [Close].
52
Sharing Files
The following example shows how to set sharing the “ Work” folder on the c: drive.
1 Click [Start] → [My Computer].
2 Double-click the [Local Disk (c:)] icon.
3 Right click the “ Work” folder, and then click [Sharing and Security] from the menu that
appears. [Work Properties] appears.
4 Click [If you understand the security risks but want to share files without running the
wizard, click here].
Critical Point
If you have already clicked [If you understand the security risks but want to share files without
running the wizard, click here], this window does not appear.
In the [Work Properties] window, the description under [Network Sharing and security] changes.
5 Check [Share this folder on the network].
Uncheck [Allow network users to change my files], if the shared folder is for read only.
6 Click [OK]. The folder is set shared, and the “Work” folder icon changes.
Printer Sharing
2 Right-click the printer to be shared, and clic k [Sharing] from the menu that appears. The
properties of the printer to be shared will be displayed. Set printer sharing.
On the display , the printer sharing setting is recommended by the Netw ork Setup Wizard,
but for the wireless LAN network, security is maintained by network name (SSID) or netw ork
key. The following steps allow you to set up printer sharing without using the Network
Setup Wizard.
SECTION 2
3 Click OK. If y ou understand the security risks but want to share printers without running
the wizard, click here. ‘Enable Printer Sharing’ will be displayed.
4 Select ‘Just enable printer sharing’.
5 Click ‘OK’. The printer properties will be indicated.
6 Select ‘Share this printer’.
7 Enter the sharing printer name in ‘Share name’.
8 Click OK. The printer will be shared, and the printer icon will become a sharing icon.
53
Checking the Connection
After the network setting is completed, access the shared drive on another computer to check the
connectivity of the wireless LAN network.
Accessing Another Computer
1 Click [Start] → [My Computer].
2 From the left menu in [Other Places], click [My Network Places].
3 From the left menu in [Netw ork Tasks], click [View workgroup computer s]. The workgroup
in which you are participating will appear.
4 Double click the computer to which you want to connect. The drive that you set in
[Computer Sharing] appears.
5 Double clic k the drive to which you want to connect. The contents of the drive will appear ,
and is available for use.
Checking the Connectivity
1 Click [Start] → [Control Panel].
2 Double-click the [PRISM Settings] icon. [PRISM Wireless Setting] appears.
3 Check the connectivity on the [Link] tab. The current condition of connection is displa yed
Item
State
Current
Channel
Current Tx
Rate
Radio Off/
Radio On
Rescan
Throughput
(Bytes/sec)
Link Quality
Signal Strength
Table 15: Checking connectivity
Description
Shows the current condition of connection.
The MAC address of the other computer that you are connected to is
displayed, when the connection is successfully made. If you are connected to
more than one computer, the computer that has the best connectivity is
displayed.
Shows the current channel used for the connection.
Shows the current transfer rate in Mbits/sec.
Click [Radio OFF] to disconnect.
Click [Radio On] to connect to the network.
Click this button to search for others to connect to.
Shows the actual transfer rate of the transfer data for send (Tx) and receive
(Rx).
Shows the link quality. This is not shown for the AdHoc connection.
Shows the signal strength. This is not shown for the AdHoc connection.
54
SECTION 2
Troubleshooting
This chapter contains troubleshooting information, including causes and actions, for problems you
may find while using this device.
T roubleshooting T able
Problem
An exclamation mark (!)
or cross (x) is attached
to [Intersil PRISM
Wireless LAN PCI
Card].
Other computers are
not displayed when the
[Network Computer]
icon is double-clicked.
Possible Cause
A failure to recognize the
device.
A failure in installing the
driver.
You did not enter the
password when
Windows 98 started. You
clicked [Cancel] or [ESC]
when User Name/
Password window was
shown.
The network has not
been set up correctly.
It takes time before the
network is searched and
the computer connected
is displayed.
A failure in installing the
driver.
The TCP/IP protocol is
not installed, or, the IP
address is not set
correctly.
Possible Solution
Restart the computer.
Restart the computer.
Make sure that you enter user name and
password and click [OK] when starting
Windows 98. If you forget your password,
enter another user name. A new user
name and password is registered in the
computer.
Check the setting for the protocol,
workgroup, and sharing.
To check this, you need a different
procedure, depending upon the operating
system that you use. Refer to the
appropriate section of this manual.
Perform the following steps to search for
the computer.
• Click [Start] → [Search] → [Other
Computers].
• Enter the computer name that you are
connecting to in [Name], and click
[Search].
• Double-click the icon of the computer
that has been searched.
Make sure that the driver is correctly
installed.
Make sure that the TCP/IP protocol is
installed. To check this, you need a
different procedure, depending on the
operating system that you use. Refer to
the appropriate section of this manual.
SECTION 2
55
Problem
Other computers
are not displayed when
the [Network Computer]
icon is double-clicked.
Possible Cause
The TCP/IP protocol is
not installed, or, the IP
address is not set
correctly.
No communication due to
poor radio signal.
Possible Solution
If the TCP/IP protocol is installed, do the
following to check the IP address:
(If your hard disk is C drive, enter
C:\>ipconfig)
Check that the IP address is correctly
displayed under the IP Address.
Example: IP address: 10.0.1.3
Subnet Mask: 255.255.255.0
Default Gateway: 10.0.1.1
Shorten the distance between computers
or remove visible obstacles between
them, and retry the connection.
56
Problem
IP packet isn’t reaching
its destination
Possible Cause
Run the PING command
to check the connection
Possible Solution
Perform the following steps to run the PING
command to check if the IP packet is correctly
delivered to the destination.
To run the PING command, the TCP/IP
protocol must be installed. First you will
determine your IP address, then you will make
sure your IP address can respond, and then
you will make sure other computers can be
addressed.
location at which you want to find the IP
address.
3. Click [Enter], then go to the location you
specified above. The IP address for your
system will be contained in the file.
4. To check that your IP address is functioning
properly, go back to the DOS prompt and
type: ping
You will receive several replies, followed by
the PING statistics (similar to below).
5. To check that your system is
communicating with other systems, go to
the DOS prompt and type: \>ping
XXX.XXX.XXX.XXX. (With the destination
IP address in place of
XXX.XXX.XXX.XXX).
Example: if the destination IP address is
10.0.1.3: C:\>ping 10.0.1.3
A message similar to the following appears if
the connection is successful.
Pinging 10.0.1.3 with 32 bytes of data:
Reply from 10.0.1.3: bytes=32 time=1ms
TTL=32
Reply from 10.0.1.3: bytes=32 time<10ms
TTL=32
Reply from 10.0.1.3: bytes=32 time=4ms
TTL=32
Reply from 10.0.1.3: bytes=32 time<10ms
TTL=32
If the connection fails, [Request timed out],
[Destination host unreachable], or a similar
message appears. In this case, refer to the
“ Other computers are not displayed” portion
of this chapter.
directory\filename
and
filename
<IP address>
represent the
, then press [Enter].
where
SECTION 2
57
Problem
Cannot connect to
the network
I want to remove
the driver.
(Windows 98)
Possible Cause
There are several
possible causes,
as listed to the right.
Refer to the specific
section of this manual or
your user’s manual.
Possible Solution
The following causes are possible. Check
each one of them.
• The network name or encryption key is
not right.
• The driver has not correctly started.
• The destination computer is not turned
on.
• You do not have the access privilege to
the destination computer.
• The card has failed.
• Hardware conflict.
Windows 98:
When removing the driver, make sure that
the device is attached to the computer. If
you try to remove the driver while the
device is detached from the computer, the
driver is not removed.
1. Right click the [My Computer] icon on the
desktop, and then click [Properties] from
the menu that appears.
[System Properties] appears.
11.Double-click [PRISM 11Mbps Wireless LAN
for Windows]. A window appears asking you
if you really want to remove the driver.
12.Click [Yes]. When the driver is removed, a
window appears showing that the driver has
been removed.
13.Click [OK].
14.Close [Add/Remove Programs Properties]
and [Control Panel].
15.Shut down Windows, and turn off the
computer.
58
Problem
I want to remove the
driver
(Windows 2000)
Possible Cause
Possible Solution
Windows 2000:
When removing the driver, make sure that
the device is attached to the computer. If
you try to remove the driver while the
device is detached from the computer, the
driver is not removed.
1. Right click the [My Computer] icon on
the desktop, and then click [Properties]
from the menu that appears.
[System Properties] appears.
2. Click the [Hardware] tab.
3. Click [Device Manager...]. The [Device
Manager] window appears.
4. Click [+] beside [Network adapters].
5. Right click [Intersil PRISM Wireless
LAN PCI Card], and click [Uninstall]
from the menu that is displayed.
[Confirm Device Removal] appears.
6. Click [OK].
7. Close [System Properties].
8. Make sure that the icon has
disappeared from the task tray in the
lower right corner of the screen.
9. Click [Start] → [Settings] → [Control
Panel].
10. Double-click [Add/Remove Programs].
[Add/Remove Programs] appears.
11. Perform the following steps.
• Click [PRISM 11Mbps Wireless
LAN for Windows].
• Click [Change/Remove].
A window appears asking you if you really
want to remove the driver.
12. Click [Yes].
When the driver is removed, a window
appears showing that the driver has been
removed.
13. Click [OK].
14. Close [Add/Remove Programs] and
[Control Panel].
15. Shut down Windows, and turn off the
computer.
SECTION 2
59
Problem
I want to remove the
driver
(Windows XP)
Possible Cause
Possible Solution
Windows XP:
When removing the driver, make sure that
the device is attached to the computer. If
you try to remove the driver while the
device is detached from the computer, the
driver is not removed.
1. Click [Start], right click [My Computer],
and then click [Properties] from the
menu that appears. [System
Properties] appears.
2. Click the [Hardware] tab.
3. Click [Device Manager].
4. Click [+] beside [Network adapters].
5. Right click [Intersil PRISM Wireless
LAN PCI Card], and click [Uninstall]
from the menu that is displayed.
[Confirm Device Removal] appears.
6. Click [OK].
7. Close [System Properties].
8. Make sure that the icon has
disappeared from the task tray in the
lower right corner of the screen.
•[Realtek RTL8139(A/B/C/8130)PCI Fast Ethernet NIC]
•or others.
The LAN Card Properties window appears.
4 Check [Set disable with this hardware profile], and click [OK]. An [x] mark is added to the
LAN card icon.
5 Click [OK].
SECTION 2
6 Restart the system.
61
SECTION 2
About IP Addresses
SETTING IP ADDRESSES
If you are not sure how to set the IP address, refer to the following procedure.
If you have an access point (DHCP server) on the network, set the IP address as follows:
Windows 98: [Obtain an IP address automatically]
Windows 2000: [Obtain an IP address automatically]
Windows XP: [Obtain an IP address automatically]
Critical Point
A DHCP server is a server that automatically assigns IP addresses to computers or other
devices in the network.
There is no DHCP server for the AdHoc network.
If the IP address is already assigned to the computer in the network, ask the network administrator
to check the IP address to be set for the computer.
If no access point is found in the network:
An IP address is expressed with four values in the range between 1 and 255.
Set the each computer as follows: The value in parentheses is a subnet mask.
<Example>
Computer A: 192.168.100.2 (255.255.255.0)
Computer B: 192.168.100.3 (255.255.255.0)
Computer C: 192.168.100.4 (255.255.255.0)
:
:
Computer X: 192.168.100.254 (255.255.255.0)
62
SECTION 2
Specifications
Technical Specifications for Integrated Wireless Lan Device
ItemDescription
Network TypeIEEE 802.11b
Transfer Rate11/5.5/2/1Mbps (auto change)
Frequency Range2,400 - 2,483 MHz
ChannelsOne of 13 channels is used
Card TypeNon-intelligent
VCCClass B
SecurityNetwork name, encryption key
Supported Operating SystemsWindows 98, Windows 2000, Windows XP
Power CurrentMax: 350mA
Maximum number of units recommended10 or less
for wireless LAN (AdHoc network)
SECTION 2
63
SECTION 2
Glossary
Glossary of Terms Used in This Document
AdHoc
A name of a wireless LAN configuration.
It is a type of communication using wireless cards only.
Another type of communication is called Infrastructure (using a wireless card and an access point).
ADSL
Asymmetric Digital Subscriber Line Technology for transporting high bit-rate services over ordinary
phone lines.
Channel
A radio frequency band used for communication between wireless cards and access points.
DHCP
Dynamic Host Configuration Protocol A protocol used to automatically acquire parameters required
for the communication, such as IP address.
The sender of IP address is called a DHCP server, and the receiver is called a DHCP client.
DNS
Domain Name System
A function to control the association between the IP address and the name assigned to the computer.
If you do not know the IP address but if you know the computer name, you can still communicate to
that computer.
Encryption Key (Network Key)
Key information used to encode data for data transfer.
This device uses the same encryption key to encode and decode the data, and the identical encryption
key is required between the sender and receiver.
IEEE 802.11b
The U.S. IEEE (Institute of Electrical and Electronic Engineers) promotes standardization of LAN,
and its standards committee (IEEE 802.11) has promoted 1-Mbps and 2-Mbps wireless LAN. Currently,
another standards committee (IEEE 802.11b) is working for standardization of the faster 11-Mbps
wireless Lan.
Infrastructure
A name of a wireless LAN configuration. This type of communication uses an access point.
