Mathematics In Everyday Life Essay

CheapestPaperWriting 13 views 1 slides Jun 25, 2023
Slide 1
Slide 1 of 1
Slide 1
1

About This Presentation

Paper Writing Service - HelpWriting.net πŸ‘ˆ
βœ… Quality
You get an original and high-quality paper based on extensive research. The completed work will be correctly formatted, referenced and tailored to your level of study.

βœ… Confidentiality
We value your privacy. We do not disclose your persona...


Slide Content

Mathematics in Everyday Life Essay
Mathematics is possibly one of the most underappreciated sciences. It everywhere in our lives, mathematics runs our computers, flies our
aircraft, and protects our information. But for such a major part of our lives, very few people can say that they know how it is done, how the
RSA encryption protects their e–mail, or even that 21 squared is 441 without going into tedious mental calculations or reaching for their
calculator. Contrary to popular belief, mathematics has a wide range of useful applications. Those who would ask whenever they would need
algebra, both linear algebra and calculus is used extensively in computer programming and engineering. The fact is that mathematics is integrated
into almost every profession, and every...show more content...
There are some issues with this system. For example, imagine that both Person A and Person B want to include a third person in their
correspondences, Person C. First they would need to give Person C a key, through some sort of secure system, preferably a face–to–face meeting.
But what if Person C lives in Alaska and both Person A and Person B don't have the time, money, or desire to travel to Alaska to give Person C
the key, nor does Person C want to travel to Person A or B. This is a key weakness of the symmetric key system. In an asymmetric key system,
Person A sends many open locks to Person B, these locks can be put on messages and only Person A has the key to them. Person B does the
same thing, now if they wish to include Person C all Person C need to do is send open locks to Person A and Person B. In real life, there are
usually two keys, one for encryption and one for decryption, and these keys are in fact, usually numbers which determine how the message is
encoded. Now we are going to work off a common example, your credit company. Most public key cryptography will have your encryption key
public, anyone can view it, and use it, but only you can decrypt it. So if someone wanted to send you a message, they would take your key,
encrypt your message, and leave it in your mailbox, you would then use your decryption key, to decipher the message. The main problem with
public key cryptography is that no
Get more content on HelpWriting.net