The Monitor

The Monitor

In a computer, the monitor is a device output that screens data in text or image form. The monitor is comprised of the power supply, visual display and circuitry. Typically, the modern monitors display device has TFT-LCD (thin-film transistor liquid crystal display having LED backlighting. Formally monitors required the help of a cathode ray tube during display. The connections between a computer and its monitor are display ports, a digital visual interface, and many more proprietary connectors.

Originally, TV sets were mainly for basic entertainment and computers for processing information. However computer monitors took another job in the 21st century to entertain viewers and users combinable as much as the data processing was concerned. Not only did computers upgrade in resuming the TV roles on top of theirs but also TVs took up theirs and some computer roles.

The aspect ratio common between computer and TV monitors have upgraded to 16.9 and 16.10 from 4.3

The Monitor History

Old electronic computers fitted completely with light bulb panels whereby particular bulbs in each case indicate off/on inside the computer particular register. Computer operating engineers were able to control internal machine states and named it the monitor. During those times, printer lines were considered the output devices while monitors kept track of the operation programs. In the 1980s, (VDU) visual display units were another name used to describe computer monitors. This fell in the 1990s.

What are the monitor’s security vulnerabilities?

Be it bugs, hacks, or any other undesired visitation, security on the computer including the display matters for it would cause unfathomable tragedies.

Remember when we were young in primary schools, and some lazy students could not take seriously studying for upcoming exams, and were fully dependent on their visually scanning skills on other students’ exam papers for answers? No matter how much you would place hands around your answer sheets as walls they would still get a good glimpse. Now envisage them not having to crane their necks so much and visualizing your work on their papers. Not good right?

From time to time NSA swap cable and places bugged cables on particular computers to enable them to conduct secret supervision on computer monitors that have been placed as targets.

Phreaking is referred to the exploiting process of telephone networks. Van Eck phreaking is named after Wim Van Eck a computer researcher from Dutch. He published the paper first in 1985 proving that remote display of LCD or CRT detects electromagnetic emissions. Therefore monitor security is kept on point.

Best laptop for sale in Nairobi Kenya

Check out the best mobile phone repair services in Nairobi Kenya

consult us for the best point of sale system in Nairobi Kenya

 iPhone repair services Nairobi Kenya

check our mobile phone app development in Nairobi Kenya



This website uses cookies and asks your personal data to enhance your browsing experience. We are committed to protecting your privacy and ensuring your data is handled in compliance with the General Data Protection Regulation (GDPR).