Sharp NAR0059 Laptop Computer with Integral 802.11 Transmitter User Manual safety m4000

Sharp Corporation Laptop Computer with Integral 802.11 Transmitter safety m4000

Contents

Users Manual part 2

  Operation Manual          4-1 4 CHAPTER 4    Communication Functions  This chapter explains how to use the LAN, wireless LAN, and built-in modem functions.   • When you use communication software: • Connect the computer to the AC power source. • Do not allow the computer enter a system standby or system hibernation mode. (See the Power Saving section on page 2-7.) • See also the manual or online help of the software you are using. • The communication speed may vary depending on the traffic, local telecommunications infrastructure, and ISP (Internet Service Provider) infrastructure.  Local Area Network (LAN)  You can connect to a LAN with the 100 Base-TX or 10 Base-T connector on the computer. To activate the LAN, perform the following steps.   Never insert any other cables, but a LAN cable, which may have different electric characteristics from those of the LAN cable. Otherwise, the LAN and the cables may be damaged.  Use the appropriate cable for each LAN standard.   100 Base-TX : Category 5 or higher   10 Base-T     : Category 3 or higher
       Communication Functions  4-2 4 Connecting Your Computer to the LAN 1. Turn off the computer.  2. Connect a LAN cable to the LAN jack and the network hub.      Do not insert a modem cable into the LAN jack.  It may damage the modem cable and the LAN jack.  You can also directly communicate with another computer using a cross LAN cable.  3. Turn on the computer.  Removing the LAN cable   Before pulling the LAN cable out of the LAN jack, be sure to release the connector of the LAN cable by pressing the connector tab. Excessive force may damage the tab.  1. Turn off the computer. 2. Press and hold the connector tab of the LAN cable and then, pull out the cable.    LAN Jack  To Network Hub LAN Cable (Straight Cable) Connector Tab
  Operation Manual          4-3 4 Configuring the LAN  1. Click start - Control Panel. 2. Click Network and Internet Connections; then, Network Connections. If the Classic view is selected, double-click the Network Connections icon.  3. Right-click Local Area Connection. 4. From the pop-up menu, click Properties. 5. In the Local Area Connection Properties dialog box, set the network setting according to the instruction of your network administrator.   Make sure to log on the computer as a member of the Computer administrators group. Otherwise, you cannot set or change some settings for the LAN unit.  If you cannot access the network,  1. Click start - Control Panel. 2. Click Performance and Maintenance; then, System. If the Classic view is selected, double-click the System icon. 3. Click the Hardware tab; then, the Device Manager button. 4. Double-click Network adapters, then, Realtek RTL8139/810x Family Fast Ethernet NIC. 5. Click the Advanced tab, and select Link Speed/Duplex Mode in the Property list and select an appropriate value in the Value pull-down menu. 6. Click OK and close the Device Manager window.  7. Click OK and close the Control Panel window.   Configuring Network Settings You can configure your network settings in various manners depending on the network environment. This section provides one of them with the following conditions. • Two computers, which do not have Internet connections, are connected directly to each other with a cross LAN cable. • The two computers are running on Windows XP. • The Network Setup Wizard is used for network configuration.
       Communication Functions  4-4 4 Configuring Network Settings of the Computer   • Before configuring the network settings, be sure to connect the two computers with a cross LAN cable and turn them on. • You need to perform the following process on the both computers.  1. Click start – Control Panel – Network and Internet Connections – Network Setup Wizard. The Network Setup Wizard dialog box will open. 2. Click Next. 3. Click Next again.   When a message “The wizard found disconnected network hardware.” appears: • With the Local Area Connection string displayed in the Connections field, click Cancel to quit the wizard and confirm the other computer is powered on or the both computers are connected correctly with a cross cable. • Otherwise, check the box of Ignore disconnected network hardware and then, click Next.  4. Select Other and click Next. 5. Select the third option, This computer belongs to a network that does not have an Internet connection, and click Next. 6. Select the second choice, Let me choose the connections to my network, and click Next.   When the message Give this computer a description and name appears, go to the step 9.  7. Clear all boxes except that of Local Area Connection.   Confirm only the box of Local Area Connection is checked.  8. Click Next. 9. Input Computer description if necessary and Computer name, then, click Next.
  Operation Manual          4-5 4  The Computer name should be unique. Type a name that is different from that of the other computer.  10. Type a Workgroup name and click Next.   The Workgroup name should be same as that of the other computer.  11. Select Turn on file and printer sharing and then, click Next. 12. Click Next. The network configuration will start. 13. Select the forth option, Just finish the wizard; I don’t need to run the wizard on other computers, and click Next. 14. Click Finish, then, Yes. The computer will restart.  Changing Your Computer Name or Workgroup Name When you need to change the computer name or workgroup name, follow these instructions.  1. Click start – My Computer. 2. Click View system information in the System Tasks field. The System Properties dialog box will open. 3. Click the Computer Name tab and the Change… button. The Computer Name Changes dialog box will appear. 4. Type the Computer name and the Workgroup and then, click OK. 5. Click OK twice and Yes. The computer will restart.  Sharing Files and Folders You can share files and folders stored on the computer when they are permitted to share. With the function you can copy the documents stored on your desktop computer to your notebook computer or display from one computer on your computer.
       Communication Functions  4-6 4 Sharing Files and Folders This section provides how to share a folder on the network. With these steps you can also share a drive.  1. Right-click on a folder to be shared and click Sharing and Security…. The XXX Properties dialog box will open. (XXX is the folder’s name.) 2. Check the box of Share this folder on the network. Confirm the name typed in the Share name field is the folder name to be shared.   When you have not used the Network Setup Wizard or shared any folders or drives before, follow these instructions to enable file sharing.  1. Click If you understand the security risks but want to share files without running the wizard, click here in the Network Sharing and Security section. The Enable File Sharing dialog box will appear. 2. Select Just enable file sharing and click OK. 3. Check the box of Share this folder on the network and type the folder name to be shared in the Share name field.  3. Click the View your Windows Firewall settings string.   When the string is not shown in the dialog box, go to the step 6.  4. Click the Exceptions tab and check the box of File and Printer Sharing. 5. Click OK.  6. Click OK.   A sharing symbol (         ) will be added to the icon of the shared folder.
  Operation Manual          4-7 4 Copying Shared Files 1. Click start – Control Panel. 2. Click Network and Internet Connections; then, Network Connections. If the Classic view is selected, double-click the Network Connections icon. 3. Click My Network Places in the Other Places field located on the left. 4. Click View workgroup computers in the Network Tasks field. All the icons of computers belonging to the same workgroup will appear. 5. Double-click the icon of the other computer. The shared folder(s) will appear. 6. Double-click the shared folder. When a password is required, type it. 7. Drag and drop the desired file to the desktop of your computer.    The file will be copied on your computer.  8. Close the window.  Wireless LAN   The computer has an integrated wireless LAN compliant with the IEEE802.11b and IEEE802.11g standards.    • The computer can communicate with wireless devices supporting IEEE802.11b or IEEE802.11g. Note that there are some devices the computer cannot communicate with even if they support IEEE802.11b or IEEE802.11g. • The computer cannot communicate with wireless devices only supporting IEEE802.11a. • The range for reliable performance and the quality of connection varies depending on the environment you are in.
       Communication Functions  4-8 4 Wireless LAN Modes There are two kinds of wireless LAN modes: Infrastructure mode and Ad Hoc mode.  Access Point (Infrastructure) Mode Infrastructure mode refers to a wireless network in which wireless devices communicate with each other through an access point (AP). Wireless devices can communicate with each other or can communicate with a wired network through AP.     Ad Hoc Mode Ad Hoc mode refers to a type of network that consists of multiple computers each equipped with a wireless networking interface. Each computer can communicate directly with other wireless enabled computers.   Security Measures Since wireless LANs provide data transfer using electric waves instead of LAN cables between communicating devices, a third party can illegally access to and monitor the transmitted information. The following security measures reduce opportunities to receive the threats. Use a combination of the following measures for more secure communications.  ADSL modem, cable modem, or similar Access Point To Internet
  Operation Manual          4-9 4  See the Notice of Security with Wireless Devices section on page xv.  Authentication The following may help you to protect your important data from illegal access.  • SSID (Service Set Identifier) “SSID” is a common network name. An SSID acts as a password that is shared with all connecting wireless devices, resulting in preventing access by any device that does not have the SSID. Set a same SSID on the computer and an access point which you are using. To enhance the security, rely on a combination of the SSID and WEP or WPA security. (For details on configuration of the access point, refer to its manual.)  • MAC (Media Access Control) address filtering MAC addresses are unique addresses on the network, which are assigned to the computer’s network interface cards. An access point allows access by only devices if their MAC addresses match the addresses in an authentication list used by the access point. Register your MAC address with the access point which you are using. (For more information, refer to the manual of the access point.)    To confirm the MAC address of the computer; 1. Click start – All Programs – Accessories – Command Prompt. 2. Type ipconfig/all and press Enter. 3. Confirm the numbers of Physical Address in the Ethernet adapter Wireless Network Connection field. 4. Type exit and press Enter.  • WPA (Wi-Fi Protected Access) The computer supports WPA, a wireless LAN security standard increasing the level of data protection and access control compared to WEP (Wired Equivalent Privacy) encryption. To use the WPA security, a WPA-enabled access point is required. To implement user authentication, one of the security enhancements of WPA, an authentication server is needed. For details on WPA features, consult your network administrator or the manual of the access point which you are using.
       Communication Functions  4-10 4 Encryption The computer provides the following encryption mechanisms including: TKIP, AES, and WEP. The three techniques allow you to encrypt data to be transmitted, which will make illegal interception more difficult.   • To use the WEP functions, your communication partner must support the functions. • To utilize TKIP, the access point which you are using must support TKIP. • To utilize AES, the access point which you are using must support AES.  • WEP (Wired Equivalent Privacy) WEP relies on an encryption key that is shared between a wireless device and an access point. The key is used to encrypt data and decrypt the transmitted data.   • The computer supports 128-bit and 64-bit WEP keys. • For enhancement of security, the encryption keys should be periodically changed.  • TKIP (Temporal Key Integrity Protocol) TKIP provides an improved data encryption, which was weak in WEP. The TKIP encryption automatically generates a new unique encryption key periodically for each device to avoid the same key staying in use for weeks as they do with WEP.   • AES (Advanced Encryption Standard) AES is a stronger form of encryption than is found in the WPA protocol and is the security standard approved by US Government organizations.
