1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
10

Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (

2, ∞)
Computers and Technology
2 answers:
Vaselesa [24]3 years ago
6 0

Answer:

The interval over which the graph is decreasing is;

(-∞, -3)

Explanation:

The given function is f(x) = 2·(x + 3)² + 2

By expanding the function, we have;

2·x² + 12·x + 20

From the characteristics of a quadratic equation, we have;

The shape of a quadratic equation = A parabola

The coefficient of x² = +2 (positive), therefore the parabola opens up

The parabola has a minimum point

Points to the left of the minimum point are decreasing

The minimum point is obtained as the x-coordinate value when f'(x) = 0

∴ f'(x) = d(2·x² + 12·x + 20)/dx = 4·x + 12

At the minimum point,  f'(x) = 4·x + 12 = 0

∴ x = -12/4 = -3

Therefore;

The graph is decreasing over the interval from -infinity (-∞) to -3 which is (-∞, -3)

Please find attached the graph of the function created with Microsoft Excel

The graph is decreasing over the interval (-∞, -3).

Annette [7]3 years ago
4 0

Answer:

A. (–∞, –3)

Explanation:

Edge 2021 ( if feel still think it's wrong, check the picture ⬇️  )

You might be interested in
The ______ cloud service model provides virtual environments online that can be tailored to the needs of developers
Ratling [72]
Internet cloud service that could be accessed by other devices with a certain password
3 0
3 years ago
Which version of Windows was considered an operating environment rather than an operating system?
maksim [4K]
The answer is A. Windows 1.O
4 0
3 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Suppose that instead of swapping element A[i] with a random element from the subarray A[i..n], we swapped it with a random eleme
Anastaziya [24]

Answer:

The answer to this question can be defined as follows:

Explanation:

Its Permute-with-all method, which doesn't result in a consistent randomized permutation. It takes into account this same permutation, which occurs while n=3. There's many 3 of each other, when the random calls, with each one of three different values returned and so, the value is=  27. Allow-with-all trying to call possible outcomes as of 3! = 6  

Permutations, when a random initial permutation has been made, there will now be any possible combination 1/6 times, that is an integer number m times, where each permutation will have to occur m/27= 1/6. this condition is not fulfilled by the Integer m.

Yes, if you've got the permutation of < 1,2,3 > as well as how to find out design, in which often get the following with permute-with-all  chances, which can be defined as follows:

\bold{PERMUTATION \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \                           PROBABILITY}

\bold{  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \  \ \ \  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27= 0.14 }\\\bold{ \ \ \ \ \ \ \ \ \ \ \ \ \ \  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\

\bold{            \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \  \ \ \ \ \  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \               5/27=0.18}\\\bold{\ \ \ \ \  \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \                       5/27=0.18}

\bold{    \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \                                                  4/27=0.14}

Although these ADD to 1 none are equal to 1/6.

7 0
3 years ago
In case of an emergency, once you or someone already on the scene has contacted 9-1-1, the next thing to do is: A) Move them to
velikii [3]

if alone, you would give care first for which situation

4 0
3 years ago
Read 2 more answers
Other questions:
  • In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
    7·1 answer
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
    9·1 answer
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • The idea that innovations in transportation and communication technologies has changed the way we think about distance and time
    9·1 answer
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • How can a cell phone tower help people​
    11·2 answers
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!