aspire ao d2255e - how to remove KB add memory?

Posted on 2011-10-21
Last Modified: 2012-05-12

D255E it says

I heard there is an AO before that.

Question by:fcek
    LVL 26

    Accepted Solution

    I couldn't find exactly the same model. Can these instructions or video help you? (link to pictures is in the end.)

    LVL 69

    Assisted Solution


    "I think I just managed the upgrade.

    My wife's Acer is a D255E, and I took it to boots, but I don't have her password to check the System settings.

    The above is correct, ignore the screws on the back they are a red-herring. Pry the keyboard off. To do this, look carefully on the left, right and top: there are small little tabs that are spring loaded that are easy to push back with a 1/8" jeweler's flat screwdriver. There are one each on the sides, and 3-4 across the top...once pushed back the keyboard can be popped out. I left it tethered.

    Once behind the keyboard you'll notice a large silver metal plate about the size of a 2.5" drive. There are 4 screws labeled "Door", roughly on the 4 four corners of this plate that come out with an 1/8" jeweler's phillips. Ignore the other screws. Once these four are out, tip the netbook on its side and push a small screw driver into the hole in the plate....a section of the back will pop off (the area with the stickers and roughly bounded by the 4 rubber "feet") once this is pried off, the memory and hard disc are easily access.

    To close repeat the above, in reverse (you made it this far, you'll be able to figure out how to undo it)."

    Author Closing Comment

    Out of the box the wireless card is Doa.
    It worked for a few mins.

    uninstall / reinstall wireless = same
    New driver = same.

    Wireless card is Aethoros or something.

    Never buying Acer again.

    Complete rubbish.  Glossy finish and Logo all over the front cover.

    Replaceing with something better.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
    Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    This video discusses moving either the default database or any database to a new volume.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now