Another type of communication is called AdHoc.
IP Address
An address used for computers to communicate in the TCP/IP environment.
Current IPv4 (version 4) uses four values in the range between 1 and 255. (Example:
192.168.100.123).
There are two types of IP address: global address and private address.
The global address is an only address in the world.
A private address is an only address in theclosed network.
64
LAN
Local Area Network
A connection of computers within a relatively limited area, such as the same floor, or the same
building.
MAC Address
Media Access Control Address
A unique physical address of a network card.
For Ethernet, the first three bytes are used as the vendor code, controlled and assigned by IEEE. The
remaining three bytes are controlled by each vendor (preventing overlap), therefore, every Ethernet
card is given a unique physical address in the world, being assigned with a different address from
other cards. For Ethernet, frames are sent and received based on this address.
MTU
Maximum Transmission Unit
The maximum data size that can be transferred at a time through the Internet or other networks.
You can set a smaller MTU size to obtain successful communication, if you have difficulty transferring
data due to the fact that the maximum size is too large.
PPPoE
Point to Point Protocol over Ethernet
A protocol for Ethernet, using a Point-to-Point Protocol (PPP), which is used for connection on the
phone line.
Protocol
Procedures and rules use to send and receive data between computers.
- Method of sending and receiving data
- Process used to handle communication errors
Conditions required for communication are organized in procedures for correct transfer of information.
SECTION 2
SSID
Service Set Identifier
Specifies which network you are joining. Some systems allow you to specify any SSID as an option
so you can join any network.
TCP/IP
Transmission Control Protocol/Internet Protocol
A standard Internet protocol that is most widely used.
Wi-Fi Compatible
Wi-Fi (Wireless Fidelity) Identifies that the product has passed the interoperability test, supplied by
the WECA (Wireless Ethernet Compatibility Alliance), which guarantees the interoperability of wireless
IEEE 802.11 LAN products. For more information on the Wi-Fi standard, go to the WECA website at:
www.wirelessethernet.com.
65
SECTION 2
7.Numeric K eypad
Connection
1. Either switch Off the power for the computer or put it on standby.
2. Connect the external numeric keypad.
Connect the external numeric keypad to the expansion keyboard/mouse connector on the rear of
the computer. Face the connector with the stamped arrow upward.
Critical Point
The expansion numeric keypad can only be used when the computer is in numeric lock
mode.
You can connect a mouse to the mouse connector on the numeric keypad.
Mouse connector
Adjust the angle of the numeric keypad with the tilt foot on the bottom of the numeric keypad.
66
SECTION 2
8.Printers
Critical Point
If the printer supports USB connection, you can also use the USB connector.
Connection
W ARNING
ELECTRIC SHOCK
Always switch off the power and disconnect the AC adaptor before connecting/disconnecting a printer.
Failure to do so can cause electrical shock.
CAUTION
BREAKDOWN
Read this manual carefully concerning cable connection so that you connect the cable
correctly. Using this computer with an incorrectly connected cable can cause breakdown
of this computer and of the printer.
1. Either switch Off the power for the computer or put it on standby.
SECTION 2
2. Connect the printer cable to the parallel connector on the rear of the computer.
Viewed from directly in front of it, the connector is trapezoidal. Line up the connectors with each
other, then insert securely (1), and tighten the screws at the left and right of the printer cable (2).
2
3. Connect the printer cable and power cable to the printer.
For details on the connection method, see the printer’s manual.
The power cable may be connected to the printer.
4. Plug the printer power cable plug into a socket and switch on the power for the printer.
5. Connect the AC adaptor to the computer and switch on its power.
1
2
67
6. When connecting a printer for the first time, install the driver.
For details on installing the printer driver, see the printer’s manual.
Critical Point
Connecting a printer requires a printer cable. Some printers come without a printer cable.
Also, some printers come with a cable that is the wrong configuration for connecting to this
computer. If this is the case, separately purchase a printer cable that can connect your
printer and this computer.
The method for connecting the printer depends on the printer. For details, see the printer’s
manual.
68
SECTION 2
9.External Displays
Connections
It is possible to connect a projector, CRT display, or other external display to this computer.
This section explains how to connect a CRT display to the external display connector on the rear of
the computer.
W ARNING
ELECTRIC SHOCK
When connecting/disconnecting an external display, always switch off the power for
the computer and disconnect the AC adaptor. Failure to do so can cause electrical
shock.
CAUTION
BREAKDOWN
Read this manual carefully concerning cable connection so that you connect the cable
correctly. Using this computer with an incorrectly connected cable can cause breakdown
of this computer and of the external display.
1. Switch off the power for the computer, then disconnect the AC adaptor.
SECTION 2
2. Connect the display cable to the external display connector on the rear of the computer.
Viewed from directly in front of it, the connector is trapezoidal. Line up the connectors with each
other, then insert securely (1), then tighten the screws at the left and right of the display cable (2).
2
3. Connect the display cable to the CRT display.
For details on the connection method, see the external display’s manual.
4. Connect the CRT display’s power cable, then switch on the CRT display’s power.
1
2
69
5. Connect the AC adaptor to the computer and switch on its power.
Critical Point
When you switch on the power for the computer after connecting the external display, the
following may occur.
• The computer’s LCD display and the external display may be displayed on at the same
time.
• The “Add new hardware wizard” may be displayed. In this case, install the driver for the
external display according to the instructions on the screen.
Separate the external display from the floppy disk drive and other units that generate magnetic
fields.
6. Switch the screen display.
Pressing the “Fn” + “F10” keys at the same time switches the display LCD display → CRT → Both
→ LCD display... You can also switch the display with the operating system “Display properties”.
70
SECTION 2
10.Pointing Devices
Touch Pad
The touch pad is a convenient pointing device with which you can move the mouse pointer with your
fingertip. The touch pad comprises the operation pad and the two buttons in front of it.
The operation pad has the function of the ball section of a mouse. You move the mouse pointer on the
screen by dragging your fingertip up/down/left/right over the operation pad. Also, by gently tapping
the operation pad you can carry out such operations as clicking, double-clicking, pointing, dragging,
etc.
The left and right buttons are equivalent to the left and right buttons on a mouse. These functions
depend on the application. The center scroll button allows you to move the screen easily up and
down by pressing the center scroll button forward and back.
Operation pad
SECTION 2
Left button
Scroll button
Right button
Critical Point
The basic principles of the touch pad are such that the touch pad operates somewhat differently
for different users due to such factors as the degree of dryness of the fingertip of the user.
If condensation due to humidity or soiling gets on the operation pad, this can cause malfunction.
If this happens, use a soft, dry cloth to wipe it clean. If the touch pad is extremely dirty, wipe
it with a soft cloth dipped in neutral cleaning agent diluted with water.
The center scroll button can be used if you install the accessory “Alps Pointing Device Driver”.
Some applications can not scroll the screen with the scroll button.
When using a PS/2 mouse, it is necessary to set such parameters as simultaneous use with
the touch pad in the BIOS setup “Keyboard/mouse settings”.
71
Touch pad usage
Click
Clicking means to tap the operation pad once and let it go quickly or to click the left button.
Also, clicking the right button once is called a “right click”.
or
Double-click
Double-clicking means to tap the operation pad twice and let it go quickly or to click the left button
twice. The speed of double-clicking can be adjusted with the “Mouse Properties” screen.
or
Point
Pointing means to line up the mouse pointer with a menu or the like. If there are levels under the
menu the mouse pointer is on (if is displayed at the right of the menu), that menu is displayed.
Drag
Move the mouse pointer to any position, then quickly tap the operation pad twice and leave your
finger on the operation pad after the second tap, then drag your fingertip along the operation pad
to the desired position, then pull your fingertip off the operation pad. Alternatively, move the
mouse pointer to any position, then holding down the left button, drag along the operation pad to
the desired position, then pull your fingertip off the operation pad.
or
72
Scroll
If you click the scroll area in the window and press the scroll button forward or back, the display
in the window is scrolled.
Return: Press away from you.
Forward: Press toward you.
Critical Point
The above button operations are for when the touch pad is set to right-handed operation.
The roles of the left and right buttons, the mouse pointer speed, etc. can be set with the
“Mouse Properties” window.
When tapping, touch the operation pad quickly and gently. There is no need to apply force.
When moving the mouse pointer with the touch pad, if you lift up your fingertip, move it to
another position, then lower it to the touch pad again, the mouse pointer on the screen does
not move. If you drag your fingertip along the operation pad from where you first touched it,
then the screen moves in the direction you dragged along.
The center scroll button can be used if you install the accessory “Alps Pointing Device Driver”.
SECTION 2
73
Mouse Usage
Mouse Usage
Place your hand on the mouse with the fingers on the left and right mouse buttons, then slide the
mouse over your desktop or other flat surface. The arrow mark on the screen (mouse pointer) moves
in the same direction as the mouse. Try moving the mouse while watching the screen.
Button Operation
Click
Clicking means to tap the left mouse button once.