  Operation Manual          4-11 4 Activating the Wireless LAN Antenna To communicate using the wireless LAN, the integrated antenna must be activated. You can enable/disable the antenna by pressing the Fn+F1 (     ) key combination. When the antenna indicator (     ) lights green, the antenna is enabled. When the indicator light is off, it is disabled.     Disable the antenna on airplanes and in specific places where radio-susceptible equipment is nearby such as medical and electrical equipment. Electric waves generated from the antenna may affect the performance of the devices and cause malfunction of the devices.   When the Wireless LAN of the APM button is set to ON or OFF, pressing the APM button will turn on or off the wireless LAN antenna according to the APM button setting. (For more information, refer to the Using the Advanced Power Management Button section on page 2-9.)  Connecting to a Network via an Access Point You can connect the computer to the Internet or a wired network via an access point supporting IEEE802.11b or IEEE802.11g. For details on the access point, refer to its manual or consult your network administrator.  This section describes how to communicate or access to the Internet through the access point.      Wireless LAN Antenna Indicator Wireless LAN Antenna (Invisible)
       Communication Functions  4-12 4 Configuring the Wireless LAN Setting The following steps lead you to configure the wireless LAN setting by automatically obtaining the IP address, DNS server, etc. from an access point. By default, no configuration is needed. Skip these steps and go to the Connecting to Network section on the next page.   • There are some access points requiring the specific IP address, subnet mask, default gateway and DNS server on the computer. Refer to the manual of the access point or consult your network administrator. • You can store the configured settings using Network Setup Utility, which allows you to easily access one of the stored networks appropriate to the current environment. (For the Network Setup Utility, refer to the Network Setup Utility section later in this chapter.)  1. Confirm the antenna indicator (     ) is on. 2. Right-click the Wireless Network Connection icon (     ,       or      ) on the taskbar. If you cannot find the icon click   to show all kinds of icons. 3. Select View Available Wireless Networks. 4. Click Change advanced settings of the Related Tasks field. 5. Double-click Internet Protocol (TCP/IP) in This connection uses the following items. 6. Confirm the radio buttons of Obtain an IP address automatically and Obtain DNS server address automatically are selected. If not, select them.    This step will remove the existing IP address, subnet mask, default gateway and DNS server if they have been already assigned. Write down the information before you perform this step.    7. Click the Advanced button. 8. Confirm the Default gateways section is emptied. If not, remove the gateway address. 9. Click OK each time you close the dialog boxes. 10. Close the Network Connections window.
  Operation Manual          4-13 4 Connecting to a Network This section describes how to connect to a WEP enabled access point or WPA-PSK/TKIP capable access point. (WPA-PSK/TKIP refers to WPA with pre-shared key (PSK) with Temporal Key Integrity Protocol (TKIP) encryption.) For access points with user authentication, consult your network administrator.   WPA-PSK is a special mode allowing only devices with a matching network key to access the WPA-PSK capable access point.   Before connecting to wireless network, confirm the access point which you are using is powered on and ready to use. (Refer to its manual.) 1. Confirm the antenna indicator (     ) is on. 2. Right-click the Wireless Network Connection icon (     ) on the taskbar. If you cannot find the icon click   to show all kinds of icons. 3. Select View Available Wireless Networks. 4. Select a network to be connected from the list and then, click Connect. 5. Type the correct network key in the fields of Network key and Confirm network key. Network keys are generated from ASCII or hexadecimal entries. Refer to the following table for available letters and digits.   WEP Access Point  WPA-PSK/TKIP or AES Access Point ASCII format*1  5 or 13 characters  8 to 63 characters Hexadecimal format*2   10 or 26 digits  64 digits *1 0 to 9, a to z, and A to Z (The uppercase and lowercase letters are distinguished.) *2 0 to 9, a to f, and A to F (The uppercase and lowercase letters are not distinguished.)   When you select a network that is not configured for encryption settings, the caution message appears. Read the message carefully. Although you can connect to the network by clicking Connect Anyway, security is not ensured. Select a security configured network. 6. Click Connect.
       Communication Functions  4-14 4  • When the computer successfully connects to the selected access point, the Connected signage will appear in the connected network name field and the Wireless Network Connection icon (     ) on the taskbar will change to (      ). • Entering an incorrect network key or selecting an inappropriate key index will show the Limited or no connectivity signage in the network name field and the icon on the taskbar will change to (      ). Reenter the correct network key and/or change the key index referring to the Changing the Security Mode section on page 4-17. • To establish a new connection with another access point, first disconnect the current connection and then, perform the steps 3 and 4. (To disconnect the current connection, select the connected access point in the Wireless Network Connection dialog box and then, click the Disconnect.)  Confirming the Status of Wireless Connection  The Wireless Network Connection icon on the taskbar shows the current wireless connection status.  Icon Connection status  Disconnected  Trying to connect  Connected  Failed to connect  To check the connection speed and quality: 1. Click the Wireless Network Connection icon (     ) on the taskbar. If you cannot find the icon, click   to show all kinds of icon.  2. In the Wireless Network Connection Status dialog box, confirm your connection status.  • The number of the green signals (         ) shows the connection quality. The more signals light on, the better quality is given to the computer. • When the connection quality is poor, adjust the distance between the computer and other devices or the access point you are communicating with and/or the facing direction of the computer. 3. Click Close.
  Operation Manual          4-15 4 Communicating with Other Computers  This section describes how to communicate between wireless computers with built-in wireless LAN or a wireless LAN card installed. To enable wireless communication between the computers; • Assign IP address and subnet mask for each computer. • Set the communication mode to ad hoc. • Give the same network name (SSID) to each computer. • Set the encryption key (WEP key).   TKIP and AES cannot be utilized in ad-hoc mode. 1. Confirm the antenna indicator (      ) is on. 2. Right-click the Wireless Network Connection icon (     ,      , or      ) on the taskbar. If you cannot find the icon click   to show all kinds of icons. 3. Select View Available Wireless Networks. 4. Click Change advanced settings of the Related Tasks field. 5. Select Wireless Network Connection; then, click Change settings of this connection of Network Tasks. 6. Double-click Internet Protocol (TCP/IP) in This connection uses the following items. 7. In the Internet Protocol (TCP/IP) Properties dialog box, select Use the following IP address and set the IP address to 192.168.1.2 through 192.168.1.254 and the Subnet mask to 255.255.255.0; then, click OK.   • The IP address of each computer should be unique. • The same subnet mask should be set to all computers. • The Default gateway can be blank.  8. Click the Wireless Networks tab; then, the Advanced button in the lower right of the dialog box. The Advanced dialog box appears. 9. Select Computer-to-computer (ad hoc) networks only; then, click the Close button. 10. Click the Add… button in Preferred networks of the Wireless Network Connection Properties dialog box. 11. Type a name of the network in the Network name (SSID) field of the Wireless Network Properties dialog box.
       Communication Functions  4-16 4  Confirm the computer and other computers are assigned the same Network name.  12. Confirm Open is selected in the Network Authentication pull-down menu and WEP in the Data encryption pull-down menu. 13. Clear the box of The key is provided for me automatically. 14. Type the same network key as that of the partner in the Network key and Confirm network key fields.          Network keys are generated from ASCII or hexadecimal entries. Refer to the following table for available letters and digits.  ASCII format*1  5 or 13 characters Hexadecimal format*2  10 or 26 digits                       *1 0 to 9, a to z, and A to Z (The uppercase and lowercase letters are distinguished.)                       *2 0 to 9, a to f, and A to F (The uppercase and lowercase letters are not distinguished.)                • The network key to be typed must be equal to that of the partner(s). • Be sure to match the key index between your computer and the other computer(s). Note some computers have the key index options 0 through 3. Refer to the Key index matching table on page 4-18.  15. Click OK twice; then, close the Control Panel window. 16. Configure the network by setting the name of the computer and workgroup.   • To communicate with other wireless enabled computers, set the computer name and the workgroup name. The computer name should be unique and the workgroup name should be same as others. (Refer to the Changing Your Computer Name or Workgroup Name section on page 4-5.) • To share the folder(s) on the computer with other computers, refer to the Sharing Files and Folders section on page 4-5.
  Operation Manual          4-17 4 Changing the Security Mode This section describes how to change the security mode to WEP or WPA-PSK with TKIP or AES.    When using the user authentication security technology, consult your network administrator for the mode changes.    WEP 1. Right-click the Wireless Network Connection icon (     ,       , or      ) on the taskbar.  2. Select View Available Wireless Networks. 3. In the Related Tasks field, click Change the order of preferred networks.   The Wireless Network Connection Properties dialog box will appear.    4. In the Preferred networks field, select the network to be given the security change and then, click Properties. 5. Select Open in the Network Authentication pull-down menu and WEP in the Data encryption pull-down menu.   Some access points require that you select shared for the Network Authentication. Refer to the manual of your access point.    6. Clear the box of The key is provided for me automatically. 7. Type the same network key as the other device to be communicated with in the Network key and Confirm network key fields.   Available letters and digits are following;  ASCII format*1  5 or 13 characters Hexadecimal format*2  10 or 26 digits           *1 0 to 9, a to z, and A to Z (The uppercase and lowercase letters are distinguished.)           *2 0 to 9, a to f, and A to F (The uppercase and lowercase letters are not distinguished.)
       Communication Functions  4-18 4 8. If necessary, change the key index in the key index fields.   • The key index options of the computer are 1 through 4.  • Some access points and computers have the options 0 through 3. Refer to the table below for matching. Key index matching table Access Point 1 /Computer 1 Access Point 2 /Computer 2  Your computer 1 0 1 2 1 2 3 2 3 4 3 4    (ex. When your access point type is “Access Point 2” and its key index is set to 0, set 1 to the key index of your computer.)  9. Click OK twice and close the Wireless Network Connection Properties dialog box.  WPA-PSK with TKIP or AES 1. Follow the steps 1 to 4 in the WEP section above. 2. Select WPA-PSK in the Network Authentication pull-down menu and TKIP or AES in the Data encryption pull-down menu. 3. Type the same network key as the other device to be communicated with in the Network key and Confirm network key fields.   Available letters and digits are following;  ASCII format*1  8 through 63 characters Hexadecimal format*2 64 digits           *1 0 to 9, a to z, and A to Z (The uppercase and lowercase letters are distinguished.)           *2 0 to 9, a to f, and A to F (The uppercase and lowercase letters are not distinguished.)  4. Click OK twice and close the Wireless Network Connection Properties dialog box.
  Operation Manual          4-19 4 Built-in Modem   You can use the built-in modem for data transfer and fax communication.   • The built-in modem on the computer is designed only for regular analog telephone lines. The modem may be damaged when connected to a digital ISDN terminal or a digital PBX. • Use TA (terminal adapter) to connect the built-in modem to a digital telephone line. • If an unusual device is attached to the line you are connecting to, the modem may not function properly. Remove the device or contact the dealer of the device. • Before connecting to a PBX, consult the PBX maintenance staff or its service company. If the electric characteristics of your PBX are different from those of a regular analog line, the modem will not function properly. If you connect the modem to a digital PBX, both the modem and the PBX may be damaged.   • Within the communication software you are using, set the COM port of the built-in modem to COM 3 and modem name to Agere System HDA Modem if required. • Before commencing with fax communication, it is recommended that you exit other application programs.  Connecting the Modem to Telephone Line   To reduce the risk of fire, use only No. 26 AWG or larger UL Listed or CSA Certified Telecommunication Line Cord.  1. Turn off the computer.
       Communication Functions  4-20 4 2. Connect a modem cable to the modem jack and the telephone line.     Be sure not to insert a modem cable into the LAN jack on the rear side of the computer. It may damage the LAN jack and the modem cable.  Connect the modem to the telephone line directly. Do not use a distributor or allotter.      3. Turn on the computer.   Configuring the Modem You may have already configured your modem during the Windows setup process. Otherwise, make the necessary adjustments as shown below.  Modem Configuration When you use the modem first time, you must type your location’s information. 1. Click start – Control Panel – Printers and Other Hardware; then, Phone and Modem Options. If the Classic view is selected, double-click the Phone and Modem Options icon. 2. In the Location Information dialog box, select your country, type your area code, etc. and select your dial type; then, click OK.     Modem CableTo Telephone Line Modem Jack
  Operation Manual          4-21 4 After the configuration, click or double-click the Phone and Modem Options (icon) to open the Phone and Modem Options dialog box and double-click the location name in the Locations field of the Dialing Rules tab for the information you set above. Clicking Edit… or New…allows you to make a new location or change the settings.  Internet Connection Windows XP has a special Internet connection wizard to help you to connect to the Internet with ease.    • If you plan to connect into the Internet and dial an Internet Service Provider (ISP) through the modem, have your account information and dial-up number ready before you begin the wizard. • Once you set your connection, you can see or edit the connection status by double-clicking the icon appearing on the Dial-up field of the Network Connections dialog box.  1. Click start – Control Panel – Network and Internet Connections – Network Connections. If the Classic view is selected, double-click the Network Connections icon.  2. In the Network Connections dialog box, click Create a new connection of the Network Tasks section. The New Connection Wizard dialog box will appear. 3. Follow the instructions on the screen.   Removing the Modem Cable   Before pulling the modem cable out of the modem jack, be sure to release the connector of the modem cable by pressing the connector tab. Excessive force may damage the tab.  1. Turn off the computer.
       Communication Functions  4-22 4 2. Press and hold the connector tab of the modem cable and then, pull out the cable.         Connector Tab
  Operation Manual          4-23 4 Network Setup Utility  With the Network Setup Utility, you can define specific network settings based on your network environments such as work, home, etc. You can also allow for the computer automatically to switch to the appropriate network.   • Not every setting item can be stored.  • The Network Setup Utility may not be compliant with all network environments.  • The Help of the Network Setup Utility will give you more information.  Running the Network Setup Utility For the first use; 1. Click start – All Programs – Network Setup Utility – Network Setup Utility.   The Network Setup Utility icon (    ) will appear on the taskbar.  2. Click the Network Setup Utility icon (   ) on the taskbar. 3. Read the message and then, click Yes or No.  For the second use and later; • When Yes is chosen in the step 3 above, the Network Setup Utility will automatically run on Windows start-up. • When No is chosen in the step 3 above, click start – All Programs - Network Setup Utility –Network Setup Utility.  Loading the Network Settings To set your specific network setting, confirm that the computer is connected into the network and has the proper settings for your current environment and follow the instructions below. 1. Confirm the current network setting is to be loaded. 2. Run the Network Setup Utility to display the Network Setup Utility window. 3. Click the (     ) icon.  4. Click OK in the confirmation window.
       Communication Functions  4-24 4 5. In the Register an icon and network name dialog box, select the SHARP icon or Windows icon, then, click the Select icon button. 6. Select an icon and click OK.  7. Type a network name, then, click OK. The selected icon appears on the main screen of the Network Setup Utility window.    It takes a moment to load and register the network settings.     Using or Switching to a Network  Using or Switching to a Loaded Network To use or switch the loaded network, confirm the computer is ready to connect into the network and follow these steps.  1. Run the Network Setup Utility to display the Network Setup Utility window. 2. Select the appropriate network icon in the Network Setup Utility window. 3. Click OK.   • Make sure the computer is connected to the proper environment. • If your hardware or software configuration has been changed, you may not be able to switch to the network properly. In this case, you may need to reconfigure the network settings.  Automatically Switching to an Available Network The computer supports the auto-switching function, “Auto Pilot,” automatically to detect one of the available networks registered and switch to it.  1. Run the Network Setup Utility to display the Network Setup Utility window. 2. Click the Auto Pilot icon (    ). 3. Read the message in the confirmation window and click OK.   • It will take a moment to switch to the auto pilot mode. • To exit from the auto pilot mode, click the icon (     ) again.
  Operation Manual          5-1  5 CHAPTER 5         Setup Utility  This chapter describes how to run the Setup Utility to change settings on the computer.  Running the Setup Utility  With the Setup Utility, you can customize the system configuration information, such as time and date, or passwords.  The information you have specified is saved in a special area called CMOS RAM, which the system reads every time you turn on the computer. The computer is shipped from the factory with the appropriate setting of the Setup Utility. Leave it as default in normal use.  Contents of Setup Utility The Setup Utility consists of six menu pages, as follows: • Main:  Configures basic setting.   • Advanced:  Configures device interface.  • Security:  Sets Passwords.  • Boot:  Sets where the system boots from.  • Battery:  Conditions the battery pack. • Exit:  Exits the Setup Utility or retrieves the default values.
      Setup Utility   5-2  5 Entering and Exiting the Setup Utility  1. Turn on the computer. 2. When Press F2 for System Utilities appears, press F2. 3. Change to the desired settings. (Refer to the next section.)                4. Select Exit menu; then, press Enter. 5. Select one of the exit methods, and press Enter. 6. Confirm the message and press Enter again. The system restarts.    When the Setup Utility is opened, power management does not work. Do not close the display cover.   Changing the Settings of the Setup Utility   The touchpad and mouse are disabled in the Setup Utility. Use the keyboard.   To change the settings: 1. Use → or ← key to select the menu. 2. Use ↑ or ↓ key to select the item.           Minus key or Space bar: Changes the value. In the item with ►mark, press Enter to open a sub menu. Press Esc to close the sub menu and return to the previous menu. For date and time, press Enter on the item to select the value to be changed; then, use the minus key or space bar to change the value.           3. Close the Setup Utility referring to the steps in the Entering and Exiting Setup Utility section.
  Operation Manual          5-3  5 Main Menu  System Time defines the system time, using the format hour:minute:second  (24-hour format).  Use the Enter key to move the cursor, and the minus key or space bar to change numerals.  System Date defines the system date, using the format month/day/year. Use the Enter key to move the cursor, and the minus key or space bar to change numerals.  Hard Disk Drive Type defines the hard disk type of the computer. To display more information, press Enter. Normally use as default.   Optical Disk Drive Type defines the optical drive type of the computer. To display more information, press Enter. Normally use as default.  Internal NumLock defines whether the numlock keys of the built-in keyboard are always enabled or disabled.   Quiet Boot defines whether SHARP logo appears on the screen while booting.  CPU Information shows the information of the CPU.  System Memory shows the volume of the conventional memory.  Extended Memory shows the volume of the extended memory more than 1MB.  BIOS Version shows the BIOS version of the system.  EC/KBC Version shows the EC/keyboard controller version of the system.
      Setup Utility   5-4  5 Advanced Menu  Resolution Expansion defines whether the screen is expanded when it is in a low resolution. (The setting is not used on Windows.)    Plug&Play O/S normally has to be set to default as “Yes.”  Max ACPI C-State determines the amount of power management while the system is idling.  Normally set to default as “C4 State.”  Security Menu  Set Supervisor Password defines the supervisor password (up to eight letters, figures, or the combinations). See the next section about the supervisor password.  Set User Password defines the user password (up to eight letters, figures, or the combinations). You can set the user password only when the supervisor password has been set.    If you lose your password, you will be unable to access the computer or change the configuration. Make sure to select a password you will never forget, or write it down and protect it in a secure place. Otherwise, you will have to contact your dealer for assistance.  Password On Boot defines whether the system requires the password entry to boot up.  Hard Disk Boot Sector defines whether the boot sector of the hard disk is write-protected. When formatting the hard disk or reinstalling software, set it to Normal.
  Operation Manual          5-5  5 Passwords Setting a password will protect the computer against unauthorized access. Once a password is set, the system requires the password when entering to the Setup Utility.  If the Password on boot is enabled, the system will require the created password when the computer is turned on.    • If you enter a wrong password three times, the message “System Disabled” appears. Press the power button to shut down the computer, and after 10 seconds, press the power button to turn it on again.  • If the Password On Boot is disabled, the password entry will be needed to enter the Setup Utility.  Your computer supports two different levels of password security: a supervisor password and a user password. A user password is available to be set with a supervisor password set. If you share the computer with others we recommend that you set both supervisor and user passwords, and let others know the user password only.    Setting the Password   If not necessary, do not set the supervisor password or user password. If you forget the password, you cannot boot the computer.  The user password can change the following items: • System Time • System Date • Resolution Expansion • Set User Password • Battery Calibration • Exit Saving Changes • Exit Discarding Changes • Save Changes   1. In the Security menu of the Setup Utility, select Set Supervisor Password or Set User Password and press Enter.  2. Type your password (up to eight letters, figures, or the combinations), and press Enter.    3. Type the same password again, and press Enter. 4. Press Enter.
      Setup Utility   5-6  5 5. Select Exit menu and confirm Exit Saving Changes is highlighted; then press Enter.  6. Confirm Yes is highlighted and press Enter. The system restarts.   • To enable the supervisor password or the user password when booting up the computer, enable the Password On Boot. • When entering the Setup Utility, the password will be required.   Changing the Password 1. In the Security menu of the Setup Utility, select Set Supervisor password or Set User password and press Enter. 2. Type your current password, and press Enter. 3. Type your new password, and press Enter.  4. Type your new password again, and press Enter twice. 5. Select Exit menu and confirm Exit Saving Changes is highlighted; then press Enter.  6. Confirm Yes is highlighted and press Enter. The system restarts.  Deleting the Password   A deletion of the supervisor password will delete the user password.   1. In the Security menu of the Setup Utility, select Set Supervisor password or Set User password and press Enter. 2. Type your current password, and press Enter. 3. Without typing any characters, press Enter.  4. Without typing any characters, press Enter twice. 5. Select Exit menu and confirm Exit Saving Changes is highlighted; then press Enter. 6. Confirm Yes is highlighted and press Enter. The system restarts.
  Operation Manual          5-7  5 Boot Menu Boot Sequence specifies where the system boots from. Press Enter to open the sub menu. The system boots from the drive at the top of the list. If the system cannot find the drive, it will boot from the second one; then, third one; then forth one. Use arrow keys to select the drive you want to move and then, use the space bar or minus key to move it up or down. USB Boot enables or disables the boot from the USB floppy disk drive. LAN Boot defines whether the system boots from other server via the LAN unit of the computer.  Battery Menu Battery Calibration conditions the battery pack.  (Refer to the Conditioning the Battery Pack on page 2-4.)  Exit Menu Exit Saving Changes saves the settings you have changed and exits the Setup Utility. Exit Discarding Changes exits the Setup Utility without saving the settings you have changed. Load Setup Defaults returns the values of all items to the default.  To exit, select one of the first two items. Discard Changes returns the values of all items to the values you last saved. To exit, select one of the first two items. Save Changes saves the settings you have changed.
      Setup Utility   5-8  5
Appendixes   Operation Manual   A-1 Appendixes  The appendixes contain additional information on the use and care of the computer.  Memory Module   You can upgrade the memory amount of the computer by installing an expansion memory module. See the specification on the separate specification sheet for the default and maximum memory size. For available memory modules, contact your local dealer or visit http://www.sharpsystems.com.   Installing the Memory Module   • Do not handle the memory module in a location where static electricity is easily generated such as on the carpet. • Before installing the memory module, carefully discharge static electricity from your body by touching an unpainted metal area. • Avoid touching the integrated circuits on the memory module. Handle all components by their edges. • Keep the memory module in the anti-static wrapping until you are ready to install it. 1. Turn off the computer. 2. Disconnect the AC adapter and remove the peripheral devices.  3. Put the computer on a stable surface and remove the battery pack. (See Chapter 2 for removing the battery pack.)   • Make sure to turn off the computer and remove the AC adapter and the battery pack. Otherwise you may get an electrical shock. • After long use of the computer, the temperature inside the computer may have gone up. Leave it alone until it becomes cool before going on to the next step.
  Appendixes     A-2 Appendixes 4. Loosen the screw and remove the cover.      5. Turn over the sheet.           6. Align the notched part of a memory module to the projecting part of the memory socket and then, put the module into the socket until it is seated.           . Notched Part Cover Screw Memory ModuleProjecting Part Memory Socket 20° Sheet
Appendixes   Operation Manual   A-3 7. Gently press the module to place it into the socket, matching the notched parts of the module with the projecting parts of the socket.   8. Match the tabs of the cover with the notched parts of the computer, and then, put down the cover so that it is placed in the original position.    9. Tighten the screw.    10. Reinstall the battery pack, turn over the computer and connect the AC adapter.   Notched Parts Projecting Parts Screw
  Appendixes     A-4 Appendixes Finding the Memory Size  1. Turn on the computer. When the message Press F2 for System Utilities appears, press F2 to open the Setup Utility. 2.  Find the memory size shown in the Extended Memory field in the Main menu.   • The available memory size will appear, minus the total amount of shared video memory size and other factors.    • If you find the memory size shown incorrectly, it is considered that the memory module has been installed improperly. Press the power button to turn off the computer and reinstall the memory module correctly.  3. Press Esc key. The Exit menu will appear. 4. Confirm Exit Saving Changes is selected and then, press Enter. 5. Confirm Yes is selected and then, press Enter.  The computer will restart.   You can find the memory size on Windows. Click start – My Computer – View system information of System Tasks. The memory size will appear, minus the amount of shared video memory size, at the bottom of the sentence in General tab.  Removing the Memory Module  1. Follow the steps 1 to 5 of the Installing the Memory Module section. 2. Slightly bend both latches outwards until the memory module is released.            3. Remove the memory module and close the cover.
Appendixes   Operation Manual   A-5 Maintenance and Care This section provides you with information on how to maintain your computer in excellent working condition. Using a Security Cable                                                                                                                You can connect a security cable to the security slot on the computer to prevent theft.   Cleaning the Computer  Cabinet Apply a small amount of mild cleaning solution to a dry, lint-free cloth and wipe the cabinet with the cloth.  • Never clean the computer while it is powered on. • Do not use alcohol, benzene, thinner, or other strong chemical agents that may damage the cabinet.  Security Cable Security Slot Connect the cable to a fixed object to ensure that the computer stays in the intended area.
  Appendixes     A-6 Appendixes Screen The surface of the screen may become smeared and accumulate dust during use.  Avoid touching the screen with your fingers when using the system. Gently wipe the surface of the screen with a soft cloth that has been dipped in a mild detergent solution and squeezed dry.  Touchpad Wipe the touchpad with a soft, dry cloth.  Ventilation Openings Dust on the ventilation openings may cause overheating of the computer. Wipe the ventilation openings with a soft, dry cloth.  Traveling with Your Computer  The computer is designed for portability. For safety and convenience when traveling, please follow these guidelines.  • Before traveling, back up your data on external media. • Do not travel with a protruding PC card inserted in the PC card slot of the computer. • Do not carry the computer with the power on. This may result in loss of data and/or damage to the hard disk drive. • Make sure the display cover is completely closed before traveling. Otherwise the cover may be opened unexpectedly, and the display and/or the keyboard may be damaged. • If you carry the computer in a bag, avoid unnecessary pressure to the computer by the other items in the bag. • Disconnect the AC adapter and any other cables and any peripherals from the computer. • Fully charge the battery pack and remember to bring the AC adapter and the AC power cord with the computer. • Avoid sudden shocks or extreme vibration.
Appendixes   Operation Manual   A-7 Virus Protection  Computer viruses are referred to as a kind of malignant program intentionally engineered. When the computer is infected, several damages would be generated; data in the hard disk may be destructed; the computer may be provided external operation by unauthorized users; you may inadvertently attach infected files to your e-mails resulting in spreading the viruses, for example. To avert virus infection, • Use the latest virus protection/cleaner software, • Apply the latest virus definition file for prevention of new virus attack, • Before opening incoming files such as attached files or downloaded files, detect the virus infecting them, • Do not open e-mails originating from an unknown place, • Enable the security functions of your application to be used (i.e. disabling macros when handling Word or Excel files,) and • Regularly update Windows or the applications/software on your computer.    Be sure to back up your important data regularly.  If the data has been damaged by a virus, you may not be able to recover it.  When virus infections occur Eliminate the virus by using the latest anti-virus software or virus cleaner software. When it fails, repair all the hard disks. (For repairing the hard disks, refer to the Re-installation Instructions section on page A-13.)  Updating Windows Enabling Automatic Updates If the Automatic Updates is turned off on the computer, follow these steps.   • You can check the current Automatic Updates status by following these steps. If it is turned off, turn it on. 1. Click start – Control Panel – Security Center. 2. See the Automatic Updates field in the Security Center window.     When the Automatic Updates is ON, the function is enabled.  • When the Automatic Updates is turned on, the computer will
  Appendixes     A-8 Appendixes automatically detect the important programs to be updated and install them if any.  1. Click start – Control Panel – Security Center. 2. In the Security Center window, click the Turn on Automatic Updates button. 3. Close the window.  Updating Windows You can update Windows by clicking the Windows Update icon on the taskbar or accessing to the Microsoft site. For more information, visit the Windows Help and Support Center.  Protecting Your Computer against Viruses The Norton AntiVirus software is preinstalled on the computer for detecting and eliminating viruses. Since the software downloads the latest information or data through the Internet, the computer needs to be connected to the Internet. Some of the software features are below:  • Regularly updates itself to maintain the latest program and virus definition file against new virus threats. (LiveUpdate) • Automatically scans all incoming messages and attachments so that viruses can be identified and blocked. Also detects viruses intruded into the computer. (Auto-Protect)        • Manually detects infected programs or files. (Virus Scan)          Refer to Help of the Norton AntiVirus for more information.   • By default, the Norton AntiVirus software : • Enables the Auto Protect function. • Scans the computer for virus weekly. • Refer to the Help and Support of the Norton AntiVirus software for details.  Enabling Norton Antivirus Software To use the preinstalled Norton Antivirus software for the first time, you must complete the Norton Antivirus wizard to enable it and update the definition file. 1. Connect the computer to the Internet. 2. Click start – All Programs – Norton AntiVirus – Norton Antivirus 2005.
Appendixes   Operation Manual   A-9 3. Follow the on-screen instructions to complete the Norton Antivirus wizard and the LiveUpdate.  Running LiveUpdate Automatically The Automatic LiveUpdate function automatically updates the definition file.   Be sure to complete the Norton AntiVirus wizard before going on these steps.  1. Click start – All Programs – Norton AntiVirus – Norton AntiVirus 2005. 2. Click Automatic LiveUpdate in the Subscription Service field. 3. Click the Turn On button and close the Norton AntiVirus window.  Norton AntiVirus Update Service Norton AntiVirus software scans for virus by means of a virus definition file allowing the software to identify and block a particular virus. To protect the computer against new viruses, the virus definitions and application need to be kept current. The software automatically checks the web and updates the definition file when needed. Free update service will be provided within ninety days after the software is installed. After the free service is over, one-year paid update service can be available. Refer to http://www.symantec.com for the application.  Scanning Viruses By default settings, the Norton AntiVirus software automatically scans the computer once a week. To manually detect viruses infecting the computer, follow the instructions below.   Be sure to complete the Norton AntiVirus wizard before going on these steps.  1. Click start – All Programs – Norton AntiVirus – Norton AntiVirus 2005. 2. Click Scan for Viruses in the Norton AntiVirus menu. 3. Click an option you want to perform and then, follow the on-screen instructions.
  Appendixes     A-10 Appendixes Data Execution Prevention  The computer is mounted with the CPU supporting Data Execution Prevention (DEP) technology (or a memory protection feature) built into the Windows operating system. With the DEP technology, the operating system marks some memory regions as non-executable and prevents execution of malicious program code there, which will result in protecting the computer from virus infection.   • Only the members of the Computer administrators group can change the settings of DEP or the Security Center. • With the computer connected to LAN, the settings may not be changed. Consult your network administrator.  Changing DEP Settings By default, the DEP technology is enabled only for essential Windows programs and services. To turn on the DEP for all programs and services; 1. Click start – My Computer. 2. Click View system information in the System Tasks field. 3. Click the Advanced tab. 4. In the Performance field, click the Settings button. 5. Click the Data Execution Prevention tab and select Turn on DEP for all programs and services except those I select. 6. Click OK. 7. Click OK in the confirmation window. 8. Click OK to close the dialog box. 9. Close the My Computer window. 10. Restart the computer.  Checking Safety of Programs As the DEP always functions on the computer against the security threats, some programs may be blocked and cannot execute. If you have the message “To help protect your computer, Windows has closed this program,” close the message window and check out the safety of the program and computer by following theses steps.
