SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Introduction to
the CPU.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– CPU basics.
– Intel and AMD CPUs.
– Which one is right for you?
PACE-IT.
Page 4
Introduction to the CPU.
Page 5
According to Moore’s Law, the
number of transistors on an
integrated circuit will double
approximately every two years,
thus creating exponential growth
in the power of the integrated
circuit.
Page 6
– CPU (central processing unit)
characteristics.
» Speed: typically is the frequency at which one core of a CPU
operates; currently, it is measured in gigahertz (GHz). The
higher the number, the faster the core.
» Cores: the actual CPU on a chip. If a CPU is a multi-core CPU,
then it actually has multiple CPUs on the chip. The more cores,
the more simultaneous tasks that can be accomplished.
» Cache: expensive SRAM that is located on the CPU die. All
cache memory is much more expensive than regular RAM so
not much is used. L1 cache is typically embedded in each core
of the CPU. L2 cache is typically located just off of the CPU or
embedded in a coprocessor. L3 cache is still on the CPU die,
but is slower.
» Hyperthreading: the logical division of a CPU core. Through
special instruction sets in the CPU, it is made to look and
behave as if it has more than a single core.
Introduction to the CPU.
Page 7
– CPU characteristics.
» Virtualization support: when virtualization began it always
required fairly complex software and a host operating system.
CPU manufacturers have now built virtualization support into
some of their processors. This allows for easier and less
complex virtualization.
» GPU: some CPUs have an integrated graphics processing
unit (GPU) on the die. This allows for decent integrated graphic
performance, while not hindering the basic operation of the
CPU.
» Architecture (32-bit vs. 64-bit): this deals with the amount of
memory that the CPU can address (keep track of). A 32-bit
architecture can only address a maximum of 4 GB of RAM,
while a 64-bit architecture can address a theoretical maximum
of 16.8 million TB of RAM. In actuality, the maximum amount of
RAM that a 64-bit system can handle is established by the
motherboard manufacturer.
Introduction to the CPU.
Page 8
– Cooling.
» As a rule, the higher the performance of the CPU, the more
heat it will generate. Excessive heat will kill or burn out a CPU.
» Heat sinks: a device that is placed on top of the CPU. It
usually has a solid metal base but transitions to fins at the top.
A heat sink will draw heat away from the surface of the CPU
toward the top of the sink where it is radiated away into the
case.
» Thermal paste: a special compound that is used between a
CPU and a heat sink. It fills in the microscopic voids that are
present and will improve the performance of the heat sink.
» Fans: are used to help radiate the heat away from the heat
sink. They are designed to draw cooler air across the fins.
» Liquid-based cooling: works like a car’s radiator. The heat
sink actually has liquid being pumped through it to draw away
the heat; the liquid gets pumped to a radiator where the heat is
dissipated.
Introduction to the CPU.
Page 9
Introduction to the CPU.
Page 10
– Intel CPUs.
» Currently, Intel uses land grid array (LGA) CPUs. The
CPU does not have pins on the bottom of the chip; the
pins are located in the CPU socket with the CPU having
a corresponding contact point. Intel processors are
usually defined by their processor family (e.g., Haswell,
Ivy-trail) and socket type.
» Intel socket types: LGA 775, LGA 1155, LGA 1156, LGA
1366 (plus many others with more being introduced all
the time).
– AMD CPUs.
» Most AMD CPUs are pin grid array (PGA) CPUs. The
CPU has pins on the bottom that fit into holes in the
socket.
» AMD’s naming convention is based on processor family
and socket type as well.
» AMD socket types: 940, AM2, AM2+, AM3, AM3+, FM1,
F (as with Intel, this is not a comprehensive listing).
Introduction to the CPU.
Page 11
Introduction to the CPU.
Page 12
The key to determining the
correct CPU for you is
research.
When researching the purchase of a CPU, you need to consider
what you are trying to achieve as well as any budgetary
constraints. As a rule, the better the performance of the CPU, the
more it will cost and the newer the processor family is, the more it
will cost. Also in most situations, the software that is available
can’t take advantage of the full capabilities of the CPU, but it may
be able to in the future.
Introduction to the CPU.
Page 13
Introduction to the CPU.
CPU performance is usually based on the frequency speed, the number of
cores present, and the type and size of the cache memory. Hyperthreading
is the logical division of the core to make it act and look like more.
Virtualization support in the CPU has simplified the virtualization process. A
CPU may be either 32-bit or 64-bit. Cooling is very important to the CPU.
Topic
CPU basics.
Summary
Intel tends to use an LGA style of socket while AMD tends to use a PGA
type of socket. The CPUs of both manufacturers are known by the
processor family and the socket type that they use.
Intel and AMD CPUs.
Research is the key in determining which CPU is the right CPU for the
application. Modern CPUs are more powerful than most software
applications, but that does change rapidly.
Which one is right for you?
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (9)

