Lesson 5.9

Verifying Identities (Part 2)

When converting to sine and cosine isn't enough, bring in the heavy artillery: finding common denominators, multiplying by the algebraic conjugate, and strategic factoring.

Introduction

Part 1 gave you the “convert to sin/cos” strategy. But some identities resist that approach — they need additional algebraic ingenuity. This lesson adds three powerful techniques to your verification toolkit.

Past Knowledge

Part 1 strategy (convert to sin/cos), all identity families, and algebraic fraction skills.

Today's Goal

Verify identities using common denominators, conjugates, and factoring strategies.

Future Success

These strategies apply directly to solving trig equations in Chapter 6.

Key Concepts

Advanced Verification Techniques

TechniqueWhen to Use
Common DenominatorWhen you see separate fractions that need to be combined
Multiply by ConjugateWhen you see or in a denominator
Factor and CancelWhen you see difference of squares, trinomials, or common factors

The Conjugate Trick

Multiplying by its conjugate gives . This converts a “stuck” denominator into a Pythagorean form you can work with.

Worked Examples

Basic

Combining Fractions

Verify:

LHS: Common denominator :

Rewrite:

Identity verified. ✓

Intermediate

Multiplying by the Conjugate

Verify:

LHS: Multiply numerator and denominator by the conjugate :

Apply Pythagorean identity:

Identity verified. ✓

Advanced

Factoring a Difference of Squares

Verify:

LHS: Factor the numerator:

Identity verified. ✓

Common Pitfalls

Forgetting the Conjugate Multiplies Both Top and Bottom

When you multiply a denominator by its conjugate, you must also multiply the numerator by the same expression. Otherwise, you've changed the value of the fraction.

Real-Life Applications

Cryptography & Secure Communication

Modern encryption algorithms sometimes embed trigonometric relationships in their key-generation steps. Verifying that two different-looking expressions are actually identical ensures that the encryption and decryption processes are consistent — the algebraic verification skills you're building here are the same logical reasoning used in formal security proofs.

Practice Quiz

Loading...