Answer:
Step-by-step explanation:
another math-based concept used in cybersecurity is hexadecimal math. Rather than having only two options, as in binary math, hexadecimal math is based on the idea that you can count up to any one of 16 different options. ... Cryptography is the science of codes and encryption and is based on mathematical theory
Dependent variables: A variable whose value depends on the value of another variable or variables
independent variable: A variable whose value determines the value of another variable or variables
Answer:
Step-by-step explanation:
We know that g = -3 and h = 5
Plugging in the values for g and h you will get:



Final answer is 
Answer:
63.6
Step-by-step explanation:
63.625
63.6