background image

68 - Internet and online security

Don't be fooled if someone calls your phone

A tech support scam is a form of online fraud where people call you 
on  the  phone  saying  they're  Technical  Support  from  a  trusted 
company like Norton or Microsoft and that you have a virus. The main 
motive  behind  these  scams  is  to  extort  money  from  the  victim. 
Cybercriminals can also install malware such as keylogging software 
or backdoor Trojans in order to gain access to personal information.

How to stay safe:

 Don't fall for phone calls that tell you your software 

or  computer  isn't  working.  Never  give  your  personal  information  like 
social security or credit card numbers to someone that you don't know 
over the phone. 

Common threats cybercriminals use

Now you know a few very common ways cybercriminals try to sneak 
onto your device or trick you into providing private information to them 
directly.  Here  are  a  few  of  the  types  of  malware  they  like  to  deploy 
once they've got into a device and what to do if you're ever infected.

Ransomware

A  form  of  malware  that  will  encrypt  personal  data  files  on  your 
computer and attached devices. Encryption converts files into another 
format, that can only be opened with a specific decryption key. Once 
the ransomware  installs  itself,  it  will display a  warning message that 
the  computer  is  now  locked.  The  user  is  given  a  specific  amount  of 
money  to  pay  as  a  "fine"  and  a  timeframe  in  which  to  pay.  Even  if 
paid, the criminal might choose to not unencrypt the files anyway!

What to do if you're infected:

 Avoid getting infected in the first place 

by  staying  protected  with  internet  security  software  like  Norton 
Security. Also, perform regular backups of all your data either online 
or  to  a  separate  external  hard  drive  that  is 

only attached

  to  your 

computer while performing the backup. Ransomware has been known 
to lock access to external hard drives attached to the computer. 
If  you  are  infected  with  ransomware,  think  twice  before  you  pay  the 
ransom. There is no guarantee the cybercriminal will unlock your files 
and you'll be funding them to prey upon another innocent victim. 

                            69 / 73

                            68 / 71

                            69 / 73

                            68 / 71

                            69 / 73

                            68 / 71

                            69 / 73

Summary of Contents for A315-43

Page 1: ...nike potro a ke elektronike i IT ure aja kod trgovinskih lanaca i internet prodavnica u Srbiji Na a stranica vam omogu ava da istra ite najnovije informacije detaljne karakteristike i konkurentne cene...

Page 2: ...USER S MANUAL...

Page 3: ...contains proprietary information that is protected by copyright laws The information contained in this manual is subject to change without notice Some features described in this manual may not be supp...

Page 4: ...0 Using a Bluetooth connection 34 Enabling and disabling Bluetooth 34 Enable Bluetooth and add a device 34 Connecting to the Internet 36 Connecting to a wireless network 36 Connecting to a wireless LA...

Page 5: ...ter and your health Where to find the power button ports and connectors Windows 11 interface overview Tips and tricks for using the touchpad and keyboard How to create recovery backups Guidelines for...

Page 6: ...ternet you can download updates for your computer from http go acer com support 1 The link will open the Acer Support webpage 2 Scroll down to Drivers and Manuals and search for your model by pasting...

Page 7: ...r device Do not expose the computer to direct sunlight Do not place it near sources of heat such as a radiator Do not expose the computer to temperatures below 0 C 32 F or above 50 C 122 F Do not subj...

Page 8: ...e total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord Also the total current rating of all equipment plugged into a sing...

Page 9: ...rging port must be clean and free from debris and should only be used with Acer charging equipment Use of a non Acer battery or charging equipment can cause damage to the product and will void the war...

Page 10: ...r 50 C 122 F Failure to follow these guidelines may cause the battery to leak acid become hot explode or ignite and cause injury and or damage Do not pierce open or disassemble the battery If the batt...

Page 11: ...winter Always try to keep the battery between 15 C and 25 C 59 F and 77 F A device with a hot or cold battery may not work temporarily even when the battery is fully charged Battery performance is es...

Page 12: ...e Setup Guide let us show you around your new Acer computer Screen view 2 3 1 Icon Item Description 1 Microphone Internal digital microphone for sound recording 2 Webcam Web camera for video communica...

Page 13: ...Using the keyboard on page 16 2 Touchpad Touch sensitive pointing device The touchpad and selection buttons form a single surface Press down firmly on the touchpad surface to perform a left click Pres...

Page 14: ...k Pull the lip down to open the port fully 3 HDMI port Supports high definition digital video connections 4 USB ports Connects to USB devices USB 3 2 Gen 1 information USB 3 2 Gen 1 compatible ports a...

Page 15: ...et with microphone 2 USB port Connects to USB devices 3 Power indicator Indicates the computer s power status Battery indicator Indicates the computer s battery status Charging The light shows amber w...

