The Mailbox
Student will use the Measurement tools found in the Geometry menu options or model the image using functions on the Graph pagehttps://education.ti.com/en/activity/detail/the-mailbox-mg
What is a p-value?
This lesson involves beginning with a null hypothesis specifying the mean of a normally distributed population with a given standard deviation.https://education.ti.com/en/activity/detail/what-is-a-pvalue_1
What is a p-Value?
Students begin with a null hypothesis specifying the mean of a normally distributed population with a given standard deviation.https://education.ti.com/en/activity/detail/what-is-a-pvalue
Polar Graphs
Relate polar coordinates to rectangular coordinates and plot polar functions.https://education.ti.com/en/activity/detail/polar-graphs
Rectangle and Trapezoid Approximations to Definite Integrals
Use visual representation of area estimation methods in order to determine which is most accurate.https://education.ti.com/en/activity/detail/trapezoid-and-midpoint-rules
It's a Parallelogram, You Say?
Students represent complex numbers in the complex plane as points or vectors and display the sum and difference of two complex numbers as diagonals of the parallelograms they define.https://education.ti.com/en/activity/detail/its-a-parallelogram-you-say_1
Have You Lost Your Marbles?
In this activity, students will create a bridge between two chairs and use a slinky to attach a bucket to the bridge. Students will add objects to the bucket and determine the relationship between the number of items added and the distance from the floor.https://education.ti.com/en/activity/detail/have-you-lost-your-marbles
Linear Programming
This activity adds a twist to a traditional linear programming problem by using the features of the TI-Nspire handheld.https://education.ti.com/en/activity/detail/linear-programming
Application of Polynomials
Students use the volume formula to find cubic polynomials in order to determine the dimensions of four different-size boxes used for packaging trash bags.https://education.ti.com/en/activity/detail/application-of-polynomials
Application of Function Composition
Determine the domain and range of two functions and the composite functions.https://education.ti.com/en/activity/detail/application-of-function-composition
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Trigonometry Made Easy - Trial Edition
In Trigonometry Made Easy - Trial Edition, students will use TI-Nspire™ technology to explore common trig problems utilizing step-by-step processes.https://education.ti.com/en/activity/detail/trigonometry-made-easy-@-trial-edition
Modeling: Exploring Medical Tests Results
In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results
It's the Law!
Students will derive the Law of Cosines by collecting and observing data.https://education.ti.com/en/activity/detail/it-is-the-law
Paying off a Loan
In this coding activity, students will write a program that asks for the principle, annual interest rate and monthly payment. The output will display the approximate number of months it will take to pay off as well as the total amount paid.https://education.ti.com/en/activity/detail/paying-off-a-loan
Cybersecurity 3 - Hail, Caesar!
Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.https://education.ti.com/en/activity/detail/cybersecurity-3