BNMC Blog

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

What a CPU Does
The CPU (or central processing unit) is contained in the motherboard of your computer. Its job is to decode the instructions sent by the RAM (Random Access Memory) and forward them to the right piece of the system. No matter what you’re doing with your computer, your CPU is a necessary, even crucial component.

Many people mistakenly take this information and jump to the conclusion that a better CPU means improved performance, which does stand to reason. However, improved performance requires other components to be improved and upgraded as well. A better CPU will make your system, including your applications and other programs, function more quickly.

How It Does It
Despite the improvements made in computing, the fundamental functionality of a CPU has not changed since the component was first developed. There are three correlating jobs that the processor is responsible for: fetch, decode, and execute.

Fetch
The RAM sends the CPU coded instructions, which are bits and pieces of a larger operation the computer is undergoing. These instructions are stored in the Instruction Register.

Decode
After the instruction is safely stored, a specialized circuit called the instruction decoder gets to work. This circuit translates the coded instruction into signals that the other parts of the CPU can put into action.

Execute
Finally, these signals are sent to those other parts of the CPU, and the process is completed. This final instruction is also added to the CPU register’s memory, making it simpler and faster to access the next time.

Selecting A CPU
Switching out your CPU can be a simple way of upgrading your system to improve its performance. As you pick one out, keep in mind that the more cores a CPU has, the better it will be. The first CPUs had one, most today have anywhere from two to four, and the top-of-the-line ones have as many as eighteen (or even more than that).

You should also keep other things in mind as well. Different CPUs can handle different amounts of data at once, as annotated by the terms “32-bit” and “64-bit.” Some processors are also faster than others, as determined by their frequency. This means that some dual-cores can potentially “beat” a quad-core. Plus, you need to keep in mind what your motherboard can support. The best CPU won’t do you any good if it doesn’t work with your computer.

Need Help?
BNMC is here to offer you any assistance you may need with your IT solutions. For more information, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Business Hackers Business Computing Network Security Software Internet Microsoft Computer IT Services Google Hosted Solutions Ransomware Tech Term Efficiency User Tips Mobile Devices Managed IT Services Backup Data Smartphone Small Business Communication Android Saving Money Business Continuity IT Support Hardware Browser Windows 10 Data Recovery Innovation Windows Internet of Things Cloud Computing Data Management Productivity Cybersecurity App Data Backup Managed IT Services Productivity Microsoft Office Gmail Artificial Intelligence Remote Monitoring Disaster Recovery Business Management Encryption Passwords Word Facebook Server Office 365 Upgrade Workplace Tips Tip of the week Analytics communications BYOD Website Vulnerability Infrastructure Network IT Support Money Smartphones Applications Outsourced IT Chrome Windows 10 Managed Service Provider Phishing Employer-Employee Relationship Company Culture Government YouTube Mobile Device Antivirus Risk Management Social Media Office Tips Data storage IT Management Robot Save Money Big Data Maintenance Settings Google Drive Bandwidth Content Filtering Miscellaneous Two-factor Authentication SaaS Users Education Apple Avoiding Downtime Holiday Paperless Office Scam Storage Managing Stress Alert Display Development Data loss Unified Threat Management VPN Laptop Telephone Systems Access Control Vendor Management desktop HIPAA Monitors The Internet of Things Data Security Server Management Spam Computing Business Technology Outlook Touchscreen Mobile Security WiFi VoIP Virtual Private Network Operating System Firewall LiFi Automation Managed Service Hosted Solution End of Support Administration Virtual Reality Business Intelligence Mouse Wireless Information Language Value IT solutions Going Green Training Corporate Profile Address Co-Managed IT Permissions Regulations Google Docs Halloween Hacks Wi-Fi Hard Disk Drive Patch Management Onboarding Managed IT Service Mirgation Recycling Writing Automobile User Error IoT Dell Slack Specifications Augmented Reality K-12 Schools Google Wallet Computers Customer Relationship Management Cookies MSP Bitcoin Heating/Cooling Multi-Factor Security Computing Infrastructure Professional Services Printing Dark Data Update WannaCry Content Social Networking Business Growth Scary Stories Cabling Star Wars Password Digital Signage Break Fix Chatbots eWaste Legal Retail Running Cable Google Maps Time Management Printer Politics Buisness Search Monitoring Black Friday Wearable Technology Network upgrade Unified Communications Drones Networking Nanotechnology Windows 8 Servers Google Calendar Alerts USB Customer Service Virtual Desktop Emergency Streaming Motherboard Cables Hacker Sports Fraud Cost Management Mobile Device Management Troubleshooting Dark Web Identity Continuity Deep Learning Office Samsung Network Management Tech Support Spying Cyber Monday Smart Office Digital Payment Screen Reader Charging Disaster Analysis Legislation Licensing Dongle Chromebook Digital Human Error Wires Alt Codes SharePoint Assessment Microsoft Excel Solar Bring Your Own Device Social Engineering Collaboration Social Websites Downtime Managed IT Employee-Employer Relationship Smart Technology Work Budget Cybercrime Quick Tips Techology Smart Tech Uninterrupted Power Supply Statistics Tablet Cooperation Service Level Agreement Information Technology Document Management Spyware How To Lenovo Device Router Voice over Internet Protocol Typing Humor Marketing Downloads Hotspot Internet Exlporer Current Events Computer Care IBM Mail Merge LED Blockchain Compliance Best Practice Safety Gadgets File Sharing Solid State Drive Shortcut PowerPoint Distributed Denial of Service IT Technicians Optimization Remote Computing VoIP Unified Threat Management Connectivity Bluetooth Comparison Staff Leominster Apps Network Congestion Identity Theft Firefox Superfish Modem FinTech Cryptocurrency Travel Machine Learning G Suite Processors Unsupported Software Virtualization Supercomputer CrashOverride Staffing Motion Sickness Computer Repair Relocation Taxes Administrator Mobile Data Web Server what was your? IT Budget Recovery GPS How To Work/Life Balance Health Private Cloud IT Consultant Cameras Black Market Meetings Tracking BDR Law Enforcement Mobile Computing Electronic Medical Records Cleaning Printers Notifications Physical Security CCTV Twitter Regulation Webcam Emoji Upgrades Gadget Crowdsourcing Personal Information Botnet Error 3D Printing Point of Sale Ben McDonald shares Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3