User Guide Packard Bell EasyNote LS - 1
T A B LE OF C ON TENTS Starting your computer Battery-low warning.................................. 4 Wireless connection ........................................... 4 Software Registration ........................................................ 5 Using Windows and your software .................. Software installation ........................................... 6 Welcome Center ...................................... Recovery ............................................................
Regulatory information 97 Environment 105 Software license 107 Index 110 Copyright © 2011. All Rights Reserved. Packard Bell EasyNote LS User Guide Original Issue: 2 May 2011 Visit registration.packardbell.com and discover the benefits of being a customer of Packard Bell. Remark: All images are for reference purposes only. Actual configuration may vary.
S T A R T I N G Y O U R COMPUTER Thank you for purchasing this Packard Bell computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience. After setting up and starting your computer, as shown in the setup instructions, it will ask you questions that will help you connect to the Internet. Your computer will then configure installed software.
Alternatively, use a network cable to connect directly to a network port on your router. Please refer to your ISP or router’s guide. REGISTRATION When using your computer for the first time, it is recommended that you register it. This gives you access to some useful benefits, such as: • Faster service from our trained representatives. • Membership in the Packard Bell community: receive promotions and participate in customer surveys. • The latest news from Packard Bell.
SOFTWARE INSTALLATION Your computer will automatically install software and prepare your computer for use. This may take some time, please do not turn off your computer; wait until the installation has finished. RECOVERY You should create recovery discs as soon as you are able. The Packard Bell Recovery Management program allow you to create recovery discs and then to restore or reinstall applications and drivers provided by Packard Bell. You will need a pack of writable DVDs.
Warranty and contact information You can find information about the warranty for your computer and how to contact technical support in your computer’s Warranty.
C OMPUTER B ASICS SAFETY AND COMFORT Safety precautions Please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment Make sure that the computer: • Is used on a stable surface, stand or table. A fall can seriously damage the computer. • Is not used on a surface that vibrates, or used when taking part in sport, exercise or other activities in a dynamic environment.
Cables Make sure that: • Cables are not strained and that there is no risk of people walking or tripping over them. • Other devices do not crush the cables. • The power cable is connected to the computer before connecting the power cable to the AC power outlet. • The power cable is unplugged from the power outlet before disconnecting the power cable from the computer. • Three-pin power cords are connected to a grounded power outlet.
• If you spill liquid on your computer, switch it off immediately, unplug the AC adapter, remove the battery and make sure it is completely dry before switching it on again. Wait overnight if necessary. Note: If your computer includes slots for memory cards or expansion devices, plastic ’dummies’ may be installed in the card slots. Dummies protect unused slots from dust, metal objects or other particles. Save the dummies for use when no cards are in the slots.
Health precautions • The computer and accessories may contain small parts. Keep them out of the reach of small children. • If you work or play for hours at a time, then make sure you take regular breaks. Look away from the computer's screen once in a while. Do not use your computer if you are tired. • Arrange your computer so that you can work in a natural and relaxed position. Place items that you use frequently within easy reach.
• Ensure that the computer’s ventilation slots and openings are never obstructed or covered. Do not place the computer on a soft surface (such as a carpet, chair or bed) that may block ventilation slots. • Do not push objects of any kind into ventilation or case slots as they may touch dangerous voltage points or short-out parts that may result in a fire or electric shock.
G ETTING T O KNOW Y O U R COMPUTER After setting up your computer, as illustrated in the setup instructions, let us show you around your new Packard Bell computer.
TOP VIEW - DISPLAY 1 2 3 # Icon Item Description 1 Webcam Web camera for video communication. 2 Microphone Internal microphone for sound recording. 3 Display screen Also called Liquid-Crystal Display (LCD), displays computer output.
TOP VIEW - KEYBOARD 4 9 5 6 7 # Icon 8 Item 4 Power button / indicator 5 Keyboard 6 Touchpad Description Turns the computer on and off. Indicates the computer's power status. For entering data into your computer. - Special keys are described on page 16. Touch-sensitive pointing device which functions like a computer mouse.
# Icon Item Description Power indicator Indicates the computer's power status. Indicates the computer's battery status. Battery indicator 7 - Charging: The light shows amber when the battery is charging. - Fully charged: The light shows blue when in AC mode. HDD indicator Indicates when the hard disk drive is active. Communication indicator Indicates the computer’s wireless connectivity device status.
Icon Function Description Help Opens the help menu. Packard Bell MyBackup Allows you to create backup copies of your computer; either the entire system or only selected files and folders. Create a regular schedule or make copies whenever you want. Communication Enables/disables the computer’s communication devices. Display toggle Switches display output between the display screen, external monitor (if connected) and both. Screen blank Turns the display screen backlight off to save power.
Icon Function Description Brightness down Decreases the screen brightness. Brightness up Increases the screen brightness. Opens the Social Networks application. Social Networking - If this application is not installed, the key will start your instant messenging application. Volume up Increases the sound volume. Volume down Decreases the sound volume. Speaker toggle Turns the speakers on and off.
Hotkey Function Description Fn + Home Scrolls to the beginning of a document. Fn + End Scrolls to the end of a document. Fn + Page up Scrolls up a page in a document. Fn + Page Down Scrolls down a page in a document. - Note: It is not necessary to press the Fn key to use the F1 to F12 function keys when starting your computer or when using the BIOS.
• Flip: Browse photos, websites or documents by sliding two fingers horizontally. • Rotate: Rotate photos or PDF files in 90° steps with a two-finger pivot motion. • Scroll: Swiftly navigate web pages, documents and music playlists up or down by moving two fingers vertically. FRONT VIEW 1 # 1 Icon Item Multi-in-1 card reader Description Accepts Secure Digital (SD), MultiMediaCard (MMC), Memory Stick PRO (MS PRO), xDPicture Card (xD). - Push to remove/install the card.
REAR VIEW 1 # Icon 1 Item Description Battery bay Houses the computer's battery pack. LEFT VIEW 1 # Icon 2 Item Kensington lock slot 1 3 4 5 6 7 Description Connects to a Kensington-compatible computer security lock. - Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available.
# Icon Item Description 2 Ventilation and cooling fan Allows the computer to stay cool. 3 External display (VGA) port Connects to a display device (e.g., external monitor, LCD projector). 4 HDMI port Supports high-definition digital video connections. 5 USB 2.0 port Connect to USB devices (e.g., USB mouse, USB camera). 6 Microphone jack Accepts inputs from external microphones. 7 22 Headphones / speaker jack - Do not cover or obstruct the openings.
RIGHT VIEW 1 # Icon Item 2 34 5 6 7 Description Connect to USB devices (e.g., USB mouse, USB camera). 1 USB port 2 Optical drive Internal optical drive; accepts CDs or DVDs. 3 Optical disk access indicator Lights up when the optical drive is active. 4 Optical drive eject button Ejects the optical disk from the drive. 5 Emergency eject hole - If the port is black, it is USB 2.0 compatible, if the port is blue (optional) it is also USB 3.0 compatible.
# Icon Item Description 6 Ethernet (RJ-45) port Connects to an Ethernet 10/100/1000-based network. 7 DC-in jack Connects to your computer’s AC adapter. BASE VIEW 1 2 4 3 # Icon Item Description 1 Battery bay Houses the computer's battery pack. 2 Battery release latch Releases the battery for removal. Insert a suitable tool and slide to release.
# Icon Item Description Memory compartment Houses the computer's main memory. Hard disk bay Houses the computer's hard disk (secured with screws). 3 4 Ventilation and cooling fan Allows the computer to stay cool. - Do not cover or obstruct the openings.
U PGRADING YOUR COMPUTER EXPANDING THROUGH OPTIONS Your computer offers you many options for a complete computing experience. Connectivity options Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section. Memory card reader Memory cards are used in a wide selection of digital cameras, PDAs, MP3 players and mobile phones. Inserting a memory card 1.
to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card. SD, SDHC and SDXC cards Different types of SD cards cover different capacities, while using the same overall design. SD cards contain up to 4 GB, SDHC cards contain up to 32 GB, and SDXC cards can contain up to 2048 GB (2 TB).
Built-in networking The built-in networking allows you to connect your computer to an Ethernet-based network. Connect an Ethernet cable from the Ethernet (RJ-45) port on the chassis of the computer to a network jack or hub on your network. Universal Serial Bus (USB) The USB port is a high-speed serial bus which allows you to connect USB peripherals without taking up system resources.
