Network Synergy Blog

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

What the Motherboard Does
You can think of the motherboard as the computer’s internal control center. It acts as a communications hub for your device. The motherboard is the central circuit board that the rest of your device’s components connect to and share data with. In other words, the motherboard is the device that allows the computer to do its job. Without a motherboard, a computer isn’t really a computer at all.

When the computer boots up, the motherboard will be the first part to receive power. Once it’s booted up, the motherboard will power other components that will then activate the other parts of your PC.

Parts of the Motherboard
There are several parts of a motherboard that are all needed in order for it to function as intended. Depending on the model, however, it will look a bit different and have a different form factor, or specifications. Still, all motherboards will generally have these basic components:

  • Chipset: The chipset is the device that allows data to transfer and flow to other components through the motherboard. The chipset is split into the Northbridge and the Southbridge. In short, it allows for communication between the various components of the motherboard.
  • CPU: The CPU, or central processing unit, is the part that transfers data from the Northbridge to all of the different parts of the computer. A more powerful CPU will allow for a faster and better experience.
  • Slots: A motherboard’s slots are used to hold together the various parts of it. Here are some of the pieces:
    • Random Access Memory, or RAM
    • PCI(e), which connects to expansion cards, like video, network, or sound cards
    • SATA, which connect to storage drives like HDD and SSD

Do you understand how the motherboard works better? Do you have any other suggestions for tech terms in the future? Let us know in the comments.

How Your Smartphone Keeps Your Data Safe
A New Perspective on Ransomware
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Tip of the Work Internet Exlporer Proactive IT CCTV Artificial Intelligence IT Support Compliance Writing Value Hacker Business Owner Small Business Outlook Distributed Denial of Service Uninterrupted Power Supply Fun Management Utility Computing Experience Regulation PowerPoint Remote Computing Communication Wi-Fi Paperless Office Apple Access Control User Error Mobile Technology IT Management Ransomware Excel Google Maps Computer Repair Secruity Programming Food Gadget Safety Politics Quick Tips Software as a Service Tech Term Big Data Employer-Employee Relationship Presentation Public Speaking Phone System Conferencing Proactive Relocation Documents Saving Money LinkedIn Data Backup Digital Payment Point of Sale 3D Microsoft Excel Encryption Social Media Two-factor Authentication Scary Stories Employee-Employer Relationship Smart Tech Statistics Network Management Automobile Save Money Data Security Operating System Software Users Miscellaneous Security Black Friday Solid State Drive Troubleshooting Google Technology Tips Remote Workers Telephone Systems Windows 10 Mail Merge Hard Drive Virtual Reality Automation Content Filtering Virus IP Address Deep Learning Congratulations Best Practice Vendor Management Motion sickness Chromebook Operations Managed IT services Virtual Desktop Workplace Tips Data Management Backup Files Crowdsourcing Innovation Best Practices Superfish Macro Mobile Office Unified Communications Entrepreneur Computer Infrastructure SharePoint Piracy Cost Management Computer Care Undo Marketing IT Consultant Data Managed IT Services Tip of the week Business Computing Touchscreen Save Time Education Managed IT Webcam Business Intelligence Typing eBay Staff Monitoring Nanotechnology Storage LiFi Multi-Factor Security Staffing Business Continuity Gmail Address Computing Infrastructure Augmented Reality Android Search Going Green Data Loss Chrome Twitter Net Neutrality Email Remote Monitoring and Management Data Breach Social Networking User Tutorials Hacks Identity Start Menu Machine Learning Managed Service Internet Video Surveillance History Retail Robot YouTube Productivity Geography Legislation Trending Enterprise Content Management Mobile Device Hosted Solution Leadership Hard Drives Technology Bluetooth Hard Disk Drive Money Lithium-ion Battery Print Server Government Recycling Data Recovery Server Botnet Document Management Gadgets Cameras Managed IT Service How To Networking 3D Printing Administrator Internet of Things Alerts Data Warehousing Vulnerabilities Error Sync End of Support Dark Web Environment Work/Life Balance Health Identities WiFi Upgrade Hotspot Technology Laws Smartphone Wires Bandwidth Display Scam Productivity Avoiding Downtime Buisness Malware Mobile Computing Star Wars Trainging Text Messaging Settings Website Passwords VoIP Recovery Cortana Phishing Modem eWaste Social IT Support Migration Lenovo Backups IT budget Analyitcs Applications Office Vulnerability Language How To Privacy Fax Server 5G Web Server Competition Smart Technology Servers Disaster Recovery Mobile Device Management Router Comparison Battery Cookies Mouse Scheduling Bring Your Own Device Inbound Marketing Legal Development Antivirus Law Firm IT Cloud The Internet of Things Logs Cleaning Alert Cables Assessment Computing Websites Telephony Mobile Data G Suite Halloween IT service Travel OneNote Smartphones Saving Time Tip of the Week Data storage Cache Downloads Running Cable Network Congestion Corporate Profile GPS Customer Relationship Management Company Culture Best Available People Physical Security Google Wallet Business Management Crowdfunding Current Events Word Digital MSP Laptop Redundancy Windows 10 Facebook Work Station IT Technicians High-Speed Internet Google Analytics IT Services Computers Asset Tracking Law Enforcement Techology Managed Service Provider Alt Codes Digital Signature IBM Connectivity Network Security Processors Enterprise Resource Planning Domains Efficiency Apps IoT Application Office 365 Hardware Hiring/Firing Fleet Tracking Disaster Resistance Mirgation Charger Virtualization USB Tablet Server Management Permissions Debate Identity Theft Mobile Security Monitors Maintenance Chatbots VPN App Service-based Business Office Tips Skype Downtime Network Printing PDF communications Consultation Patch Management PC Care User Tips Heating/Cooling Microsoft BYOD Emoji Black Market Online Currency Co-managed IT Social Engineering Blockchain Intranet Remote Monitoring Administration Business Growth Mobile Mobile Devices Computer Accessories Webinar Information IT Solutions Risk Management File Sharing Shortcut Samsung Cybercrime BDR Humor Notifications Fraud CIO Google Docs Windows 8.1 Update Windows 8 Holiday Streaming Media Unified Threat Management Public Cloud Refrigeration Upgrades Break Fix Collaboration Private Cloud Unsupported Software SaaS Tech Support Sports Spyware WPA3 Screen Reader Taxes Outsourced IT Drones Healthcare Regulations Managing Stress Disaster Bitcoin iPhone Hackers Memory Business Technology Google Drive Firewall Software Tips Spam Windows Information Technology Cloud Computing Licensing Hosted Solutions Budget Time Management Printer IT Consulting Cybersecurity Help Desk Wearable Technology Flexibility Firefox Unified Threat Management Cryptocurrency Mobility Knowledge Hacking Google Calendar Thank You Specifications Personal Information Motherboard Project Management Meetings Browser Wireless Microsoft Office Password Electronic Medical Records Supercomputer Wireless Technology Cabling CrashOverride Cyber Monday HIPAA Gaming Console Cooperation Training Consumers Tracking Customer Service Remote Support Business Virtual Private Network

      Latest Blogs

      Every business has some sort of management tasks that requires foresight, and staying up on them can keep headache-inducing situations from constantly causing downtime and costing ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube