facebook linkedin twitter

Computerware Blog

Our Comprehensive Guide to Purchasing a New Computer, Part II

Our Comprehensive Guide to Purchasing a New Computer, Part II

In part two of our desktop buying guide, we’ll focus on RAM, or random access memory. Some users have difficulty understanding this, so we’ll do our best to make sure it’s easy to grasp and apply to your own purchasing habits. You’ll learn how to make the best decisions regarding how much RAM your device will need.

The amount of RAM in your device, or random access memory, is not the same as the amount of data that a computer can store. RAM is used to temporarily store data so it can be recalled without pulling it from the computer’s storage. Think of it like short-term memory pulled from a human’s brain. You’ll have options for both high-end and low-end RAM, so it’s important that you find the best solution for your needs. Your need for RAM will be based on how much needs to happen at once. The CPU handles instructions and processes the data that the RAM holds, meaning that the more RAM is available, the larger the amount of data that the CPU can store, and the faster the CPU can process it. The two work together to make your computing experience as smooth as possible.

How Much RAM Does Your Computer Need?

Computers these days have limited options for RAM. There are many brands to choose from, but the important thing to remember is that manufacturers will take care of this aspect for you. It’s only truly important if you are building your own computer. Despite this, it can be complicated. This guide might simplify things a bit, but it will at least help you determine the speed and amount of RAM needed by your device.

  • Skimping the budget: The smallest acceptable amount of RAM in a Windows 10 machine is 4 GB. You might be able to get Windows to run on less, but we don’t recommend it, as this is the bare minimum for light document editing and Internet browsing.
  • Low-end: Most reasonable budget PCs will start at around 8 GB of RAM, which is more than enough to handle the operating system, editing documents, photo browsing, surfing the Internet, and many other tasks.
  • Mid-range: 16 GB is quite achievable for many businesses, even on a budget. The price difference isn’t terribly noticeable, but the investment will be well worth it. 16 GB of RAM is a nice entry point for gaming systems, and while 16 GB isn’t necessarily the catch-all goal, it will give you the most power for your money.
  • High-end: The ceiling for RAM is quite high, but the cost goes along with it. For example, the new Mac Pro can go up to 1.5 TB of RAM, which is about 1500 GB of RAM, but the price is estimated at about $20,000. A gaming rig, video editing system, or server might need more than 16 GB of RAM, but at that point, we recommend working with a professional to determine the best path forward.

Wrapping Up

Your device might be able to update at a later date, but for the initial implementation, we recommend aiming for no less than 8 GB. Realistically, you should try to find options at around 16 GB, but we realize that it’s not always possible.

Does your business need help implementing or acquiring new hardware? Give us a call at (703) 821-8200.

Our Comprehensive Guide to Purchasing a New Comput...
Our Comprehensive Guide to Purchasing a New Comput...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 11, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Network Security Workplace Tips Backup Hosted Solutions Managed Service Provider Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration IT Support VoIP Smartphones IT Support Data Backup Quick Tips Network Mobile Devices communications Business Continuity Microsoft Office Gadgets Data Recovery Disaster Recovery Cybersecurity Social Media Android Upgrade Mobile Office Server Communication Smartphone Virtualization Phishing Mobile Device Management Miscellaneous Ransomware Vendor Management Holiday Apps Outsourced IT Operating System Managed IT Services Windows 10 Windows Tech Term Passwords Remote Monitoring Facebook Internet of Things Users Unified Threat Management Mobile Device Automation BDR Mobile Computing BYOD Remote Computing Managed IT services Apple Data Management Analytics WiFi Windows 10 Training Marketing History The Internet of Things Cloud Computing Artificial Intelligence Firewall Browser Save Money Help Desk Big data Spam Business Technology App Encryption Alert Two-factor Authentication Bandwidth Information Technology Health IT Consultant Office Office 365 Bring Your Own Device Budget Access Control Antivirus Gmail Windows 7 Maintenance Government Printer Managed IT Cybercrime Hard Drives Content Filtering Going Green Windows 8 Managed Service Wireless Technology Outlook Search Recovery Hiring/Firing Employer-Employee Relationship Tech Support Virus Retail Information Saving Time Best Practice Computers Lithium-ion Battery VPN Cost Management Healthcare Computing Customer Service It Management Data Security Money Blockchain Humor Document Management Data Loss iPhone Hacking Project Management IBM Travel Phone System Networking Education Augmented Reality Remote Work Update Risk Management Covid-19 SaaS Administration Conferencing Wireless Save Time File Sharing Downtime Law Enforcement Storage Website Patch Management Hard Drive Solid State Drive Compliance Avoiding Downtime Mobility Data storage Voice over Internet Protocol Proactive IT Flexibility Computer Repair Running Cable Data Breach Password Value Hacker Twitter Legal Intranet Current Events Customer Relationship Management Regulations Applications PowerPoint Vendor Sports Telephone Systems User Net Neutrality Disaster Virtual Desktop Business Intelligence Hosted Solution Social Fax Server End of Support Digital Payment Robot DDoS Router Securty Monitoring Comparison Tablet Google Maps Company Culture Scam Social Engineering Black Market Word Management Social Networking Cryptocurrency Vulnerabilities Cortana Laptop Digital Meetings Business Growth Excel Websites Private Cloud Wi-Fi Telephony Cooperation Paperless Office Software as a Service Machine Learning Unified Communications Processor Settings Distribution Uninterrupted Power Supply Distributed Denial of Service Text Messaging Specifications Safety Vulnerability Webcam Bitcoin Public Cloud Licensing Lifestyle Chrome Documents Cost Data Protection Solutions IT service Entertainment Professional Services Identity Theft Teamwork Heating/Cooling Downloads Computer Accessories Inbound Marketing Integration Trending Bluetooth Politics Smart Devices Virtual Reality Emails Multi-factor Authentication Redundancy Automobile Mouse Managed Services Provider eWaste Telephone Pain Points Chromebook Statistics Memory Evernote Programming Google Docs Computing Infrastructure Hack Experience Network Congestion How To Virtual Assistant How To Download Cleaning Managed Services Monitors Employee/Employer Relationship Managed IT Service Processors Office Tips Start Menu Tech Terms Mobile Technology Co-managed IT Streaming Media USB User Error Gaming Console Microchip Taxes Presentation YouTube Piracy Upload Financial Data Google Drive Managing Costs Windows Server 2008 Reading Debate Samsung Human Resources Smart Tech Electronic Health Records Read Micrsooft Microsoft 365 Harddrive Application Fiber-Optic Database Browsers Spyware Mobile Payment GPS Employer Employee Relationship HTML Memes Drones Medical IT Trend Micro G Suite Printing Hacks Physical Security Mobile Security Security Cameras Threats External Harddrive Telephone System Device Management Managing IT Services User Tip Electricity Proactive Maintenance Digital Signature Software License Trends Telework Business Managemenet Permissions Navigation Language Virtual Machine Relocation Tablets Multi-Factor Security Surveillance Content Management Banking Botnet Fraud Tactics Remote Workers Data Analysis cache Employees Television 3D Ebay Devices IT eCommerce Thin CLient Sync Best Practives Writing WannaCry SQL Server Notifications CCTV UTM Content Music GDPR Managing Risk Smart Phones Virtual Private Network online Currency switches IT Plan Enterprise Resource Planning FinTech Tech Time Management Hypervisor Freedom of Information Reliable Computing PDF Microserver Legislation Error Development Upgrades Corporate Profile Business Metrics Computer Malfunction email scam Addiction Data Storage LinkedIn LiFi Fileless Malware Assessment Hybrid Cloud SharePoint Adminstration Pirating Information Accountants A.I. Holidays Leadership In Internet of Things Best Available Keyboard Proxy Server Azure Google Calendar Domains Modem Strategy Tip of the week Get More Done Procurement Motion Sickness Printer Server Public Speaking Migration Connected Devices Skype Term Work/Life Balance Touchscreen News Scalability Turn Key Wireless Headphones Video Conferencing Archive Electronic Medical Records Deep Learning VoIP Transportation Network Management PCI DSS Visible Light Communication Directions Consultation Display Messenger Tracking Equifax Fleet Tracking Communitications Recording Knowledge Optimization Trojan Shortcut Supply Chain Management IT consulting Dark Web Free Resource Technology Tips Rental Service Troubleshooting Organize Device security MSP Point of Contact SSID Entrepreneur Upselling Web Server HIPAA Desktop Finance Processing Fake News Cabling Environment Nanotechnology Social Network Internet Service Provider Health IT Audit Business Cards Service Level Agreement Regulations Compliance Advertising Flash Wasting Time Data Warehousing Books Video Surveillance Workers Electronic Payment Startup Asset Tracking IT Assessment CIO Logistics Virtual Machines Administrator Competition Recycling Remote Working Windows XP Bookmark Access Supercomputer Business Owner Username Staffing Analytic Google Wallet Emergency Cyber security Hard Drive Disposal Saving ZTime Unified Threat Management Backup and Disaster Recovery Webinar IP Address Gamification Product Reviews Society Google Play Telephone Service Microsoft Excel Worker Screen Reader Customer Resource management Displays Employer/Employee Relationships Computer Care Financial Managing Stress Regulation Printers CrashOverride 3D Printing Capital Personal Information Productuvuty

toner1