Answer:
1. James will attack by generating a random private key XD and a corresponding public key YD.
2. Jane transmit YA to another person called Alex.
3. James intercept YA and transmit YD to jane.
4. Jane receive YD and calculate K1
At this point james and jane thinks they share a secret key but instead james has a secret key k1 to Jane and k2 to alex.
5. Alex transmit another key XA to alex for example.
6. James intercept and calculate k2 and vice versa.
Answer:
(a) the velocity ratio of the machine (V.R) = 1
(b) The mechanical advantage of the machine (M.A) = 0.833
(c) The efficiency of the machine (E) = 83.3 %
Explanation:
Given;
load lifted by the pulley, L = 400 N
effort applied in lifting the, E = 480 N
distance moved by the effort, d = 5 m
(a) the velocity ratio of the machine (V.R);
since the effort applied moved downwards through a distance of d, the load will also move upwards through an equal distance 'd'.
V.R = distance moved by effort / distance moved by the load
V.R = 5/5 = 1
(b) The mechanical advantage of the machine (M.A);
M.A = L/E
M.A = 400 / 480
M.A = 0.833
(c) The efficiency of the machine (E);
