Browse Definitions :
Definition

twisted nematic display (TN display)

A twisted nematic (TN) display is a common type of liquid-crystal display ( LCD ) that consists of a substance called a nematic liquid crystal that is confined between two plates of polarized glass.

The TN display takes advantage of the ability of the nematic substance to rotate the polarization of light beams passing through it. Two polarizing filters, parallel planes of glass with their polarizing lines oriented at right angles with respect to each other, are positioned on either side of the liquid crystal. When light enters the display, it is polarized by the input filter. In the absence of an electric field, all the incoming light is transmitted. This is because the light polarization is rotated 90 degrees by the nematic liquid crystal, and the light therefore passes easily through the output filter, which is oriented to match the 90-degree shift.

With the application of a voltage , an electric field is produced in the nematic liquid crystal . Under these conditions the polarization effect is reduced. If the voltage is large enough, the polarization effect disappears altogether, and the light is blocked by the output polarizing filter.

Most TN displays have a characteristic black-on-gray or black-on-silver appearance, and are suitable for use in alphanumeric readouts such as those found in wristwatches, cell phone displays, and some calculator displays. The high-resolution LCD panels typically found in handheld and notebook computers use a different technology.

This was last updated in March 2011
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close