Solved

RE:( For uilleann)

Posted on 1998-11-05
3
198 Views
Last Modified: 2010-04-27
Are you going to answer the Question...RE: K6-2-300 Gigabyte AGP motherboards.. all you have to do is submit the answer and claim the points
0
Comment
Question by:MAVERICK
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
uilleann earned 20 total points
ID: 1128415
Nice to know the problem is solved, what did they all do wrong?
Thanx for this post, already forgot about it :)
0
 
LVL 1

Author Comment

by:MAVERICK
ID: 1128416
It apears to be the BIOS setting... as its the only possiblility which could account for the problems... they substituted for everything..... still goofed!!!.... we're intending purchase another k6-2-300 computer ........ the first one was sent back for a refund....

BTW you have to answer the original question to claim the points...
http://www.experts-exchange.com/Q.10092521
0
 
LVL 1

Author Comment

by:MAVERICK
ID: 1128417
Adjusted points to 25
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

937 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now