Network Synergy Blog

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

What the Motherboard Does
You can think of the motherboard as the computer’s internal control center. It acts as a communications hub for your device. The motherboard is the central circuit board that the rest of your device’s components connect to and share data with. In other words, the motherboard is the device that allows the computer to do its job. Without a motherboard, a computer isn’t really a computer at all.

When the computer boots up, the motherboard will be the first part to receive power. Once it’s booted up, the motherboard will power other components that will then activate the other parts of your PC.

Parts of the Motherboard
There are several parts of a motherboard that are all needed in order for it to function as intended. Depending on the model, however, it will look a bit different and have a different form factor, or specifications. Still, all motherboards will generally have these basic components:

  • Chipset: The chipset is the device that allows data to transfer and flow to other components through the motherboard. The chipset is split into the Northbridge and the Southbridge. In short, it allows for communication between the various components of the motherboard.
  • CPU: The CPU, or central processing unit, is the part that transfers data from the Northbridge to all of the different parts of the computer. A more powerful CPU will allow for a faster and better experience.
  • Slots: A motherboard’s slots are used to hold together the various parts of it. Here are some of the pieces:
    • Random Access Memory, or RAM
    • PCI(e), which connects to expansion cards, like video, network, or sound cards
    • SATA, which connect to storage drives like HDD and SSD

Do you understand how the motherboard works better? Do you have any other suggestions for tech terms in the future? Let us know in the comments.

How Your Smartphone Keeps Your Data Safe
A New Perspective on Ransomware


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, September 24, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Collaboration Software Artificial Intelligence Motherboard Facebook Augmented Reality Quick Tips Cache Google Virtual Desktop Gaming Console Storage GPS Vendor Management Scheduling Physical Security WPA3 YouTube Network Security Application Food Chrome Electronic Health Records Windows 10 Workplace Tips Operating System Tech Support The Internet of Things Troubleshooting Windows 8.1 Update Legislation Star Wars Malware VoIP Android Compliance Consulting Sports IBM Business Growth Cyberattacks Mobile Device Emoji Managed Service Superfish Gadgets Chromebook Computer Repair Miscellaneous Monitoring Disaster Resistance Screen Reader Best Practice Data Recovery Cryptocurrency eWaste Remote Support Virtual Private Network BDR Managing Stress Uninterrupted Power Supply Data Office Tips Server Managed IT Service Lithium-ion Battery Business Continuity Windows 10 MSP Router IT budget Outsourced IT Managed IT Mouse Net Neutrality Infrastructure Cabling Thank You Entrepreneur Notifications Personal Information Identity Theft Microsoft Office PowerPoint Recycling Motion sickness IT Technicians IT service Charger Printing Browser Bring Your Own Device Cables Managed Services Provider Help Desk Passwords Trending IT Management Data Management Backup Battery Government Trainging Development Hard Drives HIPAA Encryption IT Support Customer Service Automation Experience Utility Computing Downtime Cyber Monday Microsoft Mobile Computing Inbound Marketing Internet Time Management Google Docs Managed IT services Save Money Settings Nanotechnology How To User Tips Congratulations Redundancy Google Drive Password Service-based Business Work/Life Balance Hacking Fleet Tracking Connectivity Ransomware SharePoint Data storage Best Available Remote Monitoring and Management Efficiency Laptop Backups Safety OneNote Privacy Mobile Data Risk Management Digital Project Management Scam Virus Smart Tech Holiday Remote Computing Users Webcam Retail Drones Unified Threat Management Webinar Permissions Cloud Programming Supercomputer Memory Typing Law Enforcement Alerts Hiring/Firing User Error Upgrade Heating/Cooling SaaS Identity Communication Mirgation Specifications Presentation How To Remote Workers Cost Management CIO Networking Travel Display communications People Halloween Robot Unified Communications Sync Smartphone VPN Mobile Device Management Going Green IT Consultant Email Multi-Factor Security Skype Gmail Print Server Monitors Relocation Black Market CrashOverride Error Telephony Firefox Productivity App Social Media IoT Machine Learning Taxes Data Loss Hosted Solutions Consumers Spam Hard Disk Drive Google Analytics Computer Care Law Firm IT Vulnerability Business Domains Software Tips Language Web Server Automobile Geography Break Fix Employer-Employee Relationship Mobile Analyitcs Corporate Profile IT Consulting Shortcut Data Backup Managed IT Services Politics Apps Distributed Denial of Service Digital Signature Crowdfunding Smart Technology Alt Codes Remote Monitoring Upgrades Leadership Windows 8 Save Time Social Networking Mobility Business Owner Security Hacker Phishing Avoiding Downtime Botnet Alert Office 365 Identities WiFi Samsung Competition Information Black Friday Comparison Cooperation Business Intelligence Wearable Technology Proactive IT Hackers Work Station Word Google Wallet Mobile Office Debate Cameras Server Management Scary Stories G Suite Data Security Files Tip of the Work Fax Server CCTV Access Control Technology Touchscreen Regulation Private Cloud Public Cloud Website Text Messaging Mobile Technology Unsupported Software High-Speed Internet Unified Threat Management Consultation Crowdsourcing Environment Documents IP Address Twitter Network Management Bluetooth Management Digital Payment Fraud Public Speaking Read Only Two-factor Authentication Virtualization Asset Tracking Processors Operations Printers IT Services Gadget Websites Computers Business Management Saving Time Training 5G Vulnerabilities Flexibility Managed Service Provider Wireless Technology Firewall Internet of Things Health Disaster Recovery PDF Productivity Lenovo Migration History Data Warehousing Technology Tips Features Internet Exlporer Intranet Tablet Technology Laws Printer Marketing Licensing Conferencing Content Filtering Best Practices Streaming Media Big Data Solid State Drive Bitcoin USB Money Staff Servers Logs Innovation Customer Relationship Management Macro Piracy Tracking Online Currency Modem Wireless Hosted Solution Saving Money Tip of the week Administration Tutorials Assessment Buisness Humor eBay 3D Printing Running Cable Microsoft Excel Enterprise Content Management Document Management Enterprise Resource Planning Cybercrime Phone System Mail Merge Secruity Computing Data Breach Business Technology Spyware Virtual Reality Information Technology Windows Dark Web iPhone Regulations Cortana Computer Fun PC Care 3D Office Antivirus Software as a Service Cookies End of Support Blockchain Downloads Paperless Office Business Computing Statistics Employee-Employer Relationship Hardware Mobile Security Cleaning Chatbots Excel User Staffing Wi-Fi Google Calendar Video Surveillance Hard Drive Patch Management IT Solutions Outlook Legal Social Apple Undo LinkedIn BYOD Mobile Devices Point of Sale Current Events Small Business Knowledge LiFi Start Menu Applications E-Commerce Proactive Tip of the Week Smartphones Cybersecurity Education Tech Term Network Computing Infrastructure Bandwidth Healthcare Recovery File Sharing Search Address Refrigeration Cloud Computing Social Engineering Meetings IT Support Electronic Medical Records Administrator Hacks Hotspot Writing Deep Learning Co-managed IT Telephone Systems Disaster Wires Budget Computer Accessories Company Culture Techology Google Maps Maintenance Network Congestion Value

      Latest Blogs

      Technology support can be one of the major pain points for businesses, and it’s not something that your organization wants to invest in without thinking about the details. Technolo...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube