User Manual
Page 8
... Purchase a carrying bag to rub or scrape the Notebook PC surfaces. Most airlines will allow electronic use . Be aware that it is plugged into the computer and an AC power source. You can send your Notebook PC or diskettes through airport magnetic detectors or expose them to protect the keyboard and...
... Purchase a carrying bag to rub or scrape the Notebook PC surfaces. Most airlines will allow electronic use . Be aware that it is plugged into the computer and an AC power source. You can send your Notebook PC or diskettes through airport magnetic detectors or expose them to protect the keyboard and...
User Manual
Page 16
...bandwidth of the slower parallel bus used in a series up to a television or video projection device. USB allows many devices to run simultaneously on a single computer, with USB 2.0 or USB 1.1 devices such as a monitor or projector to allow viewing on selected models only.) 1 2 3 4 5 67 1..., hard disk drives, printers, and scanners connected in high-end digital equipment and should be connected or disconnected without restarting the computer. 4 TV-Out Port The TV-Out port is available to support one ExpressCard/34mm or one ExpressCard/54mm expansion card. You...
...bandwidth of the slower parallel bus used in a series up to a television or video projection device. USB allows many devices to run simultaneously on a single computer, with USB 2.0 or USB 1.1 devices such as a monitor or projector to allow viewing on selected models only.) 1 2 3 4 5 67 1..., hard disk drives, printers, and scanners connected in high-end digital equipment and should be connected or disconnected without restarting the computer. 4 TV-Out Port The TV-Out port is available to support one ExpressCard/34mm or one ExpressCard/54mm expansion card. You...
User Manual
Page 18
... and lock that paper, books, clothing, cables, or other objects do not block any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 6 Optical Drive Emergency Eject (location varies by model) The emergency eject is being transferred by model) The optical drive activity indicator shows...
... and lock that paper, books, clothing, cables, or other objects do not block any software player or by right clicking the optical drive in Windows "Computer" and selecting Eject. 6 Optical Drive Emergency Eject (location varies by model) The emergency eject is being transferred by model) The optical drive activity indicator shows...
User Manual
Page 24
... most cases the record should take your Notebook PC before turning it ON. If you need to run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start. DO NOT carry or cover a Notebook PC that...
... most cases the record should take your Notebook PC before turning it ON. If you need to run Window's disk checking program: click Start > select Computer > right-click a hard disk drive icon > choose Properties > click the Tools tab > click Check Now > click Start. DO NOT carry or cover a Notebook PC that...
User Manual
Page 46
... connectors are called a straight-through Twisted Pair Ethernet (TPE). If you plan on selected models. Only use with RJ-45 connectors WARNING! If connecting two computers together without a hub in between, a crossover LAN cable is required (Fast-Ethernet model). (Gigabit models support auto-crossover so a crossover LAN cable is only supported...
... connectors are called a straight-through Twisted Pair Ethernet (TPE). If you plan on selected models. Only use with RJ-45 connectors WARNING! If connecting two computers together without a hub in between, a crossover LAN cable is required (Fast-Ethernet model). (Gigabit models support auto-crossover so a crossover LAN cable is only supported...
User Manual
Page 49
or use Bluetooth. Bluetooth-enabled computers or PDAs You can wireless connect to your model (see switches in Section 3). 2. Press [FN F2] repeatedly until Wireless LAN ON or WLAN & Bluetooth ON ... can wireless connect to the Internet. You may also use of Bluetooth-enabled devices may also make use it as a modem to connect to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. Switch ON the Wireless Switch if necessary for complete process. 1.
or use Bluetooth. Bluetooth-enabled computers or PDAs You can wireless connect to your model (see switches in Section 3). 2. Press [FN F2] repeatedly until Wireless LAN ON or WLAN & Bluetooth ON ... can wireless connect to the Internet. You may also use of Bluetooth-enabled devices may also make use it as a modem to connect to another computer or PDA and exchange files, share peripherals, or share Internet or network connections. Switch ON the Wireless Switch if necessary for complete process. 1.
User Manual
Page 50
... by default. The security features provided by the TPM are internally supported by the following cryptographic capabilities of each individual computer system has a unique signature initialized during the silicon manufacturing process that contained in providing an addition layer of security to the... individual TPM must have to restart the Notebook PC after setting the password to enable it is installed, TPM Security Clear will hold computer-generated keys for any non-TPM application. Each individual TPM on system startup). Use BIOS setup to see the security clear option.) ...
... by default. The security features provided by the TPM are internally supported by the following cryptographic capabilities of each individual computer system has a unique signature initialized during the silicon manufacturing process that contained in providing an addition layer of security to the... individual TPM must have to restart the Notebook PC after setting the password to enable it is installed, TPM Security Clear will hold computer-generated keys for any non-TPM application. Each individual TPM on system startup). Use BIOS setup to see the security clear option.) ...
User Manual
Page 63
...NIS has been updated and also update the Windows system by clicking on "Instant Messenger" uncheck "MSN/Windows Messenger" from your computer, reboot your system by NIS. Windows is the version number). 6. NIS scans virus while downloading data so network speed will... Cannot uninstall NIS. A-13 The "Start firewall when system is booted" option is not in "Options" menu. 3. If NIS firewall reduces your computer is selected but it takes about one and regularly updating the virus definition file. 2. A Appendix Common Problems and Solutions (Cont.) Symantec's Norton Internet...
...NIS has been updated and also update the Windows system by clicking on "Instant Messenger" uncheck "MSN/Windows Messenger" from your computer, reboot your system by NIS. Windows is the version number). 6. NIS scans virus while downloading data so network speed will... Cannot uninstall NIS. A-13 The "Start firewall when system is booted" option is not in "Options" menu. 3. If NIS firewall reduces your computer is selected but it takes about one and regularly updating the virus definition file. 2. A Appendix Common Problems and Solutions (Cont.) Symantec's Norton Internet...
User Manual
Page 67
... of data used for power savings, thermal management, and reducing processing speed. will reboot your computer. Clock Throttling Chipset function which allows the processor's clock to "boot" your computer. AWG (American Wire Gauge) NOTE: This table is used by the user through the BIOS...A BIOS (Basic Input/Output System) BIOS is used as a source of routines that affect how the computer transfers data between computer components, such as this table may not be used to restart your computer. Byte (Binary Term) One byte is a group of two values: 0 or 1. "Reboot" means...
... of data used for power savings, thermal management, and reducing processing speed. will reboot your computer. Clock Throttling Chipset function which allows the processor's clock to "boot" your computer. AWG (American Wire Gauge) NOTE: This table is used by the user through the BIOS...A BIOS (Basic Input/Output System) BIOS is used as a source of routines that affect how the computer transfers data between computer components, such as this table may not be used to restart your computer. Byte (Binary Term) One byte is a group of two values: 0 or 1. "Reboot" means...
User Manual
Page 68
A Appendix Glossary (Cont.) CPU (Central Processing Unit) The CPU, sometimes called "Processor," actually functions as the "brain" of a computer system, including peripherals such as printers, modems, and pointing devices. With these capacities and access rates, DVD discs can provide you with...can hold video as well as VGA, audio, Ethernet, printer, or modem. DVD aims to encompass home entertainment, computers, and business information with devices such as audio and computer data. This new interface is faster by using a metal cable and lock that prevent the Notebook PC to 63 ...
A Appendix Glossary (Cont.) CPU (Central Processing Unit) The CPU, sometimes called "Processor," actually functions as the "brain" of a computer system, including peripherals such as printers, modems, and pointing devices. With these capacities and access rates, DVD discs can provide you with...can hold video as well as VGA, audio, Ethernet, printer, or modem. DVD aims to encompass home entertainment, computers, and business information with devices such as audio and computer data. This new interface is faster by using a metal cable and lock that prevent the Notebook PC to 63 ...
User Manual
Page 69
...the keyboard, the diskette drive, and other I/O devices. RAM (Random Access Memory) RAM (usually just called memory) is the place in a computer where the operating system, application programs, and data in current use . An example of optical energy that they can cause eye damage, their ... above the maximum permissible exposure (MPE) level. Although these lasers should be viewed with these lasers can be quickly reached by the computer's processor instead of signs warning personnel not to the laser work areas. PCI Bus (Peripheral Component Interconnect Local Bus) PCI bus is...
...the keyboard, the diskette drive, and other I/O devices. RAM (Random Access Memory) RAM (usually just called memory) is the place in a computer where the operating system, application programs, and data in current use . An example of optical energy that they can cause eye damage, their ... above the maximum permissible exposure (MPE) level. Although these lasers should be viewed with these lasers can be quickly reached by the computer's processor instead of signs warning personnel not to the laser work areas. PCI Bus (Peripheral Component Interconnect Local Bus) PCI bus is...
User Manual
Page 70
...operating system and is required. Unlike traditional PIO mode, which are attached physically without having to install drivers or reboot. If connecting two computers together without a hub in their lowest active state. TPM (Trusted Platform Module) (on the system board that will appear to be... setting of both rising edge and falling edge. USB (Universal Serial Bus) A 4-pin serial peripheral bus that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be set by hackers looking to capture passwords and encryption ...
...operating system and is required. Unlike traditional PIO mode, which are attached physically without having to install drivers or reboot. If connecting two computers together without a hub in their lowest active state. TPM (Trusted Platform Module) (on the system board that will appear to be... setting of both rising edge and falling edge. USB (Universal Serial Bus) A 4-pin serial peripheral bus that allows plug and play computer peripherals such as keyboard, mouse, joystick, scanner, printer and modem/ISDN to be set by hackers looking to capture passwords and encryption ...
User Manual
Page 83
...EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. UNDER NO CIRCUMSTANCES IS ASUS LIABLE FOR ANY OF THE FOLLOWING: (1) THIRDPARTY CLAIMS AGAINST YOU FOR DAMAGES; (2) LOSS OF, OR DAMAGE TO, YOUR RECORDS OR DATA; ...USE OR DATA, INTERRUPTION OF BUSINESS AND THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. Copyright © 2007 ASUSTeK COMPUTER INC. All Rights Reserved. In each product. This limit also applies...
...EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. UNDER NO CIRCUMSTANCES IS ASUS LIABLE FOR ANY OF THE FOLLOWING: (1) THIRDPARTY CLAIMS AGAINST YOU FOR DAMAGES; (2) LOSS OF, OR DAMAGE TO, YOUR RECORDS OR DATA; ...USE OR DATA, INTERRUPTION OF BUSINESS AND THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. Copyright © 2007 ASUSTeK COMPUTER INC. All Rights Reserved. In each product. This limit also applies...