pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Core i5

The efficiency and accuracy of computers lead to the migration of various business processes onto computer systems. As a result, the small and medium sized businesses started using computers to manage their business operations. This type of workload could only be handled by computers with certain advanced features. As a result, demand for a new computer segment which popularly came to be known as mid-range computers was created. Intel, being the market leaders in processors, did not fail to recognize the potential of the mid-range computer market. In their endeavor to attract business from this market segment they launched Intel Core i5.

The Intel Core i5 first generation offers 6xx and 7xx models for the desktops and 4xx and 5xx for the laptops. While the desktop models are designed on the Nehalem microarchitecture, the laptop models are based on the Arrandale architecture.

All the models of the Corei5 have memory controllers that accept only the DDR3 memories and support the standard dual channel architecture up to 1.6v. Any memory module that needs higher voltage than 1.6v will not work and eventually might also end up damaging the processor. The 6xx processors have two cores which are two times less than the cores present in the 7xx processors. The 6xx can execute four threads at a time as it has the Hyper Threading feature which is absent in the 7xx processors. The slowest model in the 6xx series is the Core i5-650 that is clocked at 3.2 GHz. It also includes 256 KB per core L2 cache and 4 MB level 3 cache that is shared between both the cores along with 64 bits and virtualization and supports Turbo Boost. Almost all the features of i-650 are similar with the other 6xx processors; the only difference is that others have higher clock frequencies.

The 4xx and 5xx models of the Core i5 are based on Arrandale and are built on the enhanced Nehalem architecture known as Westmere. Some of the basic features of this series of Intel processors are SSE4 instructions, 3MB shared level 3 cache, HT (Hyper Threading), Turbo Boost technology and Visualization. These processors are capable of stimulating two logical processing cores in each physical core. This is the reason the supporting operating system recognizes it as four core CPU. The mobile variant of the Core i5 comes in either 988 pin micro PGA package or the 1288 ball micro BGA package.

When it comes to performance and prizing the Core i5 is positioned above budgeted core i3 processors and below high performing Core i7 processors.

Filed Under: Intel Core CPUs, Processors (CPUs) Tagged With: Core i5, Intel Core i5

Latest Articles

Convenient Excel Shortcuts for Quick Formatting

The first version of Microsoft Excel was launched in 1985. The world’s most popular spreadsheeting software has evolved significantly over the past 35 years. Earlier versions of Microsoft Excel were not very user-friendly. New keyboard shortcuts have been introduced over the past few versions, which … [Read More...]

Inkjet Color Perception

Visible light falls between 380nm (violet) and 780nm (red) on the electromagnetic spectrum, sandwiched between ultraviolet and infrared. White light comprises approximately equal proportions of all the visible wavelengths, and when this shine … [Read More...]

Text With Email

Here is a handy trick that a lot of people do not know. You can send a text message using your favorite email client to anyone as long as you know their phone number and their cell phone provider. This can be pretty handy these days as more and more people rely on texting to stay in touch. But, if … [Read More...]

Comments

  1. Precise Engineering says

    August 13, 2012 at 7:00 am

    Some of the high quality machinery manufactures who are engaged in making equipments like turbines, transmission equipment, boilers, cement kilns, raw mills and grinding mills wishes to have Micro Models of the original equipments.
    Micro Models are also very useful in trade shows and industrial exhibitions.

A Harsh Reality You Can’t Ignore About Network Information Security

We are becoming more and more connected to our lives with computer technology. They help to process data at work. We receive money using plastic … [Read More...]

What is the Best VPN for Gamers?

Of the 44% of UK Internet users who have used a virtual private network (VPN) at some point in their lives, approximately 39% of this demographic are … [Read More...]

Think About Headless Commerce as of a Modular System

In recent years, eCommerce has transformed to where consumers no longer handle purchases on conventional websites. Shopping is currently carried out … [Read More...]

Service That Succeeds: How To Build an Effective IT Service Desk

In today’s tech-forward world, building a capable IT service team is essential for businesses hoping to scale tech-related hurdles and soar past the … [Read More...]

A simple PC guide on keeping safe while using public Wi-Fi

Did you know that there is a cyberattack every 39 seconds? You are more likely to be a victim if you are lax about your digital security. This … [Read More...]

Motivating Students to Learn Computer Science

Computer science has been an important part of the educational curriculum for decades. Professor Seymour Papert, a mathematician from South Africa … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

CD-ROM Photo CD

Photo CD has been specified by Kodak and Philips based on the CD-i Bridge specification. It comprises the … [Read More...]

AffPlayBook.com – Review From Actual User

Hi, My name is Jacob Erdei and when you become a member of affplaybook you will recognize my user name inside the forum as jerdei. I have over … [Read More...]

How To Use The Google Authenticator App to Protect Your Google Account

In a previous post, I talked about enabling two factor authentication on your Google account. Just to rehash, two-factor authentication adds another … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors