Skip to main content

using 4k tv as computer monitor

 [QUOTE=goosedude;158501005]I picked this up because it was such a good deal and it seems using a TV as a computer monitor has drastically changed since the jump to 4K. How is your experience with this as a monitor going?? I'm debating using this as a monitor and phasing out dual 24" 1080p 60Hz monitors.[/QUOTE]

ditch those 2 pathetic 1080p monitors immediately. this one 4k monitor/tv will be drastic upgrade to that. you have huge space in front of you. you don't need those 2 small monitors at all. originally it looks a little too big for me. now i'm even considering a 50" tv.

you do need a good cable to connect to it. some cables only support 1080p. maybe also a good gpu. mine currently only shows 30Hz, though the tv can support 60Hz natively. i think it's my computer gpu is not good enough (integrated intel).

you also need go through the picture settings on the tv. find one good for you. i chose 'movie' mode, which looks good to me so far.

in tv settings set it to remember last input, so when you turn on the tv it goes directly to the hdmi input that you connected to the computer. saves a lot of time.

so far no dead pixels or any issue. mouse response speed is a little slower compared to real monitor. but it's acceptable to me. i don't play games.

$130 for a 4k monitor. i think it's a steal.

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...