(全国通用版)2019高考数学二轮复习中档大题规范练(六)不等式选讲理.doc

上传人:eventdump275 文档编号:1192892 上传时间:2019-05-16 格式:DOC 页数:4 大小:43KB
下载 相关 举报
(全国通用版)2019高考数学二轮复习中档大题规范练(六)不等式选讲理.doc_第1页
第1页 / 共4页
(全国通用版)2019高考数学二轮复习中档大题规范练(六)不等式选讲理.doc_第2页
第2页 / 共4页
(全国通用版)2019高考数学二轮复习中档大题规范练(六)不等式选讲理.doc_第3页
第3页 / 共4页
(全国通用版)2019高考数学二轮复习中档大题规范练(六)不等式选讲理.doc_第4页
第4页 / 共4页
亲,该文档总共4页,全部预览完了,如果喜欢就下载吧!
资源描述

1、1(六)不等式选讲1(2018福建省百校模拟)已知函数 f(x)| x a| x1|.(1)当 a2 时,求不等式 00,得| x2| x1|,则| x2| 2|x1| 2,即 x24 x4 x22 x1,解得 x0a23,故 00),求 的取值范围4a 1b解 (1)由 f(x)1,即|2 x1|1,得12 x11,3解得 x1,0即不等式的解集为 x|1 x0(2)g(x) f(x) f(x1)|2 x1|2 x1|2 x1(2 x1)|2,当且仅当(2 x1)(2 x1)0,即 x 时取等号,12 12 m2. a b2( a, b0), (a b) 4a 1b 12 (4a 1b) 1

2、2(5 4ba ab) ,12(5 24baab) 92当且仅当Error!即 a , b 时等号成立,43 23综上, 的取值范围为 .4a 1b 92, )4(2018广州模拟)已知函数 f(x)3| x a|3 x1|, g(x)|4 x1| x2|.(1)求不等式 g(x)1,无解;当2 ,14 75即 8|2 x2|的解集为 M.(1)求 M;(2)设 a, b M,证明: f(ab)f(2a) f(2 b)(1)解 将 f(x)| x4|代入不等式,整理得| x4|2 x2|8.当 x4 时,不等式转化为 x42 x28,解得 x8,解得 x8,解得 x2,所以 x2.综上, M x|x2(2)证明 因为 f(2a) f(2 b)|2 a4|2 b4|2 a42 b4|2 a2 b|,所以要证 f(ab)f(2a) f(2 b),只需证| ab4|2 a2 b|,即证( ab4) 2(2a2 b)2,即证 a2b28 ab164 a28 ab4 b2,即证 a2b24 a24 b2160,即证( a24)( b24)0,因为 a, b M,所以 a24, b24,所以( a24)( b24)0 成立,所以原不等式成立

展开阅读全文
相关资源
猜你喜欢
  • ANSI ISO IEC 15693-2-2000 Identification cards Contactless integrated circuit(s) cards Vicinity cards Part 2 Air interface and initialization (Adopted by INCITS)《识别卡.无触点集成电路卡.近距型卡..pdf ANSI ISO IEC 15693-2-2000 Identification cards Contactless integrated circuit(s) cards Vicinity cards Part 2 Air interface and initialization (Adopted by INCITS)《识别卡.无触点集成电路卡.近距型卡..pdf
  • ANSI ISO IEC 15693-3-2001 Identification cards Contactless integrated circuit(s) cards Vicinity cards Part 3 Anticollision and transmission protocol (Adopted by INCITS)《识别卡.无触点集成电路.pdf ANSI ISO IEC 15693-3-2001 Identification cards Contactless integrated circuit(s) cards Vicinity cards Part 3 Anticollision and transmission protocol (Adopted by INCITS)《识别卡.无触点集成电路.pdf
  • ANSI ISO IEC 15816-2002 Information technology Security techniques Security information objects for access control (Adopted by INCITS)《信息技术.安全技术.被INCITS采用的访问控制的安全信息对象》.pdf ANSI ISO IEC 15816-2002 Information technology Security techniques Security information objects for access control (Adopted by INCITS)《信息技术.安全技术.被INCITS采用的访问控制的安全信息对象》.pdf
  • ANSI ISO IEC 15898-1998 Information technology Data interchange on 356 mm optical disk cartridges WORM using phase change technology Capacity 14 8 Gbytes and 25 Gbytes per cartridg.pdf ANSI ISO IEC 15898-1998 Information technology Data interchange on 356 mm optical disk cartridges WORM using phase change technology Capacity 14 8 Gbytes and 25 Gbytes per cartridg.pdf
  • ANSI ISO IEC 15945-2002 Information technology Security techniques Specification of TTP services to support the application of digital signatures (Adopted by INCITS)《信息技术.安全技术.被INC.pdf ANSI ISO IEC 15945-2002 Information technology Security techniques Specification of TTP services to support the application of digital signatures (Adopted by INCITS)《信息技术.安全技术.被INC.pdf
  • ANSI ISO IEC 15946-1-2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1 General (Adopted by INCITS)《信息技术.安全技术.基于椭圆曲线的密码技术.第1部分.pdf ANSI ISO IEC 15946-1-2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1 General (Adopted by INCITS)《信息技术.安全技术.基于椭圆曲线的密码技术.第1部分.pdf
  • ANSI ISO IEC 15946-2-2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2 Digital signatures (Adopted by INCITS)《信息技术.安全技术.基于椭圆曲.pdf ANSI ISO IEC 15946-2-2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2 Digital signatures (Adopted by INCITS)《信息技术.安全技术.基于椭圆曲.pdf
  • ANSI ISO IEC 15946-3-2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3 Key establishment (Adopted by INCITS)《信息技术.安全技术.基于椭圆曲线.pdf ANSI ISO IEC 15946-3-2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3 Key establishment (Adopted by INCITS)《信息技术.安全技术.基于椭圆曲线.pdf
  • ANSI ISO IEC 16262-2002 Information technology ECMAScript language specification《信息技术.被INCITS采用的脚本语言规范》.pdf ANSI ISO IEC 16262-2002 Information technology ECMAScript language specification《信息技术.被INCITS采用的脚本语言规范》.pdf
  • 相关搜索

    当前位置:首页 > 考试资料 > 中学考试

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1