Laws of Logs This section involves 2 general procedures. Expanding logarithms. Making a small number of terms into more terms so that you can simplify. Collapsing logarithms. Combining many terms into fewer so that you can simplify.

Notes of the Laws of Logs:

Notes of the Laws of Logs Change of Base Formula Product Law: Quotient Law: Power Law:

Change of Base:

Change of Base By far, one of the most useful formulas for logs. This allows us to change any base log into any other base. We usually want to change it into base 10 or e, since our calculators can handle this. Simply divide using the new base, the log of the term by the log of the base. Example…

Change of Base Example:

Change of Base Example Calculate the value of log 5 (45) Graph f(x)=log 2 (3x) Plug in

Why does this work?:

Why does this work? Here is a short proof of why the change of base formula works. I will not ask you to recreate this.

Product Law:

Product Law Log b (uv) = log b (u) + log b (v) This law allows us to change a multiplication problem into addition, or vice versa. When a problem asks you to expand go When a problem asks you to collapse go

Another Product Example Collapse and simplify: log 6 (4)+log 6 (12)+log 6 (4.5) log 6 (4*12) + log 6 (4.5) log 6 (48) + log 6 (4.5) log 6 (48*4.5) log 6 (216) ? 6 3 = 216 therefore log 6 (216) = 3 Done. This does not always happen. We could have ended up with just a log 6 ( ) as an answer.

Another Example Condense: Always go left to right! Log 4 (40) – log 4 (3) Log 4 (40/3)

Power law:

Power law Expand: log 3 (81) Log 3 (3 4 ) 4Log 3 (3) 4

All Together Now:

All Together Now Product Rule: log 4 (5) + log 4 (x 3 ) + log 4 (y) Power Rule: log 4 (5) + 3log 4 (x) + log 4 (y) Done.

Again:

Again Quotient Rule: Power Rule: Product Rule:

You do not have the permission to view this presentation. In order to view it, please
contact the author of the presentation.

Send to Blogs and Networks

Processing ....

Premium member

Use HTTPs

HTTPS (Hypertext Transfer Protocol Secure) is a protocol used by Web servers to transfer and display Web content securely. Most web browsers block content or generate a “mixed content” warning when users access web pages via HTTPS that contain embedded content loaded via HTTP. To prevent users from facing this, Use HTTPS option.