pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Monitor Technologies: Slotted Mask

Slotted

Capitalising on the advantages of both the shadow mask and aperture grill approaches, NEC has developed a hybrid mask type which uses a slot-mask design borrowed from a TV monitor technology originated in the late 1970s by RCA and Thorn. Virtually all non-Trinitron TV sets use elliptically-shaped phosphors grouped vertically and separated by a slotted mask.

In order to allow a greater amount of electrons through the shadow mask, the standard round perforations are replaced with vertically-aligned slots. The design of the trios is also different, and features rectilinear phosphors that are arranged to make best use of the increased electron throughput.

The slotted mask design is mechanically stable due to the criss-cross of horizontal mask sections but exposes more phosphor than a conventional dot-trio design. The result is not quite as bright as with an aperture grill but much more stable and still brighter than dot-trio. It is unique to NEC, and the company capitalised on the design’s improved stability in early 1996 when it fit th first ChromaClear monitors to come to market with speakers and microphones and claimed them to be the new multimedia standard.

  • The Anatomy of a CRT Monitor (and CRT TVs)
  • CRT Monitor Resolution and Refresh Rates (VSF)
  • Monitor Interlacing
  • What is the Dot Pitch of a Computer Monitor
  • Dot Trio Monitors
  • Grill Aperture Monitors
  • Monitor Technologies: Slotted Mask
  • Enhanced Dot Pitch Monitors
  • Electron Beam Monitors
  • Monitor Controls
  • The Different Types of CRT Monitors – From ShortNeck to FST
  • What is a Digital CRT Monitor and How Does It Work
  • What is LightFrame Technology?
  • Safety Standards For Computer Monitors
  • TCO Monitor Standards
  • Monitor Ergonomics

Filed Under: CRT Monitors Tagged With: CRT Monitor, Slotted Mask

Latest Articles

Peer to Peer Network Architecture

In a Peer-to-peer networking architecture each computer (workstation) has equivalent capabilities and responsibilities. There is no server, and computers simply connect with each other in a workgroup to share files, printers, and Internet access. … [Read More...]

CD-ROM Manufacturing

The term premastering is often used quite broadly, to refer to all of the steps which proceed the first stage in the manufacturing process proper. Strictly, data preparation, indexing, testing (also called simulation), and creating the image are … [Read More...]

Hard Disk Longitudinal Recording

For nearly 50 years, the disk drive industry has focused nearly exclusively on a method called longitudinal magnetic recording, in which the magnetisation of each data bit is aligned horizontally in relation to the drive's spinning platter. In longitudinal recording, the fields … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Windows 10 is Coming

In case you have not heard, Windows 10 is about to be released to the masses. The new version is set to be released on July 29, 2015, and you can … [Read More...]

Guide to SanDisk’s CompactFlash memory card

Memory manufacturer SanDisk introduced CompactFlash (CF) in 1994 as a small format memory card, which used the existing PCMCIA-ATA specification … [Read More...]

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: "What part of the universe is this phone from?", even if we already know where it is, but we don't know which operator. … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors