Education Technology
< Previous | 7400 - 7425 of 9463 results |  Next >

The Mailbox

Student will use the Measurement tools found in the Geometry menu options or model the image using functions on the Graph page
https://education.ti.com/en/activity/detail/the-mailbox-mg

What is a p-value?

This lesson involves beginning with a null hypothesis specifying the mean of a normally distributed population with a given standard deviation.
https://education.ti.com/en/activity/detail/what-is-a-pvalue_1

What is a p-Value?

Students begin with a null hypothesis specifying the mean of a normally distributed population with a given standard deviation.
https://education.ti.com/en/activity/detail/what-is-a-pvalue

Polar Graphs

Relate polar coordinates to rectangular coordinates and plot polar functions.
https://education.ti.com/en/activity/detail/polar-graphs

Rectangle and Trapezoid Approximations to Definite Integrals

Use visual representation of area estimation methods in order to determine which is most accurate.
https://education.ti.com/en/activity/detail/trapezoid-and-midpoint-rules

It's a Parallelogram, You Say?

Students represent complex numbers in the complex plane as points or vectors and display the sum and difference of two complex numbers as diagonals of the parallelograms they define.
https://education.ti.com/en/activity/detail/its-a-parallelogram-you-say_1

Have You Lost Your Marbles?

In this activity, students will create a bridge between two chairs and use a slinky to attach a bucket to the bridge. Students will add objects to the bucket and determine the relationship between the number of items added and the distance from the floor.
https://education.ti.com/en/activity/detail/have-you-lost-your-marbles

Linear Programming

This activity adds a twist to a traditional linear programming problem by using the features of the TI-Nspire handheld.
https://education.ti.com/en/activity/detail/linear-programming

Application of Polynomials

Students use the volume formula to find cubic polynomials in order to determine the dimensions of four different-size boxes used for packaging trash bags.
https://education.ti.com/en/activity/detail/application-of-polynomials

Application of Function Composition

Determine the domain and range of two functions and the composite functions.
https://education.ti.com/en/activity/detail/application-of-function-composition

Cybersecurity 1: All Clear

Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...
https://education.ti.com/en/activity/detail/cybersecurity-1

Trigonometry Made Easy - Trial Edition

In Trigonometry Made Easy - Trial Edition, students will use TI-Nspire™ technology to explore common trig problems utilizing step-by-step processes.
https://education.ti.com/en/activity/detail/trigonometry-made-easy-@-trial-edition

Modeling: Exploring Medical Tests Results

In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.
https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results

It's the Law!

Students will derive the Law of Cosines by collecting and observing data.
https://education.ti.com/en/activity/detail/it-is-the-law

Paying off a Loan

In this coding activity, students will write a program that asks for the principle, annual interest rate and monthly payment.  The output will display the approximate number of months it will take to pay off as well as the total amount paid.
https://education.ti.com/en/activity/detail/paying-off-a-loan

Cybersecurity 3 - Hail, Caesar!

Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.
https://education.ti.com/en/activity/detail/cybersecurity-3