Bluetooth is a trademark owned by its
proprietor and used by Hewlett-Packard
Company under license. Intel is a trademark
of Intel Corporation in the U.S. and other
countries or regions. Java is a U.S.
trademark of Sun Microsystems, Inc.
Microsoft and Windows are U.S. registered
trademarks of Microsoft Corporation. SD
Logo is a trademark of its proprietor.
The information contained herein is subject
to change without notice. The only
warranties for HP products and services are
set forth in the express warranty statements
accompanying such products and services.
Nothing herein should be construed as
constituting an additional warranty. HP shall
not be liable for technical or editorial errors
or omissions contained herein.
First Edition: March 2010
Document Part Number: 601867-001
Product notice
This user guide describes features that are
common to most models. Some features
may not be available on your computer.
Safety warning notice
WARNING! To reduce the possibility of heat-related injuries or of overheating the computer, do not
place the computer directly on your lap or obstruct the computer air vents. Use the computer only on a
hard, flat surface. Do not allow another hard surface, such as an adjoining optional printer, or a soft
surface, such as pillows or rugs or clothing, to block airflow. Also, do not allow the AC adapter to contact
the skin or a soft surface, such as pillows or rugs or clothing, during operation. The computer and the
AC adapter comply with the user-accessible surface temperature limits defined by the International
Standard for Safety of Information Technology Equipment (IEC 60950).
iii
iv Safety warning notice
Table of contents
1 Features ........................................................................................................................................................... 1
Checking your audio functions ........................................................................................... 43
Video .................................................................................................................................................. 45
Connecting an external monitor or projector ...................................................................... 45
Using the external monitor port ......................................................................... 45
Using the HDMI port .......................................................................................................... 45
Configuring audio for HDMI ............................................................................................... 46
5 Power management ...................................................................................................................................... 59
Setting power options ......................................................................................................................... 59
Using power-saving states ................................................................................................. 59
Initiating and exiting Standby ............................................................................ 59
Initiating and exiting Hibernation ....................................................................... 60
Using the Power Meter ...................................................................................................... 60
Using power schemes ....................................................................................................... 61
Viewing the current scheme .............................................................................. 61
Selecting a different power scheme .................................................................. 61
Customizing power schemes ............................................................................ 62
Setting password protection upon exiting Standby ............................................................ 62
Using external AC power .................................................................................................................... 62
Connecting the AC adapter ............................................................................................... 63
Using battery power ........................................................................................................................... 63
Displaying the remaining battery charge ........................................................................... 64
Inserting or removing the battery ....................................................................................... 64
Charging a battery ............................................................................................................. 66
Maximizing battery discharge time .................................................................................... 66
Cleaning the display ........................................................................................................ 140
Cleaning the sides and cover .......................................................................................... 140
Cleaning the TouchPad and keyboard ............................................................................ 140
Cleaning a tablet PC pen and pen holder ........................................................................ 140
Index ................................................................................................................................................................. 141
xi
xii
1Features
Identifying hardware
To see a list of hardware installed in the computer:
1.Select Start > My Computer.
2.In the left pane of the System Tasks window, select View system information.
3.Select Hardware tab > Device Manager.
You can also add hardware or modify device configurations using Device Manager.
Top components
TouchPad
ComponentDescription
(1)TouchPad*Moves the pointer and selects or activates items on the screen.
(2)TouchPad button*The left and right sides of the single button function like the left and
right buttons on an external mouse.
Identifying hardware1
ComponentDescription
(3)TouchPad scroll zoneScrolls up or down.
*This table describes factory settings. To view or change pointing device preferences, select Start > Control Panel > Printers
and Other Hardware > Mouse.
2Chapter 1 Features
Lights
NOTE: Refer to the illustration that most closely matches your computer.
ComponentDescription
(1)Caps lock lightOn: Caps lock is on.
Identifying hardware3
ComponentDescription
(2)Power light
(3)Wireless light
Buttons, switch, and speaker
On: The computer is on.
●
Blinking: The computer is in Standby.
●
Off: The computer is off or in Hibernation.
●
White: An integrated wireless device, such as a wireless local
●
area network (WLAN) device and/or a Bluetooth® device, is
on.
Amber: All wireless devices are off.
●
ComponentDescription
(1)SpeakerProduces sound.
4Chapter 1 Features
ComponentDescription
(2)Internal display switchTurns off the display if the panel lid is closed while the power is on.
(3)Power button
When the computer is off, press the button to turn on the
●
computer.
When the computer is on, press the button to shut down the
●
computer.
When the computer is in Standby, press the button briefly to
●
exit Standby.
When the computer is in Hibernation, press the button briefly
●
to exit Hibernation.
If the computer has stopped responding and Windows shutdown
procedures are ineffective, press and hold the power button for at
least 5 seconds to turn off the computer.
To learn more about your power settings, select Start > Control
Panel > Performance and Maintenance > Power Options.
Identifying hardware5
Keys
NOTE: Refer to the illustration and table that most closely matches your computer.
ComponentDescription
(1)esc keyDisplays system information when pressed in combination with the
fn key.
(2)fn keyExecutes frequently used system functions when pressed in
(3)Windows logo keyDisplays the Windows Start menu.
(4)Windows applications keyDisplays a shortcut menu for items beneath the cursor.
(5)Embedded numeric keypad keysCan be used like the keys on an external numeric keypad when
(6)Function keysExecute frequently used system functions when pressed in
(7)Wireless keyBecause the wireless devices are enabled at the factory, use the
combination with a function key or the esc key.
pressed in combination with the fn and num lk keys.
combination with the fn key.
wireless key to turn on or turn off the wireless devices
simultaneously.
6Chapter 1 Features
ComponentDescription
(1)esc keyDisplays system information when pressed in combination with the
fn key.
(2)fn keyExecutes frequently used system functions when pressed in
(3)Windows logo keyDisplays the Windows Start menu.
(4)Windows applications keyDisplays a shortcut menu for items beneath the cursor.
(5)Embedded numeric keypad keysCan be used like the keys on an external numeric keypad when
(6)Wireless keyBecause the wireless devices are enabled at the factory, use the
(7)Function keysExecute frequently used system functions when pressed in
Front components
combination with a function key or the esc key.
pressed in combination with the fn and num lk keys.
wireless key to turn on or turn off the wireless devices
simultaneously.
combination with the fn key.
Identifying hardware7
ComponentDescription
(1)SD Card ReaderSupports the following optional digital card formats:
(2)Audio-out (headphone) jackProduces sound when connected to optional powered stereo
(3)Audio-in (microphone) jackConnects an optional computer headset microphone, stereo array
Right-side components
MultiMediaCard (MMC)
●
MultiMediaCard 4.2 (MMC Plus, including MMC Plus HC)
●
Secure Digital (SD) Memory Card
●
Secure Digital High Capacity (SDHC) Memory Card
●
Secure Digital High Speed (SDHS) Memory Card
●
speakers, headphones, ear buds, a headset, or television audio.
NOTE: When a device is connected to the headphone jack, the
computer speakers are disabled.
microphone, or monaural microphone.
ComponentDescription
(1)USB ports (2)Connect optional USB devices.
(2)RJ-11 (modem) jack (select models only)Connects a modem cable.
(3)Optical drive (select models only)Reads optical discs and, on select models, also writes to optical
(4)Optical drive light (select models only)Blinking: The optical drive is being accessed.
(2)Security cable slotAttaches an optional security cable to the computer.
(3)VentEnables airflow to cool internal components.
NOTE: The security cable is designed to act as a deterrent, but
it may not prevent the computer from being mishandled or stolen.
NOTE: The computer fan starts up automatically to cool internal
components and prevent overheating. It is normal for the internal
fan to cycle on and off during routine operation.
(4)External monitor portConnects an external VGA monitor or projector.
(5)Battery light
(6)Power connectorConnects an AC adapter.
(7)RJ-45 (network) jackConnects a network cable.
(8)HDMI portConnects an optional HDMI device.
(9)USB port (1)Connect optional USB devices.
Amber: A battery is charging.
●
Turquoise: A battery is close to full charge capacity.
●
Blinking amber: A battery that is the only available power
●
source has reached a low battery level. When the battery
reaches a critical battery level, the battery light begins blinking
rapidly.
Off: If the computer is plugged into an external power source,
●
the light turns off when all batteries in the computer are fully
charged. If the computer is not plugged into an external power
source the light stays off until the battery reaches a low battery
level.
Bottom components
NOTE: Refer to the illustration that most closely matches your computer.
Identifying hardware9
ComponentDescription
(1)Battery release latches (2)Release the battery from the battery bay.
(2)Battery bayHolds the battery.
10Chapter 1 Features
ComponentDescription
(3)Vents (3)Enable airflow to cool internal components.
(4)Memory module compartmentContains the memory module slots.
WLAN module compartmentContains the wireless LAN module slot.
Hard drive bayHolds the hard drive and a Bluetooth device.
Multimedia components
NOTE: The computer fan starts up automatically to cool internal
components and prevent overheating. It is normal for the internal
fan to cycle on and off during routine operation.
CAUTION: To prevent an unresponsive system and the display
of a warning message, replace the WLAN module with only a
module authorized for use in the computer by the governmental
agency that regulates wireless devices in your country. If you
replace the module and then receive a warning message, remove
the module to restore computer functionality, and then contact
technical support through Help and Support.
ComponentDescription
(1)Webcam light (select models only)On: The webcam is in use.
(2)Webcam (select models only)Records video and captures still photographs.
Identifying hardware11
ComponentDescription
(3)Integrated microphoneRecords sound.
(4)Audio-out (headphone) jackProduces sound when connected to optional powered stereo
speakers, headphones, ear buds, a headset, or television audio.
NOTE: When a device is connected to the headphone jack, the
computer speakers are disabled.
(5)Audio-in (microphone) jackConnects an optional computer headset microphone, stereo array
(6)SpeakerProduces sound.
Wireless antennas (select models only)
On select computer models, at least 2 antennas send and receive signals from one or more wireless
devices. These antennas are not visible from the outside of the computer.
microphone, or monaural microphone.
NOTE: For optimal transmission, keep the areas immediately around the antennas free from
obstructions.
To see wireless regulatory notices, refer to the section of the Regulatory, Safety and EnvironmentalNotices that applies to your country or region. These notices are located in Help and Support.
12Chapter 1 Features
Additional hardware components
ComponentDescription
(1)Power cord*Connects an AC adapter to an AC outlet.
(2)AC adapterConverts AC power to DC power.
(3)Battery*Powers the computer when the computer is not plugged into
*Modem cables, batteries, modem cable adapters, and power cords vary in appearance by country or region.
Identifying the labels
The labels affixed to the computer provide information you may need when you troubleshoot system
problems or travel internationally with the computer:
Service tag—Provides important information, including the following:
●
Product name (1). This is the product name affixed to the front of your notebook.
◦
Serial number (s/n) (2). This is an alphanumeric identifier that is unique to each product.
◦
Part number/Product number (p/n) (3). This number provides specific information about the
◦
product's hardware components. The part number helps a service technician to determine
what components and parts are needed.
external power.
Identifying the labels13
Model description (4). This is the number you use to locate documents, drivers, and support
◦
for your notebook.
Warranty period (5). Describes the duration of the warranty period for this computer.
◦
Have this information available when you contact technical support. The service tag label is affixed
to the bottom of the computer.
Microsoft® Certificate of Authenticity—Contains the Windows Product Key. You may need the
●
Product Key to update or troubleshoot the operating system. This certificate is affixed to the bottom
of the computer.
Regulatory label—Provides regulatory information about the computer. The regulatory label is
●
affixed to the bottom of the computer.
Modem approval label—Provides regulatory information about the modem and lists the agency
●
approval markings required by some of the countries in which the modem has been approved for
use. You may need this information when traveling internationally. The modem approval label is
affixed to the bottom of the computer.
Wireless certification label(s) (select models only)—Provide information about optional wireless
●
devices and the approval markings of some of the countries in which the devices have been
approved for use. An optional device may be a WLAN device or a Bluetooth device. If your computer
model includes one or more wireless devices, one or more certification labels are included with
your computer. You may need this information when traveling internationally. Wireless certification
labels are affixed to the bottom of the computer.
14Chapter 1 Features
2Networking
Using wireless devices (select models only)
Wireless technology transfers data across radio waves instead of wires. Your computer may be
equipped with one or more of the following wireless devices:
WLAN device—Connects the computer to wireless local area networks (commonly referred to as
●
Wi-Fi networks, wireless LANs, or WLANs) in corporate offices, your home, and public places such
as airports, restaurants, coffee shops, hotels, and universities. In a WLAN, each mobile wireless
device communicates with a wireless router or a wireless access point.
Bluetooth device—Creates a personal area network (PAN) to connect to other Bluetooth-enabled
●
devices such as computers, phones, printers, headsets, speakers, and cameras. In a PAN, each
device communicates directly with other devices, and devices must be relatively close together—
typically within 10 meters (approximately 33 feet) of each other.
Computers with WLAN devices support one or more of the following IEEE industry standards:
802.11b, the first popular standard, supports data rates of up to 11 Mbps and operates at a
●
frequency of 2.4 GHz.
802.11g supports data rates of up to 54 Mbps and operates at a frequency of 2.4 GHz. An 802.11g
●
WLAN device is backward compatible with 802.11b devices, so they can operate on the same
network.
802.11a supports data rates of up to 54 Mbps and operates at a frequency of 5 GHz.
●
NOTE: 802.11a is not compatible with 802.11b and 802.11g.
802.11n supports data rates of up to 450 Mbps and may operate at 2.4 GHz or 5 GHz, making it
●
backward compatible with 802.11a, b, and g.
NOTE: The specifications for the 802.11n WLAN are draft specifications and are not final. If the
final specifications differ from the draft specifications, it may affect the ability of the computer to
communicate with other 802.11n WLAN devices.
For more information on wireless technology, refer to the information and Web site links provided in
Help and Support.
Identifying wireless and network icons
IconNameDescription
Wireless (connected) Identifies the location of the wireless lights and the wireless switch on
the computer.
Using wireless devices (select models only)15
Wireless
(disconnected)
Indicates that all of the wireless devices are off.
Network status
(connected)
Network status
(disconnected)
Using the wireless controls
You can control the wireless devices in your computer using these features:
Wireless key or wireless button (referred to in this guide as the wireless key)
●
Operating system controls
●
Using the wireless key
The computer has a wireless key, one or more wireless devices, and one wireless light, All of the wireless
devices on your computer are enabled at the factory, so the wireless light is on (white) when you turn
on the computer.
The wireless light indicates the overall power state of your wireless devices, not the status of individual
devices. If the wireless light is white, at least one wireless device is on. If the wireless light is amber, all
wireless devices are off.
Indicates that one or more of your network drivers are installed and one
or more network devices are connected to the network.
Indicates that one or more of your network drivers are installed but no
network devices are connected to the network.
Because the wireless devices are enabled at the factory, you can use the wireless key to turn on or turn
off the wireless devices simultaneously. Individual wireless devices can be controlled through Wireless
Assistant software (select models only) or through Computer Setup.
NOTE: If the wireless devices are disabled by Computer Setup, the wireless key will not work until you
reenable your devices.
Using operating system controls
Some operating systems also offer a way to manage integrated wireless devices and the wireless
connection. For more information, refer to the operating system documentation.
16Chapter 2 Networking
Using a WLAN
With a WLAN device, you can access a wireless local area network (WLAN), which is composed of other
computers and accessories that are linked by a wireless router or a wireless access point.
NOTE: The terms wireless router and wireless access point are often used interchangeably.
A large-scale WLAN, such as a corporate or public WLAN, typically uses wireless access points
●
that can accommodate a large number of computers and accessories and can separate critical
network functions.
A home or small office WLAN typically uses a wireless router, which allows several wireless and
●
wired computers to share an Internet connection, a printer, and files without requiring additional
pieces of hardware or software.
To use the WLAN device in your computer, you must connect to a WLAN infrastructure (provided through
a service provider or a public or corporate network).
Setting up a WLAN
To set up a WLAN and connect to the Internet, you need the following equipment:
A broadband modem (either DSL or cable) (1) and high-speed Internet service purchased from an
●
Internet service provider (ISP)
A wireless router (purchased separately) (2)
●
The wireless computer (3)
●
The illustration below shows an example of a wireless network installation that is connected to the
Internet.
As your network grows, additional wireless and wired computers can be connected to the network to
access the Internet.
For help in setting up your WLAN, refer to the information provided by your router manufacturer or your
ISP.
Protecting your WLAN
Because the WLAN standard was designed with only limited security capabilities—basically to foil casual
eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are
vulnerable to well-known and well-documented security weaknesses.
WLANs in public areas, or “hotspots,” like coffee shops and airports may not provide any security. New
technologies are being developed by wireless manufacturers and hotspot service providers that make
the public environment more secure and anonymous. If you are concerned about the security of your
computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.
Using a WLAN17
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA) and
Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN
devices can pick up unprotected signals and either connect to your network (uninvited) or capture
information being sent across it. However, you can take precautions to protect your WLAN:
Use a wireless transmitter with built-in security
●
Many wireless base stations, gateways, and routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
Work behind a firewall
●
A firewall is a barrier that checks both data and requests for data that are sent to your network and
then discards any suspicious items. Firewalls are available in many varieties, both software and
hardware. Some networks use a combination of both types.
Use wireless encryption
●
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP) is a wireless security protocol that uses a WEP key to
◦
encode or encrypt all network data before it is transmitted. Usually, you can allow the network
to assign the WEP key. Alternatively, you can set up your own key, generate a different key,
or choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
◦
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses temporal key integrity protocol (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Close your network
●
If possible, prevent your network name (SSID) from being broadcast by the wireless transmitter.
Most networks initially broadcast the name, telling any computer nearby that your network is
available. By closing the network, other computers are less likely to know that your network exists.
NOTE: If your network is closed and the SSID is not broadcast, you will need to know or remember
the SSID to connect new devices to the network. Write down the SSID and store it in a secure
place before closing the network.
18Chapter 2 Networking
Loading...
+ 128 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.