pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

CD-RW Installation Configuration

Select operation of the CD-ReWriter as an IDE master or slave, or for cable select, via the configuration jumper at the rear of the unit.

In this case the drive’s factory setting is as a Master.

Configuration

To configure the drive as a Slave, move the jumper to the middle set of pins, leaving the other pins uncovered. To change the drive for Cable Select, move the jumper to the left set of pins.

This particular drive has shipped from the factory with no DMA jumper installed. The empty pins mean the drive is set to Ultra DMA, a setting that will work in most cases. However, the default Ultra DMA setting may be inappropriate for some older motherboards, causing the computer to hang or crash. If this happens, the setting may be changed to Multiword DMA mode by jumpering the two pins just to the left of the configuration jumper.

The Cable Select jumper position sets the drive to use the CSEL signal from the IDE interface for configuration. This signal automatically selects the correct Master/Slave setting. However, use of CSEL require that you have:

  • a computer that supports CSEL
  • a special CSEL cable for IDE connector.

With Cable Select, the Master and Slave designations are determined not by jumpers, but by the actual connectors on the CSEL cable. The connectors are identified as Master or Slave.

Note that if any device is jumpered as Cable Select, then both devices on that cable must be jumpered in the same way.

  • Drive Installation Terminology
  • CD-RW Installation Intro
  • CD-RW Installation Configuration
  • CD-RW Installation Mounting
  • CD-RW Installation Connection
  • CD-RW Installation Bios Setup
  • CD-RW Burning Software
  • CD-RW Installation Optimization
  • Floppy Installation Intro
  • Floppy Installation Mounting
  • Floppy Installation Connection
  • Floppy Drive Installation BIOS Setup

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

Filed Under: How to Install a Front Loading Drive

Latest Articles

How to Remove Win 7 Internet Security 2012

Win 7 Internet Security 2012 s a false security client. This kind of virus is known as malware. Once infected users will see contant error messages and warning messages about their computer being infected with a virus. The scan results and warnings are false and purposely misleadin. The goal … [Read More...]

TWAIN Drivers

TWAIN Drivers

Surprisingly TWAIN is not an acronym, but a very important standard in image acquisition, developed by Hewlett-Packard, Kodak, Aldus, Logitech and Caere which specifies how image acquisition devices such as scanners, digital cameras and other … [Read More...]

How to Charge Your iPhone Faster

How to Charge Your iPhone Faster

Yes it is a First World problem, but it is very frustrating to find your iPhone dead when you are getting ready to go out. You may see that dreaded red bar on your iphone and come to the realization that you have less than 20% of power and are going to be away from a charging station for a long … [Read More...]


Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Excel Shortcuts for More Complicated Commands

We previously wrote an article on the benefits of using keyboard shortcuts in Excel. The shortcuts we focused on were used for simple formatting … [Read More...]

CleanTalk as Your Weapon against Spam

CleanTalk as Your Weapon against Spam

Are you tired of spam? You aren't alone. It has become a massive epidemic over the past few years. Around 14.5 billion spam messages are sent every … [Read More...]

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

Not all people are in the know about the beneficial functions of Virtual Private Networks. Some users install them to unblock torrenting sites, for … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Optimizing Startup Menu

Video Covering Optimizing Startup Menu - Part of our Fix Slow Computer tutorial found onĀ  … [Read More...]

Hard Drive Preperation

Before you start, make sure you have at hand everything you may need to perform the installation. This'll include a Phillips screwdriver, an … [Read More...]

Basic structure of a Pentium microprocessor

A Pentium processor's major functional components are: Core: The heart of a Pentium is the execution unit. The Pentium has two parallel integer … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors