SlideShare uma empresa Scribd logo
1 de 5
Maths Methods
Polynomial Functions



             K McMullen 2011
Polynomial Functions
P(x) is an expression containing only positive
whole numerical powers of x

The degree of a polynomial is given by the
highest power of the variable x

Division of polynomials is used to factorise
higher degree polynomials into linear factors
so that the number and values of the x-
intercepts can be determined to assist in
graphing


                                   K McMullen 2011
Polynomial Functions
When a polynomial P(x) is divided by a
divisor D(x), the results can be written as:
   P(x)D(x)=Qx+R(x)D(x)
   Q(x) is the quotient
   R(x) is the remainder




                                    K McMullen 2011
Polynomial Functions
The remainder theorem:
  When P(x) is divided by (x-a), the remainder is
  P(a)
  When P(x) is divided by (ax+b), the remainder
  is P(-b/a)

The factor theorem:
  When P(a)=0, then (x-a) is a factor of P(x)
  When P(-b/a)=0, then (ax+b) is a factor of P(x)
     Once a linear factor has been found using the
     factor theorem, other factors may be found
     using long division
                                       K McMullen 2011
Polynomial Functions
Resources:
  Worksheet 2: Division of polynomials
  Textbook: 1C, questions 1-11




                                   K McMullen 2011

Mais conteúdo relacionado

Semelhante a Methods2 polynomial functions

Semelhante a Methods2 polynomial functions (20)

Simbol matematika dasar
Simbol matematika dasarSimbol matematika dasar
Simbol matematika dasar
 
algebraic&transdential equations
algebraic&transdential equationsalgebraic&transdential equations
algebraic&transdential equations
 
Methods1 relations and functions
Methods1 relations and functionsMethods1 relations and functions
Methods1 relations and functions
 
linear transformation
linear transformationlinear transformation
linear transformation
 
eigen valuesandeigenvectors
eigen valuesandeigenvectorseigen valuesandeigenvectors
eigen valuesandeigenvectors
 
Types of functions2
Types of functions2Types of functions2
Types of functions2
 
Unit 1-solution oflinearsystems
Unit 1-solution oflinearsystemsUnit 1-solution oflinearsystems
Unit 1-solution oflinearsystems
 
Intro to Polynomials
Intro to PolynomialsIntro to Polynomials
Intro to Polynomials
 
Chapter 5 Polynomials
Chapter 5 PolynomialsChapter 5 Polynomials
Chapter 5 Polynomials
 
Probability function
Probability functionProbability function
Probability function
 
Probability function
Probability functionProbability function
Probability function
 
real andcomplexmatricesquadraticforms
real andcomplexmatricesquadraticformsreal andcomplexmatricesquadraticforms
real andcomplexmatricesquadraticforms
 
partial diffrentialequations
partial diffrentialequationspartial diffrentialequations
partial diffrentialequations
 
Interpolation
InterpolationInterpolation
Interpolation
 
interpolation
interpolationinterpolation
interpolation
 
Appendex b
Appendex bAppendex b
Appendex b
 
numerical differentiation&integration
numerical differentiation&integrationnumerical differentiation&integration
numerical differentiation&integration
 
radicals-110921142524-phpapp01 (1).pdf
radicals-110921142524-phpapp01 (1).pdfradicals-110921142524-phpapp01 (1).pdf
radicals-110921142524-phpapp01 (1).pdf
 
Logarithm
LogarithmLogarithm
Logarithm
 
Lecture 2 family of fcts
Lecture 2   family of fctsLecture 2   family of fcts
Lecture 2 family of fcts
 

Mais de kmcmullen

Further 9 similar triangles
Further 9  similar trianglesFurther 9  similar triangles
Further 9 similar triangles
kmcmullen
 
Methods8 trigonometric functions
Methods8  trigonometric functionsMethods8  trigonometric functions
Methods8 trigonometric functions
kmcmullen
 
Further8 data transformation
Further8  data transformationFurther8  data transformation
Further8 data transformation
kmcmullen
 
Methods7 exponential equations
Methods7  exponential equationsMethods7  exponential equations
Methods7 exponential equations
kmcmullen
 
Further7 regression analysis
Further7  regression analysisFurther7  regression analysis
Further7 regression analysis
kmcmullen
 
