Virtual Memory




Introduction
Today application is getting bigger and bigger. Therefore, it requires a bigger system memory in order for the system to hold the application data, instruction, and thread and to load it. The system needs to copy the application data from the HDD into the system memory in order for it to process and execute the data. Once the memory gets filled up with data, the system will stop loading the program. In this case, users need to add more memory onto their system to support that intense application. However, adding more system memory costs the money and the normal user only needs to run the the intense application that requires the memory only for one or two days. Therefore, virtual memory is introduced to solve that type of problem.

Types of Memory
There are two types of memory, which are as follows:
*System Me mory is a memory that is used to store the application data and instruction in order for the system to process and execute that application data and instruction. When you install the memory sticks to increase the system RAM, you are adding more system memory. System Memory can be known as either the physical memory or the main memory.

* Virtual Memory is a memory that uses a portion of HDD space as the memory to store the application data and instruction that the system deemed it doesn't need to process for now. Virtual Memory can be known as the logical memory, and it controls by the Operating System, which is Microsoft Windows. Adding the Virtual Memory can be done in system configuration.

temp storage

What is Virtual memory?
Virtual Memory is a HDD space that uses some portion of it as the memory. It is used to store application data and instruction that is currently not needed to be process by the system.

During the program loading process, the system will copy the application data and its instruction from the HDD into the main memory (system memory). Therefore the system can use its resources such as CPU to process and execute it. Once the system memory gets filled up, the system will start moving some of the data and instruction that don't need to process anymore into the Virtual Memory until those data and instruction need to process again. So the system can call the next application data and instruction and copy it into the main memory in order for the system to process the rest and load the program. When the data and instruction that is in the Virtual Memory needs to process again, the system will first check the main memory for its space. If there is space, it will simply swap those into the main memory. If there are not any space left for the main memory, the system will first check the main memory and move any data and instructions that doesn't need to be process into the Virtual Memory. And then swap the data and instruction that need to be process by the system from the Virtual Memory into the main memory.

Is this affect performance?
Having too low of Virtual Memory size or large Virtual Memory size (meaning the size that is above double of the system memory) is not a good idea. If you set the Virtual Memory too low, then the OS will keep issuing an error message that states either Not enough memory or Virtual too low. This is because some portion of the system memory are used to store the OS Kernel, and it requires to be remain in the main memory all the time. Therefore the system needs to have a space to store the not currently needed process data and instruction when the main memory get filled up. If you set the Virtual Memory size too large to support the intensive application, it is also not a good idea. Because it will create the performance lagging, and even it will take the HDD free space. The system needs to transfer the application data and instruction back and forth between the Virtual Memory and the System Memory. Therefore, that is not a good idea. The ideal size for the Virtual Memory is the default size of Virtual Memory, and it should not be exceed the value of the triple size of system memory.
To determine how much virtual memory you need, since the user's system contains the different amount of RAM, it is based on the system. By default, the OS will set the appropriate size for Virtual Memory.
The default and appropriate size of Virtual Memory is:
CODE
* 1.5 =
For example, if your system contains 256 MB of RAM, you should set 384 MB for Virtual Memory.
CODE
256 MB of RAM (Main Memory) * 1.5 = 384 MB for Virtual Memory
If you would like to determine how much the Virtual Memory is for your system and/or would like to configure and add more virtual memory, follow the procedure that is shown below. The following procedure is based on windows XP Professional.
1-1) Go to right-click My Computer and choose Properties
system properties
1-2) In the System Properties dialog box, go to Advanced tab
advanced
1-3) Click Settings button that is from the Performance frame
performance
1-4) Once the Performance Options shows up on the screen, go to Advanced tab
programmes
1-5) Under the Advanced tab, click the Change button from the Virtual Memory frame to access to the Virtual Memory setting
Then the Virtual Memory dialog box appears on the screen. In there, you are able to check how much the Virtual Memory you set. If you would like to modify the size of Virtual Memory, follow the procedure that is shown below.
2-1) In there, select the drive letter that is used to install the Operating System
2-2) Choose the option that says, "Custom Size/Change "
Once you choose that option, the setting for Initial Size and Maximum Size become available for you to set. Initial Size (MB) means the actual size of Virtual Memory, and Maximum Size (MB) means the maximum size of Virtual Memory that is allowed to use.
Let's say if your system contains 512 MB of RAM, then the ideal setting for the Virtual Memory is as follows:
CODE
Initial Size (MB): 768
Maximum Size (MB): 1500
primary storage
Once you are happy with that Virtual Memory size, click the Set button from Paging file size for selected drive to apply the setting for the Virtual Memory size. Then click the OK button to apply the setting.
That's where you can manage and configure for the size of Virtual Memory.
Additional Information
* To maintain the good overall system performance, you should be using the default size of actual size for Virtual Memory and the triple the value of the size of the main memory for the maximum size of Virtual Memory. If you find that main memory plus virtual memory is not big enough to load the intensive application, then you will need to add more main memory onto your system.

what does 'IP Adress' mean?




IP Adresses
Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this:
• 216.27.61.137
To make it easier for us humans to remember, IP addresses are normally expressed in decimal format as a "dotted decimal number" like the one above. But computers communicate in binary form. Look at the same IP address in binary:
• 11011000.00011011.00111101.10001001
The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers.
Since each of the eight positions can have two different states (1 or 0) the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!
Out of the almost 4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is used for broadcasts.
The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host.
The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet. There are five IP classes plus certain special addresses:
Default Network - The IP address of 0.0.0.0 is used for the default network.
Class A - This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host.
This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.

Net

Host or Node

115.

24.53.107

Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.
Class B - Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host.
This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.

Net

Host or Node

145.24.

53.107

Class C - Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host.
The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.

Net

Host or Node

195.24.53.

107

Class D - Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net

Host or Node

224.

24.53.107

Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net

Host or Node

240.

24.53.107

Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.

Basics Of Spyware

inside_spyware


What is a Spyware?
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring.
Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, or diverting advertising revenue to a third party.
In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Route of infection
Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through exploitation of software vulnerabilities.
Most spyware is installed without users being aware. Since they tend not to install software if they know that it will disrupt their working environment and compromise their privacy, spyware deceives users, either by piggybacking on a piece of desirable software such as Kazaa, or tricking them into installing it (the Trojan horse method). Some "rogue" anti-spyware programs even masquerade as security software.
Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really do the opposite.Here are some of the general ways in which Spyware finds its way into your computer:
Piggybacked software installation - Some applications -- particularly peer-to-peer file-sharing clients -- will install spyware as a part of their standard install. If you don't read the installation list closely, you might not notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as an alternative to software you have to buy. There's no such thing as a free lunch.
software
While it officially claims otherwise, Kazaa has been known to include spyware in its download package.
Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would be your browser's standard message telling you the name of the software and asking if it's okay to install it.
Internet Explorer security warning
Internet Explorer security warning
If your security settings are set low enough, you won't even get the warning.
Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware themselves. Particularly nasty add-ons are considered browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.
Bonzi Buddy is an 'add-on' application that includes spyware in its package.
Bonzi Buddy is an "add-on" application that includes spyware in its package.
Masquerading as anti-spyware - This is one of the cruelest tricks in the book. This type of software convinces you that it's a tool to detect and remove spyware.
• Provide the ability to interact with another program or a Web site (For example, the HowStuffWorks screensaver keeps the mouse active, which allows you to click on several different icons to access specific areas of the HowStuffWorks Web site.)
This type of software convinces you that it's a tool to detect and remove spyware.
When you run the tool, it tells you your computer is clean while it installs additional spyware of its own.

What Spyware can do?
Spyware can do any number of things once it is installed on your computer.
At a minimum, most spyware runs as an application in the background as soon as you start your computer up, hogging RAM and processor power. It can generate endless pop-up ads that make your Web browser so slow it becomes unusable. It can reset your browser's home page to display an ad every time you open it. Some spyware redirects your Web searches, controlling the results you see and making your search engine practically useless. It can also modify the DLLs (dynamically linked libraries) your computer uses to connect to the Internet, causing connectivity failures that are hard to diagnose.
Certain types of spyware can modify your Internet settings so that if you connect through dial-up service, your modem dials out to expensive, pay telephone numbers. Like a bad guest, some spyware changes your firewall settings, inviting in more unwanted pieces of software. There are even some forms that are smart enough to know when you try to remove them in the Windows registry and intercept your attempts to do so.
The point of all this from the spyware makers' perspective is not always clear. One reason it's used is to pad advertisers' Web traffic statistics. If they can force your computer to show you tons of pop-up ads and fake search results, they can claim credit for displaying that ad to you over and over again. And each time you click the ad by accident, they can count that as someone expressing interest in the advertised product.
Another use of spyware is to steal affiliate credits. Major shopping sites like Amazon and eBay offer credit to a Web site that successfully directs traffic to their item pages. Certain spyware applications capture your requests to view sites like Amazon and eBay and then take the credit for sending you there.
Snitches and Sneaks
There are computer programs that truly "spy" on you. There are applications designed to silently sit on your desktop and intercept personal information like usernames and passwords. These programs include Bugdrop, Back Orifice and VX2. These are more like viruses or hacker tools than spyware.

Preventions
As the spyware threat has worsened, a number of techniques have emerged to counteract it. These include programs designed to remove or to block spyware, as well as various user practices which reduce the chance of getting spyware on a system.
Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system.
Anti-spyware programs
Many programmers and some commercial firms have released products designed to remove or block spyware. Steve Gibson's OptOut, mentioned above, pioneered a growing category. Programs such as Lavasoft's Ad-Aware SE and Patrick Kolla's Spybot - Search & Destroy rapidly gained popularity as effective tools to remove, and in some cases intercept, spyware programs. More recently Microsoft acquired the GIANT AntiSpyware software, rebranding it as Windows AntiSpyware beta and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In early spring, 2006, Microsoft renamed the beta software to Windows Defender, and it was released as a free download in October 2006. Microsoft currently ships the product for free with Windows Vista.

Other well-known anti-spyware products include:
• ParetoLogic's Anti-Spyware and XoftSpy SE
• PC Tools's Spyware Doctor
• Sunbelt Software's Counterspy
• Trend Micro's HijackThis
• Webroot Software's Spy Sweeper
Major anti-virus firms such as Symantec, McAfee and Sophos have come later to the table, adding anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However, recent versions of these major firms' home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses.
Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection from them (as it does for viruses). Recently, the anti-virus company Grisoft, creator of AVG anti-virus program, acquired anti-spyware firm Ewido Networks, re-labeling their Ewido anti-spyware program as AVG Anti-Spyware. This shows a trend by anti virus companies to launch a dedicated solution to spyware and malware. Zone Labs, creator of Zone Alarm firewall have also released an anti spyware program.

Preventions
As the spyware threat has worsened, a number of techniques have emerged to counteract it. These include programs designed to remove or to block spyware, as well as various user practices which reduce the chance of getting spyware on a system.
Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system.
Anti-spyware programs
Many programmers and some commercial firms have released products designed to remove or block spyware. Steve Gibson's OptOut, mentioned above, pioneered a growing category. Programs such as Lavasoft's Ad-Aware SE and Patrick Kolla's Spybot - Search & Destroy rapidly gained popularity as effective tools to remove, and in some cases intercept, spyware programs. More recently Microsoft acquired the GIANT AntiSpyware software, rebranding it as Windows AntiSpyware beta and releasing it as a free download for Genuine Windows XP and Windows 2003 users. In early spring, 2006, Microsoft renamed the beta software to Windows Defender, and it was released as a free download in October 2006. Microsoft currently ships the product for free with Windows Vista.

Other well-known anti-spyware products include:
• ParetoLogic's Anti-Spyware and XoftSpy SE
• PC Tools's Spyware Doctor
• Sunbelt Software's Counterspy
• Trend Micro's HijackThis
• Webroot Software's Spy Sweeper
Major anti-virus firms such as Symantec, McAfee and Sophos have come later to the table, adding anti-spyware features to their existing anti-virus products. Early on, anti-virus firms expressed reluctance to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as "spyware". However, recent versions of these major firms' home and business anti-virus products do include anti-spyware functions, albeit treated differently from viruses.
Symantec Anti-Virus, for instance, categorizes spyware programs as "extended threats" and now offers real-time protection from them (as it does for viruses). Recently, the anti-virus company Grisoft, creator of AVG anti-virus program, acquired anti-spyware firm Ewido Networks, re-labeling their Ewido anti-spyware program as AVG Anti-Spyware. This shows a trend by anti virus companies to launch a dedicated solution to spyware and malware. Zone Labs, creator of Zone Alarm firewall have also released an anti spyware program.

