Verifying Identities (Part 2)
When converting to sine and cosine isn't enough, bring in the heavy artillery: finding common denominators, multiplying by the algebraic conjugate, and strategic factoring.
Introduction
Part 1 gave you the “convert to sin/cos” strategy. But some identities resist that approach — they need additional algebraic ingenuity. This lesson adds three powerful techniques to your verification toolkit.
Past Knowledge
Part 1 strategy (convert to sin/cos), all identity families, and algebraic fraction skills.
Today's Goal
Verify identities using common denominators, conjugates, and factoring strategies.
Future Success
These strategies apply directly to solving trig equations in Chapter 6.
Key Concepts
Advanced Verification Techniques
| Technique | When to Use |
|---|---|
| Common Denominator | When you see separate fractions that need to be combined |
| Multiply by Conjugate | When you see or in a denominator |
| Factor and Cancel | When you see difference of squares, trinomials, or common factors |
The Conjugate Trick
Multiplying by its conjugate gives . This converts a “stuck” denominator into a Pythagorean form you can work with.
Worked Examples
Combining Fractions
Verify:
LHS: Common denominator :
Rewrite:
Identity verified. ✓
Multiplying by the Conjugate
Verify:
LHS: Multiply numerator and denominator by the conjugate :
Apply Pythagorean identity:
Identity verified. ✓
Factoring a Difference of Squares
Verify:
LHS: Factor the numerator:
Identity verified. ✓
Common Pitfalls
Forgetting the Conjugate Multiplies Both Top and Bottom
When you multiply a denominator by its conjugate, you must also multiply the numerator by the same expression. Otherwise, you've changed the value of the fraction.
Real-Life Applications
Cryptography & Secure Communication
Modern encryption algorithms sometimes embed trigonometric relationships in their key-generation steps. Verifying that two different-looking expressions are actually identical ensures that the encryption and decryption processes are consistent — the algebraic verification skills you're building here are the same logical reasoning used in formal security proofs.
Practice Quiz
Loading...