Engineering

If P is principal amount, i is the rate of interest and n is the number of periods in years, then the interest factor is: A. (1 + ni) B. (ni ? 1) C. ni D. None of these.The interest calculated on the basis of 365 days a year, is known as : A. interest B. ordinary simple interest C. exact simple interest D. None of these.The product of CAF (S P) and PWF (SP) is : A. 1/2 B.1 C. 1/3 D.4. Pick up the correct statement from the following : A. An annuity is a serious of equal payments occurring at equal period of time. B. Annuity is called an equal payment or uniform payment series. C. An annuity may have periods of time of any length but should always be of equal length. D. All the above. Annuities involve : A. a series of payments B. all payments of equal amount C. payment at equal time intervals D. All of these

 If P is principal amount, i is the rate of interest and n is the number of periods in years, then the interest factor is:A. (1 + ni)B. (ni ? 1)C. niD. None of these The interest calculated on the basis of 365 days a year, is known as :A. interestB. ordinary simple interestC. exact …

If P is principal amount, i is the rate of interest and n is the number of periods in years, then the interest factor is: A. (1 + ni) B. (ni ? 1) C. ni D. None of these.The interest calculated on the basis of 365 days a year, is known as : A. interest B. ordinary simple interest C. exact simple interest D. None of these.The product of CAF (S P) and PWF (SP) is : A. 1/2 B.1 C. 1/3 D.4. Pick up the correct statement from the following : A. An annuity is a serious of equal payments occurring at equal period of time. B. Annuity is called an equal payment or uniform payment series. C. An annuity may have periods of time of any length but should always be of equal length. D. All the above. Annuities involve : A. a series of payments B. all payments of equal amount C. payment at equal time intervals D. All of these Read More »

Question 5: (25 Marks)Given a group of boxes carried on a trolley, it is requested to arrange these boxes on top of each other to reach the minimum possible height. To enable the man to control the stability of the boxes, it is mandatory that a box “X” cannot be placed on top of another box “Y” unless the 2D base area of X is less than or equal to 2D base area of Y. It is allowed to rotated any box to use any two sides as its base.For example, consider below 3 boxes where each box has the following dimensions Input:Box 1: (9,3,6), Box 2: (2,3,7), Box 3: (6,4,10)Output:From bottom to top as follows:Box 3 on the base (6,10) and height 4,then Box 1 on the base (6,9) and height 3,finally, on top Box 2 on the base (3,7) and height 2. The total height is 9[Explanation: as we can see that the first box in the bottom is the box 3 with base 6×10 and height 4, then box 1 with base 6×9 and height 3, and so on. This arrangement of boxes fulfils the stability constraint and also satisfies the minimum possible height]Assume the existence of n boxes, answer the following questions:1) Describe how a brute-force approach algorithm would solve the above problem (5 marks), and explain its complexity (4 marks).2) Design a more efficient algorithm to solve this problem. (12 marks) [The efficiency of your algorithm is the main driver of the mark], and analyze the complexity of your solution. (4 marks) [full explanation of your answer should be provided]

Question 5: (25 Marks)Given a group of boxes carried on a trolley, it is requested to arrange these boxes on top of each other to reach the minimum possible height. To enable the man to control the stability of the boxes, it is mandatory that a box “X” cannot be placed on top of another …

Question 5: (25 Marks)Given a group of boxes carried on a trolley, it is requested to arrange these boxes on top of each other to reach the minimum possible height. To enable the man to control the stability of the boxes, it is mandatory that a box “X” cannot be placed on top of another box “Y” unless the 2D base area of X is less than or equal to 2D base area of Y. It is allowed to rotated any box to use any two sides as its base.For example, consider below 3 boxes where each box has the following dimensions Input:Box 1: (9,3,6), Box 2: (2,3,7), Box 3: (6,4,10)Output:From bottom to top as follows:Box 3 on the base (6,10) and height 4,then Box 1 on the base (6,9) and height 3,finally, on top Box 2 on the base (3,7) and height 2. The total height is 9[Explanation: as we can see that the first box in the bottom is the box 3 with base 6×10 and height 4, then box 1 with base 6×9 and height 3, and so on. This arrangement of boxes fulfils the stability constraint and also satisfies the minimum possible height]Assume the existence of n boxes, answer the following questions:1) Describe how a brute-force approach algorithm would solve the above problem (5 marks), and explain its complexity (4 marks).2) Design a more efficient algorithm to solve this problem. (12 marks) [The efficiency of your algorithm is the main driver of the mark], and analyze the complexity of your solution. (4 marks) [full explanation of your answer should be provided] Read More »

