Coded Messages
Determine the product of two matrices and calculate the inverse of the 2 X 2 matrix.https://education.ti.com/en/activity/detail/coded-messages
Linear-Quadratic Inequalities
Explore the solutions of a linear-quadratic and quadratic-quadratic system of inequalities.https://education.ti.com/en/activity/detail/linearquadratic-inequalities
Linear Systems and Calories
Set up and solve systems of equations.https://education.ti.com/en/activity/detail/linear-systems-and-calories
Discriminant Testing
Discover the relationship between the value of the discriminant and the nature of the roots of quadratic functions.https://education.ti.com/en/activity/detail/discriminant-testing
Transformations: Translating Functions
Translate different types of function graphs using sliders.https://education.ti.com/en/activity/detail/transformations-translating-functions
Exploring Power Functions 1
Examine the graphs of power functions with even and odd positive integer exponents.https://education.ti.com/en/activity/detail/exploring-power-functions-1
Application of Polynomials
Students use the volume formula to find cubic polynomials in order to determine the dimensions of four different-size boxes used for packaging trash bags.https://education.ti.com/en/activity/detail/application-of-polynomials
Application of Linear Systems
Students will solve a real-world problem about parking cars and buses using a system of linear inequalities.https://education.ti.com/en/activity/detail/application-of-linear-systems
Watch Your P' and Q's
Students use the Rational Zero Theorem to find all rational zeros of a polynomial.https://education.ti.com/en/activity/detail/watch-your-p-and-qs
Functions and Inverses
Grab and drag a point along graphs of different functions to determine the relationship of ordered pairs.https://education.ti.com/en/activity/detail/functions-and-inverses
Vertex and Factored Form of Quadratic Functions
Determine the effect of parameters have upon the graph of the quadratic function in vertex and factored form.https://education.ti.com/en/activity/detail/vertex-and-factored-form-of-quadratic-functions
Families of Functions
Change sliders and observe the effects on the graphs of the functions.https://education.ti.com/en/activity/detail/families-of-functions
The Painted Cube
This lesson involves having the students hypothesize about the different relationships that exist between the size of the cube and the number of cubes that have paint on one, two, three, and zero faces. In order to help students visualize the problem, interlocking cubes could be made available.https://education.ti.com/en/activity/detail/the-painted-cube
Factoring Trinomials
Discover how the coefficients of a given trinomial affect the factors.https://education.ti.com/en/activity/detail/factoring-trinomials
Solving Logarithmic Equations
Numeric, graphical and algebraic solutions to logarithmic equations.https://education.ti.com/en/activity/detail/solving-logarithmic-equations
Solving Systems with Row Operations 1
Use row operations to reduce an augmented matrix to its reduced row-echelon form.https://education.ti.com/en/activity/detail/solving-systems-with-row-operations-1
Solving Systems with Row Operations 2
Use matrices as a tool to solve a system of three equations with three unknowns.https://education.ti.com/en/activity/detail/solving-systems-with-row-operations-2
Function or Not a Function
Examine some input-output relations to determine if a relation is a function.https://education.ti.com/en/activity/detail/function-or-not-a-function
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Back to School Posters
Posters and printables to make your classroom ready for the new school year.https://education.ti.com/en/activity/detail/back-to-school-posters
Video Tutorials for the TI-Nspire CX Family graphing calculators
Web-based video tutorials answer common questions students and teachers may have when learning how to use the TI-Nspire™ CX family graphing calculators and software.https://education.ti.com/en/activity/detail/tutorials_nspire-cx
Day at the Beach
In this lesson, students will explore temperature differences in two sets of sand, one dry and one wet.https://education.ti.com/en/activity/detail/day-at-the-beach
Transformations: Dilating Functions
Dilate and reflect different types of function graphs by grabbing points.https://education.ti.com/en/activity/detail/transformations-dilating-functions