quizlet can help you its very helpful on quizes it some time mostly have the same excact quizes
Answer:
Advantages
The main advantage in the use of pulleys is that the effort becomes less as compared to the normal lifting of the weights. In other words, it reduces the amount of actual force required to lift heavy objects. It also changes the direction of the force applied. These two advantages in the use pulleys make them an important tool for heavy lifting. It also provides a mechanical advantage.
The other advantage in the use of pulleys is that the distance between the operator and weight. There is a safe distance between them which avoids any disaster. Pulleys are easy to assemble and cost-effective. The combination of different directional pulleys can change the position of the load with little effort. Though there are moving parts in the pulley system they require less or no lubrication after installation.
Disadvantages
Apart from the above-said advantages while using pulley systems, there are several disadvantages in their use. The main disadvantage in the use of the pulley system is that it requires large space to install and operate. The mechanical advantage of pulleys can go to higher values but need more space to install them.
In some cases, the ropes/belts move over the wheel with no grooves, the chances of the slip of ropes/belts from the wheel are inevitable. If the system is installed to use for a long time, they require maintenance and regular check-up of ropes/cables as the friction between the wheels and cables/ropes occur causing wear and tear to them. Continuous use of the system makes the ropes weak. The rope may break while using the system causing damages to the operator, surrounding place and the load which is being lifted.
Answer:
A. optical isolation
Explanation:
well I can't really give a good explanation because I also saw the same question in my exams and option A was the correct answer
Answer / Explanation:
Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.
To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.
On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).
If you suspect anything is wrong with it such as it not working or before using one of them