SlideShare a Scribd company logo
1 of 9
Download to read offline
The Natural Logarithm ...




           Overgrown Redwood Log and Wildflowers
Now lets solve some logarithmic equations ...
Now lets solve some logarithmic equations ...
Properties of exponential functions
                   For example, let's look at




                                  Properties of the exponential growth function
                                            Domain:
                                            Range:
                                            Root(s):
                                            y-intercept:
                                            Increasing of Decreasing:
                                            Concavity:
                                            Asymptote(s):
Properties of exponential functions

                   As an example let's look at




                                    Properties of the exponential decay function
                                                 Domain:
                                                 Range:
                                                 Root(s):
                                                 y-intercept:
                                                 Increasing of Decreasing:
                                                 Concavity:
                                                 Asymptote(s):
Properties of logarithmic functions

                  As an example we'll look at




                                         Properties of the logarithm function
                                           Domain:
                                           Range:
                                           Root(s):
                                           y-intercept:
                                           Increasing of Decreasing:
                                           Concavity:
                                           Asymptote(s):
Properties of logarithmic functions

                  As an example we'll look at




                                         Properties of the logarithm function
                                           Domain:
                                           Range:
                                           Root(s):
                                           y-intercept:
                                           Increasing of Decreasing:
                                           Concavity:
                                           Asymptote(s):

More Related Content

More from Darren Kuropatwa

Providing Permission To Wonder v2.1
Providing Permission To Wonder v2.1Providing Permission To Wonder v2.1
Providing Permission To Wonder v2.1Darren Kuropatwa
 
Things That Suck About Digital Citizenship v1
Things That Suck About Digital Citizenship v1Things That Suck About Digital Citizenship v1
Things That Suck About Digital Citizenship v1Darren Kuropatwa
 
Digital Storytelling for Deeper Learning v1
Digital Storytelling for Deeper Learning v1Digital Storytelling for Deeper Learning v1
Digital Storytelling for Deeper Learning v1Darren Kuropatwa
 
Tales of Learning and the Gifts of Footprints v4.2
Tales of Learning and the Gifts of Footprints v4.2Tales of Learning and the Gifts of Footprints v4.2
Tales of Learning and the Gifts of Footprints v4.2Darren Kuropatwa
 
Making Student Thinking Visible v4
 Making Student Thinking Visible v4 Making Student Thinking Visible v4
Making Student Thinking Visible v4Darren Kuropatwa
 
Leveraging Digital for Deeper Learning
Leveraging Digital for Deeper LearningLeveraging Digital for Deeper Learning
Leveraging Digital for Deeper LearningDarren Kuropatwa
 
We Learn Through Stories at PRIZMAH17
We Learn Through Stories at PRIZMAH17We Learn Through Stories at PRIZMAH17
We Learn Through Stories at PRIZMAH17Darren Kuropatwa
 
Providing Permission to Wonder v3
Providing Permission to Wonder v3Providing Permission to Wonder v3
Providing Permission to Wonder v3Darren Kuropatwa
 
Making Student Thinking Visible v3.7
 Making Student Thinking Visible v3.7 Making Student Thinking Visible v3.7
Making Student Thinking Visible v3.7Darren Kuropatwa
 
Providing Permission to Wonder v2
Providing Permission to Wonder v2Providing Permission to Wonder v2
Providing Permission to Wonder v2Darren Kuropatwa
 
We Learn Through Stories v4 (master class)
We Learn Through Stories v4 (master class)We Learn Through Stories v4 (master class)
We Learn Through Stories v4 (master class)Darren Kuropatwa
 
Deep Learning Design: the middle ring
Deep Learning Design: the middle ringDeep Learning Design: the middle ring
Deep Learning Design: the middle ringDarren Kuropatwa
 

More from Darren Kuropatwa (20)

Behind Their Eyes v1
Behind Their Eyes v1Behind Their Eyes v1
Behind Their Eyes v1
 