Methods6 modulus function
Methods6  modulus functionMethods6  modulus function
Methods6 modulus function
kmcmullen
 
Further6 displaying bivariate data
Further6  displaying bivariate dataFurther6  displaying bivariate data
Further6 displaying bivariate data
kmcmullen
 
Further5 normal distribution
Further5  normal distributionFurther5  normal distribution
Further5 normal distribution
kmcmullen
 
Methods5 transformations
Methods5  transformationsMethods5  transformations
Methods5 transformations
kmcmullen
 
Methods3 types of functions1
Methods3  types of functions1Methods3  types of functions1
Methods3 types of functions1
kmcmullen
 
Further4 box plots, 5 number summary and outliers
Further4  box plots, 5 number summary and outliersFurther4  box plots, 5 number summary and outliers
Further4 box plots, 5 number summary and outliers
kmcmullen
 
Further3 summarising univariate data
Further3  summarising univariate dataFurther3  summarising univariate data
Further3 summarising univariate data
kmcmullen
 
Further1 types of data
Further1  types of dataFurther1  types of data
Further1 types of data
kmcmullen
 
Further2 displaying univariate data
Further2  displaying univariate dataFurther2  displaying univariate data
Further2 displaying univariate data
kmcmullen
 

Mais de kmcmullen (15)

Further 9 similar triangles
Further 9  similar trianglesFurther 9  similar triangles
Further 9 similar triangles
 
Methods8 trigonometric functions
Methods8  trigonometric functionsMethods8  trigonometric functions
Methods8 trigonometric functions
 
Further8 data transformation
Further8  data transformationFurther8  data transformation
Further8 data transformation
 
Methods7 exponential equations
Methods7  exponential equationsMethods7  exponential equations
Methods7 exponential equations
 
Further7 regression analysis
Further7  regression analysisFurther7  regression analysis
Further7 regression analysis
 
Methods6 modulus function
Methods6  modulus functionMethods6  modulus function
Methods6 modulus function
 
Further6 displaying bivariate data
Further6  displaying bivariate dataFurther6  displaying bivariate data
Further6 displaying bivariate data
 
Further5 normal distribution
Further5  normal distributionFurther5  normal distribution
Further5 normal distribution
 
Methods5 transformations
Methods5  transformationsMethods5  transformations
Methods5 transformations
 
Methods3 types of functions1
Methods3  types of functions1Methods3  types of functions1
Methods3 types of functions1
 
Further4 box plots, 5 number summary and outliers
Further4  box plots, 5 number summary and outliersFurther4  box plots, 5 number summary and outliers
Further4 box plots, 5 number summary and outliers
 
Further3 summarising univariate data
Further3  summarising univariate dataFurther3  summarising univariate data
Further3 summarising univariate data
 
Further1 types of data
Further1  types of dataFurther1  types of data
Further1 types of data
 
Further2 displaying univariate data
Further2  displaying univariate dataFurther2  displaying univariate data
Further2 displaying univariate data
 
Methods1 relations and functions
Methods1  relations and functionsMethods1  relations and functions
Methods1 relations and functions
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Último (20)

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Methods2 polynomial functions

  • 2. Polynomial Functions P(x) is an expression containing only positive whole numerical powers of x The degree of a polynomial is given by the highest power of the variable x Division of polynomials is used to factorise higher degree polynomials into linear factors so that the number and values of the x- intercepts can be determined to assist in graphing K McMullen 2011
  • 3. Polynomial Functions When a polynomial P(x) is divided by a divisor D(x), the results can be written as: P(x)D(x)=Qx+R(x)D(x) Q(x) is the quotient R(x) is the remainder K McMullen 2011
  • 4. Polynomial Functions The remainder theorem: When P(x) is divided by (x-a), the remainder is P(a) When P(x) is divided by (ax+b), the remainder is P(-b/a) The factor theorem: When P(a)=0, then (x-a) is a factor of P(x) When P(-b/a)=0, then (ax+b) is a factor of P(x) Once a linear factor has been found using the factor theorem, other factors may be found using long division K McMullen 2011
  • 5. Polynomial Functions Resources: Worksheet 2: Division of polynomials Textbook: 1C, questions 1-11 K McMullen 2011