Answer:
Step-by-step explanation:
another math-based concept used in cybersecurity is hexadecimal math. Rather than having only two options, as in binary math, hexadecimal math is based on the idea that you can count up to any one of 16 different options. ... Cryptography is the science of codes and encryption and is based on mathematical theory
Answer:
.8
Step-by-step explanation:
Answer:
-2.85
Step-by-step explanation:
I looked it up tbh
Answer:
Step-by-step explanation:
x₁ = 0 ; y₁=0 &
x₂ = 1 ; y₂=2
Slope =

Slope = 2
1. a. Pretty much, you just have to rearrange it so that the highest power is in the front. So, here's your answer:
b. It's a 4th-degree polynomial. A degree means that "what's the highest power?"
c. It's a trinomial. It has 3 terms, hence it's a
trinomial.
2. a. Since it's an odd power and a negative coefficient, it will be:
x→∞, f(x)→-∞
x→-∞, f(x)→∞
b. The degree is even and the coefficient is negative, so it will be:
x→∞, f(x)→-∞
x→-∞, f(x)→-∞
3. a. This basically means that if you solve for x, you should get -2, 1, and 2. So, to do this, you can just write it in factored form and multiply inwards using any method of your choice (remember that in the parentheses, you should get the above value if you solve for x):

If you multiply it out, you get (also your answer):
4. The zeros are at
x = 3, 2 and
-7.
Multiplicity of 3 is
1, for 2 it's
2, and for -7 it's
3.
Hope this helps!