Solved

invalid drive specification

Posted on 1998-07-23
2
231 Views
Last Modified: 2010-04-26
after i've did low level format to my hard disk, it came out with the message said "invalid drive specification" and cannot access to this drive any more. why ? is that mean this drive damaged already ?
0
Comment
Question by:eeee
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1121478
If you want to delete this question, you can do so, and have your points refunded. (if you do it before someone proposes an answer)
Ralph

0
 
LVL 5

Accepted Solution

by:
theh95 earned 10 total points
ID: 1121479
After you fif the low level format, you have to dot fdisk to repartition your drive, and then reformat your drive.  Because low level format will removed all the old partition(s).  You drive should be fine.

0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 10 Slow to recognise CD's 8 122
Supermicro 91 error 8 92
Products to polish away touchscreen & laptop screens scratches 6 82
Workstation graphics card or Consumer 5 76
Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question