Also, clicking the right button once is called a “right click”.
Click
Double-click
Double-clicking means to tap the left mouse button twice in a row.
74
Click, click
Point
Pointing means to line up the mouse pointer with a menu or the like. If there are levels under the
menu the mouse pointer is on (if is displayed at the right of the menu), that menu is displayed.
Drag
While holding down the left button, move the mouse pointer to any position, then release the
button.
Release
Press
SECTION 2
Critical Point
The above button operations are for when the mouse is set to right-handed operation. The
roles of the left and right buttons, the mouse pointer speed, etc. can be set with the “Mouse
Properties” window.
75
PS/2 Mouse
1. Switch off the power for the computer or put it on standby.
2. Connect the mouse.
Connect the mouse to the expansion keyboard/mouse connector on the rear of the computer.
Face the connector with the stamped arrow upward.
Critical Point
On models with no internal pointing device, always connect the mouse before switching on
the power.
Set such parameters as simultaneous use with the internal pointing device and hot plug
functions in the BIOS setup “Keyboard/mouse settings”.
USB Mouse
You can connect a USB mouse to a USB connector on this computer.
1. Connect the mouse to the computer’s USB connector.
Line up the connector shapes, then insert straight in.
Critical Point
A USB mouse can be installed or removed with the power for the computer On.
Connecting a USB mouse does not disable the touch pad. To disable the touch pad, see
“Disabling the Touch Pad” below.
A USB mouse can be connected to either USB connector.
76
Disabling the Touch Pad
When you connect a USB mouse to this computer, both the touch pad and the USB mouse are
enabled. To disable the touch pad when a USB mouse is connected, set the following.
1. Set the BIOS setup “Internal Pointing Device” item to “"Manual Setting"”.
2. When you start Windows, press the “Fn” and “F4” keys at the same time.
Each time these keys are pressed, the touch pad toggles between enabled and disabled.
When the touch pad is enabled “Internal pointing device: Enabled” is displayed; when the touch
pad is disabled “Internal pointing device: Disabled” is displayed.
IMPORTANT
• Always connect a mouse if you are going to disable the touch pad.
Critical Point
Even if you press the “Fn” + “F4” keys at the same time and disable the touch pad, after the
computer is restarted or after resuming, the touch pad is enabled. If you want the touch pad
disabled again, you must press the “Fn” + “F4” keys again.
If the “BATTERYAID (2/2)” tab is not displayed on the Windows 2000 “Power Option Properties”,
the message in Step 2 is not displayed on the screen. (Hotkey Utility for XP)
If the BIOS setup “Internal pointing device” item is set to “Always disable”, the touch pad is
always disabled.
SECTION 2
77
SECTION 2
11. Keyboard
The keyboard is a device for inputting data and instructions to the computer and having it execute
them.
Control keys
Character keys
Num Lk
Insert
Delete
F1EscF2F3F4F5F6F7F8F9F10F11F12
@
!
12
QWERT Y UI OP
Tab
CapsLock
ShiftShift
Fn
CtrlAlt
#3$4%5^
ASDFGHJKL
ZXCVBNM<,>
&
67
789
456
*8(
123
0
)
90
AltCtrl
Scr Lk
Prt Sc
_
+
-
=
-
:
;
+
.
.
?
/
/
[{]
Enter
"
'
*
}
Numeric Keypad Mode
The mode in which some of the character keys are used as numeric keys (with a key layout that
makes numeric input easier) instead of their normal functions is called numeric keypad mode. The
keyboard is switched to numeric keypad mode with [Num Lk]. (In numeric keypad mode, 1 is
displayed on the status indicator LCD.) The keys surrounded by thick lines in the diagram above
become the numeric keypad. The numbers input with these keys are printed in front of each key.
SysRq
Backspace
\
Enter
Pause
Break
Home
Pg Up
Pg Dn
End
Critical Point
When the separately sold numeric keypad is connected, if you press [Num Lk] to put the
computer into numeric keypad mode, the keys on the external numeric keypad are enabled,
but the numeric keypad section on the keyboard is disabled.
78
Function Keys
Your LifeBook notebook has 12 function keys, F1 through F12. The functions assigned to these keys
differ for each application. You should refer to your software documentation to find out how these keys
are used.
The [Fn] key provides extended functions for the notebook and is always used in conjunction
with another key.
[Fn+F3]: Pressing [F3] while holding [Fn] will toggle the Audio Mute on and off.
[Fn+F4]: Pressing [F4] while holding [Fn] will toggle the touchpad on and off. (This function key
combination only works if the BIOS setting for Advanced > Keyboard/Mouse Features > Internal
Pointing Device is set to Manual Setting.)
[Fn+F5]: Pressing [F5] while holding [Fn] allows you to toggle between video compensation and
no compensation. (Video compensation controls spacing on the display. When it is enabled,
displays with less than 1024 x 768 or 800 x 600 pixel resolution will still cover the entire screen.)
[Fn+F6]: Pressing [F6] repeatedly while holding [Fn] will lower the brightness of your display.
[Fn+F7]: Pressing [F7] repeatedly while holding [Fn] will increase the brightness of the display.
[Fn+F8]: Pressing [F8] repeatedly while holding [Fn] will decrease the volume of your LifeBook
notebook.
[Fn+F9]: Pressing [F9] repeatedly while holding [Fn] will increase the volume of your LifeBook
notebook.
[Fn+F10]: Pressing [F10] while holding [Fn] allows you to change your selection of where to
send your display video. Each time you press the combination of keys you will step to the next
choice. The choices, in order, are: built-in display panel only, both built-in display panel and external
monitor or external monitor only.
SUS/RES switch
Activates the Hibernate/Standby or Shutdown. If you press this button for more
than 4 seconds, the system will force to shutdown.
Space keyInputs a single space character.
(This is the long key with nothing written on it at the center of the front of the
keyboard.)
[↑][↓][←][→] (cursor) keys
Move the cursor.
SECTION 2
79
[Enter] key
Also called the return key or the line feed key. This key inputs line feeds and executes command.
[Ctrl] key
Used in combination with other keys; its functions depend on the application software.
[Shift] key
Used in combination with other keys.
[Alt] key
Used in combination with other keys; its functions depend on the application software.
[Caps Lock] key
To lock the keyboard into caps mode, press this key, pressing this key again ends caps
mode.
[Num Lk] (numerical lock) key
Press this key to put the computer into numeric keypad mode.
[Scr Lk] (scroll lock) key
Its functions depend on the application software.
[Print Screen] key
Press this key to make a hard copy of the screen.
[Pause] key
Press this key to pause the screen display.
[Break] key
Its functions depend on the application software.
[Insert] key
Press this key to insert a new character between characters. The new characters are entered
at the cursor position.
[Delete] key
Press this key to delete a character. Pressing the Delete key and the Ctrl and Alt keys at the
same time resets this computer.
[Home] key
Press this key to move the cursor directly to the head of the row or the head of the document.
[End] key
Press this key to move the cursor directly to the end of the row or the end of the document.
[Pg Up] key
Press this key to switch to the previous screen.
[Pg Dn] key
Press this key to switch to the next screen.
[Back Space] key
Press this key to delete the character to the left of the cursor position.
[Sys Rq] (system request) key
When this key is supported by the application software, this key is used for such functions as
resetting the keyboard. Press this key together with the Fn key.
[ ] (Windows) key (only valid for Windows 98 / Windows Me and Windows XP)
Press this key to display the Start menu.
[ ] (Application) key (only valid for Windows 98 / Windows Me and Windows XP)
Press this key to display the shortcut menu for the selected item. This key has the same role
as the mouse right click.
80
SECTION 2
12. CDs
Cautions on Handling
In order to prevent breakdowns, please pay attention to the following points when using the CD drive.
CD Media Precautions
Do not paste labels or write with a ballpoint pen or a pencil on either side of a CD.
Do not touch or scratch the data side of a CD.
Do not bend a CD or place any heavy objects on it.
If a CD becomes dirty or wet, wipe it gently with a slightly damp cloth from the center to the
outside, then dry it gently with a dry cloth.
Do not let coffee or other liquids get onto CDs.
Do not store CDs anywhere too hot or too cold.
Do not store CDs anywhere humid or dusty.
CD-ROM Drive Cautions
Do not use any CDs that are not circular (for example, star-shaped CDs or card-shaped CDs).
They may not be read or written correctly and can cause breakdowns.
This computer can only use CDs that have one of the following marks. Do not use any CD that
has none of these marks. Using such a CD can cause a breakdown.
CDs with certain of these marks require specific applications in order to be used.
SECTION 2
When using anything other than a CD, please read “To users of the DVD-ROM & CD-R/RW drive
and CD-R/RW drive”.
81
Loading/Removing CDs
This section explains how to load CDs. The procedure for removing CDs is the same.
1. Press the CD eject button.
The tray jumps out slightly.
CD eject
button
2. (1) Pull out the tray the rest of the way. (2) Place the CD on the tray.
