Solved

Multi-boot

Posted on 1998-07-19
2
215 Views
Last Modified: 2010-04-27
I have bought a 6.4GB harddisk and I divided it into four partition.  3.4GB(FAT32), 1GB(FAT32), 1.5GB(FAT32), and 120MB(FAT).  The harddisk is install in the secondary IDE port(master).  I try to install MS-DOS into the 120MB partition but when I try to reboot after installed it, the system told me it is a non-system disk.  What happen?  How can I install any OS into the harddisk?
0
Comment
Question by:gen_genesis
2 Comments
 
LVL 4

Expert Comment

by:swwelsh
ID: 1019930
Dos won't boot from anything except an active primary partition on the first physical hard disk. To get around this you would need a utility such as System Commander or Partition Magic. In the case of plain dos, I'm still not sure it would boot from the 2nd drive.
0
 

Accepted Solution

by:
htw earned 100 total points
ID: 1019931
DOS, Win9x and NT's loader /must/ be installed on an active primary partition on the first harddisk. With IDE that's the master on your primary IDE interface.
Some other operating systems, like OS/2, Linux, FreeBSD, can be installed on any partition (primary or extended) on any harddisk, provided you're using a bootmanager like the one shipped with OS/2 or Partition Magic, or Lilo (linux), etc..

Regards,
Erik

0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
HP DL160 G6 Hard Disk Question 3 69
RAID 1 - Problem with Data 8 82
security string in a noisy bar 5 87
DVD BURNER 2 27
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question