User Manual
Page 27
... vulnerability: • Securing the device against unauthorized access • Protecting local storage • Securing the network Acer ProShield includes four modules that will be led through a setup wizard that allows you will secure your computer's specifications to confirm which modules are supported. • Credential Manager - Password, Online accounts configuration • Data Protection...
... vulnerability: • Securing the device against unauthorized access • Protecting local storage • Securing the network Acer ProShield includes four modules that will be led through a setup wizard that allows you will secure your computer's specifications to confirm which modules are supported. • Credential Manager - Password, Online accounts configuration • Data Protection...
User Manual
Page 40
Ports and connectors • Compatible with USB 3.0 and earlier devices. • For optimal performance, use USB 3.0-certified devices. • Defined by the USB 3.0 specification (SuperSpeed USB). 40 -
Ports and connectors • Compatible with USB 3.0 and earlier devices. • For optimal performance, use USB 3.0-certified devices. • Defined by the USB 3.0 specification (SuperSpeed USB). 40 -
User Manual
Page 43
... are most commonly used by the computer. Note Some computers have a single "combo" port that the current resolution and refresh rate do not exceed the specifications of connection supported depends on your computer: 1. Secure the cable connection with the screws provided. 3. Make sure that allows you to connect audio devices. Plugging...
... are most commonly used by the computer. Note Some computers have a single "combo" port that the current resolution and refresh rate do not exceed the specifications of connection supported depends on your computer: 1. Secure the cable connection with the screws provided. 3. Make sure that allows you to connect audio devices. Plugging...