Browse Definitions :
Definition

PPGA (plastic pin grid array)

Contributor(s): Jeff Anderson

PPGA (plastic pin grid array) is a microchip design from Intel that has the silicon core of the microchip facing down toward the computer motherboard . The core is covered by a heat slug, which helps to dissipate the heat to the heatsink . The chip includes 370 pins that plug into a Socket 370 connector on the motherboard. The PPGA chip is less expensive to manufacture that the slot-based chip, which is why PPGA chips are used in sub-$1000 desktop computers.

Intel has also developed another chip design called FC-PGA ( flip chip-pin grid array ). FC-PGA packages have the processor core flipped up on the back of the chip, facing away from the motherboard. In order to use either type of these microprocessors with its associated 370 socket, a computer's motherboard must support certain guidelines, known as VRM specifications. (For PPGA processors, the motherboard must support VRM 8.2 specifications. For FC-PGA processors, the motherboard must support VRM 8.4 specifications.) Both chip designs are used for the Celeron processor and use the Zero Insertion Force ( ZIF ) feature that helps the chip to come out of its socket easily.

This was last updated in March 2011

Continue Reading About PPGA (plastic pin grid array)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close