Monday, November 22

Question 25

Identify these two men.

Answer:Balaji and Venkateswara rao of Venky's, the new owners of the Blackburn rovers.

Sunday, November 21

Question 24

Again, quite simple. What?
The X were designed by the Y Navy, in collaboration with the United States space agency NASA. They have a diameter of 54 centimetres (21 in), and have eight wheels located on the top and the bottom, with a damping system for mobility in the pipeline. They have a harness, an oxygen supply, and a microphone with speakers. Officially, three prototypes of the X were created. The 1st had a larger diameter than the other two and was used in tests in the shaft created by the T-130 drill. The 2nd was operated with an Austrian pulley system. The 3rd was held in reserve and not used. Several major online news media organizations produced illustrations of the basic X design. Auction experts estimate that the X-2 could be worth up to US$1 million.



Answer:The Fenix capsules, used in the recent rescue operations of trapped miners in chile.

Question 23

Very easy.Identify.

Answer:The Bugatti veyron

Wednesday, November 17

Question 22

1st one 'broke' 2nd one. Identify.

Answer:The Colossus and the Lorenz cipher machines.

Question 21

What?



Answer:The Columbia hills on planet mars

Question 20


Identify both.
2nd pic is the emblem of an organization, and loosely based on 1st pic.
Answer:The fleur de lis and The Priory of sion.

Question 19

What?

Answer:Cryptex

Question 18

What?

Answer:To quote wiki, this is the Poznan monument, dedicated to the breaking of German enigma machine ciphers by polish cryptologists beginning in 1932, which altered the course of World war II.

Question 17

1)X-Y binary-coded decimal, also called biased representation, is a numeral system used on some older computers that uses a pre-specified number N as a biasing value. It is a way to represent values with a balanced number of positive and negative numbers. In X, numbers are represented as decimal digits, and each digit is represented by four bits as the BCD value plus Y (the "X" amount):The smallest binary number represents the smallest value. (i.e. 0 − X Value) The greatest binary number represents the largest value. (i.e. 2 N+1 − X Value − 1) The primary advantage of this coding over BCD coding is that a decimal number can be nines' complemented (for subtraction) as easily as a binary number can be ones' complemented; just invert all bits. In addition, when the sum of two digits is greater than 9, the carry bit of a four bit adder will be set high. This works because, when adding two numbers that are greater or equal to zero, an "X" value of six results in the sum. Since a four bit integer can only hold values 0 to 15, an X of six means that any sum over nine will overflow. Adding X-Y works on a different algorithm than BCD coding or regular binary numbers. When you add two numbers in this system together, the result is not an X-Y number. In order to correct this problem, when you are finished adding each digit, you have to subtract Y if the digit is less than decimal 10 and add Y if the number is greater than or equal to decimal 10 (thus causing the number to wrap).
2)An Z cipher, also known as Z's cipher, the shift cipher, Z's code or Z shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example,with a shift of Y. The method is named after Z, who used it to communicate with his generals.The encryption step performed by a Z cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, Z cipher is easily broken and in practice offers essentially no communication security.
As is evident from the text,
1 is a numeral system.
2 is an encryption technique.
Both use the same funda.Plenty of clues in question.
Identify X,Y,Z.
Answer:The Excess-3(XS-3)numeral system and the Caesar cipher, named after Julius Caesar.