CRT Monitor

Img05


CRT Monitors
A CRT monitor contains millions of tiny red, green, and blue phosphor dots that glow when struck by an electron beam that travels across the screen to create a visible image. The illustration below shows how this works inside a CRT.
Img01
Img02
The terms anode and cathode are used in electronics as synonyms for positive and negative terminals. For example, you could refer to the positive terminal of a battery as the anode and the negative terminal as the cathode.
In a cathode ray tube, the "cathode" is a heated filament. The heated filament is in a vacuum created inside a glass "tube." The "ray" is a stream of electrons generated by an electron gun that naturally pour off a heated cathode into the vacuum.
Electrons are negative. The anode is positive, so it attracts the electrons pouring off the cathode. This screen is coated with phosphor, an organic material that glows when struck by the electron beam.
There are three ways to filter the electron beam in order to obtain the correct image on the monitor screen: shadow mask, aperture grill and slot mask. These technologies also impact the sharpness of the monitor's display.
Display History 101
Displays have come a long way since the blinking green monitors in text-based computer systems of the 1970s. Just look at the advances made by IBM over the course of a decade:
In 1981, IBM introduced the Color Graphics Adapter (CGA), which was capable of rendering four colors, and had a maximum resolution of 320 pixels horizontally by 200 pixels vertically.
IBM introduced the Enhanced Graphics Adapter (EGA) display in 1984. EGA allowed up to 16 different colors and increased the resolution to 640x350 pixels, improving the appearance of the display and making it easier to read text.
In 1987, IBM introduced the Video Graphics Array (VGA) display system. The VGA standard has a resolution of 640x480 pixels and some VGA monitors are still in use.
IBM introduced the Extended Graphics Array (XGA) display in 1990, offering 800x600 pixel resolution in true color (16.8 million colors) and 1,024x768 resolution in 65,536 colors.

CRT Features and Attributes
To evaluate the specifications of CRT monitors, here are a few more things you need to know:
Shadow-mask
A shadow mask is a thin metal screen filled with very small holes. Three electron beams pass through the holes to focus on a single point on a CRT displays' phosphor surface. The shadow mask helps to control the electron beams so that the beams strike the correct phosphor at just the right intensity to create the desired colors and image on the display. The unwanted beams are blocked or "shadowed."
Aperture-grill
Monitors based on the Trinitron technology, which was pioneered by Sony, use an aperture-grill instead of a shadow-mask type of tube. The aperture grill consists of tiny vertical wires. Electron beams pass through the aperture grill to illuminate the phosphor on the faceplate.
Most aperture-grill monitors have a flat faceplate and tend to represent a less distorted image over the entire surface of the display than the curved faceplate of a shadow-mask CRT. However, aperture-grill displays are normally more expensive.
Slot-mask
A less-common type of CRT display, a slot-mask tube uses a combination of the shadow-mask and aperture-grill technologies. Rather than the round perforations found in shadow-mask CRT displays, a slot-mask display uses vertically aligned slots. The design creates more brightness through increased electron transmissions combined with the arrangement of the phosphor dots.
Dot pitch
Dot pitch is an indicator of the sharpness of the displayed image. It is measured in millimeters (mm), and a smaller number means a sharper image. How you measure the dot pitch depends on the technology used:
• In a shadow-mask CRT monitor, you measure dot pitch as the diagonal distance between two like-colored phosphors. Some manufacturers may also cite a horizontal dot pitch, which is the distance between two-like colored phosphors horizontally.
• The dot pitch of an aperture-grill monitor is measured by the horizontal distance between two like-colored phosphors. It is also sometimes are called stripe pitch.
Img05
The smaller and closer the dots are to one another, the more realistic and detailed the picture appears. When the dots are farther apart, they become noticeable and make the image look grainier.
Unfortunately, manufacturers are not always upfront about dot pitch measurements, and you cannot necessarily compare shadow-mask and aperture-grill CRT types, due to the difference in horizontal and vertical measurements.
The dot pitch translates directly to the resolution on the screen. If you were to put a ruler up to the glass and measure an inch, you would see a certain number of dots, depending on the dot pitch. Here is a table that shows the number of dots per square centimeter and per square inch in each of these common dot pitches:

Dot Pitch

Approx. number of
pixels/cm2

Approx. number of
pixels/in2

.25 mm

1,600

10,000

.26 mm

1,444

9,025

.27 mm

1,369

8,556

.28 mm

1,225

7,656

.31 mm

1,024

6,400

.51 mm

361

2,256

1 mm

100

625

Refresh Rate
In monitors based on CRT technology, the refresh rate is the number of times that the image on the display is drawn each second. If your CRT monitor has a refresh rate of 72 Hertz (Hz), then it cycles through all the pixels from top to bottom 72 times a second.
Refresh rates are very important because they control flicker, and you want the refresh rate as high as possible. Too few cycles per second and you will notice a flickering, which can lead to headaches and eye strain.

Img06

Because your monitor's refresh rate depends on the number of rows it has to scan, it limits the maximum possible resolution. Most monitors support multiple refresh rates. Keep in mind that there is a tradeoff between flicker and resolution, and then pick what works best for you.
This is especially important with larger monitors where flicker is more noticeable. Recommendations for refresh rate and resolution include 1280x1024 at 85 Hertz or 1600x1200 at 75 Hertz.
Multiple Resolutions
Because a CRT uses electron beams to create images on a phosphor screen, it supports the resolution that matches its physical dot (pixel) size as well as several lesser resolutions. For example, a display with a physical grid of 1280 rows by 1024 columns can obviously support a maximum resolution of 1280x1024 pixels.
It also supports lower resolutions such as 1024x768, 800x600, and 640x480. As noted previously, an LCD monitor works well only at its native resolution.

LCDs vs. CRTs
If you are looking for a new display, you should consider the differences between CRT and LCD monitors. Choose the type of monitor that best serves your specific needs, the typical applications you use, and your budget.
Advantages of LCD Monitors
• Require less power - Power consumption varies greatly with different technologies. CRT displays are somewhat power-hungry, at about 100 watts for a typical 19-inch display. The average is about 45 watts for a 19-inch LCD display. LCDs also produce less heat.
• Smaller and weigh less - An LCD monitor is significantly thinner and lighter than a CRT monitor, typically weighing less than half as much. In addition, you can mount an LCD on an arm or a wall, which also takes up less desktop space.
• More adjustable - LCD displays are much more adjustable than CRT displays. With LCDs, you can adjust the tilt, height, swivel, and orientation from horizontal to vertical mode. As noted previously, you can also mount them on the wall or on an arm.
• Less eye strain - Because LCD displays turn each pixel off individually, they do not produce a flicker like CRT displays do. In addition, LCD displays do a better job of displaying text compared with CRT displays.
Advantages of CRT Monitors
• Less expensive - Although LCD monitor prices have decreased, comparable CRT displays still cost less.
• Better color representation - CRT displays have historically represented colors and different gradations of color more accurately than LCD displays. However, LCD displays are gaining ground in this area, especially with higher-end models that include color-calibration technology.
• More responsive - Historically, CRT monitors have had fewer problems with ghosting and blurring because they redrew the screen image faster than LCD monitors. Again, LCD manufacturers are improving on this with displays that have faster response times than they did in the past.
• Multiple resolutions - If you need to change your display's resolution for different applications, you are better off with a CRT monitor because LCD monitors don't handle multiple resolutions as well.
• More rugged - Although they are bigger and heavier than LCD displays, CRT displays are also less fragile and harder to damage.
So now that you know about LCD and CRT monitors, let's talk about how you can use two monitors at once. They say, "Two heads are better than one." Maybe the same is true of monitors!

Dual Monitors
One way to expand your computer's display is to add a second monitor. Using dual monitors can make you more productive and add a lot to your computing experience.
With two monitors, you can:
• View large spreadsheets
• Make changes to a web page's code on one monitor and view the results on the second
• Open two different applications, such as a Word document on one monitor and your web browser on the second
Besides two displays and two sets of the appropriate video cables, the only other thing you need is a video adapter with two display connections. The connections can be analog or digital; they need only to match the type of connections on the monitors.
It does not matter what type of monitor you use; two LCDs, two CRTs, or one of each works fine as long as the video adapter has compatible connections.
If you don't have a video adapter with two connections, you can purchase one and replace your current adapter. This generally works better than simply installing another video card with a single connection. Combination cards also come with more features, such as a TV-out port.
In addition to verifying your hardware, you should also double-check your computer's operating system to be sure it supports the use of dual monitors. For example, Windows 98 SE, Me, 2000, and XP support multiple monitors.
If you really want to increase your screen real estate, especially for applications such as financial trading or 3-D design, you can even implement three or more monitors.

Other Technologies
Touch-screen Monitors
Displays with touch-screen technology let you input information or navigate applications by touching the surface of the display. The technology can be implemented through a variety of methods, including infrared sensors, pressure-sensitive resistors or electronic capacitors.
Wireless Monitors
Similar in looks to a tablet PC, wireless monitors use technology such as 802.11b/g to connect to your computer without a cable. Most include buttons and controls for mousing and web surfing, and some also include keyboards. The displays are battery-powered and relatively lightweight. Most also include touch-screen capabilities.
Television and HDTV Integration
Some displays have built-in television tuners that you can use for viewing cable TV on your computer. You can also find displays that accept S-video input directly from a video device. Additional features include picture-in-picture or picture-on-picture capability, a remote control and support for high-definition television (HDTV).

