ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Our Comprehensive Guide to Purchasing a New Computer, Part I

Our Comprehensive Guide to Purchasing a New Computer, Part I

Most people and businesses rely on computers to get things done. When you are looking to buy a new PC for your home or office, you need to understand all the elements so that you can make an educated choice. To assist you along in this process we’ve put together a five-part guide that outlines the different variables you have to take into account when buying a PC that is right for your needs. In part one, we take a look at the CPU.

Determine the Computer’s Role

The best place to start isn’t with specifications, it is with purpose. What is the purpose of your new computer is going to play? Is it a workstation that is going to be a part of a network of computers or is it a personal device that you will use to edit audio and video? Once you ascertain what you need out of your PC, you can start looking at the components that make up the machine.

You’ll also want to determine if you need the ability to scale the machine. That is, your typical desktop computer created for office work can always be upgraded, but if you need high-end hardware, your best bet is to purchase it outright rather than trying to piece it together. 

Understanding Specifications

The CPU of a machine, or the processor, is one of the central components of a computer. It effectively controls how much a computer is capable of, and how fast it can do it. It also needs to function alongside a lot of the other core components of a machine. Let’s take a look at products from the two largest manufacturers of CPUs, Intel and AMD:

Intel

  • Intel Core i3: This processor is ideal for low-end work, like editing documents, checking email, and surfing the Internet. The latest generation of Core i3 should also suffice to stream video on YouTube and Netflix.
  • Intel Core i5: The i5 processor is a little more powerful than your average i3, as it can handle some light photo editing and gaming. It’s a decent choice for your average office workstation.
  • Intel Core i7: i7 processors are absolutely high-end components. They can be used for video editing and gaming, and unless you plan on running resource-intensive applications such as virtual reality, your Core i7 has plenty of juice. 
  • Intel Core i9: i9 is a tier that has only just recently surfaced. For the average business’ needs, it’s overkill, but it’s perfect for 3D animation, rendering, gaming while streaming, scientific calculations, and so on. The price tag is just as high as you would think.

AMD

  • AMD Ryzen 3: To put it simply, this is AMD’s version of the Intel Core i3 processor, capable of editing documents, surfing the web, and… not much else.
  • AMD Ryzen 5: The Ryzen 5 is about on par with the Intel Core i5, and while you might pay a little bit more for it, the performance of your desktop will improve substantially.
  • AMD Ryzen 7: The Ryzen 7 is similar to Intel’s Core i7; this is where you’ll start to see costs increasing quite a bit.
  • AMD Threadripper: This is where the overkill starts for AMD processors. The Threadripper is capable of handling heavy loads like 3D animation, gaming while streaming, and other intense computing that your average desktop doesn’t need to do.

What Does GHz Matter?

At one time, the GHz of a processor would have been a core metric that someone would have to consider when choosing a processor. Today, the manufacturers’ tiering system simplifies they process substantially. The smaller number processors won’t provide the computational power that the larger ones will, enough said.

Does the Number of Cores Matter?

Cores are the number of processors built in with the CPU. These days you should aim for at least four cores, or what is known as “quad-core”. Your resource intensive tasks like gaming or video editing will require better processors, but most of the time four cores is enough.

One of the biggest things to keep in mind is that using last generation’s CPU isn’t going to save you much money, but as long as you get something that has come out recently, you shouldn’t have too much trouble.

We hope you found this guide to CPUs useful. We continue the PC buyers guide Friday with a look at memory. If you want immediate help with a computer acquisition, contact the IT pros at ClearView IT today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Microsoft Office Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Disaster Recovery Passwords Holiday Covid-19 Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows Remote Server Bandwidth Information Encryption WiFi App Virtualization Business Technology Blockchain Spam Mobile Device Management Employee/Employer Relationship Apple History Information Technology Gmail Office Budget Two-factor Authentication Office 365 Conferencing Access Control Health Data Security Cybercrime Analytics BDR Big Data Wi-Fi Hacker Cost Management Employer-Employee Relationship Patch Management Voice over Internet Protocol Compliance Document Management Vendor Save Money Remote Computing Remote Monitoring Help Desk Hacking IT Management Training Data loss Vendor Management Hard Drive Money Search... Best Practice Customer Service Unified Threat Management Firewall Legal Retail Augmented Reality Alert Word Mobile Office Data storage Applications IBM Hiring/Firing Managed Services Project Management Outlook Website Vulnerabilities Password BYOD Computing Marketing Running Cable VPN Twitter Sports Update Social SaaS Storage DDoS Law Enforcement End of Support Printer Data Breach Remote Workers iPhone Paperless Office Education Cortana Antivirus Windows 7 Content Filtering User Maintenance Free Resource Travel Router Virtual Reality Monitoring Social Engineering How To Cryptocurrency Healthcare Black Market Chrome Websites The Internet of Things YouTube Cleaning Meetings Mobility Robot Windows 11 Laptop Google Maps Scam Mobile Computing Holidays IT Consultant Downtime Excel Safety Chromebook Drones Cooperation Customer Relationship Management Co-Managed IT Automobile Video Conferencing Tech Terms Virtual Desktop Entertainment Experience Virtual Machines Managed IT How To Computer Repair Virtual Assistant Digital Microchip Flexibility Professional Services Taxes Disaster Processor Hack Identity Theft Notifications Managed Services Provider Unified Communications HIPAA Lithium-ion battery Physical Security Virtual Private Network Google Docs Bluetooth Processors Distributed Denial of Service Current Events Multi-factor Authentication Office Tips Private Cloud Memory Solutions Start Menu Computer Care Downloads Images 101 Saving Time Vulnerability Integration Display Software as a Service Politics Machine Learning Computers Settings Bitcoin PowerPoint Data Protection Wireless Technology Administration Employees eWaste Telephone Solid State Drive Avoiding Downtime Presentation Specifications Workplace SSID Phone System Heating/Cooling Environment Social Network Books Media Social Networking Data Analysis Development Screen Reader Language Knowledge Employer/Employee Relationships Windows XP Society Corporate Profile Telephony Employer Employee Relationship Security Cameras Trends Television Virtual Machine Mobile Technology Scams Optimization Devices Monitors Visible Light Communication Cabling Reviews Customer Resource management Reading G Suite 2FA Fileless Malware Teamwork Tip of the week Windows 8 Tablet VoIP Computer Accessories Tracking Data Storage Gamification Mouse Hypervisor Company Culture Relocation Cables Regulations Displays Medical IT Advertising Shopping Telephone System Web Server Paperless Directions Backup and Disaster Recovery Work/Life Balance SQL Server Tech Support Staffing Digital Payment PCI DSS Content SharePoint Licensing Desktop Point of Sale Humor Accountants Worker IP Address Gig Economy Electronic Medical Records Business Communications In Internet of Things Internet Service Provider Database Azure Access Network Congestion Time Management Public Cloud Regulations Compliance Hacks Shortcuts Managed IT Service Reliable Computing Memes Equifax Writing Health IT Human Resources Net Neutrality Tactics Audit Hard Drive Disposal Troubleshooting Spyware Recovery File Sharing Competition Financial Data Username Be Proactive Scalability IT Startup Redundancy Freedom of Information Risk Management Google Apps Entrepreneur Navigation Administrator Addiction Text Messaging email scam LiFi Proactive IT Cache Mobile Security Unified Threat Management Documents Workers Application Telework Bring Your Own Device Workplace Strategies Business Intelligence User Tip Communitications Legislation Microsoft 365 News Smartwatch CCTV Evernote Procurement Network Management Printing Music Business Owner Touchscreen Securty FinTech CES Proxy Server IT Assessment Emails Emergency Fake News Domains Computer Malfunction Botnet Supply Chain Management Service Level Agreement Value Computing Infrastructure Vendor Mangement Cyber security Device security Micrsooft Samsung Organization Management Rental Service Smart Technology Smart Devices Wireless Headphones Flash Microsoft Excel Uninterrupted Power Supply Webcam Tech Remote Working Going Green Telephone Systems Business Cards Business Growth Inbound Marketing Business Mangement Trend Micro Tablets Public Speaking AI Error Digital Security Cameras Bookmark Electronic Health Records Transportation Streaming Media Supercomputer Keyboard Term Download Banking Google Calendar Wasting Time Piracy Google Wallet eCommerce HTML Deep Learning Electronic Payment Virus Modem Hard Drives Messenger Supply Chain Motion Sickness Videos intranet Browsers Surveillance Nanotechnology Google Drive Wireless Shortcut Google Play Upload Business Metrics Comparison Managing Costs Software License Hosted Solution

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?