Lecture on Similar Shapes

Lecture on Similar Shapes

Principle objective of this lecture is to present on Similar Shapes. Similar figures are identical in shape, but not in size.  For example, two circles are always…
Lecture on Sequence

Lecture on Sequence

A sequence is a set of terms, in a definite order, where the terms are obtained by some rule. A finite sequence ends after a certain…
Electronic Authentication

Electronic Authentication

Electronic Authentication provides a level of assurance as to whether someone or something is who or what it claims to be in a digital environment. It…
Right Prism Volume

Right Prism Volume

A right prism is a solid which has two parallel planes of same shape and size. Also, its lateral surface are perpendicular to its parallel…
Presentation on Reflections

Presentation on Reflections

major objective of this lecture is to present on Reflections. A reflection is a kind of transformation. It is basically a ‘flip’ of a shape over the…
About Biometrics

About Biometrics

Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. It  is used in computer science as a form…
Lecture on Ratio Analysis

Lecture on Ratio Analysis

The aim of this lecture is to present on Ratio Analysis. Ratio is the quantitative relation between two amounts showing the number of times one value contains…
Rules for Rational Exponents

Rules for Rational Exponents

Prime objective of this lecture is to present on rules for Rational Exponents. It is the reciprocal of 16/25 with a positive exponent. So it is…
Mathematical Explanation of Rational Exponents

Mathematical Explanation of Rational Exponents

Basic objective of this lecture is to present on Mathematical Explanation of Rational Exponents. Here briefly focus on about expressions with rational exponents like x^(2/3), about…
Two Factor Authentication

Two Factor Authentication

Two Factor Authentication is a security process, which provides users two means of identification from separate categories of credentials; one is typically a physical token,…
Graphing a Radical Function

Graphing a Radical Function

General objective of this lecture is to present on Graphing a Radical Function. A radical function contains a radical expression with the independent variable (usually x)…
Radical Equations

Radical Equations

An equation in which a variable occurs in the radicand is called a radical equation. It should be noted, that when solving a radical equation algebraically, extraneous…
Load More