Position: Home page » Bitcoin » Bitcoin keyboard

Bitcoin keyboard

Publish: 2021-04-20 12:59:00
1. virtual currency refers to non real currency. Well known virtual currencies, such as online currency of Internet company, q-coin of Tencent company, q-point and voucher of Shanda company, micro currency launched by Sina (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver grain (used for bixue Qingtian game), and popular digital currencies in 2013 include bitcoin, Laite coin, infinite coin, quark coin, zeta coin, etc Barbecue coins, pennies (Internet), invisible gold bars, red coins, prime coins. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"
according to the notice and announcement issued by the people's Bank of China and other departments, virtual currency is not issued by the monetary authority, does not have legal compensation and mandatory monetary attributes, is not a real currency, does not have the same legal status as currency, cannot and should not be used as currency in the market, and citizens' investment and transaction of virtual currency are not protected by law
response time: December 10, 2020. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
2.

1. Q coin

Q coin, referred to as QB, also known as QQ coin, Tencent Q coin, etc. Usually its exchange rate is 1q currency = 1 RMB, with Tencent paipai net transactions are generally 10% off

QB is a virtual currency launched by Tencent, which can be used to pay for QQ bank number, QQ member service and other services. Tencent q-coin, through the purchase of QQ card, telephone recharge, bank card recharge, network recharge, mobile phone recharge card, one card recharge card and other ways to obtain

The face value of QQ card is 10 yuan, 15 yuan, 30 yuan, 60 yuan, 100 yuan and 200 yuan respectively

there is another kind of electronic cryptocurrency, qqcoin, which is not related to each other

2. Litecoin

litecoin, abbreviated as LTC, currency symbol: Ł; It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world

lightcoin is inspired by bitcoin (BTC) and has the same implementation principle in technology. The creation and transfer of lightcoin is based on an open source encryption protocol and is not managed by any central organization

3, infinite coin

infinite coin (hereinafter referred to as IFC) is a new digital currency, which has more circulation advantages than bitcoin, and fills the short board of bitcoin in the field of commercial circulation and promoting commercial operation. The positioning of unlimited money is to serve the daily life of small transaction payment

one transaction of infinite coin needs three confirmations, each confirmation takes three seconds, and the transaction confirmation speed is very fast. Because bitcoin transaction needs 6 confirmations, which takes about 1 hour, and lightcoin transaction takes 15 minutes, infinite coin is used in daily common transactions, which is more practical

infinite coin was released on June 5, 2013. Based on scrypt POW algorithm. A block is generated in 30 seconds. In the initial block, there are 524288 infinite coins in each block. After that, for every 86400 blocks generated, the number of coins in the block is halved, with a total of 90.6 billion. The difficulty of mining is adjusted every hour

Quark coin is not the currency in real life, it exists safely in the computer of global network

quark network is protected by six most advanced encryption algorithms to ensure that it can become a digital ledger. The whole network uses each of the six functions to generate a proof of work, and the coin maker must "verify" these transactions to ensure that each coin increase is real and effective

only regular computer can participate in ensuring that it can maintain a highly secure peer-to-peer network, which makes it more decentralized

quark coins can only be g up through the CPU of regular computers. In the first 36 weeks, a total of 247605120 quark coins will be g out. Since March 30, 2014, the annual quark coins set at 1050000 can enter the market through "digging", and the block reward will never be less than one, which is currently two

Zetacoin is an open-source digital currency based on SHA-256 algorithm. The initial coin mining is 160 million coins, and the subsequent annual inflation is a better incentive, To keep the hash of the network is not pure transaction cost

The total number of

zetacoin is 160 million, 1000 zets per block and half of 80640 zets per block

3.

When bitcoin nodes connect with each other, they will get transactions they don't have from each other. But because bitcoin has accumulated a large number of transactions for a long time, it is very difficult for two nodes to compare which transactions you are missing / which transactions I am missing one by one

to solve this problem, Nakamoto Tsung invented the important technology of block chain. Nodes use blocks to synchronize transactions, which ensures the data consistency of all nodes, and ensures the uniqueness of the blockchain by competing for block packing rights (that is, mining)

① a block and blockchain
a packet formed by a transaction over a period of time is called a block. On average, bitcoin generates a block every 10 minutes, and each block is linked to the previous block to form a blockchain


② the transaction data is synchronized with the block as a unit
the block is numbered from 1, so after node a connects with node B, it is convenient to synchronize the transaction data as long as the block number height of both parties is checked. For example, if node A's own block height is 100 and node B's block height is 110, all it needs to do is request B to synchronize the 10 blocks 101-110<

③ reward for packed blocks
in order to ensure that there are nodes to pack bitcoin transactions, bitcoin rules stipulate that nodes of packed transactions will receive bitcoin as reward
A. part of the package reward comes from the transaction fee paid by the transaction creator (100-1000 transaction fee per KB)
B. the other part comes from the initial distribution of 21 million bitcoins. At the beginning, the reward is 50 bitcoins for each block. After that, the reward will be halved for every 210000 blocks (about four years). Until about 2140, the reward for each block is less than 1, and the total reward for each block is 21 million bitcoins, This is the source of the total amount of 21 million bitcoins (2099999.97690000 to be exact)
after 2140, the package reward will only come from the transaction fee paid by the transaction creator<

④ competition for block packing right
node packing transaction only needs to consume very low-cost network and computing resources. The existence of packing reward (at present, the packing reward for each block is 25 bitcoin, about 40000 yuan), makes a large number of nodes want to pack transactions. In order to ensure the uniqueness of the blockchain, bitcoin rules stipulate that nodes use a method similar to "coin tossing" to compete for the right of transaction packaging. Nodes constantly toss coins. Whoever first throws the results that meet the rules will get the right to pack the transaction in this block, as well as the package reward of this block

4. Bitcoin is often used as an anonymous currency because it can send and receive bitcoin without providing any personal identity information. However, bitcoin itself is not 100% anonymous in most cases. Sending and receiving bitcoin is like publishing a work under a pseudonym. If an author's pseudonym is associated with their identity, everything they have written will be associated with them. For bitcoin, your anonymity is the wallet where you receive bitcoin. Every transaction involving the address will be permanently stored in the blockchain. If your address is connected with your real identity, then every transaction will be related to you, but reasonable anonymity can be achieved<

buy bitcoin anonymously

the first thing you can do is buy bitcoin anonymously

the first option is to buy them in cash to avoid completely online transactions. Most online transactions are similar, it requires you to upload your ID card. You can buy bitcoin with ATM cash or meet the seller in person“ In the section "we buy bitcoin with cash", there is more information about how to buy bitcoin with cash

the second best option is to buy them on virwox. It's not really completely anonymous, because you need to disclose some information, but it's still better than most bitcoin transactions that need to provide the required bank accounts and personal documents

you don't need anything here, you just need a free account for virtual transactions. With this account, you can buy another currency - Second Life Linden (SLL). You have different choices to buy Linden, such as PayPal and skrill. But considering that a good option for anonymity is Paysafecard payment, with Paysafecard you can buy bitcoin at any store. With Paysafecard, you can cash anonymous funds with your virwox even if you don't have an ID card, a bank account or a credit card. Then you can easily convert your second life Linden into bitcoin without verification

finally, you can get bitcoin through anonymous bitcoin loans

according to our experience, it is impossible to purchase bitcoin anonymously with a credit card

virwox anonymous buy bitcoin

mix your bitcoin

if you already have your bitcoin, it is particularly important that bitcoin users can mix their transactions with other users by using mixers, so bitcoin mixers are also known as bitcoin "tumbling" or "foundry". It's the server that breaks the connection between you and your bitcoin account. Mixers mask the flow of your bitcoin from one address to the next. Although bitcoin mixers cannot guarantee 100% anonymity, they provide a very high level of anonymity

we recommend that you use high-quality online currency mixing services, such as bitcoin mixers or currency mixers, which can conct regular bitcoin transactions for users who cannot link to the original. To further enhance the security of transactions, they provide the opportunity to use two or more forwarding addresses and appropriate time to delay, so as to immediately delete all file log related transactions. You can also use sharedcoin because it's free, but it's a bit complicated. In addition, if you use anonymous tor browser, you may try bitconinfog

it should be noted that there are many fraudsters in providing bitcoin mixing services

bitcoin is usually stored in a software program called bitcoin wallet. If your wallet and your personal information are identifiable, the above information will not help you. If you want to maintain considerable anonymity when using bitcoin, such as paying for alt websites, then you should register at least one wallet with an anonymous account and one-time email address

you can also use different wallets for each transaction to avoid tracking you for multiple transactions. It's like maintaining multiple independent identities. A simple way to maintain multiple wallets is to use a simple and lightweight software wallet, multbit, which allows multiple wallets to be managed on a single software program

if you want to be more anonymous, we suggest that you make a bitcoin wallet. Perhaps an easier way is to use the code on bitaddress.org

the open bitcoin privacy project has released their first complete report on the privacy level of the bitcoin wallet that is not valid. The best and most hidden bitcoin wallet is darkwallet, and the second two wallets with good concealment are armory and mycelium

anonymous bitcoin debit card

e-coin is a British company that has launched a virtual and physical Visa debit card that can store bitcoin. To use this debit card, you need to pay a small fee at present

you can order credit or debit cards that are specified in US dollar, euro and pound sterling. All it needs is a valid email address and basic personal information to register. Once you request to register a debit card, it will be sent to your email address. But at present, e-coin has not provided bitcoin debit card service to the United States

you can use the e-coin credit card until you reach the limit. You can get an unverified card and use up to $2500. Once you reach the limit, you have to verify your identity - a certificate that scans your ID or passport and address, or order a new card. If you prefer MasterCard, bitgold and advancedcash debit cards are OK<

bitcoin transactions

bitcoin transactions are never truly anonymous and can be queried through blockchain (blockchain is a comprehensive database for recording bitcoin transactions)

almost all transactions require you to verify your identity by sending a scanned personal certificate, and you also need to report large transactions to government authorities. When you use bitcoin to pay for goods and services, you need to provide your name and address to the seller many times. This means that someone who wants to track your trading activities can use your ID card information to track your future trading activities or study your previous trading activities. All in all, it has damaged your security and privacy.
5.

If bitcoin accounts are decentralized, so are hackers. Bitcoin, which uses blockchain technology, is not more secure than bank accounts. On the contrary, it is vulnerable to hackers. So, in the world of virtual currency, how to protect the security of account funds

Secret your private key address

the bitcoin address is the only information needed to define the distribution and transmission end of bitcoin. These addresses are generated anonymously by the user's wallet. Once the address is used, all the transaction history related to it will destroy the confidentiality of the address. Anyone can view the balance and all transactions at any address. Because users usually need to disclose their identity in order to receive services or goods, the bitcoin address cannot be completely anonymous. For these reasons, it is better to use bitcoin address only once, and users must be careful not to disclose the address

When replacing the computer, try to destroy the hard disk of the original computer. Don't save or publish the private key of bitcoin to the cloud, mailbox or collection. If a network administrator writes a regular expression to retrieve the text, he can find all the information and crack the user's account

2. Stored in bitcoin wallet

many bitcoin exchanges have been attacked by hackers. If you use the wallet of bitcoin exchange, please use Google's "double authentication" to ensure security. During the development of virtual currency, there have been many cases of bitcoin exchange running away. The exchange owns the private key of the user's wallet, which is not a safe way to save bitcoin

bitcoin wallet has a wide range of customers, which is more secure than the wallet service of bitcoin exchange. No matter what kind of wallet you choose, you should choose a strong password. Don't use the same password as the registered email. At the same time, do not put eggs in the same basket, choose multiple storage ways to improve the security of assets

using the genuine system of bitcoin wallet, regularly updating security vulnerabilities and fixing bugs can improve security. Some studies have pointed out that IOS system is more secure than Android system, because the existing security vulnerabilities of Android system may be relatively easy to be attacked by hackers

3. The most common way to identify phishing sites is phishing sites. Hackers will create a domain name similar to bitcoin website, which may be sent to users through e-mail and other channels. Once users try to log on the website, hackers will record their login information

so be careful before clicking any link. Many browsers have the service of "phishing check". If you carefully identify the domain name of the website, you can identify the phishing website

4. Guard against Keylogger

in addition to phishing sites, the common attack method of hackers is Keylogger. Keyboarding is the easiest way to capture passwords. The deception of key recording software is very high, even the technical house may believe it. In short, a keyboard recorder is actually a script code. Once it is installed on the operating system of the target computer, it will record all the keystrokes on the keyboard and send them to hackers, mostly through FTP

the successful method of introcing Keylogger depends on many factors, including the operating system, the lifetime of keylogger and the anti infection level of target computer. Keyboard recorder is usually injected through web browser. The security vulnerability of the target machine depends on the type of browser it uses; Whether the operating system installed on the target machine is genuine, and whether the operating system is updated with the latest security vulnerabilities and bug fixes

5. Watch out for USB theft program

the software will retrieve your password and login credentials stored in the browser. Once FUD, some stealing programs can be very powerful. In most cases, a steal program is a. Bat file, which can be injected into the target machine online or driven by USB

6. Using proxy and VPN

proxy server and VPN can increase the security of your bitcoin wallet, although most people mistakenly believe that VPN makes them anonymous online. But in fact, VPN only improves the privacy of users. VPN can rece the possibility of hackers accessing the router to open the port, which also means that they are less likely to succeed

7. Encryption and backup wallet

wallet backup is essential to prevent losses caused by computer failure or human error. If a computer or mobile phone is lost, a backup wallet can help retrieve the bitcoin. At the same time to encrypt the online backup, any backup that can be accessed through the Internet should be encrypted

how to back up your wallet? First, close the bitcoin client, then select the backup wallet of the menu file in the main interface, and the wallet.dat file to other hard disk partition, mobile hard disk or U disk

it should be noted that the entire wallet should be backed up, not just the private key. Bitcoin wallet has many private keys for receiving transaction change. If only the private keys of visible bitcoin addresses are backed up, most of the funds may not be restored from the backup. Also, back up your wallet regularly to make sure that all recent bitcoin change addresses and newly created bitcoin addresses are included in the backup

Cold storage

offline wallet is called "cold storage", which is the safest way to save digital currency

cold storage is an offline wallet that is not connected to the network, that is, it will not be attacked by black horse and Trojan horse. However, because the operation is relatively complex and the price is relatively expensive, the price of offline wallet is more than 1000 yuan, which is suitable for users who have a lot of bitcoin and are ready to hold it for a long time

although the operation of cold storage is relatively complex, it is the safest storage method. At present, only cold storage has truly realized the inviolability of personal assets and is not subject to the supervision of others

if you want to know more about bitcoin information, please send me a private message and avoid detours

6. First, we need to find a stable bitcoin mine pool which is easy to operate, and then connect to the designated server to mine through the mining client software. Take "BTC guide" website as an example. First open this website and click the user registration on the left. The registration process is relatively simple. You can enter the English user name, password and confirmation password

2 after successful registration, we will see a message like "your account has been successfully registered and logged in!" on the web page, It means that we have successfully registered and logged in

3 we can click the "dashboard" button in the upper left corner to see the whole monitoring status of the account
note: in this monitoring dashboard, we are most concerned about "total earnings", which is the bitcoin earned by our current account. In the future, as long as we open the website and enter the monitoring dashboard, we can see the relevant information of our account
4 next, please click "Settings" in the navigation bar of the page. In the settings page, we can set the e-mail address, bit wallet address, change the password, etc.

5 if we set the e-mail address in the account, if we forget the password or steal it in the future, we can restore the password through the set e-mail. First, enter our common email address in the "email address" column, and then click the "change" button

6. Next, a confirmation email will be displayed on the page to confirm that it has been sent to our previously set email

7. Then we open our email and find the email sent by BTC guide. Click the confirmation link, and then the page will show that our email has been successfully set

8. If we set email in the account setting, we can also set email notification for the behavior of mining miners. Find the "idle warnings" column on the setting page, click the drop-down list, select the time when you want to send the email, and then click the "change" button on the right. When we set 10 minutes later, if a miner stops mining, the system will automatically send a notification email to our email after 10 minutes. After receiving the email, we knew that the miner was on strike

9 in addition, we are more concerned about the "bitcoin wallet", that is, the wallet address. You don't need to set this address first. It's not too late for me to fill in when I really get bitcoin

10 after the account is set up, we need to set "worker". What is a worker? This is the login account name we will use later on the bitcoin mining client. The system will create a miner name for us by default. The miner name is composed of our registered account name, an underline and a number. For example, our registered account is XXX, and the first miner's name is "XXX"_ 1 "
11 if we want to set multiple miner names, enter a number such as" 2 "in the" create worker "column, and then click the" create "button to add a new miner's account name

12 in the worker settings page, we can also set the mining payment mode of the mine account separately. Payment method, i.e. mining payment method. There are two types to choose from, PPS and PPLNs. The difference lies in the mining mode and handling charge. The handling charge of PPS is 7.5%, while that of PPLNs is 3%. The system adopts PPLNs by default. If you want to change it, please click the "change" button under the payment method
13 in addition, we can also choose the difficulty of mining mode. If our computer has multiple graphics card GPUs or some special machines, we can set the miner's account name under the minimum difficulty

Step 2, download the mining client software
1 after we complete the registration setting, Next, please click "support" in the page navigation menu, and we will see the download link of the client< There are two types of mining client software:
bfgminer: command line operation interface, which can be downloaded directly
cgminer: it is also operated in the command line format, but the download steps are too complicated
let's take bfgminer as an example and click download as shown in the figure
2 then it will jump to the download page of mining tools. There are two formats of mining tools, one is 32-bit system, the other is 64 bit system. According to the number of system bits, download the corresponding tool version

3. The client size of mining tool is less than 5m, which is a zip compressed file. When the download is complete, locate and open the file. Click the right mouse button and select the "" option
4 here, I take paste extraction to the desktop as an example
Step 3, mining client software detailed settings
1 after opening the mining directory, double-click to open the "bfgminer" file under the directory
2 next, look at the BFG minier window and enter the address of the mine pool at the URL. The pool address can be seen in the BTC guide's support page, such as stratum. Btcguild com:3333 , press enter key
3, and then enter the miner's name set on BTC guide website after the user name, press enter key
4, and then enter at will in the password, as shown in the figure
5. Finally, you can see that many numbers are changing, It means mining. It is worth noting that the places marked in the figure indicate the speed of the current machine button
6 in addition to the current mining speed on the mining client software, we can also see the specific mining speed of each miner in the "active worker summary" list on the "dashboard" page of BTC guide website
7 If you want to close the mining tool, you can directly x drop it, You can also directly press the Q key to exit. If you want to open more, you can open another mining tool in the BFG miner directory< Step 4: cgminer command line client software
1 if you really want to mine, the official recommends that we use "cgminer", that is, to run it at the command prompt. Click "support" on BTC guide page, then click "cgminer" download link page, select the corresponding system version
2, then jump to cgminer download page and click the link as shown in the figure
3 and then select a version of cgminer. Here I download a Windows version as an example.
4 take the Windows version of cgminer as an example. After the download, unzip it to the computer.
5 open the cgminer directory, find "cgminer"
6. Double click "cgminer" with the mouse, and a command-line window will pop up, prompting us to enter the URL address of the connection server. Enter "stratum. Btcguild com:3333 ”, press the Enter key on the keyboard
7, and then prompt us to enter "user name", that is, the account name of the miner. Press the Enter key on the keyboard

8, and then enter the password. Press the Enter key on the keyboard

9, and wait for a moment, When the client and the service establish a connection, the machine will start mining

10 to quit mining, please press the "Q" key on the keyboard in the window
tools / raw materials
PC with independent graphics card
precautions
if you are using cgminer, the graphics card must support the display of general computing standard, otherwise you will not be able to mine.
7.

According to relevant media reports, on January 13, shuishanyuan community of Changshui Hangcheng in Kunming, Yunnan province suffered a large-scale power outage

The property revealed that the monthly electricity consumption of mining machinery tenants exceeded 10000 kwh, and even replaced the high-power air switch on their own

8. Talk nonsense upstairs, attack Gao to pull hatred? Is space attack very high? Pulling hatred is a skill that can generate a certain amount of hatred. It's not that the attack is high enough to cause hatred, but the attack is low enough to cause stars to shatter. But it's just that if you don't understand the skill of pulling hatred, don't talk nonsense.
landlord, level 60, if you have enough money, you can get into a set of better equipment The attack is improved as much as possible. If you don't have money, you can dig the mines and the pearls. If you do a good job in making money, it's not so easy to die. Besides, Yunlu's defense is low and there's little blood, so it's easy to die. But when the equipment goes up, it's very powerful with good operation
9. Key position conflict<

change the key position. However, some keyboards still conflict with each other no matter how to change them. There is no way to change them.
it is recommended not to buy very advanced keyboards. Generally, the more advanced the keyboards are, the more likely they will conflict with each other. Especially, don't buy Microsoft's keyboards, which must be locked

attachment: the following is the information
what is key position conflict

first of all, let's understand what is called key position conflict. Key position conflict is an unavoidable problem of finished keyboard. For a simple example, when we press Ctrl + Alt + Del at the same time in computer operation, the computer only recognizes that it has pressed Ctrl + Alt, but it can not do del. This is called key position conflict. Of course, this problem is impossible. It doesn't matter whether the keyboard in accordance with the windows standard can recognize the combination of other keys. The important thing is that these three combinations must have no key conflict before they can leave the factory. Otherwise, who will want the keyboard that can't be restarted

for key position conflict, we define it as follows: when two or three keys are pressed at the same time in the process of keyboard operation, the keyboard can only correctly recognize the first two keys and has no response to the third or fourth key. However, these problems often exist with the game, and the combination of shortcut keys for windows is unlikely to conflict

generally speaking, there are two kinds of attitudes towards key position conflict. One is not concerned about key position conflict at all, or even does not understand it at all. For example, when he was playing KOF, he found that his opponent could release XX must kill skill through keyboard operation, but he could not complete this action with any skillful operation. It was too late to repent at this time

the other is the super fever fans, who are very obsessed with games. They have been searching for the best game procts without key position conflict, just like the martial arts experts frantically searching for martial arts secrets. Because of their preference, they didn't have a clear understanding of the core problem of key position conflict, so they were confused to find their utopian dream

we all know that the current keyboard technology adopts the non coding film contact structure. This structure is that any key has two layers of film contacts. After we take apart the keyboard, we will find that the number of wires on any layer of film is far less than the number of keys, and each wire connects the contacts of multiple keys at the same time, Any two wires of the upper and lower layers are overlapped on at most one key. That is to say, the upper No. 1 wire may pass through keys 1, 2, 3, 4 and 5 at the same time, while the lower No. 1 wire may pass through keys 1, Q, a and Z at the same time, and the two wires only overlap on key 1

in this way, according to the buttons passed by the upper film and the lower film, A table similar to the following can be arranged:

upper conctor 1
upper conctor 2
upper conctor 3
upper conctor 4
upper conctor 5
...

lower conctor 1
1
2
3
4
5
...

lower conctor 2
Q
W
e
R
T
...



lower conctor 2
Wire 3
a
s
d
F
G
...

lower layer wire 4
Z
x
C
V
b
...
...
...
...
...
...
...
...
...

...
there is a table with similar principle in the processing chip of no keyboard, In order to rece the key position conflict, designers are also racking their brains to modify the keyboard circuit arrangement and data table, so that the commonly used games and shortcut keys do not conflict with each other, but this is to rece as much as possible, absolutely not completely eliminate. Now you can understand why there is no conflict when we use hot start Ctrl Alt del? Four direction keys will not conflict, right? People and people are not as good as heaven, there will be some keyboard hit the hole of the game, which leads to the key conflict. Therefore, it is impossible for a keyboard without key position conflict to exist in the current keyboard design. If a manufacturer advertises that his keyboard (so far) has no key position conflict, it would be ridiculous if it is not to return to simplicity

summary:

1. As mentioned in this paragraph, the key position conflict of the keyboard is related to the cleverness of the chip data designed by the designer, that is to say, when the keyboard uses different models and brands of integrated blocks (also known as the CPU of the keyboard), the key position conflict will not be exactly the same

2. It is absolutely impossible that there is no key position conflict for non coding keyboard. The solution can only be game manufacturers, keyboard manufacturers, mutual coordination, try to avoid the emergence of key conflict. So the idea of fans is Utopian

select the keyboard with "no key position conflict"

you must be surprised, why did I say that it is impossible to avoid key position conflict with the current keyboard, and now I say that it is possible to find the keyboard with "no key position conflict"? Isn't that self contradictory? In fact, my statement is relative, but it also helps us to face up to the "key conflict" better, so as to get the essence and reject the dross. Like DIY, fit is the best. Even so, this part will not be the same as the previous keyboard purchase articles (I will see the details later). What I tell you is how to choose a satisfactory keyboard, which will not affect your daily habits and game hobbies

we usually like to shop in the computer city, but we all know that although we can try to buy procts in the computer city on the spot, there are no big problems. But it's not going to let you play games on the spot for testing, is it? Even if you say you buy a keyboard to play games, businesses will think you are strange. What if you happen to run into a business computer without the game you need? Is it installed on site

now I'd like to introce a keyboard testing software, which can not only test whether there are key position conflicts in the keyboard, but also detect the sensitivity of each key in the keyboard. It is a keyboard testing software keycard test proced by passmark software company. The interface of this software is quite simple and intuitive, and the volume is quite small, less than 1m. We don't have to worry about the problem of moving, that is, the disk can accommodate the next. But the only problem is that it's a shareware

the download address is: http://www.passmark.com/ftp/keytest.exe

after opening the software, skip a registration page and the interface of the software will be displayed. When we test the keyboard, we press the key that needs to be tested, no matter how many you press. If the key is reflected, it will turn red. The used key is marked with green, which is the area a in the figure, while the area B in the figure shows the letters reflected by the key you press in the form of text. This software also has a more practical function, is to test the keyboard theory, the average number of typing (half English), that is, the C area of the local pull. Through this software, we can see at a glance what defects the keyboard has< In fact, I didn't want to write this paragraph because I need to offend some domestic manufacturers. Now that we know the keyboard can not be without key conflict. So what is the most suitable keyboard for the public? Because I'm not a God, and not all my keystroke habits are in line with the taste of readers, I'd like to briefly talk about the keyboard with outstanding performance

in my years of playing with the keyboard, I found a very strange problem, which I still can't understand, and summed up a theory. Let me ask you a question first. Let's have a look. Why has the key position conflict been taken out of the table so far? Careful friends may have noticed that this is not only caused by the popularity of FPS games in recent years, but also partly e to the fact that everyone has started to use high-end keyboards (they can't escape SK, BTC, etc., which are proced by several major international keyboard manufacturers). It seems that when everyone used poor quality keyboards before, they didn't care about this problem

after summing up, we can find a very strange law: the more expensive and low-quality procts, the more enjoyable it is to play games. On the contrary, those high keyboards have more or less obvious key position conflicts. The most famous key position conflict is elite. The conflict is puzzling, even the direction keys have conflicts. Maybe it's God playing tricks on people. Since the key position conflict and hand feeling can't completely realize the two rights, we will never bow to the garbage. We need to feel better, but also not affect the overall situation

e to the particularity of this super alternative game we play, our criteria can't be the same as those who think they know keyboard very well, such as Warcraft and CS. I was cheated. I bought a new shell keyboard that Mingji just came out last month. When I went home, I found that all the O2 key settings I could adapt to conflict, Can't play. Because the keyboard itself has no quality problem, so I can only buy a keyboard again! This time, I made full preparations and brought a test software to test the keyboard in the afternoon. About keyboard conflicts, I made the following summary:

USB interface can't be purchased, multimedia keyboard can't be purchased, and a small part of PS / 2 interface can't be purchased

that is to say, as O2Jam players, we'd better consider purchasing PS / 2 interface keyboard and bring our own test software when purchasing, The usage of the test software: open it and press the seven keys that need to be used in the game at the same time. If the software shows that all the seven keys are red, it means that the seven keys do not conflict with each other. It is ideal to play O2Jam on this keyboard. All the keys you have pressed are green, Used to test the keyboard for bad keys. This keyboard test software is called keytest

in addition to this problem, for O2Jam players, I personally think we should pay attention to the selection of keyboards:
1. The keyboard has better elasticity. You can just press it when you buy it.
2. The characters on the keyboard should be laser engraved, otherwise the characters on the keyboard will be blurred soon after being washed by O2Jam, It's better to have a strong concave and convex feeling
3. The shorter the key stroke is, the faster the key reaction time is. For example, the key of X architecture performs better in this aspect. Generally speaking, notebook keyboard uses X architecture

then let's talk about X architecture: from the perspective of key stroke, the average key stroke of desktop key cap is 3.8-4.0 mm, and that of laptop key cap is 2.50-3.0 mm, while & quot; X Architecture & quot; The keyboard keeps the advantages of the desktop key cap, with an average key stroke of 3.5-3.8 mm, which is comfortable to handle. When the tapping force of the top left corner, the top right corner, the bottom left corner, the bottom right corner and the center of the key are tested, it is found that the tapping force of the traditional keyboard is large and uneven, while & quot; X Architecture & quot; The striking power of the keyboard is small and
10. I'm also curious
so I found the following information about BTC
1. BTC: founded in 1982, it started with keyboard manufacturing, and is now a world-famous professional manufacturer of keyboard and multimedia digital storage (comments: first class)
2 Comments:
3. BTC shopping website: self created fashion brand online store
3 www.btc2009.com (comment: creative)
4. Taiwan Telecom regional and community ecation mall network college biotechnology access company (comment: strange)

there are still some that I will not mention,
answer your questions
still,
there are more questions...

冏!!!!!
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750