Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Adding more memory.

Posted on 1997-12-09
2
Medium Priority
?
177 Views
Last Modified: 2013-11-10
I just added 8 MB of RAM (in two 4-MB chips) to a
pentium PC with 90 Mhz with 8 MB (also, in two 4-MB chips)
running win95 (barely moving !). All the chips are 72-pin.
The machine accepted the extra RAM ( for a total ot 16 MB ) and is working OK.
My question to the knowledgeable guys is:What are the things to consider when adding memory?, is it OK to add chips as long as they fit?, do the chips have to be installed in pairs?.
I will appreciate any comments.
TIA,
 
Efrain R Portales
Fort Worth
0
Comment
Question by:efrain12
2 Comments
 
LVL 2

Accepted Solution

by:
EbenBrooks earned 30 total points
ID: 1120821
The answer is: it depends.

In most cases, DIMMs (Dual In-line Memory Modules), i.e. the 72-pin thingies you just installed, can be installed only one at a time, but some motherboards want two at a time. SIMMs (Single In-line Memory Modules), which are hardly seen anymore, must be installed in either pairs or sets of four, depending on the motherboard.

When adding memory, it is best that all DIMMs/SIMMs be made by the same manufacturer and be of the same speed. Most DIMMs and SIMMs are 60ns (nanosecond), 70ns or 80ns. If you cannot get all modules by the same manufacturer, that's usually okay, because the memory speed is more crucial: DO NOT MIX MODULE SPEEDS! If your first DIMMs are 60ns, your next ones must be 60ns. Sometimes mixing them works, but more often it causes a heap of trouble, so don't do it.

Also, you must be grounded from static electricity discharge before installing memory. The easiest way to do this is to unplug the machine and then touch an unpainted part of the metal chassis before handling the memory or *any* circuit board.

--EbenBrooks
0
 

Author Comment

by:efrain12
ID: 1120822
Thanks a lot. You've been very informative.
People like you make this web site really outstanding !.
Happy Holidays!.

Efrain R Portales
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question