Infracore LLC Blog

Tech Term: Defining Motherboard

Tech Term: Defining Motherboard

Inside its casing, your computer contains many parts. While these parts may not be moving, they are hard at work, enabling you to use your computer to accomplish your goals. For today’s Tech Term, we’ll take a closer look at just one, the motherboard, and examine what it contributes to your device’s operation.

What the Motherboard Does
Your computer’s motherboard is its internal control center, the communications hub for the rest of the device. It is through this circuit board that all of the computer’s components and peripherals connect and share data. In this way, the motherboard is what makes a computer a computer, and not just a box filled with disparate components.

When the computer first boots up, the first thing to get power is the motherboard. Its different components then activate the various other parts of your computer.

Parts of a Motherboard
In order to properly function, the motherboard requires quite a few pieces to be present and correct. While the layout, or form factor, varies based on the specifications needed, all motherboards have these basic components incorporated.

Chipset - the chipset is what enables the transfer and flow of data between the various other components of the motherboard. Divisible into two parts, the Northbridge and Southbridge, the chipset allows the different components to communicate with each other.

CPU - The CPU is the part of the motherboard that relays information from the Northbridge to the different parts that it communicates with. A better CPU will assist you in having a fast and efficient computer.

Slots - A motherboard’s slots are what hold the different pieces that make up a particular motherboard in place. These pieces could include:

  • Random Access Memory, or RAM
  • PCI(e), which connects to expansion cards, like video, network, or sound cards
  • SATA, which connect to storage drives like HDD and SSD

In short, your computer’s motherboard is a small, but absolutely critical component to the function of the device as a whole. Have any more questions about motherboards, or any other aspect of your technology? Reach out to us and let us know!

Encryption Helps Keep your Smartphone Secure
Preventing Identity Theft Should be a Priority, Bu...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business computing Hackers Malware Google Software Microsoft Internet Data Innovation Tech Term Smartphones Backup Hardware Email Browser Hosted Solutions Windows 10 VoIP Computer Business Continuity Android Business Mobile Devices Alert Small Business IT Services Managed IT Services Data Backup User Tips Computers Workplace Tips Disaster Recovery Communications Miscellaneous Smartphone Ransomware Office Outsourced IT Business Management Cloud Computing Productivity Law Enforcement Data Recovery Communication Artificial Intelligence Efficiency Cybercrime Windows Internet of Things Network Telephone Systems Managed IT Services Router Productivity Chrome Money Collaboration Cybersecurity Windows 10 Passwords How To Social Media Password Applications Facebook Virtualization Work/Life Balance Quick Tips Saving Money Upgrade App Health Office 365 Social Engineering Gadgets Phishing Apps Google Drive Word Automation IT Support Data Security Bring Your Own Device Save Money HaaS Office Tips Holiday Server IT Support Data Protection Vulnerability Spam Information Microsoft Office Hacking Two-factor Authentication Scam Data Breach Wi-Fi Mobile Device Management Private Cloud Connectivity Telephone System Data Management Sports VPN Electronic Medical Records Public Cloud IT Plan Samsung Fraud Bandwidth Training Mobile Device Operating System Marketing Entertainment BDR Unsupported Software USB Comparison Value Firewall Networking End of Support Battery Remote Monitoring Website CES Managed IT History Employer-Employee Relationship Keyboard Charger Content Management Remote Computing Windows 7 Settings Paperless Office Patch Management PDF Flexibility BYOD Business Intelligence Data Storage Cleaning Blockchain Identity Theft Managed Service Update Worker Legal OneNote Virtual Assistant Managed Service Provider Infrastructure Mobility Automobile Big Data Encryption Redundancy Government IT Management Computer Care Avoiding Downtime Spam Blocking Tools Employer Employee Relationship Password Manager IT solutions Physical Security Books Workforce Assessment Information Technology Computer Fan Sync Password Management Wireless Charging IT Consultant Devices Techology Users Mobile Computing Wearable Technology Trending Human Resources Benefits Humor Internet Exlporer Access Control Data loss File Sharing Google Docs Content Tip of the week Search Downtime Computer Accessories Business Mangement Smart Office Television Files Accountants Instant Messaging The Internet of Things NIST Cortana Leadership Hybrid Cloud Thought Leadership webinar Virtual Reality Camera Data storage Staff Amazon Authentication Screen Mirroring Augmented Reality Vendor Management Video Games Windows 10s Audiobook Windows Server 2008 How to Root Cause Analysis Bluetooth Gmail HBO Document Management Emergency Telecommuting Public Computer FENG Telephony Cryptocurrency Save Time Apple Google Apps Conferencing Worker Commute Software Tips Troubleshooting Specifications Loyalty Servers Smart Technology Amazon Web Services Current Events Internet exploMicrosoft Nanotechnology Education Cast Remote Worker Voice over Internet Protocol Practices Black Market Botnet Recovery Recycling Outlook Remote Work Skype Safe Mode iPhone Workers Addiction Emails Wireless Internet Warranty SaaS Digital Signature HVAC Two Factor Authentication Online Shopping Knowledge Advertising Smart Tech Computing Infrastructure Wiring Experience Scalability Solid State Drive Flash Relocation User Error Hosted Computing Meetings Travel Risk Management eWaste Frequently Asked Questions Machine Learning Wireless Start Menu Hiring/Firing Cache Wire Millennials Enterprise Content Management Evernote Network Congestion Unified Threat Management Music Multi-Factor Security Monitor HIPAA Audit Transportation Credit Cards Safety Inventory MSP Politics Rootkit Criminal Best Practice Excel YouTube CrashOverride Mouse Company Culture Compliance Managing Stress Regulation Twitter Printers Thank You Congratulations Webinar Printer WiFi

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Www.Office.Com/Setup | Microsoft http://Office.Com/Setup :- Office setup suite is an importan...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
Office Support Helpline - http://Www.Office.Com/ Setup :- Get started with your Microsoft Office Ins...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Office.Com/Setup | Office Com Setup :- We offer technical support for Microsoft office setup....