Education Technology
< Previous | 2225 - 2250 of 10402 results |  Next >

Solving Systems of Equations Check

This is just a Nspire file that affords the teacher some flexibility in terms of approach. It consists of ten problems with simple substitution.
https://education.ti.com/en/activity/detail/solving-systems-of-equations-check

Solve Systems of Equations Activity Part 2

This activity was created to try to make solving systems more engaging for students by using images from three major movies.
https://education.ti.com/en/activity/detail/solve-systems-of-equations-activity-part-2

Solving Systems Using Pictures!

This activity consists of three separate problems where students have to use systems of linear equations to find the points of intersection of various objects.
https://education.ti.com/en/activity/detail/solving-systems-using-pictures

Complex Number Multiplication

This lesson involves the product of complex numbers, powers of i and complex conjugates.
https://education.ti.com/en/activity/detail/complex-number-multiplication

Complex Number Addition

This lesson involves the addition of two complex numbers.
https://education.ti.com/en/activity/detail/complex-number-addition

Cybersecurity 1: All Clear

Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...
https://education.ti.com/en/activity/detail/cybersecurity-1

Cybersecurity 4- What's Your Password?

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...
https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password

Cybersecurity 5 - Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...
https://education.ti.com/en/activity/detail/cybersecurity-5

Video Tutorials for the TI-Nspire CX Family graphing calculators

Web-based video tutorials answer common questions students and teachers may have when learning how to use the TI-Nspire™ CX family graphing calculators and software.
https://education.ti.com/en/activity/detail/tutorials_nspire-cx

Inverse of Two Temps

Students find a conversion equation that will calculate the corresponding Celsius temperature for any given Fahrenheit temperature. Students learn to graph scatter plots, analyze and graph linear equations, compute and model slope, derive and apply a conversion equation, and analyze inverse relat...
https://education.ti.com/en/activity/detail/inverse-of-two-temps

Vernier - Freezing and Melting of Water

In this lesson, students will collect and analyze data of freezing and melting water.
https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water

Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators.

Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators. Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 P...
https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34493

Modeling Herd Immunity

In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.
https://education.ti.com/en/activity/detail/modeling-herd-immunity

Modeling: Optimal Locations for a Food Truck

In this activity, students will investigate where to locate a food truck in Washington DC to maximize the number of potential customers.
https://education.ti.com/en/activity/detail/food-truck

Modeling Mantid Striking Distance

In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.
https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire

Modeling CO2 Levels

This activity uses data on monthly carbon dioxide (CO2) levels collected from the Mauna Loa Observatory in Hawaii.  It provides an opportunity to engage students with data that is relevant to contemporary discussions of climate change.   
https://education.ti.com/en/activity/detail/modeling-co2-levels

Shuffleboard Slide with Proportions

In this coding activity, students will create a shuffleboard game using Python and mathematics. 
https://education.ti.com/en/activity/detail/shuffleboard-slide

Unit Circle Cruncher

In this coding activity, students will create two Unit Circle Guessing games.  The first version will request cosine and sine values in degree mode.  The second version will request cosine and sine values in radian mode.
https://education.ti.com/en/activity/detail/unit-circle-cruncher

Factor Darts

In this coding activity, students will create a dart game that generates four random quadratic expressions. For each question the player answers correctly, the player will get another shot at the dart board. 
https://education.ti.com/en/activity/detail/factor-darts

Parabolic Hoops

In this coding activity, students will create a virtual basketball court.  Using the location of the hoop and the vertex, the shooter will calculate the amplitude needed to “Swish” nothing but net!
https://education.ti.com/en/activity/detail/parabolic-hoops

Cybersecurity 3 - Hail, Caesar!

Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.
https://education.ti.com/en/activity/detail/cybersecurity-3

Cybersecurity 6- Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.
https://education.ti.com/en/activity/detail/cybersecurity-6

Ratios Within and Between Scaled Shapes

This activity allows students to reason about ratio tables, which helps their understanding of what a ratio describes in a context and what quantities in equivalent ratios have in common.
https://education.ti.com/en/activity/detail/ratios-within-and-between-scaled-shapes

Transformational Geometry Summary - Lesson Bundle

In this interactive video lesson, students will explore translations, reflections, rotations, and dilations. The lesson gives students a chance to summarize their learning from the individual transformational geometry lesson bundles.   Check out our videos for this bun...
https://education.ti.com/en/activity/detail/transformational-geometry-summary

Arctic Wars - Lynx vs. Snowshoe Hare

In this lesson, students will investigate a population with cycling patterns that exist between a predator and its prey.
https://education.ti.com/en/activity/detail/arctic-wars--lynx-vs--snowshoe-hare