Acer Predator 17 G9-793

From Wiki-IoT
Revision as of 09:27, 24 September 2025 by 20222797 (talk | contribs) (值得我们购买)


Classification

Acer Predator 17 G9-793
Classification
Grade B
Calculator version 1
Classification date 2022-01-30
Information
Name Predator 17
Brand by Parent Acer by AMIBOT
Generation Animal Comfort
Model(s) 17 G9-793
Release date 2016-09-11
Type/Category Computer
Website [1]
Status In sale
More
Dimensions 423 x 322 x 40 mm (16.65" x 12.68" x 1.57")
Mass 4.20 kg (9.3 lbs)
Operating system Microsoft Windows 10 Famille
Companion App AMIBOT HOME
CPU Intel Core i7-7700HQ
GPU -
Memory 2x8GB DDR4, 2400 MHz
Storage 500GB SSD PCIe NVMe + 1TB HDD, 7200 rpm
Battery 88Wh, 6000 mAh, 8-cell
Power 22 Watts
Charging 5 hours, 14.4 – 14.8V
Display -
Camera 1280 x 720 pixels
Sound Haut-parleurs (4x Speakers + Two Subwoofers) (Realtek High Definition Audio)
Connectivity Killer Ethernet E2400 10/100/1000, Killer Wireless-AC 1535 802.11ac 2x2 MU-MIMO (2.4GHz / 5GHz), Bluetooth
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [2] The device has fewer reports of hardware tampering.
Known vulnerabilities Rare [3] [4] Only a small number of vulnerabilities have been found, and Apple makes regular security updates.
Prior attacks Rare [5] [6] No known successful attacks have been reported.
Updatability Very common [7] Update several times per year.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [8] Supports full certification with multiple systems.
Communications Encrypted with up-to-date encryption [9] [10] [11] Secure communications with the latest encryption technology.
Storage Encrypted with up-to-date encryption [12] [13] [14] Encryption using BitLocker easy to setup but disabled by default.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Full [15] Provides comprehensive account management capabilities.
Authentication Secure [16] [17] Adopt a secure authentication mechanism.
Brute-force protection Basic [18] [] Has measures to prevent brute force cracking.
Event logging Partial logging [19] [20] [21] Log access events for added security.
Passwords Require change after setup with complexity requirements [22] [23] After setting, change the password and meet the complexity requirements.
Category score 2
Grade B