Leading Change v1
Leading Change v1Leading Change v1
Leading Change v1
 
Providing Permission To Wonder v2.1
Providing Permission To Wonder v2.1Providing Permission To Wonder v2.1
Providing Permission To Wonder v2.1
 
Things That Suck About Digital Citizenship v1
Things That Suck About Digital Citizenship v1Things That Suck About Digital Citizenship v1
Things That Suck About Digital Citizenship v1
 
Digital Storytelling for Deeper Learning v1
Digital Storytelling for Deeper Learning v1Digital Storytelling for Deeper Learning v1
Digital Storytelling for Deeper Learning v1
 
Tales of Learning and the Gifts of Footprints v4.2
Tales of Learning and the Gifts of Footprints v4.2Tales of Learning and the Gifts of Footprints v4.2
Tales of Learning and the Gifts of Footprints v4.2
 
The Fourth Screen v4.2
The Fourth Screen v4.2The Fourth Screen v4.2
The Fourth Screen v4.2
 
Making Student Thinking Visible v4
 Making Student Thinking Visible v4 Making Student Thinking Visible v4
Making Student Thinking Visible v4
 
Learning is at BYTE 2017
Learning is at BYTE 2017Learning is at BYTE 2017
Learning is at BYTE 2017
 
Leveraging Digital for Deeper Learning
Leveraging Digital for Deeper LearningLeveraging Digital for Deeper Learning
Leveraging Digital for Deeper Learning
 
We Learn Through Stories at PRIZMAH17
We Learn Through Stories at PRIZMAH17We Learn Through Stories at PRIZMAH17
We Learn Through Stories at PRIZMAH17
 
Providing Permission to Wonder v3
Providing Permission to Wonder v3Providing Permission to Wonder v3
Providing Permission to Wonder v3
 
The Fourth Screen v4.1
The Fourth Screen v4.1The Fourth Screen v4.1
The Fourth Screen v4.1
 
Making Student Thinking Visible v3.7
 Making Student Thinking Visible v3.7 Making Student Thinking Visible v3.7
Making Student Thinking Visible v3.7
 
Learning is at AUHSD
Learning is at AUHSDLearning is at AUHSD
Learning is at AUHSD
 
Providing Permission to Wonder v2
Providing Permission to Wonder v2Providing Permission to Wonder v2
Providing Permission to Wonder v2
 
The Fourth Screen v4
The Fourth Screen v4The Fourth Screen v4
The Fourth Screen v4
 
Learning is at BLC16
Learning is at BLC16Learning is at BLC16
Learning is at BLC16
 
We Learn Through Stories v4 (master class)
We Learn Through Stories v4 (master class)We Learn Through Stories v4 (master class)
We Learn Through Stories v4 (master class)
 
Deep Learning Design: the middle ring
Deep Learning Design: the middle ringDeep Learning Design: the middle ring
Deep Learning Design: the middle ring
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Pre-Cal 40S Slides November 12, 2007

  • 1. The Natural Logarithm ... Overgrown Redwood Log and Wildflowers
  • 2. Now lets solve some logarithmic equations ...
  • 3. Now lets solve some logarithmic equations ...
  • 4.
  • 5. Properties of exponential functions For example, let's look at Properties of the exponential growth function Domain: Range: Root(s): y-intercept: Increasing of Decreasing: Concavity: Asymptote(s):
  • 6. Properties of exponential functions As an example let's look at Properties of the exponential decay function Domain: Range: Root(s): y-intercept: Increasing of Decreasing: Concavity: Asymptote(s):
  • 7.
  • 8. Properties of logarithmic functions As an example we'll look at Properties of the logarithm function Domain: Range: Root(s): y-intercept: Increasing of Decreasing: Concavity: Asymptote(s):
  • 9. Properties of logarithmic functions As an example we'll look at Properties of the logarithm function Domain: Range: Root(s): y-intercept: Increasing of Decreasing: Concavity: Asymptote(s):