Fujitsu Laptop, LifeBook Series User Manual

Page 1
Copyright
Fujitsu Limited has made every effort to ensure the accuracy and completeness of this document. Ho w ever, as ongoing development eff orts are continually improving the capabilities of our products, we cannot guarantee the accuracy of the contents of this document. We disclaim liability for errors, omissions, or future changes.
LifeBook is a trademark of Fujitsu Limited. Microsoft, Windows, MS , MS-DOS, and Windo ws NT are registered trademarks of the Microsoft Corporation of the United States in the United States and other countries. Intel is the registered trademark of the Intel Corporation of the United States. ATI is a registered trademark of ATI Technologies INC Phoenix is a registered trademark of Phoenix Technologies Corporation of the United States. K56flex is a trademark of Rockwell International Corporation and Lucent Technologies Corporation.
Macrovision: -This product incorporates copyright protection technology that is protected by method claims of certain U.S. patents and other intellectual property r ights owned by Macrovision Corporation and other rights owners. Use of this copyright protection technology must be authorized by Macrovision Corporation, and is intended for home and other limited viewing uses only unless otherwise authorized by Macrovision Corporation. Rev erse engineering or disassembly is prohibited. Appar atus Claims of U.S. P atent Nos.4,631,603, 4,577,216, 4,819,098 and 4,907,093 licensed for limited viewing uses only.
Dolby: -Manufactured under license from Dolby Laboratories. "DOLBY", "PRO LOGIC," and the double-D symbol are trademarks of Dolby Laboratories. Copyrights 1992-1999 Dolby Labor atories, All rights reserved. Other product names are trademarks or registered trademarks of their respective companies. Other products are copyrighted by their companies.
Copyright© 1981-1999 Microsoft Corporation, All rights reserved. Copyright© 1999 Phoenix Technologies, Ltd., All rights reserved.
All other products are trademarks or registered trademarks of their respective companies. © Copyright 2003 Fujitsu Limited. All rights reserved. No part of this publication may be copied, reproduced,
or translated, without the prior written consent of Fujitsu Limited. No part of this publication may be stored or transmitted in any electronic form without the written consent of Fujitsu Limited.
Website : www.fujitsu-pc-asia.com
DECLARATION OF CONFORMITY
according to FCC Part 15
This device complies with Part 15 of the FCC rules. Operations are subject to the following tw o conditions:
(1) This device must not be allowed to cause harmful interference, (2) This device must accept any
interference received, including interference that may cause undesired operation.
i
Page 2
CAUTION
Changes or modification not expressly approved by Fujitsu could void this user’s authority to operate the equipment.
FCC NOTICES Notice to Users of Radios and Television
These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. Howev er, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet that is on a different circuit than the receiver.
Consult the dealer or an experienced radio/TV technician for help.
Shielded interconnect cables must be employ ed with this equipment to ensure compliance with the pertinent RF emission limits governing this device.
Notice to Users of the US Telephone Network
Your LifeBook notebook may be supplied with an internal modem which complies with Part 68 of the FCC rules. On this notebook is a label that contains the FCC Registr ation Number and the Ringer Equivalence Number (REN) for this equipment among other information. If requested, the user must provide their telephone company with the following information:
1. The telephone number to which the notebook is connected.
2. The Ringer Equivalence Number (REN) for this equipment.
3. That the equipment requires a standard modular jack type USOC RJ-11C which is FCC Part 68 compliant.
4. The FCC Registration Number.
This equipment is designed to be connected to the telephone network or premises wiring using a standard modular jack type USOC RJ-11C which is FCC Part 68 compliant and a line cord between the modem and the telephone network with a minimum of 26AWG.
The REN is used to determine the number of devices that you may connect to y our telephone line and still have all of those de vices ring when your number is called. T oo man y devices on one line ma y result in failure to ring in response to an incoming call. In most, but not all, areas the sum of the RENs of all of the devices should not exceed five (5). T o be certain of the number of devices you ma y connect to your line, as determined by the RENs, contact your local telephone company.
If this equipment causes harm to the telephone network, your telephone company may discontinue your service temporarily. If possible, they will notify you in advance. If advance notice is not practical they will notify you as soon as possible. You will also be advised of your right to file a complaint with the FCC.
This fax modem also complies with fax br anding requirements per FCC Part 68. Your telephone company will probably ask you to disconnect this equipment from the telephone network
until the problem is corrected and you are sure that the equipment is not malfunctioning. This equipment may not be used on coin-operated telephones provided by your telephone company. Connection to party lines is subject to state tariffs. Contact your state’s public utility commission, public service commission or corporation commission for more information.
ii
Page 3
This equipment includes automatic dialing capability . When programming and/or making test calls to emergency numbers:
Remain on the line and briefly explain to the dispatcher the reason for the call.
Perform such activities in off-peak hours, such as early morning or late evening.
FCC rules prohibit the use of non-hearing aid compatible telephones in the following locations or applications:
All public or semipublic coin-operated or credit card telephones.
Elevators, highways, tunnels (automobile, subway, railroad or pedestrian) where a person with
impaired hearing might be isolated in an emergency.
Places where telephones are specifically installed to alert emergency authorities such as fire,
police or medical assistance personnel.
Hospital rooms, residential health care facilities, convalescent homes and prisons.
Workstations for the hearing impaired.
Hotel, motel or apartment lobbies.
Stores where telephones are used by patrons to order merchandise.
Public transportation terminals where telephones are used to call taxis or to reserve lodging or
rental cars.
In hotel and motel rooms as at least ten percent of the rooms must contain hearing aid compatible
telephones or jacks for plug-in hearing aid compatible telephones which will be provided to hearing impaired customers on request.
DOC (INDUSTRY CANADA) NOTICES Notice to Users of Radios and Television
This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.
CET appareil numérique de la class B respecte toutes les exigence du Réglement sur le matérial brouilleur du Canada.
Notice to Users of the Canadian Telephone Network
The Canadian Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operational, and safety requirements. The Department does not guarantee the equipment will operate to the user’s satisfaction.
LifeBook notebooks are supplied with an internal modem which complies with the Industry Canada certification standards for telecommunication network protection and safety requirements. Before connecting this equipment to a telephone line the user should ensure that it is permissible to connect this equipment to the local telecommunication facilities. The user should be aware that compliance with the certification standards does not prevent service degradation in some situations.
Repairs to telecommunication equipment should be made by a Canadian authorized maintenance facility. Any repairs or alterations not expressly approved by Fujitsu or any equipment failures may give the telecommunication company cause to request the user to disconnect the equipment from the telephone line.
The connecting arrangement code for this equipment is CA11A.
iii
Page 4
The Load Number assigned to each telephone terminal device denotes the percentage of the total load to be connected to a telephone loop or circuit which is used by the device to pre vent ov erloading. The termination on a loop may consist of any combination of devices such that the total of the load numbers of all devices does not exceed 100.
CA UTION
For safety, users should ensure that the electrical ground of the power utility, the telephone lines and the metallic water pipes are connected together. Users should NO T attempt to mak e such connections themselves but should contact the appropriate electric inspection authority or electrician. This may be particularly important in rural areas.
UL Notice
This unit requires an AC adapter to operate. Use only UL Listed Class 2 adapter, output rating 19V DC, 4.22A. Refer to the illustration below for the correct AC Adapter output polarity:
+
CA UTION
To reduce the risk of fire, use only #26 AWG or larger telecommunications line cord.
For Authorized Repair Technicians Only
CA UTION
For continued protection against risk of fire, replace only with the same type and rating fuse.
W ARNING
Danger of explosion if Lithium (CMOS) battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the manuf acturer. Dispose of used batteries according to the manufac­turer’s instruction.
iv
Page 5
IMPORTANT SAFETY INSTRUCTIONS
1. Read these instructions carefully. Save these instructions for future reference.
2. Follow all warnings and instructions marked on the product.
3. Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners . Use a damp cloth for cleaning.
4. Do not use this product near water.
5. Do not place this product on an unstable cart, stand, or table. The product may fall, causing serious damage to the product.
6. Slots and openings in the cabinet and the back or bottom are provided f or ventilation; to ensure reliab le operation of the product and to protect it from overheating, these openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug, or other similar surface. This product should ne ver be placed near or over a r adiator or heat register, or in a b uilt­in installation unless proper ventilation is provided.
7. This product should be operated from the type of power indicated on the marking label. If you are not sure of the type of power available, consult your dealer or local power company.
8. This product is equipped with a 3-wire grounding-type plug, a plug having a third (grounding) pin. This will only plug into a grounding-type power outlet. This is a saf ety feature. If you are unable to insert the plug into the outlet, contact your electrician to replace your obsolete outlet. Do not defeat the purpose of the grounding-type plug.
9. Do not allow anything to rest on the power cord. Do not locate this product where persons will walk on the cord.
10. If an extension cord is used with this product, make sure that the total ampere rating of the equipment plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure that the total rating of all products plugged into the wall outlet does not exceed 15 amperes.
11. Never push objects of any kind into this product through cabinet slots as they may touch dangerous voltage points that could result in a fire or electric shock. Never spill liquid of any kind on the product.
12. Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to qualified service personnel.
13. Unplug this product from the wall outlet and refer servicing to qualified service personnel under the following conditions:
a. When the power cord or plug is damaged or frayed. b. If liquid has been spilled into the product. c. If the product has been exposed to rain or water. d. If the product does not operate normally when the operating instructions are followed. Adjust
only those controls that are covered by the oper ating instructions since improper adjustment of other controls may result in damage and will often require extensiv e work by a qualified technician
to restore the product to normal condition. e. If the product has been dropped or the cabinet has been damaged. f. If the product exhibits a distinct change in perf ormance, indicating a need for service.
14. CAUTION. When replacing the battery , be sure to install it with the polarities in the correct position.
There is a danger of explosion if the battery is replaced with an incorrect type or is mistreated. Do not recharge, disassemble or dispose of in fire. Replace only with the same or equivalent type recommeded by the manufacturer. Dispose of the used battery according to the manufacturer’s instructions.
15. Use only the proper type of power supply cord set (provided in your accessories box) for this unit. It should be a detachable type: UL listed/CSA certified, BS1363,ASTA,SS145 certified, rated 10A 250V minimum, VDE approved or its equivalent. Maximum length is 15 feet (4.6 meters).
v
Page 6
High Safety Required Use
This Product is designed, developed and manufactured as contemplated for general use, including without limitation, general office use, personal use, household use and ordinary industrial use, but is not designed,developed and manufactured as contemplated for use accompanying fatal risks or dangers that, unless extremely high safety is secured, could lead directly to death, personal injury ,severe ph ysical damage or other loss (hereinafter ‘High Safety Required Use), including without limitation, nuclear power reactioncore control in nuclear atomic facility, airplane automatic aircraft flight control, air traffic control, operation control in mass transport control system,medical instrument for life suppor t system, missile launching control in weapon system. You shall not use this Product without securing the sufficient safety required for the High Safety Required Use.
vi
Page 7
AUSTRALIAN WARNINGS
WARNING
FOR SAFETY REASONS, ONLY CONNECT EQUIPMENT WITH A TELECOMMUNICATIONS COMPLIANCE LABEL. THIS INCLUDES CUSTOMER EQUIPMENT PREVIOUSLY LABELLED PERMITTED OR CERTIFIED .
Connection of Non Certified/Approved peripherals may result in the equipment operating outside the Australian EMI Standards.
Modems connected to the Australian telecommunications network must be operated in accordance with the Labelling Notice. This modem has been specifically configured to ensure compliance with the A CA Standards. Do not adjust your modem or software outside the values indicated below. To do so would result in your modem being operated in a non-compliant manner.
Call Attempts/Retries:
Applications software shall be configured so that no more than 3 attempts are made to establish a connection to a given number (Note: if the modem can detect service tones, up to 10 attempts can be made). If the call sequence is unsuccessful, there shall be a delay of at least 30 minutes bef ore attempting to call the number again.
Failure to set the modem, and any application software used with the modem, to the values shown above will result in the modem being operated in a non-compliant manner. Consequently, this would be in violation of the Labelling Notice for this equipment, and the Telecommunications Act 1997 prescr ibes penalties for the connection of non-compliant equipment.
vii
Page 8
NEW ZEALAND WARNINGS
The grant of a Telepermit for any item of terminal equipment indicates only that Telecom has accepted that the item complies with minimum conditions for connection to its network. It indicates no endorsement of the product by Telecom, nor does it provide any sort of warranty. Above all, it provides no assurance that any item will work correctly in all respects with another item of Telepermitted equipment of a different make or model, nor does it imply that any product is compatible with all of Telecoms network services.
This equipment is not capable under all operating conditions of correct operation at the higher speeds for which it is designed. 56 KBPS connections are likely to be restricted to lower bit rates when connected to some PSTN implementations. Telecom will accept no responsibility should difficulties arise in such circumstances.
Immediately disconnect this equipment should it become physically damaged, and arrange for its disposal or repair.
This equipment shall not be used in any manner, which could constitute a nuisance to other Telecom customers.
This equipment shall not be set to make automatic calls to the Telecom 111 Emergency Service.
This device is equipped with pulse dialing while the New Zealand standard is DTMF tone dialing. There is no guarantee that Telecom lines will always continue to support pulse dialing. It is strongly recommended that pulse dialing is not used.
Some parameters required for compliance with Telecoms Telepermit requirements are dependent on the equipment (PC) associated with this device. The associated equipment shall be set to operate within the following limits for compliance with Telecoms Specifications:
For repeat calls to the same number.
There shall be no more than 10 call attempts to the same number within any 30 minute period for any single manual call initiation, and The equipment shall go on-hook for a period of not less than 30 seconds between the end of one attempt and the beginning of the next attempt.
For Automatic calls to different numbers.
The equipment shall go on-hook for a period of not less than 5 seconds between the end of one attempt and the beginning of the next attempt.
For Automatically answered Incoming Calls
Incoming calls shall be answered between 3 and 30 seconds from the start of the ringing.
For correct operation, the total of the RNs of all devices connected to a single line at anytime should not exceed 5. The RN of this Equipment is 0.5.
WARNING Connection of Non Certified/Approved peripherals may result in the equipment operating
outside the New Zealand EMI Standards.
viii
Page 9
Note: Modem setting in Windows XP
A. If you are located in Australia
1. Click Start select Control panel select "Phone and
Modem Options".
2. Double click New Location.
3. Choose "Australia" in Country/region pull down
menu bar.
4. Select Phone system as Tone Dialing”.
5. Click OK and Apply.
B. If you are located in New Zealand
1. Click start select Control panel select "Phone and
Modem Options".
2. Double click New Location.
3. Choose "New Zealand" in Country/region pull down
menu bar.
4. Select Phone system as “Tone Dialing”.
5. Click OK and Apply.
Note:
The screens and illustrations shown in this examples may slightly vary depending on the operating environment that you have installed.
ix
Page 10
NOTATION IN THIS DOCUMENT
Warnings
This manual uses a variety of icons as visual marks so that you can use this computer safely and correctly and avoid damage and danger to y ourself and to others. These icons and their meanings are as follows. Please learn these icons before reading this manual. Learning these icons will be useful for understanding this manual.
Icon Meaning
WARNING CAUTION
The symbols below are used together with the icons above to indicate what type of danger or damage is involved.
Symbol Meaning
Incorrect handling or ignoring this warning can cause a dangerous situation that could result in death or severe injury.
Incorrect handling or ignoring this warning can cause a dangerous situation that could result in moderate or minor injury or could result in equipment damage.
The symbol indicates a warning or caution. The symbol inside the indicates the concrete nature of the warning. (The example on the left is a caution for electric shock.)
The circle and slash indicates prohibited behavior. The symbol inside the circle indicates the concrete nature of the prohibition. (The example on the left indicates that disassembly is prohibited.)
The indicates instructions that must be followed. The symbol inside indicates the concrete nature of those instructions. (The example on the left tells you to unplug the power plug from the socket.)
Key notation and operation methods
Explanations of key operations do not show all the characters on the keyboard. Instead they indicate just the keys necessary to the explanation as follows. Examples: [Ctrl] key, [Enter] key , [ ] key When multiple keys are to be pressed at the same time , this is indicated by connecting them with [+]. Examples: [Ctrl] + [F3] keys; [Shift] + [ ] key
Screen examples
The screens shown in this manual are examples. Please understand that the file names and screens you use may be different.
x
Page 11
Notation in text
Here is what symbols in text mean.
Symbol Meaning
Critical Points
Indicates a point necessary for correctly operating the hardware or software.
Gives the meaning and brief explaination of a term.
Column
Indicates the page to see elsewhere in this manual.
Command input (key input)
Within the text of this manual, command input (giving commands to the computer by pressing keys) is indicated as follows.
Example:
In the position indicated in the example above by the , the space left between the characters indicates that a space needs to be left in the entry by pressing the space bar (the long key with nothing written on it at the center of the front of the keyboard). Commands are wr itten in this manual as lowercase latin letters, but uppercase letters may be used.
Product names
The following product names are abbreviated as follows in this manual.
dir c:
“Microsoft® Windows XP® operating system” is written as “Windows XP”. “Microsoft® Windows® 2000 operating system” is written as “Windows 2000”. “Fujitsu LifeBook” is written as “this computer” or “the computer main unit”.
xi
Page 12
Configuration of this Manual
SECTION 1
This section explains basic operations and basic items for using this computer, including the names of the parts and their functions, floppy disk unit handling, and battery operation.
SECTION 2
This section explains installation of options for this computer.
SECTION 3
This section explains what to do when trouble occurs with this computer and when messages are displayed. Read this section as the necessity arises.
SECTION 1
SECTION 2
SECTION 3
xiii
Page 13
SECTION 1
CONTENTS
1. Names of the Parts and their Functions .............................2
Exterior Features: Front/top View of the Computer ............................. 2
Exterior Features: Side Views.............................................................. 4
Exterior Features: Rear/Top View of the Computer ............................. 7
External Features: Bottom View of the Computer ............................... 8
Exterior Features: Operating Status Indicator LCD ............................. 9
2. Keyboard ..............................................................................11
Keyboard ........................................................................................... 11
3. Using the One-touch Buttons ............................................14
About the One-touch Buttons ............................................................ 14
Starting an Application ...................................................................... 15
Controlling Music Player.................................................................... 15
4. LifeBook Application Panel ................................................16
Application Launch CD Player Buttons.............................................. 16
Configuring your Lifebook Application Panel..................................... 16
Using the CD Player.......................................................................... 18
Desktop Control Panel....................................................................... 19
5. Running the Computer on its Battery ...............................21
Recharging the Battery...................................................................... 21
Running the Computer on its Battery ................................................ 21
Checking the Remaining Battery Life ................................................ 22
Cautions in Using the Battery Pack ...................................................23
Changing the Internal Batter y Pack................................................... 25
6. Using the Optical Disk Drive ..............................................27
Cautions in Using CD/DVDs.............................................................. 27
Inserting a Disc .................................................................................30
Removing a Disc ............................................................................... 32
7. Internal Modem ....................................................................35
About the Built-in Modem .................................................................. 35
Plugging in a Modular Cable ............................................................. 35
8. Using a LAN .........................................................................38
Using a LAN ...................................................................................... 38
Connecting a LAN Cable ................................................................... 38
xiv
Page 14
9. About the Integrated Wireless Lan
(For selected model) ...........................................................41
Preface .............................................................................................. 41
Notice to the User.............................................................................. 42
Representation of Symbols and Others in this Document................. 44
Before Using the Wireless LAN Function..........................45
Outline ............................................................................................... 45
Features of the wireless LAN function............................................... 45
Network configuration of the wireless LAN........................................ 45
For better communications................................................................ 47
When communication cannot be done normally ............................... 48
Stopping the Transmission of Radio Waves ...................................... 49
Connection...........................................................................50
Flow of Operations ............................................................................ 50
Preparation for Using the Wireless LAN ............................................ 51
Setting the network............................................................................ 57
Connection to the network .................................................57
Setting the network............................................................................ 57
Setting the sharing function ............................................................... 60
Confirming connection....................................................................... 64
SECTION 2
Appendix ..............................................................................67
Other Settings ................................................................................... 67
Setting of channels during ad hoc connection................................... 67
Troubleshooting ..................................................................68
Unavailable connection to the network .............................................. 68
1. Using a PC Card ..................................................................74
Cautions in Using a PC Card ............................................................ 74
Supported PC Cards ......................................................................... 74
Preparing Necessary Items ............................................................... 74
Inserting a PC Card........................................................................... 75
Removing a PC Card ........................................................................ 76
xv
Page 15
SECTION 3
2. Adding Memory ...................................................................78
Preparing Necessary Items ............................................................... 78
Installing Memory .............................................................................. 78
Changing Memory ............................................................................. 82
3. Using a Memory Card .........................................................85
Supported Memory Cards ................................................................. 85
Inserting a Memory Card................................................................... 85
Removing a Memory Card ................................................................ 86
4. Connecting a USB Device ..................................................87
Preparing Necessary Items ............................................................... 87
Connecting a USB Device ................................................................. 88
Connecting a USB Mouse ................................................................. 88
Disabling Flat Point............................................................................ 89
5. Connecting an External Monitor ........................................90
Preparing Necessary Items ............................................................... 90
Connecting an External Monitor ........................................................ 90
1. When This Happens ............................................................94
2. Maintenance of your Computer..........................................98
xvi
Page 16
SECTIONSECTION
SECTION
SECTIONSECTION
SECTIONSECTION
SECTION
SECTIONSECTION
11
1
11
11
1
11
SECTION 1
This section explains basic operations and basic items for using this computer, including the names of the parts and their functions, Flat point operation methods, floppy disk unit handling, and battery operation.
Page 17
SECTION 1
1.
Names of the Parts and their Functions
Exterior Features: Front/top View of the Computer
11
10
1
2
3
9
8
7
(Your computer or situation may not look exactly like this illustration.)
1. Latch
Used to lock the LCD panel to prevent it from opening accidentally. To unlock the LCD panel, slide the knob to the right.
2. LCD Panel
Displays images output by the computer.
4
5
6
Critical P oint
About the properties of LCD screens The phenomena below are inherent in the properties of LCD screens and do not indicate that LCD screens are faulty. – The TFT color LCD screen of your computer, composed of more than 2,350,000 picture
elements or pixels (Number of dots when the screen resolution is set at 1024 by 768 pixels), was manufactured through the use of high technologies. For technical reasons, your LCD screen may have pixels that do not light and pixels that are always lit, which however does not indicate that your LCD screen is faulty.
– Colors reproduced by LCD screens for computers vary to some extent from product to
product for reasons of manufacture. Also, a slight unevenness of density may show up because of changes in temperature.
2
Page 18
3. Power or Sus/Resume button
Used to turn on and off the computer, place it in standby mode and mak e it resume operation.
4. Keyboard
Used to type characters and enter commands in your computer.
5. Flat Point
Used to control the mouse pointer.
6. One-touch buttons
Used to start programs and control the playback of audio CDs.
7. Operating status indicator LCD
Indicates the operating status of the computer. The backlight is lit in blue when the computer power on with the AC Adapter attached. Pow er on with battery, the backlight will not lit.
8. Mode selector
Used to switch the one-touch buttons from one operating mode to another.
9. Speakers
Sound output devices of the computer.
10. Scroll button
Used to scroll up or down through the document in the active window. (Mouse driver must be install for this function.)
SECTION 1
Critical Point
Some applications may not allow you to scroll up and down through a document, using the scroll button.
11. Cover close switch
Places the computer in standby mode and turns off the backlight of the LCD screen when you close the LCD panel, and makes the computer resume operation when you open the LCD panel.
3
Page 19
Exterior Features: Side Views
Left View of the Computer
123
6
1. Modem port
Used to connect the computer to a phone line via the supplied modular cable when using a BBS (online service) or navigating the Internet.
2. Video output terminal (S-terminal)
Used to send S-video signals to the TV connected.
3. IEEE 1394 (DV) port
Used to connect a peripheral device, such as a digital video camera (DVC), to the computer via a DV cable.
4. SD card/Memory stick slot
Used to insert an optional memory card.
45
7
8
5. Antitheft lock
Used to connect a commercially available antitheft cable.
4
Page 20
6. DC-IN jack
Used to connect the AC adapter included with your computer.
7. PC card slots
Used to insert optional PC cards. The upper and lower slots are referred to as Slot 2 and Slot 1, respectively.
8. PC card eject button
Press this button to eject the PC card.
Right View of the Computer
SECTION 1
1 2 3
8 9
4 5 6
CAUTION
HEARING LOSS
Before connecting headphones or a microphone to your computer, always turn down your computer’s master volume to a minimum. Failure to do so could result in damage to the audio unit connected or could adv ersely affect your hearing.
1. Headphone jack/Optical digital audio output terminal
Headphone jack Used to connect commercially available headphones with a f3.5 mini plug. This jack is incompatible with some types of cable connectors, so you should consult a salesperson before purchasing headphones.
Optical digital audio output terminal Used also to plug in the fiber-optic cable from an audio unit, e.g., an MD recorder, with an optical digital input terminal. (Compatible with optical mini-plugs)
7
5
Page 21
CA UTION
HEARING LOSS
When you are listening to music with headphones, do not to turn up the volume excessively. Listening to very loud sounds for a long time can adversely affect your hearing.
HEARING LOSS
When you are wearing headphones plugged into the computer, do not turn or off the computer, or very loud sounds may adversely affect y our hearing.
2. Microphone jack
Used to connect a commercially available monaural microphone with a f3.5 mini plug. This jack does not support some types of microphones (e.g., dynamic microphone), so you should consult a salesperson before purchasing a microphone.
3. Floppy disk eject button
Press this button to eject the floppy disk.
4. CD eject button
Press this button to eject the CD or DVD from the optical disk drive. This button operates only when the computer is turned on.
5. Wireless switch (Provided only for wireless LAN device-equipped models)
Used to turn on and off the wireless LAN device. Always keep this switch in the OFF position where the use of electronic devices is prohibited, e.g., in hospitals and on airplanes.
6. Infrared Port
This port enables you to make infrared communication
7. USB ports
Used to connect USB-compliant peripheral devices.
8. Floppy disk drive
Reads and writes data on floppy disks.
9. Optical Disk Drive
Hold either a CD-ROM,DVD-ROM,CD-RW or CD-RW/DVD-ROM drives.Standard optical drive may vary between countries,please check with your local distributor for actual configuration.
6
Page 22
Exterior Features: Rear/Top View of the Computer
7
Port 3
Port 4
Port 2
1 2 3 4 5 6
(The illustration varies depending on the model and use conditions.)
1. USB ports
Used to connect USB-compliant devices.
2. LAN port
Used to connect the computer to a LAN (local area network) via an optional LAN cable for using online service or navigating the Internet.
SECTION 1
3. Serial Port
The serial port allows you to connect serial (RS232) devices.
4. Air outlet
Provided to discharge heat from the computer. When you turn on the computer, the cooling fan rotates for a few seconds. When the temperature in the computer rises high, it automatically begins to rotate to discharge heat from the computer.
CAUTION
BREAKAGE
Do not block the air outlet. Doing so prevents heat from being discharged and could result in damage to your computer.
5. Parallel Port
The parallel port allows you to connect parallel devices.
6. External monitor port
Used to connect an optionally available external monitor.
7. Wireless Lan Antenna
A wireless LAN antenna is built in here.
IMPORTANT
• When connecting an external device to your computer, inser t its connector straight into the port with the right side up.
7
Page 23
External Features: Bottom View of the Computer
1
2
3
(Your computer or situation may not look exactly like this illustration.)
1. Battery Bay
An internal battery pack is installed here.
2. Built-in 1.44MB floppy drive
An internal floppy drive is installed here.
3. Built-in optical disk drive
An internal optical disk drive is installed here.
8
Page 24
Exterior Features: Operating Status Indicator LCD
12 3 4 56 7 8910
(Your computer or situation may not look exactly like this illustration.)
SECTION 1
1. SUS/RES indicator ( )
Lights when the computer is in operation and blinks when it is on standby.
2. AC adapter indicator ( )
Lights when the computer is powered from the AC adapter.
3. • Battery loading indicator ( )
Lights when a battery pack is installed in your computer.
• Charging status indicator ( ) Lights when the internal battery is being charged.
• Battery life indicator ( ) Indicates the remaining life of the internal battery pack.
4. CD access indicator ( )
Lights when the CD/DVD drive is being accessed.
5. Hard disk access indicator ( )
Lights when the hard disk is being accessed.
Critical Point
To prevent the corruption of data recorded on the hard disk, do not press the power button when the hard disk access indicator is lit.
6. Floppy disk access indicator ( )
Lights when the floppy disk is being accessed.
9
Page 25
Critical Point
To prevent the corruption of data recorded on the floppy disk, do not press the pow er button when the floppy disk access indicator is lit.
7. PC card access indicators ( or )
Light when a PC card is being accessed.
Critical P oint
lights when the PC card in the lower slot is being accessed, while lights when the
PC card in the upper slot is being accessed.
8. Num Lock indicator ( )
Lights when the keyboard is locked in Num Loc k mode (in which you can use the keyboard as a ten-digit keypad). To enter or exit Num Lock mode, press the Lock key.
9. Caps Lock key ( )
Lights when the keyboard is lock ed in Caps Lock mode (in which you can enter uppercase letters without pressing and holding down the Shift key). To enter or exit Caps Lock mode, press the key.
10. Scroll Lock indicator ( )
Lights when the active window is locked to prevent it from being scrolled up or down. To enter or exit Scroll Lock mode, press the Lock ke y while holding down the key. The reaction of the active window varies from program to program.
10
Page 26
SECTION 1
2. Keyboard
Keyboard
Names and functions of the principal keys
Keys that can be used as ten-keys
7
8
$%^& *
1 Esc (Escape) key
Used to cancel the current task and return to the previous task.
54312
(
SECTION 1
6
9 !
!
@ #
2 Function keys
Functions assigned to these keys v ary from application to application.
3 Num Lk (Numerical Lock) key
Pressing the [ ] key activates the ten-key mode. To deactivate the ten-key mode, press it once again.
4 Insert / Prt Sc (Print Screen) key
• Insert key Used to specify whether to overwrite an existing string or to insert a new string.
• Prt Sc (Print Screen) key Used to save the currently displayed windows as pictorial data (bitmap file). To do so, press the [ ] key while holding the [ ] key down. To save only the active window as pictorial data, press the [ ] key while holding the [ ] and [ ] keys down. Using painting software (e.g., Paint), you can edit, save, and print pictorial data. To do so, you need to import it to the painting software by selecting the Paste command from the Edit menu.
11
Page 27
5 Delete key
Used to delete the character on the right of the cursor. With this key, you can also delete the file or icon you selected. By pressing the [ ] key while holding the [ ] and [ ] keys down, you can forcibly terminate the out-of-control application or computer.
6 Pause / Break key
Pause key Press this key to pause the scree display.
Break Its function depend on the application software.
7 Caps Lock key
To use Capital mode, press the [ ] key. To deactivate the English Capital mode, press these key again.
8 Shift key
Used in combination with other keys. By pressing a key while holding the [Shift] key down, you can enter the character or symbol printed in the upper case of the key.
9 Back Space key
Used to delete the character on the left of the cursor.
0 Home key
Press this key to move the cursor directly to the first page of the document or to the head of the row.
! Pg Up and Pg Dn (Page Up and Down key)
Used to display the next page. To do so, press the Pg Up or Pg Dn key.
@ Enter key
Used to confirm the string entered. In text processing, pressing this key inserts a hard retur n in the text. That’s why this key is also called the Return key.
# End key
Press this key to move the cursor directly to the end of the row or end of the document.
$ Ctrl key
Used in combination with other keys.
12
Page 28
% FUNCTION KEYS
Your LifeBook notebook has 12 function keys, F1 through F12. The functions assigned to these keys differ for each application. The [FN] key provides extended functions for the notebook and is always used in conjunction with another key.
[FN+F3]: Pressing [F3] while holding [FN] will toggle the Audio Mute on and off.
[Fn+F4]: Pressing [F4] while holding [Fn] will toggle the Quic k Point feature on and off. Note
that the [Fn+F4] combination only works if Manual Setting is selected in the BIOS.
[FN+F6]: Pressing [F6] repeatedly while holding [FN] will low er the brightness of your display .*
[FN+F7]: Pressing [F7] repeatedly while holding [FN] will increase the brightness of the display.*
[FN+F8]: Pressing [F8] repeatedly while holding [FN] will decrease the volume of y our LifeBook
note-book.**
[FN+F9]: Pressing [F9] repeatedly while holding [FN] will increase the v olume of your LifeBook
notebook.**
[FN+F10]: Pressing [F10] while holding [FN] allows y ou to change y our selection of where to
send your display video. Each time you press the combination of keys you will step to the next choice. The choices, in order, are: built-in display panel only, both built-in display panel and external monitor or external monitor only.
* There are eight brightness levels. ** There are 27 audio levels.
^ Windows key
Used to open the Start menu.
& Alt key
Used in combination with other keys.
SECTION 1
* Application key
Used to open the pop-up menu for the item selected. This key has the same function as the right button of the Flat Point.
( Cursor keys
Used to move the cursor upward, downward, to right and left.
About the ten-key mode
The ten-key mode refers to the mode that enables you to use certain character entry keys as ten­keys (a key arrangement that makes it easy to type in figures). To activate the ten-key mode, simply press the [ ] key. In the ten-key mode, 1 is displayed on the status indicator LCD. The figure
you can enter with a ten-key is marked on the front surface of the key. Note that connecting an optional ten-key pad disables the ten keys on your computer.
13
Page 29
SECTION 1
3. Using the One-touch Buttons
About the One-touch Buttons
The one-touch buttons enable y ou to easily in v oke v arious features of y our computer . Simply by pressing a one-touch button, you can start an application, check for incoming messages, play back an audio CD, and so on.
Mode selector
(1) A (2) B
(3) Internet
(4) E-mail
(Your computer or situation may not look exactly like this illustration.)
The mode selector allows you to switc h the one-touch b uttons from one mode to another , as shown below.
Position of Mode Selector Functions of One-touch Buttons
Application (Up) Starts a program.
Player (Down) Controls Music Player
14
Page 30
Starting an Application
When the mode selector is in the Application position (Up), y ou can start one of the applications below, simply by pressing the one-touch button assigned to it.
Buttons Application Started (Factory default setting) (1) A-button Notepad (2) B-button Calculator (3) Internet button *1 Internet Explorer (4) E-mail button *2 Mail Outlook Express
*1 : If you are subscribe to your local Internet service provider(ISP) *2 : You need to set up @Mail before using this button.
Controlling Music Player
When the mode selector is in the Player position, you can use the one-touch b uttons to control Music Player.
Buttons
(1) (2) (3) (4)
Stop/Eject *1 Pla y/P ause Previous T r ack *2 Next T rack *2
SECTION 1
*1 : By default, the Eject button is set so as not to operate when Windows is running. *2 : By pressing the Previous Track or Next Track button, you can skip to the previous or next
track when you are using Music Player. When you insert an audio CD into the CD/DVD device while Windows is running, Music Player will automatically start playing the audio CD. To control the playback of the CD you can use the one-touch buttons, Music Player.
IMPORTANT
Do not use the one-touch buttons f or any type of disc other than audio CDs . Otherwise, the operation of your computer may become unstable.
Critical Point
For some copy-protected audio CDs, the one-touch buttons may not oper ate correctly.
15
Page 31
SECTION 1
4. LifeBook Application Panel
A unique feature of your Lif eBook notebook is the Lif e-Book Application P anel. This panel allo ws you to operate the CD player drive either as an independent audio CD player or to launch applications with the touch of one button.
Critical P oint
LifeBook Application Panel uses the date and time settings of y our LifeBook notebook. If the date and time are incorrect, you can adjust this setting in the Windows Control Panel. The CD player that your LifeBook notebook uses is determined by the configuration of your system.
Your LifeBook notebook is pre-installed with software utilities that let you operate and configure y our LifeBook Application Panel. These utilities are found under the Star t menu, under Programs, then under LifeBook Application Panel. They include a CD Player, Restar t Application Panel, Software Instructions and Stop Application Panel. The Lif eBook Application Panel system mak es your LifeBook notebook more than just another notebook computer.
The panel consists of the following elements:
SELECTOR SWITCH
Located at the far left of the panel, this switch allo ws you to select the function of the panel—either as an Applica-tion Launcher, a CD player, or as a lock.
The buttons can be locked and unlocked by pressing either of the selector switch positions for four seconds or longer (The green LCD lit on the selector switch will turn off). When the selector s witch is in Lock mode, the buttons are disabled and do nothing when pressed.
Application Launch CD Player Buttons
When the selector switch is in the Application position, pressing any of the buttons will launch a user­defined application. When the selector s witch is in the CD Player position, the b uttons operate the CD player.
Configuring your Lifebook Application Panel
When you start your system, the LifeBook Application Panel is automatically activated.
As an application launcher, the LifeBook Application Panel is very flexible, giving you a variety of options. To set up the Panel to best suit your needs, we have provided the Application Panel Setup utility that quickly and easily helps you make the most of this valuable feature.
16
Page 32
To configure your LifeBook Application Panel with Application Panel Setup:
1. Click on Start.
2. Click on All Programs.
3. Click on Control Panel.
4. Click on Application Panel.
The Application Panel Setup utility will appear. There are tabs that correspond to the application buttons on the LifeBook Application P anel. When you receive y our LifeBook notebook, these b uttons are pre-configured to launch specific programs.
Critical Point
The tabs in Application Panel Setup may not be in the same order as the buttons on your LifeBook notebook. Please select the tab you wish to change carefully.
To change an application associated with one of the buttons, click on the tab for the b utton you would like to reconfigure. Click on Browse from the Start Menu, scroll down the list of applications, click on the application you wish to launch with this button, and then clic k OK. The button will now launch the new application.
One of the buttons may be preconfigured to launch y our default Internet browser. In order to reconfigure it to launch a different program, follow these easy steps:
SECTION 1
1. Click on Other from the Internet browser box.
2. Click on Browse from Start Menu.
3. Scroll do wn the list of applications, and clic k on the application you wish to launch with this b utton.
4. Click OK.
The button will now launch the new application. If y ou want to return to launching your default Internet browser with this button, you need only clic k on “Default Internet Browser” from the Internet browser box. Be aware that you will erase the settings for the “other application”. If you wish to go back to launching the “other application” from this button, y ou will need to reconfigure it as described abov e .
At the bottom of each application setup page are two selectable options. The first will enable/disable the button when your Lif eBook notebook is in Standby mode , and the second will enab le/disab le the button when your Lif e-Book notebook is in the pseudo-off state. Y ou can enab le/disable either or both of these functions simply by clicking on the option.
17
Page 33
Critical Point
If you choose to have the buttons work when the Life-Book notebook is in standby, they will function even if hit accidentally, and will turn on your LifeBook note-book e ven if y ou are not present or using your LifeBook notebook. This could deplete your battery, and you will need to recharge it before using the LifeBook notebook. As a precaution, press the selector switch for f our or more seconds to loc k the buttons when you are away from your LifeBook notebook. To unlock the buttons, repeat the procedure.
When you have finished with Application Panel Setup, click on OK, and the new settings will take effect. You can reconfigure your LifeBook Application Panel as often as you like.
Using the CD Player
The CD player enables y ou to use y our LifeBook note-book’s CD player drive as an audio CD play er .
Critical Point
If you shut down from Windows while the media player is playing an audio CD, it will stop. You cannot go into Suspend Mode or Hibernation (Save-to-Disk) Mode while the media player is playing a CD. The CD player will only play when the system is powered on.
There is no configuration required for CD player operation. The buttons are pre-configured to work like a normal CD player . When the selector switch is in the bottom position, the buttons will operate as follows:
Stop/Eject: This is the first b utton to the right of the Selector switch. If you press it once, it will stop an audio CD that is playing. If you press it twice, it will eject the audio CD.
Play/P ause: This is the second button to the right of the Selector s witch. Press this button to start playing an audio CD starting at Track 1. While the audio CD is playing, press it to pause. Press it again to continue.
Critical P oint
If you choose to have the buttons work when the If you press the play button and nothing happens, you either have the Selector switch lock ed, there is no audio CD in the CD player drive, you have a CD other than an audio CD in the drive, or system is not powered on.
18
Page 34
Fast Bac kward: This is the third button to the right of the Selector switch. Press this button once
to skip one track back.
Fast Forward: This is the fourth button to the right of the Selector switch. Press this b utton once
to skip forward one track.
Desktop Control Panel
Your LifeBook notebook includes a desktop control panel for your notebook’s desktop that you can use at any time. You may use this panel to operate the CD pla y er when y ou ha v e the Selector s witch in the Application position or Lock mode.
To use the desktop control panel:
1. Click on Start.
2. Click on All Programs.
3. Click on LifeBook Application Panel.
4. Click on CD Player
The desktop control panel will appear in the upper right corner of your screen. To close the panel:
1. Click on the “x” button.
To minimize the panel:
2. Click on the “-” button.
You can select from four appearances f or your desktop control panel. Simply double clic k on the track display area of the panel, and a menu will appear which will allow you to select from a pull down menu. On the same pop-up are two other options: “Alw ays on top” and “Continuous Play”. If you clic k on “Always on top” the desktop controls will always be seen on your screen, no matter what other application you are running. If y ou clic k on “Contin uous Pla y”, your CD player will automatically start over at the beginning of the CD in the drive as soon as it finishes the last track.
SECTION 1
You can move the desktop control panel to anywhere on your desktop . Dr ag it by clic king on the track number display, holding it down, and dragging the control panel. When y ou place it where y ou would like, release the mouse button.
Critical Point
If you hav e y our displa y set to 256 colors , the basic displa y will appear no matter which one you select. You will need to set your display colors to more than 256 in order to select other display appearances. When you close the CD player’s desktop control panel, it will stop the audio CD player. Simply press the Play button if you would like to continue listening, and the CD player will restart at track 1. The Selector switch must be in the CD player posi-tion.
19
Page 35
Deactivating and Activating the LifeBook Application Panel
To deactivate the LifeBook Application Panel, follow these easy steps:
1. Click on Start.
2. Click on All Programs.
3. Click on LifeBook Application Panel.
4. Click on Stop Application Panel
To reactivate, follow the same procedure, except for step 4. Click on Restart Application Panel.
Critical Point
Every time you start Windows, the Lif eBook Application P anel is activated, e v en if you deac­tivated it before you shut down.
Application Panel Setup
If you insert an audio CD which has both audio and data tracks into the CD player driv e , the CD player may fail to play the first audio track.
The Volume Up, V olume Down and Mute controls f or the CD play er desktop control panel adjusts the vol-ume of the CD audio line only . It does not adjust your Lif eBook notebook’ s master software volume control.
The CD player desktop control panel is designed to be displa y ed in High Color (16-bit) or in True Color (24-bit or more). If you have y our LifeBook note-book’ s displa y set for 256 colors or less CD Player will display in a “basic” mode.
20
Page 36
SECTION 1
5. Running the Computer on its Battery
Recharging the Battery
1. Connect the AC adapter to your computer.
When you connect the AC adapter to your computer, the AC adapter automatically starts to charge the internal battery pack, and the charging status indicator ( ) and the battery life remaining at that time are displayed on the operating status indicator LCD.
2. After the charging status indicator has gone off, disconnect the AC adapter from your
computer.
Critical Point
Recharge the supplied battery pack prior to first using it after purchase or if it is not recharged for more than one month. Once the battery has been fully charged, the charging status indicator goes off and the battery life indicator at the left end stops blinking ( ) and goes on ( ). Allow suffi­cient time for the battery to be fully charged. When the battery is 90% or more charged, it cannot be recharged even if the AC adapter is connected. The battery can be recharged when its remaining life is 89% or less. The chargeability of the battery degrades when it is used in an extremely hot or cold place. When the battery is very hot, for example, immediately after the use of the computer, the battery protection function may be activated to prevent the battery from being recharged. (The charging status indicator blinks.) In such a case, stop charging the battery and wait for a while until the battery temperature comes down.
SECTION 1
Running the Computer on its Battery
To run your computer on its internal battery pack, perform these steps.
1. Disconnect the AC adapter from your computer and press the power button.
Power button
(Your computer or situation may not look exactly like this illustration.)
21
Page 37
Critical Point
The battery runs down in a relatively short time when it is used in a cold place. The chargeability of the battery degrades over time and its life shortens accordingly after it has been used over an e xtended period of time. If the battery goes dead soon, replace it with a new battery. A rise in battery temperature may slow down the operation of y our computer. If this happens, connect the AC adapter to your computer.
Checking the Remaining Battery Life
The remaining battery life is displayed on the operating status indicator LCD when the battery is being charged or your computer is turned on.
Indication of the remaining battery life
The remaining battery life is approximately between 100% and 76%. The remaining battery life is approximately between 75% and 51%. The remaining battery life is approximately between 50% and 26%. The remaining battery life is approximately between 25% and 13%.
(During charging, it indicates that the remaining battery life is approximately between 0% and 25%.)
Indicates that the battery is weak (remaining life: 12% or less). blinks.
Indicates that the battery is completely exhausted (remaining life: 0%).
Critical Point
For reasons of lithium-ion battery properties, the battery life indicator may not correctly indicate the remaining battery life under some circumstances (temperature conditions, number of times the battery has been recharged, and so on). When the battery is still 90% or more charged, it cannot be recharged even if you connect the AC adapter to your computer. The battery can be recharged when its remaining life is 89% or less.
22
Page 38
Indication of a battery problem
Indicates that the battery cannot be charged for some reason or other.
Critical Point
If is displa yed, turn off your computer, remove and install the battery all over again. If this persists, your might hav e to replace the battery pack with a new one because it is most likely defective.
Low battery condition When the battery is discharged to a critically low level, the battery life indicator on the
operating status indicator LCD blinks ( ). If it blinks, connect the AC adapter to your computer to recharge the battery.
Critical Point
The use of a weak battery could result in the lost of data you are currently working with or saving. When the battery r uns low, connect the AC adapter to your computer as soon as possible, or if no AC adapter is available, immediately save the data you are working with, exit all programs and turn off your computer. Reading or writing data on the hard disk requires a large amount of electrical power. There­fore, when the battery is weak, connect the AC adapter to your computer before reading or writing data on the hard disk. Leaving the battery weak for a certain period of time causes the computer to automatically go into standby mode. When data is being read or written on the hard disk, however, the computer will not go into standby mode before the data reading or writing process is com­plete. By default, your computer is set so that it will go into standby mode when the battery life reaches about 3%. To change this setting, follow these steps: Open the Power Options Properties dialog box, click the Alarms tab, and then click “Set off low battery alarm when power level reaches” in
the Low battery alarm section to activate this option ( changes to ). Note that changing this setting causes your computer to shut down as soon as the battery goes dead, and could result in the lost of data not saved or could make your computer unstable.
SECTION 1
Cautions in Using the Battery Pack
W ARNING
ELECTRIC SHOCK
• The battery pack is shock-sensitive . To av oid damage due to shock, be careful not to drop the battery pack when installing or removing it. For safety’s sake, do not use a battery once it has been shocked. The use of a damaged battery could result in an electric shock or explosion.
23
Page 39
Do not take the battery apart.
Taking the batter y apart or touching its internal components could result in an electric shock or fire.
Electrical discharge
• It is good practice to always recharge the battery before use since it is discharged spontaneously.
• When you kno w you will not use the computer f or a long period of time (for one month or more), remove the battery pack from your computer and keep it in a cool place . Leaving the battery in the computer without recharging for a long period of time causes it to be discharged excessively and shortens its useful life.
Useful life of the battery
• The battery runs down and deteriorates over time even if it is not used. To check the battery condition, Èherefore, you should run your computer on its internal battery at least once a month.
• Leaving the battery in a hot place causes it to go dead and deteriorate in a short time.
• The battery pack is consumable and its chargeability degrades gradually over time. When the battery has reached the end of its useful life, replace it with a new one.
• When the battery is approaching the end of its useful life, it goes dead in a very short time.
• When the battery has reached the end of its useful life, remo v e it from the computer. Leaving it in the computer could result in an electric shock or fire.
Disposal of the battery pack
• Before disposing of the battery pack, take measures to prevent it from shorting, for example, sealing its connector with an insulating tape. After removing the internal battery pack, do not mix it with other batteries. The internal battery pack (lithium-ion battery) contains precious resources. Therefore, you should dispose of the disused battery pack as a recyclable material whenever possible. For the recycling of batteries, see Recycling of batteries. (To see Recycling of batteries, select Setting up the computer, Appendixes, and Recycling of batteries.)
Battery life
• The energy-saving features of your computer help you conserve battery power.
• Battery life greatly varies according to the ambient temperature. The life of a battery may shorten when it is used in a cold place.
You should power your computer from the AC adapter when:
• Using a online service or navigating the Internet,
• Using the hard disk or DVD/CD drive frequently,
• Connecting to a LAN,
• Restoring the computer to its original state,
• Connecting two or more external devices , such as PC cards and USB devices, to your computer at the same time.
24
Page 40
Changing the Internal Battery Pack
W ARNING
ELECTRIC SHOCK
Be sure to turn off your computer before changing the internal battery pack. To avoid shock hazards and damage to your computer, be careful not to touch internal components of the computer, including the battery connector.
1. Turn off your computer.
2. Close the LCD panel, and place your computer upside down.
IMPORTANT
• Close the LCD panel gently to avoid damage due to shock. Failure to do so could result in damage to the LCD panel.
3. Remove the battery pack while pressing the lugs in the direction of the arrow.
The internal battery pack is disengaged from the connector.
Lug
SECTION 1
Internal battery pack
(Your computer or situation may not look exactly like this illustration.)
Lug
25
Page 41
4. Install a new battery pack.
With the slits in the battery pack aligned with the projections on the computer, place the battery pack in the battery bay and push it down until it clicks into place.
Lug
Lug
Internal battery pack
Critical Point
After removing the internal battery pack, take measures to prevent it from shorting, for e xample, sealing its connector with an insulating tape. After removing the battery pack, do not mix it with other batteries. The internal battery pack (lithium-ion battery) contains precious resources. Therefore, you should dispose of the disused battery pack as a recyclable material whenever possible.
26
Page 42
SECTION 1
6. Using the Optical Disk Drive
In this manual, CD-ROMs, audio CDs and CD-R/RW discs are collectively referred to as CDs, and DVD-ROMs and DVD-Videos as DVDs. Also, CDs and DVDs are sometimes referred to simply as discs.
CAUTION
INJURY
When inserting or removing a CD or DVD , be careful not to catch y our finger in the tra y to avoid possible injury to your finger.
Cautions in Using CD/DVDs
Take the following precautions when handling CDs and DVDs.
