pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

RAID tutorial – connecting the hard drives

We’re going to be setting up two identical hard disk drives as a single mirrored RAID 1 array.

Power the system down, remove the case and fit and connect up the hard disk drives. Refer to the How to install a second hard disk drive tutorial for detailed instructions on how to go about this.

On-Board

However, in this case we’ll be connecting the drives to the RAID controllers rather than the standard EIDE channels.

Ideally, the drives should be identical. At the very least, they ought to have the same capacity.

For our RAID 1 array, it’s necessary to attach the two hard disk drives as primary master and secondary master on each of the associated 40-pin connectors.

  • RAID tutorial – the benefits of using RAID
  • RAID tutorial – preparing for the installation
  • RAID tutorial – connecting the hard drives
  • RAID tutorial – configuring a RAID array installation
  • RAID tutorial – installing the drivers
  • RAID tutorial – installing Windows on the RAID drive
  • RAID tutorial – maintaining the RAID array

Filed Under: How to Set Up a RAID Array

Latest Articles

Object Oriented Programming 3

Encapsulation From what we've covered so far we can suggest that: A class is an abstract data type made up of a combination of the relevant data and associated methods. Each class not only has specific data members, it also has it's member functions or methods. The methods are the tasks … [Read More...]

AMD Mobile K6 CPU Technology Guide

Just as the desktop version of its K6-2 processor with 3DNow! technology stole a march on Intel by reaching the market well before its Pentium III was able to offer similar 3D capability via its Katmai New Instructions, AMD's Mobile K6-2 … [Read More...]

konica-magicolor-1600w

Konica magicolor 1600W Color Laser Printer

The Konica magicolor 1600W Color laser printer can print 20 b/w pages per minute and 5 color. It has a 1200x600 dpi. The smaller size and price point make this an ideal printer for a home office setup. The warm up time is relatively short at around 30 seconds and the first print is 12 seconds for … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Python Application to Create a Random Boy’s Name

Python is a very powerful language that is used by an estimated 8.2 million people. The number of Python programmers is growing 22% a year. Are … [Read More...]

Windows Custom Safety

Windows Custom Safety Windows Custom Safety is another delightful fake Safety client infection. The idea behind infections of this nature is to trick … [Read More...]

How To Use The Google Authenticator App to Protect Your Google Account

In a previous post, I talked about enabling two factor authentication on your Google account. Just to rehash, two-factor authentication adds another … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors