Solved

Assign IRQ for vga

Posted on 2002-03-26
4
2,474 Views
Last Modified: 2012-08-14
my old bios had an option for assigning or not assigning irq for vga.
newer one doesnt have it.
what diff it makes when irq is assigned or otherwise?
can i disable that even if bios doesn't support?
0
Comment
Question by:swapsthegreat
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 18

Accepted Solution

by:
Wakeup earned 75 total points
ID: 6895869
Well most cards in general such as Video, scsi, network, modem cards need an IRQ.  Your old board allowed you to change the irq in the bios so you can Hard set it before it went to the OS.  Another term for it is PCI Steering or IRQ Steering.  You can change them to allocate to a different IRQ if you had a specific piece of hardware that you could not change the IRQ to.  Hope that helps.  
Nowadays w/ plug and pray, it makes it a little easier because the OS's a little more IRQ friendly.  
0
 
LVL 2

Expert Comment

by:willinois
ID: 6896452
wakeup hit it dead-on!
0
 
LVL 4

Expert Comment

by:1175089
ID: 6897249
You need from IRQ for your VGA card only if you use it's video input (if it has such a input).
0
 

Expert Comment

by:jshalack
ID: 6897619
Some OSes require an IRQ to produce video output.  
Windows 95 and later do not.
Allocating an IRQ on a PC that runs Win95 or later does no harm and does no good, except wasting an IRQ.
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question