Download presentation
Presentation is loading. Please wait.
Published byAllison Chase Modified over 9 years ago
1
Unit 3 Day 4
2
Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In right triangle ABC, side AC is longer than side BC. The boxed numbers represent the possible side lengths of triangle ABC. Identify three boxed numbers that could be the side lengths of triangle ABC. Enter the number you chose to represent the length of each side. a. BC =_____b. AC =_____c. AB =_____ 158710136 Input-346 Output13-46
3
HW Check
4
On the lined side of the index card: 1.Create a table of Input/Output Values that can be represented by an equation 2.Give at least 4 terms in your sequence. 3.Write your name on the lined side of the index card.Ex. Review of Input-Output Functions Input (x) Output (y) -2 00 11 33
5
Find a partner NOT at your table. 1.Write the partners name on the white side of the index card. 2.Have your partner create the now/next function for your sequence. 3.Partners turn in the index card to the bin at the front of the room. Equation: y = x Partner’s Name
6
Secret Codes You have studied many relationships between quantities. In this lesson you will learn about a special type of relationship called a function. In this lesson you will ● use a coding grid to write a coded message ● create and use a letter-shift code ● determine whether given relationships are functions
7
The study of secret codes is called cryptography. In cryptography, encryption is the process of transforming information using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.informationalgorithmcipherkey The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).
8
The history of cryptography began thousands of years ago. The earliest known use of cryptography is found in non- standard hieroglyphs carved into monuments from the Old Kingdom of Egypt circa 1900 BC.Old Kingdom of Egypt Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids.
9
In the early 20th century, the invention of complex mechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption. The introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
10
The development of cryptography has been paralleled by the development of cryptanalysis — the "breaking" of codes and ciphers. The discovery and application, early on, of frequency to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram* triggered the United States' entry into World War I; and Allied reading of Nazi Germany's ciphers shortened World War II, in some evaluations by as much as two years.
11
Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard the invention of public-key cryptography. Modern encryption protects our information – especially when dealing with money – ATMs, credit cards, etc.
12
InputABCDEFGHIJKLMNOPQRSTUVWXYZ Out- put FGHIJKLMNOPQRSTUVWXYZABCDE The table shows that the letter A is coded to the letter F, letter B is coded to G, and so on. It also shows that the letter S is coded to the letter X. This code is called a letter-shift code. Can you see why? How would you use the code to write a message?
13
For this code, the letters are shifted 5 places backwards. Think of the letters A through Z as the numbers 1 through 26. How can we write a rule to represent the letter-shift code? Input1234567891011121314151617181920212223242526 Output6789101112131415161718192021222324252612345
14
You can also represent the code with a grid. Note that the input letters run across the x-axis. To code a letter, look for the shaded square directly above it. Then find the coded output by looking across to the letters that are on the y-axis. In this case, we can see that the letter O maps to the letter T. How is the shift of 5 letters revealed on the graph?
15
Write a Short Coded message. Ex. YWD IJHTINL YMNX Is code for TRY DECODING THIS.
16
This code is called a letter-shift code. Can you see why? How would you use the code to write a message?
17
A RELATION is a set of ordered pairs (input/output values)
18
DOMAIN The DOMAIN of a relation is the set of first coordinates of the ordered pairs. ***The X values are the DOMAIN*** ***Input Values***
19
RANGE The RANGE is the set of second coordinates. ***The Y values are the RANGE*** ***Output Values***
20
Function A FUNCTION is a relation that assigns exactly one value in the range to each value in the domain. ***Meaning X values CANNOT Repeat***
21
a) Domain: _______________________ b) Range: _________________________ c) Is the relation a function? Why or Why not. _________________________ XY 43 -21 3 4-2 1
22
EXAMPLE Tell whether each table represents a function. Explain why or why not.
23
Domain ValuesRange Values Domain values “map” to its matching range value
24
Create a Mapping Diagram for the relation Is the relation a function? Why or Why not.
26
HW 3.4
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.