Solved

floppy disk

Posted on 2006-07-10
6
264 Views
Last Modified: 2010-04-25
hi ,

why sometimes a floppy used to record data in one pc gives messages "the disk is not formatted" when tried to access  in another pc.how can be this corrected.
0
Comment
Question by:ganitham
6 Comments
 
LVL 42

Expert Comment

by:zephyr_hex
ID: 17076999
what are the operating systems on the 2 computers?
this message usually occurs when the format of the floppy is not recognized.  for example, if you format a floppy on  Mac and then try to use it on a PC, the PC will give you that error.  there is no way around it.
0
 
LVL 19

Expert Comment

by:simpswr
ID: 17077159
It seems to be a by-product of zero quality control on floppy discs and drives.  They are so cheap these days that no manufacturer seems to be concerned with quality control.
0
 
LVL 32

Accepted Solution

by:
Mark earned 50 total points
ID: 17078194
This can be caused by head misalignment of one of the floppy drives. If one drives heads are out of spec it will show up when the floppy is read by a floppy with a properly aligned head. The out of alignment floppy will still read its own floppys that it makes, because its geometry will match its floppy disk read write pattern.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 28

Expert Comment

by:burrcm
ID: 17080476
As sparkmaker says. I have a classic at home - two of my pc's are just the right amount out of alignment, that I can format a disk in one, put data on it, format it in the other, put data on it, then read BOTH sets of data in the originating machines. Can't find a use for it though...but it gives new meaning to reading between the lines.

Chris B
0
 
LVL 32

Expert Comment

by:Mark
ID: 17081154
@burrcm--> can you get twice the data on those floppys ;-)
0
 
LVL 28

Expert Comment

by:burrcm
ID: 17089460
Yep

Chris B
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

How can this article save you time AND money?  In just a few minutes you may discover something you didn't know existed that is easy enough for you to fix yourself!
Computer running slow? Taking forever to open a folder, documents, or any programs that you didn't have an issue with before? Here are a few steps to help speed it up. The programs mentioned below ALL have free versions, you can buy them if you w…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now