isit registration.gateway.com and discover the benefits of being a customer of
ateway.
Remark: All images are for reference purposes only. Actual configuration may vary.
Gateway NV77H / NV75S User Guide
Original Issue: 2 May 2011
Table of Contents - 3
STARTINGYOURCOMPUTER
Thank you for purchasing this Gateway computer!
This guide has been designed to introduce you to the features of your
computer and assist in your computing experience.
After setting up and starting your computer, as shown in the setup
instructions, it will ask you questions that will help you connect to the
Internet. Your computer will then configure installed software.
WIRELESSCONNECTION
To connect to a wireless network, first check the wireless features of your
computer are on, and that the router or modem you want to connect to is
also correctly configured.
• If wireless is not on, press the communication key () to open the
Launch Manager and make sure Wi-Fi is On.
• Your computer will detect and display any available networks, select
your network and enter the password, if required.
• After a short delay, your computer should connect to the Internet.
If your network is not detected, or your computer does not connect to the
Internet, please refer to your ISP or router’s documentation. After your
computer starts and you can use it, open Internet Explorer and follow the
instructions.
4
Alternatively, use a network cable to connect directly to a network port
on your router. Please refer to your ISP or router’s guide.
REGISTRATION
When using your computer for the first time, it is recommended that you
register it. This gives you access to some useful benefits, such as:
• Faster service from our trained representatives.
• Membership in the Gateway community: receive promotions and
participate in customer surveys.
• The latest news from Gateway.
How to register
During the initial startup of your computer, a window will invite you to
register. Please fill in the information and click Next. The second window
you'll see contains optional fields that will help us to provide you with a
more personable customer service experience.
Another option
Another way to register your Gateway product is to visit our website at
registration.gateway.com. Choose your country and follow the simple
instructions.
After registering, you will be sent a confirmation email with important
information that you should keep in a safe place.
Starting your computer - 5
SOFTWAREINSTALLATION
Your computer will automatically install software and prepare your
computer for use. This may take some time, please do not turn off your
computer; wait until the installation has finished.
RECOVERY
You should create recovery discs as soon as you are able. The Gateway
Recovery Management program allow you to create recovery discs and
then to restore or reinstall applications and drivers provided by Gateway.
You will need a pack of writable DVDs.
HAVINGTROUBLE?
Gateway provides several options to support your purchase.
Gateway support
Make sure you write down your computer serial number, date and place of
purchase and model name on the area provided in this guide; save your
proof of purchase. Before you call us, please write down any error
message that accompanies the problem, and have the computer in front of
you and switched on if possible. Having these items to hand when
contacting us will ensure better and quicker service.
Gateway website
Remember to visit www.gateway.com - Check out the support section for
up-to-date information, help, drivers and downloads.
6
Warranty and contact information
You can find information about the warranty for your computer and how to
contact technical support in your computer’s Warranty.
Starting your computer - 7
COMPUTER BASICS
SAFETYANDCOMFORT
Safety precautions
Please follow the guidelines below to use your computer comfortably and
to avoid health problems.
Computer environment
Make sure that the computer:
• Is used on a stable surface, stand or table. A fall can seriously damage
the computer.
• Is not used on a surface that vibrates, or used when taking part in sport,
exercise or other activities in a dynamic environment. Vibration or
movement can loosen fastenings, damage internal components and
even cause battery leakage.
• Is away from direct sunlight and sources of heat.
• Is away from magnetic fields or any device generating static electricity.
• Is kept at least 30 centimetres (one foot) away from a mobile phone.
• Is not in a dusty or damp environment.
• Is not used near water. Never spill liquids of any kind on or into your
computer.
• Is not placed on a carpet or any other surface that may have an
electrical charge.
8
Cables
Make sure that:
• Cables are not strained and that there is no risk of people walking or
tripping over them.
• Other devices do not crush the cables.
• The power cable is connected to the computer before connecting the
power cable to the AC power outlet.
• The power cable is unplugged from the power outlet before
disconnecting the power cable from the computer.
• Three-pin power cords are connected to a grounded power outlet.
• The power outlet is easily accessible and as close to the computer as
possible (do not overload it with too many adapters).
If your computer uses an external AC adapter:
• Do not cover or place objects on the AC adapter. Allow the adapter to
cool properly during use by keeping it clear of objects.
• Only use the AC adapter that is supplied with your computer. Although
other adapters may look similar, using them can damage your computer.
If a replacement is required, use only parts certified for use with your
computer.
Cleaning your computer
• Always unplug your computer from the power outlet before cleaning it.
• Do not use liquid or aerosol cleaners, use a damp cloth instead.
• Never spray cleaning product directly on the screen.
Computer Basics - 9
• If you spill liquid on your computer, switch it off immediately, unplug the
AC adapter, remove the battery and make sure it is completely dry
before switching it on again. Wait overnight if necessary.
Note: If your computer includes slots for memory cards or expansion
devices, plastic ’dummies’ may be installed in the card slots. Dummies
protect unused slots from dust, metal objects or other particles. Save
the dummies for use when no cards are in the slots.
Servicing your computer
Do not attempt to service your computer yourself, as opening or removing
covers may expose you to dangerous voltage or other risks. Refer all
servicing to qualified service personnel.
Unplug your computer from the wall outlet and refer servicing to qualified
service personnel when:
• the power cord or plug is damaged, cut or frayed,
• liquid was spilled into the product,
• the product was exposed to rain or water,
• the product has been dropped or the case has been damaged,
• the product exhibits a distinct change in performance,
• the product does not operate normally after following the operating
instructions
Note: Adjust only those controls that are covered by the operating
instructions, since improper adjustment of other controls may result in
damage and will often require extensive work by a qualified technician
to restore the product to normal condition.
10
Health precautions
• The computer and accessories may contain small parts. Keep them out
of the reach of small children.
• If you work or play for hours at a time, then make sure you take regular
breaks. Look away from the computer's screen once in a while. Do not
use your computer if you are tired.
• Arrange your computer so that you can work in a natural and relaxed
position. Place items that you use frequently within easy reach.
• Position your computer directly in front of you for increased safety and
comfort. Ensure that your keyboard and touchpad are at a comfortable
height. The screen should be about 45-70 cm (18-30 inches) from your
eyes.
If you use your computer for long periods while sitting at a desk, invest
in an external keyboard for improved comfort.
• To protect your hearing, when using speakers or headphones, increase
volume gradually until you can hear clearly and comfortably; do not
increase the volume level after your ears have adjusted. Do not listen to
high volumes for extended periods. Do not increase the volume to block
out noisy surroundings; decrease the volume if you cannot hear people
speaking near you.
• The computer’s underside, power adapter and the air from
ventilation slots may become hot during use. Avoid continuous
body contact and do not place the computer on your lap while it
is operating.
Computer Basics - 11
• Ensure that the computer’s ventilation slots and openings are never
obstructed or covered. Do not place the computer on a soft surface
(such as a carpet, chair or bed) that may block ventilation slots.
• Do not push objects of any kind into ventilation or case slots as they
may touch dangerous voltage points or short-out parts that may result in
a fire or electric shock.
• Some disorders of the hands, wrists, arms, neck, shoulders, legs and
back may be associated with, or aggravated by certain repetitive
actions. To reduce your risk of developing these disorders, type with
your wrists straight and your hands and wrists floating above the
keyboard. If you experience periods of pain, tingling, numbness or other
discomfort, please contact your doctor.
• We advise that parents monitor the use of games by their children. If you
or your child experience any of the following symptoms: dizziness,
blurred vision, eye or muscle twitches, loss of consciousness,
disorientation, any involuntary movement or convulsion, IMMEDIATELY
discontinue use and consult your doctor. This may happen even if the
person has no medical history of epilepsy.
12
GETTINGTOKNOWYOUR
COMPUTER
After setting up your computer, as illustrated in the setup instructions, let
us show you around your new Gateway computer.
Getting to know your computer - 13
TOPVIEW - DISPLAY
1
2
3
#IconItemDescription
1WebcamWeb camera for video communication.
2MicrophoneInternal microphone for sound recording.
3Display screen
14
Also called Liquid-Crystal Display (LCD),
displays computer output.
TOPVIEW - KEYBOARD
4
5
6
9
7
#IconItemDescription
4
5Keyboard
6Touchpad
Power button /
indicator
Turns the computer on and off. Indicates the
computer's power status.
For entering data into your computer.
- Special keys are described on page 16.
Touch-sensitive pointing device which
functions like a computer mouse.
Getting to know your computer - 15
8
#IconItemDescription
Power indicatorIndicates the computer's power status.
Indicates the computer's battery status.
Battery indicator
7
HDD indicatorIndicates when the hard disk drive is active.
- Charging: The light shows amber when the
battery is charging.
- Fully charged: The light shows blue when in
AC mode.
Communication
indicator
8
9SpeakersDeliver stereo audio output.
- Note: The front panel indicators are visible even when the computer cover is closed.
Click buttons (left
and right)
Indicates the computer’s wireless connectivity
device status.
The left and right side of the button function as
left and right selection buttons.
Special keys
Your computer’s keyboard includes keys that activate special functions.
The function of each key is clearly marked with an icon.
Icon FunctionDescription
Hotkey for second
Fn
function
Activates a second function on certain keys.
E.g. press the Fn key to activate the F1 to F12 keys.
16
Icon FunctionDescription
HelpOpens the help menu.
Allows you to create backup copies of your computer;
Gateway
MyBackup
either the entire system or only selected files and
folders. Create a regular schedule or make copies
whenever you want.
Communication
Display toggle
Screen blank
Touchpad toggleTurns the internal touchpad on and off.
Play/PausePlay or pause a selected media file.
StopStop playing the selected media file.
PreviousReturn to the previous media file.
NextJump to the next media file.
Enables/disables the computer’s communication
devices.
Switches display output between the display screen,
external monitor (if connected) and both.
Turns the display screen backlight off to save power.
Press any key to return.
Getting to know your computer - 17
Icon FunctionDescription
Brightness downDecreases the screen brightness.
Brightness upIncreases the screen brightness.
Opens the Social Networks application.
Social Networking
Volume upIncreases the sound volume.
Volume downDecreases the sound volume.
Speaker toggleTurns the speakers on and off.
- If this application is not installed, the key will start
your instant messenging application.
Hotkeys
The computer uses hotkeys (key combinations) to access function keys
and navigation commands.
To activate hotkeys, press and hold the Fn key (bottom left) before
pressing the other key in the hotkey combination.
HotkeyFunctionDescription
Fn + Special
keys (see page
16)
Function keysActivates the F1 to F12 keys.
18
HotkeyFunctionDescription
Fn + HomeScrolls to the beginning of a document.
Fn + EndScrolls to the end of a document.
Fn + Page upScrolls up a page in a document.
Fn + Page DownScrolls down a page in a document.
- Note: It is not necessary to press the Fn key to use the F1 to F12 function keys when
starting your computer or when using the BIOS.
To swap the hotkey and special function of the F1 to F12 keys, change the function
key setting in the BIOS (to open the BIOS press F2 when starting your computer,
then select the Main menu and change Function key behavior to Function keys).
Touchpad
The touchpad controls the arrow on the screen; called the pointer or
the cursor. When you slide your finger across the touch-sensitive pad,
the pointer will follow this movement.
Multi-gesture
The touchpad supports Multi-gesture commands; it can recognise patterns
that use more than one finger. This allows you to control applications with
a few simple gestures, such as:
• Pinch: Quickly zoom in and out of
photos, maps and documents with a
simple finger-thumb gesture.
Getting to know your computer - 19
• Flip: Browse photos, websites or documents by sliding two fingers
horizontally.
• Rotate: Rotate photos or PDF files in 90° steps with a two-finger pivot
motion.
• Scroll: Swiftly navigate web pages, documents and music playlists up
or down by moving two fingers vertically.
FRONTVIEW
1
#IconItemDescription
Accepts Secure Digital (SD), MultiMediaCard
(MMC), Memory Stick PRO (MS PRO), xD-
1Multi-in-1 card reader
Picture Card (xD).
- Push to remove/install the card. Only one
card can operate at any given time.
20
REARVIEW
1
#IconItemDescription
1Battery bayHouses the computer's battery pack.
LEFTVIEW
2134567
#IconItemDescription
Kensington lock slot
1
Connects to a Kensington-compatible
computer security lock.
- Wrap the computer security lock cable
around an immovable object such as a table
or handle of a locked drawer.
Insert the lock into the notch and turn the key
to secure the lock.
Some keyless models are also available.
Getting to know your computer - 21
#IconItemDescription
2
3
Ventilation and
cooling fan
External display
(VGA) port
Allows the computer to stay cool.
- Do not cover or obstruct the openings.
Connects to a display device (e.g., external
monitor, LCD projector).
4HDMI port
5USB 2.0 port
6Microphone jackAccepts inputs from external microphones.
7
Headphones /
speaker jack
Supports high-definition digital video
connections.
Connect to USB devices (e.g., USB mouse,
USB camera).
Connects to audio line-out devices (e.g.,
speakers, headphones).
- Supports compatible 3.5 mm headsets with
built-in microphone (e.g. Acer smart
handheld headsets).
22
RIGHTVIEW
2134567
#IconItemDescription
Connect to USB devices (e.g., USB mouse,
USB camera).
1USB port
2Optical driveInternal optical drive; accepts CDs or DVDs.
- If the port is black, it is USB 2.0 compatible,
if the port is blue (optional) it is also USB 3.0
compatible.
3
4
5
Optical disk access
indicator
Optical drive eject
button
Emergency eject
hole
Lights up when the optical drive is active.
Ejects the optical disk from the drive.
Ejects the optical drive tray when the computer
is turned off.
- Carefully insert a straightened paper clip to
eject the optical drive tray.
Getting to know your computer - 23
#IconItemDescription
6Ethernet (RJ-45) port
7DC-in jackConnects to your computer’s AC adapter.
Connects to an Ethernet 10/100/1000-based
network.
BASEVIEW
1
2
3
#IconItemDescription
1Battery bayHouses the computer's battery pack.
4
2Battery release latch
24
Releases the battery for removal. Insert a
suitable tool and slide to release.
#IconItemDescription
Memory
compartment
3
Hard disk bay
Houses the computer's main memory.
Houses the computer's hard disk (secured with
screws).
4
Ventilation and
cooling fan
Allows the computer to stay cool.
- Do not cover or obstruct the openings.
Getting to know your computer - 25
UPGRADINGYOURCOMPUTER
EXPANDINGTHROUGHOPTIONS
Your computer offers you many options for a complete computing
experience.
Connectivity options
Ports allow you to connect peripheral devices to your computer. For
instructions on how to connect different external devices to the computer,
read the following section.
Memory card reader
Memory cards are used in a wide selection of digital
cameras, PDAs, MP3 players and mobile phones.
Inserting a memory card
1. Align the card so that the connector points towards
the port, with the connectors facing down.
2. Carefully slide the card into the port. If you find you need to use any
force to insert the card, try reorientating the card slightly.
3. Push the card until it clicks into place. A few millimetres of the card will
extend from beyond the slot.
If the card contains some files, the Windows Auto Play window may
appear (this depends on the contents of the card) and ask you if you wish
26
to use a program to access the contents of the card. Select an option
here if it is appropriate, otherwise select Cancel. If the card contains no
files, or unknown files, a window will open showing the contents of the
card.
SD, SDHC and SDXC cards
Different types of SD cards cover different capacities, while using the
same overall design. SD cards contain up to 4 GB, SDHC cards contain
up to 32 GB, and SDXC cards can contain up to 2048 GB (2 TB). Your
computer provides an SDHC or SDXC compatible card reader.
Note: SDXC memory cards can only be used in an SDXC-compatible
reader; SD and SDHC cards can be used in either type.
Removing a card from an memory card reader
1. Click on the Safely Remove
Hardware icon in the Notification
Area (next to the clock).
2. Click on Eject SD Card (or the
name of the device).
3. Wait until a Safe to Remove Hardware message is displayed.
4. Remove the card.
1
2
Upgrading your computer - 27
Built-in networking
The built-in networking allows you to connect your computer to an
Ethernet-based network.
Connect an Ethernet cable from the Ethernet (RJ-45) port on the
chassis of the computer to a network jack or hub on your network.
Universal Serial Bus (USB)
The USB port is a high-speed serial bus which allows you to connect USB
peripherals without taking up system resources.
28
Certain computers may include one or more USB 3.0 ports. These
resemble standard USB ports, except they include additional internal
connections and are blue. You may use USB 3.0 compatible devices with
these ports to benefit from faster transfer speeds.
Video port
Connect to a monitor with a VGA or DVI port (the type of connection
supported depends on your computer’s configuration). The appropriate
cable is usually included with the monitor.
Follow these steps to connect an monitor to your computer:
1. Check that the computer is powered off and the monitor power switch is
turned off.
2. Attach the video cable to the monitor port on the computer. Secure the
cable connection with the screws provided.
3. Connect the monitor power cable and plug it into a properly grounded
wall outlet.
4. Follow any setup instructions in the monitor's user's guide.
5. Turn on power to the monitor, then the computer.
6. Make sure that the current resolution and refresh rate do not exceed the
specifications of the monitor. If necessary change the display settings
used by the computer.
Note: To access the display controls: Click on Start, Control Panel,
Appearance and Personalization. Click on the Display category,
then select Change Display Settings.
Upgrading your computer - 29
High-Definition Multimedia Interface (only for certain models)
HDMI (High-Definition Multimedia Interface) is an industrysupported, uncompressed, all-digital audio/video interface.
HDMI provides an interface between any compatible digital
audio/video source, such as a set-top box, DVD player, and
A/V receiver and a compatible digital audio and/or video
monitor, such as a digital television (DTV), over a single
cable.
Use the HDMI port on your computer to connect with highend audio and video equipment. Single cable
implementation allows tidy setup and fast connection.
Headphones and microphone
These two ports allow you to connect audio devices. Use the headphone
port to plug in stereo headphones or powered speakers. Plugging an
audio device to the headphone port disables the built-in speakers. Use the
microphone port to connect an external microphone for mono recording;
plugging in an external microphone disables the built-in microphone.
30
POWERSUPPLY
AC POWERADAPTER
Your computer can use the supplied external power adapter (a power
'brick') to run on AC power. A power cable is provided that is appropriate
for the country where the computer was purchased.
The power adapter provides adequate power to run your computer and
recharge the battery pack at the same time.
Caution: Do not cover or place objects on the AC adapter.
Keeping the adapter clear of objects allows the adapter to cool
properly during use.
Only use the AC adapter that is supplied with your computer. Although
other adapters may look similar, using them can damage your computer.
Warning: The AC adapter and the underside of the computer can
become hot after prolonged use. This is normal, but may cause
injury with prolonged contact.
Power supply - 31
BATTERYPACK
The computer uses a battery pack that gives you extended use between
charges.
Battery pack characteristics
The battery pack has the following characteristics:
• Employs current battery technology standards.
• Delivers a battery-low warning.
The battery is recharged whenever you connect the computer to the AC
adapter. Your computer supports charge-in-use, enabling you to recharge
the battery while you continue to operate the computer. However,
recharging with the computer turned off results in a significantly faster
charge time.
The battery will come in handy when you travel or during a power failure. It
is advisable to have an extra fully-charged battery pack available as
backup. Contact your dealer for details on ordering a spare battery pack.
Maximizing the battery’s life
Like all other batteries, your computer’s battery will degrade over time.
This means that the battery's performance will diminish with time and use.
To maximize your battery’s life, you are advised to adhere to the
recommendations set out below.
32
Conditioning a new battery pack
Before you use a battery pack for the first time, there is a “conditioning”
process that you should follow:
1. Insert the new battery without turning the computer on.
2. Connect the AC adapter and fully charge the battery.
3. Disconnect the AC adapter.
4. Turn on the computer and operate using battery power.
5. Fully deplete the battery.
6. Reconnect the AC adapter and fully charge the battery again.
Follow these steps again until the battery has been charged and
discharged three times.
Use this conditioning process for all new batteries, or if a battery hasn’t
been used for a long time. If the computer is to be stored for more than
two weeks, you are advised to remove the battery pack from the unit.
Warning: Do not expose battery packs to temperatures below 0
°C (32 °F) or above 45 °C (113 °F). Extreme temperatures may
adversely affect the battery pack.
By following the battery conditioning process you condition your battery to
accept the maximum possible charge. Failure to follow this procedure will
prevent you from obtaining the maximum battery charge, and will also
shorten the effective lifespan of the battery.
In addition, the useful lifespan of the battery is adversely affected by the
following usage patterns:
Power supply - 33
• Using the computer on constant AC power with the battery inserted. If
you want to use constant AC power, you are advised to remove the
battery pack after it is fully charged.
• Not discharging and recharging the battery to its extremes, as described
above.
• Frequent use; the more you use the battery, the faster it will reach the
end of its effective life. A standard computer battery has a life span of
about 300 charges.
Installing or removing the battery pack
Important! Before removing the battery from the unit, connect the AC
adapter if you want to continue using your computer. Otherwise, turn
off the computer first.
To install a battery pack:
1. Align the battery with the open battery bay; make sure that the end with
the contacts will enter first, and that the top surface of the battery is
facing up.
2. Slide the battery into the battery bay and gently push until the battery
locks in place.
To remove a battery pack:
1. Slide the battery release latch to release the battery.
2. Pull the battery from the battery bay.
34
Charging the battery
To charge the battery, first make sure that it is correctly installed in the
battery bay. Plug the AC adapter into the computer, and connect to a
mains power outlet. You can continue to operate your computer on AC
power while your battery is charging. However, charging the battery with
the computer turned off results in a significantly faster charge time.
Note: You are advised to charge the battery before retiring for the day.
Charging the battery overnight before traveling enables you to start
the next day with a fully-charged battery.
Checking the battery level
The Windows power meter indicates the current battery level. Rest the
cursor over the battery/power icon on the taskbar to see the battery’s
present charge level.
Optimizing battery life
Optimizing battery life helps you get the most out of battery operation,
prolonging the charge/recharge cycle and improving recharging efficiency.
You are advised to follow the suggestions set out below:
• Purchase an extra battery pack.
• Use AC power whenever possible, reserving battery for on-the-go use.
• Eject a PC Card if it is not being used, as it will continue to draw power
(for selected models).
Power supply - 35
• Store the battery pack in a cool, dry place. The recommended
temperature is 10 °C (50 °F) to 30 °C (86 °F). Higher temperatures
cause the battery to self-discharge faster.
• Excessive recharging decreases the battery life.
• Look after your AC adapter and battery.
Battery-low warning
When using battery power pay attention to the Windows power meter.
Warning: Connect the AC adapter as soon as possible after the
battery-low warning appears. Data will be lost if the battery to
become fully depleted and the computer shuts down.
When the battery-low warning appears, the recommended course of
action depends on your situation:
SituationRecommended Action
The AC adapter and
a power outlet are
available.
1. Plug the AC adapter into the computer, and then
connect to the mains power supply.
2. Save all necessary files.
3. Resume work.
Turn off the computer if you want to
recharge the battery rapidly.
36
SituationRecommended Action
An extra fully charged
battery pack is
available.
1. Save all necessary files.
2. Close all applications.
3. Shut down the operating system to turn off the
computer.
4. Replace the battery pack.
5. Turn on the computer and resume work.
The AC adapter or a
power outlet is
unavailable.
You have no spare
battery pack.
1. Save all necessary files.
2. Close all applications.
3. Shut down the operating system to turn off the
computer.
Power supply - 37
SOFTWARE
USING WINDOWSANDYOURSOFTWARE
Gateway computers include software to help you use your computer; the
programs and categories available on your computer depend on the
model purchased. Most of this software is ’pre-installed’ and ready to be
used; however some software may be provided on a CD or DVD and must
first be installed if you wish to use it. To do so, insert the installation CD or
DVD. An installation wizard will start automatically and all you have to do
is follow the instructions on the screen.
Welcome Center
The first time you turn on your computer, the Welcome Center window
opens. The Welcome Center introduces you to the new features and tools
of Windows. You can access the Welcome Center later by clicking Start
> Getting Started.
Internet security offer
It is vital to protect your computer from viruses and attacks over the
Internet (see Security on page 62). An comprehensive Internet security
suite, including a free trial subscription period, is offered when you first
start your computer. You should activate this protection before connecting
to the Internet. This security suite protects your computer from the most
recent online threats and protects your personal data (bank account
credentials, credit card numbers, passwords, and more).
38
Productivity software
Work Great with Microsoft® Office 2010 - Express your ideas, solve
problems and simplify everyday projects with Office 2010.
Photo editing - Easily edit and print your photos with Windows Live Photo
Gallery. Then share them on Facebook, YouTube™ or Windows Live.
Search & Decide with Bing™ - Find and organize the answers you need
using Bing™, so you can make faster, more informed decisions.
Gateway Recovery Management
To prepare your computer for system recovery options, you should create
a set of recovery discs as soon as possible. See page 85 for more
information.
Gateway My Backup
Gateway MyBackup provides a simple process that allows you to create
backup copies of your entire system, or selected files and folders.
Backups may be created according to a schedule or manually, whenever
needed.
Creating a backup routine for your computer is simple, quick and takes
just a few steps.
Once you have a regular copy of your files, you should keep them safe. If
the worse happens and you need to access an old file, you may recover
files from your backup.
Software - 39
Opening MyBackup
Press the Gateway MyBackup key to start the program.
Otherwise click on Start > All programs > Gateway MyBackup >
Gateway MyBackup
Choose how to manage your data
Three options are available: Back Up My Files, Image My Drive, and
Migrate My Files.
Back Up My Files: Choose which files to back up or let the program find
important files for you. You can choose where to keep your files, on
removable device (e.g. a USB hard disk drive), an optical disc (if your
computer has an optical drive) or a Remote PC (a computer connected to
the same network as your computer).
40
Note: You should install the Agent Installer on a computer that you
want to use for backup storage. You can save and transfer the
program from the Remote PC tab.
Image My Drive: Make a complete backup of all of your computer’s hard
drive, including system and program files. You may later restore your
computer to exactly the condition it was in when the ’image’ was created.
Migrate My Files: Transfer files from another computer to your new
computer. This option allows you to copy and install the Migration Assistant on the other computer. Start the Migration Assistant to
choose which files to transfer and how to perform the transfer.
Select an option and follow the instructions displayed on screen.
Setup Schedule
Gateway MyBackup allows you to schedule automatic backup routines or
run the backup manually. You can schedule Daily, Weekly and Monthly
routines by selecting one of the tabs on the left.
If you select Manually then your backup routines will run when you press
the Gateway MyBackup key.
When you have selected a backup schedule, click Save and then give a
name to your backup routine.
Finding your files after a backup
Simply browse to the location of the backup files (if required, connect the
removable device or insert the optical disc) to check or restore your safe
files.
Software - 41
Restoring files from your backup
If you lose one or more files, or wish to transfer copies of your files to a
different computer (for extra security, or a new purchase), you may do so
by browsing to the location of your stored files (select where you would like to store the files) and copying them normally. If you have saved your
files to an external storage device, such as a USB hard disk drive, you
may connect this to any computer to find your files.
Depending on the options you have chosen, you may find several folders
in the backup location, each containing a different type of file. For
example, the Documents folder will contain a copy of shared documents,
and Music will contain shared music files, while Documents (C_Users_Example) and Music (C_Users_Example) contain files from a
user called Example (where Example would usually be your name, or the
name you gave your account on the computer).
Caution: Apart from copying these files and folders to restore
lost or damaged files, you should not change or rename them in
any way.
Multiple Updates
If a file has been updated, the most recent copy will be found in the main
folder, but if you have chosen to keep older files, they may be found in the
revision folder. A number following the file name indicates how many
times the file has been updated, with higher numbers representing more
recent updates.
42
Playing multimedia files
You may use the media software on your computer to play music, films or
photo slide-shows and watch television (if your computer has a TV tuner).
Other options allow you to create CDs or DVDs.
One or more media programs are installed on your computer, Windows Media Player and optionally Windows Media Center are provided by
Microsoft. Other media programs may have been installed by Gateway to
provide an improved media experience.
Windows Media Player
Windows Media Player may be used to play MP3 or WMA audio files, CDs
or most video files.
Note: It is not recommended that you use Windows Media Player to
play DVD movies. Other media players (such as Windows Media
Center) provide additional playback options.
Windows Media Center (optional)
Certain computers include all-inone media ‘centers’ such as
Windows Media Center. These
programs can handle a variety of
multimedia content, presented
with simple menus that may be
easily controlled with a remote
control. You may watch live or
recorded TV (if your computer
Software - 43
has a TV tuner), listen to digital music, view pictures and personal videos,
create CDs and DVDs, or access content from online services.
To start the media program installed on your computer, click on Start >
Windows Media Center.
Setup
Caution: If your computer includes a remote control or TV tuner
they must be connected and active before starting the media
program for the first time.
The first time you start the media program, it will start a setup wizard,
which will configure some basic settings. If available, select the Express
setup option, you may then configure additional options as needed.
Note: If you have an Internet connection, the Guide (Electronic
Program Guide) allows you to view a list of current TV shows. This
shows channel and network information, as well as the title,
description and scheduled broadcast time of shows.
Cyberlink PowerDVD (optional)
If your computer does not include Windows Media Center, or it is equipped
with a Blu-ray drive, you may watch movies with PowerDVD. You may
start PowerDVD by inserting a disc and waiting for the program to start
automatically.
44
AutoPlay
The Windows AutoPlay function allows
you to choose the way Windows handles
media files on devices with removable
storage (digital camera, CD, DVD, etc).
If you have inserted a disk that contains
files (such as a DVD, USB key or memory
card), Windows will display a dialog box
and ask you to choose how you want to
open the files.
For example, if you have inserted an audio CD or a DVD movie, Windows
will automatically display a dialog box and ask you to choose how you
want to play it. If Windows asks you to select a DVD player, we
recommend that you always choose the DVD player included with your
software collection (e.g. PowerDVD or Windows Media Player).
Playing downloaded files
Downloaded files may work with the media programs installed on your
computer, or may require specific programs. Files that include DRM
functions may only play in specific programs (e.g. iTunes, Windows Media
Player) or only on devices certified for use with the each type of file. Other
formats may require a specific audio or video codec that may not have
been installed on your computer.
Software - 45
Codecs
A codec is software that is used to compress or decompress a digital
media file, such as a song or video. Windows Media Player and other
programs use codecs to play and create digital media files.
For example, when you rip a song from an audio CD to your computer, the
player uses the Windows Media Audio codec to compress the song into a
compact WMA file. When you play that WMA file (or any WMA file that
might be streamed from a Web site), the media player uses the Windows
Media Audio codec to decompress the file so the music can be played
through your speakers.
Why do I get a message that says my computer is missing a codec?
If you get a message that says that your computer is missing a codec, it
may be because you are using a file that was compressed using a codec
that Windows or the media player does not include by default. In many
cases, you can download and install the missing codec by clicking on the
Web Help button in the error message.
Please also see Windows Help and Support for more information.
Playing DVD movies
You can play DVD movies on your computer.
1. Insert the DVD.
Important! When you launch the DVD player for the first time, the
program asks you to enter the region code. DVD content is coded with
one of six regions. Please refer to the table below for DVD movie
region code information.
46
Once your DVD drive is set to a region code, it will play DVD discs
of that region only. You can set the region code a maximum of
five times (including the first time), after which the last region
code set will remain permanent. Recovering your hard disk does
not reset the number of times the region code has been set.
2. The DVD movie will automatically play after a few seconds.
Region code Country or region
1USA, Canada
2Europe, Middle East, South Africa, Japan
3Southeast Asia, Taiwan, South Korea
4Latin America, Australia, New Zealand
5Former USSR, parts of Africa, India
6People's Republic of China
Note: To change region code, insert a DVD movie of a different region
into the DVD drive.
Playing Blu-ray movies
If your computer is equiped with a Blu-ray disc drive, you can play Blu-ray
movies on your computer.
Simply insert the disc into the optical drive, after a short delay Cyberlink PowerDVD will start to play the movie. Use the media controls to control
playback.
Software - 47
Social networks (optional)
The Social Networks application allows you
to quickly view your friends' updates, and
make your own updates without leaving the
desktop. You can receive notifications and
status updates directly to your desktop, using
the sidebar to monitor multiple social
networks (Facebook, YouTube and Flickr).
Note: The Social Networks application is
a pre-installed option and may not be installed on all computers.
Be aware of your friends' messages and posted images as they happen; a
visible notification will alert you whenever a friend (or subscription) shows
some activity.
If your computer's keyboard features the optional Social
Networks key, press it to open the Social Networks application.
Log in... or Sign up
The top of the application shows your profile picture and account
information from Facebook. If you have not yet created or accessed your
Facebook profile, the top image is the anonymous white-on-blue
placeholder, and no information is shown.
When you first start the Social Networks application, you will be asked to
Log in to your social networks. If this does not happen automatically, click
Log In, at the top of the Social Networks window. If you just want to create
a new Facebook profile, click Sign Up and follow the instructions.
48
Note: All social activities require Internet access. Make sure you are
connected to the Internet before using this application.
Authorize access
To receive updates, you must authorize access to your social network
accounts; each account must be activated separately. Click on the tab for
the network you want to activate (Facebook, YouTube or Flickr).
You need your account name and password for each network, or to create
a new account if you do not have one.
Note: Note down all information you use for new accounts, including
the account name, email address and password. Keep this
information hidden in a safe place, so you may refer to it when you
access your accounts in the future.
Facebook
If you already have a Facebook account, click the Log In button to
activate access, or Sign up to Facebook to create an account.
If you choose Sign up to Facebook please fill in the requested
information, with your email and an appropriate password. You will then
continue to authorize access for your account.
Please allow access for all steps, this will ensure all Social Networks
features work normally.
Software - 49
YouTube
If you already have a YouTube account, enter the account information and
click the Log In button to activate access, otherwise select Sign up to YouTube to create an account.
flickr
If you already have a flickr account, click the Log In button to activate
access, otherwise select Sign up to flickr to create an account. Confirm
that you authorise full access, this will ensure all Social Networks features
work normally.
Accessing your social networks
Once you have authorized access, your profile picture and
status information will be displayed. You may update this
information with a click.
Quick actions
Click on a link to see more in a new window. I.e. click on a
Facebook entry to open your Facebook account and view
the entire entry; click on a YouTube video title to view the
video.
Enter your status in the What's on your mind? box and
click Share. You friends on Facebook will see your status
instantly.
To create a new album of photos in Facebook, select the images you want
to add, drag them to your profile picture. You will be prompted for an
50
album name and description. Click on Upload to start copying the images
to your Facebook account.
Click the arrows in the bottom bar to see more pages, if there are
more entries than can be shown on a page.
Click on the question mark in the top bar to see the help file for Social Networks.
Click on the arrow in the top bar to hide the full application and display a
small alert bar on the top of your screen. Click the alert bar (below) to see
the full window with a summary of your friends' activities.
Note: Do not use the X icon to exit Social Networks, unless you want
to stop sending or receiving updates. Use the arrow in the top bar
to display the alert bar.
Checking your news feeds and information
Select the tab for the network you want to view:
A series of buttons for the network are available for each network. Hover
over the button to see a description. Select the button you want to see and
scroll through the list of items.
Software - 51
Example of Facebook tabs:
The first button, and the section viewed when a tab is first selected, are
the News Feed (for Facebook), Most Viewed for YouTube and Contacts
for Flickr. If there are more entries than can be shown on one page, use
the arrows in the bottom bar to see more pages.
Changing settings
Click the settings icon to access settings for the social networks.
Live Update - If the Live Update button is active, you may download and
install an updated version of the Social Networks application.
Click the tab for a network to see specific settings; you may set how often
a network is checked (the refresh frequency) and logout from specific
networks in this section.
Click the X to exit the Settings section.
52
INTERNET
FIRSTSTEPSONTHENET
Protecting your computer
It is vital to protect your computer from viruses and attacks over the
Internet (see Internet security offer on page 38 and Security on page 62).
A comprehensive Internet security program is offered when you first start
your computer. You should activate this protection as soon as possible,
certainly before you connect to the Internet.
Choose an Internet Service Provider
Using the Internet has become a natural part of daily
computing. Just a few simple steps can connect you to a
vast collection of knowledge and communication tools.
To accomplish these steps you should first select an
Internet Service Provider (ISP), which supplies the
connection between your computer and the Internet. You
should research the ISPs available in your region, not
forgetting to talk to friends and family about their experiences or to check
reviews and consumer reports. The ISP you select will provide instructions
on how to connect to the Internet (you may need additional software or a
special ‘box’ that connects to your phone line).
Internet - 53
Connection types
Depending on your computer model, your location and your communication
needs, you have several ways to connect to the Internet.
Dial-up
Some computers include a telephone dial-up (‘modem’) connector. This
allows you to connect to the Internet using your telephone line. With a dialup connection, you cannot use the modem and the telephone
simultaneously on a single phone line. This type of connection is
recommended only if you have limited use of the Internet as the
connection speed is low and connection time is typically charged per hour.
DSL (e.g. ADSL)
DSL (Digital Subscriber Line) is an ‘always-on’ connection that runs over
the phone line. As DSL and phone do not use the same frequencies, you
can use your telephone at the same time you are connected to the Internet
(this requires a ‘micro-filter’ on each telephone socket to avoid
interference). To be eligible for DSL, you must be located near an DSLequipped phone exchange (service is sometimes unavailable in rural
areas). Connection speeds vary depending on your location, but DSL
generally provides very fast and reliable Internet connection. As the
connection is always-on, it is generally charged at fixed monthly rates.
Note:
A DSL connection requires an appropriate modem. A modem is
usually provided by the ISP when you register. Many of these modems
include an ‘router’ that provides network and wi-fi access.
54
Cable
A cable connection provides fast and always-on Internet service via a
cable television line. This service is generally available in large cities. You
can use your telephone and watch cable TV at the same time you are
connected to the Internet.
3G (WWAN or 'Wireless Wide-Area Network')
A 3G connection allows you to use cellular networks (such as those used
by a mobile phone) to connect to the Internet while away from home. The
socket for a SIM card may be built in to your computer, or may require an
external device, such as a USB modem or even an appropriately equipped
mobile phone.
