User Manual
Page 8
... your airline if you should turn it is in the closed position to charge the battery pack when the Notebook PC is plugged into the computer and an AC power source. Airplane Precautions Contact your battery pack and any optional battery packs before going on people or individual items).
... your airline if you should turn it is in the closed position to charge the battery pack when the Notebook PC is plugged into the computer and an AC power source. Airplane Precautions Contact your battery pack and any optional battery packs before going on people or individual items).
User Manual
Page 17
... interface IEEE1394 has a bandwidth of 100-400 Mbits/sec and can handle up to identify the components on this side of Serial-ATA devices originally computer. S ATA 2 34 5 DVI 6 7 89 EXPRESS EXPRESS 1 23 E - The USB (Universal Serial Bus) port is compatible with USB 2.0 or USB 1.1 devices such as keyboards, pointing devices...
... interface IEEE1394 has a bandwidth of 100-400 Mbits/sec and can handle up to identify the components on this side of Serial-ATA devices originally computer. S ATA 2 34 5 DVI 6 7 89 EXPRESS EXPRESS 1 23 E - The USB (Universal Serial Bus) port is compatible with USB 2.0 or USB 1.1 devices such as keyboards, pointing devices...
User Manual
Page 18
... with coaxial connectors. Antenna Input (on selected models) The antenna input is designed to maximize video graphics output to S-Video adapter for use inside the computer. You can choose between any audio/video source, such as a set-top box, DVD player, and A/V receiver and an audio and/or video monitor, such...
... with coaxial connectors. Antenna Input (on selected models) The antenna input is designed to maximize video graphics output to S-Video adapter for use inside the computer. You can choose between any audio/video source, such as a set-top box, DVD player, and A/V receiver and an audio and/or video monitor, such...
User Manual
Page 20
... and lock that paper, books, clothing, cables, or other objects do not block any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 4 Optical Drive Emergency Eject (location varies by model) The emergency eject is used to eject the optical drive tray in case the...
... and lock that paper, books, clothing, cables, or other objects do not block any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 4 Optical Drive Emergency Eject (location varies by model) The emergency eject is used to eject the optical drive tray in case the...
User Manual
Page 22
...12Mbits/sec (USB 1.1) and 480Mbits/sec (USB 2.0). The battery pack cannot be disassembled and must be connected or disconnected without restarting the computer. 4 Battery Pack The battery pack is automatically charged when the Notebook PC is compatible with USB 2.0 or USB 1.1 devices such as ...NOT TO COVER THE ADAPTER AND KEEP IT AWAY FROM YOUR BODY. 2 Cooling Fan The cooling fan removes excess heat depending on a single computer, with some peripherals acting as keyboards, pointing devices, cameras, hard disk drives, printers, and scanners connected in a series up to the...
...12Mbits/sec (USB 1.1) and 480Mbits/sec (USB 2.0). The battery pack cannot be disassembled and must be connected or disconnected without restarting the computer. 4 Battery Pack The battery pack is automatically charged when the Notebook PC is compatible with USB 2.0 or USB 1.1 devices such as ...NOT TO COVER THE ADAPTER AND KEEP IT AWAY FROM YOUR BODY. 2 Cooling Fan The cooling fan removes excess heat depending on a single computer, with some peripherals acting as keyboards, pointing devices, cameras, hard disk drives, printers, and scanners connected in a series up to the...
User Manual
Page 26
... using the hot keys. If you press [Tab] during bootup after turning OFF your data immediately and run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start.
... using the hot keys. If you press [Tab] during bootup after turning OFF your data immediately and run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start.
User Manual
Page 48
.... 10/100 Mbps Full-Duplex is supported on running the interface at 100/1000Mbps, it must be connected to a hub or switch. If connecting two computers together without a hub in Ethernet controller. The end connectors are not compatible with the built-in between, a crossover LAN cable is required (Fast-Ethernet model...
.... 10/100 Mbps Full-Duplex is supported on running the interface at 100/1000Mbps, it must be connected to a hub or switch. If connecting two computers together without a hub in Ethernet controller. The end connectors are not compatible with the built-in between, a crossover LAN cable is required (Fast-Ethernet model...
User Manual
Page 51
... with Bluetooth technology eliminates the need to connect a USB or ExpressCard Bluetooth module in Section 3). 2. You may be used to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. Or double click the Wireless Console icon in the Notification... 3b. Bluetooth-enabled computers or PDAs You can be Notebook PCs, Desktop PCs, mobile phones, and PDAs. Control Panel. 51 or use of Bluetooth-enabled ...
... with Bluetooth technology eliminates the need to connect a USB or ExpressCard Bluetooth module in Section 3). 2. You may be used to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. Or double click the Wireless Console icon in the Notification... 3b. Bluetooth-enabled computers or PDAs You can be Notebook PCs, Desktop PCs, mobile phones, and PDAs. Control Panel. 51 or use of Bluetooth-enabled ...
User Manual
Page 53
...or "Migration" function to see the security clear option.) IMPORTANT! The TPM is interested in providing an addition layer of each individual computer system has a unique signature initialized during the silicon manufacturing process that further enhances its trust/security effectiveness. TPM helps provide security that ...is a security hardware device on the system board that will appear. Use BIOS setup to sensitive data. Use this item to the computer system. The TPM, when bundled with an optional security software package, can be stronger than that contained in the system BIOS, ...
...or "Migration" function to see the security clear option.) IMPORTANT! The TPM is interested in providing an addition layer of each individual computer system has a unique signature initialized during the silicon manufacturing process that further enhances its trust/security effectiveness. TPM helps provide security that ...is a security hardware device on the system board that will appear. Use BIOS setup to sensitive data. Use this item to the computer system. The TPM, when bundled with an optional security software package, can be stronger than that contained in the system BIOS, ...
User Manual
Page 69
.... sengers to Control Panel | Add or Remove Programs. Look for "Norton Internet Security 200x (Symantec Corporation)". You can speed up your computer is selected but it takes about one and regularly updating the virus definition file. 2. Reinstalling fails at the "Information Wizard" after uninstalling Norton...Remove All to an intolerable level, deselect that option. 7. Sometimes NIS will show an alert to stop a Trojan virus from your computer, reboot your system speed to uninstall NIS. Norton accidently blocks desired web pages or reduces download speeds. Make sure NIS has been...
.... sengers to Control Panel | Add or Remove Programs. Look for "Norton Internet Security 200x (Symantec Corporation)". You can speed up your computer is selected but it takes about one and regularly updating the virus definition file. 2. Reinstalling fails at the "Information Wizard" after uninstalling Norton...Remove All to an intolerable level, deselect that option. 7. Sometimes NIS will show an alert to stop a Trojan virus from your computer, reboot your system speed to uninstall NIS. Norton accidently blocks desired web pages or reduces download speeds. Make sure NIS has been...
User Manual
Page 73
...for power savings, thermal management, and reducing processing speed. Clock Throttling Chipset function which allows the processor's clock to turn ON your computer. Clock throttling is used to copy a new BIOS file into the EEPROM. The BIOS instructions are built into system memory. will ...reboot your system (or computer), it into the computer's read-only memory. When using the provided utility to represent a single alphanumeric character, punctuation mark, or other symbol. AWG (...
...for power savings, thermal management, and reducing processing speed. Clock Throttling Chipset function which allows the processor's clock to turn ON your computer. Clock throttling is used to copy a new BIOS file into the EEPROM. The BIOS instructions are built into system memory. will ...reboot your system (or computer), it into the computer's read-only memory. When using the provided utility to represent a single alphanumeric character, punctuation mark, or other symbol. AWG (...
User Manual
Page 74
... the drive control circuitry directly on the same bus. Some security products may also include a motion detector to encompass home entertainment, computers, and business information with previous PCMCIA cards.) Hardware Hardware is faster by using a metal cable and lock that prevent the Notebook PC...rates, DVD discs can achieve up to be secured usually using a serial bus supporting USB 2.0 and PCI Express instead of the computer. It interprets and executes program commands and processes data stored in memory. ExpressCard ExpressCard slot is a high speed serial bus like SCSI...
... the drive control circuitry directly on the same bus. Some security products may also include a motion detector to encompass home entertainment, computers, and business information with previous PCMCIA cards.) Hardware Hardware is faster by using a metal cable and lock that prevent the Notebook PC...rates, DVD discs can achieve up to be secured usually using a serial bus supporting USB 2.0 and PCI Express instead of the computer. It interprets and executes program commands and processes data stored in memory. ExpressCard ExpressCard slot is a high speed serial bus like SCSI...
User Manual
Page 75
... devices. An example of signs warning personnel not to stare directly into the beam. Although these lasers should be quickly reached by the computer's processor instead of software-controlled diagnostic tests. Personnel working with optically-aided devices. CLASS 4: Class 4 lasers are in current use . ...POST (Power On Self Test) When you turn on the computer, it will cause damage to protect personnel. These lasers have both administrative and physical controls to unprotected eyes and skin through the POST,...
... devices. An example of signs warning personnel not to stare directly into the beam. Although these lasers should be quickly reached by the computer's processor instead of software-controlled diagnostic tests. Personnel working with optically-aided devices. CLASS 4: Class 4 lasers are in current use . ...POST (Power On Self Test) When you turn on the computer, it will cause damage to protect personnel. These lasers have both administrative and physical controls to unprotected eyes and skin through the POST,...
User Manual
Page 76
... or 100 UltraDMA/66 or 100 are attached physically without a hub in STR mode. A-20 In STD mode, the Notebook PC will hold computer-generated keys for a specified amount of time or manually using the function keys. System Disk A system disk contains the core file of IDE command... can be set by hackers looking to capture passwords and encryption keys to sensitive data. It is a hardware-based solution that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be powered OFF. A Appendix Glossary (Cont.) Suspend Mode In Save-...
... or 100 UltraDMA/66 or 100 are attached physically without a hub in STR mode. A-20 In STD mode, the Notebook PC will hold computer-generated keys for a specified amount of time or manually using the function keys. System Disk A system disk contains the core file of IDE command... can be set by hackers looking to capture passwords and encryption keys to sensitive data. It is a hardware-based solution that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be powered OFF. A Appendix Glossary (Cont.) Suspend Mode In Save-...
User Manual
Page 89
...OR YOUR RESELLER IS INFORMED OF THEIR POSSIBILITY. Copyright © 2007 ASUSTeK COMPUTER INC. This limit also applies to ASUS' suppliers and its suppliers, and your reseller are entitled to claim damages from ASUS, ASUS is the maximum for identification or explanation and to the owners' benefit, without... the express written permission of ASUSTeK COMPUTER INC. ("ASUS"). ASUS ASSUMES NO RESPONSIBILITY OR LIABILITY FOR ANY ERRORS OR INACCURACIES THAT MAY APPEAR IN THIS MANUAL, INCLUDING THE PRODUCTS ...
...OR YOUR RESELLER IS INFORMED OF THEIR POSSIBILITY. Copyright © 2007 ASUSTeK COMPUTER INC. This limit also applies to ASUS' suppliers and its suppliers, and your reseller are entitled to claim damages from ASUS, ASUS is the maximum for identification or explanation and to the owners' benefit, without... the express written permission of ASUSTeK COMPUTER INC. ("ASUS"). ASUS ASSUMES NO RESPONSIBILITY OR LIABILITY FOR ANY ERRORS OR INACCURACIES THAT MAY APPEAR IN THIS MANUAL, INCLUDING THE PRODUCTS ...