Blekk & Toner guide

 

 

 

Du er her // Forsiden // //
HP
Pen Qx9300 ,4C,2.53G

HP Pen Qx9300 ,4C,2.53G

Varenr: 501107-001
Lagerstatus: Forventet 01.05.2017
Frakt: 79,- Sjekk din fraktpris
Frakt
Fyll inn postnummer og klikk
knappen for å vise fraktpriser
  Vis priser
23 191,-  inkl. mva
Fra 698,-/mnd (56 mnd)
Utsett betalingen i 4-6 mnd
Velg finansiering i kassen
Kjøp
Produktinfo

The Intel® Core™2 Extreme processor QX9000 series and Intel® Core™2 Quad processor Q9000 series delivers Intel's advanced, powerful processors for desktop PCs. The processor is designed to deliver performance across applications and usages where end-users can truly appreciate and experience the performance. These applications include Internet audio and streaming video, image processing, video content creation, speech, 3D, CAD, games, multimedia, and multitasking user environments.

Intel® 64 architecture enables the processor to execute operating systems and applications written to take advantage of the Intel 64 architecture. The processor, supporting Enhanced Intel Speedstep® technology, allows tradeoffs to be made between performance and power consumption.

The Intel® Core™2 Extreme processor QX9000 and and Intel® Core™2 Quad processor Q9000 series also includes the Execute Disable Bit capability. This feature, combined with a supported operating system, allows memory to be marked as executable or non-executable.

The Intel® Core™2 Extreme processor QX9000 and and Intel® Core™2 Quad processor Q9000 series supports Intel® Virtualization Technology. Virtualization Technology provides silicon-based functionality that works together with compatible Virtual Machine Monitor (VMM) software to improve on software-only solutions.

The Intel® Core™2 Quad processor Q9000 series supports Intel® Trusted Execution Technology (Intel® TXT). Intel® TXT is a key element in Intel's safer computing initiative that defines a set of hardware enhancements that interoperate with an Intel TXT enabled opeating system to help protect against software-based attacks. It creates a hardware foundation that builds on Intel's Virtualization Technology to help protect the confidentiality and integrity of data stored/created on the client PC.