SlideShare a Scribd company logo
If the circumstances are right, L’Hopital’s Rule can speed up limits. L’H ôpital’s Rule
Recall that there are some functions that when finding limits produce the indeterminate forms 0/0 or  ∞/∞.  When these come up, they do not guarantee a limit exists, nor what that limit is. Some examples: Rewriting with algebraic techniques can handle some of them, for example dividing out techniques, rationalizing denominators or numerators, or using the squeeze theorem.
This extended Mean Value Theorem and L’H ôpital’s Rule are proved in Appendix A at the back of the book. Consider the Mean Value Theorem applied to f(x) and g(x).
This rule is used  incorrectly  if you apply the quotient rule to f(x)/g(x).
Let’s look at using L’H ôpital’s  Rule on the examples we looked at in the beginning.   Direct substitution achieves the indeterminate form 0/0.  Letting  and  Direct substitution achieves the indeterminate form  ∞/∞. Let f(x) be the numerator, and g(x) be the denominator.
The forms all have been identified as indeterminate.  All but the first two would have to be rewritten in quotient form before L’H ô pital’s Rule applies There are similar forms that have been identified as  determinate . L’H ô pital’s Rule doesn’t apply.  Limit is positive infinity Limit is negative infinity Limit is zero Limit is positive infinity
Caution! L’H ô pital’s Rule  can be applied ONLY to quotients leading to the indeterminate forms 0/0 or  ∞/∞! Find the following limit:
Find the following limit:
8.7a  p574/  1,3,5-10, 11,19, 23 8.7b  p574/  25,29,31,39, 51, 57, 76,77,79,81

More Related Content

Similar to Calc 8.7 l'hopital

L' Hopital rule in calculas
L' Hopital rule in calculasL' Hopital rule in calculas
L' Hopital rule in calculas
Ali Raza
 
Improper integrals IN MATH
Improper integrals IN MATHImproper integrals IN MATH
Improper integrals IN MATH
RONAK SUTARIYA
 
L hopitsls rule
L hopitsls ruleL hopitsls rule
L hopitsls rule
ssuser6c2274
 
Chapter 4 Applications of Differentiation James Stewart
Chapter 4 Applications of Differentiation James StewartChapter 4 Applications of Differentiation James Stewart
Chapter 4 Applications of Differentiation James Stewart
JoshuaHernandez677575
 
L hopitals rule
L hopitals ruleL hopitals rule
L hopitals rulejaflint718
 
Lesson 5 indeterminate forms
Lesson 5 indeterminate formsLesson 5 indeterminate forms
Lesson 5 indeterminate forms
Lawrence De Vera
 
Monica's Presentation
Monica's PresentationMonica's Presentation
Monica's Presentation
mvmason1
 
Chap4_Sec4 (1).ppt
Chap4_Sec4 (1).pptChap4_Sec4 (1).ppt
Chap4_Sec4 (1).ppt
LaxmiNarayanGurung
 
Indeterminate Forms and L' Hospital Rule
Indeterminate Forms and L' Hospital RuleIndeterminate Forms and L' Hospital Rule
Indeterminate Forms and L' Hospital Rule
Aakash Singh
 

Similar to Calc 8.7 l'hopital (9)

L' Hopital rule in calculas
L' Hopital rule in calculasL' Hopital rule in calculas
L' Hopital rule in calculas
 
Improper integrals IN MATH
Improper integrals IN MATHImproper integrals IN MATH
Improper integrals IN MATH
 
L hopitsls rule
L hopitsls ruleL hopitsls rule
L hopitsls rule
 
Chapter 4 Applications of Differentiation James Stewart
Chapter 4 Applications of Differentiation James StewartChapter 4 Applications of Differentiation James Stewart
Chapter 4 Applications of Differentiation James Stewart
 
L hopitals rule
L hopitals ruleL hopitals rule
L hopitals rule
 
Lesson 5 indeterminate forms
Lesson 5 indeterminate formsLesson 5 indeterminate forms
Lesson 5 indeterminate forms
 
Monica's Presentation
Monica's PresentationMonica's Presentation
Monica's Presentation
 
Chap4_Sec4 (1).ppt
Chap4_Sec4 (1).pptChap4_Sec4 (1).ppt
Chap4_Sec4 (1).ppt
 
Indeterminate Forms and L' Hospital Rule
Indeterminate Forms and L' Hospital RuleIndeterminate Forms and L' Hospital Rule
Indeterminate Forms and L' Hospital Rule
 

More from hartcher

Binomial distributions
Binomial distributionsBinomial distributions
Binomial distributions
hartcher
 
10.2 using combinations and the binomial theorem
10.2 using combinations and the binomial theorem10.2 using combinations and the binomial theorem
10.2 using combinations and the binomial theorem
hartcher
 
Calc 3.4b
Calc 3.4bCalc 3.4b
Calc 3.4b
hartcher
 
2.6b scatter plots and lines of best fit
2.6b scatter plots and lines of best fit2.6b scatter plots and lines of best fit
2.6b scatter plots and lines of best fit
hartcher
 
Ap and dual enrollment presentation
Ap and dual enrollment presentationAp and dual enrollment presentation
Ap and dual enrollment presentation
hartcher
 
Ap and Dual Enrollment Presentation
Ap and Dual Enrollment PresentationAp and Dual Enrollment Presentation
Ap and Dual Enrollment Presentation
hartcher
 
AP and Dual Enrollment Presentation
AP and Dual Enrollment PresentationAP and Dual Enrollment Presentation
AP and Dual Enrollment Presentation
hartcher
 
Ap and dual enrollment presentation final
Ap and dual enrollment presentation   finalAp and dual enrollment presentation   final
Ap and dual enrollment presentation final
hartcher
 
7.4 A arc length
7.4 A arc length7.4 A arc length
7.4 A arc lengthhartcher
 
Calc 8.7 again
Calc 8.7 againCalc 8.7 again
Calc 8.7 againhartcher
 
Calc 8.7 l'hopital
Calc 8.7 l'hopitalCalc 8.7 l'hopital
Calc 8.7 l'hopitalhartcher
 

More from hartcher (20)

Binomial distributions
Binomial distributionsBinomial distributions
Binomial distributions
 
10.2 using combinations and the binomial theorem
10.2 using combinations and the binomial theorem10.2 using combinations and the binomial theorem
10.2 using combinations and the binomial theorem
 
Calc 3.4b
Calc 3.4bCalc 3.4b
Calc 3.4b
 
2.6b scatter plots and lines of best fit
2.6b scatter plots and lines of best fit2.6b scatter plots and lines of best fit
2.6b scatter plots and lines of best fit
 
Ap and dual enrollment presentation
Ap and dual enrollment presentationAp and dual enrollment presentation
Ap and dual enrollment presentation
 
Ap and Dual Enrollment Presentation
Ap and Dual Enrollment PresentationAp and Dual Enrollment Presentation
Ap and Dual Enrollment Presentation
 
AP and Dual Enrollment Presentation
AP and Dual Enrollment PresentationAP and Dual Enrollment Presentation
AP and Dual Enrollment Presentation
 
Ap and dual enrollment presentation final
Ap and dual enrollment presentation   finalAp and dual enrollment presentation   final
Ap and dual enrollment presentation final
 
7.4 A arc length
7.4 A arc length7.4 A arc length
7.4 A arc length
 
Calc 2.2b
Calc 2.2bCalc 2.2b
Calc 2.2b
 
Calc 8.7 again
Calc 8.7 againCalc 8.7 again
Calc 8.7 again
 
Calc 8.7 l'hopital
Calc 8.7 l'hopitalCalc 8.7 l'hopital
Calc 8.7 l'hopital
 
Calc 2.6
Calc 2.6Calc 2.6
Calc 2.6
 
Calc 6.1b
Calc 6.1bCalc 6.1b
Calc 6.1b
 
Calc 6.1a
Calc 6.1aCalc 6.1a
Calc 6.1a
 
Calc 7.3a
Calc 7.3aCalc 7.3a
Calc 7.3a
 
Calc 7.3b
Calc 7.3bCalc 7.3b
Calc 7.3b
 
Calc 7.2a
Calc 7.2aCalc 7.2a
Calc 7.2a
 
Calc 7.2b
Calc 7.2bCalc 7.2b
Calc 7.2b
 
Calc 7.1b
Calc 7.1bCalc 7.1b
Calc 7.1b
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Calc 8.7 l'hopital

  • 1. If the circumstances are right, L’Hopital’s Rule can speed up limits. L’H ôpital’s Rule
  • 2. Recall that there are some functions that when finding limits produce the indeterminate forms 0/0 or ∞/∞. When these come up, they do not guarantee a limit exists, nor what that limit is. Some examples: Rewriting with algebraic techniques can handle some of them, for example dividing out techniques, rationalizing denominators or numerators, or using the squeeze theorem.
  • 3. This extended Mean Value Theorem and L’H ôpital’s Rule are proved in Appendix A at the back of the book. Consider the Mean Value Theorem applied to f(x) and g(x).
  • 4. This rule is used incorrectly if you apply the quotient rule to f(x)/g(x).
  • 5. Let’s look at using L’H ôpital’s Rule on the examples we looked at in the beginning. Direct substitution achieves the indeterminate form 0/0. Letting and Direct substitution achieves the indeterminate form ∞/∞. Let f(x) be the numerator, and g(x) be the denominator.
  • 6. The forms all have been identified as indeterminate. All but the first two would have to be rewritten in quotient form before L’H ô pital’s Rule applies There are similar forms that have been identified as determinate . L’H ô pital’s Rule doesn’t apply. Limit is positive infinity Limit is negative infinity Limit is zero Limit is positive infinity
  • 7. Caution! L’H ô pital’s Rule can be applied ONLY to quotients leading to the indeterminate forms 0/0 or ∞/∞! Find the following limit:
  • 9. 8.7a p574/ 1,3,5-10, 11,19, 23 8.7b p574/ 25,29,31,39, 51, 57, 76,77,79,81