Certain computers may include one or more USB 3.0 ports. These resemble standard USB ports, except they include additional internal connections and are blue. You may use USB 3.0 compatible devices with these ports to benefit from faster transfer speeds. Video port Connect to a monitor with a VGA or DVI port (the type of connection supported depends on your computer’s configuration). The appropriate cable is usually included with the monitor. Follow these steps to connect an monitor to your computer: 1.
High-Definition Multimedia Interface (only for certain models) HDMI (High-Definition Multimedia Interface) is an industrysupported, uncompressed, all-digital audio/video interface. HDMI provides an interface between any compatible digital audio/video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable. Use the HDMI port on your computer to connect with highend audio and video equipment.
P OWER SUPPLY AC POWER ADAPTER Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time. Caution: Do not cover or place objects on the AC adapter. Keeping the adapter clear of objects allows the adapter to cool properly during use.
BATTERY PACK The computer uses a battery pack that gives you extended use between charges. Battery pack characteristics The battery pack has the following characteristics: • Employs current battery technology standards. • Delivers a battery-low warning. The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer.
Conditioning a new battery pack Before you use a battery pack for the first time, there is a “conditioning” process that you should follow: 1. Insert the new battery without turning the computer on. 2. Connect the AC adapter and fully charge the battery. 3. Disconnect the AC adapter. 4. Turn on the computer and operate using battery power. 5. Fully deplete the battery. 6. Reconnect the AC adapter and fully charge the battery again.
• Using the computer on constant AC power with the battery inserted. If you want to use constant AC power, you are advised to remove the battery pack after it is fully charged. • Not discharging and recharging the battery to its extremes, as described above. • Frequent use; the more you use the battery, the faster it will reach the end of its effective life. A standard computer battery has a life span of about 300 charges.
Charging the battery To charge the battery, first make sure that it is correctly installed in the battery bay. Plug the AC adapter into the computer, and connect to a mains power outlet. You can continue to operate your computer on AC power while your battery is charging. However, charging the battery with the computer turned off results in a significantly faster charge time. Note: You are advised to charge the battery before retiring for the day.
• Store the battery pack in a cool, dry place. The recommended temperature is 10 °C (50 °F) to 30 °C (86 °F). Higher temperatures cause the battery to self-discharge faster. • Excessive recharging decreases the battery life. • Look after your AC adapter and battery. Battery-low warning When using battery power pay attention to the Windows power meter. Warning: Connect the AC adapter as soon as possible after the battery-low warning appears.
Situation Recommended Action An extra fully charged 1. Save all necessary files. battery pack is 2. Close all applications. available. 3. Shut down the operating system to turn off the computer. 4. Replace the battery pack. The AC adapter or a power outlet is unavailable. You have no spare battery pack. 5. Turn on the computer and resume work. 1. Save all necessary files. 2. Close all applications. 3. Shut down the operating system to turn off the computer.
S OFTWARE USING WINDOWS AND YOUR SOFTWARE Packard Bell computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Most of this software is ’pre-installed’ and ready to be used; however some software may be provided on a CD or DVD and must first be installed if you wish to use it. To do so, insert the installation CD or DVD.
recent online threats and protects your personal data (bank account credentials, credit card numbers, passwords, and more). Productivity software Work Great with Microsoft® Office 2010 - Express your ideas, solve problems and simplify everyday projects with Office 2010. Photo editing - Easily edit and print your photos with Windows Live Photo Gallery. Then share them on Facebook, YouTube™ or Windows Live.
Once you have a regular copy of your files, you should keep them safe. If the worse happens and you need to access an old file, you may recover files from your backup. Opening MyBackup Press the Packard Bell MyBackup key to start the program. Otherwise click on Start > All programs > Packard Bell MyBackup > Packard Bell MyBackup Choose how to manage your data Three options are available: Back Up My Files, Image My Drive, and Migrate My Files.
removable device (e.g. a USB hard disk drive), an optical disc (if your computer has an optical drive) or a Remote PC (a computer connected to the same network as your computer). Note: You should install the Agent Installer on a computer that you want to use for backup storage. You can save and transfer the program from the Remote PC tab. Image My Drive: Make a complete backup of all of your computer’s hard drive, including system and program files.
