Solved

ps/2 mouse

Posted on 1998-05-16
4
269 Views
Last Modified: 2013-12-09
I DON'T HAVE A PS/2 MOUSE BUT WINDOWS 95 ALWAYS
CONFILICT ?
0
Comment
Question by:yacoo051498
  • 3
4 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1135400
yacoo,
Check your CMOS setup to see if PS/2 mouse is enabled.
If so, disable it and the conflict should disappear.
Regards,
Ralph

0
 
LVL 4

Accepted Solution

by:
Mark Aerts earned 100 total points
ID: 1135401
When you have an older type of soyo mainboard, you can only solve this by a bios-update!
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1135402
Mark Aerts,
What an answer!
Please don't waste everyones time by proposing an answer based on your assumptions instead of information given.
Ralph

0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1135403
yacoo,
If the proposed answer does not solve your problem, please re-open the question so that other experts may provide a solution for you.
We need some feedback from you if you still have a problem.
Ralph

0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question