Solved

upgrading

Posted on 1998-06-17
2
205 Views
Last Modified: 2013-11-10
I would like to upgrade my system to make it perform faster and give it more diskspace.  What steps should I take in order to do so?  I am currently using a CyrixInstead 32.0 MB Ram.  It is a 150MHZ system With MMX.  
0
Comment
Question by:floydster
2 Comments
 
LVL 1

Accepted Solution

by:
Mark C Arzillo earned 100 total points
ID: 1136171
Currently your system is not too bad from it's description.  You did not specify your disk size which of course can speed up your system if you get a faster one.  The newer the hard drive the faster it will be in most cases.

Start off by getting a new hard drive and see how that feels.  If you still crave more speed then you might want to look at buying a new motherboard and CPU.  This might require you to get new memory though if your existing RAM is not supported by the new motherboard.

Pentium II boards usually only take 168 pin modules rather than the 72 pin SIMM's that you should have.  You can also just get some more RAM which will improve your performance however if you later upgrade your motherboard you may not be able to use any of the existing RAM.

Whatever you decide, drop me an email at zippo@tampabay.rr.com and I can get you a good deal on any hardware you want to buy.  I work for a hardware/software company and can get the stuff at very low prices.

Good luck...

- Mark
0
 

Author Comment

by:floydster
ID: 1136172
Good response.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now