Skip to main content

The 8 best URL shortener services

Is the processor adulterated? If not, how come the (box) processor is open or (stray) the price of the "processor" is so low?

The processor is not duplicated. Currently, Intel and AMD make processors for desktops.


The processor cell is boxed in two ways and OEM or Tray processor. Boxed processors are mainly sold to general buyers. Boxed processors are usually sold at 30% more than OEM or Tray processors.


Now your question may be 30% means a lot. So how does Tray processor sell so low. So are the processors adulterated? In fact, there is no cooler with Tray processor and no box asana, these save a lot of Intel and AMD costs. The bigger issue is that they mainly sell Tray / OEM processors to different computer companies like Dell, Apple, Asus, Hp etc. So these companies don't usually buy two or four processors like buyers. They bought thousands and millions of processors. So in that case they can buy much less.


Now let's see how the Tray / OEM processors that are sold in different places come to the general buyer. In fact, these are all second hand processors. Offices, hospitals, research centers and general users in different countries upgrade their computers every few years. But their old processors are still in good condition and the processor is not easily damaged. So don't throw them away. They are collected. It is then shortened according to model and generation and sold on Tray. Now these are but second hand tray processors. These are not sold directly by Intel or AMD. So any ordinary buyer can buy these if he wants. You can buy such second hand tray processors from different websites in China at a much lower price.


Now let's see what happens in our country? Many second hand trays in our country are bought from China and are very cheap as they are bought in large quantities. They then sell them to the general buyer in the country. There is no box or cooler with them.


But lately, some unscrupulous traders have been selling Tray processors as boxed processors with fake coolers and user manuals. So when buying a processor, make sure that the box is sealed and that the serial number of the box matches the serial number of the processor. You can verify the serial number from the processor's website. Moreover, even if you see the processor in your hand, you will understand whether it is second hand or not.


However, if you get these tray processors much less than the boxed processor, then you have to see if the processor is working at the time of purchase. Usually the processor does not break down easily and the store will give you a minimum 1 year warranty so you can use it safely. Even if it is second hand, it does not lose the efficiency of the processor. It stays the same. However, if the processor is unlocked and if the first user uses it after months of overclocking, the performance may decrease slightly. 


Comments

Popular posts from this blog

How does GPS work?

One of the unique gifts of modern technology is GPS (Global Positioning System). Nowadays, anyone who has a smartphone with GPS can travel around the world without any help and all this is possible for GPS technology. GPS (Global Positioning System) was developed in 1955. Since then, over time, its technology has improved in many ways. You have a mobile in your hand and you can get all the information including your location in a blink of an eye but all these things are possible for the satellites above your head. GPS takes the help of satellite technology to know your location. There are currently 30 (More than 30 according to NASA) satellites orbiting the Earth for GPS work, of which 27 are currently in operation and the remaining 4 (appx.) Are for future backup. If any of those 30 satellites are malfunctioned, then those 4 satellites will be used. The three parts of GPS are: 1. Satellite 2. Ground Station 3. Receiver Image: GPS communication (Image source: NASA) The mobile you are u

Who is the biggest hacker in the world?

Since the question here is about hackers, I would like to mention the actions of a hacker. Hamza Bendelladj This is an Algerian hacker with the code name "BX1" and nickname "Smiling Hacker". He was one of the top 10 most notorious hackers in the FBI and Interpol. He has been accused of embezzling millions of dollars from more than two hundred American and European financial institutions through a computer virus. His "RimiG33K" virus infected about 50 million computers worldwide, and Hamza obtained information from various banks. He was arrested by Thai police in 2013 after a three-year search. But he did not resist arrest. Hamza said goodbye to his family after his arrest and his wife and daughter set off without him. He was smiling in all the pictures taken after his arrest even after being handcuffed. He earned the nickname "Smiling Hacker" because of the smile on his face during media presentations. Asked what he did with the money, Hamza said

How to find the information you need from Google?

 Google, the world's most popular search engine, may not be able to find Internet users who do not search for information at least once a day. If we search by typing just a word or two, the huge store of information that is caught in front of us, may not have an alternative to initially collecting information. But sometimes we have to get a lot of speed to find the necessary information from Google. Our hair falls out to find the desired information, especially in the case of academic research. But it is possible to get all the information we catch from Google. So if we pay attention to some things in the case of Google search, we can easily find the site of our choice or the necessary information, so we will save a lot of time. According to a survey by Whistler University, only 25 percent of students can find the information they need from Google. In our country that number may be less. Despite having this huge database at hand, we are not able to use it properly. Here are some us