BNMC Blog

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

What a CPU Does
The CPU (or central processing unit) is contained in the motherboard of your computer. Its job is to decode the instructions sent by the RAM (Random Access Memory) and forward them to the right piece of the system. No matter what you’re doing with your computer, your CPU is a necessary, even crucial component.

Many people mistakenly take this information and jump to the conclusion that a better CPU means improved performance, which does stand to reason. However, improved performance requires other components to be improved and upgraded as well. A better CPU will make your system, including your applications and other programs, function more quickly.

How It Does It
Despite the improvements made in computing, the fundamental functionality of a CPU has not changed since the component was first developed. There are three correlating jobs that the processor is responsible for: fetch, decode, and execute.

Fetch
The RAM sends the CPU coded instructions, which are bits and pieces of a larger operation the computer is undergoing. These instructions are stored in the Instruction Register.

Decode
After the instruction is safely stored, a specialized circuit called the instruction decoder gets to work. This circuit translates the coded instruction into signals that the other parts of the CPU can put into action.

Execute
Finally, these signals are sent to those other parts of the CPU, and the process is completed. This final instruction is also added to the CPU register’s memory, making it simpler and faster to access the next time.

Selecting A CPU
Switching out your CPU can be a simple way of upgrading your system to improve its performance. As you pick one out, keep in mind that the more cores a CPU has, the better it will be. The first CPUs had one, most today have anywhere from two to four, and the top-of-the-line ones have as many as eighteen (or even more than that).

You should also keep other things in mind as well. Different CPUs can handle different amounts of data at once, as annotated by the terms “32-bit” and “64-bit.” Some processors are also faster than others, as determined by their frequency. This means that some dual-cores can potentially “beat” a quad-core. Plus, you need to keep in mind what your motherboard can support. The best CPU won’t do you any good if it doesn’t work with your computer.

Need Help?
BNMC is here to offer you any assistance you may need with your IT solutions. For more information, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Microsoft Network Security Software Internet Hosted Solutions Google Tech Term Computer IT Services Ransomware Business Mobile Devices Backup Managed IT Services Smartphone User Tips Small Business Android Efficiency Saving Money Business Continuity Hardware Cloud Computing Windows Innovation Data Recovery Internet of Things Data Management IT Support Communication App Data Data Backup Windows 10 Browser Productivity Cybersecurity Managed IT Services Business Management Gmail Artificial Intelligence Remote Monitoring Encryption Passwords Server Facebook Infrastructure Analytics Tip of the week Office 365 communications Word Vulnerability Outsourced IT Network Disaster Recovery Microsoft Office Money IT Support Productivity Employer-Employee Relationship Smartphones Chrome Managed Service Provider Applications Phishing Windows 10 Upgrade YouTube Risk Management Social Media Antivirus Website Government Office Tips Maintenance Data storage BYOD Big Data IT Management Settings Robot Save Money Google Drive Content Filtering Bandwidth End of Support Business Intelligence Information Miscellaneous Virtual Reality Data loss Unified Threat Management Apple Telephone Systems Two-factor Authentication desktop Company Culture Avoiding Downtime Storage SaaS Scam Firewall Holiday Managing Stress Laptop The Internet of Things Alert VPN Wireless Spam Computing Data Security Outlook VoIP WiFi HIPAA Business Technology Server Management Vendor Management Virtual Private Network LiFi Monitors Mobile Device Touchscreen Paperless Office Hosted Solution Mobile Security Administration Workplace Tips Mouse Automation Internet Exlporer Shortcut Distributed Denial of Service Apps Users Halloween Compliance VoIP Unified Threat Management Cryptocurrency Hotspot Comparison IT solutions Going Green IT Technicians Optimization Firefox Superfish Google Docs Connectivity Safety Bluetooth Education Hacks Staff Leominster Address Permissions Modem FinTech Remote Computing Onboarding Language Value Patch Management Managed IT Service Google Wallet Scary Stories Regulations Network Congestion Slack Digital Payment User Error Bitcoin Disaster Specifications Printing Running Cable Mirgation Recycling Customer Relationship Management Digital Business Growth IoT Password Augmented Reality K-12 Schools Wi-Fi Legal Buisness Cookies Writing MSP Digital Signage Collaboration Heating/Cooling Multi-Factor Security Computing Infrastructure Virtual Desktop Professional Services Break Fix Unified Communications Drones Sports Social Networking Computers Monitoring Time Management Printer Windows 8 Uninterrupted Power Supply Search Black Friday Chatbots Dark Data eWaste Document Management Spyware Networking Hacker Star Wars Wearable Technology Network upgrade Computer Care IBM Emergency Deep Learning Nanotechnology Retail Development Troubleshooting File Sharing Servers Google Calendar Alerts USB Politics Solid State Drive Dark Web Motherboard Display Cables Spying Network Management Access Control Cyber Monday Identity Customer Service Continuity Analysis Identity Theft Alt Codes Fraud Cost Management Cybercrime Smart Office Training Corporate Profile Bring Your Own Device Operating System Downtime Screen Reader Office Charging Samsung Legislation Licensing Dongle Tech Support Hard Disk Drive Microsoft Excel Budget Marketing Wires Employee-Employer Relationship Automobile SharePoint Social Dell Managed IT Smart Technology Information Technology Gadgets Solar Chromebook Managed Service Quick Tips Techology Typing Humor Assessment Current Events Work How To WannaCry Lenovo Best Practice Smart Tech Social Engineering Cabling Statistics Tablet Cooperation Service Level Agreement Websites Mail Merge Blockchain Router Voice over Internet Protocol PowerPoint Google Maps Downloads Upgrades Gadget Web Server what was your? Emoji IT Budget GPS Crowdsourcing Personal Information Botnet IT Consultant 3D Printing Cameras Cortana Tracking Meetings Machine Learning Cleaning Processors Unsupported Software CCTV Virtualization Webcam Update Mobile Device Management Computer Repair Relocation Mobile Data Error Point of Sale Ben McDonald shares Recovery How To Work/Life Balance Mobile Computing Health Private Cloud Printers Travel G Suite BDR Black Market Law Enforcement Supercomputer CrashOverride Electronic Medical Records Staffing Regulation Notifications Motion Sickness Physical Security Taxes Twitter Administrator

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3