Can anyone decrypt this clock?

1 Answer

Answer :

answer:I don’t know yet. Do you know what, if anything, is written on the red hexagon in the center of the clock face? Perhaps that holds a clue.

Related questions

Description : Does anyone recognize this phrase?

Last Answer : this web page about Bach cantata 199 (Mein Herze schwimmt in Blut) references one of the lines as “My sins have made me a monster in the eyes of God” which is pretty dang close. It’s about a third of the way down the page. The discrepancy could be explained by the translation.

Description : Any Foreign Language Enthusiasts here?

Last Answer : I used to be able to speak Klingon but I forgot all of it.

Description : Do you hear and translate (in your mind) a foreign language to your native speak?

Last Answer : I've taken three semesters of Latin in the last two years of school. I know what you're talking about, and it took me about a semester and a half before I started thinking in Latin , per sē. ... a more affordable option, watching a movie with Spanish audio) would be a way to speed up that process.

Description : What foreign language would you try to learn?

Last Answer : I had Spanish in high school and college, but that was 30 years ago and I haven’t used it much since. So I just signed up for night class at the local community college, 6 hours a week for almost 4 months – I’m hoping to make real progress.

Description : Do you ever feel paranoid that foreign speakers are talking about you?

Last Answer : Yes, I think it’s possible at times.

Description : What do Danish people call their grandfathers?

Last Answer : grande pere? :P

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : What English code breaker created a machine that helped to decrypt Nazi

Last Answer : Alan Turin