?
Solved

Formatting A harddisk

Posted on 1999-01-10
2
Medium Priority
?
284 Views
Last Modified: 2012-05-04
There are a few type of formatting a harddisk, So can you tell me the various types and how??? e.g format c:/s...

Thank A lot
0
Comment
Question by:diy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
mark2150 earned 150 total points
ID: 1133102
Format comes is a couple of flavors, /Q is quick, /U is unconditional (no prompt), /S is system.

You should have a bootable floppy with FORMAT.*, FDISK.* SYS.*, ATTRIB.*, EDIT.* on it.

Make a backup of your CONFIG.SYS, AUTOEXEC.BAT before you start.

You'll also need the CDROM drivers and related files if you intend to install from CD. Windows allows you to create an emergency startup disk, do so.

There are other considerations depending on if you're installing DOS, Win3.1, Win95/98, or NT.

Basic format is quick and easy. Hard part is restoring all 4Gb of data to drive from about a zillion floppies and/or CD's.

M

0
 
LVL 3

Expert Comment

by:vikiing
ID: 1133103
Open a DOS windows, and execute the command

        FORMAT /?

That will show you the different switches FORMAT command accepts and their meaning.
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question