Skip to main content
Mathematics LibreTexts

14.1: Prelude to Sequences, Series and Binomial Theorem

  • Page ID
    50036
    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    A strange charge suddenly appears on your credit card. But your card is in your wallet—it’s not even lost or stolen. Sadly, you may have been a victim of cyber crime. In this day and age, most transactions take advantage of the benefit of computers in some way. Cyber crime is any type of crime that uses a computer or computer network. Thankfully, many people are working to prevent cyber crime. Sometimes known as cryptographers, these people develop complex patterns in computer codes that block access to would-be thieves as well as write codes to intercept and decode information from them so that they may be identified. In this chapter, you will explore basic sequences and series related to those used by computer programmers to prevent cyber crime.

    A photo of lines of code on a computer terminal screen.
    Figure 12.0.1: Cryptographers protect private data by encrypting it; this means they convert the data into a code that hackers and thieves cannot easily break.

    This page titled 14.1: Prelude to Sequences, Series and Binomial Theorem is shared under a CC BY 4.0 license and was authored, remixed, and/or curated by Chau D Tran.

    • Was this article helpful?