Note: If your computer includes a SIM card slot, you require a
compatible SIM card and a contract with a cellular provider.
Before using the 3G features, check with your service provider to see
if any additional charges will be incurred, especially roaming charges.
Network connections
A LAN (Local Area Network) is a group of computers (for example, within
an office building or home) that share a common communications line and
resources. When you set up a network, you can share files, peripheral
devices (such as a printer) and an Internet connection. You can set up a
LAN using wired technologies (such as Ethernet) or wireless technologies
(such as WiFi or Bluetooth).
Internet - 55
Wireless networks
A wireless LAN or WLAN is a wireless local area network, which may link
two or more computers without using wires. Setting up a wireless network
is easy and allows you to share files, peripheral devices and an Internet
connection.
What are benefits of a wireless network?
Mobility
Wireless LAN systems allow you and other users of your home network to
share access to files and devices connected to the network, for example a
printer or scanner.
Also you can share an internet connection with other computers in your
home.
Installation speed and simplicity
Installing a wireless LAN system can be fast and easy and eliminates the
need to pull cables through walls and ceilings.
Components of a wireless LAN
To set up your Wireless network at home you need to have the following:
Access point (router)
Access points (routers) are two-way transceivers that broadcast data into
the surrounding environment. Access points act as a mediator between
wired and wireless network. Most routers have a built-in DSL modem that
will allow you access to a high speed DSL internet connection. The ISP
(Internet Service Provider) you have chosen normally supplies a modem/
56
router with the subscription to their services. Read carefully the
documentation supplied with your Access point/router for detailed setup
instructions.
Network cable (RJ45)
A network cable (also called RJ45 cable) is used to connect the host
computer to the access point (see illustration below); this type of cable
may also be used to connect peripheral devices to the access point.
Wireless adapter
An internal wireless adapter is normally already installed in
your computer. A button or controls in Windows allow you to
activate or deactivate the adapter.
Internet - 57
Diagram of a working network
1. Access point/router
2. Desktop computer
3. Modem
4. Printer
5. Portable computer
6. PDA/Smartphone
7. Network cables
(RJ45)
Turning on/off a wireless network connection
Most computers feature a ‘WiFi’ button that turns the network connection
on or off. If your computer has wireless access, but does not feature a
Communication button, you may turn your wireless network on or off, or
control what is shared over the network with the network management
options. Click on Start > Control Panel > Network and Internet >
Network and Sharing Center.
Warning: Using wireless devices while flying in aircraft is
prohibited. Switch off all devices before boarding an aircraft;
5
6
4
1
3
7
2
58
they may be dangerous to the operation of the aircraft, disrupt
communications, and even be illegal.
Surf the Net!
To surf the Internet, you need a program called an
Internet browser. Internet Explorer provides an easy and
secure web browsing experience. As soon as you have
your Internet access installed and you are connected,
click on the Internet Explorer shortcut located on the
Windows desktop and take your Internet experience to a
new level!
Internet - 59
Internet Explorer features
The image below shows the Internet Explorer browser’s start page. A brief
description of some key aspects of the browser are listed below.
76543
8
9
2
1
1. Bing Bar: Search the web and use Bing tools to alert you of news, fill
forms automatically, stay safe online and more.
2. Back and Forward buttons: Navigate through pages you have already
visited.
3. Address bar: Type in an Internet address (e.g. www.gateway.com) and
press the Enter key on your keyboard, this will take you directly to the
address you typed.
4. Refresh: Reload the selected page.
60
5. Search Box: Search the web without having to open a new page.
6. Tabs: Each tab displays a web page. The tabs allow you to instantly
switch from one site to another.
7. New tab: Open a new tab with links to your most popular sites.
8. Reduce, maximize or close the window.
9. Home, Favorites and Tools: Open the home page; manage your favorite
websites, feeds and history; and access browser tools, such as Print,
Safety or Options.
Caution: Internet Explorer includes a Phishing Filter that warns
you about and helps to protect you from potential or known
fraudulent websites (sites that look legitimate but actually are
designed to capture your personal information). The address bar
will turn yellow and a warning message will be displayed if you
visit a suspected phishing site.
Gateway website
To get you started why not visit our website, www.gateway.com.
Gateway is dedicated to provide you with on-going personalized support.
Check out our Support section to get help tailored to your needs.
www.gateway.com is your portal to a world of online activities and
services: visit us regularly for the latest information and downloads!
Internet - 61
Security
You are probably eager to explore everything the Internet has to offer. In
order for you to be safe online, Gateway has pre-installed Symantec’s
award-winning Norton Internet Security™ on your computer.
Norton Internet Security runs quietly in the background to block today’s
complex threats and protect your identity when you shop, bank, or browse
online.
Norton Internet Security blocks online identity theft, detects and eliminates
spyware, removes viruses and Internet worms, protects against hackers.
Definitions
What is a virus?
Malicious software, typically called ‘viruses’, are programs designed to
infect and damage computers. Most viruses are transmitted over the
Internet, emails or malicious Web sites. A typical virus will replicate and
pass itself undetected to multiple computers. Other forms of nuisance,
such as Trojan horses, worms or spam can infect your computer in various
ways, using up resources or clogging up a network.
Note: Gateway guarantees that your computer was 100% virus free
at the time of purchase and does not cover damages due to viruses.
What is spyware?
Spyware refers to generally unwanted programs that are downloaded onto
your computer while connected to the Internet, often without you knowing
it. Once it has infected your computer, it can snoop on your browsing
62
activity, collect personal information, cause pop-up ads to appear, or even
change the configuration of your computer. Spyware consumes resources
on your computer; it can slow down your Internet connection or entire
computer system, and even cause crashes.
Spyware is sometimes used by unscrupulous companies to monitor and
track the sites you visit on the Internet so as to determine your web-surfing
habits and display targeted pop-up ads on your screen. However, some
kinds of spyware go beyond simple tracking and actually monitor
keystrokes and capture passwords, posing a serious security risk.
What is malware?
Malicious software, also known as malware, is software designed to
deliberately harm your computer. For example, viruses, worms, and
Trojan horses are malicious software. To help protect your computer
against malware, make sure it is using up-to-date antivirus and antimalware software.
What is a personal firewall?
A personal firewall is a software program designed to prevent
unauthorized access to or from a private network. It acts as a shield to
protect your Internet connection from unwanted connections, some of
which may attempt to take control of your computer to install or redistribute viruses or malicious programs. Each connection to your
computer is monitored - programs that attempt to receive information
without your permission are detected and the firewall will display an alert.
You can then decide if you will allow the connection, if the connection is to
a program you are currently using then normally you would allow it (i.e. a
Internet - 63
game connecting to a multi-player server or an encyclopaedia making a
content update).
How to protect your computer
Cybercrime prevention can be straight-forward - when armed with a little
technical advice and common sense, many attacks can be avoided. In
general, online criminals are trying to make their money as quickly and
easily as possible. The more difficult you make their job, the more likely
they are to leave you alone and move on to an easier target. The tips
below provide basic information on how you can prevent online fraud.
Keep your computer current with the latest patches and updates
One of the best ways to keep attackers away from your computer is to
apply patches and other software fixes when they become available. By
regularly updating your computer, you block attackers from being able to
take advantage of software flaws (vulnerabilities) that they could otherwise
use to break into your system.
While keeping your computer up-to-date will not protect you from all
attacks, it makes it much more difficult for hackers to gain access to your
system, blocks many basic and automated attacks completely, and might
be enough to discourage less-determined attackers, so they will give up
and look for a more vulnerable computer elsewhere.
More recent versions of Microsoft Windows and other popular software
can be configured to download and apply updates automatically so that
you do not have to remember to check for the latest software. Taking
advantage of auto-update features in your software is a great start toward
keeping yourself safe online.
64
Protect your computer with security software
Several types of security software are necessary for basic online security.
Security software essentials include firewall and antivirus programs. A
firewall is usually your computer's first line of defense-it controls who and
what can communicate with your computer online. You could think of a
firewall as a sort of "policeman" that watches all the data attempting to
flow in and out of your computer on the Internet, allowing communications
that it knows are safe and blocking "bad" traffic such as attacks from ever
reaching your computer.
The next line of defense many times is your antivirus software, which
monitors all online activities such as email messages and Web browsing
and protects an individual from viruses, worms, Trojan horse and other
types of malicious programs. Your antivirus and antispyware software
should be configured to update itself, and it should do so every time you
connect to the Internet.
Integrated security suites such as Norton Internet Security, which combine
firewall, antivirus, antispyware with other features such as antispam and
parental controls, have become popular as they offer all the security
software needed for online protection in a single package. Many people
find using a comprehensive security suite an attractive alternative to
installing, configuring and updating several different types of security
software.
A complete version of Norton Internet Security™ is pre-installed on
your Gateway system. It includes a free trial subscription to
protection updates. Make sure you Activate it!
Internet - 65
Choose strong passwords and keep them safe
Passwords are a fact of life on the Internet today; we use them for
everything from ordering flowers and online banking to logging into our
favorite airline Web site to see how many miles we have accumulated.
The following tips can help make your online experiences secure:
• Selecting a password that cannot be easily guessed is the first step
toward keeping passwords secure and out of the wrong hands. Strong
passwords have eight characters or more and use a combination of
letters, numbers and symbols (e.g., # $ % ! ?). Avoid using any of the
following as your password: your login name, anything based on your
personal information such as your last name, and words that can be
found in the dictionary, especially "password". Try to select especially
strong, unique passwords for protecting activities like online banking.
• Keep your passwords in a safe place and try not to use the same
password for every service you use online.
• Change passwords on a regular basis, at least every 90 days. This can
limit the damage caused by someone who has already gained access to
your account. If you notice something suspicious with one of your online
accounts, one of the first steps you can take is to change your
password.
Protect your personal information
Exercise caution when sharing personal information such as your name,
home address, phone number, and email address online. To take
advantage of many online services, you will inevitably have to provide
personal information in order to handle billing and shipping of purchased
66
goods. Since not divulging any personal information is rarely possible, the
following list contains some advice for how to share personal information
safely online:
• Keep an eye out for phony email messages. Things that indicate a
message may be fraudulent are misspellings, poor grammar, odd
phrasing, Web site addresses with strange extensions, Web site
addresses that are entirely numbers where there are normally words,
and anything else out of the ordinary. Additionally, phishing messages
will often tell you that you have to act quickly to keep your account open,
update your security, or urge you to provide information immediately or
else something bad will happen. Don't take the bait.
• Don't respond to email messages that ask for personal information. Legitimate companies will not use email messages to ask
for your personal information. When in doubt, contact the company by
phone or by typing in the company Web address into your Web browser.
Don't click on the links in these messages as they make take you to
fraudulent, malicious Web sites.
• Steer clear of fraudulent Web sites used to steal personal information. When visiting a Web site, type the address (URL) directly
into the Web browser rather than following a link within an email or
instant message. Fraudsters often forge these links to make them look
convincing.
A shopping, banking or any other Web site where sensitive information
should have an "S" after the letters "http" (i.e. https://www.yourbank.com
not http://www.yourbank.com). The "s" stands for secure and should
appear when you are in an area requesting you to login or provide other
Internet - 67
sensitive data. Another sign that you have a secure connection is the
small lock icon in the bottom of your web browser (usually the right-hand
corner).
• Pay attention to privacy policies on Web sites and in software. It is
important to understand how an organization might collect and use your
personal information before you share it with them.
• Guard your email address. Spammers and "phishers" sometimes send
millions of messages to email addresses that may or may not exist in
hopes of finding a potential victim. Responding to these messages or
even downloading images ensures you will be added to their lists for
more of the same messages in the future. Also be careful when posting
your email address online in newsgroups, blogs or online communities.
Online offers that look too good to be true usually are
The old saying "there's no such thing as a free lunch" still rings true today.
Supposedly "free" software such as screen savers or smileys, secret
investment tricks sure to make you untold fortunes, and contests that
you've surprisingly won without entering are the enticing hooks used by
companies to grab your attention.
While you may not directly pay for the software or service with money, the
free software or service you asked for may have been bundled with
advertising software ("adware") that tracks your behavior and displays
unwanted advertisements. You may have to divulge personal information
or purchase something else in order to claim your supposed content
winnings. If an offer looks so good it's hard to believe, ask for someone
else's opinion, read the fine print, or even better, simply ignore it.
68
Review bank and credit card statements regularly
The impact of identity theft and online crimes can be greatly reduced if you
can catch it shortly after your data is stolen or when the first use of your
information is attempted. One of the easiest ways to get the tip-off that
something has gone wrong is by reviewing the monthly statements
provided by your bank and credit card companies for anything out of the
ordinary.
Additionally, many banks and services use fraud prevention systems that
call out unusual purchasing behavior (i.e. if you live in Texas and all of the
sudden start buying refrigerators in Budapest). In order to confirm these
out of the ordinary purchases, they might call you and ask you to confirm
them. Don't take these calls lightly; this is your hint that something bad
may have happened and you should take necessary action.
Protect your computer with Windows security tools
Windows provides a variety of protection applications.
Windows Action Center
Windows provides a central area from where you can control the security
settings of your computer, helping you to protect it from Internet attacks
and ensuring that the latest security updates have been downloaded and
installed on your computer.
To open the Action Center, click on Start > Control Panel > System and Security > Action Center.
Internet - 69
Alternatively, if a security alert
has been reported (in the
Notification Area, next to the
clock) then you can click on the
notification balloon or double-click
on the small Security Alert icon.
The Action Center indicates the
status and settings used for
important applications that protect
your computer. In addition
Windows Firewall, Windows
Defender and Windows Automatic Updates are provided by Microsoft as
part of a comprehensive system to defend your computer. The antivirus
application varies according to the program installed on your computer.
Windows Firewall
Windows has a firewall that protects your computer when connected to the
Internet. It stops programs from accessing the Internet without your
permission.
70
Certain programs need access
to the Internet to function
properly, or even to function at
all. If this is the case, you will
usually be asked to allow
access when you install a
program, or the first time you
use it. To check firewall
settings, click on Start >
Control Panel > System and
Security > Windows Firewall.
Note: When you first start to use a Firewall it is in a ‘Learning mode’,
you may see pop-up windows alerting you that certain programs you
know and trust wish to access the internet. After a period of time the
Firewall will know your list of trusted programs and won’t ask for
permission the next time the program tries to connect to the internet.
The Firewall also protects your computer from programs from the
internet trying to access your computer; this sometimes is necessary
to allow access for program updates, downloads, etc.
Caution: Please note that most security software suites provide
similar functionality and will disable Windows Firewall in order to
improve system performance.
Windows Updates
If you have an active Internet connection, Windows can check for
important updates for your computer and install them automatically. These
Internet - 71
updates include security patches and program updates that can improve
your computing experience and help protect your computer against new
viruses and attacks.
Windows Defender
Windows Defender helps protect
your computer against malicious
and unwanted software, such as
spyware and adware. Windows Defender is installed and turned
on by default.
To help protect your privacy and
your computer, Windows
Defender includes real-time protection options. Real-time
protection alerts you when
spyware and other potentially
unwanted software attempt to install themselves or run on your computer.
You are also alerted if programs attempt to change important Windows
settings.
Note: Windows Defender works with your Windows Update settings
to automatically install the latest definitions.
Caution: Please note that most security software suites provide
similar functionality and will disable Windows Defender in order
to improve system performance.
72
User Account Control
The User Accounts control panel can help prevent unauthorized changes
to your computer. User Accounts will ask you for permission or an
administrator password before performing actions that could potentially
affect your computer's operation or that change settings that affect other
users. When you see a User Account message, read it carefully, and then
make sure the name of the action or program that's about to start is one
that you intended to start.
By verifying these actions before they start, User Account settings can
help prevent malicious software (malware) and spyware from installing or
making changes to your computer without permission.
To access User Account settings, click on Start > Control Panel > User Accounts and Family Safety > User Accounts.
Note: You may turn off the User Account Control Messages (not
recommended) in the User Account Control settings window.
Internet - 73
Internet Explorer security settings
Internet sites use small files called cookies to keep track of user
preferences and information. You can adjust your Internet browser's
security settings to determine how much -or how little- information you are
willing to accept from a Web site.
To access Internet Explorer security settings:
1. In Internet Explorer, click on Tools > Internet Options.
2. In the Privacy tab, move the slider up or down to select a setting.
How do I know when my computer is at risk?
If the Action Center reports an alert, or if your computer behaves
erratically, crashes unexpectedly or if some of your programs do not work
correctly, your computer may be infected by malicious software. However,
do not blame every computer problem on a virus! If you suspect your
computer is infected, the first thing to do is update, if you have not already
done so, and run your antivirus and anti-spyware software.
74
HELPDESK
SAFECOMPUTING
To make the most of your new computer and ensure it runs smoothly for a
long time, you should use the programs below and regularly perform the
actions described in this guide.
Maintenance
Recommended maintenance tasks
There are several tasks you should perform periodically (about once per
month) to ensure your computer stays in good health:
Error checking
Using the Check Disk tool regularly prevents your system from getting
unreliable and information getting lost. It checks and repairs two types of
errors:
• file system errors, such as fragmented files that were not deleted and
files with invalid sizes or dates;
• physical errors, which may occur on your hard disk as it wears out over
time.
1. Click on Start > Computer. Right-click on the Gateway (C:) icon
and select Properties.
2. Click on Tools and Check Now in the Error-checking section.
Helpdesk - 75
3. Tick Automatically fix file system errors in the options area. If you tick
Scan for and attempt recovery of bad sectors, your computer will
carry out the physical error checking when you next restart your
computer. Click on Start to proceed.
Disk Cleanup
The Disk Cleanup Wizard helps
free up space on your disk drive. It
searches your drive and displays
unused files, such as temporary
Internet files, files in the Recycle
Bin and other temporary files that
you may safely delete.
1. Click on Start > Computer.
Right-click on the Gateway icon
and select Properties.
2. Select the General tab and click
on the Disk Cleanup button
(next to the diagram of the disk
drive.
3. Tick each category in the Files to delete area you wish to delete
and click on OK.
76
Disk Defragmenter
With the creation and deletion of files over time, scattering occurs all over
the hard disk area and affects performance. The Disk Defragmenter helps
you rearrange the items stored on your hard drive to make your computer
run faster and more efficiently.
Running the Disk Defragmenter once a month (depending on computer
usage) will decrease wear and tear on your hard drive and thus decrease
the chance of a fault developing at a later date.
1. Perform a Disk Cleanup and
close all open programs.
2. Click on Start > Computer.
Right-click on the Gateway icon
and select Properties.
3. Click on Tools and Defragment
now....
4. Click on the volume you want to
defragment and click on
Defragment to start. The whole
process may take several hours
to complete. It is best not to use your computer while running the Disk Defragmenter as any changes on your system may cause the process
to restart. If your hard disk is divided into several partitions you should
perform the same action for each partition.
Helpdesk - 77
Manage your hard disk drive (HDD)
Check the remaining free space on your hard disk drive
1. Click on Start > Computer.
2. Right-click on the Gateway icon and select
Properties.
3. The Hard Disk Properties window displays the
amount of used space and free space on your
hard disk. If your hard disk is almost full (less
than 200 MB remaining), you should consider
freeing some space.
To see easily how much space is used and how
much is left, simply place your pointer over the
hard disk drive icon. The information will
automatically appear.
Free some Space on your hard disk drive
1. Empty the Recycle Bin: When you delete a file
from your computer, Windows places it in the
Recycle Bin. All the deleted files remain there until
you decide to permanently delete them from your
computer or to restore them to their original
location. Double-click on the Recycle Bin on the
Windows desktop and click on Empty Recycle Bin or select only the items you want to delete. Items deleted from
external devices, such as memory cards, do not go to the Recycle Bin,
they are permanently deleted.
78
2. Uninstall the programs you no longer use:
Click on Start > Control Panel > Programs > Programs and
Features.
3. Archive files on an external hard disk drive, recordable CDs or DVDs (if
your computer is equipped with a CD or DVD writer) and delete them
from the hard disk.
Run Windows System Tools
Windows includes some convenient tools to keep your computer in good
shape. Use these tools on a regular basis to maintain a reliable and
speedy system! To make it easier, System Tools includes a Scheduled Tasks utility, which you can customize to run specific tasks regularly.
To access the list of System Tools, click
Accessories
folder in the list of programs and finally select
Start
>
All Programs
, then the
System Tools
.
Helpdesk - 79
Windows System Restore.
System Restore monitors changes to your computer and automatically
creates restore points that store your computer’s configuration each time a
major change occurs (such as installing programs). It can undo harmful
changes to your computer and restore settings and performance without
removing your personal data files (such as documents, browsing history,
photos, favorites, or emails).
Note: If you only need to uninstall a program, do not use System
Restore. To uninstall a program use Programs and Features in the
Control Panel.
To start System Restore from the Windows desktop:
Click Start > All Programs > Accessories > System Tools >
System Restore.
80
If you cannot access the Windows desktop:
1. Press the Alt+F10 key upon start-up when the Gateway logo appears.
This will open the Recovery Program.
2. Select Windows System Restore and click Next. Your computer will
automatically restart and open System Restore.
System Restore options
Restore your computer to an earlier time
This option will return to your computer to how it was on an earlier date,
without affecting your personal documents or emails (it will not restore lost
documents either). By default Windows saves snapshots of itself when
major changes are made to the Operating System (e.g. driver installations
or specific software). This is useful when a driver installation failed, or
when you changed a system setting, and it did not work.
1. Click Next.
2. Select from the list the date when the restore point was created and
click Next.
3. In the confirmation screen, click on Finish to restore the computer to the
selected date and time.
Helpdesk - 81
Create a Restore Point
Windows creates restore points automatically at regularly scheduled times
or before certain programs or drivers are installed. This option allows you
to create your own restore points when you need to.
1. Click Start > Control Panel > System and Security > System.
Click on System protection in the sidebar and then click the Create...
button.
2. Enter a description to identify this restore point. System Restore
automatically adds the date and time to this name.
3. To finish, click on Create.
Undo the last restoration
If the system fails after restoring the computer to a certain date, you can
use this option to undo the restoration.
Alternately, you can use Last Known Good Configuration to restore the
system to your most recent settings that worked.
1. Restart the computer, press F8 to access advanced startup options.
2. Use the arrow keys to highlight Last Known Good Configuration and
press Enter.
Updates
As new viruses, worms, and other threats are discovered every day,
keeping your security applications and operating system up-to-date is
crucial.
To keep your computer safe and reliable:
82
• Perform updates when prompted by Windows Action Center.
• Use Microsoft Windows Automatic Updates.
• Run Windows Update.
Internet security
Norton Internet Security, combined with other security applications can
protect your computer from Internet attacks and ensure that the latest
security updates have been downloaded and installed on your computer.
Norton Internet Security performs automatic updates through Live Update.
You can also start a manual update from the main interface of Norton
Internet Security and the Live Update link.
Operating system, software and drivers
Windows Update can help you
keep your computer up-to-date. It
allows you to choose and download
updates for your computer's
operating system, software, and
hardware.
New content is added to Windows
Update regularly, so you can
always get the most recent updates
and solutions to protect your
computer and keep it running smoothly.
• Start > Control Panel > System and Security > Windows Update.
Helpdesk - 83
Windows Remote Assistance
Remote Assistance allows a Windows user to temporarily take over a
remote Windows computer over a network or the internet to resolve
issues. Remote Assistance makes it possible to diagnose and repair
problems with a computer without personally visiting it.
You can access Remote Assistance by clicking on Start > All Programs > Maintenance > Windows Remote Assistance. Upon
launching Remote Assistance, you will see a screen giving you the choice
of either inviting someone to help you or offering to help someone.
84
RECOVERY
GATEWAY RECOVERY MANAGEMENT
Note: Gateway Recovery Management is only available with a
preinstalled Windows operating system.
If your computer experiences problems that are not recoverable by other
methods, you may need to reinstall the Windows operating system and
factory-loaded software and drivers. To ensure you can recover your
computer when needed, you should create a recovery backup as soon as
possible.
Creating recovery discs
To reinstall using discs, you must create a set of recovery discs
beforehand. Throughout the process, you will be guided by on-screen
instructions. Please read them carefully!
1. Click on Start > All Programs > Gateway, then click on Gateway Recovery Management.
Recovery - 85
2. To create recovery discs for the hard drive’s entire original contents,
including Windows and all factory-loaded software and drivers, click
Create Factory Default Disc.
- OR -
To create recovery discs for only the factory-loaded software and drivers,
click Create Drivers and Applications Backup Disc.
Important: We recommend that you create each type of recovery
disc as soon as possible.
86
The Create Factory Default Backup dialog box opens.
This dialog box tells you the number of blank, recordable discs you will
need to complete the recovery discs. Make sure that you have the
required number of identical, blank discs ready before continuing.
Recovery - 87
3. Insert a blank disc into the drive indicated in the Backup to list, then click Next. You will be shown the backup progress on the screen.
The drive ejects each disc as it completes burning it.
4. Remove the disc from the drive and mark it with a permanent marker.
Important: Write a unique, descriptive label on each disc, such as
‘Windows Recovery Disc 1 of 2’ or ‘Apps/Drivers Recovery disc’.
Make sure you keep the discs in a safe place that you will
remember.
5. If multiple discs are required, insert a new disc when prompted, then
click OK. Continue until the process is complete.
RECOVERINGYOURSYSTEM
If Gateway support did not help fix your problem, you can use the
Gateway Recovery Management program. This will restore your computer
88
to the same state as when you purchased it, while giving you an option to
retain all settings and personal data for later retrieval.
To recover your system:
1. Perform minor fixes.
If only one or two items of software or hardware have stopped working
correctly, the problem may be solved by reinstalling the software or the
device drivers.
To recover software and drivers that were pre-installed at the factory, see
“Recovering pre-installed software and drivers” on page 90.
For instructions on reinstalling software and drivers that were not preinstalled, see that product’s documentation or technical support Web
site.
2. Revert to a previous system condition.
If reinstalling software or drivers does not help, then the problem may be
solved by returning your system to a previous state when everything was
working correctly.
For instructions, see “Returning to a previous system condition” on page
91.
3. Reset your system to its factory condition.
If nothing else has solved the problem and you want to reset your system
to factory condition, see “Returning your system to its factory condition”
on page 92.
Recovery - 89
Types of recovery
Recovering pre-installed software and drivers
As a troubleshooting step, you may need to reinstall the software and
device drivers that came pre-installed on your computer from the factory.
You can recover using either your hard drive or the backup you have
created.
• New software - If you need to recover software that did not come preinstalled on your computer, you need to follow that software’s installation
instructions.
• New device drivers - If you need to recover device drivers that did not
come pre-installed on your computer, follow the instructions provided
with the device.
To recover your pre-installed software and drivers:
1. Click on Start > All Programs > Gateway, then click on Gateway
Recovery Management. Gateway Recovery Management opens.
- OR -
If you are recovering from your driver and application recovery backup,
insert it into the disc drive, then go to Step 3 after the Gateway Application Recovery main menu opens.
2. Click on the Restore tab, then click Reinstall Drivers or Applications.
The Gateway Application Recovery main menu opens.
90
3. Click on Contents. A list of software and device drivers opens.
4. Click on the install icon for the item you want to install, then follow the
on-screen prompts to complete the installation. Repeat this step for
each item you want to reinstall.
Returning to a previous system condition
Microsoft System Restore periodically takes ’snapshots’ of your system
settings and saves them as restore points. In most cases of hard-toresolve software problems, you can return to one of these restore points to
get your system running again.
Windows automatically creates an additional restore point each day, and
also each time you install software or device drivers.
Recovery - 91
Help: For more information about using Microsoft System Restore,
click Start, then click Help and Support. Type windows system
restore in the Search Help box, then press Enter.
To return to a restore point:
1. Click on Start > Control Panel > System and Security > Action
Center, then click on Recovery.
2. Click on Open System Restore, then Next.
3. Click on he restore point you want, click on Next, then Finish. A
confirmation message box appears.
4. Click on Yes. Your system is restored using the restore point you
specified. This process may take several minutes, and may restart your
computer.
Returning your system to its factory condition
If your computer experiences problems that are not recoverable by other
methods, you may need to reinstall everything to return your system to its
factory condition. You can reinstall using either your hard drive or the
recovery discs you have created.
Caution: This complete recovery deletes everything on your hard
drive, then reinstalls Windows and all software and drivers that
were pre-installed on your system. If you can access important
files on your hard drive, back them up now.
• If you can still run Windows, see “Recovering from within Windows”
below.
92
• If you cannot run Windows and your original hard drive is still working,
see “Recovering from the hard drive during startup” on page 94.
• If you cannot run Windows and your original hard drive has been
completely re-formatted or you have installed a replacement hard drive,
see “Recovering from your recovery discs” on page 94.
Recovering from within Windows
To reinstall Windows and all pre-installed software and drivers:
1. Click on Start > All Programs > Gateway, then click on Gateway Recovery Management. Gateway Recovery Management opens.
2. Click on the Restore tab, then Restore system to factory default. The
Confirm Restoration dialog box opens.
3. Click on Yes, then Start. A dialog box displays information about the
hard drive that the operating system will be recovered to.
Caution: Continuing the process will erase all files on your hard
drive.
4. Click on OK. The recovery process begins by restarting your computer,
then continues by copying files to your hard drive. This process may
take a while, but a Gateway Recovery Management screen shows you
its progress.
When the recovery has finished, a dialog box prompts you to restart your
computer.
5. Click on OK. Your computer restarts.
6. Follow the on-screen prompts for first-time system setup.
Recovery - 93
Recovering from the hard drive during startup
To reinstall Windows and all pre-installed software and drivers:
1. Turn on your computer, then press Alt+F10 during startup. Gateway Recovery Management opens.
2. Click on Restore system from factory default.
Caution: Continuing the process will erase all files on your hard
drive.
3. Click on Next. Your hard drive’s original, factory-loaded contents are
recovered. This process will take several minutes.
Recovering from your recovery discs
To reinstall Windows and all pre-installed software and drivers:
1. Turn on your computer, insert the first system recovery disc into your
optical disc drive, then restart your computer.
Caution: Continuing the process will erase all files on your hard
drive.
2. If it is not already enabled, you must enable the F12 Boot Menu:
1. Press F2 when starting your computer.
2. Use the left or right arrow keys to select the Main menu.
3. Press the down key until F12 Boot Menu is selected, press F5 to
change this setting to Enabled.
4. Use the left or right arrow keys to select the Exit menu.
5. Select Save Changes and Exit and press Enter. Select OK to
confirm.
94
6. Your computer will restart.
3. During startup, press F12 to open the boot menu. The boot menu allows
you to select which device to start from, such as the hard drive or an
optical disc.
4. Use your arrow keys to select the line CDROM/DVD (this line may start
with ’IDE 1...’), then press Enter. Windows installs from the recovery
disc you inserted.
5. Insert the second recovery disc when prompted, then follow the on-screen
prompts to complete the recovery.
Recovery - 95
REGULATORYINFORMATION
PREVENTIONOFHEARINGLOSS
- Caution: Permanent hearing loss may occur if earphones or headphones are used
at high volume for prolonged periods of time.
This device have been tested to comply with the Sound Pressure Level
requirement laid down in the applicable EN 50332-1 and/or EN 50332-2 standards.
-
Note:
For France, mobile headphones or earphones for this device have
been tested to comply with the Sound Pressure requirement laid down in the
applicable NF EN 50332-1:2000 and/or NF EN 50332-2:2003 standards as required
by French Article L. 5232-1.
- A pleine puissance, l’écoute prolongée du baladeur peut endommager l’oreille de
l’utilisateur.
CAUTION when listening
To protect your hearing, follow these instructions.
- Increase the volume gradually until you can hear clearly and comfortably.
- Do not increase the volume level after your ears have adjusted.
- Do not listen to music at high volumes for extended periods.
- Do not increase the volume to block out noisy surroundings.
- Decrease the volume if you can’t hear people speaking near you.
IRELESSDEVICES
W
Caution: Wireless devices are not user-serviceable. Do not modify them in
any way. Modification to a wireless device will void the authorization to use
it. Contact Gateway for service information.
Caution: The transmitting device embedded in this computer may not be
used with any antenna other than the one provided with the computer.
96
Warning: Using wireless devices while flying in aircraft is prohibited. Switch
off all devices before boarding an aircraft; they may be dangerous to the
operation of the aircraft, disrupt communications, and even be illegal.
F
EDERAL COMMUNICATIONS COMMISSION (FCC) INTENTIONALEMITTERPER FCC PART 15
Low power, Radio transmitter type devices (radio frequency (RF) wireless communication
devices), operating in the 2.4 GHz band and/or 5.15 – 5.35 GHz band, may be present
(embedded) in your computer system. This section is only applicable if these devices are
present. Refer to the system label to verify the presence of wireless devices.
Wireless devices that may be in your system are only qualified for use in the United States
of America if an FCC ID number is on the system label.
Caution: In order to comply with FCC requirements this transmitter must not
be operated (or co-located) in conjunction with any other transmitter or
antenna installed in the computer.
The FCC has set a general guideline of 8 inches (20 cm) separation between the device
and the body, for use of a wireless device near the body (this does not include
extremities). This device should be used more than 8 inches (20 cm) from the body when
wireless devices are on. The power output of the wireless device (or devices), which may
be embedded in your computer, is well below the RF exposure limits as set by the FCC.
The wireless devices installed in this system are intended to be used indoors. In some
areas, use of these devices outdoors is prohibited.
Operation of this device is subject to the following two conditions: (1) This device may not
cause harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation of the device.
U
NINTENTIONALEMITTERPER FCC PART 15
This device has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed
Regulatory information - 97
and used in accordance with the instructions, may cause harmful interference to radio or
television reception. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause interference to radio and television
reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
ADIODEVICEREGULATORYNOTICE
R
-
Note:
Regulatory information below is for models with wireless LAN and/or Bluetooth
only.
General
This product complies with the radio frequency and safety standards of any country or
region in which it has been approved for wireless use. Depending on configuration, this
product may or may not contain wireless radio devices (such as wireless LAN and/or
Bluetooth modules). Information below is for products with such devices.
Wireless operation channels for different domains
N. America2.412-2.462 GHzCh01 through Ch11
Japan2.412-2.484 GHzCh01 through Ch14
Europe ETSI2.412-2.472 GHzCh01 through Ch13
This equipment is in compliance with the essential requirements and other relevant
provisions of Directive 1999/5/EC.
France: Restricted wireless frequency bands
Some areas of France have a restricted frequency band. The worst case maximum
authorized power indoors is:
98
- 10 mW for the entire 2.4 GHz band (2400 MHz - 2483.5 MHz)
- 100 mW for frequencies between 2446.5 MHz and 2483.5 MHz
-
Note:
Channels 10 through 13 inclusive operate in the band 2446.6 MHz to 2483.5 MHz.
There are few possibilities for outdoor use: On private property or on the private property
of public persons, use is subject to a preliminary authorization procedure by the Ministry
of Defense, with maximum authorized power of 100 mW in the 2446.5 - 2483.5 MHz band.
Use outdoors on public property is not permitted.
In the departments listed below, for the entire 2.4 GHz band:
- Maximum authorized power indoors is 100 mW
- Maximum authorized power outdoors is 10 mW
Departments in which the use of the 2400 - 2483.5 MHz band is permitted with an EIRP
of less than 100 mW indoors and less than 10 mW outdoors:
01 Ain Orientales
02 Aisne
03 Allier
05 Hautes Alpes
08 Ardennes
09 Ariege
11 A ud e
12 Aveyron
16 Charente
24 Dordogne
25 Doubs
26 Drome
32 Gers
36 Indre
37 Indre et Loire
41 Loir et Cher
45 Loret
50 Manche
55 Meuse
58 Nievre
59 Nord
60 Oise
61 Orne
63 Puy Du Dome
64 Pyrenees Atlantique
66 Pyrenees
67 Bas Rhin
68 Haut Rhin
70 Haute Saone
71 Saone et Loire
75 Paris
82 Tarn et Garonne
84 Vaucluse
88 Vosges
89 Yonne
90 Territoire de Belfort
94 Val de Marne
This requirement is likely to change over time, allowing you to use your wireless LAN card
in more areas within France.
Please check with ART for the latest information (www.art-telecom.fr).
-
Note:
Your WLAN Card transmits less than 100 mW, but more than 10 mW.
List of National Codes
This equipment may be operated in the following countries:
Country
ISO 3166
2 letter
code
Country
ISO 3166
2 letter
code
Country
ISO 3166
2 letter
code
Country
ISO 3166
2 letter
code
Regulatory information - 99
AustriaATGermanyDEMaltaMTUnited Kingdom GB
BelgiumBEGreeceGRNetherlands NTIcelandIS
CyprusCYHungaryHUPolandPLLiechtensteinLI
Czech Republic CZIrelandIEPortugalPTNorwayNO
DenmarkDKItalyITSlovakiaSKSwitzerlandCH
EstoniaEELatviaLVSloveniaSLBulgariaBG
FinlandFILithuaniaLTSpainESRomaniaRO
FranceFRLuxembourg LUSwedenSETurkeyTR
Compliance accessories
The accessories associated with this equipment are: shielded video cable when an
external monitor is connected. These accessories are required to be used in order to
ensure compliance with FCC rules.
ALIFORNIA PROPOSITION 65 WARNING
C
This product contains chemicals known to the State of California to cause cancer, birth
defects, and/or other reproductive harm. For additional information regarding this product
warning, go to www.gateway.com/prop65.
M
ERCURYWARNING
THE LAMP IN THIS DISPLAY CONTAINS MERCURY. DISPOSE ACCORDING
TO LOCAL, STATE, AND FEDERAL LAW.
TELECOMMUNICATIONSPER PART 68 OFTHE CODEOF FEDERAL REGULATIONS (CFR 47)
(APPLICABLETOPRODUCTSFITTEDWITH USA MODEMS)
Your modem complies with Part 68 of the Code of Federal Regulations (CFR 47) rules.
On the computer or modem card is a label that contains the FCC registration number and
Ringer Equivalence Number (REN) for this device. If requested, this information must be
provided to the telephone company.
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.