Appendixes   Operation Manual   A-11 1. Open the Security Center and confirm all of the Firewall, Automatic Updates and Virus Protection are ON.   • Be sure to enable all of these three functions. • For details on the Security Center, refer to the Notice of Computer Security on page xiv.  2. Scan the system for viruses.   • If some viruses are detected, eliminate them according to the instructions of the virus protection/cleaner software. • If no viruses are detected and the three functions are enabled, consult the program publisher for an updated version.  Disabling DEP for Specific Programs After ensuring the safety of the program, disable the DEP function to enable the program execution.    To protect the computer, try to update the program and enable the DEP function.  1. Follow the steps 1 to 5 of the Changing DEP Settings section on the previous page. 2. Check the box of the program in the list to be run and then, click OK.   If the program is not on the list, click Add… and select the program to be run.  3. Click OK.   If the confirmation window appears, click OK.  4. Click OK. 5. Restart the computer if prompted in the step 3.
  Appendixes     A-12 Appendixes Data Backup and Restore  Your important data such as e-mails or files is stored on the hard disk of the computer. Backing up the data in another place is one of the ways that can protect your data against any disaster, data corruption or data erase, for example.  Backing Up Data and Settings  Backing Up Data You can back up your data on the D drive, external hard disk, or CD-R/RW disks.   The D drive is not perfectly safe place for backup. If the hard disk is damaged, you cannot access the backup data.  The Auto-Grabber function of Drag’n Drop CD+DVD4 helps you back up your data onto your media. Refer to Auto-Grabber Help for more information.  Backing Up Settings The File and Settings Transfer Wizard can help you to back up several settings at one time. To open the wizard, follow the instructions below.   You cannot back up the details on the network settings such as an IP address and subnet mask by using the File and Settings Transfer Wizard. Note down the details on the settings and keep it in a safe place. 1. Connect the backup device or media to the computer. 2. Click start – All Programs – Accessories – System Tools – Files and Settings Transfer Wizard. 3. Follow the on-screen instructions.  Restoring Data and Settings You can also use the File and Settings Transfer Wizard to restore your data or settings from the backup media to the hard disk.   Confirm that the backup data to be restored is the one you want before overwriting the existing file.
Appendixes   Operation Manual   A-13  Re-installation Instructions  Refer to this section to re-install the system of the computer.   • The reinstallation process will overwrite all information in the C and D drives of the hard disk and restore the hard disk drive to its factory configuration. • The necessary reinstallation data is on the hard disk of the computer. Never modify or delete this data. Without the correct data, you cannot restore the computer to its factory configuration. • Do not change the setting of the hard disk partition. The change may result in deleting the reinstallation data. Without the data, you cannot restore the computer. • If you have installed commercial data recovery software on the computer, never perform the reinstall process until you uninstall the recovery software, which may rewrite the MBR* of the hard disk. If the MBR is rewritten, you may not be able to reinstall the system.    ( *Master Boot Record: a sector on the beginning of a hard disk drive that contains a sequence of commands necessary for booting an operating system)  To recover your hard disk, you will use the PowerQuest EasyRestore software which comes pre-installed on your computer. Before starting re-installation, read the following End User License Agreement first.  PowerQuest® EasyRestoreTM End User License Agreement  IMPORTANT:  Read this before using your copy of PowerQuest software.  This document is a legal agreement between you, the "end user," and PowerQuest Corporation. Use of the software indicates your acceptance of these terms. As used in this License Agreement, the term "Software" means the EasyRestore software included on the CD provided with this License Agreement.  1. PROPRIETARY RIGHTS. The Software is a proprietary product of PowerQuest Corporation ("PowerQuest") or its licensors and is protected under U.S. copyright laws and international treaty provisions. Ownership of the Software and all copies, modifications, and merged portions thereof shall at all times remain with PowerQuest or its licensors.
  Appendixes     A-14 Appendixes 2. GRANT OF LICENSE. The Software is being licensed to you, which means you have the right to use the Software only in accordance with this License Agreement. The Software contains pre-installed software for disaster recovery purposes. The Software is only authorized for distribution together with a specific computer. This License authorizes you to use the Software for disaster recovery purposes only, to restore the hard disk image contained on the CD to the computer with which the CD and Software were originally shipped.   3. NONPERMITTED USES. Without the express permission of PowerQuest, you may not (a) use, copy, modify, alter, or transfer, electronically or otherwise, the Software or documentation except as expressly permitted in this License Agreement, or (b) translate, reverse program, disassemble, decompile, or otherwise reverse engineer the Software. 4. TECHNICAL SUPPORT. PowerQuest is NOT responsible to provide technical support.  Any and all technical support questions, regarding the Software, should be referred to the place of purchase.  5. U.S. GOVERNMENT RESTRICTED RIGHTS. If you are acquiring the Software on behalf of any unit or agency of the United States Government, the following provision applies: It is acknowledged that the Software and the documentation were developed at private expense and that no part is in the public domain and that the Software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19, as applicable. Contractor/manufacturer is PowerQuest Corporation/P.O. Box 1911/Orem, UT 84059.  6. NO WARRANTY. The Software is being provided to you AS IS.  PowerQuest does not warrant the Software to end users. If the Software fails to perform substantially in accordance with the documentation provided to your hardware supplier, PowerQuest will repair or replace the copy of the Software provided to your hardware supplier and will authorize your hardware supplier to provide such repaired or replaced Software to you without charge.  7. LIMITATION OF LIABILITY. NEITHER POWERQUEST NOR ITS SUPPLIERS SHALL IN ANY EVENT BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, INCLUDING BUT NOT LIMITED TO DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, AND DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR OTHER PECUNIARY LOSS, EVEN IF POWERQUEST CORPORATION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, WHETHER SUCH LIABILITY IS BASED ON CONTRACT, TORT, WARRANTY, OR ANY OTHER LEGAL OR EQUITABLE  GROUNDS. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
Appendixes   Operation Manual   A-15 8. NO WAIVER. Any failure by either party to this agreement to enforce a specific part of the agreement in a specific situation is not a waiver of rights under the agreement. The party may still enforce the rest of the agreement in that situation and may still enforce some or all of the  agreement in other situations.  9. This License Agreement constitutes the entire agreement between you and PowerQuest pertaining to its subject matter. This License Agreement is governed by the laws of the State of Utah. Any litigation arising from this license will be pursued only in the state or federal courts located in the State of Utah. Copyright 1994-2005, PowerQuest Corporation. All rights reserved. U.S. Patents 5,675,769; 5,706,472; and 5,930,831; other patents pending in  the U.S.A. and elsewhere. PowerQuest is a registered trademark and  EasyRestore is a trademark of PowerQuest Corporation.  Recovery Options  You can format the hard disk and re-install the preinstalled software and set the status of the computer to the same configuration as you used for the first time. There are two options to recover the hard disk drive(s) of the computer: via hard disk and via recovery CD. The former saves your time, while the latter secures the re-installation data from potential loss or corruption. The later sections describe the specific steps for each option.  Before you recover via recovery CDs, you need to write the preinstalled recovery data on the computer onto blank CD-R disks. (Refer to the related section later in this chapter.) You are allowed to create only one copy of the recovery data.  Preparation for Reinstallation The following items are necessary for reinstallation.  Via Hard Disk • Operation Manual Via Recovery CD When you recover first time: • Operation Manual • Four blank 650MB or 700MB CD-R disks for creating recovery CDs When you recover after preparing the recovery CDs:  • Operation Manual • The created recovery CDs
  Appendixes     A-16 Appendixes Backing Up Data Before you format the hard disk, back up your data. For details on how to back up your data, refer to Data Backup and Restore section on page A-12.  Selecting Way to Recover Your System The computer has partitioned the hard disk into two drives (C: and D:) when it was shipped from the factory. You can select one of the following options to recover your system.  • Recovers C: drive only. (Recommended) This process will format the C drive only and recover the C drive to the same status as shipped from the factory. Nothing will be performed to the D drive. The volume of the drives will not be changed and will keep the current one. • Recovers both C: and D: drive.  This process will format both the C and D drives, and contents of the hard disk will be restored to its original state in the C and D drives. The volume of the drives will be back to the same as you used for the first time. This process will delete any new data stored in the hard disk. • Formats hard disk and creates new partition. This process will format the whole hard disk drive and create new drive partitions. You can select the specified volume of the C and D drives. The contents of the hard disk will be restored to its original state. This process will delete any new data stored in the hard disk.   While you are recovering with the created recovery CDs, “Recover both C: and D: drive” and “Formats hard disk and creates new partition” will eliminate the reinstallation data stored in the hard disk. If it is eliminated, you cannot recover your system via hard disk.
Appendixes   Operation Manual   A-17 Formatting Drives and Re-installing Windows    The formatting and re-installing process will restore the hard disk drive to its factory configuration. To ensure the computer’s safety, enable the virus protection/cleaner software and update the virus definition file to the latest one. Also, the Windows Update should be run for virus prevention. (Refer to the Virus Protection section on page A-7.)  Via Hard Disk  With this way, recovery will come from data already installed on the computer rather than from external media such as CDs.    Note that if there is any possibility of the data being lost or corrupted, you may not format the hard disk drive(s) and reinstall Windows.  1. Make sure the computer is turned off. 2. If any peripheral devices are connected to the computer, disconnect them.  3. Connect the AC adapter.    Be sure to connect the AC adapter. If the battery power becomes significantly low, the reinstallation process will be canceled.  4. Turn on the computer. When the message Press F2 for System Utilities appears on the bottom left of the screen, press F2. Then, the Setup Utility will open. 5. In the Exit menu, select Load Setup Defaults; then, press Enter twice. 6. In the Exit menu, confirm Exit Saving Changes is highlighted and press Enter twice.  7. The system will restart. When the message Press F10 to Recover appears on the upper left of the screen, press F10.   The message stays there for two seconds.  8. Read the message on the screen, and select the way to recover your system; then, press Enter. If you selected Formats hard disk and creates new partition, go to the next step. Otherwise, go to the step 10.
  Appendixes     A-18 Appendixes 9. Select the volume of C drive and press Enter. 10. Read the message and select Continue; then, press Enter. The formatting and re-installation will start.   Although the pointer may be shown on the screen, never touch the keyboard or the mouse during recovery except when the message prompts you to. If you touch them, the reinstallation process may be canceled.  11. When the hard disk has been recovered successfully, the system will restart automatically. 12. Set up Windows XP by following the on-screen instructions. After you complete the Windows setup, be sure to set date and time.  Via Recovery CD Recovery CDs do not come with the computer. First, you need to copy the recovery data onto CD-R disks and then, recover the system with them.    • You will only have the ability to create one set of recovery CDs.  • Even if you cancel the CD burning process, you can create the recovery CDs by starting at the first step.  • You can recover your system via hard disk even after succeeding in creating the recovery CDs.
