Network Synergy Blog

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

What the Motherboard Does
You can think of the motherboard as the computer’s internal control center. It acts as a communications hub for your device. The motherboard is the central circuit board that the rest of your device’s components connect to and share data with. In other words, the motherboard is the device that allows the computer to do its job. Without a motherboard, a computer isn’t really a computer at all.

When the computer boots up, the motherboard will be the first part to receive power. Once it’s booted up, the motherboard will power other components that will then activate the other parts of your PC.

Parts of the Motherboard
There are several parts of a motherboard that are all needed in order for it to function as intended. Depending on the model, however, it will look a bit different and have a different form factor, or specifications. Still, all motherboards will generally have these basic components:

  • Chipset: The chipset is the device that allows data to transfer and flow to other components through the motherboard. The chipset is split into the Northbridge and the Southbridge. In short, it allows for communication between the various components of the motherboard.
  • CPU: The CPU, or central processing unit, is the part that transfers data from the Northbridge to all of the different parts of the computer. A more powerful CPU will allow for a faster and better experience.
  • Slots: A motherboard’s slots are used to hold together the various parts of it. Here are some of the pieces:
    • Random Access Memory, or RAM
    • PCI(e), which connects to expansion cards, like video, network, or sound cards
    • SATA, which connect to storage drives like HDD and SSD

Do you understand how the motherboard works better? Do you have any other suggestions for tech terms in the future? Let us know in the comments.

How Your Smartphone Keeps Your Data Safe
A New Perspective on Ransomware


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, October 22, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      YouTube Video Surveillance Scam Bluetooth Facebook Wi-Fi Documents Apps Features IT Consultant Office Tips iPhone Multi-Factor Security Thank You Cabling Data Security Data Backup Cloud Computing Information Technology Assessment Unified Threat Management Operations Conferencing Trainging Chromebook Document Management Travel Downtime Heating/Cooling Telephone Systems Privacy Business Continuity Internet Exlporer Digital Signature Alert Windows Web Server Managed IT People Security Logs Emoji Access Control Analyitcs Managed IT Service Computer Repair Automobile Fax Server Shortcut Staff Administration Mobile Computing Mobile Device Break Fix Cybercrime Tutorials Public Speaking Work Station WPA3 Save Money Quick Tips Tablet Webcam Internet SaaS Windows 8 Vulnerabilities Servers Specifications Value IT Support App Co-managed IT Scary Stories Solid State Drive Black Friday IT Services Environment Google Wallet Holiday Law Enforcement Spyware Encryption Google Electronic Medical Records Current Events Microsoft Excel Identities Mouse Halloween Software as a Service Windows 10 Managed Service Provider Firewall Private Cloud Enterprise Resource Planning IoT Presentation Backup CIO Users Knowledge Geography How To Intranet LinkedIn IP Address Vendor Management Cyber Monday Alerts Consultation Hard Drive Cooperation Customer Service GPS Leadership HIPAA Cloud Unified Communications Chrome MSP Budget Apple Avoiding Downtime communications Data storage Charger Screen Reader Politics IT Management Cache Hackers Electronic Health Records Vulnerability Computer Accessories BDR Unified Threat Management Cost Management LiFi Save Time Disaster Resistance Remote Support Maintenance Operating System Smartphones Bring Your Own Device Writing Flexibility Employer-Employee Relationship Physical Security Service-based Business IT Solutions Statistics Hard Drives Relocation Tip of the Week Employee-Employer Relationship Small Business Cameras Hotspot IT Consulting Computing Infrastructure User Tips High-Speed Internet Recovery Wireless Technology Printer Paperless Office Website Distributed Denial of Service Mobility Retail Safety Proactive CCTV Proactive IT Unsupported Software Best Practice Augmented Reality Saving Time Data Loss Cryptocurrency Business Growth Outsourced IT Experience Password Entrepreneur Tech Term Corporate Profile How To Superfish Applications Taxes Google Docs Network Security Competition Outlook Hiring/Firing WiFi Digital Blockchain Network Android Network Management Streaming Media Email File Sharing Cables Microsoft Office Microsoft Fun Settings Search Firefox Mobile Devices Address Troubleshooting CrashOverride Bitcoin IBM Domains Virtualization Google Maps Office Network Congestion Social Networking Touchscreen Inbound Marketing Crowdsourcing Managed IT services Display VoIP Law Firm IT Black Market Online Currency Storage Cookies Hosted Solution Business Technology Ransomware Monitors eBay Typing Technology Remote Workers Social Legal Gadgets Server Windows 10 Enterprise Content Management Software Tips Smartphone Virus Hacker Business Smart Technology Lenovo Data Recovery Migration Workplace Tips Cybersecurity Word Dark Web Going Green G Suite Mobile Utility Computing Technology Laws Computer Favorites Hard Disk Drive Best Available Miscellaneous Router Mail Merge PDF Connectivity Samsung Macro Virtual Private Network Piracy Health Notifications Running Cable Computer Care Uninterrupted Power Supply Identity Theft Managed IT Services Instant Messaging Customer Relationship Management Smart Tech Social Media Computers Remote Monitoring and Management Downloads Food Managing Stress Phishing Bandwidth Chatbots Sync Wires Efficiency Printers Language E-Commerce Content Filtering Antivirus Modem Google Calendar Business Owner Mirgation End of Support Trending Google Drive Cyberattacks Alt Codes Printing Business Management Regulations Cleaning Staffing VPN Congratulations Nanotechnology Marketing Drones Business Computing Webinar Business Intelligence Laptop Hacking Tip of the week Twitter IT budget Healthcare Upgrades Training 3D Management Robot Secruity Project Management 3D Printing Lithium-ion Battery Buisness Education Data Management Text Messaging Software Tech Support Virtual Reality Two-factor Authentication Hardware Hacks Programming BYOD Spam Office 365 PC Care The Internet of Things Innovation Tracking Redundancy Time Management Tip of the Work Mobile Office Google Analytics Hosted Solutions Public Cloud Motherboard Sports Remote Computing Application Compliance Backups Fleet Tracking Data Warehousing Crowdfunding Point of Sale Identity Undo Machine Learning Server Management Skype Memory Digital Payment User Error Best Practices Browser Legislation IT Support Gmail Saving Money Monitoring Wireless Bookmarks Artificial Intelligence Finance Scheduling Personal Information Mobile Security Productivity Data Gaming Console Mobile Technology History Botnet Patch Management Cortana Print Server Disaster Recovery Humor USB Government Net Neutrality Consulting Internet of Things Meetings Networking Technology Tips Administrator Licensing Mobile Data Regulation eWaste Remote Monitoring Excel PowerPoint Data Breach Wearable Technology Consumers Collaboration Social Engineering Deep Learning Asset Tracking Managed Service Debate Gadget Disaster Risk Management Computing Refrigeration Techology OneNote Passwords Processors Communication Infrastructure Start Menu Automation Malware SharePoint Managed Services Provider 5G Battery Upgrade IT service Comparison Read Only Recycling Virtual Desktop Permissions Company Culture Information Productivity Windows 8.1 Update Fraud Files Money Telephony Work/Life Balance Development Motion sickness Websites IT Technicians Error Big Data Supercomputer Phone System Mobile Device Management User Help Desk Star Wars

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube