Content deleted Content added
Citation bot (talk | contribs) Add: date, publisher. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox2 | #UCB_webform_linked 457/1971 |
m Clean up spacing errors around ref tags., replaced: /ref>w → /ref> w |
||
Line 4:
{{Use dmy dates|date=December 2016}}
[[File:Typing example.ogv|thumb|[[Typing]] on a laptop keyboard]]
A '''computer keyboard''' is a [[peripheral]] [[input device]] modeled after the [[typewriter]] keyboard<ref>{{Cite news|url=https://www.thefreedictionary.com/computer+keyboard|title=computer keyboard|work=TheFreeDictionary.com|access-date=2018-06-26|archive-date=26 March 2021|archive-url=https://web.archive.org/web/20210326195947/https://www.thefreedictionary.com/computer+keyboard|url-status=live}}</ref>
Keyboard keys (buttons) typically have a set of characters [[Engraving|engraved]] or [[Printing|printed]] on them, and each press of a key typically corresponds to a single written [[symbol]]. However, producing some symbols may require pressing and holding several keys simultaneously or in sequence.<ref>{{cite book
Line 156:
Also known as photo-optical keyboard, light responsive keyboard, photo-electric keyboard and optical key actuation detection technology.
An optical keyboard technology<ref>{{cite web |title=What is an Optical Keyboard? |url=https://www.wisegeek.com/what-is-an-optical-keyboard.htm |access-date=6 August 2018 |archive-date=7 August 2018 |archive-url=https://web.archive.org/web/20180807001541/https://www.wisegeek.com/what-is-an-optical-keyboard.htm |url-status=live }}</ref>{{better source needed|reason=user-generated content, not a [[wp:reliable source]]|date=March 2023}} utilizes [[Light-emitting diode|LEDs]] and [[Photoelectric sensor|photo sensors]] to optically detect actuated keys. Most commonly the emitters and sensors are located in the perimeter, mounted on a small [[Printed circuit board|PCB]]. The [[light]] is directed from side to side of the keyboard interior and it can only be blocked by the actuated keys. Most optical keyboards<ref>{{cite web
|title=Best Optical Keyboards
|url=https://www.gamingfactors.com/best-optical-keyboard
Line 226:
====Enter key or Return key====
{{main|Enter key}}
The 'enter key' {{key top|Enter}} and 'return key' {{key top|Return|Return|narrow}} are two closely related keys with overlapping and distinct functions dependent on [[operating system]] and [[application software|application]]. On full-size keyboards, there are two such keys, one in the alphanumeric keys and the other one is in the numeric keys. The purpose of the enter key is to confirm what has been typed. The return key is based on the original [[line feed]]/[[carriage return]] function of [[typewriter]]s: in many word processors, for example, the return key ends a paragraph; in a spreadsheet, it completes the current cell and move to the next cell.
The shape of the Enter key differs between ISO and ANSI keyboards: in the latter, the Enter key is in a single row (usually the third from the bottom) while in the former it spans over two rows and has an inverse L shape.
Line 269:
In the mid-1970s, lower-cost direct-contact key switches were introduced, but their life in switch cycles was much shorter (rated ten million cycles) because they were open to the environment. This became more acceptable, however, for use in computer terminals at the time, which began to see increasingly shorter model lifespans as they advanced.<ref>{{cite web|title=Keyboard Switches – How Computer Keyboards Work|date=21 November 2000|url=https://computer.howstuffworks.com/keyboard3.htm|access-date=6 August 2018|archive-date=6 August 2018|archive-url=https://web.archive.org/web/20180806210729/https://computer.howstuffworks.com/keyboard3.htm|url-status=live}}</ref>
In 1978, Key Tronic Corporation introduced keyboards with capacitive-based switches, one of the first keyboard technologies not to use self-contained switches.{{
Meanwhile, [[IBM]] made their own keyboards, using their own patented technology: Keys on older IBM keyboards<ref>{{cite web
Line 304:
|url=http://iopscience.iop.org/book/978-0-7503-1350-6/chapter/bk978-0-7503-1350-6ch16}}</ref> (usually [[scancodes]]) that the computer's electronics can understand. The key switches are connected via the printed circuit board in an electrical X-Y matrix where a voltage is provided sequentially to the Y lines and, when a key is depressed, detected sequentially by scanning the X lines.
The first computer keyboards were for mainframe computer data terminals and used discrete electronic parts. The first keyboard microprocessor was introduced in 1972 by General Instruments, but keyboards have been using the single-chip [[Intel 8048|8048]] [[microcontroller]] variant since it became available in 1978.{{
One test for whether the computer has crashed is pressing the caps lock key. The keyboard sends the key code to the [[Device driver|keyboard driver]] running in the main computer; if the main computer is operating, it commands the light to turn on. All the other indicator lights work in a similar way. The keyboard driver also tracks the Shift, alt and control state of the keyboard.
Line 339:
Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are attached to the keyboard cable or installed inside standard keyboards. Software keyloggers work on the target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote ___location. Some hackers also use wireless keylogger sniffers to collect packets of data being transferred from a wireless keyboard and its receiver, and then they crack the encryption key being used to secure wireless communications between the two devices.
[[Spyware|Anti-spyware]] applications are able to detect many keyloggers and cleanse them. Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software. Enabling a [[Firewall (computing)|firewall]] does not stop keyloggers per se, but can possibly prevent transmission of the logged material over the net if properly configured. [[Network monitoring|Network monitors]] (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from "[[phoning home]]" with his or her typed information. Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Historically, most keyloggers could be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window.<ref>{{cite web |url=http://cups.cs.cmu.edu/soups/2006/posters/herley-poster_abstract.pdf |title=How To Login From an Internet Cafe Without Worrying About Keyloggers |last1=Herley |first1=Cormac |last2=Florencio |first2=Dinei |publisher=Microsoft Research, Redmond |date=2006 |url-status=dead |archive-url=https://web.archive.org/web/20170808070236/http://cups.cs.cmu.edu/soups/2006/posters/herley-poster_abstract.pdf |archive-date=8 August 2017 |df=dmy-all |access-date=10 September 2008 }}</ref>{{better source needed|reason=I doubt that this is still true. Needs a later source.|date=March 2023}}
Keyboards are also known to emit electromagnetic signatures that can be detected using special spying equipment to reconstruct the keys pressed on the keyboard. Neal O'Farrell, executive director of the Identity Theft Council, revealed to InformationWeek that "More than 25 years ago, a couple of former spooks showed me how they could capture a user's ATM PIN, from a van parked across the street, simply by capturing and decoding the electromagnetic signals generated by every keystroke," O'Farrell said. "They could even capture keystrokes from computers in nearby offices, but the technology wasn't sophisticated enough to focus in on any specific computer."<ref>{{cite web|url=http://www.informationweek.com/security/vulnerabilities-and-threats/6-tips-to-secure-webcams-stop-keyloggers/d/d-id/1113012|title=6 Tips To Secure Webcams, Stop Keyloggers|work=Dark Reading|date=10 December 2013|url-status=live|archive-url=https://web.archive.org/web/20131230233248/http://www.informationweek.com/security/vulnerabilities-and-threats/6-tips-to-secure-webcams-stop-keyloggers/d/d-id/1113012|archive-date=30 December 2013|df=dmy-all}}</ref>
Line 380:
* [[IBM PC keyboard]]
* [[Keyboard layout]]
* [[Keyboard protector]]
* [[Keyboard technology]]
* [[Keypad]]
* [[Maltron]]
|