Education Technology
< Previous | 3875 - 3900 of 11148 results |  Next >

Matrix Transformations

Grab vertices of a polygon undergoing reflections and rotations in the coordinate plane to determine the transformation’s type.
https://education.ti.com/en/activity/detail/matrix-transformations

Coded Messages

Determine the product of two matrices and calculate the inverse of the 2 X 2 matrix.
https://education.ti.com/en/activity/detail/coded-messages

Discriminant Testing

Discover the relationship between the value of the discriminant and the nature of the roots of quadratic functions.
https://education.ti.com/en/activity/detail/discriminant-testing

Dilations with Matrices

In this activity, students will use matrices to perform dilations centered at the origin of triangles. Students will explore the effect of the scale factor on the size relationship between the preimage and image of a polygon.
https://education.ti.com/en/activity/detail/dilations-with-matrices_1

Graph Logarithms

Investigate the graphs of a family of logarithm functions by changing the a-value over the internal 0 to 4.
https://education.ti.com/en/activity/detail/graph-logarithms

Transformations: Translating Functions

Translate different types of function graphs using sliders.
https://education.ti.com/en/activity/detail/transformations-translating-functions

Exploring Power Functions 2

Investigate power functions by clicking on a slider.
https://education.ti.com/en/activity/detail/exploring-power-functions-2

Exploring Power Functions 1

Examine the graphs of power functions with even and odd positive integer exponents.
https://education.ti.com/en/activity/detail/exploring-power-functions-1

Constructing an Ellipse

Students will explore two different methods for constructing an ellipse. Students discover that the sum of the distances from a point on an ellipse to its foci is always constant. This fact is then used as the basis for an algebraic derivation of the general equation for an ellipse centered at th...
https://education.ti.com/en/activity/detail/constructing-an-ellipse_1

Application of Polynomials

Students use the volume formula to find cubic polynomials in order to determine the dimensions of four different-size boxes used for packaging trash bags.
https://education.ti.com/en/activity/detail/application-of-polynomials

Analyzing an Electricity Bill

This investigation guides the students through using a piecewise function to model an electric bill.
https://education.ti.com/en/activity/detail/analyzing-an-electricity-bill

Given the Graph of a Parabola, State its Equation in Vertex Form

This activity is designed for students to study on their own. It is designed in a 'StudyCard' format. A graph of a parabola will be shown. The student is asked to find the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. Press enter on the double up arrow in the Ans... section t...
https://education.ti.com/en/activity/detail/given-the-graph-of-a-parabola-state-its-equation-in-vertex-form

Watch Your P' and Q's

Students use the Rational Zero Theorem to find all rational zeros of a polynomial.
https://education.ti.com/en/activity/detail/watch-your-p-and-qs

Functions and Inverses

Grab and drag a point along graphs of different functions to determine the relationship of ordered pairs.
https://education.ti.com/en/activity/detail/functions-and-inverses

Vertex and Factored Form of Quadratic Functions

Determine the effect of parameters have upon the graph of the quadratic function in vertex and factored form.
https://education.ti.com/en/activity/detail/vertex-and-factored-form-of-quadratic-functions

The Quadratic Formula and the Discriminant

الرياضيات للصف الثاني الثانوي - الفصل الدراسي الأول 2-3 القانون العام والمميز The Quadratic Formula and the Discriminant مثال رقم 1 صفحة رقم 110 من كتاب العبيكان عن MC Graw Hill Education إعداد المعلمة جلنار سلاّم.
https://education.ti.com/en/activity/detail/the-quadratic-formula-and-the-discriminant

Birthday Problem

Investigate the probability of two people having the same birthday in a crowd of a given size.
https://education.ti.com/en/activity/detail/birthday-problem

The Park Problem

The goal of this activity is for students to see a real world application of a minimization problem. Students have to determine where to place a track inside a park to minimize the total distance of the track in Lazy Town.
https://education.ti.com/en/activity/detail/the-park-problem

Factoring Trinomials

Discover how the coefficients of a given trinomial affect the factors.
https://education.ti.com/en/activity/detail/factoring-trinomials

Radical Functions

Students use a nomograph to investigate functions defined by square roots. Nomographs consist of two or more parallel axes, one for inputs and another for outputs. Input, output pairs that belong to the function are graphed as corresponding points on the axes connected by a ray drawn from the inp...
https://education.ti.com/en/activity/detail/radical-functions_1

Exploring the Cycloid Curve

The TI Nspire's animation feature is used to show how a point on a rotating circle creates the cycloid curve. Students then examine the parametric equation of the cycloid. Finally, students are tasked with going online to investigate the terms brachistochronous and tautochronous and their relat...
https://education.ti.com/en/activity/detail/exploring-the-cycloid-curve

Expanding Binomials

In this activity, students will explore the link between Pascal's Triangle and the expansion of binomials in the development of the Binomial Theorem.
https://education.ti.com/en/activity/detail/expanding-binomials_1

Cybersecurity 1: All Clear

Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...
https://education.ti.com/en/activity/detail/cybersecurity-1

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5