420 Words2 Pages

Chase Williams
Ms. Haramis
Task 1 Q&A
Complete the following exercises by applying polynomial identities to complex numbers.
1. Factor x2 + 64. Check your work.
2. Factor 16x2 + 49. Check your work.
3. Find the product of (x + 9i)2.
4. Find the product of (x − 2i)2.
5. Find the product of (x + (3+5i))2.
Answers
1. x^2 +64=
Answer: (x+8i)(x-8i)
2. 16x^2+49=
Answer: (4x+7i)(4x-7i)
3. (x+9i)^2= (x+9i)(x+9i= x^2+9ix+9ix+81i^2=x^2+18ix+(-81)=
Answer: x^2+18ix-81
4. (x-2i)^2=(x-2i)(x-2i)=x^2-2ix-2ix+4i^2=x^2-4ix+(-4)=
Answer: x^2-4ix-4
5. (x+(3+5i))^2=(x+(3+5i)(x+(3+5i)
X^2+3x+5ix+3x+9+15i+5ix+15i+25i^2=x^2+6x+10ix+30i+25i^2+9=
Answer: X^2+6x+10ix+30i-25+9= x^2+6x+10ix+30i-16
Task 2 Q&A
Expand the following using the Binomial Theorem and*…show more content…*

(x + 2)6 2. (x − 4)4 3. (2x + 3)5 4. (2x − 3y)4 5. In the expansion of (3a + 4b)8, which of the following are possible variable terms? Explain your reasoning. a2b3; a5b3; ab8; b8; a4b4; a8; ab7; a6b5 Answers 1. (x +*…show more content…*

(2x − 3y)^4=16x^4-96x^3y+216x^2y^2-216xy3+81y^4 5. The possible variable terms would have to be a2b3; a5b3; ab8; b8; a4b4; a8; ab7; a6b5 because the exponents of each one of the terms all add up to 8. Task 3 Q&A Using the Fundamental Theorem of Algebra, complete the following: 1. Determine how many, what type, and find the roots for f(x) = x4 + 21x2 − 100. 2. Determine how many, what type, and find the roots for f(x) = x3 − 5x2 − 25x + 125. 3. The following graph shows a seventh-degree polynomial: graph of a polynomial that touches the x axis at negative 5, crosses the x axis at negative 1, crosses the y axis at negative 2, crosses the x axis at 4, and crosses the x axis at 7. Part 1: List the polynomial’s zeroes with possible multiplicities. Part 2: Write a possible factored form of the seventh degree function. 4. Without plotting any points other than intercepts, draw a possible graph of the following polynomial: f(x) = (x + 8)3(x + 6)2(x + 2)(x − 1)3(x − 3)4(x − 6). Answers 1. There will be 4 roots total, Two real and two complex, and the roots are x=-2, x=2, x=5i, x=-5i 2. There will be 3 roots total, two real, and the roots are x=5 with a multiplicity of 2, and

(x + 2)6 2. (x − 4)4 3. (2x + 3)5 4. (2x − 3y)4 5. In the expansion of (3a + 4b)8, which of the following are possible variable terms? Explain your reasoning. a2b3; a5b3; ab8; b8; a4b4; a8; ab7; a6b5 Answers 1. (x +

(2x − 3y)^4=16x^4-96x^3y+216x^2y^2-216xy3+81y^4 5. The possible variable terms would have to be a2b3; a5b3; ab8; b8; a4b4; a8; ab7; a6b5 because the exponents of each one of the terms all add up to 8. Task 3 Q&A Using the Fundamental Theorem of Algebra, complete the following: 1. Determine how many, what type, and find the roots for f(x) = x4 + 21x2 − 100. 2. Determine how many, what type, and find the roots for f(x) = x3 − 5x2 − 25x + 125. 3. The following graph shows a seventh-degree polynomial: graph of a polynomial that touches the x axis at negative 5, crosses the x axis at negative 1, crosses the y axis at negative 2, crosses the x axis at 4, and crosses the x axis at 7. Part 1: List the polynomial’s zeroes with possible multiplicities. Part 2: Write a possible factored form of the seventh degree function. 4. Without plotting any points other than intercepts, draw a possible graph of the following polynomial: f(x) = (x + 8)3(x + 6)2(x + 2)(x − 1)3(x − 3)4(x − 6). Answers 1. There will be 4 roots total, Two real and two complex, and the roots are x=-2, x=2, x=5i, x=-5i 2. There will be 3 roots total, two real, and the roots are x=5 with a multiplicity of 2, and

Related

## Mqs61qj Project 6

931 Words | 4 PagesSquare SGRE has perimeter 24. Points H and N lie on SE and SG respectively, such that SH = SN. Segment XA is the reflection of HN in EG. The exact value of the perimeter of HEXAGN can be expressed as a – b*sqrt(c) where a, b, and c are positive integers. Find the values of a, b, and c. In order to find the length of each side of square SGRE, I divided the perimeter 24 by 4 because a square always has 4 sides.

