Consider the sequence of terms

![15085|577x62](upload://sVCnCAbmXwQF9BkPERaeBDrDiSn.jpeg)

a) What are the next three terms in the sequence?
b) What formula finds any term i„ for all n > 1, given the preceding term, 4_1?
c) What formula finds any term in for all n > = 1, given 2 raised to some power?


Build the following table and notice that each term (after the first) is twice the previous term.

![15086|259x135](upload://wyeqG6Pjfuy62mYTbi9MpKuDBVp.jpeg)
a) From the above table the next three terms are: t5=16, t6 = 32, tq = 64.
b) Notice that each term (after the first) is twice the previous term. Thus the formula is:
= 2 * tn_i (for all n > 1)
c) Notice that each power of two (including the first) is one less then the term number. Thus the formula is:
to = 2" (for all n > = 1)

Computer Science & Information Technology

You might also like to view...

A logic error happens mostly because a user makes a mistake by using an incorrect value or reference in a formula

Indicate whether the statement is true or false

Computer Science & Information Technology

Embedded charts are useful when you want to print a chart next to the data the chart illustrates.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match the following crimes with their definitions

1. Computer crime a. It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses. 2. Cyber crime b. It is defined as any criminal act in which a computer is involved, even peripherally. 3. Digital crime c. A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography. 4. Phreaking d. It includes any criminal activity that involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data. 5. Computer-related crime e. It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.

Computer Science & Information Technology

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem.   Which of the following are the best actions for the user to take? (Select TWO.)

A. Perform a factory reset. B. Disable full device encryption. C. Install an anti-malware app. D. Remove unused apps. E. Jailbreak or root the device.

Computer Science & Information Technology