Tuesday, July 19, 2011

Development of the ESIA Slot, ISA and PCI

A computer can not be separated from the motherboard, other than a place to install the processor and memory, there is also the installation of other cards such as VGA Card, Sound Card, Modem Card, Lan Card, etc..

In its development, computers have evolved, sepertihalnya for VGA slot, progressing from EISA slot using Mono chrome VGA card, and then developed with a color VGA ISA slot, and VGA grown steadily apart from the ISA slot to slot AGP 2x, AGP 4x to 8x, and continues to experience growth until now known as PCI-Express slot for VGA card.

For others like Sound card, Lan Card, to model today's motherboards are already using Onboard facilities, even to vga onboard as well. So the smaller the motherboard because there is no slot ESIA and only comes as much as 2 ISA slots.

To know the development of a card slot on the computer let's try to discuss it:

EISA

Bus EISA (Extended / Enhanced Industry Standard Architecture) bus is an I / O, introduced in September 1988 as a response to the launch by IBM's MCA bus, given that IBM wanted to "monopolize" the bus MCA to require others to pay royalties to license the MCA. This standard was developed by several vendors IBM PC Compatible, in addition to IBM, although that greatly contributed to the Compaq Computer Corporation. Compaq EISA also likely to form the Committee, a nonprofit organization designed specifically to regulate the development of the EISA bus. In addition to Compaq, there are several other companies that developed the EISA if sorted, then the collection company can be termed as WATCHZONE:

    Wyse
    AT & T
    Tandy Corporation
    Compaq Computer Corporation
    Hewlett-Packard
    Zenith
    Olivetti
    NEC
    Epson

Although offering significant improvement when compared with the 16-bit ISA, EISA-based cards only a few on the market (or developed). That was just a hard disk array controller card (SCSI / RAID), and the server network card.

EISA bus is basically a 32-bit version of an ordinary ISA bus. Not as MCA from IBM really new (architecture and design their slots), users can still use 8-bit ISA cards or 16-bit long into the EISA slots, so this has added value: backward compatibility (backward compatibility ). Like the MCA bus, EISA EISA card also allows the configuration automatically using the software, so you could say EISA and MCA is the pioneer of "plug-and-play", though still primitive.

ISA
ISA (Industry Standard Architecture) is a bus architecture with a data bus width of 8-bit IBM PC was introduced in 5150 on 12 August 1981. ISA bus is updated by adding the data bus width to 16-bit on IBM PC / AT in 1984, so this type of outstanding ISA bus is divided into two parts, namely the ISA 16-bit and 8-bit ISA. ISA is the basic and most common bus used in IBM PC until 1995, before being replaced by PCI bus, which was launched in 1992.

8-bit ISA

8-bit ISA bus is a variant of the ISA bus, the bus width of 8-bit data, which are used in IBM PC 5150 (initial PC model). This bus has been abandoned in modern systems to the top but Intel 286/386 systems still have it. This bus speed is 4.77 MHz (same as Intel 8088 processor in the IBM PC), before 8:33 MHz upgraded to the IBM PC / AT. Because it has a bandwidth of 8-bit, then it has a maximum transfer rate is 4.77 Mbyte / sec or 8:33 Mbyte / sec. Despite having a slow transfer rate, including the sufficiency of this bus at the time, because the buses I / O ports like serial, parallel ports, floppy disk controller, keyboard controller and the other is very slow. This slot has 62 connectors.

Although a simple design, IBM did not immediately publish the specifications when it launched in 1981, but had to wait until 1987, so that the supporting device manufacturers a little inconvenience to make the 8-bit ISA-based.

16-bit ISA
16-bit ISA bus is an ISA bus has a bandwidth 16-bit, allowing the transfer rate is two times faster than the 8-bit ISA at the same speed. This bus was introduced in 1984, when IBM released the IBM PC / AT with the Intel 80286 microprocessor in it. Why IBM increases to 16-bit ISA is because the Intel 80286 has a data bus which has a width of 16-bit, so that communication between the processor, memory, and motherboard should be done in 16-bit ordinal. Although these processors can be installed on the motherboard that has the I / O bus with a bandwidth of 8-bit, this can menyababkan the bottleneck on the bus system in question.

Instead of creating a bus I / O is a new, IBM was just a little overhaul of the design of ISA 8-bit long, ie, by adding a connector 16-bit extensions (which add 36 connectors, making it 98 connector), which was first launched in August 1984, the same year when IBM PC / AT was launched. It's also the reason why 16-bit ISA referred to as the AT-bus. This indeed makes the interference with some 8-bit ISA cards, so IBM left this design, to a design in which two slots are combined into one slot.

PCI

PCI (an extension of the English language: Peripheral Component Interconnect) bus which is designed to handle some hardware. PCI bus standard was developed by a consortium of the PCI Special Interest Group formed by the Intel Corporation and several other companies, in 1992. Purpose of the establishment of this bus is to replace the bus ISA / EISA previously used in the IBM PC or compatibles.

Old computer using ISA slot, which is a slow bus. Since its emergence around 1992, the PCI bus still in use today, to get out the latest version of PCI Express (add-on).



Enhanced by Zemanta

Monday, July 18, 2011

Functions and Benefits of Computers

In today if someone does not understand computers practically obsolete, ancient and clueless. While in the field of work of all people are in demand to understand using the computer, because the computer is a means to simplify and speed up the work.

Everyone has different reasons when they were asked about what functions the computer, their answers include:

    Job easier.
    As a communication tool
    As a tool for entertainment

Most people will answer the three reasons above. Also many parents who were born in the days of the past did not understand at all the benefits of computers, so they do not think computers are important and result in the generation penerusnyapun they do not emphasize or teach their children to and must understand the computer field.

In the computer world all things, all subject areas, classroom and in the computer business, education and science even more complete when obtained from a computer with Internet media compared with that in science lessons or get from the school.

Now let's discuss what functions and benefits of computers to us:

1. As a means to facilitate the computer:

With a lot of computer work that can be resolved easily, if the first person to type the letter must be with a typewriter, and if there are errors then the paper will be torn and re-type back, but that with the typewriter that has the type of document can not be edit again, while using the computer we can type a document, edit and save the document to be edited repeatedly.

2. Kompter As a Means of Communication

Ancient times when communicating with someone who was away from us, we can use the telephone facilities, but that we only heard friends or relatives. With computers we can:

    Talking with friends or relatives we
    As he spoke we could see them using webcams
    Can write our words to them (chat!)
    Also we can write to them (Email)
    We can send pictures or files to them, etc.

3. Computer as a Tool for Entertainment

In the past we only radio entertainment tools, tape, television and the streets to find out the conditions and situation of a region. With computers we can mengghibur dirikita with various facilities contained on a computer include:

    Hear the songs or music via CD / DVD or via the Internet
    Watch vidoe tapes via CD / DVD or via the Internet
    Playing Game, with gaming applications that we own or Game Install online with the Internet.
    In touch with friends through chat! Facilities, or Webcam
    Watch TV, the TV channel reciver that we put on the computer or through a TV Channel Online with Internet

4. Computer as a Tool Education

Formerly only educational facility we get through school, and in addition to the school of education information can be obtained through the medium of Radio, Television, Newspapers, and places of course. By using a computer connected to the Internet or not we can get the education and science, among others:

    Of the applications that we install. Every application that we install must have his help menu (Help) is a tutorial how to use the program and training.
    Install applications that we can make us become experts in several fields such as: Adobe photoshope, with this application we can become a proficient field of graphics, Power Point; with this application we become an adept in the field of percentage, Autocad; with this application we could become an adept in the field of architectural design, etc..
    Apart from the applications that we install, when we are connected to the Internet which we can obtain an education or science such as: History, Culture, Mathematics, Social Sciences, Medicine or Health, Economics, Politics, Website designe, language (any language can be obtained) , etc. Religious knowledge.

5. As Computer Information Facility
With computers we can see or obtain the information we need such as:

    Educational information, Places of Education
    Entertainment information, look for places Entertainment
    Travel information, find and book a ticket transportation has
    Product information, find the product you want.
    Job information, job menjari.
    Information News, look for events or news at home and abroad
    Weather information, find out the current weather conditions
    Traffic information, knowing the traffic situation
    Health information, health tips and tempat2 looking for treatment.
    Political Information
    Trade Information
    Business information, look for opportunities to open a business
    and much more information can be obtained from the computer connected to the Internet.

6. Computers For Business Facilities

In addition to communications, Easing employment, and entertainment devices, computers can also be used as a tool to do a lot of businesses that bring in revenue for us, among others:

    Creating Computer Rental
    Creating Warnet
    Make Business printing
    Creating a business vidoe Editing
    Creating Business Ringtones and Wallpapers to the Hp
    Make Business Sablon
    Creating business and Install Computer Software Service
    Architectural Design to open a business.
    Opening Business Graphic design for advertising
    Opening Business Website Design
    Opening Business akounting programmers and financial
    Opening Business Computer Course
    Creating a Web Service as a medium of information
    Fabricate and create online books that can be sold
    etc.

7. Computer In Control Measures

In some factories, Hospitality, and many computer companies used as a means to control or operate the system such as:

    Controlling the security camera
    Robots control the operation of machinery plant
    Controlling Escalator
    Pengontorlan recording studio lighting for lights
    Control Video Editing equipment
    Control of road traffic lighting
    Network Control System Network
    etc.

But of all the positive things that can be obtained from the computer, many of the negative side of that caused by computer users include:

    With the computer facilities as a means of entertainment such as chat and gaming, many people who fall asleep so that they forget about their duties and responsibilities jawap, such as learning, working etc..
    By accessing situs2 displaying pornographic images and videos can damage a person's character.
    Many acts of fraud by creating a website to earn money easily.
    Programmers known as hackers, who can take a person's data to be traded, and can damage the system.

But it's all good and bad computer functions depending on the wearer, and I am sure that the computer was not created to make a bad thing, but to help humans in facilitating all areas of work.

So my first exposure on the functions and benefits of computers
Enhanced by Zemanta

Danger of Anti Virus program

Since the discovery of the virus has undergone considerable technological development, as well as existing antivirus program. Unfortunately the development Antivirus usually only pursue the development of the virus and not try to intercept them. Antivirus is up (technology) can actually invite danger to the wearer.

When the viruses were detected its existence, the new viruses are always popping up with more advanced technology that makes antivirus become helpless. Antivirus old for example, can always be made with stealth technology, so when the antivirus is trying to detect files that other, was actually a stealth virus that spread itself to every file that is checked.

In various magazines of course, you often see any antivirus programs special unit (specific) which aim to detect one type of virus. Normally the antivirus makers do not make the correct ways to use this antivirus program, although specific antiviral are at great risk if not used correctly.

Antivirus can detect only one specific type of virus (and possibly some of its variants) and is usually able to disable the virus in memory. If you find a virus and you are sure the name you can use the Antivirus virus of this kind, but if you do not know, you should not try. If you find that active virus is another virus, which is certainly not detected by antivirus, the antivirus can actually spread the virus exist throughout the program files are examined.

The danger is even scarier is that if one of the antivirus detects a virus and one to clean so that the program file you are trying to fix it become damaged. This incident never happened for example in the case DenHard virus, the virus is really similar to the die hard, but these viruses use different techniques to restore the original header file, some antivirus trying to clean it destroys the virus's program files are located. In addition to the case DenHard virus, even this case ever (and probably still will continue to) occur in some viruses. One reason the virus makers make a similar virus is a virus that is difficult to clean, because the antivirus makers do not like it if the virus can easily be cleaned by the user.

HAZARD SOURCE ANTIVIRUS PROGRAM

Antivirus programs can be dangerous because of the following reasons:

    Some antivirus programs using only simple techniques that can easily be devised by the virus for example an antivirus program to check only a few bytes at the beginning of the virus, the virus could have made other versions of the same virus at the beginning but it differs in important parts, for example in routine encryption / decryption of the original file header. This would make a destroyer antivirus program file is not the savior file. Some antivirus can also be tricked by varying the antivirus signature files. Signature file is a file that contains the ID of any known viruses by antivirus software, if the ID is the change then the antivirus will not know him. A good antivirus should be able to check if the file signature is changed.
    Antivirus programs do not create a backup file is cleared. Often the antivirus program (mainly specific) does not provide a means to create backups of the files cleaned up, but this is very important if the cleaning process failed.
    Antivirus programs do not do self check. Self check is necessary, the antivirus program can only be changed by someone else before getting into the hands of users. Commercial antivirus programs usually do a self check to make sure he was not modified by anyone, but some are not and this is dangerous. At the local antivirus programs, which often included several articles on computers, typically include source code, you should compile your own source if you are in doubt on the authenticity of his exe file.
    Antivirus programs can be resident in the off easily Antivirus resident who either should not be detected and uninstalled easily. Examples of poor resident antivirus is VSAFE (in the DOS package). VSAFE can be detected and disabled by using the interrupt (try you learn / debug vsafe existing programs in DOS so you understand). Users will get a false sense of security by using this kind of antivirus. There is no sense of security was better than a false sense of security.
    Antivirus programs do not give warnings expired. Over time, viruses are popping up more and more sophisticated techniques. A good antivirus program should give a warning if the Antivirus used is too out of date. This is important so that antiviral events that spread the virus did not recur.

HERE'S WHAT YOU NEED TO DO AS A USER

As the user's antivirus program there are several things you can do to minimize the risks of using antiviral

    Look for a good antivirus, well here it means the program can be trusted to detect and eradicate viruses that exist. Do not be seduced by the promises offered by the antivirus vendor, and do not be lulled by the name of the brand is quite famous. Try to find comparisons between various antivirus in various magazines / websites on the internet.
    Always use the latest Antivirus, you can get it from the Internet or from magazines. Antivirus old are at great risk if used (more than 6 months have been very dangerous).
    Make a backup for your data and programs are important.
    Make the process of cleaning the virus correctly if you find a virus
    Make sure that your Antivirus programs can is the original, it is likely someone has changed the antivirus, or perhaps menularinya with a virus.
    Call an expert if you feel unable to cope with a virus on your computer or network.

A good step cleaning process is as follows:

If you run a personal computer

    Boot your computer with a startup floppy disk clean of viruses (and write-protected)
    Run the program a virus scanner / cleaner on an infected file
    Try running the file, if the file becomes corrupted, do not go on anymore
    If the program can run smoothly, piloted once again on some files (look for the small size, the medium and large). The file size is huge need to be checked, this file usually contains internal overlay that makes the file is damaged if exposed to the virus.

If you are a network administrator, you should take a sample of the virus to a floppy disk and try to clean it on another computer, this was done not to disturb the work was probably done by someone else. It is also to anticipate, the possibility of a new virus that is similar to other viruses (imagine what would happen if something goes wrong cleaning so the entire program on the network becomes unusable!). If it fails to clean you need to call an expert to deal with, or seek further information on the Internet. Experiments on several files aim to prevent false or incorrect detection and repair by antivirus programs. If the virus is considered dangerous and activities using the network can be postponed temporarily, perhaps to temporarily shut down the network.

PROGRAMMER IF YOU DO THIS YOU NEED

Nowadays to be a good antivirus programmer is not easy, you need to know the techniques of programming a virus that is every day more and more difficult. Antivirus program that you create should also follow the development of virus technology. To make a good antivirus program is not easy, but there are some things you need to remember as a maker of antivirus if you want to program you used another person, and not endanger the person

