Infracore LLC Blog

Tech Term: Defining Motherboard

Tech Term: Defining Motherboard

Inside its casing, your computer contains many parts. While these parts may not be moving, they are hard at work, enabling you to use your computer to accomplish your goals. For today’s Tech Term, we’ll take a closer look at just one, the motherboard, and examine what it contributes to your device’s operation.

What the Motherboard Does
Your computer’s motherboard is its internal control center, the communications hub for the rest of the device. It is through this circuit board that all of the computer’s components and peripherals connect and share data. In this way, the motherboard is what makes a computer a computer, and not just a box filled with disparate components.

When the computer first boots up, the first thing to get power is the motherboard. Its different components then activate the various other parts of your computer.

Parts of a Motherboard
In order to properly function, the motherboard requires quite a few pieces to be present and correct. While the layout, or form factor, varies based on the specifications needed, all motherboards have these basic components incorporated.

Chipset - the chipset is what enables the transfer and flow of data between the various other components of the motherboard. Divisible into two parts, the Northbridge and Southbridge, the chipset allows the different components to communicate with each other.

CPU - The CPU is the part of the motherboard that relays information from the Northbridge to the different parts that it communicates with. A better CPU will assist you in having a fast and efficient computer.

Slots - A motherboard’s slots are what hold the different pieces that make up a particular motherboard in place. These pieces could include:

  • Random Access Memory, or RAM
  • PCI(e), which connects to expansion cards, like video, network, or sound cards
  • SATA, which connect to storage drives like HDD and SSD

In short, your computer’s motherboard is a small, but absolutely critical component to the function of the device as a whole. Have any more questions about motherboards, or any other aspect of your technology? Reach out to us and let us know!

Encryption Helps Keep your Smartphone Secure
Preventing Identity Theft Should be a Priority, Bu...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Google Business computing Network Security Microsoft Data Malware Hosted Solutions Hackers Software Innovation User Tips Backup Internet Tech Term Business Hardware Smartphones Mobile Devices Windows 10 Browser Business Continuity Smartphone Data Backup Email Computer Android IT Services Productivity VoIP Communications Business Management Disaster Recovery Small Business Cloud Computing Outsourced IT Managed IT Services Alert Workplace Tips Data Recovery Communication Chrome Managed IT Services Artificial Intelligence Computers Router Ransomware Miscellaneous Office Efficiency Network Law Enforcement Windows 10 Cybercrime IT Support Social Media Collaboration Cybersecurity Internet of Things How To Office 365 Productivity Password Applications Money Facebook Virtualization Telephone Systems Windows Passwords Holiday Word Mobile Device Work/Life Balance Social Engineering Gadgets Server Spam App Google Drive Automation Quick Tips Information Saving Money Wi-Fi Upgrade Health Apps Data Security Connectivity Keyboard Private Cloud HaaS Office Tips Scam Data Breach IT Support Vulnerability Settings BDR Microsoft Office Hacking Mobile Device Management Data Protection Managed Service Voice over Internet Protocol Mobility Bring Your Own Device Save Money Phishing Two-factor Authentication Infrastructure Employer-Employee Relationship Encryption Software as a Service Marketing Unsupported Software Managed Service Provider Charger Patch Management Remote Monitoring Government Managed IT Battery VPN Human Resources Cleaning Telephony Access Control Public Cloud Google Docs Worker Windows 7 Fraud Botnet Big Data Remote Computing Servers BYOD Comparison Computer Care Data Storage Website CES Flexibility Paperless Office End of Support History Electronic Medical Records Samsung Legal OneNote Machine Learning Bandwidth IT Management Content Management Training Automobile Redundancy Avoiding Downtime Virtual Assistant Entertainment Spam Blocking Business Intelligence USB Value Firewall Networking IT Plan PDF Blockchain Data Management Telephone System Update Operating System Sports Identity Theft Relocation User Error Password Management Security Cameras Cache Save Time Mobile Computing Millennials Troubleshooting Loyalty Content Downtime Evernote Smart Technology Current Events Search webinar File Sharing Multi-Factor Security HIPAA The Internet of Things Instant Messaging Screen Mirroring WiFi Criminal Virtual Reality Windows 10s Windows Server 2008 Monitor Smart Office Administrator Credit Cards Inventory Root Cause Analysis NIST Hacker Password Manager HBO Camera Workforce SaaS Video Games Audiobook Shortcuts Wireless Charging Devices Two Factor Authentication Knowledge How to Conferencing Software Tips Augmented Reality Trending Experience FENG Cast Risk Management Worker Commute Document Management Microchip Humor Internet Exlporer Cryptocurrency Business Mangement Hiring/Firing Education Outlook Accountants Social Cortana Thought Leadership Network Congestion Black Market Emails Remote Worker Staff Music Skype Files Search Engine Amazon Authentication Transportation Safety Hybrid Cloud Politics Rootkit Solid State Drive Flash Data storage Scalability Meetings Travel Safe Mode Gmail Employer Employee Relationship Computing Infrastructure Frequently Asked Questions Wireless Internet Warranty Telecommuting Books Assessment HVAC Vendor Google Apps IT Consultant Wiring Specifications Wearable Technology Start Menu Bing Amazon Web Services Nanotechnology Benefits Wireless Apple Audit Internet exploMicrosoft Recovery Recycling Computer Accessories Excel Wire Printer Remote Work Practices Television Enterprise Content Management Display Workers Addiction Leadership IT solutions Physical Security Unified Threat Management Digital Signature Best Practice Tools YouTube Help Desk Online Shopping Smart Tech iPhone MSP Vendor Management Computer Fan Sync Emergency Public Computer Information Technology Data loss Advertising eWaste Bluetooth Techology Users Tip of the week Mouse Hosted Computing Congratulations Company Culture Compliance Managing Stress Regulation Smartwatch Printers Twitter Webinar Thank You CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...