Browse Definitions :
Definition

boustrophedon

Contributor(s): Dan Dobruse

Boustrophedon (from Greek for ox-turning ) is writing that proceeds in one direction in one line (such as from left to right) and then in the reverse direction in the next line (such as from right to left). Some ancient languages, including one form of ancient Greek (650 BC), were written this way. The term derives from the way one would plow land with an ox, turning the ox back in the other direction at the end of a row. (It could be argued that boustrophedon is a more efficient way to both write and read, especially if your lines are very long.)

Some types of printers and their software print in this fashion (although the results, of course, are lines that are read in only one direction).

This was last updated in September 2005

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

Concerning "boustrophedon": Can one offer an example of writing done in this manner? My confusion relates to how the words are written in the R to L line--is the first word in the line (for ex., "meta") written as "meta" or as "atem" ?
Cancel
Hey! Answer to your question: it's written "atem".
You can see an example of a nice "nodehportsuob" just here: http://crazy-about-language-learning.com/alphabets-of-the-world/boustrophedon-writing/
:-)
Olga
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close