Complex Numbers
Students calculate problems from the student worksheet to determine the rules for adding, subtracting, multiplying, and dividing complex numbers.https://education.ti.com/en/activity/detail/complex-numbers_1
Complex Numbers: Plotting and Polar Form
This activity is designed for students who have had prior experience with complex numbers. They first refresh their memories of basic operations with complex numbers. Students then learn to plot complex numbers. Students learn the basics of writing complex numbers in their polar forms and compari...https://education.ti.com/en/activity/detail/complex-numbers-plotting-and-polar-form
Investigating the Graphs of Quadratic Equations
A graph of a quadratic equation will be shown. Also shown is the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. And an ordered pair for one the points on the parabola will be shown on the screen. Use the pointer tool to double click on the equation on the graph screen. This wil...https://education.ti.com/en/activity/detail/investigating-the-graphs-of-quadratic-equations
Combinations
This activity introduces students to combinations. They derive the formula for the number of combinations of n objects taken r at a time by starting with a list of permutations and eliminating those that name the same group, just in a different order. From here they see how the number of combinat...https://education.ti.com/en/activity/detail/combinations
Living on the Edge
Students build a solution to a rather complex problem: Finding the edge length of an octahedron given its volume by solving two simpler problems first.https://education.ti.com/en/activity/detail/living-on-the-edge_1
Calculations at the Crazy Cookie Company
Performing matrix multiplication for the first time, students are prompted to use reasoning skills to determine if matrix products are possible for given pairs of matrices. The tutorial leads them through matrix product operations to find rules for matrix multiplication and predicting dimensions ...https://education.ti.com/en/activity/detail/calculations-at-the-crazy-cookie-company
Application of Function Composition
Determine the domain and range of two functions and the composite functions.https://education.ti.com/en/activity/detail/application-of-function-composition
Exponential vs. Power
Compare rates of growth between an exponential function and a power function for positive x-values.https://education.ti.com/en/activity/detail/exponential-vs--power
When Is Tangent, tangent?
This activity combines the ideas of unit circle, and a line tangent to the unit circle to explain how Tangent (the trig. ratio) is related to the concept of tangent to a figure (from geometry). The intent is to briefly explore the mathematical history of the trigonometric ratio "tangent" through ...https://education.ti.com/en/activity/detail/when-is-tangent-tangent
Watch Your P' and Q's
Students use the Rational Zero Theorem to find all rational zeros of a polynomial.https://education.ti.com/en/activity/detail/watch-your-p-and-qs
Advanced Algebra Nomograph
This activity is similar to a function machine. The nomograph is comprised of two vertical number lines, input on the left and output on the right. The transformation of input to output is illustrated dynamically by an arrow that connects a domain entry to its range value. Students try to find th...https://education.ti.com/en/activity/detail/advanced-algebra-nomograph
Function Composition
Explore the composition of a linear and a quadratic function.https://education.ti.com/en/activity/detail/function-composition
Complex Number Multiplication
This lesson involves the product of complex numbers, powers of i and complex conjugates.https://education.ti.com/en/activity/detail/complex-number-multiplication
Complex Number Addition
This lesson involves the addition of two complex numbers.https://education.ti.com/en/activity/detail/complex-number-addition
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Vernier - Freezing and Melting of Water
In this experiment, the cooling and warming behavior of a familiar substance, water, will be investigated. By examining graphs of the data, the freezing and melting temperatures of water will be determined and compared.https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water_1
Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators.
Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators. Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 P...https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34493
Cybersecurity 6- Brute Force
Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.https://education.ti.com/en/activity/detail/cybersecurity-6
Cybersecurity 7- Pick the Lock
This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?https://education.ti.com/en/activity/detail/cybersecurity-7
Cybersecurity 2 - Channel Surfing
Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing
What Makes Us Stick Together?
In this lesson, students will use a simulation to understand a macroscopic view of what occurs microscopically when two nonmetals react.https://education.ti.com/en/activity/detail/what-makes-us-stick-together
Writing Chemical Formulas
In this lesson, students practice writing chemical formulas for ionic binary compounds.https://education.ti.com/en/activity/detail/writing-chemical-formulas
Punnett Squares
In this lesson, students will discover how traits can be passed on from parents to offspring.https://education.ti.com/en/activity/detail/punnett-squares
Cell-ebrating Life
In this lesson, students will explore and learn about the major components of animal and plant cells.https://education.ti.com/en/activity/detail/cellebrating-life