• Handle discs with care so that they are free from fingerprints, dust and flaws. Fingerprints, dust and flaws on a disc could prevent inf ormation from being read from it or being
written/rewritten on it correctly . Also , the y could prev ent audio CDs and DVD-Videos from being played back normally.
• Do not stick any label to a disc or do not write anything on it with a pencil or ballpoint pen.
• Be careful not to spill coffee or any other liquid on a disc.
• When a disc is dirty or wet, wipe it outward from the center with a slightly moistened cloth, and then with a dry cloth.
SECTION 1
Do not dry it with a hairdryer or do not let it dry itself.
• Do not use benzene, thinner, water, record cleaner , antistatic agent, or a silicone cloth to clean discs.
• Keep discs in their cases whenever they are not in use.
• Do not bend a disc or do not put a heavy object on top of it.
• Do not keep discs in a hot or cold place.
IMPORTANT
• Most publications, including music and videos, are protected b y cop yright. You are not allowed to record or copy such publications (including the con version of data f ormats) for an y purpose. If you want to use sound and video files f or any purpose other than the above, e.g., delivering them over a network, you have to obtain prior consent from the copyright holder.
27
Page 43
Supported discs
CD-ROM, Audio CD, Video CD, Photo CD
CD-R CD-RW
DVD-ROM
DVD-VIDEO
Reading (playback) *1O OOO *2 Writing X O O X Rewriting X X O X
*1 : Some discs may be incompatible with your drive or may require a playback program. *2 : DVD-ROMs refer to DVDs containing information intended for use with a computer, such as programs.
D VD-Videos refer to DVDs containing audio and video files. D VD-RAM, DVD-RW, DVD+RW and DVD-Audio discs cannot be used with your CD/DVD drive.
Critical Point
Use round CD/DVDs but not CD/DVDs of any irregular form (e.g., star-shaped or card type CD/DVDs). CD/DVDs of irregular form could prevent your CD/DVD drive from reading or writing data correctly, or could result in damage to your drive. Some copy-protected audio CDs may not be played back on your CD/DVD drive. Dropouts may occur during the playbac k of an audio CD . If they occur , follo w the steps below to switch to analog pla y mode. Note that, in analog pla y mode, no audio files can be recorded directly on the MD recorder connected to the optical digital output terminal on your computer.
28
Page 44
1. Click the Start button and select Control Panel.
2. Click Performance and Maintenance, and then System.
3. Click the Hardware tab and select Device manager.
4. Click the plus sign beside DVD/CD-ROM drive, and then double-click the CD/DVD drive that is displayed under it.
5. On the Properties page, click “Enable this CD-ROM device to play digital audio CDs“ to deactivate it ( changes to ), and then click OK.
When you are using Media Player to play audio CDs, perform the steps below, too.
6. Start Media Player.
7. Click Tools, then Options.
8. On the Devices page, make sure that the DVD/CD-RW drive is selected, and then click Properties.
9. Click the option button for Analog under Playback and then click OK.
10. Click OK in the Options window.
11. Restart your computer.
SECTION 1
Critical Point
The region code of your computer is [3] by default. Region codes are assigned to DVD­Videos on a country-by-country basis. D VD-Videos with a region code other than [3] ma y not be played back on your CD/DVD drive. Some D VDs are protected from unauthorized copying. For cop yright protection, your computer has descramble and authentication functions. So, if attempt is made to play an audio or video file copied from a copy-protected disc, an authentication error will occur to stop if from being played back.
29
Page 45
Inserting a Disc
IMPORTANT
• When accessing the CD/D VD drive frequently or pla ying a DVD-Video, you should power your computer from the AC adapter.
• When inserting a disc, fit the hole in the disk on the stopper at the center of the tray, and push it down until it clicks into place.
Failure to do so may cause the disc to come off and damage the tray or the disc itself.
• When a self-starting disc is loaded in the CD/DVD drive, do not place the computer into standb y (pause) mode.
Otherwise, the disk will start twice when the computer resumes operation, and may cause the computer to malfunction. If the disc starts twice, exit all prog rams started from it, and eject and load the disc again.
• CDs and D VDs sometimes vibrate and whistle, because the y rotate at very high speeds when data is being read from them.
1. Press the CD eject button.
The tray springs out a little.
CD eject button
(Your computer or situation may not look exactly like this illustration.)
2. Pull out the tray gently.
30
Tray
Page 46
Critical Point
If the tray will not comes out If the computer is turned off, turn it on, and then press the CD eject button. You can press the eject button at any time, e ven when the on the operating status indi­cator LED blinks.
3. Place a disc on the tray while holding the tray with a hand.
Fit the hole in the disc on the stopper at the center of the tray with the title-printed face up, and push it down until it clicks into place. Failure to do so may make it impossible to play or eject the CD.
Projection
SECTION 1
Tray
Critical Point
When inserting a disc, fit the hole in the disc on the stopper at the center of the tray to prevent the disc from coming off and hitting against the computer main unit.
4. Push the tray gently into the drive.
It is about 10 seconds before the CD gets ready for use.
Tray
31
Page 47
Critical Point
Multi-session discs may take a little longer to start than other types of discs. When you insert an audio CD while Windows is running, Windows Media Player may auto­matically start and play the CD. You can use either Media Pla y er or the one-touch b uttons to control the playback of the CD.
Removing a Disc
1. Exit all programs started from the disc, if any.
2. Press the CD eject button.
The tray springs out a little.
CD eject button
(Your computer or situation may not look exactly like this illustration.)
32
Page 48
3. Pull out the tray gently.
Tray
Critical Point
If the tray will not comes out If the computer is turned off, turn it on, and then press the CD eject button. You can press the eject button at any time, e v en when on the operating status indicator LED blinks.
SECTION 1
4. Remove the disk while holding the tray with a hand.
Lift the edge of the disc while pressing down the stopper at the center of the tray. At that time , be careful not to hit the disc against the computer main unit.
Stopper
Tray
5. Push the tray gently into the drive.
33
Page 49
Critical Point
If the disc cannot be ejected
1. Click the Start button and select My Computer.
2. In the My Computer window, right-click CD/DVD drive in the Drives with Removable Stor age area.
3. Click Eject. The tray springs out a little.
4. Pull out the tray gently and remove the disc.
If this does not work well, perform these steps.
1. Turn off your computer.
2. Insert a straightened paperclip, and the like, into the pinhole by the side of the CD eject button.
The tray springs out.
3. Pull out the tray gently and remove the disc.
CD eject button
(Your computer or situation may not look exactly like this illustration.)
34
Page 50
SECTION 1
7. Internal Modem
About the Built-in Modem
Your computer came with a V.90-compliant built-in fax modem.
CA UTION
ELECTRIC SHOCK
To avoid shock hazards, do not put your finger into a phone jack (for modular cables) on the wall.
BREAKAGE
To avoid damage to your computer, do not plug a modular cable in any port other than the modem port.
Plugging in a Modular Cable
1. Plug the supplied modular cable in the modem port on the left-hand side of your computer .
Insert the connector until it clicks into place.
SECTION 1
MODEM port
(Your computer or situation may not look exactly like this illustration.)
35
Page 51
2. Unplug the telephone’s modular cable from the phone jack on the wall.
Pull out the cable while holding down the stopper.
IMPORTANT
• If a rosette type phone jack is used, it needs be changed to a modular type. Changing a phone jack from rosette type to modular type must be done by an authorized technician or under his or her supervision. So, if you need to change the phone jack, you will have to ask your local office or branch.
Modular type Rosette type
3. Plug the modular cable from your computer in the phone jack on the wall.
Insert the other end of the modular cable from your computer into the modular type phone jack.
36
Page 52
Critical Point
Your telephone cannot be used when its modular cable is disconnected. So , do not f orget to plug it again after using the built-in modem. If you run the modular cable close to a household electrical appliance or tie it in a bundle, a communications error could occur. If the supplied modular cable is too short to connect your computer to the phone jack on the wall, use a commercially availab le modular cable instead. Note that the use of a long modular cable could result in a reduction in the data transfer rate or a communication error.
IMPORTANT
• If you navigate the Internet for a long time while leaving programs active, a heavy load is applied to the CPU of your computer and communications via the built-in modem may be broken unexpectedly. If this happens, exit all running programs other than the Web browser and e-mail program before connecting to the Internet again.
SECTION 1
37
Page 53
SECTION 1
8. Using a LAN
Using a LAN
Preparing necessary items
LAN cable
Network connection device
Instruction manual for network connection device
There are two types of LAN cables: str aight type and cross type . Select a cable appropriate to the data transfer rate of the network you w ant to use.
Prepare a device that serves your purpose of connecting to a LAN. Here are some examples of network connection devices.
• Dialup router
• Cable modem
• ADSL modem
• Hub
Methods of connection vary among network connection devices. So , read the instruction manual for your network connection device, too.
Connecting a LAN Cable
W ARNING
ELECTRIC SHOCK
Before connecting a LAN cable to your computer, always turn off the computer and disconnect the AC adapter from it to avoid shock hazards.
ELECTRIC SHOCK
When it thunders, turn off the computer and disconnect the AC adapter and the LAN cable from it as soon as possible. Failure to do so could result in damage to your computer or a fire due to a thunderbolt.
CA UTION
ELECTRIC SHOCK
Do not put you finger into the LAN port, or you might get an electric shock.
BREAKAGE
To avoid damage to your computer , do not plug a LAN cab le in an y port other than the LAN port.
38
Page 54
1. Turn off the computer and disconnect the AC adapter from it.
2. Plug a LAN cable in the LAN port on the back of the computer.
Lan connector
(Your computer or situation may not look exactly like this illustration.)
3. Connect the LAN cable to the network connection device.
4. Plug the LAN cable in the network device.
Plug the other end of the cable connected in step 2 in the port on the network connection device, and turn on the network connection device.
SECTION 1
5. Connect the AC adapter to the computer and turn on the computer.
6. Click the Start button and select Control Panel.
7. Click Performance and Maintenance, then Power Options.
8. On the Power Schemes page, set the items below, and click OK when you are through.
- System standby: Never
- System hibernates: Never These settings prevent Windows from automatically placing your computer into standby or hibernation mode.
39
Page 55
IMPORTANT
• When you are connected to a network (such as the Internet), do not place your computer into standby or hibernation mode, otherwise your computer may not maintain connection with the network. Whenever your computer is not in use, it should be turned off.
• When you want to connect to an e xisting network, ask the network administrator what and how you should set up.
Critical Point
When disconnecting the LAN cable from your computer , pull out the connector while holding down the stopper on it, otherwise the connector could be broken. When connecting to a LAN, you should power y our computer from the AC adapter whene ver possible, since data transfer over a network requires a large amount of electrical power.
40
Page 56
SECTION 1
9.
About the Integrated Wireless Lan
(For selected model)
Preface
Thank you for purchasing the Fujitsu LifeBook. This document describes the setup of this personal computer for using the Wireless LAN
compliant with IEEE802.11b. Before starting up this personal computer, read this document and operate the computer properly.
SECTION 1
41
Page 57
Notice to the User
Wireless interoperability
This personal computer is designed so that it achieves the collabor ation of an intercommunications system with Wireless LAN products based on the wireless LAN technology of the Direct Sequence Spread Spectrum (DD-SS) scheme. This personal computer also complies with the Wireless LAN Standard “Wi-Fi” defined by the “Wi-Fi Alliance” which verifies interconnectability between Wireless LAN products.
Effects of radio-wave radiation on environments
• As with other high-frequency units, this personal computer emits high-frequency energy. The level of the energy emitted from this personal computer is controlled well below the electromagnetic energy emitted from, for example, a cellular phone or other wireless devices or units.
• Since it operates within high-frequency safety standards and officially recommended guidelines , this personal computer ensures safety for the user. These standards and recommendations incorporate the unified view of the scientific world and are based on the deliberations of research teams and on the rules and conventions established at the commissions consisting of scientists who scan and interpret the contents of extensive research bibliography on a continual basis.
• Under specific circumstances and environments, the use of this personal computer may be limited by the owners of buildings and the responsib le representative persons of organizations. An example of the specific circumstances and environments referred to here is shown below.
– Use under the environment where there is the danger of interference with other units, devices ,
or services
• If you are not sure about the guidelines applied to the use of wireless units or devices in a specific organization or environment (such as an airport), before turning on the power of this personal computer, please contact the corresponding organization or b uilding owner and confirm whether it is necessary to obtain permission for the use of the computer.
Effects of radio-wave radiation on the human body
The output power radiated from this personal computer is suppressed well below the radio-w av e radiation limit specified by FCC. Nevertheless, this personal computer must be used so that the voltage applied will be minimized with respect to human contact under normal operating conditions. During the use of the computer, touching its antenna must be avoided as far as possible.
42
Page 58
Precautions on interference
• This personal computer generates, uses, and radiates high-frequency energy.
• If this personal computer is not set up or used in accordance with this document, harmful interference ma y be caused to wireless communications.
