EasyManuals Logo

Acer ConceptD 3 User Manual

Acer ConceptD 3
87 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #85 background imageLoading...
Page #85 background image
Internet and online security - 85
Botnets
A botnet is a string of infected, connected computers coordinated
together to perform a task. Botnets gain access to your machine
through some piece of malicious coding. Once the software is
downloaded, the botnet will now contact its master computer and let it
know that everything is ready to go. Now your computer, phone,
tablet, or IoT device is entirely under the control of the person who
created the botnet. Most people who are infected with botnets aren't
even aware that their computer's security has become compromised!
What to do if you're infected: If you're infected you probably don't
realize it as bots are notoriously quiet. Your Internet Service Provider
might send you a notification alerting you that they found a threat on
your network and that you need to remove the bot. If you have a bot,
use internet security software like Norton Security to scan all of your
devices.
Viruses/Malware
"Virus" is the commonplace word for all malicious software programs
for years now; however, a virus is just one type of malicious threat. A
virus is classified as a self-replicating piece of malicious code that
travels by inserting itself into files or programs.
What to do if you're infected: Take steps to avoid infection by
staying protected with internet security software like Norton Security.
If you subscribed to Norton Security and think you may have a virus,
contact Norton's on-call technicians to help eliminate the virus.
Take special precautions when using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local coffee
shop to the hotels and airports you visit while traveling. While public
Wi-Fi has made our lives a little easier, it also poses security risks to
the personal information available on our laptops and smartphones. A
virtual private network (VPN) gives you online privacy and anonymity
by creating a private network from a public internet connection. VPNs
mask your internet protocol (IP) address so your online actions are
virtually untraceable as well as secure. One of the biggest security
risks on public Wi-Fi are man-in-the-middle attacks (MITM). These
attacks are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can get in-

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Acer ConceptD 3 and is the answer not in the manual?

Acer ConceptD 3 Specifications

General IconGeneral
Form factorClamshell
Product typeLaptop
Product colorWhite
LED backlightYes
Display diagonal15.6 \
Native aspect ratio16:9
Processor cache12 MB
Processor cores6
Processor modeli7-10750H
Processor familyIntel® Core™ i7
Processor frequency2.6 GHz
Processor cache typeSmart Cache
Configurable TDP-down35 W
Processor manufacturerIntel
Processor boost frequency5 GHz
Internal memory16 GB
Internal memory typeDDR4-SDRAM
Maximum internal memory- GB
SSD capacityThe Solid State Drive's storage capacity in Gigabytes.
SSD interfacePCI Express
Storage mediaSSD
Total storage capacity1000 GB
Number of SSDs installed1
Discrete GPU manufacturerNVIDIA
Discrete graphics card modelNVIDIA® GeForce® GTX 1650 Max-Q
On-board graphics card modelIntel® UHD Graphics
Discrete graphics card memory4 GB
Discrete graphics memory typeGDDR6
Number of microphones2
Front camera HD typeHD
Front camera resolution1280 x 720 pixels
Antenna type2x2
Wi-Fi standards802.11a, 802.11b, 802.11g, Wi-Fi 4 (802.11n), Wi-Fi 5 (802.11ac), Wi-Fi 6 (802.11ax)
Top Wi-Fi standardWi-Fi 6 (802.11ax)
WLAN controller modelIntel Wi-Fi 6 AX201
Ethernet LAN data rates10, 100, 1000 Mbit/s
Charging port typeDC-in jack
USB 2.0 ports quantityUSB 2.0 ports have a data transmission speed of 480 Mbps, and are backwards compatible with USB 1.1 ports. You can connect all kinds of peripheral devices to them.
USB 3.2 Gen 1 (3.1 Gen 1) Type-C ports quantity0
Keyboard layoutQWERTY
Pointing deviceTouchpad
Keyboard languageUS English
Operating system architecture64-bit
Battery capacity56 Wh
Battery life (max)14 h
AC adapter power135 W
Cable lock slot typeKensington
Weight and Dimensions IconWeight and Dimensions
Depth259 mm
Width358.14 mm
Height17.78 mm
Weight2199 g

Related product manuals