Constructing an Ellipse
Students will explore two different methods for constructing an ellipse. Students discover that the sum of the distances from a point on an ellipse to its foci is always constant. This fact is then used as the basis for an algebraic derivation of the general equation for an ellipse centered at th...https://education.ti.com/en/activity/detail/constructing-an-ellipse_1
Application of Polynomials
Students use the volume formula to find cubic polynomials in order to determine the dimensions of four different-size boxes used for packaging trash bags.https://education.ti.com/en/activity/detail/application-of-polynomials
Analyzing an Electricity Bill
This investigation guides the students through using a piecewise function to model an electric bill.https://education.ti.com/en/activity/detail/analyzing-an-electricity-bill
Extraneous Solutions
Discover solutions of radical equations and investigate extraneous solutions.https://education.ti.com/en/activity/detail/extraneous-solutions
Given the Graph of a Parabola, State its Equation in Vertex Form
This activity is designed for students to study on their own. It is designed in a 'StudyCard' format. A graph of a parabola will be shown. The student is asked to find the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. Press enter on the double up arrow in the Ans... section t...https://education.ti.com/en/activity/detail/given-the-graph-of-a-parabola-state-its-equation-in-vertex-form
Watch Your P' and Q's
Students use the Rational Zero Theorem to find all rational zeros of a polynomial.https://education.ti.com/en/activity/detail/watch-your-p-and-qs
G11 - Math Linear Ineaqualities
تمثيل المتباينات الخطية ومتباينات القيمة المطلقة بيانياً Graphing Linear and Absolute Value Inequalitieshttps://education.ti.com/en/activity/detail/g11--math-linear-ineaqualities
Functions and Inverses
Grab and drag a point along graphs of different functions to determine the relationship of ordered pairs.https://education.ti.com/en/activity/detail/functions-and-inverses
Vertex and Factored Form of Quadratic Functions
Determine the effect of parameters have upon the graph of the quadratic function in vertex and factored form.https://education.ti.com/en/activity/detail/vertex-and-factored-form-of-quadratic-functions
The Quadratic Formula and the Discriminant
الرياضيات للصف الثاني الثانوي - الفصل الدراسي الأول 2-3 القانون العام والمميز The Quadratic Formula and the Discriminant مثال رقم 1 صفحة رقم 110 من كتاب العبيكان عن MC Graw Hill Education إعداد المعلمة جلنار سلاّم.https://education.ti.com/en/activity/detail/the-quadratic-formula-and-the-discriminant
Birthday Problem
Investigate the probability of two people having the same birthday in a crowd of a given size.https://education.ti.com/en/activity/detail/birthday-problem
The Park Problem
The goal of this activity is for students to see a real world application of a minimization problem. Students have to determine where to place a track inside a park to minimize the total distance of the track in Lazy Town.https://education.ti.com/en/activity/detail/the-park-problem
Families of Functions
Change sliders and observe the effects on the graphs of the functions.https://education.ti.com/en/activity/detail/families-of-functions
Factoring Trinomials
Discover how the coefficients of a given trinomial affect the factors.https://education.ti.com/en/activity/detail/factoring-trinomials
Solving Exponential Equations
Numeric, graphical and algebraic solutions to an exponential equation.https://education.ti.com/en/activity/detail/solving-exponential-equations
End Behavior of Polynomial Functions
Students will use a slider to scroll through the graphs of power functions with a coefficient of positive and negative 1 and determine similarities and differences among the functions. Students will generalize the end-behavior properties of various power functions.https://education.ti.com/en/activity/detail/end-behavior-of-polynomial-functions
Radical Functions
Students use a nomograph to investigate functions defined by square roots. Nomographs consist of two or more parallel axes, one for inputs and another for outputs. Input, output pairs that belong to the function are graphed as corresponding points on the axes connected by a ray drawn from the inp...https://education.ti.com/en/activity/detail/radical-functions_1
Exploring the Cycloid Curve
The TI Nspire's animation feature is used to show how a point on a rotating circle creates the cycloid curve. Students then examine the parametric equation of the cycloid. Finally, students are tasked with going online to investigate the terms brachistochronous and tautochronous and their relat...https://education.ti.com/en/activity/detail/exploring-the-cycloid-curve
Expanding Binomials
In this activity, students will explore the link between Pascal's Triangle and the expansion of binomials in the development of the Binomial Theorem.https://education.ti.com/en/activity/detail/expanding-binomials_1
Equations of Parabolas
Students draw and measure lines and segments to discover properties of parabolas, specifically that the distance from any point on the parabola is equidistant to the focus and the directrix. They work with parabolas whose vertex is on the origin as well as off the origin and they also with parabo...https://education.ti.com/en/activity/detail/equations-of-parabolas
Function or Not a Function
Examine some input-output relations to determine if a relation is a function.https://education.ti.com/en/activity/detail/function-or-not-a-function
G11 - Math Absolute Value Equation
الرياضيات للصف الثاني الثانوي الفصل الدراسي الأول مثال رقم 4 صفحة رقم 26 3-1 الدوال الخاصة - دالة القيمة المطلقة الأساسية كتاب العبيكان عن Mc Graw Hill Education إعداد المعلمة جلنار سلاّمhttps://education.ti.com/en/activity/detail/g11--math-absolute-value-equation
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5