ratio of word probabilities predicted from brain for desk and key

close this window

desk

key

top 10 words in brain distribution (in article):
wood build wall design structure size surface frame type form
top 10 words in brain distribution (in article):
time common beam type state form production allow company term
top 10 words in brain distribution (not in article):
material paint construction window floor tree door roof plastic brick
top 10 words in brain distribution (not in article):
light species drink lamp water wine beer produce bottle plant
times more probable under desk 30 20 10 6 4 2.5 1.25 1 1.25 2.5 4 6 10 20 30 times more probable under key
(words not in the model)
A desk'" is a furniture form and a class of table often used in a work or office setting for reading or writing on or using a computer. Desks often have one or more drawers to store office supplies and papers. Unlike a regular table, usually only one side of a desk is suitable to sit on (though there are some unusual exceptions, such as a partners desk). Not all desks have the form of a table. For instance, an Armoire desk is a desk built within a large wardrobe-like cabinet, and a portable desk is light enough to be placed on a person's lap. Early desks. Desk-style furniture appears not to have been used in classical antiquity or in other ancient centers of civilization in the Middle East or Far East, but there is no specific proof. Medieval illustrations show the first pieces of furniture which seem to have been designed and constructed for reading and writing. Before the invention of the movable type printing press in the 15th century, any reader was potentially a writer or publisher or both, since any book or other document had to be copied by hand. The desks were designed with slots and hooks for bookmarks and for writing implements. Since manuscript volumes were sometimes large, and heavy, desks of the period usually had massive structures. Desks of the Renaissance and later eras had relatively slimmer structures, and more and more drawers as woodworking became more precise and cabinet-making became a distinct trade. It is often possible to find out if a table or other piece of furniture of those times was designed to be used as a desk by looking for a drawer with three small separations (one each for the ink pot, the blotter and the powder tray) and room for the pens. The desk forms we are familiar with in this beginning of the millennium were born mostly in the 17th and 18th centuries. The ergonomic desk of the last decades is the newest addition to a long list of desk forms, but in a way it is only a refinement of the mechanically complex drawing table or drafting table of the end of the 18th century. Industrial era. Refinements to those first desk forms were considerable through the 19th century, as steam-driven machinery made cheap wood-based paper possible in the last periods of the first phase of the industrial revolution. This produced a boom in the number of, or some might say the birth of, the white-collar worker. As these office workers grew in number, desks were mass-produced for them in large quantities, using newer, steam-driven woodworking machinery. This was the first sharp division in desk manufacturing. From then on, limited quantities of finely crafted desks have been constructed by master cabinetmakers for the homes and offices of the rich while the vast majority of desks were assembled rapidly by unskilled labor, from components turned out in batches by machine tools. Thus, age alone does not guarantee that an antique desk is a masterpiece, since this shift took place more than a hundred years ago. More paper and more correspondence drove the need for more complex desks and more specialized desks, such as the rolltop desk which was a mass produced, slatted variant of the classical cylinder desk. It provided a relatively fast and cheap way to lock up the ever increasing flow of paper without having to file everything by the end of the day. Paper documents started leaving the desk as a "home," with the general introduction of filing cabinets. Correspondence and other documents were now too numerous to get enough attention to be rolled up or folded again, then summarized and tagged before being pigeonholed in a small compartment over or under the work surface of the desk. The famous Wooton desk and others were the last manifestations of the "pigeonhole" style. The newer desks could be transformed into many different shapes and angles and were ideal for artists. Steel desks. A smaller boom in office work and desk production occurred at the end of the 19th century and the beginning of the 20th with the introduction of smaller and cheaper electrical presses and efficient carbon papers coupled with the general acceptance of the typewriter. Steel desks were introduced to take heavier loads of paper and withstand the pounding meted out on the typewriters. The L-shaped desk became popular, with the "leg" being used as an annex for the typewriter. Another big boom occurred after the Second World War with the spread of photocopying. Paperwork drove even higher the number of desk workers, whose work surface diminished in size as office rents rose, and the paper itself was moved more and more directly to filing cabinets or sent to records management centers, or transformed into microfilm, or both. Modular desks seating several co-workers close by became common. Even executive or management desks became mass-produced, built of cheap plywood or fiberboard covered with wood veneer, as the number of persons managing the white collar workers became even greater. Student desks. A "'student desk'" can be any desk form meant for use by a student. Usually the term designates a small pedestal desk or writing table constructed for use by a teenager or a pre-teen in his or her room at home. More often than not it is a pedestal desk, with only one of the two pedestals and about two thirds of the desk surface. Such desks are sometimes called left pedestal desks or right pedestal desks depending on the position of the single pedestal. The height of the desk is usually a bit lower than is the case for normal adult desks. In some cases, the desk is connected from the seat to the table. The table is also used for sitting before classes. The desks are usually mass-produced in steel or wood and sold on the consumer market. In addition there is a wide variety of plans available for woodworking enthusiasts. There are many novel forms of student desks made to maximize the relatively restricted area available in a child's room. One of the most common is the bunk bed desk, also known as a loft bed. Impact of computers. Until the late 1980s desks remained a place for paperwork and business negotiation. At the end of this decade though the personal computer was taking hold in large and medium sized businesses. New office suites included a "knee hole" credenza which was a place for a terminal or personal computer and keyboard tray. Soon new office designs also included "U-shape" suites which added a bridge worksurface between the back credenza and front desk. During the North American recession of the early 1990s, many manager and executive workers had to do word processing and other functions previously completed by typing pools and secretaries. This necessitated a more central placement of the computer on these "U-shape" suite desk systems. With computers abounding, "computer paper" became an office staple. The beginning of this paper boom gave birth to the dream of the "paperless office", in which all information would appear on computer monitors. However, the ease of printing personal documents and the lack of comfort with reading text on computer monitors led to a great deal of document printing. The need for paperwork space vied with the rising desk space taken up by computer monitors, CPUs, printers, scanners, and other peripherals. As well, the need for more space led some desk companies to attach some items to the modesty panel at the back of the desk, such as multi-outlets and cabling. Through the "tech boom" of the 1990s, office worker numbers skyrocketed along with the cost of office space rent. The cubicle desk became widely accepted in North America as an economical way of putting more desk workers in the same space without actually shrinking the size of their working surfaces. The cubicle walls have become new place for workers to affix papers and other items once left on the horizontal desktop surface. Even computer monitor frames themselves are used to attach reminder notes and business cards. Early in the 2000s, private office workers found that their side and back computer-placing furniture made it hard to show the contents of a computer screen to guests or co-workers. Manufacturers have responded to this issue by creating "Forward Facing" desks where computer monitors are placed on the front of the "U-shape" workstation. This forward computer monitor placement promotes a clearer sight-line to greet colleagues, increases computer screen privacy and allows for common viewing of information displayed on a screen. References. Articles and books on real and virtual desks and things in between: A key'" is a device which is used to open a lock. A typical key consist of two parts: the "blade", which slides into the keyway of the lock and distinguishes between different keys, and the "bow", which is left protruding so that torque can be applied by the user. The blade is usually designed to open one specific lock, although master keys are designed to open sets of similar locks. Keys provide an inexpensive, though imperfect, method of authentication for access to properties like buildings and vehicles. As such, keys are an essential feature of modern living in the developed world, aing adorned by key fobs and known as a keychain. House keys. A house key'" is the most common sort of key. There are two main forms. The older form is for lever locks, where a pack of flat levers (typically between two and five) are raised to different heights by the key whereupon the slots or "'gates'" of the levers line up and permit a bolt to move back and forth, opening or closing the lock. The teeth or "'bittings'" of the key have flat tops rather than being pointed. Lever lock keys tend to be bigger and less convenient for carrying, although lever locks tend to be more secure. These are still common in, for example, many European countries. The more recent form is that for a pin tumbler cylinder lock. When held upright as if to open a door, a series of grooves on either side of the key (the key's "'profile'") limits the type of lock cylinder the key can slide into. As the key slides into the lock, a series of pointed teeth and notches allow pins to move up and down until those pins are in line with the shear line of the cylinder, allowing that cylinder to rotate freely inside the lock and the lock to open. These predominate in, for example, the United States of America. Car key. A "'car key'" or an "'automobile key'" is a key used to open and or start an automobile, often identified with the logo of the car company at the head. Modern key designs are usually symmetrical, and some use grooves on both sides, rather than a cut edge, to actuate the lock. It has multiple uses for the automobile with which it was sold. A car key can open the doors, as well as start the ignition, open the glove compartment and also open the trunk (boot) of the car. Some cars come with an additional key known as a "'valet key'" that starts the ignition and opens the drivers side door but prevents the valet from gaining access to valuables that are located in the trunk or the glove box. Some valet keys, particularly those to high-performance vehicles, go so far as to restrict the engine's power output to prevent joyriding. Recently, features such as coded immobilizers have been implemented in newer vehicles. More sophisticated systems make ignition dependent on electronic devices, rather than the mechanical keyswitch. Ignition switches locks are combined with security locking of the steering column (in many modern vehicles) or the gear lever (Saab Automobile). In the latter, the switch is between the seats, preventing damage to the driver's knee in the event of a collision. Keyless entry systems, which utilize either a door-mounted keypad or a remote control in place of a car key, are becoming a standard feature on many new cars. Some of them are handsfree. Some keys are high-tech in order to prevent the theft of a car. Mercedes-Benz uses a key that, rather than have a cut metal piece to start the car, uses an encoded infrared beam that communicates with the car's