Preview

Math 133 Unit 2 Ip

Satisfactory Essays
Open Document
Open Document
312 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Math 133 Unit 2 Ip
Student Answer form Unit 2

1.
a. x-4x=-6

A) 1 B) -10 C) -6 X^2-10x-24=0 (X-4) (x+6) X-4=0 x=4 X+6=0 x+-6

b. x=7+4=5.5 x=7-4=1.5

x=-b±b2-4ac2a x= (-7) ± (-7)2-4(3) (20)2a x=7±64-802a x=7±-16 x=7+4/2=5.5 x=7-4/2=1.5

c. 10x^2+x-3=0

x=-b±b2-4ac2a x=-1± (1)2-4(10) (-3)2(10) x=1±1-12020 x=1±10 x=1+320 = 5 x=1-320= 10

2.
a. (-2.3, 0), (0, 6.3)

b. This is a maximum function.

This is a maximum function because it is at the peak of the parabola.

c. (2, 9)

d. x=2

3.
a. s= -16t^2+64t+25

b. 73 Feet

S= -16◦(1)^2+64◦(1)+25 S= -16+64+25 S=73 feet

c. 2 seconds

-b2a= -642(-16)= -64/-32=2 seconds

d. 89 feet

S= -16*(2)^2+64*(2)+25 S= 64+128+25= 89 feet

4.
a. x | y | -2 | 4 | -1 | 0 | 0 | -2 | 1 | -2 | 2 | 0 | 3 | 4 |

Y=x^2-x-2
X=-2 x= -1 x=0 x=1 Y=-2^2-(-2)-2 y= -1^2-(-1)-2 y= 0^2-0-2 y=1^2-1-2 Y=4+2-2 y= 1+1 -2 y= -2 y= 1-1-2 Y=6-2 y= 2-2 y= 0-2 Y=4 y=0 y= -2

X=2 x=3 Y=2^2-2-2 y=3^2-3-2 Y=4-2-2 y=9-3-2 Y=2-2

b. [pic]

c. x intercept is (2,0) y intercept is

You May Also Find These Documents Helpful

  • Good Essays

    1310 unit 4

    • 440 Words
    • 2 Pages

    Cable toner: A device for determining if the fundamental cable installation has been done properly.…

    • 440 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    130Lab Quiz 1

    • 247 Words
    • 2 Pages

    4. Why should loose hair, clothing and jewelry be restrained while you are performing an experiment?…

    • 247 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. Ipv4 is still being used because the address pool supports the continual demands and extends its usefulness. Also because Ipv4 and Ipv6 are not compatible.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Ip

    • 732 Words
    • 3 Pages

    1. What Internet business model would be appropriate for the company to follow in creating a Web site and why?…

    • 732 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Unit 3 Ip

    • 1241 Words
    • 5 Pages

    As being a Marketing manager looking for a job and getting ready for interviews takes a big challenge also with trying to find out what is the best parts of the business before you go for the interview. It is always good to find out about the business before you interview for the job, so you can have some questions in mind to what you want to ask and put out yourself some new marketing opportunities. In this further reading you will read about three different firms that a marketing manager is getting interviewed at and three marketing opportunities that are suggested for the firms. This will also talk about what is the best one of the three marketing opportunities for the firms, and why? What the risks are using this marketing opportunity, and the effect it will have on the firm.…

    • 1241 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IP1

    • 537 Words
    • 2 Pages

    The cd apache command is similar to the previous command, however, when this specific command is entered in the shell, it moves the user into the apache directory within the file system. You can determine which directory you are in by seeing ~/apache#. This shows that you are in the apache directory within the root or home directory.…

    • 537 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Unit 136

    • 1371 Words
    • 4 Pages

    (7) Explain how to achieve the balance of child initiated play and adult led activities.…

    • 1371 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cis333 Assignment 1

    • 987 Words
    • 4 Pages

    As we know, video games have been around for many years, beginning with the simpler DOS based games to the more advanced internet role playing games. As technology has progressed, so have the security risks that come with online gaming. If we look at the number of households in America which play video games, we see the increased risk of information security.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Short for Internet Protocol address, an IP address is an address of a computer or other network device on a…

    • 2629 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Ip - Subnet

    • 399 Words
    • 2 Pages

    IP mask numbers are used to divide internet addresses into blocks called subnets. The mask number represents the number of 1s in the binary of the address that is 'masked" against the address so that it ignores the last bits which are for the group of IP addresses in the masked address.…

    • 399 Words
    • 2 Pages
    Good Essays

Related Topics