Order of Operations

How To : Solve equations with the order of operations

In mathematics, the order of operations define the priority in which complex equations are solved. The top priority is your parenthesis, then exponents, followed by multiplication and division, and finally addition and subtraction (PEMDAS). This video tutorial demonstrates the ...more

How To : Use the order of operations in algebra

Are you looking for a simple math explanation on order of operations? Remember the following sentence: “Please excuse my dear aunt Sally.” What does this sentence have to do with math? The first letter of each word stands for an operation. “P” stands for parenthesis, “E” for e ...more

How To : Apply order of operations in algebra

In algebra, "order of operations" essentially means solving first for exponents or roots, then multiplication, division, addition and subtraction. The steps for the order of operations also require attention to mathematical grouping symbols, such as parentheses and brackets. F ...more

How To : Work with decimal numbers in prealgebra

You can do simple decimal calculation with out using a calculator once you understand the basic concept of decimals. In decimal equations when you have various operations between decimal numbers, you have to go by the order of operations in simplifying it. The order of operati ...more

How To : Multiply and divide three rational expressions

In this video, the instructor shows how to multiply and divide rational expressions. To solve a rational expression that contains many terms, solve step by step by following the order of operations. Order of operations advises one to work the parenthesis part first; so solve t ...more

How To : Use PEMDAS to evaluate an algebraic expression

Algebra is not as hard as it looks. Learn how to evaluate expressions correctly by using the order of operations, which can easily be remembered as PEMDAS- Parentheses, Exponents, Multiplication, Division, Addition, Subtraction. You can solve any problem in algebra with this a ...more

How To : Complete the square to graph a quadratic function

In this tutorial the instructor shows how to complete the square to graph a quadratic function using transformations. You can do this by transforming your equation in a series of steps. First make the coefficient of the square term to one by pulling out its numerical coefficie ...more

How To : Find the area of a trapezoid quickly

In another installment of Math Problem Generator this video shows how to find the area of a trapezoid. First it displays the dimension of the triangle, with the corresponding formula to find the area. This quick and easy demonstration shows how to plug in the correct dimension ...more

How To : Make Chain Mail Armor from Start to Finish

This article is a guide for making Chainmail Armor from start (simple wire) to finish (a finished chainmail shirt). We will be using the European 4 in 1 weave, as this is the most common weave. This is the weave that you usually see in movies. There are several sections to thi ...more

How To : Rinse volumetric glassware in the chemistry lab

Find out how everything in a chemistry lab works, from pipettes to burners to recrystallization to storage. You'll get precise instructions on how to work and perform certain scientific duties in the chem lab, whether it's chemical or just ordinary high school science. Watch ...more

How To : Send Spam & Spot Fake Emails (Email Spoofing 101)

Spammers are the bane of every email user. No matter what you do, junk mail always breaks through the spam filters. And some of the best ones seem to come from legit companies, and that's because they aren't legit companies— they're spammers masquerading as legit companies. W ...more

HowTo : Properly Benchmark Your PC

Maximum PC posts a thorough guide on properly benchmarking your PC. For those not in the know, benchmarking is the process of "running a computer program, a set of programs, or other operations, in order to assess the relative performance of an object, normally by running a n ...more

News : Giving Your Fridge a Mind of Its Own with RIFD Tags

What if your fridge knew your food and expiration dates? What if your fridge could tell you which ingredients are missing and where you can get them the cheapest? "In My Fridge" is a project designed to simplify the process of food management. Our focus was on the technical ...more

How To : Professionally operate puppets

In this video, Paul Louis, a professional puppeteer and puppet builder discusses the difference between puppets intended for theater and television and how they are different both in appearance and operation. For a puppet on stage, stitching is acceptable to be seen on the out ...more

How To : Solve for X in algebra

This video demonstrates how to solve for X in algebra. The equation taken for this is 2X+4=10.The first thing you have to do to solve this equation is to get X by itself on one side of the equation. In order to do that you take the number that does not have X with it and do th ...more

How To : Solve operations on rational functions (f o g)(x)

