SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Section 6.1
Composite Functions
1. Form a Composition Function
Composite Function

The composite function, denoted by f  g
(read as “ composed with ) or g  f
(read as “ composed with ), is defined
by
     ( f  g )( x)  f ( g ( x))
                  or
     ( g  f )( x)  g ( f ( x))
Evaluating a Composite
         Function
Example 1: Evaluate the expression
using the values in the table.
      X      -1      0      1       2         3
              2      -1     -2     -1         2
              3      2      3       6         11



  a. ( f  g )(-1)  f (g (-1))  f (3)  2
1. Find the Composition
        Function
For the given functions and , find:
(a) ( f  g )(-1) (b) ( g  f )(0) (c) ( g  g )(1) (d ) ( f  f )(2)
                            1
 f ( x)  2 x  1   g ( x)  x  3
                            2
                                    1         
(a) ( f  g )(-1)  f ( g (-1))  f  (-1)  3 
                                    2         
                                   7        7
                               f -      2 -   1  -8
                                   2        2

 (b) ( g  f )(0)  g ( f (0))  g  2(0)  1

                                 g - 1  - 1  3  -
                                           1              7
                                           2              2
1        
(c) ( g  g )(1)  g ( g (1))  g  (1)  3 
                                  2        
                                      5 1 5          5        17
                                  g -    -   3  -  3  -
                                      2 2 2          4         4


(d ) ( f  f )(2)  f ( f (2))  f  2(2)  1
                                f  4  1
                                f 4  1
                                f 3  23  1  6  1  6  1  5

Weitere ähnliche Inhalte

Was ist angesagt?

Juj pahang 2014 add math spm k1 set 2 skema
Juj pahang 2014 add math spm k1 set 2 skemaJuj pahang 2014 add math spm k1 set 2 skema
Juj pahang 2014 add math spm k1 set 2 skemaCikgu Pejal
 
ロマンティックな9つの数 #ロマ数ボーイズ
ロマンティックな9つの数 #ロマ数ボーイズロマンティックな9つの数 #ロマ数ボーイズ
ロマンティックな9つの数 #ロマ数ボーイズJunpei Tsuji
 
Verifying Identities
Verifying IdentitiesVerifying Identities
Verifying Identitiesbwlomas
 

Was ist angesagt? (6)

End sem solution
End sem solutionEnd sem solution
End sem solution
 
Ans Hw Lesson 8
Ans Hw Lesson 8Ans Hw Lesson 8
Ans Hw Lesson 8
 
Juj pahang 2014 add math spm k1 set 2 skema
Juj pahang 2014 add math spm k1 set 2 skemaJuj pahang 2014 add math spm k1 set 2 skema
Juj pahang 2014 add math spm k1 set 2 skema
 
ロマンティックな9つの数 #ロマ数ボーイズ
ロマンティックな9つの数 #ロマ数ボーイズロマンティックな9つの数 #ロマ数ボーイズ
ロマンティックな9つの数 #ロマ数ボーイズ
 
Verifying Identities
Verifying IdentitiesVerifying Identities
Verifying Identities
 
F(x) terminology
F(x) terminologyF(x) terminology
F(x) terminology
 

Andere mochten auch

Philipp Karstaedt, General Manager, GREE
Philipp Karstaedt, General Manager, GREEPhilipp Karstaedt, General Manager, GREE
Philipp Karstaedt, General Manager, GREEWhite Nights Conference
 
Rajasthani Men & Their Turbans
Rajasthani Men & Their TurbansRajasthani Men & Their Turbans
Rajasthani Men & Their TurbansLa Vacanza Travel
 
Intoduction to dynamic memory allocation
Intoduction to dynamic memory allocationIntoduction to dynamic memory allocation
Intoduction to dynamic memory allocationUtsav276
 
Certificate CTI
Certificate CTICertificate CTI
Certificate CTILourens G
 
Watch live tennis j. tsonga vs g. muller
Watch live tennis j. tsonga vs g. mullerWatch live tennis j. tsonga vs g. muller
Watch live tennis j. tsonga vs g. mullerjoleballew100
 
Аквитания и Бордо
Аквитания и БордоАквитания и Бордо
Аквитания и БордоAlena Lysiakova
 
Developing Trends of Renewable Energy-small size
Developing Trends of Renewable Energy-small sizeDeveloping Trends of Renewable Energy-small size
Developing Trends of Renewable Energy-small sizeMaxwell Venture Service LLC
 
WebRTCでリアル店舗を作ってみる
WebRTCでリアル店舗を作ってみるWebRTCでリアル店舗を作ってみる
WebRTCでリアル店舗を作ってみるJunichi Okamura
 

Andere mochten auch (15)

Philipp Karstaedt, General Manager, GREE
Philipp Karstaedt, General Manager, GREEPhilipp Karstaedt, General Manager, GREE
Philipp Karstaedt, General Manager, GREE
 
Rajasthani Men & Their Turbans
Rajasthani Men & Their TurbansRajasthani Men & Their Turbans
Rajasthani Men & Their Turbans
 
Intoduction to dynamic memory allocation
Intoduction to dynamic memory allocationIntoduction to dynamic memory allocation
Intoduction to dynamic memory allocation
 
Thailand-Bangkok & Pattaya
Thailand-Bangkok & PattayaThailand-Bangkok & Pattaya
Thailand-Bangkok & Pattaya
 
Certificate CTI
Certificate CTICertificate CTI
Certificate CTI
 
Watch live tennis j. tsonga vs g. muller
Watch live tennis j. tsonga vs g. mullerWatch live tennis j. tsonga vs g. muller
Watch live tennis j. tsonga vs g. muller
 
Master of Public Affairs-Administration
Master of Public Affairs-AdministrationMaster of Public Affairs-Administration
Master of Public Affairs-Administration
 
Аквитания и Бордо
Аквитания и БордоАквитания и Бордо
Аквитания и Бордо
 
Arthur Shakalis, Odnoklassniki
Arthur Shakalis, OdnoklassnikiArthur Shakalis, Odnoklassniki
Arthur Shakalis, Odnoklassniki
 
20160312 jawsdays2
20160312 jawsdays220160312 jawsdays2
20160312 jawsdays2
 
Developing Trends of Renewable Energy-small size
Developing Trends of Renewable Energy-small sizeDeveloping Trends of Renewable Energy-small size
Developing Trends of Renewable Energy-small size
 
WebRTCでリアル店舗を作ってみる
WebRTCでリアル店舗を作ってみるWebRTCでリアル店舗を作ってみる
WebRTCでリアル店舗を作ってみる
 
Predicate & quantifier
Predicate & quantifierPredicate & quantifier
Predicate & quantifier
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Nylon 6
Nylon 6Nylon 6
Nylon 6
 

Ähnlich wie Ca8e Ppt 6 1

Pc12 sol c04_4-3
Pc12 sol c04_4-3Pc12 sol c04_4-3
Pc12 sol c04_4-3Garden City
 
Algebra 2 Unit 5 Lesson 5
Algebra 2 Unit 5 Lesson 5Algebra 2 Unit 5 Lesson 5
Algebra 2 Unit 5 Lesson 5Kate Nowak
 
Communication systems solution manual 5th edition
Communication systems solution manual 5th editionCommunication systems solution manual 5th edition
Communication systems solution manual 5th editionTayeen Ahmed
 
04 Geographic scripting in uDig - halfway between user and developer
04 Geographic scripting in uDig - halfway between user and developer04 Geographic scripting in uDig - halfway between user and developer
04 Geographic scripting in uDig - halfway between user and developerAndrea Antonello
 
The Pathology of Graph Databases
The Pathology of Graph DatabasesThe Pathology of Graph Databases
The Pathology of Graph DatabasesMarko Rodriguez
 
F4 c1 functions__new__1_
F4 c1 functions__new__1_F4 c1 functions__new__1_
F4 c1 functions__new__1_Shantipa
 
ฟังก์ชัน(function)
ฟังก์ชัน(function)ฟังก์ชัน(function)
ฟังก์ชัน(function)Yodhathai Reesrikom
 
Algebra 2 Section 5-2
Algebra 2 Section 5-2Algebra 2 Section 5-2
Algebra 2 Section 5-2Jimbo Lamb
 
Logarithms
LogarithmsLogarithms
Logarithmssupoteta
 
College algebra 7th edition by blitzer solution manual
College algebra 7th edition by blitzer solution manualCollege algebra 7th edition by blitzer solution manual
College algebra 7th edition by blitzer solution manualrochidavander
 

Ähnlich wie Ca8e Ppt 6 1 (20)

Pc12 sol c04_4-3
Pc12 sol c04_4-3Pc12 sol c04_4-3
Pc12 sol c04_4-3
 
Algebra 2 Unit 5 Lesson 5
Algebra 2 Unit 5 Lesson 5Algebra 2 Unit 5 Lesson 5
Algebra 2 Unit 5 Lesson 5
 
Communication systems solution manual 5th edition
Communication systems solution manual 5th editionCommunication systems solution manual 5th edition
Communication systems solution manual 5th edition
 
PM5006 Week 6
PM5006 Week 6PM5006 Week 6
PM5006 Week 6
 
Day 3a examples
Day 3a examplesDay 3a examples
Day 3a examples
 
ฟังก์ชัน 1
ฟังก์ชัน 1ฟังก์ชัน 1
ฟังก์ชัน 1
 
Lesson 51
Lesson 51Lesson 51
Lesson 51
 
1. functions
1. functions1. functions
1. functions
 
04 Geographic scripting in uDig - halfway between user and developer
04 Geographic scripting in uDig - halfway between user and developer04 Geographic scripting in uDig - halfway between user and developer
04 Geographic scripting in uDig - halfway between user and developer
 
定理3
定理3定理3
定理3
 
The Pathology of Graph Databases
The Pathology of Graph DatabasesThe Pathology of Graph Databases
The Pathology of Graph Databases
 
F4 c1 functions__new__1_
F4 c1 functions__new__1_F4 c1 functions__new__1_
F4 c1 functions__new__1_
 
ฟังก์ชัน(function)
ฟังก์ชัน(function)ฟังก์ชัน(function)
ฟังก์ชัน(function)
 
Modul 1 functions
Modul 1 functionsModul 1 functions
Modul 1 functions
 
______2
  ______2  ______2
______2
 
Pc 1.8 notes
Pc 1.8 notesPc 1.8 notes
Pc 1.8 notes
 
Algebra 2 Section 5-2
Algebra 2 Section 5-2Algebra 2 Section 5-2
Algebra 2 Section 5-2
 
XXL Graph Algorithms__HadoopSummit2010
XXL Graph Algorithms__HadoopSummit2010XXL Graph Algorithms__HadoopSummit2010
XXL Graph Algorithms__HadoopSummit2010
 
Logarithms
LogarithmsLogarithms
Logarithms
 
College algebra 7th edition by blitzer solution manual
College algebra 7th edition by blitzer solution manualCollege algebra 7th edition by blitzer solution manual
College algebra 7th edition by blitzer solution manual
 

Mehr von San Benito CISD

Mehr von San Benito CISD (6)

The nature of probability and statistics
The nature of probability and statisticsThe nature of probability and statistics
The nature of probability and statistics
 
Ch8 ppt
Ch8 pptCh8 ppt
Ch8 ppt
 
The Normal Distribution
The Normal DistributionThe Normal Distribution
The Normal Distribution
 
Ca8e Ppt 5 6
Ca8e Ppt 5 6Ca8e Ppt 5 6
Ca8e Ppt 5 6
 
Ca8e Ppt 5 6
Ca8e Ppt 5 6Ca8e Ppt 5 6
Ca8e Ppt 5 6
 
Sca8e Ppt 5 5
Sca8e Ppt 5 5Sca8e Ppt 5 5
Sca8e Ppt 5 5
 

Kürzlich hochgeladen

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Ca8e Ppt 6 1

  • 2. 1. Form a Composition Function
  • 3. Composite Function The composite function, denoted by f  g (read as “ composed with ) or g  f (read as “ composed with ), is defined by ( f  g )( x)  f ( g ( x)) or ( g  f )( x)  g ( f ( x))
  • 4. Evaluating a Composite Function Example 1: Evaluate the expression using the values in the table. X -1 0 1 2 3 2 -1 -2 -1 2 3 2 3 6 11 a. ( f  g )(-1)  f (g (-1))  f (3)  2
  • 5. 1. Find the Composition Function
  • 6. For the given functions and , find: (a) ( f  g )(-1) (b) ( g  f )(0) (c) ( g  g )(1) (d ) ( f  f )(2) 1 f ( x)  2 x  1 g ( x)  x  3 2 1  (a) ( f  g )(-1)  f ( g (-1))  f  (-1)  3  2   7  7  f -   2 -   1  -8  2  2 (b) ( g  f )(0)  g ( f (0))  g  2(0)  1  g - 1  - 1  3  - 1 7 2 2
  • 7. 1  (c) ( g  g )(1)  g ( g (1))  g  (1)  3  2   5 1 5 5 17  g -    -   3  -  3  -  2 2 2 4 4 (d ) ( f  f )(2)  f ( f (2))  f  2(2)  1  f  4  1  f 4  1  f 3  23  1  6  1  6  1  5