Basic Computer Thermodynamics

That desk in front of you and everything else around you is made up of atoms. An atom consists of electrons orbiting around a nucleus. An atom is increadibly tiny. You could line up 10 million of them inside a millimeter. What if we could scale up an atom so that the nucleus was the size of a basketball? The orbits of its electrons would then be 15 miles away.

From this you can understand that atoms are almost all empty space. The nucleus of the atom is composed of quarks. If you could see a quark or an electron up close, it might appear as a tiny vibrating glow of energy. It turns out this world, which is causing us so many problems and so much stress, is mostly an illusion!

The electrons orbit the nucleus at about the speed of light. If you could see them, they might appear as a blur. They do not orbit in a plane like the pictures in books. They create a shell. Sometimes two or more atoms will share electrons, causing them to link together forming a molecule.

Looking at that desk in front of you again, it looks pretty solid. Actually, unless your desk is floating in deep space where the temperature is close to absolute zero, the molecules of your desk are vibrating like crazy. Picture the molecules bouncing around and smacking into each other like balls on a pool table.

If you have ever played pool, you're very familiar with how when a pool ball hits another pool ball, it transfers it's energy to the second pool ball. When heat causes molecules to vibrate, they transfer energy between each other in a similar fashion. This action is called "conduction".

Now picture the CPU of a computer cooking away because the designer wants to push too much power through a small piece of silicon. If we don't take away that heat as fast as it's created, that CPU will fry!

The problem is usually solved by mounting a heat sink on the CPU. Conduction causes the heat to move from the hot CPU to the cooler heat sink. Because air doesn't conduct heat as well as metal, We apply a thin layer of heat sink compound between the CPU and the heat sink to fill in any gaps.

You'll notice that a heat sink has fins on it. The fins allow the heat sink to conduct the heat to the air adjacent to the fins. The fins provide more surface area to aid in conduction. Eventually the adjacent air will get as hot as the heat sink and conduction will cease.

If we move the air away from the heat sink, it will take the heat energy with it. A fan mounted on the heat sink is used to move the air. This method of heat transfer is called convection. Eventually all the air inside the computer case will get hot, so fans are used to blow the air out of the case of the computer.

The heat has moved from the CPU, to the heat sink, to the air inside the case, to the air in the room where you're sitting at your computer desk. The room starts to get hot, and eventually the air conditioner turns on.

You can view an air conditioner as a "pipe". A fan blows the hot air from your room through fins that transfer the heat to a liquid. The liquid is piped to fins outside the house. A fan blows cooler outside air past the fins to remove the heat from the liquid.

The air conditioner has an evaporator valve that changes the liquid to a gas after the heat is removed. In a gas, the molecules are further apart than in a liquid. This causes it to cool down quite a bit more. The gas goes through the fins inside the house, picking up heat. It is then compressed into a liquid to concentrate the heat so the outside fins can remove the heat more efficiently.

Shuttle's I.C.E. (Integrated Cooling Engine) Heat Pipe uses a very similar method to cool a CPU. The CPU has a heat sink with copper heat pipes. The heat of the CPU causes liquid coolant inside the heat pipe to change to a gas. Convection created by the pressure of the gas moves the coolant to a second heat sink where a fan is used to blow the heat out of the computer's case. Releasing the heat causes the coolant to change back to a liquid. Gravity then carries the coolant back to the CPU heat sink.

One last method of heat transfer we haven't discussed yet is radiation. Some of the heat of the CPU and the heat sink is released as infrared radiation. Similar to light (although invisible to human eyes), the radiation strikes the insides of the computer case, causing it to get warm. Ultimately the computer case itself acts as a heat sink conducting heat to the outside air.

This article explains the three ways - conduction, convection, and radiation - that heat is transported from a computer CPU to the air outside the computer case. You now understand the thermodynamics of a computers and why it is important to maintain its various components.

Copyright(C) Bucaro TecHelp.

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com. To subscribe to Bucaro TecHelp Newsletter visit bucarotechelp.com.

monthly home cleaning Buffalo Grove ..
In The News:

Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Be Prepared in the Event Computer Disaster Strikes

ComputersBusinesses and individuals alike have all grown to rely on... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

Does Microsoft Show Hackers How To Attack?

After another security hole recently surfaced in Microsoft's Windows operating... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

Password Nightmares

Good Morning Mr. Sampson. Please type in you Personal Identification... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

Emulation Manual - A Complete Guide on How to Change Your Windows XP to Mac OS X

IntroductionMac OS X is the most technologically advanced operating system... Read More

The Importance Of Email Backup

Viruses, software failures, power failures, human errors, hard drive failures... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

Keeping the Windows Registry Operational

The registry is where the computer stores information about the... Read More

Why Get a Microsoft MCSE Certification?

In the years of the dot com boom and bust,... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

Customize Your Portable Player with an MP3 Player Accessory

Everywhere you look today people are listening to personal audio... Read More

How To Become A True CCNA

I've worked my way from the CCNA to the CCIE,... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

Although there are many things that can affect the performance... Read More

Bluetooth Technology: Tips for Buying Headsets or Headphones

The technological horizon has always got something new to offer,... Read More

EDTV: What You Should Know Before You Make That Purchase

Enhanced Definition Television ? also known as EDTV ? is... Read More

Buying a Personal Computer (PC)

For many people the computer industry is a seeming unsolvable... Read More

Flow Text Around a Graphic in Microsoft Word

Flow Text Around a GraphicQuestion: I have inserted a photo... Read More

scheduled maid service Mundelein ..