Finding your files after a backup Simply browse to the location of the backup files (if required, connect the removable device or insert the optical disc) to check or restore your safe files. Restoring files from your backup If you lose one or more files, or wish to transfer copies of your files to a different computer (for extra security, or a new purchase), you may do so by browsing to the location of your stored files (select where you would like to store the files) and copying them normally.
times the file has been updated, with higher numbers representing more recent updates. Playing multimedia files You may use the media software on your computer to play music, films or photo slide-shows and watch television (if your computer has a TV tuner). Other options allow you to create CDs or DVDs. One or more media programs are installed on your computer, Windows Media Player and optionally Windows Media Center are provided by Microsoft.
Windows Media Center (optional) Certain computers include all-inone media ‘centers’ such as Windows Media Center. These programs can handle a variety of multimedia content, presented with simple menus that may be easily controlled with a remote control. You may watch live or recorded TV (if your computer has a TV tuner), listen to digital music, view pictures and personal videos, create CDs and DVDs, or access content from online services.
shows channel and network information, as well as the title, description and scheduled broadcast time of shows. Cyberlink PowerDVD (optional) If your computer does not include Windows Media Center, or it is equipped with a Blu-ray drive, you may watch movies with PowerDVD. You may start PowerDVD by inserting a disc and waiting for the program to start automatically.
Playing downloaded files Downloaded files may work with the media programs installed on your computer, or may require specific programs. Files that include DRM functions may only play in specific programs (e.g. iTunes, Windows Media Player) or only on devices certified for use with the each type of file. Other formats may require a specific audio or video codec that may not have been installed on your computer.
Playing DVD movies You can play DVD movies on your computer. 1. Insert the DVD. Important! When you launch the DVD player for the first time, the program asks you to enter the region code. DVD content is coded with one of six regions. Please refer to the table below for DVD movie region code information. Once your DVD drive is set to a region code, it will play DVD discs of that region only.
Playing Blu-ray movies If your computer is equiped with a Blu-ray disc drive, you can play Blu-ray movies on your computer. Simply insert the disc into the optical drive, after a short delay Cyberlink PowerDVD will start to play the movie. Use the media controls to control playback. Social networks (optional) The Social Networks application allows you to quickly view your friends' updates, and make your own updates without leaving the desktop.
Log in... or Sign up The top of the application shows your profile picture and account information from Facebook. If you have not yet created or accessed your Facebook profile, the top image is the anonymous white-on-blue placeholder, and no information is shown. When you first start the Social Networks application, you will be asked to Log in to your social networks. If this does not happen automatically, click Log In, at the top of the Social Networks window.
If you choose Sign up to Facebook please fill in the requested information, with your email and an appropriate password. You will then continue to authorize access for your account. Please allow access for all steps, this will ensure all Social Networks features work normally. YouTube If you already have a YouTube account, enter the account information and click the Log In button to activate access, otherwise select Sign up to YouTube to create an account.
Accessing your social networks Once you have authorized access, your profile picture and status information will be displayed. You may update this information with a click. Quick actions Click on a link to see more in a new window. I.e. click on a Facebook entry to open your Facebook account and view the entire entry; click on a YouTube video title to view the video. Enter your status in the What's on your mind? box and click Share. You friends on Facebook will see your status instantly.
Click on the arrow in the top bar to hide the full application and display a small alert bar on the top of your screen. Click the alert bar (below) to see the full window with a summary of your friends' activities. Note: Do not use the X icon to exit Social Networks, unless you want to stop sending or receiving updates. Use the arrow in the top bar to display the alert bar.
Changing settings Click the settings icon to access settings for the social networks. Live Update - If the Live Update button is active, you may download and install an updated version of the Social Networks application. Click the tab for a network to see specific settings; you may set how often a network is checked (the refresh frequency) and logout from specific networks in this section. Click the X to exit the Settings section.
I NTERNET FIRST STEPS ON THE NET Protecting your computer It is vital to protect your computer from viruses and attacks over the Internet (see Internet security offer on page 38 and Security on page 63). A comprehensive Internet security program is offered when you first start your computer. You should activate this protection as soon as possible, certainly before you connect to the Internet. Choose an Internet Service Provider Using the Internet has become a natural part of daily computing.
Connection types Depending on your computer model, your location and your communication needs, you have several ways to connect to the Internet. Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the Internet using your telephone line. With a dialup connection, you cannot use the modem and the telephone simultaneously on a single phone line.
Cable A cable connection provides fast and always-on Internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the Internet. 3G (WWAN or 'Wireless Wide-Area Network') A 3G connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Internet while away from home.
Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an Internet connection. What are benefits of a wireless network? Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner.
router with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point. Wireless adapter An internal wireless adapter is normally already installed in your computer.
Diagram of a working network 1. Access point/router 4 2. Desktop computer 3. Modem 5 4. Printer 1 5. Portable computer 6. PDA/Smartphone 7. Network (RJ45) 3 7 cables 2 6 Turning on/off a wireless network connection Most computers feature a ‘WiFi’ button that turns the network connection on or off.
they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. Surf the Net! To surf the Internet, you need a program called an Internet browser. Internet Explorer provides an easy and secure web browsing experience.
Internet Explorer features The image below shows the Internet Explorer browser’s start page. A brief description of some key aspects of the browser are listed below. 3 4 5 6 7 8 9 2 1 1. Bing Bar: Search the web and use Bing tools to alert you of news, fill forms automatically, stay safe online and more. 2. Back and Forward buttons: Navigate through pages you have already visited. 3. Address bar: Type in an Internet address (e.g. www.packardbell.
5. Search Box: Search the web without having to open a new page. 6. Tabs: Each tab displays a web page. The tabs allow you to instantly switch from one site to another. 7. New tab: Open a new tab with links to your most popular sites. 8. Reduce, maximize or close the window. 9. Home, Favorites and Tools: Open the home page; manage your favorite websites, feeds and history; and access browser tools, such as Print, Safety or Options.
Security You are probably eager to explore everything the Internet has to offer. In order for you to be safe online, Packard Bell has pre-installed Symantec’s award-winning Norton Internet Security™ on your computer. Norton Internet Security runs quietly in the background to block today’s complex threats and protect your identity when you shop, bank, or browse online.
it. Once it has infected your computer, it can snoop on your browsing activity, collect personal information, cause pop-up ads to appear, or even change the configuration of your computer. Spyware consumes resources on your computer; it can slow down your Internet connection or entire computer system, and even cause crashes.
a program you are currently using then normally you would allow it (i.e. a game connecting to a multi-player server or an encyclopaedia making a content update). How to protect your computer Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible.
advantage of auto-update features in your software is a great start toward keeping yourself safe online. Protect your computer with security software Several types of security software are necessary for basic online security. Security software essentials include firewall and antivirus programs. A firewall is usually your computer's first line of defense-it controls who and what can communicate with your computer online.
A complete version of Norton Internet Security™ is pre-installed on your Packard Bell system. It includes a free trial subscription to protection updates. Make sure you Activate it! Choose strong passwords and keep them safe Passwords are a fact of life on the Internet today; we use them for everything from ordering flowers and online banking to logging into our favorite airline Web site to see how many miles we have accumulated.
Protect your personal information Exercise caution when sharing personal information such as your name, home address, phone number, and email address online. To take advantage of many online services, you will inevitably have to provide personal information in order to handle billing and shipping of purchased goods.
convincing. A shopping, banking or any other Web site where sensitive information should have an "S" after the letters "http" (i.e. https://www.yourbank.com not http://www.yourbank.com). The "s" stands for secure and should appear when you are in an area requesting you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner).
advertising software ("adware") that tracks your behavior and displays unwanted advertisements. You may have to divulge personal information or purchase something else in order to claim your supposed content winnings. If an offer looks so good it's hard to believe, ask for someone else's opinion, read the fine print, or even better, simply ignore it.
and ensuring that the latest security updates have been downloaded and installed on your computer. To open the Action Center, click on Start and Security > Action Center. > Control Panel > System Alternatively, if a security alert has been reported (in the Notification Area, next to the clock) then you can click on the notification balloon or double-click on the small Security Alert icon. The Action Center indicates the status and settings used for important applications that protect your computer.
Certain programs need access to the Internet to function properly, or even to function at all. If this is the case, you will usually be asked to allow access when you install a program, or the first time you use it. To check firewall settings, click on Start > Control Panel > System and Security > Windows Firewall. Note: When you first start to use a Firewall it is in a ‘Learning mode’, you may see pop-up windows alerting you that certain programs you know and trust wish to access the internet.
updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks. Windows Defender Windows Defender helps protect your computer against malicious and unwanted software, such as spyware and adware. Windows Defender is installed and turned on by default. To help protect your privacy and your computer, Windows Defender includes real-time protection options.
User Account Control The User Accounts control panel can help prevent unauthorized changes to your computer. User Accounts will ask you for permission or an administrator password before performing actions that could potentially affect your computer's operation or that change settings that affect other users. When you see a User Account message, read it carefully, and then make sure the name of the action or program that's about to start is one that you intended to start.
Internet Explorer security settings Internet sites use small files called cookies to keep track of user preferences and information. You can adjust your Internet browser's security settings to determine how much -or how little- information you are willing to accept from a Web site. To access Internet Explorer security settings: 1. In Internet Explorer, click on Tools > Internet Options. 2. In the Privacy tab, move the slider up or down to select a setting.
H ELPDESK SAFE COMPUTING To make the most of your new computer and ensure it runs smoothly for a long time, you should use the programs below and regularly perform the actions described in this guide. Maintenance Recommended maintenance tasks There are several tasks you should perform periodically (about once per month) to ensure your computer stays in good health: Error checking Using the Check Disk tool regularly prevents your system from getting unreliable and information getting lost.
3. Tick Automatically fix file system errors in the options area. If you tick Scan for and attempt recovery of bad sectors, your computer will carry out the physical error checking when you next restart your computer. Click on Start to proceed. Disk Cleanup The Disk Cleanup Wizard helps free up space on your disk drive. It searches your drive and displays unused files, such as temporary Internet files, files in the Recycle Bin and other temporary files that you may safely delete. 1.
Disk Defragmenter With the creation and deletion of files over time, scattering occurs all over the hard disk area and affects performance. The Disk Defragmenter helps you rearrange the items stored on your hard drive to make your computer run faster and more efficiently. Running the Disk Defragmenter once a month (depending on computer usage) will decrease wear and tear on your hard drive and thus decrease the chance of a fault developing at a later date. 1.
Manage your hard disk drive (HDD) Check the remaining free space on your hard disk drive 1. Click on Start > Computer. 2. Right-click on the Packard Bell icon and select Properties. 3. The Hard Disk Properties window displays the amount of used space and free space on your hard disk. If your hard disk is almost full (less than 200 MB remaining), you should consider freeing some space. To see easily how much space is used and how much is left, simply place your pointer over the hard disk drive icon.
2. Uninstall the programs you no longer use: Click on Start Features. > Control Panel > Programs > Programs and 3. Archive files on an external hard disk drive, recordable CDs or DVDs (if your computer is equipped with a CD or DVD writer) and delete them from the hard disk. Run Windows System Tools Windows includes some convenient tools to keep your computer in good shape.
Windows System Restore. System Restore monitors changes to your computer and automatically creates restore points that store your computer’s configuration each time a major change occurs (such as installing programs). It can undo harmful changes to your computer and restore settings and performance without removing your personal data files (such as documents, browsing history, photos, favourites, or emails). Note: If you only need to uninstall a program, do not use System Restore.
If you cannot access the Windows desktop: 1. Press the Alt+F10 key upon start-up when the Packard Bell logo appears. This will open the Recovery Program. 2. Select Windows System Restore and click Next. Your computer will automatically restart and open System Restore. System Restore options Restore your computer to an earlier time This option will return to your computer to how it was on an earlier date, without affecting your personal documents or emails (it will not restore lost documents either).
Create a Restore Point Windows creates restore points automatically at regularly scheduled times or before certain programs or drivers are installed. This option allows you to create your own restore points when you need to. 1. Click Start > Control Panel > System and Security > System. Click on System protection in the sidebar and then click the Create... button. 2. Enter a description to identify this restore point. System Restore automatically adds the date and time to this name. 3.
• Perform updates when prompted by Windows Action Center. • Use Microsoft Windows Automatic Updates. • Run Windows Update. Internet security Norton Internet Security, combined with other security applications can protect your computer from Internet attacks and ensure that the latest security updates have been downloaded and installed on your computer. Norton Internet Security performs automatic updates through Live Update.
Windows Remote Assistance Remote Assistance allows a Windows user to temporarily take over a remote Windows computer over a network or the internet to resolve issues. Remote Assistance makes it possible to diagnose and repair problems with a computer without personally visiting it. You can access Remote Assistance by clicking on Start > All Programs > Maintenance > Windows Remote Assistance.