Pace IT - Display Devices
Pace IT - Display DevicesPace IT - Display Devices
Pace IT - Display Devices
 
Pace IT - Introduction to the Bios
Pace IT - Introduction to the BiosPace IT - Introduction to the Bios
Pace IT - Introduction to the Bios
 
A+chapter 1 identify principles of personal computers
A+chapter 1  identify principles of personal computersA+chapter 1  identify principles of personal computers
A+chapter 1 identify principles of personal computers
 
Pace IT - Common Laptop Components
Pace IT - Common Laptop ComponentsPace IT - Common Laptop Components
Pace IT - Common Laptop Components
 
Faq Multiuser P Cstation
Faq Multiuser P CstationFaq Multiuser P Cstation
Faq Multiuser P Cstation
 
Open Ware Ramsan Dram Ssd
Open Ware Ramsan  Dram SsdOpen Ware Ramsan  Dram Ssd
Open Ware Ramsan Dram Ssd
 
Why Install Hardware?
Why Install Hardware?Why Install Hardware?
Why Install Hardware?
 
Apresentacao Solid Access Corp Presentation Openware 5 20 10
Apresentacao Solid Access Corp Presentation Openware 5 20 10Apresentacao Solid Access Corp Presentation Openware 5 20 10
Apresentacao Solid Access Corp Presentation Openware 5 20 10
 
SSD Seminar Report
SSD Seminar ReportSSD Seminar Report
SSD Seminar Report
 

Ähnlich wie Pace IT - Introduction to the CPU

Lab1 - Introduction to Computer Basics Laboratory.pdf
Lab1 - Introduction to Computer Basics Laboratory.pdfLab1 - Introduction to Computer Basics Laboratory.pdf
Lab1 - Introduction to Computer Basics Laboratory.pdfMohammedAlobaidy16
 
Pace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nmPace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nmEdward Sargent
 
Analysis Of AMD And Intel
Analysis Of AMD And IntelAnalysis Of AMD And Intel
Analysis Of AMD And IntelTammy Lacy
 
Green Computing: Issues on the Primary Memory of Personal Computers
Green Computing: Issues on the Primary Memory of Personal ComputersGreen Computing: Issues on the Primary Memory of Personal Computers
Green Computing: Issues on the Primary Memory of Personal ComputersIOSR Journals
 
Buying Your Next Computer
Buying Your Next ComputerBuying Your Next Computer
Buying Your Next ComputerLeslie Eyton
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardwareYousaf Alam
 
Chap2 5e u v2 - theory
Chap2 5e u v2 - theoryChap2 5e u v2 - theory
Chap2 5e u v2 - theorydd25251
 
Trends in computer architecture
Trends in computer architectureTrends in computer architecture
Trends in computer architecturemuhammedsalihabbas
 
Nt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsNt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsKristi Anderson
 
Explain some hardware of computer
Explain some hardware of computerExplain some hardware of computer
Explain some hardware of computerGehad Enayat
 
computer Processors intel and amd
computer Processors intel and amdcomputer Processors intel and amd
computer Processors intel and amdRohit Gada
 
Topics - , Addressing modes, GPU, .pdf
Topics - , Addressing modes, GPU,  .pdfTopics - , Addressing modes, GPU,  .pdf
Topics - , Addressing modes, GPU, .pdfShubhamSinghRajput46
 
