Solved

How do I connect an Internal Zip Drive to a pc with a floppy

Posted on 2004-09-01
5
218 Views
Last Modified: 2010-04-26
Hi everyone,

I have bought 2 zip drives and I was wondering if i have to buy a special floppy ide cable so i can attack them or do i just simply replace the floppy drive and use its existing ide cable?

mat
0
Comment
Question by:auraorange
  • 3
5 Comments
 
LVL 11

Accepted Solution

by:
DoTheDEW335 earned 125 total points
ID: 11951893
You need to check the jumper config and make sure they are set correctly and yes you use IDE cable so you hook it inline with either your HD or CDROM
0
 
LVL 11

Expert Comment

by:DoTheDEW335
ID: 11951900
you can use your existing IDE cable, no special one is needed.
0
 
LVL 7

Expert Comment

by:crazijoe
ID: 11952028
The zip drives would have to be connected to the same IDE cable that is connected to your hard drive or the CDROM drive. It will not work on the Floppy Drive cable.
0
 
LVL 3

Expert Comment

by:Timothy Kashin
ID: 11952116
Also, you can only have 4 devices hooked up to IDE, unless your motherboard has more IDE ports or you have another controller card.
0
 
LVL 11

Expert Comment

by:DoTheDEW335
ID: 11953373
ty for the accept!
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Are keyboards of Lenovo L560/E560 notebook the same as T560/T450? 6 64
Best RAM for a PC 4 46
Migrate data to new Mac OS X server 3 54
PC build question 3 48
Upper back Pain: My back hurt for months. Upper back, mostly my neck, spine and across my shoulder blades. I was getting headaches too, that felt like they were caused by tension in my shoulders, but now I feel fine! I'm sharing this hoping someone…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now