    Your program should be able to turn off the virus in memory, and can give a warning if there is something strange on the user's computer memory (eg a large base to less than 640 Kb)
    In making the ID viruses select multiple locations, a good location is at the beginning of the virus and the important viruses (eg the decryption header in the original program) is to make sure nothing is changing locations and encryption system (if any) the original program header.
    If the data / header encrypt, verify the data obtained from the calculations, for instance see whether the CS and the original IP in the can from the calculations still within the limits of the file, or whether the first instruction in the COM file jmp reasonable (less than the length of the file).
    Create a backup file if the file is cleaned feared damaged
    Do a self check at the beginning of the program. If not all parts of the program can be self check, the ID viruses need to be examined whether changed or not (eg checksum).
    Make a clear explanation of how the use of antiviral
    If the program can only be run in DOS when the program is run always check whether the program is actually running in DOS
    If you want to create an antivirus program resident, do not wear ID viruses which are not encrypted in memory, other antivirus which antivirus you are not familiar with it, it will assume the existence of a (or several) active virus in memory. This could happen, because some antivirus scan all memory of the ID virus.
     For a non-resident antivirus technique No. 8 also needs to be used, is necessary for the other antivirus programs do not think the program is exposed to the virus. Sometimes the programs also leave scars in memory, which may be suspected by other antivirus as a virus. If you do not want to apply these techniques, you can erase the memory variable ID virus after use.
    If possible, for polymorphic viruses that use heuristic methods (or emulation) to scan and emulation techniques to decrypt, or restore the original program.

10 things that should be enough, you can manually add it if necessary. Eg problems scanning speed and others.

Presumably after reading the above article, users and antivirus programmers can gain new knowledge about the computer's antivirus. For users of antivirus, you should more carefully, and diligently to update your antivirus. It is very necessary, especially for those who are connected to the Internet, many viruses that spread themselves via e-mail, and by utilizing some of the bugs from the email client you some viruses can be spread without your knowing it (the time this article was made, there are reports from reliable sources that there is a bug in Outlook that allow attachment in execution without the knowledge of the user).

For the programmer antivirus, presumably you are moved to learn some more about the techniques of virus, and techniques to eradicate. Today virus writers in Indonesia have not been too much, but later when it emerged a variety of high-tech artificial virus with the nation itself, of course, we should be able to remove it (properly of course), would not we be ashamed, if you have to rely on foreign-made antiviral ?.

This article is not a complete article about the making of a good antivirus program, nor is it a complete tutorial on the use of antiviral properly, but only a short article for the users and programmers more aware of viruses with more attention to aspects of the antivirus.



Enhanced by Zemanta

Sunday, July 17, 2011

Power Supply

A computer other than the main component of Motherboard, Processor, Memory, and others, they all need a Power supply. Power Supply is also an important component to a computer. A power supply has several connectors for power distribution to antaralain computer components to the motherboard, CD / DVD room, HDD etc..

Power supply has developed, adapted to the development of the motherboard and processor. There are several types of power supply among others:

Power To Motherboard

1. Power Supply AT
Has a 12 pin connector, this connector is used for older computers are pentium 2 down. There are two power cables to the motherboard consists of 6 pins. Mining section called Power 8 (P8) and the second part is called Power 9 (P9). With mounting between P8 and P9 when in Align the black cable in the midst. Apart from the power cable to the motherboard is also included with the cable and molex connector Berg

2. 20 Pin ATX power supply
Power supply is used for computer pentium 2 and pentium 3, in which power is distributed to the motherboard using a connector ATX 20 pin connector and coupled with a connector for the floppy disk connectors (Berg) and connectors for hard drives, DVDs etc. (Molex connector) which has 2 voltage is 12 volts and 5 volts.

3. Poser Supply ATX 20 +4 Pin
Development of the motherboard and processor, as used in the Pentium 4 and above, the number of pin power connector to the motherboard there are two connectors with 20 pins and 4 pins and also comes with several connectors Molex and Berg.

Now let us explain one by one cable connector at the power supply apart from the power for the motherboard.

1. Berg Connector: This connector is a small, used of power floppy disk, this is usually used for older computers are Pentium 4 down, today many power supply already negate this berg connector for floppy disks are not used anymore replaced with flash disk. On this connector there is a voltage of 12 V (black (-) and Yellow (+)) and 5 volts (black (-) and red (+))

2. Molex connector, this connector consists of 4 pins with a voltage of 12 volts (black (-) and Yellow (+)) and 5 volts (black (-) and red (+)), used as a power to the hard drive, CD / DVD Room.

3. Sata Power Connector, The evolving technology where computer equipment has been using sata, then over time the Molex connectors are no longer held in the power supply, sata connector is also used as a power for the HDD and CD / DVD. Bisasanya for the power supply still uses Molex connectors to connect the Molex connector to the sata cable.

4. Connector Pin Intel 12 v 4
This connector is used as a power supply to the motherboard using an Intel Pentium processor, and some AMD processors. Starting from sebahagian Intel pentium 4 and pentium dual core and above, its function as a provider of an additional voltage of 12 volts to the processor.

5. Connector 6 pin PCI-E connector is rarely found on the PC. Usually this power supply berfungis to add power to the PCI-E graphics card, which will be used to process Grafick work, video editing, and 3d Game. Power supply not all have this connector, only a special power supply 6 pin PCI-E can be purchased in the market, and if the PCI-E VGA card you have a socket for power.

dunovteck
Enhanced by Zemanta

Saturday, July 16, 2011

Controlling Electrical Appliances with Computers

Many computer use, not only for typing, playing games, the Internet and also for entertainment, can also serve as a tool to control some household appliances that use electricity.

Here is the circuit to use the printer port of a PC, for control application using software and some hardware interfaces. Interface circuit with the given software can be used with the printer port of any PC for controlling up to eight electrical equipment.

Interface circuit shown in images taken just one device, which is controlled by D0 bit at pin 2 of the 25-pin parallel port. Identical circuits for the remaining data bits D1 through D7 (available at pins 3 through 9) must use the same cable. The use of opto-coupler ensures complete isolation from the PC relay driver circuit.

Many ways to control the hardware can be implemented using software. In C / C + + one can use the outportb (portno, value) function is the address where portno parallel port (usually 378hex to LPT1) and 'value' is the data to be sent to the port. For value = 0 all outputs (D0-D7) is not active. For value = 1 D0 ON, value = 2 D1 ON, value = 4, D2 is ON and so on. eg. If the decimal value = 29 () = 00011101 (binary) -> D0, D2, D3, D4 are ON and the rest OFF.
Enhanced by Zemanta

Friday, July 15, 2011

How Ink Cartridges Work

The ink cartridge is an important component that is used to print various documents. This component can be refilled or can be replaced with a new cartridge. The process of printing is not possible without the ink cartridges. This article is to know about the ink cartridges and how they help in printing with superb quality for the print-out.

In the inkjet printer ink cartridge the process by which the technical work that way. by finding a partition in which the reservoir ink cartridge is placed and heated by a small piece of metal. At the time the printer is given a signal to the printer, the flow across the metal plate, which warms the metal. After the metal is heated in the ink cartridge will evaporate and be converted into small bubbles. This is a way out of bubbles from the nozzle one by one. This style will drip ink onto paper. This process is very fast and difficult to take a few milliseconds and printing processes that occur within a short time.

The process of printing through ink cartridges can take place smoothly and quickly only if the flow of ink cartridges through a smooth path. So to smooth the ink, the ink should be stored in liquid form. Sometimes there are complications in the printing process, this may be one of the main reasons for the causes mentioned above. However, if problems should arise in which the ink is dry, dry ink can be removed using the process of printing through ink cartridges can take place smoothly and quickly only if the flow of ink cartridges through a smooth path. So to smooth the ink, the ink should be stored in liquid form. Sometimes there are complications in the printing process, this may be one of the main reasons for the causes mentioned above. However, if problems should arise in which the ink is dry, dry ink can be removed by using isopropyl alcohol to gently rub in headnya.

Cartridge filled with a separate color. A cartridge filled with black ink and the other with three primary colors: red, blue and green and the presence of each color in the cartridge is a must. In addition, there are certain other cartridges are mainly used in photo printer.

Some of the best cartridges available in the market are Epson ink cartridges, which is a very popular choice. Ink in it is high quality and fast enough to dry on a paper that makes them great success among other products. This cartridge can be obtained from office supply stores and also on the web.

Each ink cartridge contains a number of separate ink tubes. High end manufacturer of ink cartridges adding electronic components to them. This makes it easy to communicate with the printer cartridge. Popular printer manufacturers, HP uses a thermal sensor in their cartridge, which allows the nozzle to spread the ink evenly over the paper in response to signals sent by the printer. ink begins to dry on the print head, be a need to change or refill the cartridges immediately. The delay in charging can damage the print head as the ink in the cartridges act as coolant that protects the heating element in it. After cooling to dry out and become a hot thermal sensors, heating elements to burn, causing damage Each ink cartridge contains a number of separate ink tubes. High end manufacturer of ink cartridges adding electronic components to them. This makes it easy to communicate with the printer cartridge. Popular printer manufacturers, HP uses a thermal sensor in their cartridge, which allows the nozzle to spread the ink evenly over the paper in response to signals sent by the printer. ink begins to dry on the print head, be a need to change or refill the cartridges immediately. The delay in charging can damage the print head as the ink in the cartridges act as coolant that protects the heating element in it. After cooling to dry out and become a hot thermal sensors, heating elements to burn, causing permanent damage to the printer head (Head Printers).

Usually the original ink cartridges can be very expensive. Therefore, people often turn to compatible ink cartridges. Compatible ink cartridges is an attractive alternative to original cartridges and are available at various online stores.
dunovteck 
Enhanced by Zemanta

Thursday, July 14, 2011

Processor


Development of technology, especially computer technology is very rapid, not to mention satisfied using the product we buy has appeared new products and old products from the computer into Diskontinue or no market. Especially with the processor, the processor is very rapid development, the development has sparked the development of a computer processor such as memory and other motherboard, not just the development of hardware and even software development is increasing, so our old computer was outdated when we bought new two years.

Processor is a hardware device that serves as a central regulator of the overall control and data processing activities on the computer.

Parts - Inside Processor

1. Register
Part processor that has a high transfer rate and is useful as a container while at the processor is processing data. Specifically, the register storing the location where the instruction will be taken, save when the decoded instruction, storing data at the ALU processing, and as well as storing the calculation results of the ALU. Register consists of 16.32, and 64 bits.

2. ALU (Arithmetic Logic Unit)
Part processor that is used to perform calculations and logic operations at the time the processor works.

3. CU (Control Unit)
Serves to translate the instructions into commands and executes the command.

What to Look on the processor

FSB (Front Side Bus)

FSB serves as a data transport path to the processor. If the FSB higher, the amount of data to be transferred to the higher. For Intel processors, the FSB is using a technology called quad pumping with units of Hz (hertz). FSB Quad Pumping is 4 times that of native FSB. For example, if the FSB is written on the brochure of 800 MHz, then the original FSB processor is only 200 MHz.

While AMD processors using the technology called HyperTransport FSB with units of T / s (transfers per second), which can double the bus width is used. Actually this technology as technology DDR (dual data rate) which can run at the time of the signal up or down signal. For example, if the original FSB running at 1000 MHz HyperTransport effective then running at 2000 MT / s.

Cache Memory

Cache Memory is part of the processor that serves to store data to be processed by the processor, cache size determines the amount of data that can be processed by the processor in one go. The units used in the cache memory is a byte. Levels in the cache of the most rapid are:
L1 Cache: fastest (currently around 30 GB / s)
L2 Cache: slower than L1 Cache (currently around 12 GB / s)
L3 Cache: slower than L2 cache (not present on most processors)

Core / Clock Speed

Core / Clock Speed ??is the speed of the processor used to process the data, with units of Hz.

Pin
Pin is the foot that can be mounted directly on the processor socket on the motherboard. But to pin LGA processor is not located in a processor but the motherboard.



Enhanced by Zemanta