# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

3 Pages

### section_2.3_lecture_notes

Course: MATH 1111, Fall 2008
School: Kennesaw
Rating:

Word Count: 156

#### Document Preview

Notes Section Lecture 2.3 The Composition of Functions p.189, Composition of Functions p.197 #43 sx tx x 3 x4 x 3 x4 s x t s x x blouse size in US x blouse size in Japan t(x) blouse size in Australia s(x) blouse size in US want formula that converts directly from Japanese to Australian sx tx t purple box, p.191 Two ways to show a composition of f(x) and g(x) f g x g f x or f g x g or f x 5 gx example...

Register Now

#### Unformatted Document Excerpt

Coursehero >> Georgia >> Kennesaw >> MATH 1111

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
Notes Section Lecture 2.3 The Composition of Functions p.189, Composition of Functions p.197 #43 sx tx x 3 x4 x 3 x4 s x t s x x blouse size in US x blouse size in Japan t(x) blouse size in Australia s(x) blouse size in US want formula that converts directly from Japanese to Australian sx tx t purple box, p.191 Two ways to show a composition of f(x) and g(x) f g x g f x or f g x g or f x 5 gx example 1a, p.142 2x fgx fgx fx fx g f x gfx gfx gfx gx x 2 3x 8 4x 4x 2 4x 2 2 g f x 10x 26x 48 10x 25 3 2x 5 8 20x 25 6x 15 8 answer: f x 2x gfx fx 2x 2 6x 11 gx 5 x 2 3x 8 1 answer: g...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Kennesaw - MATH - 1111
Lecture NotesSection 2.4 Symmetry and TransformationsSymmetryp.198 symmetry about x, y origin For symmetry imagine folding a piece of paper creased on the x axis or the y axis. p.199, Figure 1 symmetric around x axis Symmetry around x is not imp
Kennesaw - MATH - 1111
Lecture NotesSection 2.4 Symmetry and TransformationsSymmetryp.198 symmetry about x, y origin For symmetry imagine folding a piece of paper creased on the x axis or the y axis. p.199, Figure 1 symmetric around x axis Symmetry around x is not imp
Kennesaw - MATH - 1111
Lecture NotesSection 3.2 Quadratic Equations, Functions, and Models p.244 quadratic function format where a not equal to zero (b or c can be 0)f x ax 2 bx c Solving a quadratic equation p.244 standard form ax 2 bx c 0we are finding the zer
Kennesaw - MATH - 1111
Lecture NotesSection 3.2 Quadratic Equations, Functions, and Models 3x 2 x 5 p.244 quadratic function format where a not equal to zero (b or c can be 0)f x ax 2 bx c Solving a quadratic equation p.244 standard form ax 2 bx c 0we are find
Kennesaw - MATH - 1111
Lecture NotesSection 3.3 Analyzing Graphs of Quadratic Equations f x x22 x32p.262 graphs at top Graph shape is a parabola and has been transformed from basic shape f x x 2 (p.203) First graph fx 2x 2 12x 16which is the same as2shift
Kennesaw - MATH - 1111
Lecture NotesSection 3.4 Solving rational and radical equations page 276, Solving Rational equations Clear fraction(s) by finding LCD and multiplying both sides (and each fraction) by the LCD (all of the unique factors from each fraction). NOT the s
Kennesaw - MATH - 1111
Lecture NotesSection 3.5 Solving absolute value equations |4| |x| 4or x 5 or x 55 |5| 5 | 5| 5Solving Absolute Value Equations p.287,#21 |x |x |x 1|3 6 1| 3 1| 3 x 13orx 4x 1 3 x -2| 2 1|3 6|41|3 6|x1| 3isolate term wit
Kennesaw - MATH - 1111
Lecture NotesSection 4.2 Graphing Polynomial Functions p.313, Graphing (sketching) polynomial functions degree (highest exponent) of polynomial n number of zeros number of x-intercepts n-1 number of turning points p.315, steps in sketching (or cho
Kennesaw - MATH - 1111
Lecture NotesSection 4.3 Finding Zeros-Factoring Polynomials Means to Solve for x when function is higher than degree 2 (quadratics) Polynomial Division: The remainder and factor theorem If we divide a given polynomial by a binomial and get remainde
Kennesaw - MATH - 1111
Lecture NotesSection 4.3 Finding Zeros-Factoring Polynomials Means to Solve for x when function is higher than degree 2 (quadratics) Polynomial Division: The remainder and factor theorem If we divide a given polynomial by a binomial and get remainde
Kennesaw - MATH - 1111
Lecture NotesSection 5.2 Exponential Functions and Graphs p.394, Graphing Exponential Functions,54351 0x1 the standard form of an exponential function is f x fxx 4The base must be positive ( 0) and notA xwhere A is called the base and the
Kennesaw - MATH - 1111
Lecture NotesSection 5.4 Properties of Logarithmic Functions Product Rule, Quotient Rule, Power Rule, p.426 Objective is to consolidate multiple log statements into one or to split one log statement into multiples. Operations are only valid if the l
Kennesaw - MATH - 1111
Lecture NotesSection 5.4 Properties of Logarithmic Functions Product Rule, Quotient Rule, Power Rule, p.426 Objective is to consolidate multiple log statements into one or to split one log statement into multiples. Operations are only valid if the l
Kennesaw - MATH - 1111
Lecture NotesSection 5.5 Solving Exponential and Logarithmic Equations p.435, SolvingExponential EquationsBaseExponent Property p.435 If the bases are the same, then exponent exponent Example 1, p.43632 2 3x 7 2 52 3x73x753x 12 x4an
Kennesaw - MATH - 1111
Lecture NotesSection R.3 p.18, Polynomials (algebraic expressions) Definitions 12x 0 12 1 12Term an element separated by a or - within a polynomial Within a term we can have coefficients, variables and exponents Coefficient leading numeric p
Kennesaw - MATH - 1111
Lecture NotesSection R.4 Factoringthe reverse of multiplication What are factors? Things that are multiplied together. 2x 3x 6x 2 2x and 3x are factors also 2 and 3 and x are factors Basic Factoring Strategy 1) Always look for common factors (factor
Kennesaw - MATH - 1111
Lecture Notes Section R.5fx f3 3x 7 3 3 7 235 solve . for the variable 4x 3 3 5 3 4x 8 4x 8 dividing by 4 is the same as multiplying by 4 44x x21 4The Basics of Equation Solving p.32 linear equation f x ax b is the format of a line
Kennesaw - MATH - 1111
Lecture NotesSection R.7 Radical Notation and Rational Exponents p.46, terminologyindexRadicand4382222x25radical the symbol radicand the expression under the radical index the number n &quot;A number C is said to be a square root of A
Kennesaw - MATH - 1111
Lecture NotesSection R.7 Radical Notation and Rational Exponents p.46, terminologyindex 3 3Radicand4 222228 82 222 2 2 2x2 5radical the symbol radicand the expression under the radical index the number n &quot;A number C is said t
Iowa State - BCB - 544
msngtdqaqp ppenpatpvd sksrkratpg ddnwlppdwr teirvrtsgt kagtvdkfyyepitgrkfrs knevlyyleh gtpkkksvkt aengdshseh segrgsarrq tksnkkvtepppkplnfdfl nvpekvtwtg ingseeawlp figdykiqes vsqdwdrvft lvtsqnagktmf
Kennesaw - MATH - 1111
BBEPMC01_0312279093.QXP12/2/042:18 PMPage 103Section 1. 4Equations of Lines and Modeling1031.4Equations of Lines and ModelingFind the slope and the y-intercept of a line given the equation y mx b, or f x mx b. Graph a linear equati
Kennesaw - MATH - 1111
BBEPMC02_0312279093.QXP12/2/0411:39 AMPage 203Section 2.3Quadratic Equations, Functions, and Models2032.3Quadratic Equations, Functions, and ModelsFind zeros of quadratic functions and solve quadratic equations by using the princip
Kennesaw - MATH - 1111
BBEPMC02_0312279093.QXP12/2/0411:39 AMPage 220220Chapter 2Functions, Equations, and Inequalities2.4Analyzing Graphs of Quadratic FunctionsFind the vertex, the axis of symmetry, and the maximum or minimum value of a quadratic functi
Kennesaw - MATH - 1111
BBEPMC04_0312279093.QXP12/2/0411:50 AMPage 391Section 4 . 4Properties of Logarithmic Functions3914.4Properties of Logarithmic FunctionsConvert from logarithms of products, powers, and quotients to expressions in terms of individual
Iowa State - BCB - 544
BCB 444/544 Fall 06 Nov2Lab 9BCB 444/544 Lab 9/Seminar Feedback FormName _Important: To receive credit for Seminar attendance, you must submit this form to Drena, Michael, Jeff or Pete immediately after the seminar. If you don't see one of us
UCLA - POL SCI - 200
HW3: Models for Dichotomous VariablesPolitical Science 200D Winter 20081Dichotomous DataThe dataset votedata includes the voter registration files for five thousand voters from Fulton County, Georgia. The variables included in this dataset are
