SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Looking back on 

                                    inverse trig funct
                                                         ions




www.blakeyart.com/lookingback.jpg




                                                                1
Calculus                                                              Group Members           ________________________
Section 4.5B: Derivatives of Inverse Trigonometric Functions                                  Date ______________

Review:   Inverse Trigonometric Functions


1. Label the graph of each trig function, then state its domain and range.


2. Since the trig functions are all periodic graphs, none of them pass the __________________ _________ test.


    Therefore none of these are _________________ functions or  ___ to ___ functions,. and so do not have
    inverses which are functions.
    
         Rather these are called inverse trig _________________.


        Sketch (dashed line type) the graph of the inverse relation for each trigonometric function.
        [On TI­83/84, with function in Y1: à Draw à 8:DrawInv]



 3. In order to create inverses which are functions, we must restrict the _____________ of each of the functions
     so that they are 1­1. 


        This corresponds to considering only a particular __________ of the Unit Circle. (See figure)


        The notation for inverse the trig function is y = ______________.


        The portion of the graph used for the inverse function is called the ______________            _________.


        On the sketch of the inverse trig relation, darken (solid line type) the principle branch of the 
        inverse trigonometric function, then state its domain and range.



                                                                                                                         2
[­1, 1]
[­1, 1]




          [­1, 1]
[­1, 1]




                    3
except
             Domain: _______________________

             Range:  ________________________




                  [to graph on TI: cos­1(1/x)]
    except
                Domain: _______________________

                Range:  ________________________




                                                   4
[to graph on TI: sin­1(1/x)]

Domain: _______________________

Range:  ________________________




[to graph on TI: π/2 ­ tan­1(x)]

  Domain: _______________________

  Range:  ________________________



                                     5

Más contenido relacionado

La actualidad más candente

5 2 Systems Of Lin Eq Three Var
5 2 Systems Of Lin Eq   Three Var5 2 Systems Of Lin Eq   Three Var
5 2 Systems Of Lin Eq Three Varsilvia
 
Ultimate Goals In Robotics
Ultimate Goals In RoboticsUltimate Goals In Robotics
Ultimate Goals In RoboticsFarzad Nozarian
 
Unit 3 rational functions
Unit 3 rational functionsUnit 3 rational functions
Unit 3 rational functionsbeachnut
 
K-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMER
K-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMERK-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMER
K-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMERkunal kishore
 
AP Calculus Jauary 13, 2009
AP Calculus Jauary 13, 2009AP Calculus Jauary 13, 2009
AP Calculus Jauary 13, 2009Darren Kuropatwa
 

La actualidad más candente (6)

5 2 Systems Of Lin Eq Three Var
5 2 Systems Of Lin Eq   Three Var5 2 Systems Of Lin Eq   Three Var
5 2 Systems Of Lin Eq Three Var
 
Ultimate Goals In Robotics
Ultimate Goals In RoboticsUltimate Goals In Robotics
Ultimate Goals In Robotics
 
Unit 3 rational functions
Unit 3 rational functionsUnit 3 rational functions
Unit 3 rational functions
 
Control Systems
Control SystemsControl Systems
Control Systems
 
K-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMER
K-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMERK-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMER
K-MAP(KARNAUGH MAP)BY THE SILENT PROGRAMMER
 
AP Calculus Jauary 13, 2009
AP Calculus Jauary 13, 2009AP Calculus Jauary 13, 2009
AP Calculus Jauary 13, 2009
 

Similar a CRMS Calculus 2010 February 8, 2010_A

Lesson no. 8 (Graphs of Tangent and Cotangent Functions)
Lesson no. 8 (Graphs of Tangent and Cotangent Functions)Lesson no. 8 (Graphs of Tangent and Cotangent Functions)
Lesson no. 8 (Graphs of Tangent and Cotangent Functions)Genaro de Mesa, Jr.
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)eSAT Journals
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)eSAT Publishing House
 
Class notes for discovering transformation of the parent graph for the square...
Class notes for discovering transformation of the parent graph for the square...Class notes for discovering transformation of the parent graph for the square...
Class notes for discovering transformation of the parent graph for the square...Joanne Rosa Crooks
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)eSAT Journals
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)eSAT Publishing House
 
The kinematics analysis and trajectory planning of Series robot
The kinematics analysis and trajectory planning of Series robotThe kinematics analysis and trajectory planning of Series robot
The kinematics analysis and trajectory planning of Series robotIJRES Journal
 
Name________________________________________________ Block________.docx
Name________________________________________________ Block________.docxName________________________________________________ Block________.docx
Name________________________________________________ Block________.docxhallettfaustina
 
Applications of the PMP. Cell Formation in Group Technology
Applications of the PMP. Cell Formation in Group TechnologyApplications of the PMP. Cell Formation in Group Technology
Applications of the PMP. Cell Formation in Group TechnologySSA KPI
 
Me101 tutorial 06_solution
Me101 tutorial 06_solutionMe101 tutorial 06_solution
Me101 tutorial 06_solutionaeckandan
 
Lesson 4A - Inverses of Functions.ppt
Lesson 4A - Inverses of Functions.pptLesson 4A - Inverses of Functions.ppt
Lesson 4A - Inverses of Functions.pptssuser78a386
 
Design, Develop and Implement an Efficient Polynomial Divider
Design, Develop and Implement an Efficient Polynomial DividerDesign, Develop and Implement an Efficient Polynomial Divider
Design, Develop and Implement an Efficient Polynomial DividerIJLT EMAS
 
Using Sparse Matrix for the Contact Calculation_ZhanWang
Using Sparse Matrix for the Contact Calculation_ZhanWangUsing Sparse Matrix for the Contact Calculation_ZhanWang
Using Sparse Matrix for the Contact Calculation_ZhanWangZhan Wang
 
Singularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serialSingularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serialeSAT Publishing House
 

Similar a CRMS Calculus 2010 February 8, 2010_A (18)

Lesson no. 8 (Graphs of Tangent and Cotangent Functions)
Lesson no. 8 (Graphs of Tangent and Cotangent Functions)Lesson no. 8 (Graphs of Tangent and Cotangent Functions)
Lesson no. 8 (Graphs of Tangent and Cotangent Functions)
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)
 
Class notes for discovering transformation of the parent graph for the square...
Class notes for discovering transformation of the parent graph for the square...Class notes for discovering transformation of the parent graph for the square...
Class notes for discovering transformation of the parent graph for the square...
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)
 
The kinematics analysis and trajectory planning of Series robot
The kinematics analysis and trajectory planning of Series robotThe kinematics analysis and trajectory planning of Series robot
The kinematics analysis and trajectory planning of Series robot
 
Name________________________________________________ Block________.docx
Name________________________________________________ Block________.docxName________________________________________________ Block________.docx
Name________________________________________________ Block________.docx
 
Applications of the PMP. Cell Formation in Group Technology
Applications of the PMP. Cell Formation in Group TechnologyApplications of the PMP. Cell Formation in Group Technology
Applications of the PMP. Cell Formation in Group Technology
 
Exercise #21
Exercise #21Exercise #21
Exercise #21
 
Exercise #21
Exercise #21Exercise #21
Exercise #21
 
Me101 tutorial 06_solution
Me101 tutorial 06_solutionMe101 tutorial 06_solution
Me101 tutorial 06_solution
 
report
reportreport
report
 
Lesson 4A - Inverses of Functions.ppt
Lesson 4A - Inverses of Functions.pptLesson 4A - Inverses of Functions.ppt
Lesson 4A - Inverses of Functions.ppt
 
ListMyPolygons 0.6
ListMyPolygons 0.6ListMyPolygons 0.6
ListMyPolygons 0.6
 
Design, Develop and Implement an Efficient Polynomial Divider
Design, Develop and Implement an Efficient Polynomial DividerDesign, Develop and Implement an Efficient Polynomial Divider
Design, Develop and Implement an Efficient Polynomial Divider
 
Using Sparse Matrix for the Contact Calculation_ZhanWang
Using Sparse Matrix for the Contact Calculation_ZhanWangUsing Sparse Matrix for the Contact Calculation_ZhanWang
Using Sparse Matrix for the Contact Calculation_ZhanWang
 
Singularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serialSingularity condition of wrist partitioned 6-r serial
Singularity condition of wrist partitioned 6-r serial
 

Más de Fountain Valley School of Colorado

Más de Fountain Valley School of Colorado (20)

My Capstone Presentation, June 29, 2010
My Capstone Presentation, June 29, 2010My Capstone Presentation, June 29, 2010
My Capstone Presentation, June 29, 2010
 
CRMS Calculus May 31, 2010
CRMS Calculus May 31, 2010CRMS Calculus May 31, 2010
CRMS Calculus May 31, 2010
 
CRMS Calculus 2010 May 21, 2010
CRMS Calculus 2010 May 21, 2010CRMS Calculus 2010 May 21, 2010
CRMS Calculus 2010 May 21, 2010
 
CRMS Calculus 2010 May 17, 2010
CRMS Calculus 2010 May 17, 2010CRMS Calculus 2010 May 17, 2010
CRMS Calculus 2010 May 17, 2010
 
