answersLogoWhite

0

Beam penetration

  1. Used with random scan monitors.
  2. the colors are depends on the energy of the beam.
  3. only one gun is needed.
  4. there are only three colours are available red, green, blue.
  5. this is not expensive.
  6. Quality of picture is not so good.
  7. if the energy of beam is high then only red color produced.
  8. tube is rugged and will survive high G and vibration.

shadow mask

  1. Used in raster scan monitors.
  2. there is a shadow mask is used.
  3. three guns are needed.
  4. the colors are depends on the gun originating the beam.
  5. there are millions of the colors are available.
  6. it is expensive in the nature.
  7. there is no like that energy criteria.
  8. tube is fragile and shadow mask can detach in high G or vibration conditions.
User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How does a constitutive definition differ fron an operational?

constitutive vs operation definition


Who is the best hedgehog on sonic smash Brothers Amy Sonic Shadow or Silver?

Well, Amy Rose has a crush on Sonic, but some people beg to differ.


What do all sodium isotopes have in common and how do they differ?

What they have in common is that they all have 11 protons in the nucleus.How they differ is that they have different numbers of neutrons in the nucleus.


What is the American Indian name for shadow?

The American Indian name for "shadow" can vary among different tribes and languages. For example, in the Lakota language, "shadow" is referred to as "wíiyA," while in Navajo, it is called "naayééneeh." Each tribe has its own unique linguistic heritage, so the term for "shadow" will differ accordingly.


How does preferred stock differ from common stock?

pay dividend before common stock


What is the difference between penetration testing and venerability scanning?

pen testing is to try and gain access. vulnerability scan is to detect flaws that could be exploited that also include penetration vulnerabilities.but what i think you trying to hear is that vulnerabilities differ because they include denial of service or making something not work if exploited


What role do shadow banks play in the financial system of the USA, and how do they differ from traditional banks?

Shadow banks in the USA play a significant role in the financial system by providing credit and liquidity to the economy. They differ from traditional banks in that they are not subject to the same regulations and oversight, which can make them more risky but also more flexible in their operations.


How do Writ of Certiorari differ to certificate?

The common part is that it is heard.


What the two sects have in common where they differ and whether the similarities or the differences are more important in the Islam sects Shia and Sunni?

they have common God and common book Koran and many other common. but differ is about who was the right political leader of Islamic world after death of prophet.


What body parts are common to ant and elephant?

What body parts are common to an ant and an elephant? In what way do they differ


What body parts Are commOn to an Ant and an Elephant?

What body parts are common to an ant and an elephant? In what way do they differ


How do love and revenge differ?

unrequited love and jealousy as common themes