Quadratic Functions and Stopping Distance
Analyze data in real-life applications of the quadratic function.https://education.ti.com/en/activity/detail/quadratic-functions-and-stopping-distance
Investigating the Graphs of Quadratic Equations
A graph of a quadratic equation will be shown. Also shown is the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. And an ordered pair for one the points on the parabola will be shown on the screen. Use the pointer tool to double click on the equation on the graph screen. This wil...https://education.ti.com/en/activity/detail/investigating-the-graphs-of-quadratic-equations
Advanced Algebra Nomograph
This activity is similar to a function machine. The nomograph is comprised of two vertical number lines, input on the left and output on the right. The transformation of input to output is illustrated dynamically by an arrow that connects a domain entry to its range value. Students try to find th...https://education.ti.com/en/activity/detail/advanced-algebra-nomograph
Solving Logarithmic Equations
Numeric, graphical and algebraic solutions to logarithmic equations.https://education.ti.com/en/activity/detail/solving-logarithmic-equations
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Certificate of Mathematical Excellence
Want to recognize an outstanding math student? Download this certificate.https://education.ti.com/en/activity/detail/math-student-certificates
Vernier - Freezing and Melting of Water
In this lesson, students will collect and analyze data of freezing and melting water.https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water
Solution 11942: Converting Mixed Numbers to Improper Fractions on the TI-83 Plus Family of Graphing Calculators.
...of products Knowledge Base Knowledge Base Search How do I convert mixed numbers to improper fractions (and vice versa) using the TI-83 family, TI-84 Plus family and TI-Nspire handheld in TI-84 Plus mode? To convert mixed numbers to improper fractions (an...https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/11942
Solution 34495: Converting Mixed Numbers to Improper Fractions on the TI-84 Plus Family of Graphing Calculators.
...of products Knowledge Base Knowledge Base Search How do I convert mixed numbers to improper fractions (and vice versa) on the TI-84 Plus family of graphing calculators? To convert mixed numbers to improper fractions (and vice versa) using the TI-84 Plus f...https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34495
Trigonometry Made Easy - Trial Edition
In Trigonometry Made Easy - Trial Edition, students will use TI-Nspire™ technology to explore common trig problems utilizing step-by-step processes.https://education.ti.com/en/activity/detail/trigonometry-made-easy-@-trial-edition
Polar Necessities
Students will graphically and algebraically find the slope of the tangent line at a point on a polar graph. Finding the area of a region of a polar curve will be determined using the area formula.https://education.ti.com/en/activity/detail/polar-necessities
Big Data Sets - Median income
Using the data in the TNS file on Median Income, students can explore trends of workers aged 15 and over across gender, race, occupation, and education and by state as of 2020.https://education.ti.com/en/activity/detail/exploring-data-sets@-median-income
Modeling Herd Immunity
In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.https://education.ti.com/en/activity/detail/modeling-herd-immunity
Optimizing Resources Using Census Data
In this activity, students investigate how to optimize resources to maximize support for people in danger from flooding.https://education.ti.com/en/activity/detail/optimizing-resources-using-census-data
Modeling: Exploring Medical Tests Results
In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results
Modeling Mantid Striking Distance
In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire
Modeling The Game of Hog
This activity engages students in a dice game with the goal of finding the optimum strategy for winning, in this case, maximizing the possible number of points when tossing dice as long as no sixes show up in a toss.https://education.ti.com/en/activity/detail/modeling-game-of-hog
Integer Quadratic Zeros
In this Python coding activity, students will explore factored equations, and create a game to practice finding integer x-intercepts for equations.https://education.ti.com/en/activity/detail/integer-quadratic-zeros
Lights on the International Space Station
In this lesson, students will discover how various factors affect lighting by using different types of flashlights and battery strenghts.https://education.ti.com/en/activity/detail/lights-on-the-international-space-station
Cybersecurity 3 - Hail, Caesar!
Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.https://education.ti.com/en/activity/detail/cybersecurity-3
Cybersecurity 6- Brute Force
Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.https://education.ti.com/en/activity/detail/cybersecurity-6
Cybersecurity 7- Pick the Lock
This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?https://education.ti.com/en/activity/detail/cybersecurity-7
Cybersecurity 2 - Channel Surfing
Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing