Describe the graphic accelerators, Computer Engineering

Assignment Help:

Q. Describe the Graphic Accelerators?

A Graphic Accelerator is actually a chip as a matter of fact most significant chip in your video card. The Graphic Accelerator is essentially the modern development of a much older technology known as the Graphic Co-Processor. Accelerator chip is in fact a chip that has built-in video functions. These functions execute algorithms for image rendering and construction. It does a lot of work that would otherwise have to be done by microprocessor.  Hence accelerator chip is actually optional however very important for good graphics performance. 

The graphic accelerator concludes whether your system can show 3-D graphics, how quickly your system displays a drop-down menu and how good is your video playback etc. It determines the amount as well as kind of memory in framebuffer and also the resolution your PC can display.

The first major graphic accelerators were made by S3 Corporation. Modern Graphic accelerators have internal registers as a minimum 64-bit wide to work on at least 2 pixels at a time.  They can employ the standard Dynamic RAM (DRAM) or more expensive however faster dual-ported Video RAM (VRAM). They support at least the standard resolutions up to 1024×768 pixels. They frequently use RAMDACs for colour support providing full 24-bit or 32-bit colour support.  A RAMDAC (Random AccessMemory Digital-to-Analog Converter) is a microchip which converts digital image data into analog data required by a computer display. Though the higher the resolution needed, the higher is the speed at which chip has to function. So for a resolution of 1280×1024 the chip operates at 100 MHz  At the cutting edge of technology chips now run even as fast as 180 or 200 Mhz.


Related Discussions:- Describe the graphic accelerators

Explain about hyper-threading, Q. Explain about Hyper-threading? Non th...

Q. Explain about Hyper-threading? Non threaded program instructions are executed in a single order at a time until the program completion. Presume a program have four tasks nam

Advantages and disadvantages of structured analysis, Advantages and Disadva...

Advantages and Disadvantages of Structured Analysis With time, you will find out that most customers understand structured methods better than object oriented (OO) methods. As

Control signals from control bus, Control Signals from Control Bus: A numb...

Control Signals from Control Bus: A number of the control signals are provided to control unit by the control bus. These signals are issued from outside the CPU.  Some of these si

Determine the performance of a parallel algorithm, Q. Determine the perform...

Q. Determine the performance of a parallel algorithm? One more method of determining the performance of a parallel algorithm can be performed after calculating a parameter know

Explain executing request using message-passing architecture, Explain the E...

Explain the Executing Requests Using a Message-Passing Architecture Executing requests using a message-passing architecture requires good fundamental client-server programming

Describe in brief about the internet, Describe in brief about The internet ...

Describe in brief about The internet Web sites need to be set up to maximise information supplied to customers and to ensure they are as self-contained and helpful as possible.

Illustrate processor arrangements, Q. Illustrate processor arrangements? ...

Q. Illustrate processor arrangements? HPF$ PROCESSORS P2 (4, 3) !HPF$ TEMPLATE T2 (17, 20) !HPF$ DISTRIBUTE T2 (BLOCK, *) ONTO P1 Means that first dimension of T2 woul

What is the use and function of file transfer protocol, What is the use and...

What is the use and function of File Transfer Protocol? FTP : File Transfer Protocol (FTP) is the protocol used upon the Internet for sending files and is usually used fo

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Implementation of 4-to-1 multiplexer, Implement the Y(A, B, C) = ∑(2,3,5,6)...

Implement the Y(A, B, C) = ∑(2,3,5,6) function using 4-to-1 multiplexer.   Ans. Y(A,B,C)=∑(2,3,5,6) Here we take B,C as the select bits also A as input. To select the input we can

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd