Solved

Expressions and like terms

Posted on 2012-03-11
7
224 Views
Last Modified: 2012-03-13
Which expression is the same as 9n+ 3 after combining like terms? :
 
1. 10n^2 - n^2 - 3
2. 3n +7 - 4 + 3n
3. 18 - 15 + 4n + 5n
4. 7n^2 + 2n + 6 - 3
                                       Please help!
0
Comment
Question by:naseeam
  • 3
  • 2
  • 2
7 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 37707997
do you see like terms in any of those expressions?
can you combine anything in any of those expressions?
0
 

Author Comment

by:naseeam
ID: 37708009
7n^2 + 2n + 6 - 3 doesn't have any like terms
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 37708044
If 7n^2 + 2n + 6 - 3 doesn't have any like terms, it would make it hard to make it the same as  9n+ 3
Another way to tell if they are different would be if you can find any values of n for which the expressions evaluate differently.

(but can you combine anything in  + 6 - 3 ?)
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 32

Expert Comment

by:awking00
ID: 37711101
Wouldn't combining "like terms" be similar to?
2y + 5y = 7y
or 8 - 5 = 3
or x^2 * x^3 = x^5
0
 
LVL 84

Expert Comment

by:ozo
ID: 37711857
I might call the last combining like factors rather than combining like terms, but yes.
0
 

Author Closing Comment

by:naseeam
ID: 37712583
thanks!
0
 
LVL 32

Expert Comment

by:awking00
ID: 37714715
ozo,
I agree with your terminology, which is why I put "like terms" in quotes just to match the way the question was worded.

naseeam,
So what was your final answer?
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction On a scale of 1 to 10, how would you rate our Product? Many of us have answered that question time and time again. But only a few of us have had the pleasure of receiving a stack of the filled out surveys and being asked to do somethi…
Complex Numbers are funny things.  Many people have a basic understanding of them, some a more advanced.  The confusion usually arises when that pesky i (or j for Electrical Engineers) appears and understanding the meaning of a square root of a nega…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now