Intel Vs AMD!! Which is the best?
Intel Vs AMD!! Which is the best?Intel Vs AMD!! Which is the best?
Intel Vs AMD!! Which is the best?Shrayas Suryakumar
 
Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmEdward Sargent
 
Blake Novak semester 2 presentation on overclocking and heat
Blake Novak semester 2 presentation on overclocking and heatBlake Novak semester 2 presentation on overclocking and heat
Blake Novak semester 2 presentation on overclocking and heatBlake Novak
 
Computer systems|Computer Networking & Communication System Assignment - Netw...
Computer systems|Computer Networking & Communication System Assignment - Netw...Computer systems|Computer Networking & Communication System Assignment - Netw...
Computer systems|Computer Networking & Communication System Assignment - Netw...freeassignmenthelp
 

Ähnlich wie Pace IT - Introduction to the CPU (19)

Lab1 - Introduction to Computer Basics Laboratory.pdf
Lab1 - Introduction to Computer Basics Laboratory.pdfLab1 - Introduction to Computer Basics Laboratory.pdf
Lab1 - Introduction to Computer Basics Laboratory.pdf
 
Pace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nmPace it custom-configurations_sw_nm
Pace it custom-configurations_sw_nm
 
Analysis Of AMD And Intel
Analysis Of AMD And IntelAnalysis Of AMD And Intel
Analysis Of AMD And Intel
 
Computer processors
Computer processorsComputer processors
Computer processors
 
Green Computing: Issues on the Primary Memory of Personal Computers
Green Computing: Issues on the Primary Memory of Personal ComputersGreen Computing: Issues on the Primary Memory of Personal Computers
Green Computing: Issues on the Primary Memory of Personal Computers
 
Amd vs intel
Amd vs intelAmd vs intel
Amd vs intel
 
Buying Your Next Computer
Buying Your Next ComputerBuying Your Next Computer
Buying Your Next Computer
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Chap2 5e u v2 - theory
Chap2 5e u v2 - theoryChap2 5e u v2 - theory
Chap2 5e u v2 - theory
 
Trends in computer architecture
Trends in computer architectureTrends in computer architecture
Trends in computer architecture
 
Nt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsNt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer Components
 
Module 1 unit 3
Module 1  unit 3Module 1  unit 3
Module 1 unit 3
 
Explain some hardware of computer
Explain some hardware of computerExplain some hardware of computer
Explain some hardware of computer
 
computer Processors intel and amd
computer Processors intel and amdcomputer Processors intel and amd
computer Processors intel and amd
 
Topics - , Addressing modes, GPU, .pdf
Topics - , Addressing modes, GPU,  .pdfTopics - , Addressing modes, GPU,  .pdf
Topics - , Addressing modes, GPU, .pdf
 
Intel Vs AMD!! Which is the best?
Intel Vs AMD!! Which is the best?Intel Vs AMD!! Which is the best?
Intel Vs AMD!! Which is the best?
 
Pace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nmPace it common-laptop_components_sw_nm
Pace it common-laptop_components_sw_nm
 
Blake Novak semester 2 presentation on overclocking and heat
Blake Novak semester 2 presentation on overclocking and heatBlake Novak semester 2 presentation on overclocking and heat
Blake Novak semester 2 presentation on overclocking and heat
 
Computer systems|Computer Networking & Communication System Assignment - Netw...
Computer systems|Computer Networking & Communication System Assignment - Netw...Computer systems|Computer Networking & Communication System Assignment - Netw...
Computer systems|Computer Networking & Communication System Assignment - Netw...
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Kürzlich hochgeladen (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Pace IT - Introduction to the CPU

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – CPU basics. – Intel and AMD CPUs. – Which one is right for you? PACE-IT.
  • 5. Page 5 According to Moore’s Law, the number of transistors on an integrated circuit will double approximately every two years, thus creating exponential growth in the power of the integrated circuit.
  • 6. Page 6 – CPU (central processing unit) characteristics. » Speed: typically is the frequency at which one core of a CPU operates; currently, it is measured in gigahertz (GHz). The higher the number, the faster the core. » Cores: the actual CPU on a chip. If a CPU is a multi-core CPU, then it actually has multiple CPUs on the chip. The more cores, the more simultaneous tasks that can be accomplished. » Cache: expensive SRAM that is located on the CPU die. All cache memory is much more expensive than regular RAM so not much is used. L1 cache is typically embedded in each core of the CPU. L2 cache is typically located just off of the CPU or embedded in a coprocessor. L3 cache is still on the CPU die, but is slower. » Hyperthreading: the logical division of a CPU core. Through special instruction sets in the CPU, it is made to look and behave as if it has more than a single core. Introduction to the CPU.
  • 7. Page 7 – CPU characteristics. » Virtualization support: when virtualization began it always required fairly complex software and a host operating system. CPU manufacturers have now built virtualization support into some of their processors. This allows for easier and less complex virtualization. » GPU: some CPUs have an integrated graphics processing unit (GPU) on the die. This allows for decent integrated graphic performance, while not hindering the basic operation of the CPU. » Architecture (32-bit vs. 64-bit): this deals with the amount of memory that the CPU can address (keep track of). A 32-bit architecture can only address a maximum of 4 GB of RAM, while a 64-bit architecture can address a theoretical maximum of 16.8 million TB of RAM. In actuality, the maximum amount of RAM that a 64-bit system can handle is established by the motherboard manufacturer. Introduction to the CPU.
  • 8. Page 8 – Cooling. » As a rule, the higher the performance of the CPU, the more heat it will generate. Excessive heat will kill or burn out a CPU. » Heat sinks: a device that is placed on top of the CPU. It usually has a solid metal base but transitions to fins at the top. A heat sink will draw heat away from the surface of the CPU toward the top of the sink where it is radiated away into the case. » Thermal paste: a special compound that is used between a CPU and a heat sink. It fills in the microscopic voids that are present and will improve the performance of the heat sink. » Fans: are used to help radiate the heat away from the heat sink. They are designed to draw cooler air across the fins. » Liquid-based cooling: works like a car’s radiator. The heat sink actually has liquid being pumped through it to draw away the heat; the liquid gets pumped to a radiator where the heat is dissipated. Introduction to the CPU.
  • 10. Page 10 – Intel CPUs. » Currently, Intel uses land grid array (LGA) CPUs. The CPU does not have pins on the bottom of the chip; the pins are located in the CPU socket with the CPU having a corresponding contact point. Intel processors are usually defined by their processor family (e.g., Haswell, Ivy-trail) and socket type. » Intel socket types: LGA 775, LGA 1155, LGA 1156, LGA 1366 (plus many others with more being introduced all the time). – AMD CPUs. » Most AMD CPUs are pin grid array (PGA) CPUs. The CPU has pins on the bottom that fit into holes in the socket. » AMD’s naming convention is based on processor family and socket type as well. » AMD socket types: 940, AM2, AM2+, AM3, AM3+, FM1, F (as with Intel, this is not a comprehensive listing). Introduction to the CPU.
  • 12. Page 12 The key to determining the correct CPU for you is research. When researching the purchase of a CPU, you need to consider what you are trying to achieve as well as any budgetary constraints. As a rule, the better the performance of the CPU, the more it will cost and the newer the processor family is, the more it will cost. Also in most situations, the software that is available can’t take advantage of the full capabilities of the CPU, but it may be able to in the future. Introduction to the CPU.
  • 13. Page 13 Introduction to the CPU. CPU performance is usually based on the frequency speed, the number of cores present, and the type and size of the cache memory. Hyperthreading is the logical division of the core to make it act and look like more. Virtualization support in the CPU has simplified the virtualization process. A CPU may be either 32-bit or 64-bit. Cooling is very important to the CPU. Topic CPU basics. Summary Intel tends to use an LGA style of socket while AMD tends to use a PGA type of socket. The CPUs of both manufacturers are known by the processor family and the socket type that they use. Intel and AMD CPUs. Research is the key in determining which CPU is the right CPU for the application. Modern CPUs are more powerful than most software applications, but that does change rapidly. Which one is right for you?
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.