wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of the Microprocesor

profile
Ritam Paul
Jul 12, 2023
0 Likes
0 Discussions
134 Reads

Evolution of the microprocessor
Computer's Central Processing Unit (CPU) built on a single Integrated Circuit (IC) is called a microprocessor The microprocessor contains millions of tiny components like transistors, registers, and diodes that work together. A microprocessor consists of an ALU, control unit and register array .


Evolution of Microprocessors :- 
We can categorize the microprocessor according to the generations or according to the size of the microprocessor: 


1) First Generation (4 - bit Microprocessors):- The first generation microprocessors were introduced in the year 1971-1972 by Intel Corporation. It was named Intel 4004 since it was a 4-bit processor.
It was a processor on a single chip. It could perform simple arithmetic and logical operations such as addition, subtraction, Boolean OR and Boolean AND.

2) Second Generation (8 - bit Microprocessor) :- The second generation microprocessors were introduced in 1973 again by Intel. It was a first 8 - bit microprocessor which could perform arithmetic and logic operations on 8-bit words. It was Intel 8008, and another improved version was Intel 8088.

3) Third Generation (16 - bit Microprocessor) :- The third generation microprocessors, introduced in 1978 were represented by Intel's 8086, Zilog Z800 and 80286, which were 16 - bit processors with a performance like minicomputers.

4) Fourth Generation (32 - bit Microprocessors) :- Several different companies introduced the 32-bit microprocessors, but the most popular one is the Intel 80386.

5) Fifth Generation (64 - bit Microprocessors):- From 1995 to now we are in the fifth generation. After 80856, Intel came out with a new processor namely Pentium processor followed by Pentium Pro CPU, which allows multiple CPUs in a single system to achieve multiprocessing.


Comments ()


Sign in

Read Next

Operating system

Blog banner

Constrains in service design

Blog banner

Electronic Funds Transfer

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

INSTAGRAM

Blog banner

Artificial Intelligence and I

Blog banner

Objectives and functions of Operating System...

Blog banner

File System

Blog banner

Memory Hierarchy

Blog banner

Social media

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Never give up

Blog banner

Population

Blog banner

MODERN OPERATING SYSTEM

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Race Condition in Operating Theatre

Blog banner

Session Vulnerabilities

Blog banner

Not anti-social, but pro-solitude

Blog banner

File management

Blog banner

geographic information system (GIS)

Blog banner

10 Interesting Facts about Death Note

Blog banner

Introduction to Virtual Memory - 080

Blog banner

HTML vs HTML5

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Why we should do reading

Blog banner

LIMITED EDITION

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Booting Process In Operating System

Blog banner

OS Assignment-3

Blog banner

Processes : Process description and control

Blog banner

A Deep Dive

Blog banner

objectives and functions of operating system

Blog banner

LinkedIn

Blog banner

The Five Steps of Data Science

Blog banner

Modern Operating System

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Importance Of Blockchain

Blog banner