Network Synergy Blog

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

What the Motherboard Does
You can think of the motherboard as the computer’s internal control center. It acts as a communications hub for your device. The motherboard is the central circuit board that the rest of your device’s components connect to and share data with. In other words, the motherboard is the device that allows the computer to do its job. Without a motherboard, a computer isn’t really a computer at all.

When the computer boots up, the motherboard will be the first part to receive power. Once it’s booted up, the motherboard will power other components that will then activate the other parts of your PC.

Parts of the Motherboard
There are several parts of a motherboard that are all needed in order for it to function as intended. Depending on the model, however, it will look a bit different and have a different form factor, or specifications. Still, all motherboards will generally have these basic components:

  • Chipset: The chipset is the device that allows data to transfer and flow to other components through the motherboard. The chipset is split into the Northbridge and the Southbridge. In short, it allows for communication between the various components of the motherboard.
  • CPU: The CPU, or central processing unit, is the part that transfers data from the Northbridge to all of the different parts of the computer. A more powerful CPU will allow for a faster and better experience.
  • Slots: A motherboard’s slots are used to hold together the various parts of it. Here are some of the pieces:
    • Random Access Memory, or RAM
    • PCI(e), which connects to expansion cards, like video, network, or sound cards
    • SATA, which connect to storage drives like HDD and SSD

Do you understand how the motherboard works better? Do you have any other suggestions for tech terms in the future? Let us know in the comments.

How Your Smartphone Keeps Your Data Safe
A New Perspective on Ransomware


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Consultation Small Business Digital Signature Google Docs Mobile Devices Money Presentation Emoji Chromebook IBM Apple Cleaning Congratulations 3D Alerts Workplace Tips Scary Stories Operations Cybersecurity Telephony Conferencing Marketing Backup Patch Management Current Events Data Loss Robot Microsoft Excel Operating System IoT Save Time 3D Printing Meetings Google Maps Theft Deep Learning Co-managed IT Miscellaneous Bring Your Own Device Google Drive Laptop Business Growth Data storage Customer Service PowerPoint Computer Storage Tablet Digital Buisness IT Management Innovation Big Data Permissions Skype Physical Security Humor Bitcoin Flexibility Two-factor Authentication Read Only Cables Office High-Speed Internet Smart Technology Mobility Digital Payment Proactive Monitoring Project Management Virtual Reality Cloud Specifications Remote Monitoring and Management LiFi Cryptocurrency Network Users File Sharing communications User Tips Webcam Cyber Monday Electronic Health Records Risk Management Remote Support Network Security Software SharePoint Piracy Macro IT Solutions OneNote Remote Computing Writing Superfish Going Green Password Star Wars Safety Networking Firefox Mobile Computing Websites Customer Relationship Management Tutorials Outsourced IT Apps Saving Time Financial Taxes Environment Business Owner Solid State Drive Asset Tracking History Technology Tips Internet LinkedIn Unified Threat Management Battery Trainging Network Congestion Trending Enterprise Resource Planning GPS IP Address Hacks Tip of the Work Procurement IT Support VPN Hard Drives Leadership Word Management Undo Server Smartphones Time Management Hacker Disaster Resistance Distributed Denial of Service Encryption Managed IT Services Hard Drive Redundancy Computing Black Friday Zero-Day Threat Personal Information Travel IT Consulting Break Fix Work/Life Balance Wireless Technology The Internet of Things Supercomputer Features Mirgation Consulting Charger App How To Fraud Facebook Multi-Factor Security Machine Learning Connectivity Windows 8 Mobile Technology Business Management Wi-Fi PDF Hackers Value Software as a Service Address Cost Management Telephone Systems Google Scam Authorization Paperless Office WPA3 Mobile Data Privacy Tech Terms Network Management Outlook Printers Files Managed IT Service Hotspot Maintenance Identities Administration Cooperation Fax Server IT Consultant Lenovo Printer Computers Bandwidth Botnet Downloads Business Continuity Managed Services Provider Hosted Solutions Business IT service Google Calendar Collaboration Analyitcs Fleet Tracking Nanotechnology Domains Virtualization Vulnerabilities Public Cloud Comparison Computer Repair Corporate Profile Test IT Support Screen Reader Office 365 Managing Stress Infrastructure Android eBay Router Modem People Phishing Private Cloud Remote Workers Productivity Saving Money Migration Mobile iPhone Legislation Unsupported Software Tip of the Week Internet of Things Application Tracking Help Desk Education Spyware Applications Experience Sports Hosted Solution Uninterrupted Power Supply Halloween Vendor Management Retail Gaming Console Government Staff Gadgets Knowledge Best Practice Favorites Programming Law Firm IT Firewall Employer-Employee Relationship Artificial Intelligence Hacking Cookies Recycling Office Tips Smartphone Bookmarks Computer Care Alt Codes Windows 10 Automobile Techology Employees Error Competition RMM Authentication Blockchain Augmented Reality Email Social Media Virtual Desktop PC Care Motherboard Finance Microsoft Best Practices Statistics Intranet Upgrades Online Currency Downtime Assessment Thank You Cameras Running Cable IT Services Automation Technology Data Management Chatbots Efficiency Print Server CCTV Mouse Sync Settings Mobile Office Net Neutrality Servers Cortana Troubleshooting Instant Messaging Ransomware Software Tips Windows Business Computing Save Money Data Recovery Training Administrator Development Managed IT Cabling Politics Consumers Social Networking eWaste Cloud Computing Relocation Hard Disk Drive Vulnerability Licensing Utility Computing Employee-Employer Relationship Chrome Compliance User Processors Alert Enterprise Content Management G Suite Regulation Typing Data Backup BDR Service-based Business Search Shortcut Refrigeration Spam Fun Recovery Wireless Server Management Business Technology Inbound Marketing Law Enforcement E-Commerce Wires Food SaaS Proactive IT Quick Tips Passwords How To Mobile Device Management Excel Display Business Intelligence Virtual Private Network BYOD Monitors Microsoft Office End of Support Mobile Security WiFi Language Gmail Permission Logs Streaming Media Documents Wearable Technology CrashOverride Malware Managed IT services Public Speaking Website Holiday Antivirus Information Technology Computer Accessories Work Station Backups Access Control Printing Motion sickness Crowdsourcing Healthcare Crowdfunding Managed Service Mobile Device Social Engineering IT budget Gadget Staffing Windows 10 Bluetooth Hiring/Firing Security Budget Web Server Entrepreneur Electronic Medical Records Disaster Recovery Smart Tech Identity Video Surveillance VoIP Webinar Browser Document Management Tip of the week IT Technicians Cybercrime Geography Remote Monitoring Samsung Phone System Avoiding Downtime Tech Term Regulations Data Warehousing Identity Theft USB Scheduling 5G Social Tech Support Secruity Lithium-ion Battery Best Available Start Menu Data Disaster Unified Threat Management YouTube Computing Infrastructure Unified Communications Memory Twitter Google Wallet Windows 8.1 Update Heating/Cooling Point of Sale Hardware Dark Web Data Breach Technology Laws Text Messaging Google Analytics Legal Backup and Disaster Recovery User Error Cache MSP HIPAA Upgrade Productivity Data Security Human Error Content Filtering Virus Health Information Internet Exlporer Communication Debate Cyberattacks Mail Merge Managed Service Provider Notifications Touchscreen Black Market CIO Company Culture Drones

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube