Browse Definitions :
Definition

dot pitch

The dot pitch specification for a display monitor tells you how sharp the displayed image can be. The dot pitch is measured in millimeters (mm) and a smaller number means a sharper image. In desk top monitors, common dot pitches are .31mm, .28mm, .27mm, .26mm, and .25mm. Personal computer users will usually want a .28mm or finer. Some large monitors for presentation use may have a larger dot pitch (.48mm, for example). Think of the dot specified by the dot pitch as the smallest physical visual component on the display. A pixel is the smallest programmable visual element and maps to the dot if the display is set to its highest resolution. When set to lower resolutions, a pixel encompasses multiple dots.

Technically, in a cathode ray tube (CRT) display with a shadow mask, the dot pitch is the distance between the holes in the shadow mask, measured in millimeters (mm). The shadow mask is a metal screen filled with holes through which the three electron beams pass that focus to a single point on the tube's phosphor surface. In CRTs that use an aperture grill (a slotted form of mask), such as Sony's Trinitron flat-screen technology, the dot pitch is the difference between adjacent slots that pass through an electron beam of the same color.

This was last updated in July 2005
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close