Download presentation
Presentation is loading. Please wait.
Published byRandolph Kennedy Modified over 8 years ago
1
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
2
HW Check 3.6
3
Page 5 of the Unit 3 packet
4
You have studied many relationships between quantities. In this lesson you will learn about a special type of relationship called a function. In this lesson you will: use a coding grid to write a coded message create and use a letter-shift code determine whether given relationships are functions
5
Function Relation – set of ordered pairs (input and output values) Function – a relationship between a set of inputs and outputs **For any input, the function will have exactly one output. Domain – the set of all x values (input values) in a relation Range – the set of all y values (output values) in a relation
6
The study of secret codes is called cryptography. In cryptography, encryption is the process of transforming information using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).
7
The history of cryptography began thousands of years ago. The earliest known use of cryptography is found in non-standard hieroglyphs carved into monuments from the Old Kingdom of Egypt circa 1900 BC. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids.
8
In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
9
Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard and the invention of public- key cryptography. Modern encryption protects our information – especially when dealing with money – ATMs, credit cards, etc.
10
Secret Codes Investigation – pages 2 & 3
11
Stand up/Sit Down For each of the following stand if the relation is a function, stay seated if it is not a function. Be ready to justify your choice!
12
1)
13
2)
14
3)
15
4)
16
Coming up… Homework tonight – 3.7 QUIZ tomorrow!! Midterm coming up next Wednesday. Start looking over Units 1 – 3 materials.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.