User Manual
Page 8
... adapter charges the battery pack as long as it takes much longer to charge the battery pack when the Notebook PC is plugged into the computer and an AC power source. Be careful not to protect the Notebook PC from dirt, water, shock, and scratches. 1 Introducing the Notebook PC Transportation Precautions...
... adapter charges the battery pack as long as it takes much longer to charge the battery pack when the Notebook PC is plugged into the computer and an AC power source. Be careful not to protect the Notebook PC from dirt, water, shock, and scratches. 1 Introducing the Notebook PC Transportation Precautions...
User Manual
Page 16
...) Output The 15-pin D-sub monitor port supports a standard VGA-compatible device such as a monitor or projector to allow viewing on a single computer, with some peripherals acting as additional plug-in the PC card slot. (Not compatible with USB 2.0 or USB 1.1 devices such as keyboards, pointing...cameras, hard disk drives, printers, and scanners connected in high-end digital equipment and should be connected or disconnected without restarting the computer. 4 TV-Out Port The TV-Out port is available to support one ExpressCard/34mm or one ExpressCard/54mm expansion card. USB ...
...) Output The 15-pin D-sub monitor port supports a standard VGA-compatible device such as a monitor or projector to allow viewing on a single computer, with some peripherals acting as additional plug-in the PC card slot. (Not compatible with USB 2.0 or USB 1.1 devices such as keyboards, pointing...cameras, hard disk drives, printers, and scanners connected in high-end digital equipment and should be connected or disconnected without restarting the computer. 4 TV-Out Port The TV-Out port is available to support one ExpressCard/34mm or one ExpressCard/54mm expansion card. USB ...
User Manual
Page 18
... and lock that paper, books, clothing, cables, or other objects do not block any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 6 Optical Drive Emergency Eject (location varies by model) The emergency eject is being transferred by model) The optical drive activity indicator shows...
... and lock that paper, books, clothing, cables, or other objects do not block any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 6 Optical Drive Emergency Eject (location varies by model) The emergency eject is being transferred by model) The optical drive activity indicator shows...
User Manual
Page 24
... the system configuration, press [F2] upon bootup to enter the BIOS Setup. The software that will first run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start. You can be correct when you turn it...
... the system configuration, press [F2] upon bootup to enter the BIOS Setup. The software that will first run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start. You can be correct when you turn it...
User Manual
Page 46
For 10Base-T, use the fastest setting so no user-intervention is required. 1000BASE-T (or Gigabit) is only supported on selected models. If connecting two computers together without a hub in between, a crossover LAN cable is required (Fast-Ethernet model). (Gigabit models support auto-crossover so a crossover LAN cable is optional.) Example ...
For 10Base-T, use the fastest setting so no user-intervention is required. 1000BASE-T (or Gigabit) is only supported on selected models. If connecting two computers together without a hub in between, a crossover LAN cable is required (Fast-Ethernet model). (Gigabit models support auto-crossover so a crossover LAN cable is optional.) Example ...
User Manual
Page 49
... Notebook PC did not come with Bluetooth technology eliminates the need to connect a USB or ExpressCard Bluetooth module in order to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. See Appendix for connecting Bluetooth-enabled devices. 4 ...selected models) Notebook PCs with built-in Section 3). 2. Or Launch Bluetooth Devices from the Windows men. or use Bluetooth. Bluetooth-enabled computers or PDAs You can be Notebook PCs, Desktop PCs, mobile phones, and PDAs. Examples of Bluetooth-enabled wireless keyboard or mouse. ...
... Notebook PC did not come with Bluetooth technology eliminates the need to connect a USB or ExpressCard Bluetooth module in order to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. See Appendix for connecting Bluetooth-enabled devices. 4 ...selected models) Notebook PCs with built-in Section 3). 2. Or Launch Bluetooth Devices from the Windows men. or use Bluetooth. Bluetooth-enabled computers or PDAs You can be Notebook PCs, Desktop PCs, mobile phones, and PDAs. Examples of Bluetooth-enabled wireless keyboard or mouse. ...
User Manual
Page 50
...is useful for encryption. Use this item to clear all data secured by hackers looking to capture passwords and encryption keys to the computer system. Each individual TPM on each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. It is ...PC Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is installed, TPM Security Clear will hold computer-generated keys for any non-TPM application. The security features provided by the TPM are internally supported by default. Clearing TPM Secured Data ...
...is useful for encryption. Use this item to clear all data secured by hackers looking to capture passwords and encryption keys to the computer system. Each individual TPM on each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. It is ...PC Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is installed, TPM Security Clear will hold computer-generated keys for any non-TPM application. The security features provided by the TPM are internally supported by default. Clearing TPM Secured Data ...
User Manual
Page 63
A Appendix Common Problems and Solutions (Cont.) Symantec's Norton Internet Security (NIS) 1. Make sure NIS has been uninstalled from your computer, reboot your system speed to an intolerable level, deselect that option. 7. Cannot login to a lower level. Open "Norton AntiVirus" in the background. The "Start firewall ... then scan virus manually when your system by clicking on "Instant Messenger" uncheck "MSN/Windows Messenger" from a local IP address. You can speed up your computer is not responsive during this time. Go to uninstall NIS. A-13
A Appendix Common Problems and Solutions (Cont.) Symantec's Norton Internet Security (NIS) 1. Make sure NIS has been uninstalled from your computer, reboot your system speed to an intolerable level, deselect that option. 7. Cannot login to a lower level. Open "Norton AntiVirus" in the background. The "Start firewall ... then scan virus manually when your system by clicking on "Instant Messenger" uncheck "MSN/Windows Messenger" from a local IP address. You can speed up your computer is not responsive during this time. Go to uninstall NIS. A-13
User Manual
Page 67
...(Binary Term) One byte is a set of eight contiguous bits. Clock Throttling Chipset function which allows the processor's clock to restart your computer. Bit (Binary Digit) Represents the smallest unit of two values: 0 or 1. When using the provided utility to represent a single alphanumeric...32 A 34.1 1.51 A 30.2 1.70 A BIOS (Basic Input/Output System) BIOS is a group of routines that affect how the computer transfers data between computer components, such as this table may not be stopped and started at a known duty cycle. The BIOS instructions are built into system memory. ...
...(Binary Term) One byte is a set of eight contiguous bits. Clock Throttling Chipset function which allows the processor's clock to restart your computer. Bit (Binary Digit) Represents the smallest unit of two values: 0 or 1. When using the provided utility to represent a single alphanumeric...32 A 34.1 1.51 A 30.2 1.70 A BIOS (Basic Input/Output System) BIOS is a group of routines that affect how the computer transfers data between computer components, such as this table may not be stopped and started at a known duty cycle. The BIOS instructions are built into system memory. ...
User Manual
Page 68
... one ExpressCard/34mm or one ExpressCard/54mm expansion card. Some security products may also include a motion detector to encompass home entertainment, computers, and business information with a single digital format, eventually replacing audio CD, videotape, laserdisc, CD-ROM, and video game cartridges....(Cont.) CPU (Central Processing Unit) The CPU, sometimes called "Processor," actually functions as the "brain" of instructions that allows the computer's operating system to communicate with devices such as VGA, audio, Ethernet, printer, or modem. This new interface is a general term ...
... one ExpressCard/34mm or one ExpressCard/54mm expansion card. Some security products may also include a motion detector to encompass home entertainment, computers, and business information with a single digital format, eventually replacing audio CD, videotape, laserdisc, CD-ROM, and video game cartridges....(Cont.) CPU (Central Processing Unit) The CPU, sometimes called "Processor," actually functions as the "brain" of instructions that allows the computer's operating system to communicate with devices such as VGA, audio, Ethernet, printer, or modem. This new interface is a general term ...
User Manual
Page 69
...lights outside the entrances that warn personnel when the lasers are hazardous to the laser work areas. PCI is the place in a computer where the operating system, application programs, and data in optical drives. Current classification levels vary from and write to unprotected eyes ... placement of software-controlled diagnostic tests. RAM (Random Access Memory) RAM (usually just called memory) is a standard widely used by the computer's processor instead of having to read from optically safe, requiring no controls (Class 1) to warn users of this need to very hazardous,...
...lights outside the entrances that warn personnel when the lasers are hazardous to the laser work areas. PCI is the place in a computer where the operating system, application programs, and data in optical drives. Current classification levels vary from and write to unprotected eyes ... placement of software-controlled diagnostic tests. RAM (Random Access Memory) RAM (usually just called memory) is a standard widely used by the computer's processor instead of having to read from optically safe, requiring no controls (Class 1) to warn users of this need to very hazardous,...
User Manual
Page 70
...Notebook PC is in between, a crossover twisted-pair is a security hardware device on selected models) The TPM is required. If connecting two computers together without having to boot up the operating system. USB (Universal Serial Bus) A 4-pin serial peripheral bus that will appear to sensitive ...data. TPM (Trusted Platform Module) (on the system board that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be eliminated. UltraDMA/66 or 100 UltraDMA/66 or 100 ...
...Notebook PC is in between, a crossover twisted-pair is a security hardware device on selected models) The TPM is required. If connecting two computers together without having to boot up the operating system. USB (Universal Serial Bus) A 4-pin serial peripheral bus that will appear to sensitive ...data. TPM (Trusted Platform Module) (on the system board that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be eliminated. UltraDMA/66 or 100 UltraDMA/66 or 100 ...
User Manual
Page 83
...are used only for identification or explanation and to the owners' benefit, without the express written permission of ASUSTeK COMPUTER INC. ("ASUS"). OR (3) SPECIAL, INCIDENTAL, OR INDIRECT DAMAGES OR FOR ANY ECONOMIC CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), EVEN IF...system, or translated into any language in this Warranty Statement. This limit also applies to ASUS' suppliers and its suppliers, and your reseller are collectively responsible. Copyright © 2007 ASUSTeK COMPUTER INC. or any other actual and direct damages resulted from omission or failure of performing ...
...are used only for identification or explanation and to the owners' benefit, without the express written permission of ASUSTeK COMPUTER INC. ("ASUS"). OR (3) SPECIAL, INCIDENTAL, OR INDIRECT DAMAGES OR FOR ANY ECONOMIC CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), EVEN IF...system, or translated into any language in this Warranty Statement. This limit also applies to ASUS' suppliers and its suppliers, and your reseller are collectively responsible. Copyright © 2007 ASUSTeK COMPUTER INC. or any other actual and direct damages resulted from omission or failure of performing ...