Appendixes   Operation Manual   A-19 Creating Recovery CD To create the recovery CDs, you will use the Bootable CD Creator software. Read the following End User License Agreement first.  Enterprise Corporation International Software License Agreement This End-User License Agreement (“the Agreement”) is a legal agreement between you, the “end user,” and Enterprise Corporation International (“ECI”) for the ECI product, which includes a computer program (Bootable CD Creator), data, and manuals (“SOFTWARE PRODUCT”).  Ownership of the SOFTWARE PRODUCT shall at all times remain with ECI.  The SOFTWARE PRODUCT and accompanying documentation are licensed to you, which means you have the non-transferable and non-proprietary right to use the SOFTWARE PRODUCT in accordance with this Agreement. The SOFTWARE PRODUCT and any accompanying documentation are proprietary products of ECI or its licensors and are protected by United States copyright laws and international copyright treaties.  Use of the enclosed software indicates your acceptance of these terms. Intended Purpose: The SOFTWARE PRODUCT is installed on and shipped with a computer manufactured by Sharp. You may use the SOFTWARE PRODUCT only for making a Bootable CD from the recovery image file that is pre-installed on the hard disk.  You may use the SOFTWARE PRODUCT only on the computer with which this SOFTWARE PRODUCT is provided. You may not: 1. Copy the SOFTWARE PRODUCT, in whole or in part, to another media except for installation. 2. Share the license for the SOFTWARE PRODUCT or use it concurrently on different computers. 3. Alter, transfer or sell (including e-sales through the Internet) the SOFTWARE PRODUCT and/or its copy to a third party, in whole or in part. 4. Delete or change the notice of copyright contained in the SOFTWARE PRODUCT. 5. Reverse engineer, disassemble, or decompile the SOFTWARE PRODUCT. 6. Create source code for the SOFTWARE PRODUCT from the object code. 7. Use any portion of the SOFTWARE PRODUCT within any other program. 8. Install or run the SOFTWARE PRODUCT over the Internet for use by multiple users. Term: This Agreement is effective from your date of purchase or the date you opened the package and shall remain in force until terminated.  Upon termination of this Agreement, you must destroy all copies of the SOFTWARE PRODUCT and all accompanying documents.  ECI may terminate this Agreement if you fail to comply with its terms and conditions. Limited Warranty:  ECI warrants that the SOFTWARE PRODUCT will perform substantially in accordance with the accompanying documentation.  The warranties set out in this agreement are in lieu of and exclude all other warranties not expressly set forth herein, whether express or implied, including but not
  Appendixes     A-20 Appendixes limited to any warranties of merchantability, fitness for a particular purpose, or warranties arising from usage of trade or course of dealing. Limitation of Liability:  In no event shall ECI or Sharp be liable for any special, incidental, indirect, or consequential damages, or for damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss, even if ECI or Sharp has been advised of the possibility of such damages.   Before creating the recovery CDs, follow the instructions below: • Prepare four blank 650MB or 700MB CD-R disks. • Connect the AC adapter. If the battery is discharged, the operation will stop and fail. • Set the APM button mode to Max Power and set the CPU performance level to 100%. (See the Using the Advanced Power Management Button section on page 2-9.) • Disable system standby and system hibernate. (See Power Saving section on page 2-7.) • Close all of the unnecessary or the automatic start-up applications. • Disable the screen saver. (See the Wallpaper and Screen Saver section on page 1-20.)  Disabling Auto Protect of Norton AntiVirus Before creating the recovery CDs, disable the Auto Protect function of the Norton AntiVirus.  1. Right-click the Norton Antivirus icon (     ) on the taskbar. 2. Click Norton AntiVirus Options. 3. Clear the boxes of Enable Auto-Protect and Start Auto-Protect when Windows starts up in the How to stay protected field. 4. Click OK. 5. Select the duration for the Auto Protect to be disabled.   It is recommended that you select Until system restart when you create the recovery CDs.  6. Click OK. 7. If a message appears, read it and click OK.
Appendixes   Operation Manual   A-21  The icon (      ) will change to (      ).  Creating Recovery CDs 1. Connect the AC adapter to the computer.   Be sure to connect the AC adapter. If the battery is completely discharged, the burning CD process will be stopped.  2. Insert a blank CD-R into the optical drive.    If a dialog box or window appears, close it.  3. Click start – All Programs – Create Product Recovery CD. 4. In the Bootable CD Creator SE1.1 window, select the appropriate speed from the Speed pull-down menu, then, click the Create Recovery Disc button. 5. Read the message on the screen and then, click Yes, then, OK. The burning process will start.   Never touch the keyboard, mouse or touchpad during the burning process except when the message prompts you to do so. If you touch them, the burning process may be stopped.  6. Replace the CD-R by following the instructions on the screen. Label each CD-R in the order of burning so that you will set them in correct order when recovering.   If a window or dialog box opens, close it.  7. When you see the message Disc creation complete on the screen, click OK, then, Close.  8. Click Yes and remove the CD-R from the optical drive.
  Appendixes     A-22 Appendixes  • Store the burned disks in a secure place. • Keep your disks away from direct sunlight, heat and excessive moisture.  9. Close the optical drive. 10. Restart the computer.  Enabling Auto Protect of Norton AntiVirus If the Norton Antivirus icon on the taskbar is disabled, appearing as (     ), follow these steps. If it is (     ), skip the steps.  1. Right-click the Norton Antivirus icon (     ) on the taskbar. 2. Click Norton AntiVirus Options. 3. Check the boxes of Enable Auto-Protect and Start Auto-Protect when Windows starts up in the How to stay protected field. 4. Click OK. 5. If a message appears, read it and click OK.   The icon (      ) will change to (      ).  Recovering with Recovery CDs   When you format the entire hard disk drive (both C and D drives), the reinstallation data stored in it will be eliminated. Therefore you will not be able to recover your system via hard disk.  1. Make sure the computer is turned off. 2. If any peripheral devices are connected to the computer, disconnect them. 3. Connect the AC adapters to the computer and then, turn it on.   Be sure to connect the AC adapter. If the battery is completely discharged, the installation process will be canceled.  4. When the message Press F2 for System Utilities appears, press F2. The Setup Utility will open.
Appendixes   Operation Manual   A-23 5. Insert the Recovery CD disk 1 into the optical drive.  6. In the Exit menu, select Load Setup Defaults; then, press Enter twice. 7. In the Boot menu, confirm the Boot Sequence is highlighted and then, press Enter. 8. In the Boot Sequence, select the Optical Disk Drive and press the space bar to place the Optical Disk Drive in the top of the list; then, press Esc. 9. In the Exit menu, confirm Exit Saving Changes is highlighted and press Enter twice.  10. Read the message on the screen, and select the way to recover your system; then, press Enter. If you select Formats hard disk and creates new partition, go to the next step. Otherwise, go to the step 12.   When you select Recovers both C: and D: drive or Formats hard disk and creates new partition, the recovery process will delete the reinstallation data stored in the hard disk. Therefore you will not be able to recover your system from the hard disk.  11. Select the volume of C drive and press Enter. 12. Read the message and select Continue; then, press Enter. Follow the on-screen instructions for replacing the recovery CD.   Although the pointer may be shown on the screen, never touch the keyboard, the mouse or the screen during recovery except when the message prompts you to. If you touch them, the reinstallation process may be canceled.   13. After the recovery process is complete, the system will restart automatically. When the message Press F2 for System Utilities appears, press F2. The Setup Utility will open. 14. In the Exit menu, select Load Setup Defaults; then, press Enter twice. 15. In the Exit menu, confirm Exit Saving Changes is highlighted and press Enter twice. The system will restart. 16. Set up Windows, following the instructions on the screen.  17. Remove the recovery CD from the optical drive. 18. Make sure to set date and time.
  Appendixes     A-24 Appendixes
Troubleshooting   Operation Manual  T-1    Troubleshooting  This chapter describes how to troubleshoot computer problems.  Common Problems Problems with your computer can be caused by something as minor as an unplugged power cord or as major as a damaged hard disk drive. The information in this troubleshooting section is designed to help you find and solve minor problems. If you still have a problem after trying all the suggested remedies in this chapter, contact your dealer or, for users in U.S, call: 1-800-BE-SHARP (237-4277).  The problems that you might encounter can be divided into two basic categories: hardware and software. Hardware problems can be further divided into being of an electrical or a mechanical nature. You will know you have a hardware problem if, for example, the screen is blank, or your computer cannot recognize the disk drives.  Software problems can occur at several levels. Both your operating system and your software application programs are capable of generating errors and error messages.  If you encounter a software error, try to determine if the error message is from your operating system or from an application program, and refer to the appropriate manual for possible remedies.  You can also refer to the Windows help program to solve the problem. To access the program, click start – Help and Support. It also gives you troubleshooting tips and an index.  Successful troubleshooting is the result of careful observation, deductive reasoning, and an organized approach to solving the problem. If you encounter a problem, begin by performing a careful visual inspection. Check the exterior of your computer first. If no lights are displayed, check the battery charge or power outlet, the plug and power cord, and any power switches that may affect your computer. If your computer has been connected to any peripheral devices, look for loose or disconnected cables. You may also need to check the fuses and breakers in your electric box. A few common problems and suggested solutions are presented in the examples that follow.
  Troubleshooting  T-2  TroubleshootingTrouble when Starting  Why doesn't the power indicator or the battery indicator turn on? • Make sure the AC adapter is correctly connected to the AC adapter jack of your computer. • Make sure the AC power cable is correctly connected to a live wall outlet. To find it is live or not, connect another electric equipment to the wall outlet. • Make sure the battery pack is correctly installed and charged. • If the battery pack is discharged, connect the AC adapter. • If all the steps above failed, follow the instructions on Why doesn't the keyboard or the touchpad respond to your operation? on page T-3.  Why do I get the message Invalid system disk? • You may have inserted a non-bootable disk (either a defective disk or one without an installed operating system) in the optional external floppy disk drive unit. Eject the disk.  Why can’t I boot from the floppy disk? • Make sure that the optional external floppy disk drive unit is correctly connected to your computer. • Check whether the floppy disk set to the optional external floppy disk drive unit contains a system disk.   • Check whether USB Boot in the Boot menu of the Setup Utility is enabled. (Refer to the Boot Menu section on page 5-7.) • Check whether Floppy Disk Drive is at the top in the Boot Sequence in the Boot menu of the Setup Utility. (Refer to the Boot Menu section on page 5-7.)  Why do I get the message Operating System not found? • The message may appear when the installation has failed. Recover the C and D drives using the created recovery CDs.
