Education Technology
< Previous | 925 - 950 of 7186 results |  Next >

Complex Numbers

Students calculate problems from the student worksheet to determine the rules for adding, subtracting, multiplying, and dividing complex numbers.
https://education.ti.com/en/activity/detail/complex-numbers_1

Complex Numbers: Plotting and Polar Form

This activity is designed for students who have had prior experience with complex numbers. They first refresh their memories of basic operations with complex numbers. Students then learn to plot complex numbers. Students learn the basics of writing complex numbers in their polar forms and compari...
https://education.ti.com/en/activity/detail/complex-numbers-plotting-and-polar-form

Investigating the Graphs of Quadratic Equations

A graph of a quadratic equation will be shown. Also shown is the equation of the parabola in vertex form: y = a*(x - h)^(2) + v. And an ordered pair for one the points on the parabola will be shown on the screen. Use the pointer tool to double click on the equation on the graph screen. This wil...
https://education.ti.com/en/activity/detail/investigating-the-graphs-of-quadratic-equations

Combinations

This activity introduces students to combinations. They derive the formula for the number of combinations of n objects taken r at a time by starting with a list of permutations and eliminating those that name the same group, just in a different order. From here they see how the number of combinat...
https://education.ti.com/en/activity/detail/combinations

Living on the Edge

Students build a solution to a rather complex problem: Finding the edge length of an octahedron given its volume by solving two simpler problems first.
https://education.ti.com/en/activity/detail/living-on-the-edge_1

Calculations at the Crazy Cookie Company

Performing matrix multiplication for the first time, students are prompted to use reasoning skills to determine if matrix products are possible for given pairs of matrices. The tutorial leads them through matrix product operations to find rules for matrix multiplication and predicting dimensions ...
https://education.ti.com/en/activity/detail/calculations-at-the-crazy-cookie-company

Application of Function Composition

Determine the domain and range of two functions and the composite functions.
https://education.ti.com/en/activity/detail/application-of-function-composition

Exponential vs. Power

Compare rates of growth between an exponential function and a power function for positive x-values.
https://education.ti.com/en/activity/detail/exponential-vs--power

When Is Tangent, tangent?

This activity combines the ideas of unit circle, and a line tangent to the unit circle to explain how Tangent (the trig. ratio) is related to the concept of tangent to a figure (from geometry). The intent is to briefly explore the mathematical history of the trigonometric ratio "tangent" through ...
https://education.ti.com/en/activity/detail/when-is-tangent-tangent

Watch Your P' and Q's

Students use the Rational Zero Theorem to find all rational zeros of a polynomial.
https://education.ti.com/en/activity/detail/watch-your-p-and-qs

Advanced Algebra Nomograph

This activity is similar to a function machine. The nomograph is comprised of two vertical number lines, input on the left and output on the right. The transformation of input to output is illustrated dynamically by an arrow that connects a domain entry to its range value. Students try to find th...
https://education.ti.com/en/activity/detail/advanced-algebra-nomograph

Function Composition

Explore the composition of a linear and a quadratic function.
https://education.ti.com/en/activity/detail/function-composition

Complex Number Multiplication

This lesson involves the product of complex numbers, powers of i and complex conjugates.
https://education.ti.com/en/activity/detail/complex-number-multiplication

Complex Number Addition

This lesson involves the addition of two complex numbers.
https://education.ti.com/en/activity/detail/complex-number-addition

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5

Vernier - Freezing and Melting of Water

In this experiment, the cooling and warming behavior of a familiar substance, water, will be investigated. By examining graphs of the data, the freezing and melting temperatures of water will be determined and compared.
https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water_1

Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators.

Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators. Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 P...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34493

Cybersecurity 6- Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.
https://education.ti.com/en/activity/detail/cybersecurity-6

Cybersecurity 7- Pick the Lock

This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?
https://education.ti.com/en/activity/detail/cybersecurity-7

Cybersecurity 2 - Channel Surfing

Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...
https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing

What Makes Us Stick Together?

In this lesson, students will use a simulation to understand a macroscopic view of what occurs microscopically when two nonmetals react.
https://education.ti.com/en/activity/detail/what-makes-us-stick-together

Writing Chemical Formulas

In this lesson, students practice writing chemical formulas for ionic binary compounds.
https://education.ti.com/en/activity/detail/writing-chemical-formulas

Punnett Squares

In this lesson, students will discover how traits can be passed on from parents to offspring.
https://education.ti.com/en/activity/detail/punnett-squares

Cell-ebrating Life

In this lesson, students will explore and learn about the major components of animal and plant cells.
https://education.ti.com/en/activity/detail/cellebrating-life