Solved

Detecting and allocating IRQs

Posted on 1998-06-01
5
157 Views
Last Modified: 2013-12-16
I am interested to know what Diagnostic Software and Hardware people are using to detect and allocate IRQ resources in Windows 95.  I am curently having no end of trouble trying to find "Spare" holes to fit in all the required items in a friends computer and that is what made me thing of asking this of the Experts.  In my friends case it is a fairly recent Pentium motherboard with 2 onboard Comm Ports and one Printer port.  There is a PS/2 Mouse port and the machine is running a Matrox Milenium Card.  She has a Scanner with a Plug and Play SCSI Card.  A second Printer Port to run a Tape Drive.  An SMC EtherEZ Network Card and an AWE32 Sound Card.

Whenever all the Componants are installed the Network card fails and invariably the "Generic" SCSI PnP card for some reason does not always see the Scanner.  If I remove the Network Card or the Sound Card it all seems to work OK.
0
Comment
Question by:Smedley
5 Comments
 
LVL 9

Expert Comment

by:larbel
ID: 1756095
You don't need any diagnostic software...  Just go to Control Penal>System>Device Manager then click on 'Computer' and it will list all the IRQ being used...
0
 
LVL 7

Expert Comment

by:busuka
ID: 1756096
0
 
LVL 2

Expert Comment

by:estest
ID: 1756097
The first thing you need to do is disable everything you are not using in the BIOS. This includes COM ports, printer ports, USB ports, etc.
0
 
LVL 2

Author Comment

by:Smedley
ID: 1756098
busuka.... Thanks for the software suggestion.  I downloaded SANDRA and after testing it I sent in a registration.  I am impressed.  The only funny item with it is that it has a problem with the 16bit module on my system and on another one I tried it out on.
0
 
LVL 7

Accepted Solution

by:
busuka earned 50 total points
ID: 1756099
Was it what you looked for (and I deserve the points ;-) ?
If not, feel free to reject my answer.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is an article about Leadership and accepting and adapting to new challenges. It focuses mostly on upgrading to Windows 10.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now