## Pt1420 Unit 6

693 Words | 3 PagesThe eight most commonly utilized graphs are linear, power, quadratic, polynomial, rational exponential, logarithmic, and sinusoidal. Domain and Natural Domain: Each function has a domain, the arrangement of (input) values over which it is characterized. In the event that I don 't state what the domain is, by tradition we take the domain to be all (real) numbers for which the expression characterizing the function can be evaluated. We call this the "natural domain" of the function. Piecewise Function: A function that acts differently in view of the input value, a function made up of pieces or a function which is characterized by multiple sub functions, every sub function is for sure interim of the primary function are called piece wise function.

## Wgu Statistics Assignment 7

1320 Words | 6 PagesPlease refer to Statistics assignment seven to see the SPSS output for the Chi-Square tables. Step 5: Degrees of freedom The degrees of freedom (df) for a Chi-Square for independence is calculated as the number of rows subtracted by one multiplied by the number of columns subtracted by one (Salkind, 2013). From the SSPS output in assignment seven outline there are two rows and 4 columns. df = (Rows-1) (Coloums-1) df= (2-1)(4-1) df= (1)(3) df= 3 Therefore, the degree of freedom (df) is 3. Step 6: Critical

## Reflection On Trigonometry

1035 Words | 5 PagesFinally, the cotangent graph. This graph has a period of π, no amplitude, the x-intercepts are odd π/2, the vertical asymptote equal multiples of π, the domain equals all real numbers except the multiples of π, and the range is from (-infinity, + infinity) I learned how to set up a graph. I also learned how to take an equation on a blank graph. This section also taught me how a graph

## Nt1330 Unit 1 Program Analysis

1580 Words | 7 PagesFor each distinct pair of the scaled mean vector c and the network size N, the program produces an adjacency matrix of a loop-free digraph (with all diagonal entries 0). To construct the matrix A, the program constructs four matrices A_ij of size Ni by Nj. The elements of these matrices A_ij are either 0 or 1. To assign a value to the element a_ij in the matrix A_ij, the program randomly generates a number from the standard uniform distribution on the open interval (0; 1) and if the number is less than Cij Nj then the element a_ij of the matrix A_ij will take value 1, otherwise the element will be 0. For matrices A_ij with i = j, the diagonal elements are made zero by replacing diagonal elements by zero.

## Pt1420 Unit 6 Case Study

856 Words | 4 PagesApplication: 1. Find the area under the standard normal curve between z = 0 and z = 1.65. Answer: The value 1.65 may be written as 1.6 to .05, and by locating 1.6 under the column labeled z in the standard normal distribution table (Appendix 2) and then moving to the right of 1.6 until you come under the .05 column, you find the area .450 . This area is expressed as 2. Find the area under the standard normal curve between z = -1.65 and z = 0.

## Nt1110 Unit 1 Essay

1177 Words | 5 PagesHomework 5 Chapter 5 Question P4. a.) Answer. Lets represent the decimal numbers into the binary first 1 = 0001 2 = 0010 3 = 0011 4 = 0100 5 = 0101 6 = 0110 7 = 0111 8 = 1000 9 = 1001 10 = 1010 Lets take 16 bits and calculate the check sum So we have, Checksum = 1’s complement of (0000000100000010 + 0000001100000100 + 0000010100000110 + 0000011100001000 + 0000100100001010) Checksum = 1’s complement of (00011001 00011110) Checksum = 11100110 11100001 b.) Answer.

## Nt1310 Unit 3 Flow Analysis

1427 Words | 6 PagesThe hash table can support 32 different flows with each flow occupying 16 entries in the hash table. Cyclic redundancy code (CRC) is used as the hashing function. The pseudo code to form the hash indices is shown below //Pad the 248 bit header to form 256 bit data Data = {8’d0,flow_hdr} //Reverse the bits in data Data_Rev = bit_reverse(Data) //Consider last 5 bits to identify a flow between 0 and 31 //Polynomial for Hash0 = 0x04C11DB7 Hash0 = CRC32_FUNC_0(Data_Rev)%5; //Polynomial for Hash1 = 0x1EDC6F41 Hash1 = CRC32_FUNC_1(Data_Rev)%5; The exact match block reads the flow header present in the address hash0 × 16 and hash1 × 16 (multiplied with 16, as each flow is 16 deep). This flow

## Pt1420 Unit 6 Algorithm Report

150 Words | 1 PagesOtherwise, C generates a random coin d_i={0,1} so that Pr[d_i=0]=1/(q_T+1), then C selects a random element γ_i∈Z_q, if d_i=0, C computes h_i=g^(γ_i ), otherwise, C computes h_i=g^x, C adds the tuple to H-list, and responds to A with H(W_i) = h_i. When A requests an encryption of conjunctive keyword W, algorithm C calls the above algorithm for responding to H-queries to obtain an h_i∈G_1. Then he searches the

## Cholesterol Case Study

1696 Words | 7 Pages(II) Statistical Inferences and Graphical representation of data: Normality Plot: Step 1 Arrange the data in ascending order. Step 2 Compute f_i=(i-0.375)/(n+0.25),* where i is the index and n is the number of observations. The expected proportion of observations less than or equal to the ith data value is fi . Step 3 Find the z-score corresponding to fi from Table V. Step 4 Plot the observed values on the horizontal axis and the corresponding expected z-scores on the vertical

## Nt1310 Unit 4 Test Lab Report

462 Words | 2 PagesIn CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. Error correction code (ECC) techniques have been widely used to correct transient errors and improve the reliability of memories.here we were tried for FFT. Figure 7:synthesis diagram of SOS based ECC for FFT. The figure 7 is desinged by using verilog language with xilinix synthesis tool.for this design we had to use 4 to 8 bit Fault FFT with ECC Concept.The ECC codes utilize the less area than previous module. Figure 8: simulations result of Effieint ECC for parallel FFT The figure 8 shows the simulations result of the SOS based ECC for parallel FFT,which is checked by the random test bench code in xilinix tool.here we have to reduce almost best case redundancy minimizations.the wave form is indicate the flag register for intimate the Error if happened.in the soft error

## Pt2520 Unit 1 Problem Analysis Paper

320 Words | 2 Pages1) Read all the input images and load the images into the database. I=imread(name of the image) imshow(I) set the position of image set(gcf,"position",[1,1,500,500]) Only the position and directions of these features are stored. 2) Enhancement of the features The enhancement of the image depends upon the quality of the input image to ensure the identification and verification system. In our algorithm, we have already taken a good quality of image. 3) Binarize To binarize the image the ridges are denotted by black and furrow are denotted by the white.

## Nt1310 Unit 3 Research Paper 1

279 Words | 2 PagesOur protocol takes two integers decomposed into encrypted bit vectors [a][b] and outputs the greater integer. In this configuration cloud 1 (C1) has the encrypted bit vectors of the integers being compared and cloud 2 (C2) knows the private key. The protocol is as follows in a very concise form. we can say with firm conviction that vector [Y] consist of encrypted zeros at every location except one location which holds the value of encrypted one. This distinct location identifies the first position where vector [a] and [b] differ.

### Mqs61qj Project 6

931 Words | 4 Pages### Pt1420 Unit 6

693 Words | 3 Pages### Wgu Statistics Assignment 7

1320 Words | 6 Pages### Reflection On Trigonometry

1035 Words | 5 Pages### Nt1330 Unit 1 Program Analysis

1580 Words | 7 Pages### Pt1420 Unit 6 Case Study

856 Words | 4 Pages### Nt1110 Unit 1 Essay

1177 Words | 5 Pages### Nt1310 Unit 3 Flow Analysis

1427 Words | 6 Pages### Pt1420 Unit 6 Algorithm Report

150 Words | 1 Pages### Cholesterol Case Study

1696 Words | 7 Pages### Nt1310 Unit 4 Test Lab Report

462 Words | 2 Pages### Pt2520 Unit 1 Problem Analysis Paper

320 Words | 2 Pages### Nt1310 Unit 3 Research Paper 1

279 Words | 2 Pages