Page 16: ...entilation and cooling fan Allows the computer to stay cool Do not cover or obstruct the openings 2 Speakers Deliver stereo audio output 3 Battery reset pinhole Simulates removing and reinstalling the...

Page 17: ...alphabetic characters typed are in uppercase Num Lock When Num Lock is on the keypad is in numeric mode The keys function as a calculator complete with the arithmetic operators and Use this mode when...

Page 18: ...olume Volume up Increases the sound volume Scr LK Scroll Lock Turns Scroll Lock on or off Icon Function Description Hotkey Icon Function Description Fn F1 F12 Function keys Activates the F1 to F12 key...

Page 19: ...e Internet 4 Task View Allows to switch between running applications and add the virtual desktop 5 Widgets Provides the weather news stocks and sports information 6 Power Shut down sleep or restart yo...

Page 20: ...Start to remove the app from Start How do I make an app appear on my taskbar If you re in all apps list and you want to make an app appear on the taskbar right click an app and select More Pin to tas...

Page 21: ...lide a finger across the touchpad to move the cursor Single finger press or tap Press the touchpad down or lightly tap the touchpad with your finger to perform a click which will select or start an it...

Page 22: ...pe down to minimize all open windows and show Desktop swipe upwards to restore the minimized windows Swipe left or right to switch between open windows Four finger press Lightly tap the touchpad with...

Page 23: ...right hand corner of the screen select the Network Sound and Battery icon to open the Quick settings pane 2 Select All settings 3 Select Bluetooth devices Touchpad 4 Now you can adjust the settings to...

Page 24: ...or create a factory default backup If you cannot access Acer Care Center click Settings in the Start menu select System and then click Recovery Creating a file history backup Recovery Management allo...

Page 25: ...24 Recovery 3 Click Set up syncing for OneDrive folder syncing to continue 4 Make sure the folders that you want to back up are selected and click Start back up to continue...

Page 26: ...Recovery 25 5 You can select View sync progress to watch files sync until it completes 6 To open the OneDrive folder double click OneDrive icon in the notification area...

Page 27: ...Backup wireless and LAN drivers Choose a folder to save your drivers and select OK 3 You will be shown the backup progress on the screen Restoring your computer Recovery Management allows you to quick...

Page 28: ...Recovery 27 3 Click Reset PC to Choose an option 4 Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files...

Page 29: ...5 Choose from the two options Cloud download or Local reinstall to reinstall Windows Ensure you are connected to the internet when using Cloud download 6 Click Change settings to open the Choose setti...

Page 30: ...ams without removing your personal files Click Reset to continue This will take a while and your PC will restart 9 You will be shown the reset progress on the screen The screen will turn off during th...

Page 31: ...ave been reset back to its factory default settings without removing your personal files Reset this PC and remove everything 1 From Start select Care Center in all apps list then Recovery Management 2...

Page 32: ...Recovery 31 3 Click Reset PC to Choose an option 4 Select Remove everything to reset your PC back to its factory default...

Page 33: ...l reinstall to reinstall Windows Ensure you are connected to the internet when using Cloud download 6 Click Change settings to open the Choose settings options 7 Choose your settings options and follo...

Page 34: ...reen will turn off during the reset process 10 The screen will turn back on when it is installing Windows Your PC will restart several times during the reset process 11 Follow the process until it com...

Page 35: ...Bluetooth adapter is available Enable Bluetooth and add a device Every new device must first be paired with your computer s Bluetooth adapter This means it must first be authenticated for security pu...

Page 36: ...tery icon in the lower right hand corner of the screen to open the Quick settings pane From here you can enable or disable Bluetooth or right click on Bluetooth Go to Settings to enter the Bluetooth s...

Page 37: ...al area network which can link two or more computers without using wires Once connected to WLAN you can access the internet You can also share files other devices and even your internet connection its...

Page 38: ...of the wireless network s name and password if necessary If you are trying to connect to a public network such as at a coffeeshop make sure you have the wireless network s name 2 Click Network icon in...

Page 39: ...38 Connecting to the Internet 4 You will see a list of available wireless networks Select the one you wish to use 5 Once you select a wireless network select Connect...

Page 40: ...Connecting to the Internet 39 6 If required enter the network s password...

Page 41: ...a cable Built in network feature If your computer has a network port plug one end of a network cable into the network port on your computer and the other end into a port on your router refer to the i...

Page 42: ...to fit your needs No Item Description 1 Low Reduction Reduces blue light emission from the LED backlit screen by 10 to 25 for basic protection 2 Medium Reduction Reduces blue light emission from the L...

Page 43: ...Keeping your computer and data safe In this section you will find How to secure your computer Setting passwords What you need to prepare when you re traveling How to get the most out of your battery...

Page 44: ...uthorized access Setting these passwords creates several different levels of protection for your computer and data Supervisor Password prevents unauthorized entry into the BIOS utility Once set you mu...

Page 45: ...e appears Try again and press Enter When the User Password is set and the password on boot parameter is enabled a prompt appears at boot up Type the User Password and press Enter to use the computer I...

Page 46: ...ayed Boot sequence To set the boot sequence in the BIOS utility activate the BIOS utility then select Boot from the categories listed on the top of the screen Setting passwords To set a password on bo...

Page 47: ...er Disable Fast startup Your computer uses Fast startup to start quickly but also uses a small amount of power to check for signals to start These checks will slowly drain your computer s battery If y...

Page 48: ...Power management 47 3 Select Change settings that are currently unavailable 4 Scroll down and disable Turn on fast start up 5 Select Save changes...

Page 49: ...nect to a mains power outlet Conditioning a new battery pack Before you use a battery pack for the first time there is a conditioning process that you should follow 1 Connect the AC adapter and fully...

Page 50: ...ective life An embedded battery has a life span of more than 1 000 charge discharge cycles Optimizing battery life Optimizing battery life helps you get the most out of battery operation prolonging th...

Page 51: ...ortant Connect the AC adapter as soon as possible after the battery low warning appears Data may be lost if the battery is allowed to become fully depleted and the computer shuts down Situation Recomm...

Page 52: ...e keyboard pointing device printer external monitor and other external devices 7 Disconnect the Kensington Noble lock if you are using one to secure the computer Moving around When you are just moving...

Page 53: ...nnot find an electrical outlet reduce the drain on the battery by putting the computer in Sleep mode Press the Sleep hotkey or close the display cover whenever you are not actively using the computer...

Page 54: ...In this section you will find Information on the ports and connectors fitted to your computer Ports and connectors...

Page 55: ...to a single USB port Note Two USB standards are currently available on Acer computers USB 2 0 High speed USB and USB 3 2 Gen 1 SuperSpeed USB USB 2 0 ports on Acer computers have a black tongue in the...

Page 56: ...olution and refresh rate should be detected automatically If necessary change the display settings used by the computer Headphones and microphone One or more 3 5 mm jacks on your computer allow you to...

Page 57: ...compatible digital audio video source such as your computer a set top box DVD player and audio video receiver to any compatible digital audio and or video monitor such as a digital television DTV wit...

Page 58: ...Got a question In this section you will find Frequently asked questions Troubleshooting information How to protect yourself while online Where to find Acer service center contact information...

Page 59: ...s being supplied to the computer check the following Do you have a USB storage device USB drive CD drive or smartphone plugged into your computer Unplug it and press Ctrl Alt Del to restart the system...

Page 60: ...the printer is connected to a power outlet and that it is turned on Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer I want to restore my...

Page 61: ...the ITW passport If the country you are traveling in does not have an Acer authorized ITW service site you can still get in contact with our offices worldwide Please visit www acer com Before you cal...

Page 62: ...or messages If you receive an error message note the message and take the corrective action The following table lists the error messages in alphabetical order together with the recommended course of a...

Page 63: ...d service center for assistance Keyboard error or no keyboard connected Contact your dealer or an authorized service center Keyboard interface error Contact your dealer or an authorized service center...

Page 64: ...t Service Provider ISP which supplies the connection between your computer and the internet You should research the ISPs available in your region not forgetting to talk to friends and family about the...

Page 65: ...s fast and always on internet service via a cable television line This service is generally available in large cities You can use your telephone and watch cable TV at the same time you are connected t...

Page 66: ...Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network for example a printer or scanner Also you can share an inter...

Page 67: ...er Microsoft Edge provides an easy and secure web browsing experience As soon as you have your internet access installed and you are connected from the Start Menu click the Microsoft Edge app or the i...

Page 68: ...ometimes with little action on the user s part Immediately after a software manufacturer announces an update hackers are ready with malware that can breach holes in the software that would have been p...

Page 69: ...hey ve got into a device and what to do if you re ever infected Ransomware A form of malware that will encrypt personal data files on your computer and attached devices Encryption converts files into...

Page 70: ...a virus is just one type of malicious threat A virus is classified as a self replicating piece of malicious code that travels by inserting itself into files or programs What to do if you re infected T...

Page 71: ...uppercase and lowercase letters symbols and numbers Don t click on random links or open unsolicited messages and attachments particularly from people you don t know Don t access any personal informat...

Page 72: ...problem on a virus If you suspect your computer is infected the first thing to do is update if you have not already done so and run your antivirus and anti spyware software Powered by TCPDF www tcpdf...

Page 73: ...m dokumentu stoga nismo odgovorni za eventualne gre ke propuste ili neta nosti koje se mogu na i unutar njega Tehnoteka ne odgovara za tetu nanesenu korisnicima pri upotrebi neta nih podataka Ukoliko...

Reviews: