R = distance
dr/dt speed or with a direction, velocity
d(dr/dt)/dt = the time derivative of the velocity is called acceleration.
Speed is a scalar. Acceleration is a vector.
Answer:
1561.84 MPa
Explanation:
L=20 cm
d1=0.21 cm
d2=0.25 cm
F=5500 N
a) σ= F/A1= 5000/(π/4×(0.0025)^2)= 1018.5916 MPa
lateral strain= Δd/d1= (0.0021-0.0025)/0.0025= -0.16
longitudinal strain (ε_l)= -lateral strain/ν = -(-0.16)/0.3
(assuming a poisson's ration of 0.3)
ε_l =0.16/0.3 = 0.5333
b) σ_true= σ(1+ ε_l)= 1018.5916( 1+0.5333)
σ_true = 1561.84 MPa
ε_true = ln( 1+ε_l)= ln(1+0.5333)
ε_true= 0.4274222
The engineering stress on the rod when it is loaded with a 5500 N weight is 1561.84 MPa.
Answer:
(a) the velocity ratio of the machine (V.R) = 1
(b) The mechanical advantage of the machine (M.A) = 0.833
(c) The efficiency of the machine (E) = 83.3 %
Explanation:
Given;
load lifted by the pulley, L = 400 N
effort applied in lifting the, E = 480 N
distance moved by the effort, d = 5 m
(a) the velocity ratio of the machine (V.R);
since the effort applied moved downwards through a distance of d, the load will also move upwards through an equal distance 'd'.
V.R = distance moved by effort / distance moved by the load
V.R = 5/5 = 1
(b) The mechanical advantage of the machine (M.A);
M.A = L/E
M.A = 400 / 480
M.A = 0.833
(c) The efficiency of the machine (E);
Answer / Explanation:
Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.
To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.
On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).