CRMS Calculus 2010 May 14, 2010
CRMS Calculus 2010 May 14, 2010CRMS Calculus 2010 May 14, 2010
CRMS Calculus 2010 May 14, 2010
 
CRMS Calculus 2010 May 12, 2010
CRMS Calculus 2010 May 12, 2010CRMS Calculus 2010 May 12, 2010
CRMS Calculus 2010 May 12, 2010
 
CRMS Calculus 2010 May 5, 2010
CRMS Calculus 2010 May 5, 2010CRMS Calculus 2010 May 5, 2010
CRMS Calculus 2010 May 5, 2010
 
CRMS Calculus 2010 May 3, 2010
CRMS Calculus 2010 May 3, 2010CRMS Calculus 2010 May 3, 2010
CRMS Calculus 2010 May 3, 2010
 
CRMS Calculus 2010 April 21, 2010
CRMS Calculus 2010 April 21, 2010CRMS Calculus 2010 April 21, 2010
CRMS Calculus 2010 April 21, 2010
 
Rolle's Theorem
Rolle's TheoremRolle's Theorem
Rolle's Theorem
 
CRMS Calculus 2010 April 19,2010
CRMS Calculus 2010 April 19,2010CRMS Calculus 2010 April 19,2010
CRMS Calculus 2010 April 19,2010
 
CRMS Calculus 2010 April 13, 2010
CRMS Calculus 2010 April 13, 2010CRMS Calculus 2010 April 13, 2010
CRMS Calculus 2010 April 13, 2010
 
CRMS Calculus 2010, April 12, 2010
CRMS Calculus 2010, April 12, 2010CRMS Calculus 2010, April 12, 2010
CRMS Calculus 2010, April 12, 2010
 
CRMS Calculus 2010 April 5, 2010
CRMS Calculus 2010 April 5, 2010CRMS Calculus 2010 April 5, 2010
CRMS Calculus 2010 April 5, 2010
 
CRMS Calculus 2010 March 31, 2010
CRMS Calculus 2010 March 31, 2010CRMS Calculus 2010 March 31, 2010
CRMS Calculus 2010 March 31, 2010
 
CRMS Calculus 2010 March 30, 2010
CRMS Calculus 2010 March 30, 2010CRMS Calculus 2010 March 30, 2010
CRMS Calculus 2010 March 30, 2010
 
CRMS Calculus 2010 February 19, 2010
CRMS Calculus 2010 February 19, 2010CRMS Calculus 2010 February 19, 2010
CRMS Calculus 2010 February 19, 2010
 
CRMS Calculus 2010 February 17, 2010
CRMS Calculus 2010 February 17, 2010CRMS Calculus 2010 February 17, 2010
CRMS Calculus 2010 February 17, 2010
 
CRMS Calculus 2010 February 8, 2010_B
CRMS Calculus 2010 February 8, 2010_BCRMS Calculus 2010 February 8, 2010_B
CRMS Calculus 2010 February 8, 2010_B
 
CRMS Calculus 2010 January 27, 2010
CRMS Calculus 2010 January 27, 2010CRMS Calculus 2010 January 27, 2010
CRMS Calculus 2010 January 27, 2010
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

CRMS Calculus 2010 February 8, 2010_A

  • 1. Looking back on  inverse trig funct ions www.blakeyart.com/lookingback.jpg 1
  • 2. Calculus Group Members ________________________ Section 4.5B: Derivatives of Inverse Trigonometric Functions Date ______________ Review:   Inverse Trigonometric Functions 1. Label the graph of each trig function, then state its domain and range. 2. Since the trig functions are all periodic graphs, none of them pass the __________________ _________ test.     Therefore none of these are _________________ functions or  ___ to ___ functions,. and so do not have     inverses which are functions.      Rather these are called inverse trig _________________. Sketch (dashed line type) the graph of the inverse relation for each trigonometric function. [On TI­83/84, with function in Y1: à Draw à 8:DrawInv] 3. In order to create inverses which are functions, we must restrict the _____________ of each of the functions     so that they are 1­1.      This corresponds to considering only a particular __________ of the Unit Circle. (See figure) The notation for inverse the trig function is y = ______________. The portion of the graph used for the inverse function is called the ______________  _________. On the sketch of the inverse trig relation, darken (solid line type) the principle branch of the  inverse trigonometric function, then state its domain and range. 2
  • 3. [­1, 1] [­1, 1] [­1, 1] [­1, 1] 3
  • 4. except Domain: _______________________ Range:  ________________________ [to graph on TI: cos­1(1/x)] except Domain: _______________________ Range:  ________________________ 4