1. ## function defined

For the function defined by f(x)=2-x^2, 0 less than or equal to x, use a sketch to help find a formula for f^-1(x). Gave this one my best shot but I need some help with this one. my answer is: f^-1(x)= squrt2-x, x less than or equal to 2.

2. Originally Posted by kwtolley
For the function defined by f(x)=2-x^2, 0 less than or equal to x, use a sketch to help find a formula for f^-1(x). Gave this one my best shot but I need some help with this one. my answer is: f^-1(x)= squrt2-x, x less than or equal to 2.
You have,
$\displaystyle y=2-x^2$ for $\displaystyle x\geq 0$
It inverse (interchange x and y),
$\displaystyle x=2-y^2$
Thus,
$\displaystyle x-2=-y^2$
Thus,
$\displaystyle 2-x=y^2$
Thus,
$\displaystyle y=\sqrt{2-x}$
Below is the graph,
(red is the original function
gree in the inverse,
balck is the identity function showing the symettry)

3. Hacker, may I ask what software do you use to create your graphs?

4. Originally Posted by Soltras
Hacker, may I ask what software do you use to create your graphs?

5. Thanks!

6. Originally Posted by ThePerfectHacker
I'm sort-of scared to click on something that claims to be a trojan horse, a download, and one of those "swat-the-fly" ads.

7. Originally Posted by Quick
I'm sort-of scared to click on something that claims to be a trojan horse, a download, and one of those "swat-the-fly" ads.
Trojan: Is any malicious code/program which discuses as an innconect program like, ( Yazzle Sodoku Game ), while is spyware/malware/adware/dailer/keylogger/backdoor,...
Thus, how can that possibly be a trojan! If it claims to be one. Just click it (we have a policy here on MHF that more malware is allowed).

8. Originally Posted by ThePerfectHacker
(we have a policy here on MHF that more malware is allowed).
I am not so sure I like the policy makers

9. Originally Posted by Quick
I am not so sure I like the policy makers
Oops, I did not releaize what I wrote.
I wanted to write,
"No malware is allowed", I guess it was a natural instinct for me to write that.