Solved

Graph Function

Posted on 2016-09-05
6
60 Views
Last Modified: 2016-09-05
Can you please explain it in a different way?
q12.JPGq13.JPGscreenshot3.jpg
0
Comment
Question by:mustish1
  • 4
  • 2
6 Comments
 
LVL 32

Expert Comment

by:phoffric
ID: 41785354
Your approach is done in a straightforward conventional way. Looks good.
0
 

Author Comment

by:mustish1
ID: 41785365
Can you please explain the part 1 that how the values of x and y are plugged in
0
 
LVL 32

Expert Comment

by:phoffric
ID: 41785372
y = y(x) = 2^(-x) = 1/2^(x)
Using your sample values of x:

y(1) = 1/2^(1) = 1/2         ==> (1, 1/2)
y(0) = 1/2^(0) = 1/1 = 1   ==> (0,1)
y(-1) = 1/2^(-1) = 1/ (1/2) = 2 ==> (-1, 2)     // I see that you had (-1, 1/2) even though you had y=2
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 32

Expert Comment

by:phoffric
ID: 41785387
For part 2, you can graph the two curves, i.e., the quadratic and the straight lines, and then get an approximation of g(x).graph_2_curves.pnggraph_2_curves_zoom1.pngFrom the graphs, you can get a rough feel where the intersections of the two graphs are. Then you guess and compute g(x_guess). Then you increment and decrement x_guess by, say, 0.1, and see which g(x) is closer to -8. Now you have a new x_guess. and you modify x_guess by 0.5 in both directions to chose a new x_guess. Keep doing this until the new x_guess is the same as the previous one for the desired number of decimal places.
0
 
LVL 32

Accepted Solution

by:
phoffric earned 500 total points
ID: 41785394
To do the numerical approach more efficiently, you can use the newton raphson numerical method approach.
https://en.wikipedia.org/wiki/Newton%27s_method

But you have to come up with two initial guesses that will converge to the two solutions.
0
 

Author Closing Comment

by:mustish1
ID: 41785421
Thank You.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Article by: Nicole
This is a research brief on the potential colonization of humans on Mars.
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Saved searches can save you time by quickly referencing commonly searched terms on any topic. Whether you are looking for questions you can answer or hoping to learn about a specific issue, a saved search can help you get the most out of your time o…
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now