Solved

IRQ & CDROM Setup

Posted on 1998-03-10
1
187 Views
Last Modified: 2010-04-12
(1) Recently I got a boot problem (Virus?), then I (reinstall Win95) discoverd that my mouse (COM1) won't work if an internal modem (COM2) is in use (previously no problem).  I used Win95 but I tried in DOS (F8 boot), same problem persist.  I reinstall the modem and found no conflict for IRQ3 & IRQ4?
(2) I used a TEAC 6X CDROM (thru secondary primary IDE), when bootup, cannot be detected by BIOS (Pentinum 100MHz 430Fx motherboard) and it can't be recognoised by Win95 too.
I check with TEAC Corp, they said no Win95 driver is needed (only real mode driver, currently used thru autoexec.bat & config.sys), how can I install (use Win95 default ATAPI protected driver such that My CDROM can read long filname?)
0
Comment
Question by:cwchin
1 Comment
 
LVL 9

Accepted Solution

by:
cymbolic earned 100 total points
Comment Utility
1) IRQ3 & 4 are typically used in com 1 & 2 but other interrupts are also available to be used.  You need to check carefully your specs on the modem and make sure you know what interrupt it is trying to use.  Some later cards are set through software, and not strapped, so you need to be clear on that.  Also, there are programs on the web (try FilePile) that will search for and report interrupts in use.  To bad you don't have wfw 3.11, it had the MSD.EXE program that was a good tool for this.

2)Either you have been misinformed or misunderstood what they were saying, becuase 95 does not use the real mode drivers that may get installed via config.sys/autoexec.bat.  These are only used in DOS mode, 95 replaces real mode drivers with it's own drivers on boot up.  Generally, you can go through a process in 95 via the control panel, and add/remove hardware to get accessibility to your devices.  You can try this both with your modem and your CD ROM.  First remove the devices, then add them again, or reboot and allow 95 to autodetect and configure.  


0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now