Reference no: EM13899499
1. Determine the following antiderivatives (don't worry about simplifying, just show the rules)
a. ∫(x200+√x-e2Πx)dx
b. ∫x(4x2- 3)47dx
c. ∫(3/x+5/x4-8)dx
2. Calculate the value of each definite integral (Show work!):
a. 01∫(x2/2x3+9)dx
b. 24∫x2(6x3+3)dx
c. 2∞∫3/x4dx
3. a. Approximate the area under the curve f(x)=1/√x and above the x-axis by splitting the region from x= 1 to x= 9 into 4 equal subintervals (rectangles) and using the midpoints of the subintervals as the heights.
b. Use the Simpson's Rule with n=4 to estimate area under the curve f(x)=1/√x
c. Find the exact value of 19∫1/√xdx , and compare with the answer obtained from part (a), and (b). Which method is more accurate, part A or part B?
4. Determine the area between the curves f(x)= x2-2 and g(x)=x
5. Use geometry to determine the value of the following definite integral: -33∫√9-x2dx
6. A stock analyst plots the price per share of a certain stock as a function of time and finds that it can be modeled by the function S(t)=25-5√10t where t is the time (in years) since the stock was purchased. Find the average price of the stock over the first 2 years of its purchase.
7. Use the consumer's surplus formula 0qo∫[D(q)-p0]dq to determine the consumer's surplus for the demand equation D(q)=1400-50q if we assume supply and demand are in equilibrium when q=15.
8. Sketch the region and then calculate the volume of the solid of revolution formed by rotating the region bounded by f(x)=x2+3 , y=0 ,x=1 and x=5 around the x-axis.
9. The function f(x)=240 represents the rate of flow of money in dollars per year. Assume a 8-year period for t and a rate r of 10% compounded continuously and determine the following:
a. The present value (P= 0t∫f(x)e-rxdx)
b. The accumulated amount (A= ert 0t∫f(x)e-rxdx)
Analyze common ethernet standards found in a switched lan
: Analyze common Ethernet standards found in a switched LAN fabric. ? Summarize the nature of Ethernet frames that are processed in LAN switching.
|
Cases that compare specification limits to control limits
: What do control limits represent? What do specification limits represent? Describe the three cases that compare specification limits to control limits
|
Enter the last names of five candidates
: Write a program that allows users to enter the last names of five candidates in a local election and the number of votes received by each candidate. The program should then output each candidate's name, the number of votes received, and the percentag..
|
Prepare a statement of cash flows using the indirect method
: The following comparative balance sheets and income statement are available for Little Bit Inc. Prepare a statement of cash flows for 2012 using the indirect method and analyze the statement.
|
Determine the area between the curves
: A stock analyst plots the price per share of a certain stock as a function of time and finds that it can be modeled by the function S(t)=25-5√10t where t is the time (in years) since the stock was purchased. Find the average price of the stock o..
|
What are the server-side attacks
: What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks?What are some of the individual rights associated with information privacy? Do expectations of privacy change depending on the individual's env..
|
Discuss the concept of optimal capital structure
: Identify and discuss the concept of optimal capital structure
|
Aes uses the indirect-rijndael algorithm
: AES uses the Indirect-Rijndael algorithm 2. packet filter protect networks by blocking packets based on the packets' content
|
The capabilities of today''s smartphones
: 20 years ago, no one could have predicted the capabilities of today's smartphones. 10 years ago, when the smartphones of today were in their infancy, there were hints and clues about the future, but no one knew for sure exactly how it would all devel..
|