BNMC Blog

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

What a CPU Does
The CPU (or central processing unit) is contained in the motherboard of your computer. Its job is to decode the instructions sent by the RAM (Random Access Memory) and forward them to the right piece of the system. No matter what you’re doing with your computer, your CPU is a necessary, even crucial component.

Many people mistakenly take this information and jump to the conclusion that a better CPU means improved performance, which does stand to reason. However, improved performance requires other components to be improved and upgraded as well. A better CPU will make your system, including your applications and other programs, function more quickly.

How It Does It
Despite the improvements made in computing, the fundamental functionality of a CPU has not changed since the component was first developed. There are three correlating jobs that the processor is responsible for: fetch, decode, and execute.

Fetch
The RAM sends the CPU coded instructions, which are bits and pieces of a larger operation the computer is undergoing. These instructions are stored in the Instruction Register.

Decode
After the instruction is safely stored, a specialized circuit called the instruction decoder gets to work. This circuit translates the coded instruction into signals that the other parts of the CPU can put into action.

Execute
Finally, these signals are sent to those other parts of the CPU, and the process is completed. This final instruction is also added to the CPU register’s memory, making it simpler and faster to access the next time.

Selecting A CPU
Switching out your CPU can be a simple way of upgrading your system to improve its performance. As you pick one out, keep in mind that the more cores a CPU has, the better it will be. The first CPUs had one, most today have anywhere from two to four, and the top-of-the-line ones have as many as eighteen (or even more than that).

You should also keep other things in mind as well. Different CPUs can handle different amounts of data at once, as annotated by the terms “32-bit” and “64-bit.” Some processors are also faster than others, as determined by their frequency. This means that some dual-cores can potentially “beat” a quad-core. Plus, you need to keep in mind what your motherboard can support. The best CPU won’t do you any good if it doesn’t work with your computer.

Need Help?
BNMC is here to offer you any assistance you may need with your IT solutions. For more information, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 17 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Business Computing Malware Hackers Network Security Tech Term Productivity User Tips Google Business Software Computer Internet Microsoft Mobile Devices IT Services Hosted Solutions Efficiency Ransomware Communication Small Business Android Hardware Smartphone IT Support Data Managed IT Services Innovation Backup Saving Money Browser Workplace Tips Cloud Computing Data Recovery Business Continuity Data Management Windows 10 Windows Managed IT Services Internet of Things Microsoft Office App Cybersecurity Business Management Productivity Data Backup Server Word Remote Monitoring Phishing Outsourced IT Mobile Device Windows 10 Disaster Recovery Upgrade Encryption Passwords Artificial Intelligence Gmail Office 365 Facebook Vulnerability Network Money Users IT Support Applications BYOD Employer-Employee Relationship Website Information Infrastructure Analytics Tip of the week VoIP Smartphones communications Chrome Managed Service Provider Data storage Government Access Control Router IT Management YouTube Social Media Display Risk Management Employee-Employer Relationship Company Culture Paperless Office Google Drive Office Tips Managed Service Content Filtering Bandwidth Robot Miscellaneous Save Money Big Data Automation Virtual Reality Antivirus Settings Maintenance Hacker Networking SaaS Mobile Security Document Management VPN Holiday Computers Data Security Outlook Wireless Spam Computing Business Intelligence Business Technology Operating System WiFi Server Management Retail Alert LiFi Virtual Private Network Touchscreen Quick Tips Hosted Solution Administration Tablet Mouse Vendor Management Monitors Laptop Managing Stress The Internet of Things Unified Threat Management Apple Data loss Education Two-factor Authentication Development Avoiding Downtime End of Support Storage Telephone Systems desktop Scam Downtime Printing HIPAA Firewall Gadgets Monitoring Wires Shortcuts Licensing Dongle Search Black Friday Solar Uninterrupted Power Supply Deep Learning Emergency Wi-Fi Streaming Assessment Spyware Servers Mobile Device Management Google Calendar Writing Dark Web Halloween Troubleshooting Smart Tech Computer Care IBM Network Management Virtualization Work File Sharing Spying Voice over Internet Protocol Solid State Drive Alt Codes Dark Data Update Security Cameras Cooperation Service Level Agreement Cyber Monday Compliance Bring Your Own Device Human Error Hotspot Internet Exlporer Identity Theft Legislation Analysis Budget Microsoft Excel Scary Stories Politics Connectivity Training Corporate Profile Social SharePoint IT Technicians Optimization Modem FinTech G Suite Hard Disk Drive Typing Techology Customer Service Humor Managed Services Staff Leominster Automobile Managed IT Information Technology Smart Technology Running Cable Regulations Dell How To Best Practice Lenovo Buisness Device Language Value Statistics Current Events Office Samsung Cabling Mail Merge Blockchain Sports Tech Support LED IoT WannaCry Downloads Virtual Desktop Mirgation Recycling PowerPoint Cookies MSP VoIP Cryptocurrency Unified Threat Management Chromebook Laptops Augmented Reality K-12 Schools Google Maps Apps Shortcut Distributed Denial of Service Social Networking Firefox Superfish Google Docs Mobility Computing Infrastructure Professional Services IT solutions Bluetooth Going Green Comparison Social Engineering Address Permissions Websites Co-Managed IT Star Wars Hacks Chatbots eWaste Onboarding Nanotechnology Bitcoin User Error Software as a Service Wearable Technology Network upgrade Patch Management Google Wallet Managed IT Service Motherboard Cables Customer Relationship Management Business Growth Print Toner Alerts USB Digital Payment Specifications Safety Cybercrime Slack Disaster Legal Marketing Content Fraud Cost Management Digital Heating/Cooling Password Multi-Factor Security Remote Computing Identity Continuity Digital Signage Screen Reader Charging Time Management Windows 8 Printer Network Congestion Smart Office Collaboration Unified Communications Drones Break Fix BDR CCTV Webcam Machine Learning Processors Unsupported Software Regulation Error Point of Sale Ben McDonald shares Computer Repair Relocation Mobile Computing Mobile Data Printers Travel Recovery How To Work/Life Balance Health Private Cloud Supercomputer CrashOverride Staffing Black Market Motion Sickness Taxes Administrator Law Enforcement Web Server what was your? Electronic Medical Records IT Budget Notifications Physical Security GPS Twitter IT Consultant Emoji Upgrades Gadget Cameras Crowdsourcing Meetings Personal Information Botnet Tracking 3D Printing Cleaning Cortana Entertainment

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3