Bredy Network Management Corporation Blogs

2 minutes reading time (461 words)

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

What a CPU Does
The CPU (or central processing unit) is contained in the motherboard of your computer. Its job is to decode the instructions sent by the RAM (Random Access Memory) and forward them to the right piece of the system. No matter what you’re doing with your computer, your CPU is a necessary, even crucial component.

Many people mistakenly take this information and jump to the conclusion that a better CPU means improved performance, which does stand to reason. However, improved performance requires other components to be improved and upgraded as well. A better CPU will make your system, including your applications and other programs, function more quickly.

How It Does It
Despite the improvements made in computing, the fundamental functionality of a CPU has not changed since the component was first developed. There are three correlating jobs that the processor is responsible for: fetch, decode, and execute.

Fetch
The RAM sends the CPU coded instructions, which are bits and pieces of a larger operation the computer is undergoing. These instructions are stored in the Instruction Register.

Decode
After the instruction is safely stored, a specialized circuit called the instruction decoder gets to work. This circuit translates the coded instruction into signals that the other parts of the CPU can put into action.

Execute
Finally, these signals are sent to those other parts of the CPU, and the process is completed. This final instruction is also added to the CPU register’s memory, making it simpler and faster to access the next time.

Selecting A CPU
Switching out your CPU can be a simple way of upgrading your system to improve its performance. As you pick one out, keep in mind that the more cores a CPU has, the better it will be. The first CPUs had one, most today have anywhere from two to four, and the top-of-the-line ones have as many as eighteen (or even more than that).

You should also keep other things in mind as well. Different CPUs can handle different amounts of data at once, as annotated by the terms “32-bit” and “64-bit.” Some processors are also faster than others, as determined by their frequency. This means that some dual-cores can potentially “beat” a quad-core. Plus, you need to keep in mind what your motherboard can support. The best CPU won’t do you any good if it doesn’t work with your computer.

Need Help?
BNMC is here to offer you any assistance you may need with your IT solutions. For more information, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Microsoft Google Business Mobile Devices Network Security Computer Hosted Solutions Ransomware Android IT Services Managed IT Services Smartphone Tech Term Windows Small Business Backup IT Support Hardware Data Management Data Internet of Things Cloud Computing Browser Innovation Cybersecurity App Business Continuity User Tips Windows 10 Encryption Business Management Data Recovery Artificial Intelligence Gmail Server Facebook Saving Money Remote Monitoring Managed IT Services Productivity Smartphones Chrome Word Outsourced IT Managed Service Provider Phishing Money Productivity Windows 10 IT Support Communication Office 365 Efficiency Tip of the week Data Backup Vulnerability Infrastructure Disaster Recovery Analytics Applications communications Passwords Big Data IT Management Robot Settings Network Data storage Employer-Employee Relationship YouTube Government Social Media Risk Management Google Drive Antivirus Website Microsoft Office Office Tips Content Filtering Bandwidth Upgrade Telephone Systems The Internet of Things Apple Storage VPN Data Security Vendor Management Monitors VoIP Firewall Business Technology Save Money Server Management Maintenance Virtual Private Network Company Culture Automation End of Support Workplace Tips Virtual Reality Wireless Spam Computing Managing Stress Outlook WiFi LiFi Two-factor Authentication SaaS Mobile Device Hosted Solution Paperless Office Avoiding Downtime Administration Scam Holiday BYOD Mouse HIPAA Miscellaneous Alert Unified Threat Management Mobile Security Data loss Emergency Smart Tech Servers Google Calendar Customer Service Education Hacks Work Samsung Google Wallet Router Network Management Voice over Internet Protocol desktop Access Control Bitcoin Cooperation Service Level Agreement Digital Payment Dark Web Office Printing Compliance Business Intelligence Disaster Tech Support Business Growth Hotspot Internet Exlporer Digital Cyber Monday IT Technicians Collaboration Optimization Cybercrime Legal Connectivity Legislation Chromebook Downtime Password Social Engineering Unified Communications Drones Modem Touchscreen FinTech SharePoint Marketing Windows 8 Staff Leominster Microsoft Excel Regulations Quick Tips Uninterrupted Power Supply Techology Gadgets Websites Hacker Language Value Document Management Managed IT Spyware Smart Technology Mirgation File Sharing How To Recycling Lenovo Deep Learning IoT Computer Care Statistics IBM Tablet Safety Cookies MSP Solid State Drive Downloads Augmented Reality K-12 Schools Mail Merge Blockchain Social Networking VoIP Unified Threat Management Users Halloween Alt Codes Computing Infrastructure Professional Services Identity Theft Shortcut Distributed Denial of Service Remote Computing Chatbots Firefox eWaste Superfish Bring Your Own Device Operating System Star Wars Training Bluetooth Corporate Profile Comparison Network Congestion Budget Nanotechnology Development Hard Disk Drive Social Wearable Technology Automobile Network upgrade Address Permissions Information Technology Motherboard Cables Dell User Error Wi-Fi Scary Stories Typing Humor Alerts USB Patch Management Managed IT Service Writing Current Events Identity Customer Relationship Management Continuity Cabling Running Cable Best Practice Fraud Cost Management WannaCry Specifications Computers Screen Reader Heating/Cooling Charging Multi-Factor Security Dark Data Buisness Smart Office Google Maps Virtual Desktop Apps Time Management Wires Printer Sports Cryptocurrency Licensing Dongle Break Fix Retail IT solutions Going Green Solar Networking Politics Laptop Google Docs Assessment Search Black Friday Display How To Work/Life Balance IT Consultant Recovery Cameras Health Private Cloud Meetings Tracking Black Market Law Enforcement Cleaning Notifications CCTV Electronic Medical Records Webcam Physical Security Twitter Upgrades Gadget Emoji Mobile Device Management Crowdsourcing Error Point of Sale Ben McDonald shares Personal Information Botnet Mobile Computing Travel 3D Printing Cortana G Suite Machine Learning Supercomputer CrashOverride Processors Motion Sickness Unsupported Software Staffing Virtualization Taxes Update Administrator BDR Web Server what was your? Computer Repair Relocation IT Budget Mobile Data GPS

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3