Education Technology
< Previous | 5525 - 5550 of 17688 results |  Next >

The Ambiguous Case of the Sine Law

Investigation and practice of the Ambiguous Case of the Law of Sines using the TI-Nspire.
https://education.ti.com/en/activity/detail/the-ambiguous-case-of-the-sine-law

Parameters in Secondary School: Logistics Functions

Designed for prospective secondary mathematics teachers, this activity has students predict, test and justify the effects of changing parameters d and b for the logistic function family given by f(x) = a/(1+b(e)^(cx)) + d. Reflection questions draw attention to the role of claims and evidence, in...
https://education.ti.com/en/activity/detail/parameters-in-secondary-school-logistics-functions

Polar Point Plotting

The student will be given a brief overview of the Polar Coordinate system. Students will be able to manipulate the radius of a polar point while graphing it on the plane or manipulate the angle and see the polar coordinate graphed on the plane. This activity is meant as an introduction to polar p...
https://education.ti.com/en/activity/detail/polar-point-plotting

Properties of Matrices

Students will learn three properties of matrices by following this activity.
https://education.ti.com/en/activity/detail/properties-of-matrices

Modeling Engine Power

In this activity, students use the TI-Nspire handheld to determine if a linear model or a quadratic model best fits a set of given data involving engine power. Students look at the pattern of data points and the sum of squares of the deviations to determine which model fits the data.
https://education.ti.com/en/activity/detail/modeling-engine-power

Linear Programming

This activity adds a twist to a traditional linear programming problem by using the features of the TI-Nspire handheld.
https://education.ti.com/en/activity/detail/linear-programming

Exponential Growth and Decay

This activity is a few word problems that involve some formulas that use exponential growth and decay.
https://education.ti.com/en/activity/detail/exponential-growth-and-decay

Duckweed: Exponential Growth

Students will count the fronds of duckweed for nine days to observe the growth phase. Students will need one class period to start the experiment and one day for the final work and 15 minutes per day between start and finish.
https://education.ti.com/en/activity/detail/duckweed--exponential-growth

The Factor Connection

In this activity, students will explore the connection between linear factors and quadratic functions. Transformations of quadratic functions will be used to develop and enhance the connection between factors, zeros, and graphs. It will make full use of the dynamic ability to manipulate graphs...
https://education.ti.com/en/activity/detail/the-factor-connection

Solving Exponential Equations

Numeric, graphical and algebraic solutions to an exponential equation.
https://education.ti.com/en/activity/detail/solving-exponential-equations

Drawing Dynamic Vectors with NSpire

This is a "how to" file for drawing vectors with a split screen with NSpire.
https://education.ti.com/en/activity/detail/drawing-dynamic-vectors-with-nspire

Eccentricity of Polar Equations of Conics

This activity will give students a series of polar equations of conics to discover a pattern of the eccentricity of each type of conic.
https://education.ti.com/en/activity/detail/eccentricity-of-polar-equations-of-conics

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5

Solution 11942: Converting Mixed Numbers to Improper Fractions on the TI-83 Plus Family of Graphing Calculators.

Solution 11942: Converting Mixed Numbers to Improper Fractions on the TI-83 Plus Family of Graphing Calculators. Solution 11942: Converting Mixed Numbers to Improper Fractions on the TI-83 Plus Family of Graphing Calculators. global Solution 11942: Converting Mixed Numbers to Improper F...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/11942

Solution 34494: Creating a Scatter Plot on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators.

Solution 34494: Creating a Scatter Plot on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators. Solution 34494: Creating a Scatter Plot on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators. global Solution 34494: Creating a Scatter Plot on the TI-83 Plus and TI-84 Pl...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34494

Solution 34495: Converting Mixed Numbers to Improper Fractions on the TI-84 Plus Family of Graphing Calculators.

Solution 34495: Converting Mixed Numbers to Improper Fractions on the TI-84 Plus Family of Graphing Calculators. Solution 34495: Converting Mixed Numbers to Improper Fractions on the TI-84 Plus Family of Graphing Calculators. global Solution 34495: Converting Mixed Numbers to Imprope...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34495

What does "i" do?

The purpose of our lesson is to allow students to foster an understanding of what happens geometrically when a number is multiplied by i. This shall be achieved by working through the lesson using an investigative approach.
https://education.ti.com/en/activity/detail/what-does-i-do

Shuffleboard Slide with Proportions

In this coding activity, students will create a shuffleboard game using Python and mathematics. 
https://education.ti.com/en/activity/detail/shuffleboard-slide

Putt Putt with Python

In this coding activity, students will create a golf game.  The golf game gives the user two random points, one for the golf ball and one for the golf hole.  The user will enter a value for the slope.
https://education.ti.com/en/activity/detail/putt-putt-with-python

Gettin' Trig-y with Python

In this Python coding activity, students will write a program that generates a random sine, cosine or tangent ratio.  It will ask the user to enter a different trigonometric ratio based on the given triangle information. It will evaluate the user’s input. 
https://education.ti.com/en/activity/detail/gettin-trigy-with-python

Frisbee Golf Equations

In this coding activity, students will create a frisbee golf game, using Python and mathematics.   
https://education.ti.com/en/activity/detail/frisbee-golf-equations

Fraction Tic Tac Toe

In this coding activity, students will create a fraction based, tic tac toe game using Python and mathematics. 
https://education.ti.com/en/activity/detail/fraction-tic-tac-toe

Integer Darts

In this coding activity, students will create an integer dart game using Python and mathematics. 
https://education.ti.com/en/activity/detail/integer-darts

Cybersecurity 6- Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.
https://education.ti.com/en/activity/detail/cybersecurity-6