Solved

Adding SIMMS to Goldstar GS325S

Posted on 1998-12-11
1
354 Views
Last Modified: 2010-04-27
I have a Goldstar GS325S (386 processor) with 8 x 30 pin SIMMS slots with 4 x 1MB SIMMS in at the moment. I want to upgrade it with 4 X 4MB SIMMS to take it up to 20MB.  When I added the 4 X 4MB SIMMs it only registered a total of 8MB (in other words it sees the $MB chips as 1MB) I then took out the 4 x 1MB SIMMs & replaced them with the 4 ones.  Still only registers 4MB total.  Any ideas please?  Is it that the 386 doesn't recognise the 4MB SIMMs.  Any thoughts would be gratefully received
Thanks
Gerry
0
Comment
Question by:grobinson
1 Comment
 
LVL 17

Accepted Solution

by:
xema earned 100 total points
ID: 1130901
grobinson:

Some of the early 386 were able to adress 16 Mb or less RAM and some can't use 4 Mb simms others neede an specific type, i.e. logical parity.

Review the manual and find how much and wich type of memory your MoBo accepts,if you don't have the manual do the following test.

Put the 4x4Mb int he first 4 slots, that means replace the 1Mb simms, and see what happens.  If  you get the 16 Mb put the 1Mb simms in the free slots and check if you get the 20 Mb. It's highly probable that you won't be able to use the memory

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

I recently purchased an HP EliteBook 2540p notebook/laptop. It has two video ports on it – VGA and DisplayPort. HP offers an optional docking station for the 2540p that also has both a VGA port and a DisplayPort. There are numerous online reports do…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now