Solved

monster 2

Posted on 1998-08-11
4
296 Views
Last Modified: 2010-04-29
i was told that the diamond monster 2 video card does'nt take up a irq is that true

p.s i am low on points so sorry :(
0
Comment
Question by:juggernaut
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Accepted Solution

by:
KAD earned 0 total points
ID: 1122572
Yes, it's true.  It's a pass-through card which is driven by your existing video card and therefore doesn't require an aditional IRQ.
0
 
LVL 1

Author Comment

by:juggernaut
ID: 1122573
wow coooooooooooool thanx man im sooooooo happy
0
 
LVL 1

Author Comment

by:juggernaut
ID: 1122574
wow coooooooooooool thanx man im sooooooo happy
0
 

Expert Comment

by:2mrchio
ID: 1122575
I guess juggernaut's twice as happy...:-)

0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ShoreTel PBX blocking incoming number 1 144
S1200BTL Rack Mount Case 4 46
tamper proof asset tags - benefits 4 59
ATI Radeon HD 5450 video card problem? 12 69
Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question