While supporting the tray with one hand, place the CD on the tray with its label facing up and fit
the CD onto the tray so that the round projection at the center of the tray snaps into the CD’s
center hole with a click.
2
1
3. Gently push the tray into the computer.
82
IMPORTANT
• When placing a CD on the tray, be sure to line up the projection at the center of the tray and the
hole at the center of the CD and press the CD onto the projection until it snaps into place with
a click. If you do not fit the CD onto the tray projection properly, the CD may come loose inside
the CD drive, which can damage the tray, the inside of the drive, and the CD.
Critical Point
When the data is read from it, a CD turns at high speed, so there may be vibration and a
sound like rushing air.
The CD drive for this computer has an electronic lock, so CDs can only be loaded/removed
when the computer is running.
If you use a CD with an off-balance center of gravity, for example a CD with something
pasted on it, the CD drive unit may vibrate and not provide the normal level of performance.
If you can not push the tray all the way back in, pull out the tray until you hear a sound, then
push it in again.
When the power for the computer is Off, the tray may not close. If that happens, switch the
power back On, then close the tray.
If for any reason, the tray does not come out when you press the eject button, double-click
the “My Computer” icon, right-click the CD icon in the “My Computer” window, then click
“Eject”.
If the tray still does not come out, slip the tip of a paper clip or the like into the hole at the right
of the CD eject button on the front of the CD-ROM drive and pull out the tray.
SECTION 2
CD eject button
83
SECTION 2
13. Diskettes
Cautions for Handling
In order to prevent damage, please observe the following points carefully when using diskettes.
Be careful not to let coffee or any other liquid get on a diskette.
Do not open the shutter and touch the disk itself.
Do not bend a diskette or place any heavy objects on it.
Keep magnets and other magnetic objects away from diskettes.
Be careful not to drop diskettes on hard floors.
Do not store diskettes anywhere too hot or too cold.
Do not store diskettes anywhere humid or dusty.
Do not pile one label on top of another. They can jam up in the drive.
Do not let condensation or water drops get onto diskettes.
Loading/Removing Diskettes
This section explains how to load and remove diskettes.
Loading
With the shutter facing the inside of the drive and the label facing up, insert the diskette until the
diskette eject button pops out.
84
Diskette eject button
Label
Removing
After making sure that the diskette access lamp is not lit up, press the diskette eject button.
Diskette eject button
Access Lamp
Critical Point
Use diskettes formatted for DOS/V. Operation of other diskettes is not guaranteed.
If you eject a diskette while the diskette access lamp is lit up, data on the disk may be
destroyed.
When you want to protect the data written on a diskette from erasure or know that you will
not write further data on the diskette, slide the write-protect tab on the diskette so that the
hole is exposed (inhibiting writing to the disk). If you later want to write to the disk again,
slide the write-protect tab back to its original position covering up the hole.
Write-protect tab
Writing enabled Writing inhibited
SECTION 2
85
SECTION 2
14. Caring for the Hardware
Caring for the Computer
WARNING
ELECTRIC SHOCK
In order to prevent electrical shock and injury, always do the following before caring for
the computer.
• Switch off the computer power and disconnect the AC adaptor.
• Switch off the power for the printer and any other peripheral equipment and disconnect
it from the computer.
Gently wipe the computer clean with a soft, dry cloth.
If the computer is very soiled, wipe it with a soft cloth dipped in water or in neutral cleaning agent
diluted with water and well wrung out. When wiping using neutral cleaning agent, follow this by wiping
with a soft cloth dipped in water. Also, when wiping the computer, be careful not to let any water get
inside the computer. Never use benzene, paint thinner, or other volatile chemical or washcloth
embedded with a chemical cleaner.
Caring for the Floppy Disk Drive
When the floppy disk drive is used for a long time, the head (the part that reads and writes the data)
becomes dirty. If the head becomes too dirty, the floppy disk drive will stop being able to read and
write data recorded on diskettes. Clean the head with a separately-sold cleaning diskette about once
every three months.
Cleaning the Floppy Disk Drive Head
1. Put the cleaning diskette in the drive.
2. Access the floppy disk drive from “My Computer”.
3. When the message is displayed, click “No”.
4. When the diskette access lamp goes out, remove the cleaning diskette.
86
SECTIONSECTION
SECTION
SECTIONSECTION
SECTIONSECTION
SECTION
SECTIONSECTION
33
3
33
33
3
33
In order to prevent unauthorized
usage of this computer, a
security button, and other
security functions can be used.
SECTION 3
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.