You are requested to use the below link to generate the hashes (message digests) of the following texts: Hashing is a very good tool for the integrity of a message. Hashing is a very good tool for the integrity of a message! My last ID digit is x. a) Use the following emulator to generate the SHA1 hash of the above texts: https://passwordsgenerator.net/sha 1-hash-generator/ PS: in the emulator check the Treat each line as a separate string” Provide a screenshot for part a. No marks will be awarded if there is no screenshot! b) Have a look at the hashes of texts 1 and 2 in the hashing scheme. Are the two hashes the same? Why? Discuss. c) Based on the results that you have received, what is the size (number of bits) of the SHA1 hash (message digest)? Show your calculation. d) Will the length of the text message affect the length of any hash size? Discuss. e) Do some research and explain the major difference between hashing and encryption

EXPERT ANSWER Answer: a) b) Both hashes are different even if you change a single dot in a plaintext the hash will be change as in text1 there is a dot at the end and in text2 there is exclamation mark at the end so both are different so hash will be different. even a …

You are requested to use the below link to generate the hashes (message digests) of the following texts: Hashing is a very good tool for the integrity of a message. Hashing is a very good tool for the integrity of a message! My last ID digit is x. a) Use the following emulator to generate the SHA1 hash of the above texts: https://passwordsgenerator.net/sha 1-hash-generator/ PS: in the emulator check the Treat each line as a separate string” Provide a screenshot for part a. No marks will be awarded if there is no screenshot! b) Have a look at the hashes of texts 1 and 2 in the hashing scheme. Are the two hashes the same? Why? Discuss. c) Based on the results that you have received, what is the size (number of bits) of the SHA1 hash (message digest)? Show your calculation. d) Will the length of the text message affect the length of any hash size? Discuss. e) Do some research and explain the major difference between hashing and encryption Read More »

An old encryption system uses 16-bit keys. A cryptanalyst, who wants to brute-force attack the encryption system, is working on a computer system with a performance rate of one million keys per second.How many possible keys will be available in the above encryption system?What will be the maximum amount of time (in milli seconds) needed to brute-force all the possible keys?Show your detailed calculation process

An old encryption system uses 16-bit keys. A cryptanalyst, who wants to brute-force attack the encryption system, is working on a computer system with a performance rate of one million keys per second. How many possible keys will be available in the above encryption system? What will be the maximum amount of time (in milli …

An old encryption system uses 16-bit keys. A cryptanalyst, who wants to brute-force attack the encryption system, is working on a computer system with a performance rate of one million keys per second.How many possible keys will be available in the above encryption system?What will be the maximum amount of time (in milli seconds) needed to brute-force all the possible keys?Show your detailed calculation process Read More »

The pin P has a mass of 0.2 kg. It is constrained to move along the frictionless curved slot as shown. As the arm OA rotates, the radial distance between pin P and pivot O is constrained to follow the function r = (0.6cos2 m. The arm OA rotates with a constant angular speed θ =-3 rad/s. The whole thing is on the vertical plane (gravity cannot be neglected). At the moment when θ三0, determine: The normal force exerted on the pin by the wall. (Hint: at θ = 0 this force will be horizontal and along the er component. The normal force exerted on the pin by the arm OA. (Hint: at θ = 0 this force will be vertical and along the eθ component. The net normal force (magnitude) exerted on the pin. (Easy once you solved (a) and (b)) a. b. c. r (0.6 cos 20) m More hints on problem 5: Draw your FBD and IRD when θ 0, such that the reaction forces (from the wall and the arm) are horizontal and vertical, respectively. The only “body” in your FBD should be the pin. Dio not draw the arm or the track!!! Work this problem in polar coordinates!!! It will be nearly impossible to solve otherwise. The most tedious part of this problem is to derive an expression for ř and i (you need to take the derivative of r, which requires careful application of chain rule and product rule.) γ, γ and γ will be functions of θ, θ and θ, which have known values in this problem and you can therefore just plug in. You should end up with actual values for r,f and i. Use Newton’s 2″d Law using polar accelerations. (You should have one equation for the êr direction and another for the êa direction, The answer to part c is 5.75 N

Dynamics. Show all the steps, calculations, and thought process EXPERT ANSWER

The Heat Equation HW 1(Derivation problem-2): 2) Find the temperature distribution for the plane wall(see below) assuming that.(a)1-d process(x-direction only)(b)steady state(c)with energy generation(d)assume k is constant.partial/partial differentiate x(k partial differentiate t/Partial x)+Partial/Partial Differentiate y(K Partial Differentiate T/Partial Differentiate y)+Partial/Partial Differentiate z(K Partial Differentiate T/Partial Differentiate z)+e=pcp(Partial Differentiate T)/Partial Differentiate t

BEST ANSWER MORE ANSWERS