Solved

50 points to gonzal13 for  CDROM insight

Posted on 2001-06-14
3
154 Views
Last Modified: 2010-04-27
gonzal13,

Thank you for your insight on my CDROM problem here:

http://www.experts-exchange.com/jsp/qManageQuestion.jsp?qid=20124567

It is apparent now that I must try a CDROM drive of the same vintage as the old one.

The problem is not solved yet, your comments have been helpful.

Thanks much,

PleaseNoSpam
0
Comment
Question by:pleasenospam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
gonzal13 earned 50 total points
ID: 6435002
Thank you for the points. I do not know how to collect them
0
 
LVL 3

Author Comment

by:pleasenospam
ID: 6435500
You got 'em.  Sorry it took so
long to find you.

John
0
 
LVL 13

Expert Comment

by:gonzal13
ID: 6695096
Thanks

Joe
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question