Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Floppy Disk Error

Posted on 1998-07-14
2
Medium Priority
?
276 Views
Last Modified: 2010-04-27
My computer one day suddenly appear a message when it startup "Floppy disk error (40)". In theory it is because the cable losen but this is not the case. I try to push the cable in harder, change a new cable, put in the other way round still no hope. The floppy drive light is on once the computer is power up, is there any way which I can do to fix this problem.

Thanks for the help!
0
Comment
Question by:htse011498
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
texas050398 earned 30 total points
ID: 1137264
It appears that you have a bad floppy drive or controller. If you can test the floppy drive in another pc do this. You will be able to find out if the drive or the controller is broken.

If the drive is broken, you will need to replace it. If it is the controller, you can purchase another folppy controller.
0
 

Author Comment

by:htse011498
ID: 1137265
Thanks the problem is solved!
0

Featured Post

Take our survey for a chance to win!

As a valued customer of Targus, we’d like to ask you a few questions about us. As thanks, you will be automatically entered for a chance to win a $500 VISA gift card. To enter, just complete the survey by September 15, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question