Computing with Mathematical Formulas
Evaluate formulas for given values of a variable.https://education.ti.com/en/activity/detail/computing-with-mathematical-formulas
Comparing Linear and Exponential Data
Compare a linear and an exponential relationship.https://education.ti.com/en/activity/detail/comparing-linear-and-exponential-data
Multiplication & Division of Functions
Students will determine the resulting functions produced from the multiplication and division of two functions. They will explore the graphical representation of the resulting function and support their algebraic solution by determining if the graphs coincide. Additionally, students will evaluate...https://education.ti.com/en/activity/detail/multiplication--division-of-functions
From Rumor to Chaos
This lesson involves modeling the spread of a rumor and similar problems.https://education.ti.com/en/activity/detail/from-rumor-to-chaos
Properties of Logarithms - IB
In this activity, students will compare logarithmic properties to their exponential counterparts.https://education.ti.com/en/activity/detail/properties-of-logarithms
Greatest Common Divisor and Least Common Multiple
Investigate GCD and LCM in applications.https://education.ti.com/en/activity/detail/greatest-common-divisor-and-least-common-multiple
The Slope of the Curve Where Two Points Meet
Students will enter a function and investigate the slope of the secant as it moves closer to becoming a tangent.https://education.ti.com/en/activity/detail/the-slope-of-the-curve-where-two-points-meet
The Function Elevator
This lesson involves creating and comparing graphical representations of position and velocity functions from a scenario.https://education.ti.com/en/activity/detail/the-function-elevator
Quadratic Formula and Discriminant
This interactive quiz first steps students through the derivation of the quadratic formula by completing the square, and then generates random quadratics for which students need to show the steps of solving by first finding the value of the discriminant, and then using it in the formula. There ar...https://education.ti.com/en/activity/detail/quadratic-formula-and-discriminant
Inverse Fun
Investigate inverses of functions.https://education.ti.com/en/activity/detail/inverse-fun
Max Area, Fixed Perimeter
The student will use a rectangle of fixed perimeter to find the dimensions of the rectangle of maximum area.https://education.ti.com/en/activity/detail/max-area-fixed-perimeter
Exponential vs. Power
Compare rates of growth between an exponential function and a power function for positive x-values.https://education.ti.com/en/activity/detail/exponential-vs--power
When Is Tangent, tangent?
This activity combines the ideas of unit circle, and a line tangent to the unit circle to explain how Tangent (the trig. ratio) is related to the concept of tangent to a figure (from geometry). The intent is to briefly explore the mathematical history of the trigonometric ratio "tangent" through ...https://education.ti.com/en/activity/detail/when-is-tangent-tangent
Advanced Algebra Nomograph
This activity is similar to a function machine. The nomograph is comprised of two vertical number lines, input on the left and output on the right. The transformation of input to output is illustrated dynamically by an arrow that connects a domain entry to its range value. Students try to find th...https://education.ti.com/en/activity/detail/advanced-algebra-nomograph
Complex Number Multiplication
This lesson involves the product of complex numbers, powers of i and complex conjugates.https://education.ti.com/en/activity/detail/complex-number-multiplication
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Inverse of Two Temps
Students find a conversion equation that will calculate the corresponding Celsius temperature for any given Fahrenheit temperature. Students learn to graph scatter plots, analyze and graph linear equations, compute and model slope, derive and apply a conversion equation, and analyze inverse relat...https://education.ti.com/en/activity/detail/inverse-of-two-temps
Vernier - What Causes the Seasons?
In this activity, students' will explore how the tilt of the earth's axis results in different amounts of solar radiation at different times of the year, causing seasons. They will simulate the earth's warming using a light bulb that will shine on a Temperature Probe attached to a globe, and inve...https://education.ti.com/en/activity/detail/vernier--what-causes-the-seasons
Vernier - Freezing and Melting of Water
In this experiment, the cooling and warming behavior of a familiar substance, water, will be investigated. By examining graphs of the data, the freezing and melting temperatures of water will be determined and compared.https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water_1
Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators.
... Home | TI-83 Plus and TI-84 Plus family of products Knowledge Base Knowledge Base Search How many characters can I display with the Input or Disp programming commands on th...https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34493
Big Data Sets - Median income
Using the data in the TNS file on Median Income, students can explore trends of workers aged 15 and over across gender, race, occupation, and education and by state as of 2020.https://education.ti.com/en/activity/detail/exploring-data-sets@-median-income
Cybersecurity 2 - Channel Surfing
Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing
Diffusion Data Collection Lab
In this lesson, students will use varying molarities of a salt solution to observe diffusion through a membrane.https://education.ti.com/en/activity/detail/diffusion-data-collection-lab
Heart and Lungs - Making Them Work
In this lesson, students will study the effect of exercise on heart rate, respiratory rate and air flow in and out of the lungs.https://education.ti.com/en/activity/detail/heart-and-lungs--making-them-work