1. ## function defined

For the function defined by f(x)=2-x^2, 0 less than or equal to x, use a sketch to help find a formula for f^-1(x). Gave this one my best shot but I need some help with this one. my answer is: f^-1(x)= squrt2-x, x less than or equal to 2.

2. Originally Posted by kwtolley
For the function defined by f(x)=2-x^2, 0 less than or equal to x, use a sketch to help find a formula for f^-1(x). Gave this one my best shot but I need some help with this one. my answer is: f^-1(x)= squrt2-x, x less than or equal to 2.
You have,
$y=2-x^2$ for $x\geq 0$
It inverse (interchange x and y),
$x=2-y^2$
Thus,
$x-2=-y^2$
Thus,
$2-x=y^2$
Thus,
$y=\sqrt{2-x}$
Below is the graph,
(red is the original function
gree in the inverse,
balck is the identity function showing the symettry)

3. Hacker, may I ask what software do you use to create your graphs?

4. Originally Posted by Soltras
Hacker, may I ask what software do you use to create your graphs?

5. Thanks!

6. Originally Posted by ThePerfectHacker
I'm sort-of scared to click on something that claims to be a trojan horse, a download, and one of those "swat-the-fly" ads.

7. Originally Posted by Quick
I'm sort-of scared to click on something that claims to be a trojan horse, a download, and one of those "swat-the-fly" ads.
Trojan: Is any malicious code/program which discuses as an innconect program like, ( Yazzle Sodoku Game ), while is spyware/malware/adware/dailer/keylogger/backdoor,...
Thus, how can that possibly be a trojan! If it claims to be one. Just click it (we have a policy here on MHF that more malware is allowed).

8. Originally Posted by ThePerfectHacker
(we have a policy here on MHF that more malware is allowed).
I am not so sure I like the policy makers

9. Originally Posted by Quick
I am not so sure I like the policy makers
Oops, I did not releaize what I wrote.
I wanted to write,
"No malware is allowed", I guess it was a natural instinct for me to write that.