Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Pentium Clocking

Posted on 1998-03-17
2
Medium Priority
?
220 Views
Last Modified: 2010-04-12
I have a NEC computer rated at P75 90 or 100.  Intel says the processor have a core freq. of 50, 60, or 66 Mhz.  Is the clock doubling on the Chip?  If I have a non MMx rated at CPU 3.3 Vdc with the same core freq. can I use it on this board?  I suspect a 133 has a core of 66 (66x2=132) could I use it on this board?
0
Comment
Question by:forbism
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
charlesmncheng earned 300 total points
ID: 1018669
You can used it, but need to set the correct voltage in main board.
0
 
LVL 7

Expert Comment

by:busuka
ID: 1018670
forbism, please post what mainboard you have, so we'll find out.

0

Featured Post

Sign your company up to try the MB 660 headset now

Take control and stay focused in noisy open office environments with the MB 660. By reducing background noise, you can revitalize your office and improve concentration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question