1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
13

Who invented "qwerty" On the keyboard and why did that person mix up all of the letters

Computers and Technology
1 answer:
alexandr402 [8]3 years ago
4 0

Answer: Prototypes had a problem with the bars colliding with each other and jamming. So the story goes that he arranged the keys with the most common letters in hard to reach spots, to slow typists down and try to avoid this problem.

Explanation: In the 1860s, a politician, printer, newspaper man, and amateur inventor in Milwaukee by the name of Christopher Latham Sholes spent his free time developing various machines to make his businesses more efficient.

Hope this helped!

You might be interested in
When was technology created?
ANEK [815]

Answer:

two million years ago

Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.

3 0
1 year ago
...............................
Gemiola [76]

............................

Mark me brainliest^^

7 0
2 years ago
Read 2 more answers
How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
Ad libitum [116K]

Answer

To restrict the connection only to the employee portal server, the IP address of the application should be added into the list of Trusted IP's.

Explanation:

Trusted IP's are the IP's that are used to identify the users that can be verified easily. Those users whose IP's are not listed in the trusted IP list needs to verify their identity by sending them login code on each transaction.

<em>In above mentioned case, We need to enlist the IP address of employee portal list in trusted IP list to ensure the restriction of login to employee only.</em>

4 0
3 years ago
A(n) ____________ is a private data network that creates secure connections over regular internet lines.
Setler79 [48]
VPN is the correct answer
5 0
3 years ago
If you are in a tornado situation which of the following should you NOT do?
Hunter-Best [27]
Three. A bridge can be put under immense pressure during a storm. In addition to that if a tornado has caused a storm surge the rising water could make you drown
5 0
3 years ago
Other questions:
  • A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) t
    6·1 answer
  • Do most facebook and twitter users access the platform from their personal computers?
    6·2 answers
  • True or false? when intel places a sticker on computers showing their chip is inside, they are demonstrating their visible value
    7·1 answer
  • Give three facts about the history of the train shongololo
    9·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • Pleaseeee help me w this!
    10·1 answer
  • HELP FOR JAVASCRIPT: 01. What is prototypical inheritance? 02. How can JavaScript be used to improve accessibility on the web? I
    6·1 answer
  • You are system administrator with hundreds of host workstations to manage and maintain. You need to enable hosts on your network
    14·1 answer
  • Which of the following is not a key component of a structure?
    5·1 answer
  • whenever I try to make an account it says it can't sign me up at this time or something- can you help?-
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!