Solving Systems of Equations Check
This is just a Nspire file that affords the teacher some flexibility in terms of approach. It consists of ten problems with simple substitution.https://education.ti.com/en/activity/detail/solving-systems-of-equations-check
Solve Systems of Equations Activity Part 2
This activity was created to try to make solving systems more engaging for students by using images from three major movies.https://education.ti.com/en/activity/detail/solve-systems-of-equations-activity-part-2
Solving Systems Using Pictures!
This activity consists of three separate problems where students have to use systems of linear equations to find the points of intersection of various objects.https://education.ti.com/en/activity/detail/solving-systems-using-pictures
Complex Number Multiplication
This lesson involves the product of complex numbers, powers of i and complex conjugates.https://education.ti.com/en/activity/detail/complex-number-multiplication
Complex Number Addition
This lesson involves the addition of two complex numbers.https://education.ti.com/en/activity/detail/complex-number-addition
Cybersecurity 1: All Clear
Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listeni...https://education.ti.com/en/activity/detail/cybersecurity-1
Cybersecurity 4- What's Your Password?
Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that...https://education.ti.com/en/activity/detail/cybersecurity-4@-whats-your-password
Cybersecurity 5 - Turn the (Rainbow) Tables
Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used password...https://education.ti.com/en/activity/detail/cybersecurity-5
Video Tutorials for the TI-Nspire CX Family graphing calculators
Web-based video tutorials answer common questions students and teachers may have when learning how to use the TI-Nspire™ CX family graphing calculators and software.https://education.ti.com/en/activity/detail/tutorials_nspire-cx
Inverse of Two Temps
Students find a conversion equation that will calculate the corresponding Celsius temperature for any given Fahrenheit temperature. Students learn to graph scatter plots, analyze and graph linear equations, compute and model slope, derive and apply a conversion equation, and analyze inverse relat...https://education.ti.com/en/activity/detail/inverse-of-two-temps
Vernier - Freezing and Melting of Water
In this lesson, students will collect and analyze data of freezing and melting water.https://education.ti.com/en/activity/detail/vernier--freezing-and-melting-of-water
Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators.
Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 Plus and TI-84 Plus Family of Graphing Calculators. Solution 34493: Maximum Number of Characters on One Line When Using the Input or Disp Programming Commands on the TI-83 P...https://education.ti.com/en/customer-support/knowledge-base/ti-83-84-plus-family/product-usage/34493
Modeling Herd Immunity
In this activity, students investigate the concept of herd immunity and the role vaccines/interventions can play in helping to control the spread of a communicable disease.https://education.ti.com/en/activity/detail/modeling-herd-immunity
Modeling: Optimal Locations for a Food Truck
In this activity, students will investigate where to locate a food truck in Washington DC to maximize the number of potential customers.https://education.ti.com/en/activity/detail/food-truck
Modeling Mantid Striking Distance
In this TI-Nspire activity, students investigate the relationship between how hungry a praying mantis (also called a “mantid”) is and the distance at which the praying mantis will strike (jump) at prey.https://education.ti.com/en/activity/detail/modeling-mantid-striking-distance_nspire
Modeling CO2 Levels
This activity uses data on monthly carbon dioxide (CO2) levels collected from the Mauna Loa Observatory in Hawaii. It provides an opportunity to engage students with data that is relevant to contemporary discussions of climate change.https://education.ti.com/en/activity/detail/modeling-co2-levels
Shuffleboard Slide with Proportions
In this coding activity, students will create a shuffleboard game using Python and mathematics.https://education.ti.com/en/activity/detail/shuffleboard-slide
Unit Circle Cruncher
In this coding activity, students will create two Unit Circle Guessing games. The first version will request cosine and sine values in degree mode. The second version will request cosine and sine values in radian mode.https://education.ti.com/en/activity/detail/unit-circle-cruncher
Factor Darts
In this coding activity, students will create a dart game that generates four random quadratic expressions. For each question the player answers correctly, the player will get another shot at the dart board.https://education.ti.com/en/activity/detail/factor-darts
Parabolic Hoops
In this coding activity, students will create a virtual basketball court. Using the location of the hoop and the vertex, the shooter will calculate the amplitude needed to “Swish” nothing but net!https://education.ti.com/en/activity/detail/parabolic-hoops
Cybersecurity 3 - Hail, Caesar!
Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.https://education.ti.com/en/activity/detail/cybersecurity-3
Cybersecurity 6- Brute Force
Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.https://education.ti.com/en/activity/detail/cybersecurity-6
Ratios Within and Between Scaled Shapes
This activity allows students to reason about ratio tables, which helps their understanding of what a ratio describes in a context and what quantities in equivalent ratios have in common.https://education.ti.com/en/activity/detail/ratios-within-and-between-scaled-shapes
Transformational Geometry Summary - Lesson Bundle
In this interactive video lesson, students will explore translations, reflections, rotations, and dilations. The lesson gives students a chance to summarize their learning from the individual transformational geometry lesson bundles.  Check out our videos for this bun...https://education.ti.com/en/activity/detail/transformational-geometry-summary
Arctic Wars - Lynx vs. Snowshoe Hare
In this lesson, students will investigate a population with cycling patterns that exist between a predator and its prey.https://education.ti.com/en/activity/detail/arctic-wars--lynx-vs--snowshoe-hare