Education Technology
< Previous | 2050 - 2075 of 10249 results |  Next >

Summing up Geometric Series

This lesson involves clicking on a slider to see that the area of a square that has been systematically divided into an infinite number of pieces approaches 1.
https://education.ti.com/en/activity/detail/sum-of-infinite-geometric-series

Quadratic Formula and Discriminant

This interactive quiz first steps students through the derivation of the quadratic formula by completing the square, and then generates random quadratics for which students need to show the steps of solving by first finding the value of the discriminant, and then using it in the formula. There ar...
https://education.ti.com/en/activity/detail/quadratic-formula-and-discriminant

Complex Numbers

Students calculate problems from the student worksheet to determine the rules for adding, subtracting, multiplying, and dividing complex numbers.
https://education.ti.com/en/activity/detail/complex-numbers_1

Completing the Square Algebraically

Complete the square algebraically to rewrite a quadratic expression.
https://education.ti.com/en/activity/detail/completing-the-square-algebraically

Completing the Square

Complete the square in an algebraic expression.
https://education.ti.com/en/activity/detail/completing-the-square

Living on the Edge

Students build a solution to a rather complex problem: Finding the edge length of an octahedron given its volume by solving two simpler problems first.
https://education.ti.com/en/activity/detail/living-on-the-edge_1

Calculations at the Crazy Cookie Company

Performing matrix multiplication for the first time, students are prompted to use reasoning skills to determine if matrix products are possible for given pairs of matrices. The tutorial leads them through matrix product operations to find rules for matrix multiplication and predicting dimensions ...
https://education.ti.com/en/activity/detail/calculations-at-the-crazy-cookie-company

Complex Number Multiplication

This lesson involves the product of complex numbers, powers of i and complex conjugates.
https://education.ti.com/en/activity/detail/complex-number-multiplication

Complex Number Addition

This lesson involves the addition of two complex numbers.
https://education.ti.com/en/activity/detail/complex-number-addition

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5

Vernier - Freezing and Melting of Water

In this lesson, students will collect and analyze data of freezing and melting water.
https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water

Modeling Basketball and Golf shots with Quadratics

Students learn the quadratic equation in vertex form by modeling President Obama shooting hoops. Then attempt to hit a hole-in-one on 3 holes of golf by determining the equation of the flight of the ball. The activity concludes with a 10-question quiz.
https://education.ti.com/en/activity/detail/modeling-basketball-and-golf-shots-with-quadratics

Big Data Sets - Median income

Using the data in the TNS file on Median Income, students can explore trends of workers aged 15 and over across gender, race, occupation, and education and by state as of 2020. 
https://education.ti.com/en/activity/detail/exploring-data-sets@-median-income

Modeling Herd Immunity

In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.
https://education.ti.com/en/activity/detail/modeling-herd-immunity

Modeling: Exploring Medical Tests Results

In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.
https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results

Modeling Mantid Striking Distance

In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.
https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire

Unit Circle Cruncher

In this coding activity, students will create two Unit Circle Guessing games.  The first version will request cosine and sine values in degree mode.  The second version will request cosine and sine values in radian mode.
https://education.ti.com/en/activity/detail/unit-circle-cruncher

Paying off a Loan

In this coding activity, students will write a program that asks for the principle, annual interest rate and monthly payment.  The output will display the approximate number of months it will take to pay off as well as the total amount paid.
https://education.ti.com/en/activity/detail/paying-off-a-loan

Cybersecurity 3 - Hail, Caesar!

Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.
https://education.ti.com/en/activity/detail/cybersecurity-3

Cybersecurity 6- Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.
https://education.ti.com/en/activity/detail/cybersecurity-6

Cybersecurity 7- Pick the Lock

This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?
https://education.ti.com/en/activity/detail/cybersecurity-7

Cybersecurity 2 - Channel Surfing

Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...
https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing

Ratios Within and Between Scaled Shapes

This activity allows students to reason about ratio tables, which helps their understanding of what a ratio describes in a context and what quantities in equivalent ratios have in common.
https://education.ti.com/en/activity/detail/ratios-within-and-between-scaled-shapes

Watch the Birdie Breathe

In this lesson, students will analyze a graph of data representing the relationship between the environmental temperature and the resulting metabolism of an endothermic animal.
https://education.ti.com/en/activity/detail/watch-the-birdie-breathe