Education Technology
< Previous | 1200 - 1225 of 8386 results |  Next >

NASA - Rendezvous For Two

When the space shuttle launches from NASA Kennedy Space Center, it must launch within a certain time frame (called a launch window) in order to successfully dock with the ISS. Launch windows are calculated so that the space shuttle will reach an orbit that is slightly lower than the ISS, but in t...
https://education.ti.com/en/activity/detail/nasa--rendezvous-for-two

Infinite Geometric Series

In this activity, students will explore infinite geometric series. They will consider the effect of the value for the common ratio and determine whether an infinite geometric series converges or diverges. Students will numerically analyze infinite geometric series using spreadsheets.
https://education.ti.com/en/activity/detail/infinite-geometric-series_1

It's All About Food Activity

This is a follow up activity to You Are What You Eat where students are comparing estimated calories versus actual calories and making conjectures based on their scatterplot graphs.
https://education.ti.com/en/activity/detail/its-all-about-food-activity

Law of Sines

In this activity the student will explore the Law of Sines, a theorem involving sine ratios that applies to all triangles.
https://education.ti.com/en/activity/detail/law-of-sines_2

Linear Inequalities in One and Two Variables: Rays and Half Planes

Introduce linear inequalities by relating them to simple inequalities on the number line.
https://education.ti.com/en/activity/detail/linear-inequalities-in-one-and-two-variables-rays-and-half-planes

Graphing Quadratic Functions

Students graph quadratic functions and study how the variables in the equations compare to the coordinates of the vertices and the axes of symmetry in the graphs.
https://education.ti.com/en/activity/detail/graphing-quadratic-functions

Properties of Logarithms - IB

In this activity, students will compare logarithmic properties to their exponential counterparts.
https://education.ti.com/en/activity/detail/properties-of-logarithms

Introducing Absolute Value

This activity introduces absolute value from a data value perspective. Students examine data by comparing individual data points to the mean by finding the difference (positive or negative) and the distance from the mean. They then plot the distances vs. the differences and examine the shape of t...
https://education.ti.com/en/activity/detail/introducing-absolute-value

Horizontal and Vertical Lines

Examine the vertical and horizontal changes when moving from one point to another on a line.
https://education.ti.com/en/activity/detail/horizontal-and-vertical-lines

Permutations & Combinations

Students explore permutations and combinations by arranging letters when order does and does not make a difference.
https://education.ti.com/en/activity/detail/permutations--combinations_1

The Function Elevator

This lesson involves creating and comparing graphical representations of position and velocity functions from a scenario.
https://education.ti.com/en/activity/detail/the-function-elevator

Remember When

In this activity, students will model the relationship between the year and average income, average price of a house, and average price of a car using exponential functions. Then students will answer questions related to the models to gain a deeper understanding of exponential functions.
https://education.ti.com/en/activity/detail/remember-when

Compound Interest

This lesson involves exploring the formula for compound interest as a function of the initial deposit, interest rate, and the number of pay periods per year.
https://education.ti.com/en/activity/detail/compound-interest

Completing the Square Algebraically

Complete the square algebraically to rewrite a quadratic expression.
https://education.ti.com/en/activity/detail/completing-the-square-algebraically

Completing the Square

Complete the square in an algebraic expression.
https://education.ti.com/en/activity/detail/completing-the-square

Combinations

This activity introduces students to combinations. They derive the formula for the number of combinations of n objects taken r at a time by starting with a list of permutations and eliminating those that name the same group, just in a different order. From here they see how the number of combinat...
https://education.ti.com/en/activity/detail/combinations

Exponential vs. Power

Compare rates of growth between an exponential function and a power function for positive x-values.
https://education.ti.com/en/activity/detail/exponential-vs--power

When Is Tangent, tangent?

This activity combines the ideas of unit circle, and a line tangent to the unit circle to explain how Tangent (the trig. ratio) is related to the concept of tangent to a figure (from geometry). The intent is to briefly explore the mathematical history of the trigonometric ratio "tangent" through ...
https://education.ti.com/en/activity/detail/when-is-tangent-tangent

Function Composition

Explore the composition of a linear and a quadratic function.
https://education.ti.com/en/activity/detail/function-composition

Solving Systems with Row Operations 1

Use row operations to reduce an augmented matrix to its reduced row-echelon form.
https://education.ti.com/en/activity/detail/solving-systems-with-row-operations-1

Solving Systems with Row Operations 2

Use matrices as a tool to solve a system of three equations with three unknowns.
https://education.ti.com/en/activity/detail/solving-systems-with-row-operations-2

Complex Number Multiplication

This lesson involves the product of complex numbers, powers of i and complex conjugates.
https://education.ti.com/en/activity/detail/complex-number-multiplication

Cybersecurity 1: All Clear

Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...
https://education.ti.com/en/activity/detail/cybersecurity-1

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5