Browse Definitions :
Definition

refresh rate

Contributor(s): Jeff Brumley

The refresh rate is the number of times a display's image is repainted or refreshed per second. The refresh rate is expressed in hertz so a refresh rate of 75 means the image is refreshed 75 times in a second. The refresh rate for each display depends on the video card used. You can change the refresh rate in the display properties. However, if you change the refresh rate to a setting that the display or video card cannot support, the display goes blank or the image becomes distorted. It is recommended to consult the display and video card manuals before changing the settings to determine the supported refresh rates.

An older refresh rate standard, developed by the Video Electronics Standards Association (VESA Local Bus), was only 60 Hz. This refresh rate caused the display's image to flicker, causing eye fatigue and headaches in users. A new standard set the refresh rate to 75 Hz. It is believed that 70 Hz or higher eliminates the flicker. When purchasing a monitor, look for a refresh rate of 75 to 85 Hz.

Dynamic random access memory (DRAM) memory modules also have a refresh rate. A DRAM module is made up of electrical cells. These cells must be recharged or refreshed thousands of times per second or they lose their data. The refresh cycles depend on the number of rows that must be refreshed. For example, a DRAM module that has 4 rows of cells has a refresh cycle of 4K. Some DRAM modules are able to refresh themselves independently of the processor or external refresh circuits. Since this reduces power consumption, this kind of DRAM is commonly used in notebook computers.

This was last updated in April 2005

Continue Reading About refresh rate

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close