Troubleshooting   Operation Manual  T-3 Why do I get the message Press <F1> to resume, <F2> to setup? • The setting of the Setup Utility is deleted. Follow these steps: 1. Press F2 key while the message Press F1 to resume, <F2> to setup is appearing.  2. In the Exit menu, select Load Setup Defaults and press the Enter key to retrieve the default values. 3. Confirm Yes is highlighted and then, press the Enter key. 4. Set the desired values in the Setup Utility or just leave the default values. 5. In the Exit menu, select Exit Saving Changes and then, press the Enter key. 6. Confirm Yes is highlighted and then, press the Enter key. 7. On Windows, click start – Control Panel. 8. Click Date, Time, Language, and Regional Options. 9. Click Change the date and time. 10. In the Date and Time Properties dialog box, set the current date and time; then, click OK. 11. Close the dialog box. 12. Make an appropriate setting on the Setup Utility, if necessary. If you want to keep the default settings, no setting performance is needed. • If the operation above fails to work, contact your dealer or call: 1-800-BE-SHARP (237-4277) for users in U.S.  Trouble with the Keyboard or Touchpad  Why doesn't the keyboard or the touchpad respond to your operation? • Try the following in this order: 1. Press Ctrl+Alt+Delete and select the Applications tab of the Windows Task Manager dialog box. Click the program name that hangs up, then, the End Task.  If this does not solve the problem, select the Users tab, click the Disconnect or Logoff of the Windows Task Manager dialog box, and then Yes. 2. If the step 1 fails to work, confirm the hard disk indicator is turned off and press the power button for more than four seconds to turn off the system. Ten seconds later, turn your computer on. 3. If pressing the power button fails to turn off your computer, confirm the hard disk indicator is turned off and remove the AC adapter, then, the battery pack. Ten seconds later, reinstall the battery pack, connect the AC adapter and then, turn on your computer.
  Troubleshooting  T-4  TroubleshootingWhy doesn't the touchpad function? • The surface of the touchpad or your palm may be moist or dirty and grease. Wipe the touchpad with a soft, dry cloth. • The touchpad may be disabled because of the connected USB mouse. Remove the mouse or enable the touchpad by following these instructions. 1. Click start – Control Panel. 2. Click Printers and Other Hardware - Mouse. 3. In the Mouse Properties dialog box, click the Device Settings tab. 4. Clear the box of Disable internal pointing device when external USB pointing device is attached.  5. Click OK to close the dialog box. 6. Close the Printers and Other Hardware dialog box.  Trouble with the Display  See also the Adjusting the Display section on page 1-19 and the External Monitors section on page 3-8.   Why is the screen blank? • Confirm the computer is turned on by checking the power indicator. When it lights green, the computer is on. • Press any key to find any power management feature has turned off the screen to save power. • If you are using a battery pack, make sure it is correctly installed and has a charge remaining.  • Make sure the LCD screen is selected as the display by pressing Fn+F5 (    ). • Check whether the display is on by pressing Fn+F11 (    ). • If you still have the problem after trying the above, follow the steps in Why doesn't the keyboard or the touchpad respond to your operation? on page T-3.
Troubleshooting   Operation Manual  T-5 Why does the external monitor display nothing or distorted images? • Confirm the monitor is turned on. • Confirm the monitor is connected correctly. • Make sure the external monitor is selected as the output display by pressing  Fn+F5 (    ). • If you use Fn+F5 (    ) to change the display, the image may be distorted. Press Fn+F5 (    ) again to return the previously selected display and then, use the Display Properties dialog box to change it again. • Make sure the value of the Screen resolution field in the Settings tab of the Display Properties is same as or lower than the resolution of the external monitor.  • Make sure the external monitor is not near any electric devices having strong magnetic fields such as a TV set or radio. • Do not share an outlet with a TV set or radio.   Why can’t I change the display with the Fn+F5 keys? • While you are playing a game or running animation, the Fn+F5 (    ) key combination may not work. Close the currently running application(s). • Use the Display Properties icon (     ) to change it. • Use the Display Properties dialog box to change it. • While the display is in the Extended Desktop mode, Fn+F5 (    ) key combination may not work.  Why does the screen brightness increase or decrease not when intended? • If you press the APM button, the selected screen brightness value of the APM button is applied.  Trouble with Floppy Disks  Why can't I use a floppy disk? • Confirm the optional external floppy disk drive unit is correctly connected.  • Confirm the floppy disk is inserted correctly.  • Confirm the drive or file name is correct.
  Troubleshooting  T-6  Troubleshooting• The floppy disk may not be formatted or could be corrupted. Format the disk or use another disk. • If you cannot write to a floppy disk, the disk may be write-protected. Eject the disk and ensure that the write-protect tab covers the detection hole. • If you cannot write to a floppy disk, the disk may be full. Use another disk. • 720KB (2DD) disks are not available to boot the computer. • 720KB (2DD) disks cannot be formatted in your computer. • The DISKCOPY command on 720KB (2DD) disks is not available. • 720KB (2DD) disks are not appropriate to save data. • 720KB (2DD) disks may not be available for data transfer with other computers using 1.44MB (2HD) disks.  Trouble with the Optical Drive  Why does not the drive open? • Confirm your computer is turned on.  • When your computer is turned off, insert a fine rod into the drive tray ejection hole. (Try this only if the eject button does not work.)    Why can’t I read/write the data from/onto a disk or play files? • Confirm the disk is inserted correctly. • Confirm the drive and file names are correct. • Confirm the disk is not stained or scratched. • Confirm the disk or files are supported by the optical drive.  Ejection Hole
Troubleshooting   Operation Manual  T-7 Why can’t I write/delete the data onto/from a disk? • Confirm the disk is available in writing or deleting data. • If you wish to use the Windows CD writing software, you may need to enable it. (Refer to Windows Help and Support.)  Why doesn’t the DVD video play smoothly? • Ensure that the AC adapter is attached to the computer and a power source. • Disable system standby and system hibernate. • Set the APM button to the max power mode and then, select 100% for the CPU performance. (See the Using the Advanced Power Management Button section on page 2-9.) • When playing a DVD video, you may experience a picture with irregular motion or frame dropouts, depending on videos. Enabling the Hardware Decode Acceleration function of InterVideo WinDVD may solve this problem. Follow these instructions to enable the function. 1. Quit the playback if it is running. 2. Right-click somewhere in the InterVideo WinDVD5 window and select Setup… from the pop-up menu. The Setup dialog box will open. 3. Check the box of Use Hardware Decode Acceleration in the Video Hardware Configuration field. 4. Click OK. When the Hardware Decode Acceleration function is enabled, the LCD Optimization function is disabled. (Refer to Help of WinDVD for LCD Optimization.)  Why isn’t the optical drive recognized?/Why can’t I find the optical drive in My Computer window? • If your computer is turned on with a DVD disk inserted in the drive, the drive may not be recognized. In this case, turn off your computer and open the disk tray by inserting a fine rod into the ejection hole. (Refer to the Why does not the drive open? section on page T-6.) Remove the disk from the drive, close the optical drive, and then, turn on your computer again. • If you click the Safely Remove Hardware icon (     ) on the taskbar and MATSHITA xxxxx (xxxxx is your optical drive name), the optical drive powers off. The optical drive icon does not appear in the My Computer window while the drive is off.
  Troubleshooting  T-8  Troubleshooting• If you press the APM button and select the mode where the Optical drive is OFF, the optical drive powers off. To power it on, press the optical drive eject button or Fn+F2 keys.  Trouble with the Hard Disk  Why can't I read or write data to/from the hard disk? • Confirm the drive and file names are correct. • Confirm the hard disk has sufficient free space.  Trouble with Communications  Why can't I communicate through the built-in modem? • Confirm the telephone line is properly connected to the modem jack. • Confirm the dial setting (pulse or tone) of Windows XP and/or communication software is matched with the telephone line. • If you set your connection status using the New Connection Wizard, check the Use dialing rules in the Properties dialog box of that connection status. (Refer to the Internet Connection section on page 4-21.)  • Confirm the country/region setting is appropriate. • Confirm the network configuration is appropriate. • Confirm the user name or password is correct. • Confirm the COM port in the communication software is set appropriately. • Disable system standby and system hibernate. • If an unusual device is attached to the line you are connecting to, the modem may not function properly. Remove the device or contact the dealer of the device. • If your computer is connected to a PBX, consult the PBX maintenance staff or its service company. If the electric characteristics of your PBX are different from those of a regular analog line, the modem will not function properly. If you connect the modem to a digital PBX, both the modem and the PBX may be damaged.  Why is the access speed so slow? • Set the APM button to the max power mode and then, select 100% for the CPU performance. (See the Using the Advanced Power Management Button section on page 2-9.)
Troubleshooting   Operation Manual  T-9 • Close the applications currently opened. • Try to connect another ISP (Internet Service Provider), or try to connect in some other time.   Why can't I access the LAN? • Confirm the cable is properly connected to the LAN jack and the network hub. • Confirm the network configuration is appropriate. (Refer to the Configuring the LAN section on page 4-3.) • Confirm the user name or the password is correct. • Reconfigure the network settings by following the Network Setup Wizard.   Why can't I detect the wireless access point on my computer?  • Confirm your computer is enabled for the wireless LAN communication. • Confirm the access point is powered on. • Confirm the antenna indicator is lit. • Restart your computer.  Why can't I connect to the network via an access point?  • Confirm the wireless LAN antenna is enabled. When the antenna indicator lights green, the antenna is enabled. If not, press the Fn+F1 (     ) keys. • Confirm Any available network (access point preferred) is selected in the Networks to access field of the Advanced dialog box. (To open Advanced dialog box, refer to the Communicating with Other Computers section on page 4-15.) • Confirm the Network name of your computer matches that of the access point you want to communicate with. • Confirm the security settings of your computer equals to those of the access point if the encryption security of the access point is enabled. • Reenter the Network key. • When using the WEP key, confirm the key index is correctly selected.  • When you have more than one access points, your computer may be connected to other than right one you want to access. Follow the steps below.  1. Right-click the Wireless Network Connection icon (      ) on the taskbar; then, click View Available Wireless Networks.
  Troubleshooting  T-10  Troubleshooting2. Select the desired network in the Available wireless networks list; then, connect to the network. (Refer to the Confirming the Status of Wireless Connection section on page 4-14.) • Repair the connection with the following steps. 1. Right-click the Wireless Network Connection icon. 2. Click Repair. • If there are more than one available access points nearby, they interact in the connection. In this case, the connection speed will become low or the connection will stop.  • You may have accidentally enabled IEEE802.1x authentication. Disable it with the following steps. 1. Click start – Control Panel. 2. Click Network and Internet Connections – Network Connections. If Classic view is selected, double-click Network Connections. 3.  Right-click Wireless Network Connection and click Properties. 4. Click Wireless Networks tab, select the network in Preferred networks field and click Properties button. 5. Select Authentication tab, then, clear the box of Enable IEEE802.1x authentication for this network. 6. Click OK twice and close the window.  Why can't I communicate with other computers through the wireless LAN? • Confirm the antenna is enabled with pressing the Fn+F1 (     ) key combination. When the antenna indicator is on, the antenna is enabled. (Refer to the Activating the Wireless LAN Antenna section on page 4-11.)  • Confirm each computer is enabled for wireless LAN. • Confirm Computer-to-computer (ad hoc) networks only is selected in Networks to Access of Advanced dialog box. (To open the Advanced dialog box, refer to the Communicating with Other Computers section on page 4-15.) Also confirm the other computers are in ad-hoc mode. • Adjust the distance between your computers by bringing your computer closer to others and remove any obstructions that may impede the communication; then, try to connect again. • Confirm the IP address and the subnet mask of each computer are set correctly.