• If this personal computer causes harmful interference to radio or tele vision receiv ers (whether this is actually happening can be identified by powering on and off the computer), use either of the following methods to remove the cause of the interference:
– Extend the distance between the main unit of the computer and the radio or television receiver . – Connect the main unit of the computer to either outlet of a power circuit separate from that of
the outlet to which the receiver is connected.
– Consult with a qualified and experienced radio/television electrical engineer.
• Do not modify this personal computer improperly.
• The manufacturer does not bear responsibility for interference with the radio or the television due to improper modification of this personal computer.
• Other wireless equipment may be using the same frequency as that of this personal computer . Strictly observe the following precautions as well in order to av oid electromagnetic interference with other wireless equipment:
Operating precautions on this product
SECTION 1
• The wireless equipment bearing the label shown above operates at 2.4 GHz. This type of equipment employs the modulation scheme called “DS-SS”.
• Not only microwave ovens and other industrial, scientific, and/or medical equipment, but also the local wireless stations used in plants, manufacturing lines, etc. to identify mobile bodies (the use of these wireless stations requires a license) and specified low-power wireless stations (the use of these wireless stations does not require a license) are placed in operation in the operating frequency band of this product.
1. Before using this product, make sure that local wireless stations for the identification of
mobile bodies or specified low-power wireless stations are not in operation nearby.
2. If electromagnetic interference with any local wireless stations for the identification of
mobile bodies is caused by the use of this product, immediately stop the emission of the radio waves first.
43
Page 59
Representation of Symbols and Others in this Document
About examples of display
Screens appearing in this manual are just examples. Depending on the model, disk and kind of data used actually , screens shown in this manual ma y differ in part or in file name, etc. from those appearing in your LifeBook.
Symbols and others used in text
The meanings of the symbols used in text are listed below.
Symbol with/without word Meaning
IMPORTANT Critical Point
Reference page
Product names
The product names appearing in this document are represented in abbreviated form as follo ws:
Product name Representation in text Microsoft® Windows® XP Home Edition Windows or Windows XP Microsoft® Windows® XP Professional
Denotes operating precautions or the acts that must not be performed. Be absolutely certain to read this section.
Denotes items related to operations. Read this section as required.
Microsoft and Windows are registered trademarks of the US Microsoft Cor poration in the United States of America and other countries. Other product names are trademarks or registered trademarks of the respective companies. Other products are copyrighted by the respective companies.
Copyright© FUJITSU LIMITED 2003 All Rights Reserved. The use of display windows is licensed by the US Microsoft Corporation.
44
Page 60
SECTION 2
Before Using the Wireless LAN Function
Outline
This section explains features of the wireless LAN function and what you can do using this LAN function.
Features of the wireless LAN function
Some of major features are listed below.
The Wireless LAN function uses a 2.4-GHz low-power communications system.
The Direct Sequence Spread Spectrum (DD-SS) scheme is employed that is highly resistant to noise.
This LAN function complies with “Wi-Fi” and allows wireless communications at a maximum communications speed of 11 Mbps.
The use of the required network name (SSID) and network key allo ws accessing by unauthorized persons to be prevented.
SECTION 1
Network configuration of the wireless LAN
The use of the wireless LAN function allows connection to any of the f ollowing two types of networks:
Ad hoc connection
The network constructed by the personal computers containing the wireless LAN function is referred to as the “ad hoc wireless LAN”, and the connection method used in this case is ref erred as “ad hoc connection.” The use of this function allows you to e xchange files and share a printer, by selecting the functions, such as “Network Connection”, that the Microsoft network supports. To use ad hoc connection, it is necessary to enter the same network name (SSID) and the same network key f or all the personal computers that are to be connected. If there are any channels to be used for wireless LAN connection, it is also necessary to assign the same data to the channels. Communication is possible, provided that the personal computers to communicate with each other are located within the respective intercommunication service areas. Network connection can be implemented easily and at low costs by using ad hoc connection.
45
Page 61
The following illustration shows an example of ad hoc connection:
Infrastructure connection
The network that uses one type of hub called the station, such as an optional wireless broadband router, is referred to as the “infrastructure wireless LAN”, and the connection method used in this case is referred as “infrastructure connection.” The use of this function allows connection to a wired LAN via a station, and connection to the Broadband Internet. For details of the station, refer to the manuals accompanying the station. The following illustration shows an example of infrastructure connection:
Internet
Wireless LAN
ADSL modem,
cable modem,
or the like
Note:
An optional hub for a wired LAN may be required according to the type of station to be used.
46
Wired LAN
Station (Note)
Page 62
For better communications
This personal computer may not operate properly according to the particular operating environment. Strictly observe the following precautions when installing the main unit of the computer:
Since this personal computer and equipment compliant with IEEE802.11a differ in operation frequency, it is not possible to communicate between both. Be careful of this.
The recommended wireless communications distance is within a line-of-sight radius of 25 meters. For reasons related to the characteristics of the wireless LAN, howe ver , the actual communications distance depends on the structure or materials type of building in which the wireless LAN function is to be used, the presence/absence of obstructions, the types of software to be used, installation status, radio-wav e status, or other operating conditions . Decreases in communications speed or a communications failure may also occur.
Distance the main unit of this personal computer from other electric appliances. If the main unit of the person computer is installed near a powered-on electric appliance, the computer may not be able to communicate properly or trouble may occur in the electric appliance.
If the computer is unable to communicate properly , change the channel to be used or the installation location. During the use of a microw ave o ven or other equipment generating strong high-frequency energy, in particular, the personal computer ma y be highly susceptib le to the energy and unab le to communicate properly.
If a broadcasting station or wireless communications equipment is present nearby and this pre vents the computer from communicating properly, moving the main unit of the computer is suggested. Radio interference may also occur if the intensity of ambient radio waves is too high.
About radio interference with the Bluetooth Since the BluetoothTM and the wireless LAN operate at the same frequency (2.4 GHz), if the
BluetoothTM is used near the main unit of this personal computer, radio interference may occur, leading to decreases in communications speed or to a connection failure. If these e vents actually occur, undertake the following countermeasures:
– Space the BluetoothTM and the main unit of the personal computer by a distance of at least 10
meters.
– Within a distance of 10 meters, turn off the power of either the BluetoothTM or the main unit of
the personal computer.
TM
SECTION 1
47
Page 63
When communication cannot be done normally
If multiple personal computers are connected with a wireless LAN and files of volume data are copied through the LAN at the same time, failure in normal communication may occur because of poor radio wav es. In such a case, w ait for end of comm unication and try to connect with the network once more.
Stopping the Transmission of Radio Waves
T o use this product inside hospitals, clinics , or airplanes, or in other places where the use of electronic equipment is regulated, stop the transmission of radio waves from the wireless LAN beforehand.
To turn off radio wave by the wireless switch
Switch off the wireless switch of the LifeBook, radio wave of the wireless LAN is turned off.
To turn off radio wave by Windows
1. Click the icon (Utility) in the notification area appearing in the lower right side of the screen with the right button of the mouse.
2. Click “Disable Radio”.
Radio wave of the wireless LAN is turned off.
Critical Point
If “Enable Radio” is clicked when radio wave is off, radio wave transmission is resumed.
48
Page 64
Starting the transmission of radio waves
To communicate using the wireless LAN function, set the personal computer to a status in which it can transmit radio waves.
1. Switch on the wireless switch.
2. Click the icon (Utility) in the notification area appearing in the lower right side of the
screen with the right button of the mouse.
3. Click “Enable Radio”.
In case of the infrastructure connection, the wireless LAN starts radio wave transmission. In case of the “ad hoc” connection, proceed to the step 4.
4. Restart the personal computer.
SECTION 1
49
Page 65
SECTION 1
Connection
Flow of Operations
The wireless LAN connection procedure is outlined below.
1 Make sure that the personal computer is ready for the transmission of radio waves from
the wireless LAN.
2 Assign the parameters required for wireless LAN connection.
1. Enter the network name (SSID) and other data.
2. Enter the network key (the key to be used to encode communications data).
3 Perform setting operations relating to network connection.
1. Specify TCP/IP as the protocol, and confirm the name of the work group and other settings.
2. Enter the data required for file/printer sharing on the network. Perform this operation as
required.
3. For infrastructure connection, enter data for the station.
4. Verify that you have been able to connect your computer to the network.
50
Page 66
Preparation for Using the Wireless LAN
Preparation necessary for using the wireless LAN (parameter setting) is explained below.
IMPORTANT
• When connecting with the existing network, confirm details of the setting to the network administrator.
• The wireless LAN (Compliant with IEEE802.11b) used for the LifeBook uses channel-1 to channel-11 as radio channels. If it is intended to use the wireless LAN by the infrastructure connection (network through the station), check the radio channel to use, there is a case that the radio channel of the station has been set at a channel higher than channel-11 by initial setting or automatic setting. If so, reset the radio channel of the station at a channel from channel-1 to channel-11. For details of channel setting, refer to the manual of the station currently in use.
Critical Point
When using the wireless LAN by the infrastructure connection (network through the station), refer to the manual of the station for setting of the station. When setting up a new wireless LAN to connect with other personal computers having the wireless LAN function by the ad hoc connection, there is no need to set a radio channel (frequency band), because this PC automatically detects the channel used in the wireless LAN to connect and performs communication on the detected channel. The initial setting of the channel is 11. When you need to change the channel setting, refer to “Setting of channels during ad hoc connection” For connecting with the Internet using ADSL (PPP oE) through the infrastructure connection, it is required to change the MTU size of the personal computer. For details, refer to the manual of the station.
SECTION 1
1. Click the “Start” button and then “Control panel”.
2. Click the “Network Connection”.
3. Click the “Wireless network connection” in the table with the right button of the mouse, and click the “Properties” in the menu that appears on the following table.
51
Page 67
4. Click the “Wireless Networks” tab.
(The contents of the screen differ depending on the model and situation.)
5. Make sure that the “Use Windows to configure my wireless network settings” has been checked as .
6. Click the “Add” of the “Preferred networks”.
The “Wireless Network Properties” window is shown on the screen.
7. Click the “Association” tab.
52
Page 68
8. Enter the data for encoding communications data.
In case of the ad hoc connection
1. Input a “Network name (SSID)”. Input the same network name within 32 letters in condensed type (half-size character)
for all personal computers to be connected.
2. Click the check box of the “This is a computer-to-computer (ad hoc) network; wireless access points are not used” so that it turns into .
In case of the infrastructure connection (network through station)
1. Input a “Network name (SSID)”. Input a name properly to the station to connect. For setting the station, refer to the
manual of the station.
2. Click the check box of the “This is a computer-to-computer (ad hoc) network; wireless access points are not used” so that it turns into .
Next, proceed to setting to encode communication data.
IMPORTANT
• It is strongly recommended to set a network key to encode communication data. If no network key is set, there is a fear that data may be stolen by other users because the network can be accessed by all personal computers having the wireless LAN function.
SECTION 1
9. Click the check box ( ) of the “Data encryption (WEP enabled)” to turn it into . In case of the ad hoc connection
Click the check box ( ) of the “Network Authentication (Shared mode)” to turn it into .
In case of the infrastructure connection
If the connecting station is set for the common key (shared key) authentication, click the check box ( ) of the “Network Authentication (Shared mode)” to turn it into .
In case of the open system authentication, click the check box ( ) to turn it into . For setting of the station, refer to the manual of the station.
53
Page 69
10. Click the check box ( ) of the “The key is provided for me automatically” to turn it into .
11. Input a “Network key” properly to the connection system to use.
Key input can be done in tw o ke y systems of “ASCII character” and “Hexadecimal character code”, but it is advised to do it in the “ASCII character” in general.
In case of the ad hoc connection
Set the same value for all personal computers to connect.
In case of the infrastructure connection
Set the key properly to the station to connect. For setting of the station, refer to the manual of the station.
Critical Point
If there is any wireless LAN equipment whose network key is set in a he xadecimal character code in the network, input the hexadecimal character code. The key system is automatically discriminated by n umber of characters of the input network key. Characters (letters and numbers) usable for the “Network key” are as follows.
In case of the ASCII character key system: 0-9, A-Z, a-z, _ (underscore)
In case of the hexadecimal character code key system: 0-9, A-F, a-f
Number of characters that can be input as a “Network ke y” differs depending on the netw ork key system, specifications of the wireless LAN equipment to connect.
In case of the ASCII character key system: 5 characters for 64-bit WEP, or, 13 characters for 128-bit WEP
In case of the hexadecimal character code key system: 10 digits for 64-bit WEP, or, 26 digits for 128-bit WEP
54
Page 70
12. Input a value for the “Network key”.
Input the same value as the “Netw ork key” input in the preceding step 11. If a diff erent value is input, setting results in failure.
13. Confirm that the “Key index (Advanced)” is set as “1”.
The “Key index (Advanced)” can be set in maximum four from “1” to “4”. Set “1” generally.
14. Click the “Authentication” tab and then click the check bo x of the “Enable network
access control using IEEE802.1X” so that it becomes .
SECTION 1
Critical Point
In case of restricting the access of wireless LAN clients using IEEE802.1X authentication, put a check mark on “Enable network access control using IEEE802.1X“. In case of home use, remove a check mark on “Enable network access control using IEEE802.1X“. For the method of setting related with IEEE802.1X authentication, refer to the station man ual.
15. Click the “OK”.
55
Page 71
16. Confirm that the network name input as the “Network name (SSID)” by the step 8 is added to the “Preferred networks”.
(The contents of the screen differ depending on the model and situation.)
Critical Point
If there are multiple settings in the “Preferred network”, another setting may have priority over the desired network because of communication condition. It is recommended to register only one setting of the desired network to avoid confusion.
17. Click the “OK”.
18. Click the “Start” b utton and click “Turn off computer”. Then, c lick the “Restart” in the “"Turn off computer” menu.
The personal computer restarts.
19. Click the “Power options” in the “Control panel”.
20. Set the following items and click “OK”.
Click the “Power Schemes” tab to turn the “System standby” and “System hibernates”
into never .
Click the “Hibernate” tab and make sure that the “Hibernate mode” is not chec ked ( ).
If the check box is , click the box ( ) to turn it into . Then, the personal computer is set not to enter standby mode or hibernate mode automati­cally.
Next, proceed to setting up the network.
56
Page 72
SECTION 1
Connection to the network
This section explains connection to the network.
Setting the network
IMPORTANT
• If a cable LAN has been set up, be careful not to compete with the cab le LAN setting. If wireless LAN setting compete against the existing cable LAN setting, the network fails in normal communication.
• During connection with a network (Internet, etc.) using the LAN function, it is advised not to enter the personal computer into the standby or hibernate mode, because the personal computer fails in normal connection with a network (Internet, etc.) depending on the use environment. When the personal computer is not used, be sure to shut down the system.
• When connecting with an existing network, consult with the administrator of the network about setting in detail.
• For connecting with the Internet by ADSL through a station such as an optional wireless broad­band rooter, etc., ref er to the manual of the station and other manuals pro vided by the provider and line enterprise for setting.
TCP/IP setting
1. Click the “Start” button and “Control panel”.
2. Click the “Network connection”. The table of network connections appears on the display.
3. Click the “Wireless Network Connection” appearing in the table by the right button of the mouse, and click the “Properties” in the menu.
SECTION 1
4. Click the “Internet protocol (TCP/IP)” in the table of the “This connection uses the following item”, and then click the “Properties”.
5. Set an IP address.
57
Page 73
In the case there is a DHCP server such as the broad-band rooter , etc. in the station
or network in the infrastructure connection.
1. Make sure that both the “Obtain IP address automatically” and “Obtain address of DNS
server automatically” are marked with . If those are marked with , click to turn the both into .
In the case there is no DHCP server in the station or network in the ad hoc or
infrastructure connection.
1. Click of the “Use the following IP address” so that it turns into .
2. Input an IP address in the “IP address” box.
Example: 192.168.0.1
3. Input a value in the “Subnet mask” box.
Example: 255.255.255.0
6. Click “OK”.
Next, confirm the full computer name and work group name.
Confirmation of computer name, work group name
Critical Point
For changing the computer name and/or work group name, log in the Windows as the account of “Administrator of computer” or a member of the “Administrators” group.
1. Click the “Start” button and “Control panel”.
2. Click the “Performance and maintenance”.
3. Click the “System”.
The “System Properties” window appears.
4. Click the “Computer name” tab.
58
Page 74
5. Confirm the “Computer name” and “Work group name”. For c hanging the name, c lick the “Change” and input a new name.
SECTION 1
• Computer name
The computer name is used to identify the computer in the network. Each personal computer can be named optionally. When naming a computer, input the name within 15 characters (including numeric) of condensed type (half-sized character). It is recommended to input a name including the model name or user name for easy discrimination.
• Work group
The name of the network group should be inputted within 15 characters (including numeric) of condensed type (half-sized character). Generally set personal computers connected with the same network as those of the same work group.
6. Click “OK”.
If a message to confirm restart of the computer, restart it following instructions on the screen.
59
Page 75
Setting the sharing function
Set the sharing function to make file and/or printer sharing with other network-connected personal computers valid.
The setting operation is not required unless the sharing function is to be used. The folder and printer for which the sharing function has been set will be usable from an y personal
computer present on the network.
Setting of Microsoft network service for common use
1. Click the “Start” button and “Control panel” in this order.
2. Click the “Network and Internet connection”.
The table of network connection is shown on the screen.
3. Click the “Wireless network connection” in the table by the right button of the mouse, and then click the “Properties” in the menu shown next.
4. Make sure that there is a check mark ( ) in the check box of the file and printer sharing for Microsoft network” in the table of “This connection uses the following item”, and then c lick the “OK”.
If the check box is , click to turn it into and click the “OK”.
Critical Point
If the “File and printer sharing for Microsoft network” is not shown on the screen, install it following the procedure mentioned below.
1. Click the “Install”. The “Select type of network component” window appears on the screen.
2. Click the “Service” in the table and then click the “Add”. The “Select network service” window appears.
3. Click the “File and printer sharing Microsoft network” in the table, and then clic k the “OK”.
4. The “File and printer sharing for Microsoft network” is shown in the table of “This connection uses the following item”. After confir ming the check mark for the “File and printer sharing for Microsoft network”, click the “Close”.
60
Page 76
Setting for sharing a file
The following explains setting sharing of a “work” folder in the C drive.
1. Click the icon (My computer) on the desktop.
2. Click the “Local disk (C:)”.
3. Click the “work” folder by the right button of the mouse, and click the “sharing and
security” in the menu shown following. The “Work Properties” window appears.
4. Click the “"Sharing” tab.
Critical Point
If the “If you understand the security risk, and you want to share the file without runing the wizerd, click here” is already clicked, this page is not shown. Proceed to the step 6.
SECTION 1
The contents of the “Common use and security in network” are changed.
61
Page 77
5. Click the “Sharing this folder on the network” and then “OK”.
6. Click the check box ( ) of the “Sharing this folder on the network” to turn it into .
Critical Point
For setting the share f older for read only, click the check box ( ) of the “Allo w network users to change my files” to turn it into .
7. Click the “OK”.
The folder is set for sharing, and the icon of the “work” folder turns into .
62
Page 78
Setting for sharing a printer
1. Click the “Start” button and “Printer and other Hardware”.
The “Printer and other Hardware” window appears.
2. Click the printer to set it for sharing by the right button of the mouse, and click the
“Sharing” in the menu shown following.
3. Click of the “Share this printer” to turn it into .
4. For changing the printer name shown in the “Share name”, input a new printer
name.
5. Click the “OK”.
SECTION 1
The printer is set for sharing use and the icon of the printer changes so that it indicates common use.
63
Page 79
Confirming connection
After you hav e finished the network setup operations, access the folder whose sharing has been set for other personal computers. Also, confirm the status of the radio waves in case of trouble such as a network connection failure.
Critical Point
In the case of infrastructure connection, enter the necessary data for the station before confirming connection. Refer to the manual of the station for the station setup procedure.
Connecting your personal computer to another personal computer
1. Click the icon (My computer) on the desktop.
2. Click the “My Networks Places” in the list of others.
64
Page 80
3. Click the “"View workgroup computers” in the list of the Network task.
The table of computers of the work group in which you are joining in is shown.
4. Click the personal computer that is desired to connect.
The folder set in the “Setting of sharing use of personal computers” is shown.
5. Click the folder that is desired to connect.
The contents of the folder are shown and the folder becomes usable.
SECTION 1
Check radio wave condition
1. Click the icon (Utility) in the notification area in the lower right of the screen by the
right button of the mouse.
The “Broadcom Wireless Configuration Utility” window appears.
2. Click the “Open Utility”.
The “Broadcom Wireless Configuration Utility” window appears.
65
Page 81
3. Check the radio wave condition on the “Link Status” tab page. The present connection condition is shown.
When radio wav e is turned off or the computer is not yet connected, connection condition is not shown for some items.
Item
Status (connected • not yet connected
• Disable Radio, etc.) Network name (SSID) BSSID
Data encryption (WEP)
Speed (transmission)
Channel
Client IP Address Network Connection Type Radio state
Comment
Connection condition, radio wave transmission condition, etc. are shown.
Input network name (SSID) is shown. In the infrastructure connection, the MAC address of
the station currently in connection is shown. In the ad hoc connection, the value is shown also but it is not the MAC address of the client in the ad hoc connection.
When the network key is used, “Enabled” appears in this line. When the network ke y is not use, “Disabled” appears.
The present transmission rate is shown in Mbps. No reception rate is shown.
The channel currently in use for communication is shown.
The IP address is shown. “Infrastructure” or “ad hoc” is shown. When radio wave is outputted, “Enable Radio”
appears.
Signal
Noise
When you fail in connection with the network or want to confirm the connection, refer to the “Troubleshooting”.
66
The longer the indication of the bar graph is, the better the radio wave condition is.
The shorter the indication of the bar graph is, the better the radio wave condition is under a little influence of noise.
Page 82
SECTION 1
Appendix
Other Settings
Other wireless LAN settings are described.
Setting of channels during ad hoc connection
IMPORTANT
• You can set channels during ad hoc connection.
• Channel 11 is set by default.
• When connecting a personal computer with the existing ad hoc connection, it is required to change the channel setting to meet the channel in use.
• This setting is effective in the ad hoc connection only. In the infrastructure connection, the channel is automatically set to match to the station.
1. Log on the computer by the account of the computer administrator or as an administrator or a member of administrators group.
2. Click the icon (My computer) on the desktop and right click on "My computer" and select properties.
The “System properties” window appears.
3. Click the “Device manager” of the “Hardware” tab.
The “Device manager” window appears.
SECTION 1
4. Double click the “Br oadcom BCM4306 Wireless LAN Adapter” in the “Network contr oller”.
The “Broadcom BCM4306 Wireless LAN Adapter properties” window appears.
5. Change the channel by the “IBSS Channel Number” of the “Setting of details” tab.
6. Click the “OK”.
7. Click and all the windows are closed.
67
Page 83
SECTION 1
Troubleshooting
Causes and countermeasures for troubles you ma y encounter while using wireless LAN are described. Refer to the relevant item.
Unavailable connection to the network
Even if you double-click “Network computer” icon, no other computer will be displayed or no connection can be established if it is displayed.
During infrastructure connection, you cannot connect to the station.
“Incorrect network name (SSID) or network key”“Unmatched “Network authentication (shared mode) settings”“Incorrect setting of IP address”“Incorrectly-performed network setting”“Under the condition of stopped electric wave transmission”“In case of the LifeBook, the channel set for the station is out of the usable channels for this
PC.”
“Unreachable electric wave due to poor condition of electric wave”“Active channel duplication due to multiple wireless LAN networks on the same floor, etc.”“The computer to be connected with is turned OFF.”“No right of access to the network to be connected with”“It takes too long to retrieve the network and display the connected computers.”“The connection is cut off several minutes after the personal computer is connected with the
station.”
Incorrect network name (SSID) or network key
Countermeasure
In case of ad hoc connection, set the network names (SSIDs) and network keys of all computers to be connected to the same values. In case of infrastructure connection, set the network name (SSID) and network key to the same values as those of station. Also , set the network authentication according to the station.
In case of the Windows XP, setting of the “Network authentication (shared mode)” is different from others concerned.
Countermeasure
When the setting of the “Network authentication (shared mode)” does not correspond to the station and personal computer, no communication is performed in the network.
Check the setting referring to the “Preparation for using the wireless LAN”.
68
Page 84
Setting of IP address is not correct.
Countermeasure
Check the setting of the network. If the protocol in use is TCP/IP, the IP address can be checked by the following procedure.
1 Operate as follows.
• In case of the Windows XP Click the “Start” button, “All programs”, “Accessory” and “Command prompt”.
2 Input the “IPCONFIG” command on the “Command prompt” pa ge , and press the [Enter] key .
Example: In the case the C drive is the hard disk drive,
C: >ipconfig [Enter]
Check to see if the IP address is normally shown on the screen.
IP Address..........: 10.0.1.3
Subnet Mask..........: 255.255.255.0
Default Gateway..........: 10.0.1.1
When IP address is displayed as “169.254.XXX.YYY” or “0.0.0.0”, IP address is not correctly fetched from the station. In that case, restart the computer itself. If the displa y is still unchanged, check the setting of TCP/IP. If “Cab le Disconnected” or “Media Disconnected” is display ed without showing IP address, check the setting of network name (SSID) and network key. Also, set the network authentication according to the station.
Incorrectly-performed network setting
SECTION 1
Countermeasure
Check the protocol, work group name or shared setting.
Under the condition of stopped electric wave transmission
Countermeasure
Check if the wireless switch is turned ON.Also make sure of “Disable Radio” (condition of sending electric wave) in “Network setting” window.Refer to “Starting the transmission of radio waves”.
69
Page 85
The set channel for the station is different from those which can be used by this computer.
Countermeasure
Set the channel of station within the range of 1~11. For the method of setting, refer to the station manual.
Unreachable electric wave due to poor condition of electric wave
Countermeasure
In case of ad hoc connection, retry connection after shortening the distance to the destination computer or removing any obstacle for better sight. In case of infrastructure connection, retry connection after shortening the distance to the station or removing any obstacle for better sight.
Active channel duplication due to multiple wireless LAN networks on the same floor, etc.
Countermeasure
If there is any other wireless LAN network nearby , change channels to a void active channel duplication.
The computer to be connected with is turned OFF
Countermeasure
Check if the computer to be connected is turned ON.
No right of access to the network to be connected with
Countermeasure
Check if you have a right of access to the network to be connected with.
70
Page 86
It takes too long to retrieve the network and display the connected computers
Countermeasure
Retrieve computers in the following procedure:
• In case of the Windows XP 1 Click “Start” button, then click “search”. 2 Click “Computer or people”. 3 Click “Computers on the network”. 4 Input the name of computer to be connected with in “Computer name” and click “search”. 5 Click the icon of connected computer.
Disconnected communication a few minutes after every connection to the station
Countermeasure
Check the setting of the “Enable network access control using IEEE802.1X”.
Critical Point
In case of restricting the access of wireless LAN clients using IEEE802.1X authentication, put a check mark on “Enable network access control using IEEE802.1X”. In case of home use, remove a check mark on “Enable network access control using IEEE802.1X”. For the method of setting related with IEEE802.1X authentication, refer to the station manual.
SECTION 1
Connection check with executed PING command
Check if IP pack et has correctly reached the destination by executing PING command in the f ollowing procedure:
Critical Point
In order to execute PING command, it is necessary to install TCP/IP protocol in advance.
71
Page 87
1 Operate as follows.
• In case of the Windows XP Click the “Start” button, “All programs”, “Accessory” and “Command prompt”.
2 At command prompt, input ping command as follows:
Example: In case of C drive being a hard disk and IP address being 10.0.1.3
C: >ipconfig [Enter]
If properly connected, the following screen will be displayed:
Pinging 10.0.1.3 with 32 bytes of data:
Reply from 10.0.1.3: bytes=32 time=1ms TTL=32 Reply from 10.0.1.3: bytes=32 time<10ms TTL=32 Reply from 10.0.1.3: bytes=32 time=4ms TTL=32 Reply from 10.0.1.3: bytes=32 time<10ms TTL=32
In case of no connection, “Request timed out” or “Destination host unreachable” will be displayed. In that case, refer to “Unavailable connection to the network”.
72
Page 88
SECTIONSECTION
SECTION
SECTIONSECTION
SECTIONSECTION
SECTION
SECTIONSECTION
22
2
22
22
2
22
This section explains installation of options for this computer.
SECTION 2
Page 89
SECTION 2
1. Using a PC Card
Cautions in Using a PC Card
CAUTION
BREAKAGE
A PC card is composed of static-sensitive parts, and it is easily broken by static dis­charged from a human body. Before touching a PC card, always touch an appropriate metal object to discharge static from your body.
To avoid damage, take the following precautions when using PC cards.
• Do not place PC cards in a hot place or where they will be exposed to direct sunlight.
• Be careful not to shock PC cards
• Do not put a heavy object on top of a PC card.
• Be careful not to spill coffee or any other liquid on a PC card.
• Keep PC cards in their cases whenever they are not in use.
Supported PC Cards
Your computer suppor ts PC Card Standard-compliant Type I, Type II and Type III PC cards, which include, for example, the following:
• SCSI Card
This type of PC card is needed to connect a storage device, such as an SCSI-compliant hard disk or MO (magneto-optical) drive, to your computer.
Critical Point
Two PC cards may not be used at the same time with your computer , depending on the type of PC card used. For more information, refer to the documentation supplied with your PC card. Your computer does not support PC cards with a rated voltage of 12V. Some types of PC cards cannot be inserted in the upper PC card slot.
Preparing Necessary Items
PC Card PC Card driver
Instruction Manual for PC card
Prepare a PC card that meets your needs. Some PC cards come with a CD or floppy disk that contains their respective
drivers. Setup procedures vary from PC card to PC card. So , read the documentation
supplied with your PC card before starting its setup.
74
Page 90
Inserting a PC Card
CAUTION
INJURY
When inserting a PC card into a PC card slot, be careful not to put your finger into the slot, otherwise you could injure your finger.
Critical Point
Before using a PC card, you might need to turn off your computer or to install the device driver, depending on the type of PC card used. When your computer is loaded with two PC cards, it should be powered from the A C adapter to prevent the deterioration of the internal battery pack.
1. Install a PC card.
Insert the PC card as far as it will go with the labeled face up.
SECTION 2
PC card
(Your computer or situation may not look exactly like this illustration.)
2. If necessary, install the driver before inserting the card for the first time.
Some PC cards require no driver to be installed. If necessary, however, install the driver for your PC card according to the instructions in its manual. To install a driver, you might need a CD or floppy disk that contains it.
3. Make sure that (remove hardware safel y) is displayed in the notification area in the bottom-
right corner of the screen.
If this icon is not displayed, eject the PC card b y perf orming steps 3 and 4 in the Removing a PC card section, and then insert it again.
Critical Point
For PC cards with a cord, do not put an object on top of the connector connecting the cord to the PC card to avoid damage to the connected.
PC card slot
75
Page 91
Removing a PC Card
Here is the explanation of how to remove a PC card.
Critical Point
When removing a PC card with a cord, do not pull its cord to av oid damage to it. To remove a PC card when your computer is turned on, always follow the steps below. Failure to do so could damage your computer or PC card. Some PC cards cannot be removed when the computer is running. To check whether your PC card is of this type or not, read your PC card manual carefully before use.
CAUTION
HOT
A PC card may be hot immediately after use. When removing a PC card, do not pull out the PC card immediately after use but wait for a while after you are through step 3, otherwise you could burn your fingers.
INJURY
When removing a PC card, be careful not to put your finger into the PC card slot, otherwise you could injure your finger.
1. Click (remove hardware safely) in the notification area in the bottom-right corner of the screen.
Critical Point
Remove a PC card by perf orming these steps: double-click (remove hardware safely) in the notification area in the bottom-right corner of the screen and click Stop in the Remove Hard-
ware dialog box that appears. Otherwise, the operation of your computer may become unstable.
2. Click “Remove the XXX safely”
XXX denotes the name of the PC card used.
Critical Point
If a message appears, telling you that the device should be stopped later because the de vice general-purpose volume is not ready to stop, click OK, chec k to be sure that the PC card you want to remove is not being accessed, and then perform steps 1 and 2 over again.
76
Page 92
3. When the Remove Hardware dialog box appears, press the PC card eject button.
The PC card eject button springs out.
PC card eject button
(Your computer or situation may not look exactly like this illustration.)
4. Remove the PC card.
Press the PC card eject button again and pull out the PC card that came out a little.
SECTION 2
PC card
PC card eject button
77
Page 93
SECTION 2
2. Adding Memory
Critical Point
Here are the size of the memory that came standard with your computer, and the maximum size of the memory that can be installed on your computer.
Memory installed Max.Memory expandable to 256MB 768MB
Preparing Necessary Items
Memory (Expanded RAM module)
Philips screwdriver (Size: #1)
You can purchase the memory module from your supplier.
Used to remove screws from the computer. To avoid damage to screw heads, use a screwdriver appropriate to the size of the screws (M2.5).
Installing Memory
W ARNING
ELECTRIC SHOCK
When installing or removing memory , be sure to turn off your computer and disconnect the AC adapter from it to avoid shock hazards.
SWALLOWING
Keep small objects, such as a cover , caps and scre ws, out of the reach of babies and children to avoid the danger of suffocation. In case a baby or child has sw allow ed such an object, consult the doctor immediately.
78
Page 94
CA UTION
HOT
Some components around the memory slot are very hot immediately after use. To avoid burns, do not install or remove memory immediately after turning off the computer but wait for a while until its internal components cool down.
BREAKAGE
When installing or removing memory, hold its edge so as not to touch any terminal or IC. Also, be careful not to touch internal components or terminals of the computer. Touching these parts with oily fingers could result in poor electrical contact.
BREAKAGE
Memory is composed of static-sensitive parts, and it is easily broken by static discharged from a human body . Before touching memory , alw ays touch an appropriate metal object to discharge static from your body.
BREAKAGE
When installing or removing memory , be sure to turn off your computer . If y ou install or remove memory with the computer placed in standby or hibernation mode, data not saved could be lost or the computer or memory could be broken.
SECTION 2
Critical Point
To avoid damage, do not to touch internal components unnecessarily. To avoid damage, be careful not to drop small objects removed, such as screws, into the computer.
1. Turn off your computer and disconnect the AC adapter from it.
2. Slide the cover to the left to remove it.
Cover
(Your computer or situation may not look exactly like this illustration.)
79
Page 95
3. Lift the lugs on the keyboard in the direction of the arrow, and pull it gently toward the LCD panel.
Lug
4. Lift the keyboard gently to open it.
Keyboard
Expansion RAM module slot
5. Install memory.
Remove the memory slot cover, insert the memory diagonally into the slot with the notch in the memory aligned with the projection on the connector, and then turn the memory down until it clicks into place.
Notch in the memory
6. Close the keyboard gently.
Close the keyboard with the lugs on it aligned with the lugs on the computer main unit. At that time, be careful that no cable gets caught between the keyboard and the computer main unit.
Keyboard
Lugs on the keyboard
80
Page 96
7. Attach the cover removed in step 2.
Remove the memory
Cover
Checking the memory capacity
IMPORTANT
• In case memor y is not installed properly, the error message “Expansion memory error” or another message will be displayed in English when you first turn on the computer after installing the memory. If such a message appears, press the power button to shut down the computer, and reinstall the memory.
1. Turn on the computer.
2. Click the Start button and select Control Panel.
The Control Panel window is displayed.
3. Click Performance and Maintenance, and then System.
The System Properties dialog box is displayed.
SECTION 2
4. Check whether the circled numeric value in the figure belo w has increased by the size of the memory you have added.
The System Properties dialog box appears.
Memory capacity
In this example, 256 MB of memory on the system. The memory capacity displayed may be 64 MB less than the actual memory capacity , depend how much memory you allocate from the BIOS for the Video memory. You either can select 16MB,32MB or 64MB f or the Video memory.
5. Click OK.
The Performance and Maintenance window appears again.
Critical Point
If the numeric value displayed does not agree with the memory capacity of your computer, check to see if the memory is installed properly.
81
Page 97
Changing Memory
1. Turn off your computer and disconnect the AC adapter from it.
2. Slide the cover to the left to remove it.
Cover
(Your computer or situation may not look exactly like this illustration.)
3. Lift the lugs on the keyboard in the direction of the arrow , then pull it gently toward the LCD panel.
Lug
4. Lift the keyboard gently to open it.
Keyboard
Expanded RAM module slot
82
Page 98
5. Remove the memory.
Remove the cover of the memory slot and remove the hook on each side from the memory module. The memory comes up slightly. Then, pull the memory diagonally up to remove it from the slot.
Hook
6. Install a new memory module.
Insert the memor y diagonally into the slot with the notch in the memory aligned with the projection on the connector, and then turn the memory down until it clicks into place.
Notch in the memory
SECTION 2
7. Close the keyboard gently.
Close the keyboard with the lugs on it aligned with the lugs on the computer main unit. At that time, be careful that no cable gets caught between the k eyboard and the computer main unit.
Keyboard
Lugs on the keyboard
83
Page 99
8. Attach the cover removed in step 2.
Cover
Critical Point
After you have changed memory, check the memory capacity of you computer to be sure that the memory is installed properly.
84
Page 100
SECTION 2
3. Using a Memory Card
Supported Memory Cards
The SD card/Memory stick slot directly reads and writes data recorded on memory cards designed for portable digital devices, such as digital cameras.
The SD card/Memory stick slot of your computer supports two types of memory cards (only one card can be used at a time), so that you do not need to pur chase an adapter f or each type of memory card.
Inserting a Memory Card
IMPORTANT
• For the handling of your memory card and data recorded on it, refer to the documentation supplied with your memory card and the peripheral device used with it.
• Do not use Windows XP to format memory cards that are used with a digital camera, and so on. Formatting such memory cards, using Windows XP, make it impossible for them to be used with the digital camera. If you hav e formatted such memory cards, using Windo ws XP, ref ormat them using your digital camera. F or the method of f ormatting memory cards, refer to the documentation supplied with your digital camera.
SECTION 2
85
Loading...