real world example using polynomials and exponents for reinforcing computer security?

real life experience where a problem can be represented using polynomials and exponents. show how the techniques learned can solve this problem. show all steps.

1 reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.