Troubleshooting   Operation Manual  T-11 • Confirm the WEP keys are correctly set to your computer if the WEP security of the communicated computers is enabled.  How can I detect the MAC address? • Follow the instructions below: 1. Click start – All Programs – Accessories – Command Prompt. 2. Type ipconfig/all; then, press Enter. The information about IP appears. 3. See the address of the Physical Address in the Ethernet adapter Local Area Connection section. 4. Type exit; then, press Enter.  Trouble with Peripherals  Why don't peripheral devices function? • Confirm they are correctly connected to your computer. • Confirm they are Windows XP compliant. • Confirm drivers necessary for the devices are installed.  Why can't I print? • Make sure the printer is turned on. • Check whether your computer and the printer are connected correctly. • Check whether the printer is ready to print. • Check whether the printer has enough paper. • Check whether the printer driver is installed. • Click start - Control Panel - Printers and Other Hardware – Printers and Faxes. If the Classic view is selected, double-click the Printers and Faxes icon. Confirm your printer is installed. If not, click Add a printer of Printer Tasks to install it. • See also the Windows help program by clicking start - Help and Support.  Why don't peripheral devices function correctly? • Confirm they are Windows XP compliant. • Confirm drivers necessary for the devices are installed.
  Troubleshooting  T-12  Troubleshooting• Disable System standby and System hibernates. If this does not work, set Turn off hard disks to Never.  Trouble with Security Settings Why do I have the message “Your computer might be at risk” each time I boot my computer? • Make sure the three functions (Firewall, Automatic Updates, and Virus Protection) in the Security Center are ON. • If you have the message “Automatic Updates is turned off” addition to the above message, turn on the Automatic Updates to enable your computer periodically to update Windows.  Other Troubles  Why does my computer not power on? • Disconnect the AC adapter from the computer, remove the battery pack, correctly reinstall the battery pack and connect the AC adapter, then turn on the computer again.  Why do I get the message Pop-up blocked in the information bar? • The Microsoft Internet Explorer prevents most pop-ups from appearing by using the popup blocker function.  • If you wish to have the pop-ups on the current web site; 1. Start up the Microsoft Internet Explorer. 2. Click on the information bar. 3. Select “Temporarily Allow Pop-ups” or “Always Allow Pop-ups from This Site…”. •  If you wish to have pop-up ads on the specified web site; 1. Start up the Microsoft Internet Explorer. 2. Open the Tools menu and select the Pop-up Blocker – Pop-up Blocker Settings…. 3. Enter the URL to be permitted in the Address of Web site to allow field and then, click Add.
Troubleshooting   Operation Manual  T-13 Why do I get the message This site might require the following ActiveX control in the information bar? • The Microsoft Internet Explorer prevents active contents from appearing. The following steps allow them to appear. Before performing the steps, ensure the safety of the contents. 1. Click the information bar. 2. Select Install ActiveX Control… from the pop-up menu. 3. Click Install.  Why isn’t the web site displayed properly? • Disable the popup blocker. (Refer to the Why do I get the message Pop-up blocked in the information bar? Section on page T-12.) • Install the appropriate ActiveX control application(s).  Why isn’t the e-mail displayed properly? • The Microsoft Outlook Express may prevent images in HTML e-mails from appearing. To display the image, follow theses steps. (Note that if you click the message, the sender of the e-mail may receive the fact that you open the message. Ensure the safety of the mail before operating these steps.) 1. Start up the Microsoft Outlook Express. 2. Select the e-mail containing the image to be displayed. 3. Click the message displayed in the bar.  Why does the battery pack discharge so quickly? • Initialize the battery pack.  Why is the date and/or time incorrect? • Correct the date and time in Windows. Double-click the time appearing on the taskbar and set them in Date and Time Properties dialog box.  Why can't I use a hardware device? • Make sure the hardware device is not crossed out with an X mark using the following procedure.  1. Click start – Control Panel. Click Performance and Maintenance; then, System. If the Classic view is selected, double-click the System icon.
  Troubleshooting  T-14  Troubleshooting2. Click the Hardware tab; then, Device Manager. 3. Double-click the device you cannot use and confirm Use this device (enable) appears in the Device usage field.  Why can't I produce sound? • Click or double-click the speaker symbol on the taskbar and check the Windows volume.  • If you press the APM button and select the mode where the Audio is Mute, the sound turns off.  Why can't I turn off my computer? • Follow the instructions on Why doesn't the keyboard or the glide pad function?  Why is the background white? • If you press the APM button and select the mode where the Wallpaper is white, the screen background change to white.  Why is my computer so hot? • When charging the battery pack, its surrounding area or the front of the keyboard may become hot, but this is not a problem.  Why can’t I record the sound from the microphone? • Follow the instructions below: 1. Double-click the speaker symbol on the taskbar. 2. Click Options and select Properties. 3. From the Mixer device pull down menu, select Realtek HD Audio input and then, click OK. 4. Confirm Select is checked in MicVolume of Recording Control dialog box. 5. Close the Recording Control dialog box.
Troubleshooting   Operation Manual  T-15 Why can’t I find the system drivers and software applications? • You may accidentally remove them. Refer to the following to retrieve them. • The drivers are stored on the last recovery disk if you have created the recovery CDs. • The applications are stored on the last recovery disk if you have created the recovery CDs. Without the recovery CDs, you need to reinstall the operating system from the hard disk. If you are not sure how to install them, consult local service staff.
  Troubleshooting  T-16  Troubleshooting
  Operation Manual  Index-1 Index Index   A AC adapter connecting, 1-1 using, 1-5 Account creating, 1-21 switching, 1-21  APM button about, 2-8 using, 2-9 Audio controlling output volume, 1-18 B Backing up data, A-12 Battery pack changing, 2-5 charging, 2-2 checking level, 2-2 conditioning, 2-4 indicator, 1-4, 2-2,3 low battery indication, 2-3 C Cleaning computer, A-5 CD handling, 1-10 inserting, 1-10 supported disk, 1-9 removing, 1-12 troubleshooting, T-6 CD-R/RW, 1-12 Computer name, 4-5   D Data execution prevention changing settings, A-10 checking programs, A-10 disabling, A-11 Display changing brightness, 1-19 changing resolution, 1-19 changing number of colors, 1-19 switching the display, 1-8, 3-9 troubleshooting, T-4 turning off, 1-8 DVD handling, 1-10 inserting, 1-10 supported disk, 1-9 removing, 1-12 troubleshooting, T-6 DVD video parental control, 1-15 playing, 1-13 region code, 1-14 E External monitor changing the primary monitor, 3-10 connecting, 3-8 disconnecting, 3-11 extending an image, 3-10 switching the display, 1-8, 3-9
   Index                                                                   Index-2 IndexF File sharing copying, 4-7 sharing, 4-6 Floppy disk ejecting, 3-6 handling, 3-5 inserting, 3-5 troubleshooting, T-5 Floppy disk drive (external) connecting, 3-4 removing, 3-6 H Hard disk drive troubleshooting, T-8 I Indicators battery, 1-4, 2-2,3 optical drive, 1-10 power, 1-3,4 status, xxii wireless LAN antenna, 4-11 K Keyboard application key, 1-8 function keys, 1-8 special keys, 1-8 troubleshooting, T-3 windows key, 1-8 L LAN configuring the network settings, 4-3 configuring the LAN, 4-3 connecting to the LAN, 4-2 removing the cable, 4-2 troubleshooting, T-9  M Memory module finding the memory size, A-4 installing, A-1 removing, A-4 Modem configuring, 4-20 connecting to telephone line, 4-19 removing the cable, 4-21 troubleshooting, T-8 N Network Setup Utility auto-switching, 4-24 loading, 4-23 running, 4-23 switching, 4-24 O Optical Drive powering off, 2-15 troubleshooting, T-6 using, 1-9 P Passwords changing, 1-23, 5-6  deleting, 1-23, 5-6 setting, 1-22, 5-5 PC cards ejecting, 3-15 inserting, 3-14 Peripherals  audio equipment, 3-12 connecting guidelines, 3-1 external floppy disk drive, 3-4 external monitors, 3-8 headphones, 3-12 microphones, 3-13 PC cards, 3-14 printers, 3-7 speakers, 3-11 troubleshooting, T-11 USB devices, 3-3
  Operation Manual  Index-3 IndexPower choosing AC or battery, 1-4 indicator, 1-3,4 Power saving APM button, 2-9 system hibernate, 2-8 system standby, 2-8 Printers, 3-7 R Re-installation about, A-13 CD recovery, A-18, 22 creating recovery CDs, A-21 hard disk recovery, A-17 preparing, A-15 selecting way, A-16 Restoring data and settings, A-12 S Screen Saver, 1-20 SD card ejecting, 1-17 inserting, 1-16 Setup utility advanced menu, 5-4 battery menu, 5-7 boot menu, 5-7 changing setting, 5-2 entering and exiting, 5-2 exit menu, 5-7 main menu, 5-3 running, 5-1 security menu, 5-4 Security cable, A-5 Security notice for the computer, xiv Security notice for the wireless LAN, xv Status indicators, xxii System standby about, 2-8 entering, 2-14 resuming from, 2-8 System hibernate  about, 2-8 entering, 2-14 resuming from, 2-8 T Touchpad changing the configuration, 1-7 clicking and double-clicking, 1-7 drag and drop, 1-7 scroll, 1-7 troubleshooting, T-3 using, 1-6 Troubleshooting applications/drivers, T-15 CD/DVD, T-6 common problems, T-1 communications, T-8 display, T-4 floppy disk drive, T-5 hard disk drive, T-8 Internet Explorer, T-12 keyboard or touchpad, T-3 LAN, T-9 modem, T-8 peripherals, T-11 security settings, T-12 U USB devices, 3-3 V Virus protection about, A-7 enabling, A-8 running LiveUpdate, A-9 scanning, A-9 update service, A-9 W Wallpaper, 1-20 Windows updating, xiv, A-7 firewall, xiv Security Center, xiv Wireless LAN,  activating the antenna, 4-11 communicating between computers, 4-15 configuring, 4-12
   Index                                                                   Index-4 Indexconfirming the status, 4-14 connecting to a network, 4-13 security measures, 4-8 security modes, 4-17 security notice, xv troubleshooting, T-9 wireless LAN modes, 4-8  Workgroup name, 4-5

Navigation menu