The exact function for radioactive decay

What will be an ideal response?

```
double f(double x, double halflife)
{
return exp(-log(2) / halflife * x);
}

```

Computer Science & Information Technology

You might also like to view...

__________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ protocol is used to open a user's e-mail client and address a new message.

A. ftp B. news C. file D. mailto

Computer Science & Information Technology