Education Technology
< Previous | 3250 - 3275 of 8511 results |  Next >

Quadratic Functions and Stopping Distance

Analyze data in real-life applications of the quadratic function.
https://education.ti.com/en/activity/detail/quadratic-functions-and-stopping-distance

Investigating the Graphs of Quadratic Equations

A graph of a quadratic equation will be shown. Also shown is the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. And an ordered pair for one the points on the parabola will be shown on the screen. Use the pointer tool to double click on the equation on the graph screen. This wil...
https://education.ti.com/en/activity/detail/investigating-the-graphs-of-quadratic-equations

Advanced Algebra Nomograph

This activity is similar to a function machine. The nomograph is comprised of two vertical number lines, input on the left and output on the right. The transformation of input to output is illustrated dynamically by an arrow that connects a domain entry to its range value. Students try to find th...
https://education.ti.com/en/activity/detail/advanced-algebra-nomograph

Solving Logarithmic Equations

Numeric, graphical and algebraic solutions to logarithmic equations.
https://education.ti.com/en/activity/detail/solving-logarithmic-equations

Cybersecurity 1: All Clear

Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...
https://education.ti.com/en/activity/detail/cybersecurity-1

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5

Certificate of Mathematical Excellence

Want to recognize an outstanding math student? Download this certificate. 
https://education.ti.com/en/activity/detail/math-student-certificates

Vernier - Freezing and Melting of Water

In this lesson, students will collect and analyze data of freezing and melting water.
https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water

Solution 11942: Converting Mixed Numbers to Improper Fractions on the TI-83 Plus Family of Graphing Calculators.

...of products Knowledge Base Knowledge Base Search How do I convert mixed numbers to improper fractions (and vice versa) using the TI-83 family, TI-84 Plus family and TI-Nspire handheld in TI-84 Plus mode? To convert mixed numbers to improper fractions (an...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/11942

Solution 34495: Converting Mixed Numbers to Improper Fractions on the TI-84 Plus Family of Graphing Calculators.

...of products Knowledge Base Knowledge Base Search How do I convert mixed numbers to improper fractions (and vice versa) on the TI-84 Plus family of graphing calculators? To convert mixed numbers to improper fractions (and vice versa) using the TI-84 Plus f...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34495

Trigonometry Made Easy - Trial Edition

In Trigonometry Made Easy - Trial Edition, students will use TI-Nspire™ technology to explore common trig problems utilizing step-by-step processes.
https://education.ti.com/en/activity/detail/trigonometry-made-easy-@-trial-edition

Polar Necessities

Students will graphically and algebraically find the slope of the tangent line at a point on a polar graph. Finding the area of a region of a polar curve will be determined using the area formula.
https://education.ti.com/en/activity/detail/polar-necessities

Big Data Sets - Median income

Using the data in the TNS file on Median Income, students can explore trends of workers aged 15 and over across gender, race, occupation, and education and by state as of 2020. 
https://education.ti.com/en/activity/detail/exploring-data-sets@-median-income

Modeling Herd Immunity

In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.
https://education.ti.com/en/activity/detail/modeling-herd-immunity

Optimizing Resources Using Census Data

In this activity, students investigate how to optimize resources to maximize support for people in danger from flooding.
https://education.ti.com/en/activity/detail/optimizing-resources-using-census-data

Modeling: Exploring Medical Tests Results

In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.
https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results

Modeling Mantid Striking Distance

In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.
https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire

Modeling The Game of Hog

This activity engages students in a dice game with the goal of finding the optimum strategy for winning, in this case, maximizing the possible number of points when tossing dice as long as no sixes show up in a toss. 
https://education.ti.com/en/activity/detail/modeling-game-of-hog

Integer Quadratic Zeros

In this Python coding activity, students will explore factored equations, and create a game to practice finding integer x-intercepts for equations.
https://education.ti.com/en/activity/detail/integer-quadratic-zeros

Lights on the International Space Station

In this lesson, students will discover how various factors affect lighting by using different types of flashlights and battery strenghts.
https://education.ti.com/en/activity/detail/lights-on-the-international-space-station

Cybersecurity 3 - Hail, Caesar!

Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.
https://education.ti.com/en/activity/detail/cybersecurity-3

Cybersecurity 6- Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.
https://education.ti.com/en/activity/detail/cybersecurity-6

Cybersecurity 7- Pick the Lock

This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?
https://education.ti.com/en/activity/detail/cybersecurity-7

Cybersecurity 2 - Channel Surfing

Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...
https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing