1 / 16

Warm Up

Warm Up. 1) Solve : -2(x + 9) + 13 = - 11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?. HW Check 3.6. Functions & Secret Codes. Page 5 of the Unit 3 packet.

Télécharger la présentation

Warm Up

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?

  2. HW Check 3.6

  3. Functions & Secret Codes Page 5 of the Unit 3 packet

  4. You have studied many relationships between quantities. In this lesson you will learnabout a special type of relationship called a function. In this lesson you will: • use a coding grid to write a coded message • create and use a letter-shift code • determine whether given relationships are functions

  5. Function Relation – set of ordered pairs (input and output values) Function – a relationship between a set of inputs and outputs **For any input, the function will have exactly one output. Domain – the set of all x values (input values) in a relation Range – the set of all y values (output values) in a relation

  6. The study of secret codes is called cryptography. In cryptography, encryption is the process of transforming information using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).

  7. The history of cryptography began thousands of years ago. The earliest known use of cryptography is found in non-standard hieroglyphs carved into monuments from the Old Kingdom of Egypt circa 1900 BC. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids.

  8. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

  9. Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard and the invention of public-key cryptography. Modern encryption protects our information – especially when dealing with money – ATMs, credit cards, etc.

  10. Secret Codes Investigation – pages 2 & 3

  11. Stand up/Sit Down For each of the following stand if the relation is a function, stay seated if it is not a function. Be ready to justify your choice!

  12. 1)

  13. 2)

  14. 3)

  15. 4)

  16. Coming up… • Homework tonight – 3.7 • QUIZ tomorrow!! • Midterm coming up next Wednesday. Start looking over Units 1 – 3 materials.

More Related