wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Evolution of the Microprocesor

profile
Ritam Paul
Jul 12, 2023
0 Likes
0 Discussions
133 Reads

Evolution of the microprocessor
Computer's Central Processing Unit (CPU) built on a single Integrated Circuit (IC) is called a microprocessor The microprocessor contains millions of tiny components like transistors, registers, and diodes that work together. A microprocessor consists of an ALU, control unit and register array .


Evolution of Microprocessors :- 
We can categorize the microprocessor according to the generations or according to the size of the microprocessor: 


1) First Generation (4 - bit Microprocessors):- The first generation microprocessors were introduced in the year 1971-1972 by Intel Corporation. It was named Intel 4004 since it was a 4-bit processor.
It was a processor on a single chip. It could perform simple arithmetic and logical operations such as addition, subtraction, Boolean OR and Boolean AND.

2) Second Generation (8 - bit Microprocessor) :- The second generation microprocessors were introduced in 1973 again by Intel. It was a first 8 - bit microprocessor which could perform arithmetic and logic operations on 8-bit words. It was Intel 8008, and another improved version was Intel 8088.

3) Third Generation (16 - bit Microprocessor) :- The third generation microprocessors, introduced in 1978 were represented by Intel's 8086, Zilog Z800 and 80286, which were 16 - bit processors with a performance like minicomputers.

4) Fourth Generation (32 - bit Microprocessors) :- Several different companies introduced the 32-bit microprocessors, but the most popular one is the Intel 80386.

5) Fifth Generation (64 - bit Microprocessors):- From 1995 to now we are in the fifth generation. After 80856, Intel came out with a new processor namely Pentium processor followed by Pentium Pro CPU, which allows multiple CPUs in a single system to achieve multiprocessing.


Comments ()


Sign in

Read Next

OS ASSIGNMENT

Blog banner

Oracle Corporation

Blog banner

Risk factors in service transistion

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

What is Amazon?

Blog banner

Number Guessing game --lisp

Blog banner

Memory Management in an Operating System

Blog banner

Linux VServer Architecture

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Os Virtual Memory

Blog banner

Kernel in Operating System

Blog banner

Mendeley (management software)

Blog banner

INTERNET SECURITY

Blog banner

GIS info about Bermuda Triangle

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

VPN

Blog banner

Social Media.

Blog banner

Deadlock and starvation in operating system

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Virtual Machine

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

What is Email? Uses of Emails

Blog banner

Virtual memory in Operating System

Blog banner

Android Flashlight Application

Blog banner

Odoo

Blog banner

Worms, viruses and Bots

Blog banner

My Favorite Country

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Virus

Blog banner

Direct Memory Access

Blog banner

What is a Malware ?

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Cryptanalysis tool

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Buffering

Blog banner

Routers

Blog banner

Memory management

Blog banner

Deadlock

Blog banner

On-Page SEO

Blog banner

Threat management

Blog banner