Packard Bell EasyNote LS User Manual

Summary of EasyNote LS

  • Page 1

    - 1 user’s guide packard bell easynote ls.

  • Page 2

    2 t able of c ontents starting your computer 4 wireless connection.......................................... 4 registration....................................................... 5 software installation ........................................ 6 recovery ................................................

  • Page 3

    Table of contents - 3 regulatory information 95 environment 100 software license 102 index 105 visit registration.Packardbell.Com and discover the benefits of being a customer of packard bell. Remark: all images are for reference purposes only. Actual configuration may vary. Copyright © 2010. All ri...

  • Page 4

    4 s tarting your computer thank you for purchasing this packard bell computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience. After setting up and starting your computer, as shown in the setup instructions, it will ask you ques...

  • Page 5

    Starting your computer - 5 alternatively, use a network cable to connect directly to a network port on your router. Please refer to your isp or router’s guide. R egistration when using your computer for the first time, it is recommended that you register it. This gives you access to some useful bene...

  • Page 6

    6 s oftware installation your computer will automatically install software and prepare your computer for use. This may take some time, please do not turn off your computer; wait until the installation has finished. R ecovery you should create recovery discs as soon as you are able. The packard bell ...

  • Page 7

    Starting your computer - 7 packard bell website remember to visit www.Packardbell.Com - check out the support section for up-to-date information, help, drivers and downloads. Warranty and contact information you can find information about the warranty for your computer and how to contact technical s...

  • Page 8

    8 c omputer b asics s afety and comfort safety precautions please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment make sure that the computer: • is used on a stable surface, stand or table. A fall can seriously damage the computer. • is...

  • Page 9

    Computer basics - 9 • is not placed on a carpet or any other surface that may have an electrical charge. Cables make sure that: • cables are not strained and that there is no risk of people walking or tripping over them. • other devices do not crush the cables. • the power cable is connected to the ...

  • Page 10

    10 cleaning your computer • always unplug your computer from the power outlet before cleaning it. • do not use liquid or aerosol cleaners, use a damp cloth instead. • never spray cleaning product directly on the screen. • if you spill liquid on your computer, switch it off immediately, unplug the ac...

  • Page 11

    Computer basics - 11 • the product has been dropped or the case has been damaged • the product exhibits a distinct change in performance, indicating a need for service • the product does not operate normally after following the operating instructions note: adjust only those controls that are covered...

  • Page 12

    12 • to protect your hearing, when using speakers or headphones, increase volume gradually until you can hear clearly and comfortably; do not increase the volume level after your ears have adjusted. Do not listen to high volumes for extended periods. Do not increase the volume to block out noisy sur...

  • Page 13

    Computer basics - 13 consciousness, disorientation, any involuntary movement or convulsion, immediately discontinue use and consult your doctor. This may happen even if the person has no medical history of epilepsy..

  • Page 14

    14 g etting to know your computer after setting up your computer, as illustrated in the setup instructions, let us show you around your new packard bell computer..

  • Page 15

    Getting to know your computer - 15 t op view - display 1 2 3 # icon item description 1 webcam web camera for video communication. 2 microphone internal microphone for sound recording. 3 display screen also called liquid-crystal display (lcd), displays computer output..

  • Page 16

    16 t op view - keyboard 4 5 6 7 9 8 # icon item description 4 power button / indicator turns the computer on and off. Indicates the computer's power status. 5 keyboard for entering data into your computer. − special keys are described on page 18. 6 touchpad touch-sensitive pointing device which func...

  • Page 17

    Getting to know your computer - 17 − note: the front panel indicators are visible even when the computer cover is closed. 7 power indicator indicates the computer's power status. Battery indicator indicates the computer's battery status. − charging: the light shows amber when the battery is charging...

  • Page 18

    18 special keys your computer’s keyboard includes keys that activate special functions. The function of each key is clearly marked with an icon. Icon function description fn hotkey for second function activates a second function on certain keys. E.G. Press the fn key to activate the f1 to f12 keys. ...

  • Page 19

    Getting to know your computer - 19 previous return to the previous media file. Next jump to the next media file. Brightness down decreases the screen brightness. Brightness up increases the screen brightness. Social networking opens the social networks application. − if this application is not insta...

  • Page 20

    20 hotkeys the computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the fn key (bottom left) before pressing the other key in the hotkey combination. − note: it is not necessary to press the fn key to use the f1 to f12 function...

  • Page 21

    Getting to know your computer - 21 f ront view 1 r ear view 1 # icon item description 1 multi-in-1 card reader accepts secure digital (sd), multimediacard (mmc), memory stick pro (ms pro), xd- picture card (xd). − push to remove/install the card. Only one card can operate at any given time. # icon i...

  • Page 22

    22 l eft view 2 1 3 4 5 6 7 # icon item description 1 kensington lock slot connects to a kensington-compatible computer security lock. − wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to s...

  • Page 23

    Getting to know your computer - 23 r ight view 2 1 3 4 5 6 7 7 headphones / speaker jack connects to audio line-out devices (e.G., speakers, headphones). − supports compatible 3.5 mm headsets with built-in microphone (e.G. Acer smart handheld headsets). # icon item description 1 usb port connect to ...

  • Page 24

    24 4 optical drive eject button ejects the optical disk from the drive. 5 emergency eject hole ejects the optical drive tray when the computer is turned off. − carefully insert a straightened paper clip to eject the optical drive tray. 6 ethernet (rj-45) port connects to an ethernet 10/100/1000-base...

  • Page 25

    Getting to know your computer - 25 b ase view # icon item description 1 battery bay houses the computer's battery pack. 2 battery release latch releases the battery for removal. Insert a suitable tool and slide to release. 3 memory compartment houses the computer's main memory. Hard disk bay houses ...

  • Page 26

    26 u pgrading your computer e xpanding through options your computer offers you many options for a complete computing experience. Connectivity options ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read t...

  • Page 27

    Upgrading your computer - 27 if the card contains some files, the windows auto play window may appear (this depends on the contents of the card) and ask you if you wish to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select cancel. If the ca...

  • Page 28

    28 universal serial bus (usb) the usb port is a high-speed serial bus which allows you to connect usb peripherals without taking up system resources. Certain computers may include one or more usb 3.0 ports. These resemble standard usb ports, except they include additional internal connections and ar...

  • Page 29

    Upgrading your computer - 29 follow these steps to connect an monitor to your computer: 1. Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. Secure the cable connection with the screws provided. 3. Connec...

  • Page 30

    30 high-definition multimedia interface (only for certain models) hdmi (high-definition multimedia interface) is an industry-supported, uncompressed, all-digital audio/ video interface. Hdmi provides an interface between any compatible digital audio/video source, such as a set-top box, dvd player, a...

  • Page 31

    Power supply - 31 p ower supply ac power adapter your computer can use the supplied external power adapter (a power 'brick') to run on ac power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your compu...

  • Page 32

    32 warning: the ac adapter and the underside of the computer can become hot after prolonged use. This is normal, but may cause injury with prolonged contact. B attery pack the computer uses a battery pack that gives you extended use between charges. Battery pack characteristics the battery pack has ...

  • Page 33

    Power supply - 33 maximizing the battery’s life like all other batteries, your computer’s battery will degrade over time. This means that the battery's performance will diminish with time and use. To maximize your battery’s life, you are advised to adhere to the recommendations set out below. Condit...

  • Page 34

    34 warning: do not expose battery packs to temperatures below 0 °c (32 °f) or above 45 °c (113 °f). Extreme temperatures may adversely affect the battery pack. By following the battery conditioning process you condition your battery to accept the maximum possible charge. Failure to follow this proce...

  • Page 35

    Power supply - 35 to install a battery pack: 1. Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2. Slide the battery into the battery bay and gently push until the battery locks in place. To...

  • Page 36

    36 checking the battery level the windows power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery’s present charge level. Optimizing battery life optimizing battery life helps you get the most out of battery operation, prolonging...

  • Page 37

    Power supply - 37 warning: connect the ac adapter as soon as possible after the battery-low warning appears. Data will be lost if the battery to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation: situat...

  • Page 38

    38 s oftware u sing w indows and your software packard bell computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Most of this software is ’pre- installed’ and ready to be used; however some software may be pro...

  • Page 39

    Software - 39 internet security offer it is vital to protect your computer from viruses and attacks over the internet (see security on page 60). An comprehensive internet security suite, including a free trial subscription period, is offered when you first start your computer. You should activate th...

  • Page 40

    40 playing multimedia files you may use the media software on your computer to play music, films or photo slide-shows and watch television (if your computer has a tv tuner). Other options allow you to create cds or dvds. One or more media programs are installed on your computer, windows media player...

  • Page 41

    Software - 41 (if your computer has a tv tuner), listen to digital music, view pictures and personal videos, create cds and dvds, or access content from online services. To start the media program installed on your computer, click on start > windows media center. Setup caution: if your computer incl...

  • Page 42

    42 autoplay the windows autoplay function allows you to choose the way windows handles media files on devices with removable storage (digital camera, cd, dvd, etc). If you have inserted a disk that contains files (such as a dvd, usb key or memory card), windows will display a dialogue box and ask yo...

  • Page 43

    Software - 43 codecs a codec is software that is used to compress or decompress a digital media file, such as a song or video. Windows media player and other programs use codecs to play and create digital media files. For example, when you rip a song from an audio cd to your computer, the player use...

  • Page 44

    44 movie region code information. Once your dvd drive is set to a region code, it will play dvd discs of that region only. You can set the region code a maximum of five times (including the first time), after which the last region code set will remain permanent. Recovering your hard disk does not re...

  • Page 45

    Software - 45 social networks (optional) the social networks application allows you to quickly view your friends' updates, and make your own updates without leaving the desktop. You can recieve notifications and status updates directly to your desktop, using the sidebar to monitor multiple social ne...

  • Page 46

    46 automatically, click log in, at the top of the social networks window. If you just want to create a new facebook profile, click sign up and follow the instructions. Note: all social activities require internet access. Make sure you are connected to the internet before using this application. Auth...

  • Page 47

    Software - 47 youtube if you already have a youtube account, enter the account information and click the log in button to activate access, otherwise select sign up to youtube to create an account. Flickr if you already have a flickr account, click the log in button to activate access, otherwise sele...

  • Page 48

    48 click the arrows in the bottom bar to see more pages, if there are more entries than can be shown on a page. Click on the question mark in the top bar to see the help file for social networks . Click on the arrow in the top bar to hide the full application and display a small alert bar on the top...

  • Page 49

    Software - 49 the first button, and the section viewed when a tab is first selected, are the news feed (for facebook), most viewed for youtube and contacts for flickr. If there are more entries than can be shown on on page, use the arrows in the bottom bar to see more pages. Changing settings click ...

  • Page 50

    50 i nternet social networks (optional) the social networks application allows you to quickly view your friends' updates, and make your own updates without leaving the desktop. You can recieve notifications and status updates directly to your desktop, using the sidebar to monitor multiple social net...

  • Page 51

    Internet - 51 f irst steps on the net protecting your computer it is vital to protect your computer from viruses and attacks over the internet (see internet security offer on page 39 and security on page 60). A comprehensive internet security program is offered when you first start your computer. Yo...

  • Page 52

    52 connection types depending on your computer model, your location and your communication needs, you have several ways to connect to the internet. Dial-up some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a dia...

  • Page 53

    Internet - 53 these modems include an ‘router’ that provides network and wi-fi access. Cable a cable connection provides fast and ‘always-on’ internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable tv at the same t...

  • Page 54

    54 connection. You can set up a lan using wired technologies (such as ethernet) or wireless technologies (such as wifi or bluetooth). Wireless networks a wireless lan or wlan is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is ...

  • Page 55

    Internet - 55 between wired and wireless network. Most routers have a built-in dsl modem that will allow you access to a high speed dsl internet connection. The isp (internet service provider) you have chosen normally supplies a modem/router with the subscription to their services. Read carefully th...

  • Page 56

    56 diagram of a working network 1. Access point/router 2. Desktop computer 3. Modem 4. Printer 5. Portable computer 6. Pda/smartphone 7. Network cables (rj45) turning on/off a wireless network connection most computers feature a ‘wifi’ button that turns the network connection on or off. If your comp...

  • Page 57

    Internet - 57 may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. Surf the net! To surf the internet, you need a program called an internet browser. Internet explorer provides an easy and secure web browsing experience. As soon as you have your internet ac...

  • Page 58

    58 internet explorer features the image below shows the internet explorer browser’s start page. A brief description of some key aspects of the browser are listed below. 1. Quick tabs: select and navigate through open tabs by displaying thumbnails of them all in a single window. 2. Favourites center:...

  • Page 59

    Internet - 59 5. Address bar: type in an internet address (e.G. Www.Packardbell.Com) and press the enter key on your keyboard, this will take you directly to the address you typed. 6. Tabs: view multiple sites in a single browser window by switching from one site to another through tabs at the top o...

  • Page 60

    60 will turn yellow and a warning message will be displayed if you visit a suspected phishing site. Packard bell website to get you started why not visit our website, www.Packardbell.Com. Packard bell is dedicated to provide you with on-going personalised support. Check out our support section to ge...

  • Page 61

    Internet - 61 definitions what is a virus? Malicious software, typically called ‘viruses’, are programs designed to infect and damage computers. Most viruses are transmitted over the internet, emails or malicious web sites. A typical virus will replicate and pass itself undetected to multiple comput...

  • Page 62

    62 actually monitor keystrokes and capture passwords, posing a serious security risk. What is malware? Malicious software, also known as malware , is software designed to deliberately harm your computer. For example, viruses, worms, and trojan horses are malicious software. To help protect your comp...

  • Page 63

    Internet - 63 as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below provide basic information on how you can prevent online fraud. Keep your computer current with the latest patches and up...

  • Page 64

    64 you could think of a firewall as a sort of "policeman" that watches all the data attempting to flow in and out of your computer on the internet, allowing communications that it knows are safe and blocking "bad" traffic such as attacks from ever reaching your computer. The next line of defense man...

  • Page 65

    Internet - 65 accumulated. The following tips can help make your online experiences secure: • selecting a password that cannot be easily guessed is the first step toward keeping passwords secure and out of the wrong hands. Strong passwords have eight characters or more and use a combination of lette...

  • Page 66

    66 rarely possible, the following list contains some advice for how to share personal information safely online: • keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasings, web site addresses with strange extensions, web...

  • Page 67

    Internet - 67 you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). • pay attention to privacy policies on web sites and in software. It is important to understand how an ...

  • Page 68

    68 hard to believe, ask for someone else's opinion, read the fine print, or even better, simply ignore it. Review bank and credit card statements regularly the impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or when the first us...

  • Page 69

    Internet - 69 to open the action center , click on start > control panel > system and security > action center. Alternatively, if a security alert has been reported (in the notification area, next to the clock) then you can click on the notification balloon or double- click on the small security ale...

  • Page 70

    70 certain programs need access to the internet to function properly, or even to function at all. If this is the case, you will usually be asked to allow access when you install a program, or the first time you use it. To check firewall settings, click on start > control panel > system and security ...

  • Page 71

    Internet - 71 windows updates if you have an active internet connection, windows can check for important updates for your computer and install them automatically. These updates include security patches and program updates that can improve your computing experience and help protect your computer agai...

  • Page 72

    72 caution: please note that most security software suites provide similar functionality and will disable windows defender in order to improve system performance. User account control the user accounts control panel can help prevent unauthorized changes to your computer. User accounts will ask you f...

  • Page 73

    Internet - 73 internet explorer security settings internet sites use small files called cookies to keep track of user preferences and information. You can adjust your internet browser's security settings to determine how much -or how little- information you are willing to accept from a web site. To ...

  • Page 74

    74 h elpdesk s afe computing to make the most of your new computer and ensure it runs smoothly for a long time, you should use the programs below and regularly perform the actions described in this guide. Maintenance recommended maintenance tasks there are several tasks you should perform periodical...

  • Page 75

    Helpdesk - 75 3. Tick automatically fix file system errors in the options area. If you tick scan for and attempt recovery of bad sectors, your computer will carry out the physical error checking when you next restart your computer. Click on start to proceed. Disk cleanup the disk cleanup wizard help...

  • Page 76

    76 disk defragmenter with the creation and deletion of files over time, scattering occurs all over the hard disk area and affects performance. The disk defragmenter helps you rearrange the items stored on your hard drive to make your computer run faster and more efficiently. Running the disk defragm...

  • Page 77

    Helpdesk - 77 manage your hard disk drive (hdd) check the remaining free space on your hard disk drive 1. Click on start > computer. 2. Right-click on the packard bell icon and select properties. 3. The hard disk properties window displays the amount of used space and free space on your hard disk. I...

  • Page 78

    78 2. Uninstall the programs you no longer use: click on start > control panel > programs > programs and features. 3. Archive files on an external hard disk drive, recordable cds or dvds (if your computer is equipped with a cd or dvd writer) and delete them from the hard disk. Run windows system too...

  • Page 79

    Helpdesk - 79 windows system restore. System restore monitors changes to your computer and automatically creates restore points that store your computer’s configuration each time a major change occurs (such as installing programs). It can undo harmful changes to your computer and restore settings an...

  • Page 80

    80 if you cannot access the windows desktop: 1. Press the alt+f10 key upon start-up when the packard bell logo appears. This will open the recovery program . 2. Select windows system restore and click next. Your computer will automatically restart and open system restore . System restore options res...

  • Page 81

    Helpdesk - 81 create a restore point windows creates restore points automatically at regularly scheduled times or before certain programs or drivers are installed. This option allows you to create your own restore points when you need to. 1. Click start > control panel > system and security > system...

  • Page 82

    82 • perform updates when prompted by windows action center. • use microsoft windows automatic updates. • run windows update. Internet security norton internet security , combined with other security applications can protect your computer from internet attacks and ensure that the latest security upd...

  • Page 83

    Helpdesk - 83 windows remote assistance remote assistance allows a windows user to temporarily take over a remote windows computer over a network or the internet to resolve issues. Remote assistance makes it possible to diagnose and repair problems with a computer without personally visiting it. You...

  • Page 84

    84 r e c o v e r y p ackard b ell r ecovery m anagement note: packard bell recovery management is only available with a preinstalled windows operating system. If your computer experiences problems that are not recoverable by other methods, you may need to reinstall the windows operating system and f...

  • Page 85

    Recovery - 85 2. To create recovery discs for the hard drive’s entire original contents, including windows and all factory-loaded software and drivers, click create factory default disc. - or - to create recovery discs for only the factory-loaded software and drivers, click create drivers and applic...

  • Page 86

    86 the create factory default backup dialog box opens. This dialog box tells you the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs ready before continuing..

  • Page 87

    Recovery - 87 3. Insert a blank disc into the drive indicated in the backup to list, then click next. You will be shown the backup progress on the screen. The drive ejects each disc as it completes burning it. 4. Remove the disc from the drive and mark it with a permanent marker. Important: write a ...

  • Page 88

    88 r ecovering your system if packard bell support did not help fix your problem, you can use the packard bell recovery management program. This will restore your computer to the same state as when you purchased it, while giving you an option to retain all settings and personal data for later retrie...

  • Page 89

    Recovery - 89 if nothing else has solved the problem and you want to reset your system to factory condition, see “ returning your system to its factory condition ” on page 91. Types of recovery recovering pre-installed software and drivers as a troubleshooting step, you may need to reinstall the sof...

  • Page 90

    90 2. Click on the restore tab, then click reinstall drivers or applications. The packard bell application recovery main menu opens. 3. Click on contents. A list of software and device drivers opens. 4. Click on the install icon for the item you want to install, then follow the on-screen prompts to ...

  • Page 91

    Recovery - 91 help: for more information about using microsoft system restore, click start, then click help and support. Type windows system restore in the search help box, then press enter. To return to a restore point: 1. Click on start > control panel > system and security > action center, then c...

  • Page 92

    92 • if you cannot run windows and your original hard drive is still working, see “ recovering from the hard drive during startup ” on page 93. • if you cannot run windows and your original hard drive has been completely re-formatted or you have installed a replacement hard drive, see “ recovering f...

  • Page 93

    Recovery - 93 6. Follow the on-screen prompts for first-time system setup. Recovering from the hard drive during startup to reinstall windows and all pre-installed software and drivers: 1. Turn on your computer, then press alt+f10 during startup. Packard bell recovery management opens. 2. Click on r...

  • Page 94

    94 5. Select save changes and exit and press enter. Select ok to confirm. 6. Your computer will restart. 3. During startup, press f12 to open the boot menu. The boot menu allows you to select which device to start from, such as the hard drive or an optical disc. 4. Use your arrow keys to select the ...

  • Page 95

    Regulatory information - 95 r egulatory information ce compliance requirement products with the ce marking comply with both the electromagnetic compatibility directive (2004/108/ec) and the low voltage directive (2006/95/ec) issued by the council of the european communities. Compliance with these di...

  • Page 96

    96 en62311 - generic standard to demonstrate the compliance of low power electronic and electrical apparatus with the basic restrictions related to human exposure to electromagnetic fields. List of applicable countries this product must be used in strict accordance with the regulations and constrain...

  • Page 97

    Regulatory information - 97 building supply only connect the equipment to a building supply that is in accordance with current wiring regulations in your country. In the u.K., these are the iee regulations. P ower supply and cables power supply the power supply socket-inlet and socket-outlet (if equ...

  • Page 98

    98 cables for cables which are not delivered with the product in the computer's packaging: the emc performance of the system is guaranteed only if the cable and interface use efficient shielding. The use of shielded interface cable is required for usb, ieee1394, serial, printer, game, analog or digi...

  • Page 99

    Regulatory information - 99 you then must close the chassis before you plug in and switch on the equipment. L aser c ompliance s tatement the optical devices are tested and certified to be compliant with international electrotechnical commission iec60825-1 and european en60825-1 standards for class ...

  • Page 100

    100 e nvironment o ur commitment to environmental protection environment has been at the heart of our products. Packard bell is committed to limit the environmental impact of its products during product lifecycle. Starting at design phase, with a very strict procurement policy, maximum attention is ...

  • Page 101

    Environment - 101 battery disposal (when applicable) before disposing of your equipment ensure that you have removed any batteries that may be fitted in the equipment. European law states that batteries must be collected for disposal separately from household waste. Do not throw your used batteries ...

  • Page 102

    102 s oftware license note: most of the software applications are already preinstalled on your packard bell computer. They are ready to use or to set up. However, some titles require a cd or dvd to run. You will find these discs in your computer's packaging. Packard bell license agreement (cd and/or...

  • Page 103

    Software license - 103 is not “in use.” if the anticipated number of users of the software will exceed the number of applicable licenses, then you must have a reasonable mechanism or process in place to assure that the number of persons using the software concurrently does no exceed the number of li...

  • Page 104

    104 the free software is distributed in the hope that, but it will be useful without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. The provisions of the gnu general public license shall always apply. You may access http://www.Gnu.Org directly...

  • Page 105

    Index - 105 i ndex a audio cds .............................................................. 40 autoplay ................................................................. 42 b batteries ............................................................... 101 battery disposal ...............................

  • Page 106

    106 playing ............................................................. 43 e electronic program guide ............................ 41 environment ...................................................... 100 epilepsy warning ............................................... 13 error checking .............

  • Page 107

    Index - 107 n network ................................................................... 27 network connections ...................................... 53 norton internet security ........................ 60, 64 p packard bell recovery management program .... 39, 84 website ............................

  • Page 108

    108 u uninstalling hardware .................................... 27 universal serial bus ........................................... 28 update windows automatic updates ..... 71, 82 user account control ..................................... 72 v view front ..............................................