Matrix Transformations
Grab vertices of a polygon undergoing reflections and rotations in the coordinate plane to determine the transformation’s type.https://education.ti.com/en/activity/detail/matrix-transformations
Coded Messages
Determine the product of two matrices and calculate the inverse of the 2 X 2 matrix.https://education.ti.com/en/activity/detail/coded-messages
Discriminant Testing
Discover the relationship between the value of the discriminant and the nature of the roots of quadratic functions.https://education.ti.com/en/activity/detail/discriminant-testing
Dilations with Matrices
In this activity, students will use matrices to perform dilations centered at the origin of triangles. Students will explore the effect of the scale factor on the size relationship between the preimage and image of a polygon.https://education.ti.com/en/activity/detail/dilations-with-matrices_1
Graph Logarithms
Investigate the graphs of a family of logarithm functions by changing the a-value over the internal 0 to 4.https://education.ti.com/en/activity/detail/graph-logarithms
Transformations: Translating Functions
Translate different types of function graphs using sliders.https://education.ti.com/en/activity/detail/transformations-translating-functions
Exploring Power Functions 2
Investigate power functions by clicking on a slider.https://education.ti.com/en/activity/detail/exploring-power-functions-2
Exploring Power Functions 1
Examine the graphs of power functions with even and odd positive integer exponents.https://education.ti.com/en/activity/detail/exploring-power-functions-1
Constructing an Ellipse
Students will explore two different methods for constructing an ellipse. Students discover that the sum of the distances from a point on an ellipse to its foci is always constant. This fact is then used as the basis for an algebraic derivation of the general equation for an ellipse centered at th...https://education.ti.com/en/activity/detail/constructing-an-ellipse_1
Application of Polynomials
Students use the volume formula to find cubic polynomials in order to determine the dimensions of four different-size boxes used for packaging trash bags.https://education.ti.com/en/activity/detail/application-of-polynomials
Analyzing an Electricity Bill
This investigation guides the students through using a piecewise function to model an electric bill.https://education.ti.com/en/activity/detail/analyzing-an-electricity-bill
Given the Graph of a Parabola, State its Equation in Vertex Form
This activity is designed for students to study on their own. It is designed in a 'StudyCard' format. A graph of a parabola will be shown. The student is asked to find the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. Press enter on the double up arrow in the Ans... section t...https://education.ti.com/en/activity/detail/given-the-graph-of-a-parabola-state-its-equation-in-vertex-form
Watch Your P' and Q's
Students use the Rational Zero Theorem to find all rational zeros of a polynomial.https://education.ti.com/en/activity/detail/watch-your-p-and-qs
Functions and Inverses
Grab and drag a point along graphs of different functions to determine the relationship of ordered pairs.https://education.ti.com/en/activity/detail/functions-and-inverses
Vertex and Factored Form of Quadratic Functions
Determine the effect of parameters have upon the graph of the quadratic function in vertex and factored form.https://education.ti.com/en/activity/detail/vertex-and-factored-form-of-quadratic-functions
The Quadratic Formula and the Discriminant
الرياضيات للصف الثاني الثانوي - الفصل الدراسي الأول 2-3 القانون العام والمميز The Quadratic Formula and the Discriminant مثال رقم 1 صفحة رقم 110 من كتاب العبيكان عن MC Graw Hill Education إعداد المعلمة جلنار سلاّم.https://education.ti.com/en/activity/detail/the-quadratic-formula-and-the-discriminant
Birthday Problem
Investigate the probability of two people having the same birthday in a crowd of a given size.https://education.ti.com/en/activity/detail/birthday-problem
The Park Problem
The goal of this activity is for students to see a real world application of a minimization problem. Students have to determine where to place a track inside a park to minimize the total distance of the track in Lazy Town.https://education.ti.com/en/activity/detail/the-park-problem
Factoring Trinomials
Discover how the coefficients of a given trinomial affect the factors.https://education.ti.com/en/activity/detail/factoring-trinomials
Radical Functions
Students use a nomograph to investigate functions defined by square roots. Nomographs consist of two or more parallel axes, one for inputs and another for outputs. Input, output pairs that belong to the function are graphed as corresponding points on the axes connected by a ray drawn from the inp...https://education.ti.com/en/activity/detail/radical-functions_1
Exploring the Cycloid Curve
The TI Nspire's animation feature is used to show how a point on a rotating circle creates the cycloid curve. Students then examine the parametric equation of the cycloid. Finally, students are tasked with going online to investigate the terms brachistochronous and tautochronous and their relat...https://education.ti.com/en/activity/detail/exploring-the-cycloid-curve
Expanding Binomials
In this activity, students will explore the link between Pascal's Triangle and the expansion of binomials in the development of the Binomial Theorem.https://education.ti.com/en/activity/detail/expanding-binomials_1
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5