R ECOVERY PACKARD BELL RECOVERY MANAGEMENT Note: Packard Bell Recovery Management is only available with a preinstalled Windows operating system. If your computer experiences problems that are not recoverable by other methods, you may need to reinstall the Windows operating system and factory-loaded software and drivers. To ensure you can recover your computer when needed, you should create a recovery backup as soon as possible.
2. To create recovery discs for the hard drive’s entire original contents, including Windows and all factory-loaded software and drivers, click Create Factory Default Disc. - OR To create recovery discs for only the factory-loaded software and drivers, click Create Drivers and Applications Backup Disc. Important: We recommend that you create each type of recovery disc as soon as possible.
The Create Factory Default Backup dialog box opens. This dialog box tells you the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs ready before continuing.
3. Insert a blank disc into the drive indicated in the Backup to list, then click Next. You will be shown the backup progress on the screen. The drive ejects each disc as it completes burning it. 4. Remove the disc from the drive and mark it with a permanent marker. Important: Write a unique, descriptive label on each disc, such as ‘Windows Recovery Disc 1 of 2’ or ‘Apps/Drivers Recovery disc’. Make sure you keep the discs in a safe place that you will remember. 5.
computer to the same state as when you purchased it, while giving you an option to retain all settings and personal data for later retrieval. To recover your system: 1. Perform minor fixes. If only one or two items of software or hardware have stopped working correctly, the problem may be solved by reinstalling the software or the device drivers. To recover software and drivers that were pre-installed at the factory, see “Recovering pre-installed software and drivers” on page 91.
Types of recovery Recovering pre-installed software and drivers As a troubleshooting step, you may need to reinstall the software and device drivers that came pre-installed on your computer from the factory. You can recover using either your hard drive or the backup you have created. • New software - If you need to recover software that did not come preinstalled on your computer, you need to follow that software’s installation instructions.
3. Click on Contents. A list of software and device drivers opens. 4. Click on the install icon for the item you want to install, then follow the on-screen prompts to complete the installation. Repeat this step for each item you want to reinstall. Returning to a previous system condition Microsoft System Restore periodically takes ’snapshots’ of your system settings and saves them as restore points.
Help: For more information about using Microsoft System Restore, click Start, then click Help and Support. Type windows system restore in the Search Help box, then press Enter. To return to a restore point: 1. Click on Start > Control Panel > System and Security > Action Center, then click on Recovery. 2. Click on Open System Restore, then Next. 3. Click on he restore point you want, click on Next, then Finish. A confirmation message box appears. 4. Click on Yes.
• If you cannot run Windows and your original hard drive is still working, see “Recovering from the hard drive during startup” on page 95. • If you cannot run Windows and your original hard drive has been completely re-formatted or you have installed a replacement hard drive, see “Recovering from your recovery discs” on page 95. Recovering from within Windows To reinstall Windows and all pre-installed software and drivers: 1.
Recovering from the hard drive during startup To reinstall Windows and all pre-installed software and drivers: 1. Turn on your computer, then press Alt+F10 during startup. Packard Bell Recovery Management opens. 2. Click on Restore system from factory default. Caution: Continuing the process will erase all files on your hard drive. 3. Click on Next. Your hard drive’s original, factory-loaded contents are recovered. This process will take several minutes.
6. Your computer will restart. 3. During startup, press F12 to open the boot menu. The boot menu allows you to select which device to start from, such as the hard drive or an optical disc. 4. Use your arrow keys to select the line CDROM/DVD (this line may start with ’IDE 1...’), then press Enter. Windows installs from the recovery disc you inserted. 5. Insert the second recovery disc when prompted, then follow the on-screen prompts to complete the recovery.
R EGULATORY INFORMATION PREVENTION OF HEARING LOSS - Caution: Permanent hearing loss may occur if earphones or headphones are used at high volume for prolonged periods of time. This device have been tested to comply with the Sound Pressure Level requirement laid down in the applicable EN 50332-1 and/or EN 50332-2 standards.
General This product complies with the radio frequency and safety standards of any country or region in which it has been approved for wireless use. Depending on configuration, this product may or may not contain wireless radio devices (such as wireless LAN and/or Bluetooth modules). Information below is for products with such devices. Wireless operation channels for different domains N. America Japan Europe ETSI 2.412-2.462 GHz 2.412-2.484 GHz 2.412-2.
Departments in which the use of the 2400 - 2483.
CE COMPLIANCE REQUIREMENT Products with the CE marking comply with both the Electromagnetic Compatibility Directive (2004/108/EC) and the Low Voltage Directive (2006/95/ EC) issued by the Council of the European Communities.
MODIFICATIONS TO THE PRODUCT CE Marking Packard Bell cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product with the CE Marking. Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment.
Input rating: Refer to the rating label on the bottom of the computer and ensure that your power adapter complies with the specified rating. Under no circumstances should the user attempt to disassemble the power supply. The power supply has no user-replaceable parts. Inside the power supply are hazardous voltages that can cause serious personal injury. A defective power supply must be returned to your dealer. Power cables and plug This Product requires a three-wire grounded power cord and plug.
- Ferrite reference: 28A-2029 from Steward (two loops) During product certification, Packard Bell used the following cable quality: - USB2.0 Certified Cables from Hama 46778 - IEEE1394 shielded FireWire from Hama 50011 - RCA-RCA shielded Audio/Video Cables from Thomson KHC001M, KHC012M, KHC028M - Stereo Jack shielded Audio cables from Hama 43330H, 42714H Heat Build-up and Portable Computers The AC adapter and the underside of the computer can become hot after prolonged use.
Because exposure to laser radiation is extremely hazardous, under no circumstances should the user attempt to disassemble the laser device. PACKAGING The packaging of this product is compliant with the European Environmental Directive 94/ 62/EC from December 20 th 1994 and its equivalent in the French Legislation by the Decree 98-638 from july 20 th 1998.
E NVIRONMENT OUR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Packard Bell is committed to limit the environmental impact of its products during product life cycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc. Suppliers are asked, for each part of any product, to respect all regulations.
Battery disposal (when applicable) Before disposing of your equipment ensure that you have removed any batteries that may be fitted in the equipment. European law states that batteries must be collected for disposal separately from household waste. Do not throw your used batteries in the dustbin. Dispose of your used batteries via a battery collection scheme where available, or ask your distributor or local authority what infrastructures you can use.
S OFTWARE LICENSE Note: Most of the software applications are already preinstalled on your Packard Bell computer. They are ready to use or to set up. However, some titles require a CD or DVD to run. You will find these discs in your computer's packaging. Packard Bell License Agreement (CD and/or DVD Products). This copy of the original is your proof of license. Please treat it as valuable property. Important! Read carefully before installing the software. The following License Agreement applies to you.
using the SOFTWARE concurrently does no exceed the number of Licenses. If the SOFTWARE is permanently installed on the hard disk or the storage device of a computer (other than a network server) and one person uses that computer more than 80% of the time it is in use, then that person may also use the SOFTWARE on a portable or home computer. 2. Copyright The SOFTWARE is owned by Packard Bell or its suppliers and is protected by United States copyright laws and international treaty provision.
GPL or write to the free Software Foundation, Inc. and request a copy. The address of the Free Software Foundation, Inc is: 59 Temple Place - Suite 330, Boston, MA, 02111-1307, USA. For a period of three (3) years as commencing from your receipt of this software, you may obtain a complete machine-readable copy of the source code for the Free Software under the terms of the GPL without charge except for the cost of media, shipping, and handling, upon a written request to us.
I NDEX A Audio CDs ........................................... 43 Autoplay .............................................. 45 B Batteries ............................................ 106 maximizing life ............................... 32 battery disposal .................................. 106 optimizing ...................................... 35 battery pack removing ....................................... 35 battery-low warning ........................ 36 using the first time ..........................
playing ........................................... 47 E Electronic Program Guide ..................... 44 Epilepsy warning .................................. 12 Environment....................................... 105 Error checking...................................... 76 F Firewall .......................................... 64, 71 front view ............................................. 20 H HDD (Hard Disk Drive) Health precautions ............................... 11 Free space...........................
N network ................................................ 28 Norton Internet Security.................. 63, 67 Network connections ............................ 56 P Packard Bell Pointer................................................. 19 Recovery Management Program .... 39, ports .................................................... 26 Power cords........................................... 9 86 Website ......................................... 62 PowerDVD...........................................
U Windows automatic updates ..... 72, 84 Uninstalling hardware ........................... 27 universal serial bus............................... 28 User Account Control ........................... 74 Update V view front ............................................... 21 left ................................................. 21 rear ............................................... 21 right ............................................... 23 W Warranty ...............................................