YAYMATH In order to use rational functions in intermediate algebra, Robert Ahdoot begins by setting values to the functions f(x) and g(x). He then adds these functions together, with the equation (f+g)(x). After addition comes subtraction, using the equation (f-g)(x). And fina ...more

How To : Find the area of a ring w/ the areas of 2 circles

Doina Popovici's video explains how to calculate the area of a ring. She takes us really slow, down to all the steps of this process. It's very important that she explains every math formula and operation so you cannot get lost into this solving. The video uses nice pictures a ...more

How To : Deal with "giant fractions"

Doug tries to teach us some basic math fractions. In this particular case, Doug teaches how to do polynomial operations. He uses a chalk board and step by step shows his work on how to do this math. He uses the PEMDAS method but does not explain it. That is parenthesis first, ...more

News : Is the End Coming for Quadriplegic Gaming?

A century ago there wasn't much life available for quadriplegic people. Handicap accessibility was barely even a concept, and lacking medical technology kept any semblance of independence out of reach. Today those unfortunate enough to be paralyzed from the neck down have brig ...more

News : So You Just Bought Photoshop. Now What?

Photoshop. It’s like a mountain to climb. You can chug up to the top, working hard, never letting up, or you can just go part way up and scoot around the side of the mountain and still get to the other side. Not everyone needs to be a Photoshop guru, or ninja pixel punisher. T ...more

How To : Make a drum loop with MIDI on Pro Tools

This video shows a quick and easy way to create a drum loop using "MIDI MERGE". A stereo instrument track with expand 2 is used here. First, select a track, expand 2, and select session drums (you can take any other track) for the patch and also create a "click track" which wi ...more

Night People : A Bad Vibes Label Profile

Night People: A Bad Vibes Label Profile Shawn Reed is one of our favorite people, not content with making music with Wet Hair, he also runs 'Night People' - an almost complete DIY record and tape label operation in Iowa - a label which has consistently put out and introduced ...more

Altruistic Hacking : The Rise of the DIY Radiation Detector

Understandably, the tragedy in Japan has substantially risen the level of worldwide radiation-related hysteria. So much so, as an alternative to stampeding health food stores for iodine tablets, crafty individuals and organizations are hacking together personal radiation detec ...more

News : Knoxville Picks Prank Contest Honorable Mentions

Johnny Knoxville and the Jackass boys have finally returned from their whirlwind world tour promoting Jackass 3D. Along with their return comes the long-awaited Honorable Mentions for the Jackass 3D Prank Contest. So, straight from the source, a note from Knoxville: As you kn ...more

How to Hack Like a Pro : Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more

How To : Market a Self Storage Facility

Self-storage may not be a new industry, but it is one that is rapidly reshaping its operations to suit a progressively more modernized customer base. In order to stay competitive with your self-storage facility, you'll need to keep an open mind, embrace current marketing trend ...more

How To : Make a Programmable Piano in Minecraft

There are many impressive accomplishments in Minecraft, too many to name in fact. Sprawling builds, complex machines, and massive servers are the hallmark of Minecraft and things keep getting bigger and better. No one doubts the epic scale Minecraft has reached, but every once ...more

How To : Reset your frozen Apple iPod

This is a video good for people who have problems with their Apple iPod. It uses simple steps in order to tell you how to successfully reset the iPod to its default state. Though it works primarily on the older models, viewers will learn which buttons on the machine allow you ...more

How To : Play KenKen

It’s a game, it involves numbers, it’s fun, it’s KenKen! Understanding the goals and rules of this fun, numbers puzzle will give you the skills you need to win. Have fun working your brain and passing the time with KenKen. KenKen can be a great way to challenge your puzzle-so ...more

How To : Security-Oriented C Tutorial 0x06 - Operators

Hello again! In this tutorial, we are going to go over something called "operators" which will help us build upon conditions of control structures and also some variable manipulation. Without further ado, let's dive in! What Is an Operator? Operators are special symbols whic ...more

Tasker 101 : How to Create a Task

There are two core components to any Tasker automation: A profile and a task. Profiles are basically a set of conditions that must be met before Tasker will do anything. Tasks, on the other hand, are the actions Tasker will perform when your profile's conditions have been met. ...more

Prev Page
  • Hot
  • Latest