Summing up Geometric Series
This lesson involves clicking on a slider to see that the area of a square that has been systematically divided into an infinite number of pieces approaches 1.https://education.ti.com/en/activity/detail/sum-of-infinite-geometric-series
Quadratic Formula and Discriminant
This interactive quiz first steps students through the derivation of the quadratic formula by completing the square, and then generates random quadratics for which students need to show the steps of solving by first finding the value of the discriminant, and then using it in the formula. There ar...https://education.ti.com/en/activity/detail/quadratic-formula-and-discriminant
Complex Numbers
Students calculate problems from the student worksheet to determine the rules for adding, subtracting, multiplying, and dividing complex numbers.https://education.ti.com/en/activity/detail/complex-numbers_1
Completing the Square Algebraically
Complete the square algebraically to rewrite a quadratic expression.https://education.ti.com/en/activity/detail/completing-the-square-algebraically
Completing the Square
Complete the square in an algebraic expression.https://education.ti.com/en/activity/detail/completing-the-square
Living on the Edge
Students build a solution to a rather complex problem: Finding the edge length of an octahedron given its volume by solving two simpler problems first.https://education.ti.com/en/activity/detail/living-on-the-edge_1
Calculations at the Crazy Cookie Company
Performing matrix multiplication for the first time, students are prompted to use reasoning skills to determine if matrix products are possible for given pairs of matrices. The tutorial leads them through matrix product operations to find rules for matrix multiplication and predicting dimensions ...https://education.ti.com/en/activity/detail/calculations-at-the-crazy-cookie-company
Complex Number Multiplication
This lesson involves the product of complex numbers, powers of i and complex conjugates.https://education.ti.com/en/activity/detail/complex-number-multiplication
Complex Number Addition
This lesson involves the addition of two complex numbers.https://education.ti.com/en/activity/detail/complex-number-addition
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Vernier - Freezing and Melting of Water
In this lesson, students will collect and analyze data of freezing and melting water.https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water
Modeling Basketball and Golf shots with Quadratics
Students learn the quadratic equation in vertex form by modeling President Obama shooting hoops. Then attempt to hit a hole-in-one on 3 holes of golf by determining the equation of the flight of the ball. The activity concludes with a 10-question quiz.https://education.ti.com/en/activity/detail/modeling-basketball-and-golf-shots-with-quadratics
Big Data Sets - Median income
Using the data in the TNS file on Median Income, students can explore trends of workers aged 15 and over across gender, race, occupation, and education and by state as of 2020.https://education.ti.com/en/activity/detail/exploring-data-sets@-median-income
Modeling Herd Immunity
In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.https://education.ti.com/en/activity/detail/modeling-herd-immunity
Modeling: Exploring Medical Tests Results
In this activity, students investigate ideas that have appeared in many sources related to the recent pandemic. They will become familiar with terms such as false positives and false negatives, prevalence, sensitivity and specificity.https://education.ti.com/en/activity/detail/modeling@-exploring-medical-tests-results
Modeling Mantid Striking Distance
In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire
Unit Circle Cruncher
In this coding activity, students will create two Unit Circle Guessing games. The first version will request cosine and sine values in degree mode. The second version will request cosine and sine values in radian mode.https://education.ti.com/en/activity/detail/unit-circle-cruncher
Paying off a Loan
In this coding activity, students will write a program that asks for the principle, annual interest rate and monthly payment. The output will display the approximate number of months it will take to pay off as well as the total amount paid.https://education.ti.com/en/activity/detail/paying-off-a-loan
Cybersecurity 3 - Hail, Caesar!
Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.https://education.ti.com/en/activity/detail/cybersecurity-3
Cybersecurity 6- Brute Force
Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.https://education.ti.com/en/activity/detail/cybersecurity-6
Cybersecurity 7- Pick the Lock
This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?https://education.ti.com/en/activity/detail/cybersecurity-7
Cybersecurity 2 - Channel Surfing
Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message ...https://education.ti.com/en/activity/detail/cybersecurity-2-@-channel-surfing
Ratios Within and Between Scaled Shapes
This activity allows students to reason about ratio tables, which helps their understanding of what a ratio describes in a context and what quantities in equivalent ratios have in common.https://education.ti.com/en/activity/detail/ratios-within-and-between-scaled-shapes
Watch the Birdie Breathe
In this lesson, students will analyze a graph of data representing the relationship between the environmental temperature and the resulting metabolism of an endothermic animal.https://education.ti.com/en/activity/detail/watch-the-birdie-breathe