Solved

Using LS-120 as a bootable drive

Posted on 1998-10-05
4
308 Views
Last Modified: 2010-04-27
Has anyone used a LS-120 superdisk (optical)drive as a bootable  drive a:? It is my understanding that I can replace my floppy drive with a LS-120 drive and connect it to the IDE port. However, it is said on the box that it can be used as a bootable drive if it is supported by BIOS. My motherboard has AMI BIOS, I believe it is 1997. Ho can I find out whether or not it can support it? If  anyone has any  experience with using LS-120 please let me know.
0
Comment
Question by:mgokman
4 Comments
 
LVL 2

Expert Comment

by:bushhead
ID: 1011175
when the machine boots up, press the correct key sequence to get into bios. this should be the del key or something but it should show up on the screen.

after you get into bios, go into one of the settings and look for boot up sequence. after getting there, change the options and see if you can find LS120 in any of them. the sequence will probably be LS120, C, D orsomething like that. if you have LS120 showing in the bios, that means that your comptuer supports booting up from that drive.

bush
0
 
LVL 2

Expert Comment

by:Hippy
ID: 1011176
mgokman,

Do you have any specifics of the motherboard, ie: Model, Brand, Chipset, any ID markings on the board itself.

This will help out, even if the board doesn't support it now, it might with a BIOS update from the manufactures web page.

Hippy.

0
 

Accepted Solution

by:
benricardo earned 200 total points
ID: 1011177
Mgokman
             The particular setting you are looking for is found in the advanced chipset features of your Bios. If your Bios supports booting from an LS-120 you will find that the boot sequence order can be modified to read flopptical / C / CDROM if you write these changes to your CMOS apon exit your LS-120 will boot up fine
0
 
LVL 3

Author Comment

by:mgokman
ID: 1011178
The answer and all comments were very helpful. Thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now