Browse Definitions :


A polynomial is a mathematical expression consisting of a sum of terms, each term including a variable or variables raised to a power and multiplied by a coefficient.  The simplest polynomials have one variable.  A one-variable (univariate) polynomial of degree n has the following form:

anxn + an-1xn-1 + ... + a2x2 + a1x1 + ax

where the a's represent the coefficients and x represents the variable.  Because x1 = x and x = 1 for all complex numbers x, the above expression can be simplified to:

anxn + an-1xn-1 + ... + a2x2 + a1x + a

When an nth-degree univariate polynomial is equal to zero, the result is a univariate polynomial equation of degree n:

anxn + an-1xn-1 + ... + a2x2 + a1x + a = 0

There may be several different values of x, called roots, that satisfy a univariate polynomial equation.  In general, the higher the order of the equation (that is, the larger the value of n), the more roots there are.

A univariate polynomial equation of degree 1 (n = 1) constitutes a linear equation.  When n = 2, it is a quadratic equation; when n = 3, it is a cubic equation; when n = 4, it is a quartic equation; when n = 5, it is a quintic equation.  The larger the value of n, the more difficult it is to find all the roots of a univariate polynomial equation.

Some polynomials have two, three, or more variables.  A two-variable polynomial is called bivariate; a three-variable polynomial is called trivariate.

This was last updated in May 2008

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

Because x^1 = x and x = 1 for all complex numbers x, ...

just guessing, maybe the right sentence is :

Because x^1 = x and x^0 = 1 for all complex numbers x, ...
I was thinking the same! it's X to the power of 0 for sure.
thank you for the answer
very nice answer


File Extensions and File Formats

Powered by:


  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...


  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...




  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...