Browse Definitions :
Definition

exponential function

An exponential function is a mathematical function of the following form:

f ( x ) = a x

where x is a variable, and a is a constant called the base of the function. The most commonly encountered exponential-function base is the transcendental number e , which is equal to approximately 2.71828. Thus, the above expression becomes:

f ( x ) = e x

When the exponent in this function increases by 1, the value of the function increases by a factor of e . When the exponent decreases by 1, the value of the function decreases by this same factor (it is divided by e ).

In electronics and experimental science, base-10 exponential functions are encountered. The general form is:

f ( x ) = 10 x

When the exponent increases by 1, the value of the base-10 function increases by a factor of 10; when the exponent decreases by 1, the value of the function becomes 1/10 as great. A change of this extent is called one order of magnitude.

For a given, constant base such as e or 10, the exponential function "undoes" the logarithm function, and the logarithm undoes the exponential. Thus, these functions are inverses of each other. For example, if the base is 10 and x = 3:

log (10 x ) = log (10 3 ) = log 1000 = 3

If the base is 10 and x = 1000:

10 (log x) = 10 (log 1000) = 10 3 = 1000

This was last updated in September 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close