Computer Monitor




Computer Monitors and Display Technology
Because we use them daily, many of us have a lot of questions about our monitors and may not even realize it. What does "aspect ratio" mean? What is dot pitch? How much power does a display use? What is the difference between CRT and LCD? What does "refresh rate" mean?
Monitor01
Display Technology
Often referred to as a monitor when packaged in a separate case, the display is the most-used output device on a computer. The display provides instant feedback by showing you text and graphic images as you work or play.
Most desktop displays use liquid crystal display (LCD) or cathode ray tube (CRT) technology, while nearly all portable computing devices such as laptops incorporate LCD technology.
Because of their slimmer design and lower energy consumption, monitors using LCD technology (also called flat panel or flat screen displays) are replacing the venerable CRT on most desktops.
Standards and Resolution
Resolution refers to the number of individual dots of color, known as pixels, contained on a display. Resolution is expressed by identifying the number of pixels on the horizontal axis (rows) and the number on the vertical axis (columns), such as 800x600. Resolution is affected by a number of factors, including the size of the screen.
As monitor sizes have increased over the years, display standards and resolutions have changed. In addition, some manufacturers offer widescreen displays designed for viewing DVD movies.
Common Display Standards and Resolutions

Standard

Resolution

Typical Use

XGA (Extended Graphics Array)

1024x768

15- and 17-inch CRT monitors
15-inch LCD monitors

SXGA (Super XGA)

1280x1024

15- and 17-inch CRT monitors
17-and 19-inch LCD monitors

UXGA (Ultra XGA)

1600x1200

19-, 20-, 21-inch CRT monitors
20-inch LCD monitors

QXGA (Quad XGA)

2048x1536

21-inch and larger CRT monitors

WXGA (Wide XGA)

1280x800

Wide aspect 15.4-inch laptops
LCD displays

WSXGA+ (Wide SXGA plus)

1680x1050

Wide aspect 20-inch LCD monitors

WUXGA (Wide Ultra XGA)

1920x1200

Wide aspect 22-inch and larger LCD monitors

In addition to the screen size, display standards and resolutions are related to something called the aspect ratio.

Aspect Ratio and Viewable Area
Two measures describe the size of your display: the aspect ratio and the screen size. Historically, computer displays, like most televisions, have had an aspect ratio of 4:3. This means that the ratio of the width of the display screen to the height is 4 to 3.
For widescreen LCD monitors, the aspect ratio is 16:9 (or sometimes 16:10 or 15:9). Widescreen LCD displays are useful for viewing DVD movies in widescreen format, playing games and displaying multiple windows side by side. High definition television (HDTV) also uses a widescreen aspect ratio.
All types of displays include a projection surface, commonly referred to as the screen. Screen sizes are normally measured in inches from one corner to the corner diagonally across from it. This diagonal measuring system actually came about because the early television manufacturers wanted to make the screen size of their TVs sound more impressive.
Interestingly, the way in which the screen size is measured for CRT and LCD monitors is different. For CRT monitors, screen size is measured diagonally from outside edges of the display casing. In other words, the exterior casing is included in the measurement as seen below.
Monitor02
For LCD monitors, screen size is measured diagonally from the inside of the beveled edge. The measurement does not include the casing as indicated in the image below.
Monitor03
Because of the differences in how CRT and LCD monitors are measured, a 17-inch LCD display is comparable to a 19-inch CRT display. For a more accurate representation of a CRT's size, find out its viewable screen size. This is the measurement of a CRT display without its outside casing.
Popular screen sizes are 15, 17, 19 and 21 inches. Notebook screen sizes are smaller, typically ranging from 12 to 17 inches. As technologies improve in both desktop and notebook displays, even larger screen sizes are becoming available. For professional applications, such as medical imaging or public information displays, some LCD monitors are 40 inches or larger!
Obviously, the size of the display directly affects resolution. The same pixel resolution is sharper on a smaller monitor and fuzzier on a larger monitor because the same number of pixels is spread out over a larger number of inches. An image on a 21-inch monitor with an 800x600 resolution will not appear nearly as sharp as it would on a 15-inch display at 800x600.

Connections
To display information on a monitor, your computer sends the monitor a signal. The signal can be in analog or digital format.
Analog (VGA) Connection
Because most CRT monitors require the signal information in analog (continuous electrical signals or waves) form and not digital (pulses equivalent to the binary digits 0 and 1), they typically use an analog connection.
However, computers work in a digital world. The computer and video adapter convert digital data into analog format. A video adapter is an expansion card or component that provides the ability to convert display information into a signal that is sent to the monitor. It can also be called a graphics adapter, video card or graphics card.
Once the display information is in analog form, it is sent to the monitor through a VGA cable. The cable connects at the back of the computer to an analog connector (also known as a D-Sub connector) that has 15 pins in three rows. See the diagram below:
Monitor04

1: Red out

6: Red return (ground)

11: Monitor ID 0 in

2: Green out

7: Green return (ground)

12: Monitor ID 1 in
or data from display

3: Blue out

8: Blue return (ground)

13: Horizontal Sync out

4: Unused

9: Unused

14: Vertical Sync

5: Ground

10: Sync return (ground)

15: Monitor ID 3 in
or data clock

You can see that a VGA connector like this has three separate lines for the red, green and blue color signals, and two lines for horizontal and vertical sync signals. In a normal television, all of these signals are combined into a single composite video signal. The separation of the signals is one reason why a computer monitor can have so many more pixels than a TV set.
Because a VGA (analog) connector does not support the use of digital monitors, the Digital Video Interface (DVI) standard was developed.
DVI Connection
DVI keeps data in digital form from the computer to the monitor. There's no need to convert data from digital information to analog information. LCD monitors work in a digital mode and support the DVI format.
At one time, a digital signal offered better image quality compared to analog technology. However, analog signal processing technology has improved over the years and the difference in quality is now minimal.
The DVI specification is based on Silicon Image's Transition Minimized Differential Signaling (TMDS) and provides a high-speed digital interface. A transmitter on the video adapter sends the digital information to a receiver in the monitor.
TMDS takes the signal from the video adapter, determines the resolution and refresh rate that the monitor is using, and spreads the signal out over the available bandwidth to optimize the data transfer from computer to monitor.
DVI cables can be a single link cable that uses one TMDS transmitter or a dual link cable with two transmitters. A single link DVI cable and connection supports a 1920x1080 image, and a dual link cable/connection supports up to a 2048x1536 image.
Monitor06
There are two main types of DVI connections:
DVI-digital (DVI-D) is a digital-only format. It requires a video adapter with a DVI-D connection and a monitor with a DVI-D input. The connector contains 24 pins/receptacles in 3 rows of 8 plus a grounding slot for dual-link support. For single-link support, the connector contains 18 pins/receptacles.
DVI-integrated (DVI-I) supports both digital and analog transmissions. This gives you the option to connect a monitor that accepts digital input or analog input. In addition to the pins/receptacles found on the DVI-D connector for digital support, a DVI-I connector has 4 additional pins/receptacles to carry an analog signal.

Monitor07
DVI-D connectors carry a digital-only signal and DVI-I adds four pins for analog capability. Both connectors can be used with a single-link or a dual-link cable, depending upon the requirements of the display.

If you buy a monitor with only a DVI (digital) connection, make sure that you have a video adapter with a DVI-D or DVI-I connection. If your video adapter has only an analog (VGA) connection, look for a monitor that supports the analog format.

Color Depth
The combination of the display modes supported by your graphics adapter and the color capability of your monitor determine how many colors it displays. For example, a display that operates in SuperVGA (SVGA) mode can display up to 16,777,216 (usually rounded to 16.8 million) colors because it can process a 24-bit-long description of a pixel. The number of bits used to describe a pixel is known as its bit depth.
With a 24-bit bit depth, eight bits are dedicated to each of the three additive primary colors -- red, green and blue. This bit depth is also called true color because it can produce the 10,000,000 colors discernible to the human eye, while a 16-bit display is only capable of producing 65,536 colors. Displays jumped from 16-bit color to 24-bit color because working in eight-bit increments makes things a whole lot easier for developers and programmers.
Simply put, color bit depth refers to the number of bits used to describe the color of a single pixel. The bit depth determines the number of colors that can be displayed at one time. Take a look at the following chart to see the number of colors different bit depths can produce:

Bit-Depth

Number of Colors

1

2
(monochrome)

2

4
(CGA)

4

16
(EGA)

8

256
(VGA)

16

65,536
(High Color, XGA)

24

16,777,216
(True Color, SVGA)

32

16,777,216
(True Color + Alpha Channel)

Notice that the last entry in the chart is for 32 bits. This is a special graphics mode used by digital video, animation and video games to achieve certain effects. Essentially, 24 bits are used for color and the other eight bits are used as a separate layer for representing levels of translucency in an object or image. Nearly every monitor sold today can handle 24-bit color using a standard VGA connector.
To create a single colored pixel, an LCD display uses three subpixels with red, green and blue filters. Through the careful control and variation of the voltage applied, the intensity of each subpixel can range over 256 shades. Combining the subpixels produces a possible palette of 16.8 million colors (256 shades of red x 256 shades of green x 256 shades of blue).

