Browse Definitions :
Definition

Celeron

Also see Pentium , Xeon , and Pentium 3 .

Celeron is the low-end (and low cost) member of the family of microprocessor s from Intel that is based on its P6 architecture . Although it is based on the same architecture as the Pentium II, it lacks some high- performance features of the Pentium II line. Celeron models later than the 300 A include an L1 and L2 cache on the microchip, meaning that the cache is accessed at the same clock speed that the processor operates with. The Celeron L2 cache is smaller (128 kilobyte s) than the Pentium II's (512 KB). However, because the Celeron L2 cache is on the processor chip and the Pentium II's is not, their effective L2 speeds are closely comparable. With clock speeds up to 466 MHz , Celeron processors are attractive to power users at first glance, but they should be compared to the Pentium II's computing power in order to get an idea of their useful application.

In ZDNet's CPUmark 99 benchmark tests, the Celeron processors compared favorably with Pentium II processors. Intel is marketing the processor as a chip for the basic PC. They view it as providing performance good enough for home and business users doing word processing and Internet surfing. Power users and serious gamers may want to think about spending more for the Pentium II's top performance.

Celeron can be mounted in a Slot 1 motherboard or in a Socket 370 motherboard. Like Intel's other P6 microprocessors, the Celeron can be used for symmetric multiprocessing ( SMP ).

This was last updated in April 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close