Basic Computer Thermodynamics

That desk in front of you and everything else around you is made up of atoms. An atom consists of electrons orbiting around a nucleus. An atom is increadibly tiny. You could line up 10 million of them inside a millimeter. What if we could scale up an atom so that the nucleus was the size of a basketball? The orbits of its electrons would then be 15 miles away.

From this you can understand that atoms are almost all empty space. The nucleus of the atom is composed of quarks. If you could see a quark or an electron up close, it might appear as a tiny vibrating glow of energy. It turns out this world, which is causing us so many problems and so much stress, is mostly an illusion!

The electrons orbit the nucleus at about the speed of light. If you could see them, they might appear as a blur. They do not orbit in a plane like the pictures in books. They create a shell. Sometimes two or more atoms will share electrons, causing them to link together forming a molecule.

Looking at that desk in front of you again, it looks pretty solid. Actually, unless your desk is floating in deep space where the temperature is close to absolute zero, the molecules of your desk are vibrating like crazy. Picture the molecules bouncing around and smacking into each other like balls on a pool table.

If you have ever played pool, you're very familiar with how when a pool ball hits another pool ball, it transfers it's energy to the second pool ball. When heat causes molecules to vibrate, they transfer energy between each other in a similar fashion. This action is called "conduction".

Now picture the CPU of a computer cooking away because the designer wants to push too much power through a small piece of silicon. If we don't take away that heat as fast as it's created, that CPU will fry!

The problem is usually solved by mounting a heat sink on the CPU. Conduction causes the heat to move from the hot CPU to the cooler heat sink. Because air doesn't conduct heat as well as metal, We apply a thin layer of heat sink compound between the CPU and the heat sink to fill in any gaps.

You'll notice that a heat sink has fins on it. The fins allow the heat sink to conduct the heat to the air adjacent to the fins. The fins provide more surface area to aid in conduction. Eventually the adjacent air will get as hot as the heat sink and conduction will cease.

If we move the air away from the heat sink, it will take the heat energy with it. A fan mounted on the heat sink is used to move the air. This method of heat transfer is called convection. Eventually all the air inside the computer case will get hot, so fans are used to blow the air out of the case of the computer.

The heat has moved from the CPU, to the heat sink, to the air inside the case, to the air in the room where you're sitting at your computer desk. The room starts to get hot, and eventually the air conditioner turns on.

You can view an air conditioner as a "pipe". A fan blows the hot air from your room through fins that transfer the heat to a liquid. The liquid is piped to fins outside the house. A fan blows cooler outside air past the fins to remove the heat from the liquid.

The air conditioner has an evaporator valve that changes the liquid to a gas after the heat is removed. In a gas, the molecules are further apart than in a liquid. This causes it to cool down quite a bit more. The gas goes through the fins inside the house, picking up heat. It is then compressed into a liquid to concentrate the heat so the outside fins can remove the heat more efficiently.

Shuttle's I.C.E. (Integrated Cooling Engine) Heat Pipe uses a very similar method to cool a CPU. The CPU has a heat sink with copper heat pipes. The heat of the CPU causes liquid coolant inside the heat pipe to change to a gas. Convection created by the pressure of the gas moves the coolant to a second heat sink where a fan is used to blow the heat out of the computer's case. Releasing the heat causes the coolant to change back to a liquid. Gravity then carries the coolant back to the CPU heat sink.

One last method of heat transfer we haven't discussed yet is radiation. Some of the heat of the CPU and the heat sink is released as infrared radiation. Similar to light (although invisible to human eyes), the radiation strikes the insides of the computer case, causing it to get warm. Ultimately the computer case itself acts as a heat sink conducting heat to the outside air.

This article explains the three ways - conduction, convection, and radiation - that heat is transported from a computer CPU to the air outside the computer case. You now understand the thermodynamics of a computers and why it is important to maintain its various components.

Copyright(C) Bucaro TecHelp.

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com. To subscribe to Bucaro TecHelp Newsletter visit bucarotechelp.com.

experienced cleaning professionals Northbrook ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

5 Simple Ways To Increase Your Computer Speed & Help Your Computer Run More Efficiently!

If you're a computer expert, you'll probably already know about... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

Cisco Certification: What To Expect On Exam Day

Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Web Standards

HTTP ProtocolThe web is run on port 80. You are... Read More

10 Time Saving Keyboard Shortcuts

Time is money. And when you constantly have to divide... Read More

Enhanced Web Browsing With Toolbars

As the Web grows more crowded and just plain "noisy"... Read More

More Cool Web Tricks

If you ask most people what frustrates them most about... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

Cisco Certification: Taking Your First Certification Exam

You???ve studied hard; you???ve practiced your configurations; you???ve used your... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it... Read More

Build Your Own Computer

I'm eighty-one years old and I bought my first computer... Read More

How Does a Palm Pilot Work?

Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

The Importance Of Email Backup

Viruses, software failures, power failures, human errors, hard drive failures... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Windows PDA Medical Software Benefits

PDA Medical BenefitsIf you are concerned about your medical history,... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

DVD The Ultimate Consumer Digital Media

Digital Video Disc or as it is sometimes referred to... Read More

best value cleaning service Northbrook ..