UCLA - POL SCI - 200
HW 5 or 6: Generalized Additive ModelsPolitical Science 200D Winter 2008In the dataset you plan to use for your final paper, run an exploratory model with a spline (or LOESS) of some independent variable. If you feel you already understand the func
Michigan State University - CSE - 470
Configuration Management and RCSCPS470 Fall 1999Configuration Management Managing a large development system is a difficult task, any tool that makes the job easier is welcome. Software CM is a discipline for controlling the evolution of softwar
Michigan State University - CSE - 470
%!PS-Adobe-2.0 %Creator: dvipsk 5.58f Copyright 1986, 1994 Radical Eye Software %Pages: 5 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %DocumentPaperSizes: Letter %EndComments %DVIPSCommandLine: dvips -f %DVIPSParameters: dpi=600, comments removed %D
Michigan State University - CSE - 470
Database Access through JavaCSE470 Software EngineeringFall 20001DBMS Overview A Database Management System (DBMS) is a system that provides a convenient and efficient way to store and retrieve data and manages issues like security, concurre
Michigan State University - CSE - 470
Lab 9 Notes:0. Test sample java code (done)1. Check date of installation of sparty statue (done)2. Change double quotes to single quotes in java-sql egs on ppt (done)3. Check syntax for obtaining year(date) in SQL (datepart - done)4. Add in
Michigan State University - CSE - 470
Java Abstract Windowing Toolkit java.awt: A java package that contains the classes and interfaces required for developing GUI interfaces in java Enhancement in Java 2: The Java Swing components available in javax.swing packageGUI Component Hierar
Michigan State University - CSE - 470
Introduction to MakeUpdated by Chirantana Sriram Fall 2000What Is Make ? Utility for maintaining up-to-date versions of programs When changes are made to the original source code, it will rebuild executables by determining which program modules
University of Louisiana at Lafayette - IXJ - 0704
Syllabus for CMPS 150: Introduction to Computer Science Section 1,2,3,4: Spring 2009Prerequisite: MATH 109 or (MATH 201 or MATH 250), with a grade of C or better Co-requisite: MATH 110 (CMPS majors)Instructor: Lecture Location: Lecture Meets:Lab
N. Illinois - ISHS - 1989
Mines - PHGN - 200
NAME:PHGN200: Introduction to Electromagnetism and Optics Exam II1. (30) One of the more important commercial applications of electrical forces is the cathode ray tube (CRT). It is the heart of the television. The CRT consists of three main compo
Columbia - DS - 356
WITHIN You and ABOUT You: Getting Started with interMedia TextCarol Brennan, Comedy Central Douglas Scherer, Core ParadigmTopics to be DiscussedOverview of interMedia Text Using interMedia TextCreate and load database tables Create interMedia Te
Berkeley - EE - 105
Discussion Notes Week 5Recall some key equations IC = IS (1+ =&gt; VBE = VT ln . IS =IC = IB IC = IE . = IB = IS IS ro=IE = IC + IB . I E = gm = r =Bipolar Amplifiers Amplifier is a device that produces an output(voltage or current) th
UC Davis - ESP - 162
ESP 162 (Winter 2009) Arsenic in Drinking Water Reading guide _Name:_1. Explain how arsenic typically ends up in drinking water. Why do we care about trying to control arsenic levels in drinking water (be specific)? 2. Costbenefit anal
Allan Hancock College - LING - 342
Department of LinguisticsLING342 Lecture 2 Developing Control of GenreLING342: Lecture 2No 1Literacy development in primary schoolDifferences between spoken and written language Distance between speaker and listener vs reader and writer Neces
Allan Hancock College - LING - 342
LING342 Lecture 3 GenreLING342 L3 GenreNo 1What is Genre?. the study of situated linguistic behaviour in institutionalised academic or professional settingsBhatia V K 2002. a staged, goal-oriented social process. Participants interact using
Allan Hancock College - LING - 342
Department of LinguisticsLING342 Lecture 5 Theme, abstraction and conjunctionLING342 Lecture 5No 1Conjunctive relationships Explicit and implicit conjunction Explicit conjunction is realised lexically Implicit conjunction is realised in the
Allan Hancock College - LING - 342
Department of LinguisticsLING342 Lecture 9 Materials Development in LST: Task based approachesLING342 Lecture 9No 1Materials selection: Using textbooks and pre-published materials Textbooks and pre-published materials (negative): reduce the
Allan Hancock College - LING - 342
Department of LinguisticsLING342: Language of Science and TechnologyJean BrickLING342: Lecture 1No 1Course Objectives A theoretical and practical understanding of the features of the language of science and mathematics (with particular emph
E. Michigan - EDMT - 330
Using the Pythagorean TheoremKevin McCrumb Overview:The Pythagorean theorem is one of the most fundamental formulas that are used in the study of ge and algebra. It is used to calculate side lengths in right triangles such as the one shown below.
Maryland - ENEE - 426
Wireless LAN SecurityWEP: Overview WEP = Wired Equivalency Protocol RC4 stream cipher Purposes: Authentication Packet Encryption Uses single key to authenticate all network users and encrypt all packetsENEE 426 | Communication Networks | S
Maryland - ENEE - 426
Name _ENEE 426 Final Exam, Spring 2008 Thursday, May 8Multiple Choice (2 points each) Circle the letter of the response that best answers the question. 1. Which of the following is used to connect together different L2 networks? a. Bridge b. Hub c
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Tue Jan 29 14:03:54 2002 %Pages: 5 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: Te
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Wed Feb 6 10:16:44 2002 %Pages: 3 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: TeX
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Wed Feb 13 10:19:21 2002 %Pages: 4 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: Te
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Wed Feb 13 12:30:21 2002 %Pages: 5 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: Te
Iowa State - CS - 612
COMS 612 Parallel and Distributed Algorithms Lecture 14: Wednesday February 25 Instructor: Soma ChaudhuriSpring Semester 1998Scribe: Murari Sridharan7.4.2 The Lower Bound ResultWe now prove a few lemmas on the way to proving our main result. T
Iowa State - CS - 612
COM S 612x Parallel and Distributed Algorithms Lecture 20: Wednesday, March 11 Instructor: Soma ChaudhuriSpring Semester 1996Scribe: Hao Wang8.7 Proving Tight Lower Bounds for Measures of ComplexityWe previously saw an algorithm A that impleme
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Wed Apr 1 10:30:30 1998 %Pages: 4 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: TeX
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Thu Apr 16 09:40:10 1998 %Pages: 4 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: Te
Iowa State - CS - 612
COMS 612 Parallel and Distributed Algorithms Lecture 27: Friday, April 3 Instructor: Soma ChaudhuriSpring Semester 1998Scribe: Yifeng ChenWe now prove our main lemma, which states that given a bivalent con guration, we can either extend it to a
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Tue Apr 21 14:23:05 1998 %Pages: 5 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: Te
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Wed Apr 29 12:17:23 1998 %Pages: 4 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: Te
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Mon May 4 11:21:38 1998 %Pages: 2 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: TeX
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: main.dvi %CreationDate: Mon May 4 17:08:11 1998 %Pages: 7 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips main %DVIPSSource: TeX
Iowa State - CS - 612
%!PS-Adobe-2.0 %Creator: dvips 5.519 Copyright 1986, 1993 Radical Eye Software %Title: hw02.dvi %CreationDate: Wed Jan 19 14:14:46 2000 %Pages: 1 %PageOrder: Ascend %BoundingBox: 0 0 612 792 %EndComments %DVIPSCommandLine: dvips hw02 %DVIPSSource: Te