Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How do I know if I have an Enhanced PP

Posted on 1998-04-03
3
Medium Priority
?
235 Views
Last Modified: 2012-06-21
I'm trying to install a scanner which requires an enhanced parrallel port. How can I determine if my computer has one? I have an HP 8175 Pavilion running Win 95.
0
Comment
Question by:furby3
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
rmarotta earned 200 total points
ID: 1133894
furby3,
Your computer has an enhanced capability parallel port.
You may have to enter the CMOS setup to configure the port.
Full specs can be found here:
http://www.hp.com/cposupport/personal_computing/support_doc/bph01781.html
regards,
Ralph

0
 

Author Comment

by:furby3
ID: 1133895
You should be able to do that by pressing delete key at bootup.
Some computers prompt you as soon as power is turned on for the way to enter CMOS or BIOS setup.
Ralph

0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1133896
You can turn on the Enhanced PP in your setup in the parallel port section. You also might consider to install an EPP driver and look if it works. Check the HP site though with the link you have been provided with
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

pc, laptop  monitor connection configurations
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question