Solved

AGP - enabling AGP and AGPset

Posted on 1998-01-11
1
309 Views
Last Modified: 2010-04-12
I'm trying to make some decisions surrounding hardware for a not-so-distant purchase. I'm building my own system. When looking at motherboards I've noticed a distinction between two types of boards, ones that claim to be "AGP enabled" and ones that claim to be an "AGPset". I know enough that I do NOT want a motherboard with a built in AGP chipset... which will force me to use that chipset even as newer AGP chipsets become available (such as AGP 2X and AGP 4X chipsets). So my "guess" would be that "AGP enabled" motherboards have a slot for an AGP card but do not have an AGP chipset on the motherboard while the "AGPset" motherboards have an AGP chipset built onto the motherboard.

Is this correct? Could someone let me know a proof positive way to ensure I won't get stuck with an AGP chipset stuck on the motherboard?

thanks.
0
Comment
Question by:carlvs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 32

Accepted Solution

by:
jhance earned 200 total points
ID: 1122825
You are correct.  You can also tell by looking.  The AGP capable boards have an AGP connector in the middle of the PCB for the one possible AGP device.  A motherboard with a built in AGP chipset will not have this connected but will still advertise itself as AGP.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

689 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question