Browse Definitions:
Definition

exponential function

An exponential function is a mathematical function of the following form:

f ( x ) = a x

where x is a variable, and a is a constant called the base of the function. The most commonly encountered exponential-function base is the transcendental number e , which is equal to approximately 2.71828. Thus, the above expression becomes:

f ( x ) = e x

When the exponent in this function increases by 1, the value of the function increases by a factor of e . When the exponent decreases by 1, the value of the function decreases by this same factor (it is divided by e ).

In electronics and experimental science, base-10 exponential functions are encountered. The general form is:

f ( x ) = 10 x

When the exponent increases by 1, the value of the base-10 function increases by a factor of 10; when the exponent decreases by 1, the value of the function becomes 1/10 as great. A change of this extent is called one order of magnitude.

For a given, constant base such as e or 10, the exponential function "undoes" the logarithm function, and the logarithm undoes the exponential. Thus, these functions are inverses of each other. For example, if the base is 10 and x = 3:

log (10 x ) = log (10 3 ) = log 1000 = 3

If the base is 10 and x = 1000:

10 (log x) = 10 (log 1000) = 10 3 = 1000

This was last updated in September 2005

Start the conversation

Send me notifications when other members comment.

SearchCompliance

• PCAOB (Public Company Accounting Oversight Board)

The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

• cyborg anthropologist

A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

• RegTech

RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

• email spam

Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

• distributed denial of service (DDoS) attack

A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

• application whitelisting

Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

• athenahealth Inc.

Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

• Affordable Care Act (ACA or Obamacare)

The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

• HIPAA Privacy Rule

The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

• disaster recovery as a service (DRaaS)

One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

• data recovery

Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

• disaster recovery plan (DRP)

A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

• yottabyte (YB)

A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

• Kilo, mega, giga, tera, peta, exa, zetta and all that

Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

• brontobyte

A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

• SSD caching

SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

• NVDIMM (Non-Volatile Dual In-line Memory Module)

An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

• NAND mirroring

NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

• RESTful API

A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

• cloud storage infrastructure

Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...