Browse Definitions :
Definition

Mini-ITX 2.0

Contributor(s): Stan Gibilisco

Mini-ITX 2.0 is a motherboard designed for use in small form factor personal computers (PCs). The physical boards measure 6.7 inches (17 centimeters) square.

Mini-ITX 2.0 was designed to support the graphics, high definition (HD) video and other rich media processing typical of personal computing. The board offers expandability and flexibility for use in a variety of environments. Because of its low power consumption, the Mini-ITX can usually employ passive cooling, eliminating problems that can occur with fan noise in home entertainment settings. 

Mini-ITX 2.0 features include:

  • Support for low-power x86 microprocessors.
  • Support for most recent versions of Windows.
  • Support for most flavors of Linux.
  • Support for up to 2 GB (gigabytes) of RAM (random access memory).
  • One PCI (Peripheral Component Interconnect) Express 16-lane expansion slot.
  • Two Serial ATA (Advanced Technology Attachment) II slots.
  • One IDE (Integrated Drive Electronics) parallel ATA slot.
  • Minimum four USB (Universal Serial Bus) 2.0 ports.
  • One port for 1-Gbps (billions of bits per second) LAN (local area network).
  • Three two-channel audio jacks.
  • One VGA (Video Graphics Array) port for LCD (liquid crystal display).
  • HDMI (High-Definition Multimedia Interface) port with add-on card.
  • DirectX 9.0 integrated graphics.
  • Support for DirectX 10.0 with add-on card.

VIA Technologies, Inc. released the first version of Mini-ITX in 2001 for use in low-power computers. Version 2.0 was released in 2008. 

 

This was last updated in March 2013

Continue Reading About Mini-ITX 2.0

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close