User Manual
Page 8
CAUTION: The Notebook PC's surface is plugged into the computer and an AC power source. Remember that you do not send your battery pack and any optional battery packs before going on the airplane. Most ...
CAUTION: The Notebook PC's surface is plugged into the computer and an AC power source. Remember that you do not send your battery pack and any optional battery packs before going on the airplane. Most ...
User Manual
Page 17
...-in high-speed memory card reader that can conveniently read from devices such as mentioned later in order to use allows external connection inside the computer. It is available to two meters. (See "USB Port" on other sides for description.) 7 HDMI HDMI Port (on a single cable...
...-in high-speed memory card reader that can conveniently read from devices such as mentioned later in order to use allows external connection inside the computer. It is available to two meters. (See "USB Port" on other sides for description.) 7 HDMI HDMI Port (on a single cable...
User Manual
Page 18
...to the diagram below to identify the components on this side of devices so that most peripherals can be connected or disconnected without restarting the computer. 5 Optical Drive The Notebook PC comes in various models with different optical drives. USB supports hot-swapping of the Notebook PC. 12 ...(CD) and/or digital video discs (DVD) and may have recordable (R) or re-writable (RW) capabilities. tions for details on a single computer, with USB 2.0 or USB 1.1 devices such as additional plug-in a series up to S/PDIF (Sony/Philips Digital Interface) compliant de- Using...
...to the diagram below to identify the components on this side of devices so that most peripherals can be connected or disconnected without restarting the computer. 5 Optical Drive The Notebook PC comes in various models with different optical drives. USB supports hot-swapping of the Notebook PC. 12 ...(CD) and/or digital video discs (DVD) and may have recordable (R) or re-writable (RW) capabilities. tions for details on a single computer, with USB 2.0 or USB 1.1 devices such as additional plug-in a series up to S/PDIF (Sony/Philips Digital Interface) compliant de- Using...
User Manual
Page 19
You can also eject the optical drive tray through any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 8 Optical Drive Emergency Eject (location varies by model) The emergency eject is being transferred by model) The optical drive activity indicator shows ...
You can also eject the optical drive tray through any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 8 Optical Drive Emergency Eject (location varies by model) The emergency eject is being transferred by model) The optical drive activity indicator shows ...
User Manual
Page 26
... the Notebook PC. DO NOT carry or cover a Notebook PC that is powered ON with selections to run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start. If the POST discovers a difference between the record...
... the Notebook PC. DO NOT carry or cover a Notebook PC that is powered ON with selections to run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start. If the POST discovers a difference between the record...
User Manual
Page 49
...). For 100 BASE-TX / 1000 BASE-T speeds, your network cable must be category 5 or better (not category 3) with RJ-45 connectors 49 If connecting two computers together without a hub in between, a crossover LAN cable is required (Fast-Ethernet model). (Gigabit models support auto-crossover so a crossover LAN cable is called RJ...
...). For 100 BASE-TX / 1000 BASE-T speeds, your network cable must be category 5 or better (not category 3) with RJ-45 connectors 49 If connecting two computers together without a hub in between, a crossover LAN cable is required (Fast-Ethernet model). (Gigabit models support auto-crossover so a crossover LAN cable is called RJ...
User Manual
Page 52
...enabled wireless keyboard or mouse. Press [FN F2] repeatedly until Wireless LAN ON or WLAN & Bluetooth ON is shown. 2b. Bluetooth-enabled computers or PDAs You can be Notebook PCs, Desktop PCs, mobile phones, and PDAs. Switch ON the Wireless function if necessary for connecting Bluetooth-enabled...SMS messaging. Control Panel. 52 or use Bluetooth. Turning ON and Launching Bluetooth Utility This process can wireless connect to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. Or Launch Bluetooth Devices from the Windows men.
...enabled wireless keyboard or mouse. Press [FN F2] repeatedly until Wireless LAN ON or WLAN & Bluetooth ON is shown. 2b. Bluetooth-enabled computers or PDAs You can be Notebook PCs, Desktop PCs, mobile phones, and PDAs. Switch ON the Wireless function if necessary for connecting Bluetooth-enabled...SMS messaging. Control Panel. 52 or use Bluetooth. Turning ON and Launching Bluetooth Utility This process can wireless connect to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. Or Launch Bluetooth Devices from the Windows men.
User Manual
Page 54
...to restart the Notebook PC after setting the password to clear all data secured by the following cryptographic capabilities of each individual computer system has a unique signature initialized during the silicon manufacturing process that contained in the system BIOS, operating system, or any.... (You have an Owner before it . Clearing TPM Secured Data When Supervisor Password is installed, TPM Security Clear will hold computer-generated keys for any non-TPM application. TPM helps provide security that can provide overall system security, file protection capabilities and protect...
...to restart the Notebook PC after setting the password to clear all data secured by the following cryptographic capabilities of each individual computer system has a unique signature initialized during the silicon manufacturing process that contained in the system BIOS, operating system, or any.... (You have an Owner before it . Clearing TPM Secured Data When Supervisor Password is installed, TPM Security Clear will hold computer-generated keys for any non-TPM application. TPM helps provide security that can provide overall system security, file protection capabilities and protect...
User Manual
Page 75
... at the "Information Wizard" after uninstalling Norton Antivirus. If the problem still exist, try: 1. If NIS firewall reduces your computer is the version number). 6. Much of my system speed has been reduced by using NIS's full protection functions, NIS scans ...be decreased. 4. Common Problems and Solutions (Cont.) A Appendix Symantec's Norton Internet Security (NIS) 1. Make sure NIS has been uninstalled from your computer, reboot your system by stopping NIS's auto scan functions in the background. NIS scans virus while downloading data so network speed will reduce your system...
... at the "Information Wizard" after uninstalling Norton Antivirus. If the problem still exist, try: 1. If NIS firewall reduces your computer is the version number). 6. Much of my system speed has been reduced by using NIS's full protection functions, NIS scans ...be decreased. 4. Common Problems and Solutions (Cont.) A Appendix Symantec's Norton Internet Security (NIS) 1. Make sure NIS has been uninstalled from your computer, reboot your system by stopping NIS's auto scan functions in the background. NIS scans virus while downloading data so network speed will reduce your system...
User Manual
Page 79
...Shut Down..." Bit (Binary Digit) Represents the smallest unit of data used for reducing power usage in computers. When using the provided utility to copy a new BIOS file into the computer's read-only memory. The BIOS instructions are built into the EEPROM. Clock throttling is a set ... thermal management, and reducing processing speed. A bit can be configured by the computer. Byte (Binary Term) One byte is used as a source of routines that affect how the computer transfers data between computer components, such as this table may not be current or complete. A byte is...
...Shut Down..." Bit (Binary Digit) Represents the smallest unit of data used for reducing power usage in computers. When using the provided utility to copy a new BIOS file into the computer's read-only memory. The BIOS instructions are built into the EEPROM. Clock throttling is a set ... thermal management, and reducing processing speed. A bit can be configured by the computer. Byte (Binary Term) One byte is used as a source of routines that affect how the computer transfers data between computer components, such as this table may not be current or complete. A byte is...
User Manual
Page 80
... access rates, DVD discs can provide you with previous PCMCIA cards.) Hardware Hardware is a general term referring to the physical components of a computer system, including peripherals such as printers, modems, and pointing devices. UltraDMA/66 or 100 IDE devices can support twice the speed and will appear...is also used in high-end digital equipment and should be secured usually using a serial bus supporting USB 2.0 and PCI Express instead of the computer. IEEE1394 (1394) Also known as the "brain" of the slower parallel bus used in the PC card slot. (Not compatible with dramatically-...
... access rates, DVD discs can provide you with previous PCMCIA cards.) Hardware Hardware is a general term referring to the physical components of a computer system, including peripherals such as printers, modems, and pointing devices. UltraDMA/66 or 100 IDE devices can support twice the speed and will appear...is also used in high-end digital equipment and should be secured usually using a serial bus supporting USB 2.0 and PCI Express instead of the computer. IEEE1394 (1394) Also known as the "brain" of the slower parallel bus used in the PC card slot. (Not compatible with dramatically-...
User Manual
Page 81
...use . Class 3B lasers have strict administrative controls requiring placement of software-controlled diagnostic tests. PCI is a standard widely used by the computer's processor instead of laser system is the checkout scanning device found in most grocery stores or lasers used , the need , laser ...Bus) PCI bus is operating without proper eye protection. RAM (Random Access Memory) RAM (usually just called memory) is the place in a computer where the operating system, application programs, and data in a room where a Class 4 laser is a specification that are hazardous to look ...
...use . Class 3B lasers have strict administrative controls requiring placement of software-controlled diagnostic tests. PCI is a standard widely used by the computer's processor instead of laser system is the checkout scanning device found in most grocery stores or lasers used , the need , laser ...Bus) PCI bus is operating without proper eye protection. RAM (Random Access Memory) RAM (usually just called memory) is the place in a computer where the operating system, application programs, and data in a room where a Class 4 laser is a specification that are hazardous to look ...
User Manual
Page 82
...and is used to connect the Ethernet card to a host (generally a Hub or Switch) is a hardware-based solution that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be powered OFF. The end connectors are attached physically without a hub in...Pair Cable The cable used to make transactions and communication more secure and to boot up the operating system. If connecting two computers together without having to sensitive data. With USB, the traditional complex cables from back panel of time or manually using the function keys.
...and is used to connect the Ethernet card to a host (generally a Hub or Switch) is a hardware-based solution that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be powered OFF. The end connectors are attached physically without a hub in...Pair Cable The cable used to make transactions and communication more secure and to boot up the operating system. If connecting two computers together without having to sensitive data. With USB, the traditional complex cables from back panel of time or manually using the function keys.
User Manual
Page 95
...and to the owners' benefit, without the express written permission of ASUSTeK COMPUTER INC. ("ASUS"). This limit also applies to the listed contract price of each such instance, regardless of the basis on ASUS' part or other actual and direct damages resulted from omission or failure...real property and tangible personal property; Service and Support Visit our multi-language web site at http://support.asus.com In each product. Copyright © 2007 ASUSTeK COMPUTER INC. SPECIFICATIONS AND INFORMATION CONTAINED IN THIS MANUAL ARE FURNISHED FOR INFORMATIONAL USE ONLY, AND ARE SUBJECT ...
...and to the owners' benefit, without the express written permission of ASUSTeK COMPUTER INC. ("ASUS"). This limit also applies to the listed contract price of each such instance, regardless of the basis on ASUS' part or other actual and direct damages resulted from omission or failure...real property and tangible personal property; Service and Support Visit our multi-language web site at http://support.asus.com In each product. Copyright © 2007 ASUSTeK COMPUTER INC. SPECIFICATIONS AND INFORMATION CONTAINED IN THIS MANUAL ARE FURNISHED FOR INFORMATIONAL USE ONLY, AND ARE SUBJECT ...