Education Technology
< Previous | 4000 - 4025 of 12424 results |  Next >

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5

Back to School Posters

Posters and printables to make your classroom ready for the new school year. 
https://education.ti.com/en/activity/detail/back-to-school-posters

Video Tutorials for the TI-Nspire CX Family graphing calculators

Web-based video tutorials answer common questions students and teachers may have when learning how to use the TI-Nspire™ CX family graphing calculators and software.
https://education.ti.com/en/activity/detail/tutorials_nspire-cx

Day at the Beach

In this lesson, students will explore temperature differences in two sets of sand, one dry and one wet.
https://education.ti.com/en/activity/detail/day-at-the-beach

Vernier - Freezing and Melting of Water

In this lesson, students will collect and analyze data of freezing and melting water.
https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water

Modeling Basketball and Golf shots with Quadratics

Students learn the quadratic equation in vertex form by modeling President Obama shooting hoops. Then attempt to hit a hole-in-one on 3 holes of golf by determining the equation of the flight of the ball. The activity concludes with a 10-question quiz.
https://education.ti.com/en/activity/detail/modeling-basketball-and-golf-shots-with-quadratics

Domain and Range 2

Identify the domain and range of a relation from its graph.
https://education.ti.com/en/activity/detail/domain-and-range-2

Polar Necessities

Students will graphically and algebraically find the slope of the tangent line at a point on a polar graph. Finding the area of a region of a polar curve will be determined using the area formula.
https://education.ti.com/en/activity/detail/polar-necessities

Big Data Sets - Median income

Using the data in the TNS file on Median Income, students can explore trends of workers aged 15 and over across gender, race, occupation, and education and by state as of 2020. 
https://education.ti.com/en/activity/detail/exploring-data-sets@-median-income

Modeling Herd Immunity

In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.
https://education.ti.com/en/activity/detail/modeling-herd-immunity

Optimizing Resources Using Census Data

In this activity, students investigate how to optimize resources to maximize support for people in danger from flooding.
https://education.ti.com/en/activity/detail/optimizing-resources-using-census-data

Modeling: Optimal Locations for a Food Truck

In this activity, students will investigate where to locate a food truck in Washington DC to maximize the number of potential customers.
https://education.ti.com/en/activity/detail/food-truck

Modeling Judging a Poster Contest

In this TI-Nspire family activity, students use the ratings made by five judges in a poster competition with the goal of deciding the top three posters based on the ratings made by the judges.
https://education.ti.com/en/activity/detail/modeling-judging-a-poster-contest

Big Data Sets- Well Being OECD

Students can explore the data in this activity from the OECD well-being survey updated July 2022. 
https://education.ti.com/en/activity/detail/exploring-data@-well-being

Modeling Mantid Striking Distance

In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.
https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire

Modeling The Game of Hog

This activity engages students in a dice game with the goal of finding the optimum strategy for winning, in this case, maximizing the possible number of points when tossing dice as long as no sixes show up in a toss. 
https://education.ti.com/en/activity/detail/modeling-game-of-hog

Modeling CO2 Levels

This activity uses data on monthly carbon dioxide (CO2) levels collected from the Mauna Loa Observatory in Hawaii.  It provides an opportunity to engage students with data that is relevant to contemporary discussions of climate change.   
https://education.ti.com/en/activity/detail/modeling-co2-levels

Unit Circle Cruncher

In this coding activity, students will create two Unit Circle Guessing games.  The first version will request cosine and sine values in degree mode.  The second version will request cosine and sine values in radian mode.
https://education.ti.com/en/activity/detail/unit-circle-cruncher

Simulating Fairness

In this coding activity, students will create a simulation for the game “Evens or Odds”.  The simulation will allow students to investigate the fairness of different variations of the game.
https://education.ti.com/en/activity/detail/simulating-fairness

Factor Darts

In this coding activity, students will create a dart game that generates four random quadratic expressions. For each question the player answers correctly, the player will get another shot at the dart board. 
https://education.ti.com/en/activity/detail/factor-darts

Parabolic Hoops

In this coding activity, students will create a virtual basketball court.  Using the location of the hoop and the vertex, the shooter will calculate the amplitude needed to “Swish” nothing but net!
https://education.ti.com/en/activity/detail/parabolic-hoops

Rational Quadratics Zeros

In this coding activity, students will extend the code from Integer Quadratic Zeros to create a game that allows exploration of other factored equation forms.  
https://education.ti.com/en/activity/detail/rational-quadratics-zeros

Cybersecurity 3 - Hail, Caesar!

Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.
https://education.ti.com/en/activity/detail/cybersecurity-3

Cybersecurity 6- Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.
https://education.ti.com/en/activity/detail/cybersecurity-6

Cybersecurity 7- Pick the Lock

This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?
https://education.ti.com/en/activity/detail/cybersecurity-7