Home > Acer > Notebook > Acer Aspire E5 User Manual

Acer Aspire E5 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Acer Aspire E5 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 720 Acer manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Frequently asked questions - 71
    How do I make an app appear on my taskbar?
    If youre in All apps and you want to make an app appear on the 
    taskbar, right-click a tile  to select it and open the Customize menu. 
    Select Pin to taskbar.
    How do I install apps?
    You can download Windows Store apps from Store. You will need to 
    have a Microsoft ID to purchase and download apps from Store. 
    I cant find apps like Notepad and Paint! Where are they?
    Move your cursor to the upper right-hand corner of the screen and 
    click Search, type the name of the app you would like to open using 
    the pop-up keyboard. Alternatively, open All apps and scroll to 
    ’Windows Accessories’ to see the list of legacy programs.
    Can I use more than one app at a time?
    1. Click on a tile to open an app from the Start screen.
    2. Return to the Start screen and repeat the process.
    3. Swipe right from the left edge of the screen to display the last app 
    that was opened.
    4. Swipe right from the left edge of the screen until you see a column 
    divider to display both apps simultaneously. Up to three apps may 
    be displayed via three columns at the same time.
    Can I show my desktop apps first?
    Yes, you can, just follow these steps:
    1. Go to the desktop.
    2. Right-click the taskbar and select Properties from the menu that 
    opens.
    3. From the Navigation tab, check List desktop apps first in the Apps 
    view when its sorted by category.
    What is a Microsoft ID (account)?
    A Microsoft account is an email address and password that you use to 
    sign in to Windows. You can use any email address, but it is best if 
    you choose the one you already use to communicate with friends and  
    						
    							72 - Frequently asked questions
    sign in to your favorite websites. When you sign in to your PC with a 
    Microsoft account, youll connect your PC to the people, files, and 
    devices you care about.
    Do I need one?
    You do not need a Microsoft ID to use Windows 8.1, but it makes life 
    easier because you can sync data across different machines you sign 
    in to using a Microsoft ID. 
    How do I get one?
    If youve already installed Windows 8.1 and didnt sign in with a 
    Microsoft account or you dont have a Microsoft account and want to 
    get one, move your cursor to the upper right-hand corner of the 
    screen and click Settings > Change PC settings > Accounts > 
    Connect to a Microsoft account, and follow the onscreen 
    instructions.
    How do I add a favorite to Internet Explorer?
    Internet Explorer 10 doesnt have traditional favorites, instead you can 
    pin shortcuts to Start. Once you have the page open, swipe upwards 
    from the bottom edge of the screen to open the menu at the bottom of 
    the screen. Click Pin to Start.
    How do I check for Windows updates?
    Move your cursor to the upper right-hand corner of the screen and 
    click Settings > Change PC settings > Update & recovery > 
    Windows Update. Click Check now.
    Where can I get more information?
    For more information please visit the following pages:
    • Windows 8 and 8.1 tutorials: www.acer.com/windows8-tutorial
    • Support FAQs: support.acer.com 
    						
    							Frequently asked questions - 73
    Troubleshooting
    This chapter shows you how to deal with common system problems.  
    Read it before calling a technician if a problem occurs. Solutions to 
    more serious problems require opening up the computer. Do not 
    attempt to open the computer yourself; contact your dealer or 
    authorized service center for assistance.
    Troubleshooting tips
    This computer incorporates an advanced design that delivers 
    onscreen error message reports to help you solve problems.
    If the system reports an error message or an error symptom occurs, 
    see Error messages below. If the problem cannot be resolved, 
    contact your dealer.
    Error messages
    If you receive an error message, note the message and take the 
    corrective action. The following table lists the error messages in 
    alphabetical order together with the recommended course of action.
    Error messagesCorrective action
    CMOS battery badContact your dealer or an authorized service 
    center.
    CMOS checksum 
    errorContact your dealer or an authorized service 
    center.
    Disk boot failureInsert a system (bootable) disk, then press 
     to reboot.
    Equipment 
    configuration errorPress  (during POST) to enter the BIOS 
    utility, then press Exit in the BIOS utility to 
    reboot.
    Hard disk 0 errorContact your dealer or an authorized service 
    center.
    Hard disk 0 
    extended type errorContact your dealer or an authorized service 
    center.
    I/O parity errorContact your dealer or an authorized service 
    center.
    FREQUENTLY  
    						
    							74 - Frequently asked questions
    If you still encounter problems after going through the corrective 
    measures, please contact your dealer or an authorized service center 
    for assistance.Keyboard error or no 
    keyboard connectedContact your dealer or an authorized service 
    center.
    Keyboard interface 
    errorContact your dealer or an authorized service 
    center.
    Memory size 
    mismatchPress  (during POST) to enter the BIOS 
    utility, then press Exit in the BIOS utility to 
    reboot.
    Error messagesCorrective action 
    						
    							Internet and online security - 75
    INTERNET AND ONLINE SECURITY
    First steps on the net
    Protecting your computer
    It is vital to protect your computer from viruses and attacks over the 
    Internet (see Security on page 79). A comprehensive Internet 
    security program is offered when you first start your computer. You 
    should activate this protection as soon as possible, certainly before 
    you connect to the Internet.
    Choose an Internet Service Provider
    Using the Internet has become a natural part of daily 
    computing. Just a few simple steps can connect you to 
    a vast collection of knowledge and communication 
    tools. To accomplish these steps you should first 
    select an Internet Service Provider (ISP), which 
    supplies the connection between your computer and 
    the Internet. You should research the ISPs available in 
    your region, not forgetting to talk to friends and family about their 
    experiences or to check reviews and consumer reports. The ISP you 
    select will provide instructions on how to connect to the Internet (you 
    may need additional software or a special ‘box’ that connects to your 
    phone line).
    Connection types
    Depending on your computer model, your location and your 
    communication needs, you have several ways to connect to the 
    Internet. 
    Dial-up
    Some computers include a telephone dial-up (‘modem’) connector. 
    This allows you to connect to the Internet using your telephone line. 
    With a dial-up connection, you cannot use the modem and the 
    telephone simultaneously on a single phone line. This type of 
    connection is recommended only if you have limited use of the  
    						
    							76 - Internet and online security
    Internet as the connection speed is low and connection time is 
    typically charged per hour. 
    DSL (e.g. ADSL)
    DSL (Digital Subscriber Line) is an ‘always-on’ connection that runs 
    over the phone line. As DSL and phone do not use the same 
    frequencies, you can use your telephone at the same time you are 
    connected to the Internet (this requires a ‘micro-filter’ on each 
    telephone socket to avoid interference). To be eligible for DSL, you 
    must be located near an DSL-equipped phone exchange (service is 
    sometimes unavailable in rural areas). Connection speeds vary 
    depending on your location, but DSL generally provides very fast and 
    reliable Internet connection. As the connection is always-on, it is 
    generally charged at fixed monthly rates.
    Cable
    A cable connection provides fast and always-on Internet service via a 
    cable television line. This service is generally available in large cities. 
    You can use your telephone and watch cable TV at the same time you 
    are connected to the Internet. 
    3G (WWAN or Wireless Wide-Area Network)
    A 3G connection allows you to use cellular networks (such as those 
    used by a mobile phone) to connect to the Internet while away from 
    home. The socket for a SIM card may be built in to your computer, or 
    may require an external device, such as a USB modem or even an 
    appropriately equipped mobile phone.
    Note
    A DSL connection requires an appropriate modem. A modem is usually 
    provided by the ISP when you register. Many of these modems include an 
    ‘router’ that provides network and Wi-Fi access.
    Note
    If your computer includes a SIM card slot, you require a compatible SIM card 
    and a contract with a cellular provider. 
     
    Before using the 3G features, check with your service provider to see if any 
    additional charges will be incurred, especially roaming charges. 
    						
    							Internet and online security - 77
    Network connections
    A LAN (Local Area Network) is a group of computers (for example, 
    within an office building or home) that share a common 
    communications line and resources. When you set up a network, you 
    can share files, peripheral devices (such as a printer) and an Internet 
    connection. You can set up a LAN using wired technologies (such as 
    Ethernet) or wireless technologies (such as Wi-Fi or Bluetooth). 
    Wireless networks
    A wireless LAN or WLAN is a wireless local area network, which may 
    link two or more computers without using wires. Setting up a wireless 
    network is easy and allows you to share files, peripheral devices and 
    an Internet connection. 
    What are benefits of a wireless network?
    Mobility
    Wireless LAN systems allow you and other users of your home 
    network to share access to files and devices connected to the 
    network, for example a printer or scanner.
    Also you can share an internet connection with other computers in 
    your home.
    Installation speed and simplicity
    Installing a wireless LAN system can be fast and easy and eliminates 
    the need to pull cables through walls and ceilings. 
    Components of a wireless LAN
    To set up your Wireless network at home you need to have the 
    following:
    Access point (router)
    Access points (routers) are two-way transceivers that broadcast data 
    into the surrounding environment. Access points act as a mediator 
    between wired and wireless network. Most routers have a built-in DSL 
    modem that will allow you access to a high speed DSL internet 
    connection. The ISP (Internet Service Provider) you have chosen 
    normally supplies a modem/router with the subscription to their  
    						
    							78 - Internet and online security
    services. Read carefully the documentation supplied with your Access 
    point/router for detailed setup instructions.
    Network cable (RJ45)
    A network cable (also called RJ45 cable) is used to connect the host 
    computer to the access point (see illustration below); this type of cable 
    may also be used to connect peripheral devices to the access point.
    Wireless adapter
    An internal wireless adapter is normally already installed in your 
    computer. A button or controls in Windows allow you to activate 
    or deactivate the adapter.
    Diagram of a working network
    1. Access point/router
    2. Desktop computer
    3. Modem
    4. Printer
    5. Portable computer
    6. PDA/Smartphone
    7. Network cables (RJ45)
    Turning on/off a wireless network connection
    Most computers feature a ‘Wi-Fi’ button that turns the network 
    connection on or off. If your computer has wireless access, but does 
    not feature a Communication button, you may turn your wireless 
    network on or off, or control what is shared over the network with the 
    network management options. Press the Windows key ( ) + W, type 
    HomeGroup and then click on HomeGroup.
    Warning
    Using wireless devices while flying in aircraft is prohibited. Switch off 
    all devices before boarding an aircraft; they may be dangerous to the 
    operation of the aircraft, disrupt communications, and even be illegal. 
    						
    							Internet and online security - 79
    Surf the Net!
    To surf the Internet, you need a program called an 
    Internet browser. Internet Explorer provides an easy 
    and secure web browsing experience. As soon as you 
    have your Internet access installed and you are 
    connected, from Start, click the Internet Explorer tile or 
    the icon located on the desktop and take your Internet 
    experience to a new level!
    Acer website
    To get you started why not visit our website, www.acer.com.
    Acer is dedicated to provide you with on-going personalied support. 
    Check out our Support section to get help tailored to your needs.
    www.acer.com is your portal to a world of online activities and 
    services: visit us regularly for the latest information and downloads! 
    Security
    You are probably eager to explore everything the Internet has to offer. 
    In order for you to be safe online, Acer has pre-installed McAfee 
    Internet Security Suite on your computer. 
    McAfee Internet Security Suite runs quietly in the background to block 
    today’s complex threats and protect your identity when you shop, 
    bank, or browse online.
    McAfee Internet Security Suite blocks online identity theft, detects and 
    eliminates spyware, removes viruses and Internet worms, protects 
    against hackers.
    Definitions
    What is a virus?
    Malicious software, typically called ‘viruses’, are programs designed to 
    infect and damage computers. Most viruses are transmitted over the 
    Internet, emails or malicious Web sites. A typical virus will replicate 
    and pass itself undetected to multiple computers. Other forms of 
    nuisance, such as Trojan horses, worms or spam can infect your  
    						
    							80 - Internet and online security
    computer in various ways, using up resources or clogging up a 
    network.
    What is spyware?
    Spyware refers to generally unwanted programs that are downloaded 
    onto your computer while connected to the Internet, often without you 
    knowing it. Once it has infected your computer, it can snoop on your 
    browsing activity, collect personal information, cause pop-up ads to 
    appear, or even change the configuration of your computer. Spyware 
    consumes resources on your computer; it can slow down your Internet 
    connection or entire computer system, and even cause crashes.
    Spyware is sometimes used by unscrupulous companies to monitor 
    and track the sites you visit on the Internet so as to determine your 
    web-surfing habits and display targeted pop-up ads on your screen. 
    However, some kinds of spyware go beyond simple tracking and 
    actually monitor keystrokes and capture passwords, posing a serious 
    security risk. 
    What is malware?
    Malicious software, also known as malware, is software designed to 
    deliberately harm your computer. For example, viruses, worms, and 
    Trojan horses are malicious software. To help protect your computer 
    against malware, make sure it is using up-to-date antivirus and anti-
    malware software.
    What is a personal firewall?
    A personal firewall is a software program designed to prevent 
    unauthorized access to or from a private network. It acts as a shield to 
    protect your Internet connection from unwanted connections, some of 
    which may attempt to take control of your computer to install or re-
    distribute viruses or malicious programs. Each connection to your 
    computer is monitored - programs that attempt to receive information 
    without your permission are detected and the firewall will display an 
    alert. You can then decide if you will allow the connection, if the 
    connection is to a program you are currently using then normally you 
    Note
    Acer guarantees that your computer was 100% virus free at the time of 
    purchase and does not cover damages due to viruses. 
    						
    All Acer manuals Comments (0)

    Related Manuals for Acer Aspire E5 User Manual