computer. If the codes match, the car can be started. These keys can be expensive to replace, if lost, and can cost up to US$400. Some car manufacturers like Land Rover and Volkswagen use a 'switchblade' key where the key is spring-loaded out of the fob when a button is pressed. This eliminates the need for a separate key fob. This type of key has also been known to be confiscated by airport security officials. Master key. A "'master key'" is intended to open a set of several locks. Usually, there is nothing special about the key itself, but rather the locks into which it will fit. These locks also have keys which are specific to each one (the "'change key'") and cannot open any of the others in the set. Locks which have master keys have a second set of the mechanism used to open them which is identical to all of the others in the set of locks. For example, master keyed pin tumbler locks will have two shear points at each pin position, one for the change key and one for the master key. A far more secure (and more expensive) system has two cylinders in each lock, one for the change key and one for the master key. Larger organizations, with more complex "grandmaster key" systems, may have several masterkey systems where the top level grandmaster key works in all of the locks in the system. A practical attack exists to create a working master key for an entire system given only access to a single master-keyed lock, its associated change key, a supply of appropriate key blanks, and the ability to cut new keys. This is described in Locksmiths may also determine cuts for a replacement master key, when given several different key examples from a given system. Control key. A "'control key'" is a special key used in removable core locking systems. The control key enables a user with very little skill to remove from the cylinder, quickly and easily, a core with a specific combination and replace it with a core with a different combination. In Small Format Interchangeable Cores (SFIC), similar to those developed by Frank Best of the Best Lock Corporation, the key operates a separate shear line, located above the operating key shear line. In Large Format Removable Cores, the key may operate a separate shear line or the key may work like a master key along the operating shear line and also contact a separate locking pin that holds the core in the cylinder. SFIC's are interchangeable from one brand to another, while LFRC's are not. Double-sided key. A "'double-sided key'" is very similar to a house or car key with the exception that it has two sets of teeth, an upper level standard set of teeth and a lower, less defined set of teeth beside it. This makes the double-sided key's profile and its corresponding lock look very similar to a standard key while making the attempt to pick the lock more difficult. As the name implies, this type of key has four sides, making it not only harder to duplicate and the lock harder to pick, but it is also physically more durable. Paracentric key. A "'paracentric key'" is designed to open a paracentric lock. It is distinguishable by the contorted shape of its blade, which protrudes past the centre vertical line of the key barrel. Instead of the wards on the outer face of the lock simply protruding into the shape of the key along the spine, the wards protrude into the shape of the key along the entire width of the key, including along the length of the teeth. Patented by the Yale lock company in 1898, paracentric cylinders are not exceptionally difficult to pick, but require some skill and know-how on the part of the person attempting to pick the lock. Skeleton key=== A "'skeleton key'" (or "'passkey'") is a very simple design of key which usually has a cylindrical shaft (sometimes called a "shank") and a single, minimal flat, rectangular tooth or "bit". Skeleton keys are also usually distinguished by their "bow", or the part one would grasp when inserting the key, which can be either very plain or extremely ornate. A skeleton key is designed to circumvent the wards in warded locks. Warded locks and their keys provide minimal security and only a slight deterrent as any key with a shaft and tooth that has the same or smaller dimensions will open the lock. However, warded keys were designed to only fit a matching lock and the skeleton key would often fit many. Many other objects which can fit into the lock may also be able to open it. Due to its limited usefulness, this type of lock fell out of use after more complicated types became easier to manufacture. In modern usage, the term "skeleton key" is often misapplied to ordinary bit keys and barrel keys, rather than the correct definition: a key, usually with minimal features, which can open all or most of a type of badly designed lock. Bit keys and barrel keys can be newly-minted (and sold by restoration hardware companies) or antiques. They were most popular in the late 1800s, although they continued to be used well into the 20th century and can still be found today in use, albeit in vintage homes and antique furniture. A bit key is distinguished from a barrel key in that a bit key usually has a solid shank, whereas a barrel shafted key can be made either by drilling out the shank from the bit end or by folding metal into a barrel shape when forging the key. Tubular key. A tubular key'" (sometimes referred to as a "barrel key" when describing a vintage or antique model) is one that is designed to open a tubular pin tumbler lock. It has a hollow, cylindrical shaft which is usually much shorter and has a larger diameter than most conventional keys. Antique or vintage-style barrel keys often closely resemble the more traditional "skeleton key" but are a more recent innovation in keymaking. In modern keys of this type, a number of grooves of varying length are built into the outer surface at the end of the shaft. These grooves are parallel to the shaft and allow the pins in the lock to slide to the end of the groove. A small tab on the outer surface of the shaft prevents the pins in the lock from pushing the key out and works with the hollow center to guide the key as it is turned. The modern version of this type of key is harder to duplicate as it is less common and requires a different machine from regular keys. These keys are most often seen in home alarm systems and bicycle locks, in the United States. Zeiss key. A Zeiss key'" (also known as a "'Cruciform key'") is a cross between a house key and a tubular key. It has three sets of teeth at 90 degrees to each other with a flattened fourth side. Though this type of key is easy to duplicate, the extra sets of teeth deter lockpicking attempts. Do Not Duplicate key. A "'Do Not Duplicate key'" (or "'DND key'", for short) is one which has been stamped "do not duplicate" and or "duplication prohibited" or similar by a locksmith or manufacturer as a passive deterrent to prevent a retail key cutting service from duplicating a key without authorization or without contacting the locksmith or manufacturer who originally cut the key. More importantly, this is an access control system for the owner of the key, such as a maintenance person or security guard, to identify keys that should not be freely distributed or used without authorization. Though it is intended to prevent unauthorized key duplication, copying restricted keys remains a common security problem. There is no direct legal implication in the US for someone who copies a key that is stamped "do not duplicate" (unless it is a government owned key), but there are patent restrictions on some key designs (see "restricted keys"). The Associated Locksmiths of America calls DND keys "not effective security", and "deceptive because it provides a false sense of security." United States Code deals with United States Post Office keys, and deals with United States Department of Defense keys. Restricted key. A restricted keyblank'" is a keyway and blank for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many jurisdictions, customers must provide proof of ID before a locksmith will duplicate a key using a restricted blank. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication. Keycard. A "'keycard'", while not actually considered a key, is a plastic card which stores a digital signature that is used with electronic access control locks. It is normally a flat, rectangular piece of plastic and may also serve as an ID card. There are several popular type of keycards in use and include the mechanical holecard, bar code, magnetic stripe, smart card (embedded with a read write electronic microchip), and RFID proximity cards. The keycard is used by presenting it to a card reader; swiping or inserting of mag stripe cards, or in the case of RFID cards, merely being brought into close proximity to a sensor. Bar code technology is not a secure form of a key, as the bar code can be copied in a photocopier and often read by the optical reader. Magnetic stripe keycards are becoming increasingly easy to copy, but have the security advantage that one may change the stored key in a magnetic swipe card in case the current key may be compromised. This immediate change of the "key" information can be applied to other media, but this media probably offers the least expensive option, and the most convenient to users and managers of systems that use this media. Example: If you own a car with this system, you can change your keys anytime you want. You can buy new media anywhere a gift card is sold. At least at this point in time, you could buy a gift card for a penny, then use that as the media for the keys to your car. If the system uses digital environmental data samples to create the "key" string, every car can have a set of keys that no one else has. If a card is stolen, or copied without authorization, the card can be remade, and the car security system can be synchronized with the new card, and no longer activationally responsive to the copy of the old card. This approach can empower the system controller (owner individual or centralized administration of a business). Computerized authentication systems, such as key cards, raise privacy concerns, since they enable computer surveillance of each entry. Currently RFID cards and key fobs are becoming more and more popular due to its ease of use. Many modern households have installed digital locks that make use of key cards, in combination with biometric fingerprint and keypad PIN options. The first keycard was the mechanical holecard type patented by Tor Sørnes, a concept he later developed into the magnetic stripe card key. History of locks and keys. Wooden locks and keys were in use as early as 4,000 years ago in Egypt. It is also said that key was invented by Theodore of Samos in the 6th century BC. In the United States, keys have been seen as a symbol of power since colonial times. When William Penn arrived in Delaware 1682, a very elaborate ceremony was carried out where he was given the key to the defense works. Flat metal keys proliferated in the early 20th century, following the introduction of mechanical key duplicators, which allow easy duplication of such keys. Key duplication. "'Key cutting (after cutting, the metalworking term for "shaping by removing material") is the primary method of key duplication: a flat key is fitted into a vise grip in a machine, with a blank attached to a parallel vise grip, and the original key is moved along a guide, while the blank is moved against a wheel, which cuts it. After cutting, the new key is deburred: scrubbed with a metal brush to remove burrs, small pieces of metal remaining on the key, which, were they not removed, would be dangerously sharp and, further, foul locks. Different key cutting machines are more or less automated, using different milling or grinding equipment, and follow the design of early 20th century key duplicators. Key duplication is available in many retail hardware stores and of course as a service of the specialized locksmith, though the correct key blank may not be available. Certain keys are designed to be difficult to copy, for access control, such as Medeco, while others are simply stamped Do Not Duplicate to advise that access control is requested, but in the US, this disclaimer has no legal weight. History of key duplication. A machine permitting rapid duplication of flat metal keys, which contributed to the proliferation of their use during the 20th century, may have been first invented in the United States in 1917 (image to the left): Keys in Heraldry. Keys appear in various symbols and coats of arms, the most well-known being that of the Vatican- derived from the story of Saint Peter, the first Pope, being given the Keys of Heaven.