Solved

Need a user manual for KM-T5-V

Posted on 1998-11-24
2
793 Views
Last Modified: 2012-06-22
Can you send me the manual for the motherboard
KM-T5-V on VX chipset : SB82437VX (82371SB)?
Does it support MMX tech.?
If it does, than can I use IBM PR200MX CPU (66MHz*2.0)?
Maybe my BIOS doesn't support this CPU?
Than I can I upgraid my BIOS version, am I?
0
Comment
Question by:dsseker
2 Comments
 

Expert Comment

by:bios072698
ID: 1129699
Start here. Since you didn't specify the revision, I can't give you more info.

http://www.ping.be/bios/jamicon.html
0
 
LVL 12

Accepted Solution

by:
Otta earned 100 total points
ID: 1129700
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Power and BTU ratings calculation 13 86
Which memory brick is defective ? 8 97
security string in a noisy bar 5 96
VMware Fail Over 5 50
I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question