LCD Monitors
The Basics
Liquid crystal display technology works by blocking light. Specifically, an LCD is made of two pieces of polarized glass (also called substrate) that contain a liquid crystal material between them. A backlight creates light that passes through the first substrate.
At the same time, electrical currents cause the liquid crystal molecules to align to allow varying levels of light to pass through to the second substrate and create the colors and images that you see.
Active and Passive Matrix Displays
Most LCD displays use active matrix technology. A thin film transistor (TFT) arranges tiny transistors and capacitors in a matrix on the glass of the display. To address a particular pixel, the proper row is switched on, and then a charge is sent down the correct column.
Since all of the other rows that the column intersects are turned off, only the capacitor at the designated pixel receives a charge. The capacitor is able to hold the charge until the next refresh cycle.

Monitor08
flat-panel display

The other type of LCD technology is passive matrix. This type of LCD display uses a grid of conductive metal to charge each pixel. Although they are less expensive to produce, passive matrix monitors are rarely used today due to the technology's slow response time and imprecise voltage control compared to active matrix technology.

LCD Features and Attributes
To evaluate the specifications of LCD monitors, here are a few more things you need to know.
Monitor09
Native Resolution
Unlike CRT monitors, LCD monitors display information well at only the resolution they are designed for, which is known as the native resolution. Digital displays address each individual pixel using a fixed matrix of horizontal and vertical dots. If you change the resolution settings, the LCD scales the image and the quality suffers. Native resolutions are typically:
• 17 inch = 1024x768
• 19 inch = 1280x1024
• 20 inch = 1600x1200
Viewing Angle
When you look at an LCD monitor from an angle, the image can look dimmer or even disappear. Colors can also be misrepresented. To compensate for this problem, LCD monitor makers have designed wider viewing angles.
(Do not confuse this with a widescreen display, which means the display is physically wider.) Manufacturers give a measure of viewing angle in degrees (a greater number of degrees is better). In general, look for between 120 and 170 degrees.
Because manufacturers measure viewing angles differently, the best way to evaluate it is to test the display yourself. Check the angle from the top and bottom as well as the sides, bearing in mind how you will typically use the display.
Brightness or Luminance
This is a measurement of the amount of light the LCD monitor produces. It is given in nits or one candelas per square meter (cd/m2). One nit is equal to on cd/m2. Typical brightness ratings range from 250 to 350 cd/m2 for monitors that perform general-purpose tasks. For displaying movies, a brighter luminance rating such as 500 cd/m2 is desirable.
Contrast Ratio
The contrast ratio rates the degree of difference of an LCD monitor's ability to produce bright whites and the dark blacks. The figure is usually expressed as a ratio, for example, 500:1. Typically, contrast ratios range from 450:1 to 600:1, and they can be rated as high as 1000:1. Ratios more than 600:1, however, provide little improvement over lower ratios.
Response Rate
The response rate indicates how fast the monitor's pixels can change colors. Faster is better because it reduces the ghosting effect when an image moves, leaving a faint trial in such applications as videos or games.
Adjustability
Unlike CRT monitors, LCD monitors have much more flexibility for positioning the screen the way you want it. LCD monitors can swivel, tilt up and down, and even rotate from landscape (with the horizontal plane longer than the vertical plane) to portrait mode (with the vertical plane longer than the horizontal plane). In addition, because they are lightweight and thin, most LCD monitors have built-in brackets for wall or arm mounting.
Besides the basic features, some LCD monitors have other conveniences such as integrated speakers, built-in Universal Serial Bus (USB) ports and anti-theft locks.
LCD Terms
• Bezel - This is the metal or plastic frame surrounding the display screen. On LCD displays, the bezel is typically very narrow.
• Contrast ratio - The difference in light intensity between white and black on an LCD display is called contrast ratio. The higher the contrast ratio, the easier it is to see details.
Ghosting - An effect of slower response times that cause blurring of images on an LCD monitor, it's also known as latency. The effect is caused by voltage temporarily leaking from energized elements to neighboring, non-energized elements on the display.
• Luminance - Also known as brightness, it is the level of light emitted by an LCD display. Luminance is measured in nits or candelas per square meter (cd/m2). One nit is equal to one cd/m2.
• Native resolution - This actual measurement of an LCD display, in pixels, is given in horizontal by vertical order.
• Response time - The speed at which the monitor's pixels can change colors is called response time. It is measured in milliseconds (ms).
• Stuck pixels - A pixel that is stuck either 'on' or 'off', meaning that it is always illuminated, unlit, or stuck on one color regardless of the image the LCD monitor displays can also be called a dead pixel.
• VESA mount - With this, you can mount a monitor on a desk or wall. It meets recommendations of the Video Electronics Standards Association (VESA).
• Viewing angle - It's the degree of angle at which you can view the screen from the sides (horizontal angle) and top/bottom (vertical angle) and continue to see clearly defined images and accurate colors.