The Quadratic Formula and the Discriminant
الرياضيات للصف الثاني الثانوي - الفصل الدراسي الأول 2-3 القانون العام والمميز The Quadratic Formula and the Discriminant مثال رقم 1 صفحة رقم 110 من كتاب العبيكان عن MC Graw Hill Education إعداد المعلمة جلنار سلاّم.https://education.ti.com/en/activity/detail/the-quadratic-formula-and-the-discriminant
Drawing Dynamic Vectors with NSpire
This is a "how to" file for drawing vectors with a split screen with NSpire.https://education.ti.com/en/activity/detail/drawing-dynamic-vectors-with-nspire
G11 - Math Absolute Value Equation
الرياضيات للصف الثاني الثانوي الفصل الدراسي الأول مثال رقم 4 صفحة رقم 26 3-1 الدوال الخاصة - دالة القيمة المطلقة الأساسية كتاب العبيكان عن Mc Graw Hill Education إعداد المعلمة جلنار سلاّمhttps://education.ti.com/en/activity/detail/g11--math-absolute-value-equation
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Video Tutorials for the TI-Nspire CX Family graphing calculators
Web-based video tutorials answer common questions students and teachers may have when learning how to use the TI-Nspire™ CX family graphing calculators and software.https://education.ti.com/en/activity/detail/tutorials_nspire-cx
Solution 11942: Converting Mixed Numbers to Improper Fractions on the TI-83 Plus Family of Graphing Calculators.
...e Base Search How do I convert mixed numbers to improper fractions (and vice versa) using the TI-83 family, TI-84 Plus family and TI-Nspire handheld in TI-84 Plus mode? To convert mixed numbers to improper fractions (and vice versa) using the TI-83 family, TI-84 Plus family and TI-Nspi...https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/11942
Big Data Sets - Climate Change
Students can explore different sets of data associated with climate change with respect to variables such as temperature, precipitation, and natural disasters by state and by regions in the US.https://education.ti.com/en/activity/detail/exploring-data-@-climate-change
Modeling: Exploring Medical Tests Results
In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results
Modeling CO2 Levels
This activity uses data on monthly carbon dioxide (CO2) levels collected from the Mauna Loa Observatory in Hawaii. It provides an opportunity to engage students with data that is relevant to contemporary discussions of climate change.https://education.ti.com/en/activity/detail/modeling-co2-levels
Big Data Sets - CO2 Levels
Students can explore the data of the monthly mean amounts of carbon dioxide in the atmosphere measured in parts per million at Mauna Loa Observatory, Hawaii from 1958 to 2022.https://education.ti.com/en/activity/detail/exploring-data-@-co2-levels
Gettin' Trig-y with Python
In this Python coding activity, students will write a program that generates a random sine, cosine or tangent ratio. It will ask the user to enter a different trigonometric ratio based on the given triangle information. It will evaluate the user’s input.https://education.ti.com/en/activity/detail/gettin-trigy-with-python
Paying off a Loan
In this coding activity, students will write a program that asks for the principle, annual interest rate and monthly payment. The output will display the approximate number of months it will take to pay off as well as the total amount paid.https://education.ti.com/en/activity/detail/paying-off-a-loan
Factor Darts
In this coding activity, students will create a dart game that generates four random quadratic expressions. For each question the player answers correctly, the player will get another shot at the dart board.https://education.ti.com/en/activity/detail/factor-darts
Rational Quadratics Zeros
In this coding activity, students will extend the code from Integer Quadratic Zeros to create a game that allows exploration of other factored equation forms.https://education.ti.com/en/activity/detail/rational-quadratics-zeros
Cybersecurity 3 - Hail, Caesar!
Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.https://education.ti.com/en/activity/detail/cybersecurity-3
Cybersecurity 6- Brute Force
Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.https://education.ti.com/en/activity/detail/cybersecurity-6
Cybersecurity 7- Pick the Lock
This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?https://education.ti.com/en/activity/detail/cybersecurity-7
Cybersecurity 2 - Channel Surfing
Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing
Ratios Within and Between Scaled Shapes
This activity allows students to reason about ratio tables, which helps their understanding of what a ratio describes in a context and what quantities in equivalent ratios have in common.https://education.ti.com/en/activity/detail/ratios-within-and-between-scaled-shapes
Transformational Geometry Summary - Lesson Bundle
In this interactive video lesson, students will explore translations, reflections, rotations, and dilations. The lesson gives students a chance to summarize their learning from the individual transformational geometry lesson bundles.  Check out our videos for this bun...https://education.ti.com/en/activity/detail/transformational-geometry-summary
What Makes an Animal?
In this lesson, students learn about basic animal biology and identification of different animal species.https://education.ti.com/en/activity/detail/what-makes-an-animal
Swimming with Acids and Bases
In this lesson, students will use a simulation to observe at the molecular level the difference between strong and weak acids and bases.https://education.ti.com/en/activity/detail/swimming-with-acids-and-bases
When The Wind Blows
An investigative project based learning activity incorporating math and science through the connections among Chemistry, Physics, and Trigonometry. Project leads to consideration of the feasibility of alternative energy options based on research and local data. Student activities culminate in the...https://education.ti.com/en/activity/detail/when-the-wind-blows