Solved

Processor

Posted on 2001-06-12
3
247 Views
Last Modified: 2010-04-27
Hi everyone,
I would like to know the difference between a celeron and pentium processor. Which processor is faster when working on database programme.
Thank you.
Iris
0
Comment
Question by:iris_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
kahlean earned 50 total points
ID: 6184362
well the most remarkable deiffernce bwtween a celeron processor and a pentium processor is the cache memory. The cache memory is a temporary memory betwen your system and your procerssor, while waitng for data to be processor by the processor. celeron has only 128 KB on the onther hand pentium processor has 512 KB cach memoery. For otherfeature like the multiledia enhancement, log on to intel site and you wil lhave what type of this two prcessor has to offer......But for your question on which type of processor for database programming, i will suggest that go for pentium III or 4 processor. Celeron are only mend for low end user like for home user as well as gaming only.

www.intel.com
   
0
 
LVL 7

Expert Comment

by:jlauster
ID: 6184394
The Pentium also operates at a higher front side bus speed than the Celeron, making it able to utilize the performance of the current high end motherboards. Pentiums come in 100MHz and 133MHz FSB models while the Celeron is normally limited to a FSB of 66MHz.
0
 
LVL 7

Expert Comment

by:jlauster
ID: 6184398
My comment was in regards to the P-III.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question