Solved

Replacing IDE drive with SCSI

Posted on 1998-05-25
3
205 Views
Last Modified: 2013-12-16
I currently have 3 IDE hard drives.  I want to replace the D: drive with a scsi hard drive.  I want my E: drive to stay the E: drive (this is my 3rd hard drive).  Here's the question..

If I remove the D: drive and put in a scsi hard drive.  What letter will windows 95 (osr2) give it.  I am worried that it will move the E: drive up to D: and make the new scsi drive the E: drive.  Or will windows just put the new scsi drive in as the D: drive?
Thanks in advance
0
Comment
Question by:Coolers
  • 2
3 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1756026
Coolers,
The answer to your question about how drive letters are assigned for Dos & Win95 is in the following Knowledge Base article:

http://support.microsoft.com/support/kb/articles/Q51/9/78.asp

Let me know if you need more.
Regards,
Ralph

0
 

Author Comment

by:Coolers
ID: 1756027
I read that and I understand how Win95 assigns drive letters.. I guess what I need to know is.. Does win95 first check the ide ports and then the scsi ports?  If thats the case then the scsi drive would come in as E:

Anyone know if the ide port is check for hd's first and then the scsi ports.. (After the primary dos partition is found, Of Course)

0
 
LVL 9

Accepted Solution

by:
rmarotta earned 50 total points
ID: 1756028
That is correct.

In the article, it says:
"The drive letters assigned to additional drives installed using DRIVER.SYS and other installable device drivers is dependent upon the order in which the drivers are loaded in the CONFIG.SYS file."

This means the SCSI drive (as it is accessed by an installable device driver) follows the IDE drives.
The IDE ports are checked first, which in your case, the two IDE drives will be C: & D:.
Let me know if you need more.
Ralph

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Several part series to implement Internet Explorer 11 Enterprise Mode
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now