NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hemer, David – Australian Mathematics Education Journal, 2020
This paper describes an investigation looking at the underlying mathematics of poker machines. The aim of the investigation is for students to get an appreciation of how poker machines are designed to ensure that in the long-term players will inevitably lose when playing. The first part of this paper describes how students can model a simple poker…
Descriptors: Equipment, Probability, Games, Mathematics Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Bolognese, Chris A. – Teaching Children Mathematics, 2016
Eliciting student thinking is paramount to effective mathematics teaching and learning. Although one can use many strategies and techniques to promote student thinking, technology is one resource that is often underutilized. Whether it is the informed use of calculators or an interactive website, technology can be leveraged to promote mathematical…
Descriptors: Mathematics Instruction, Geometry, Mathematical Logic, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Paoletti, Teo J. – Mathematics Teacher, 2013
To engage students, many teachers wish to connect the mathematics they are teaching to other branches of mathematics or to real-world applications. The lesson presented in this article, which uses the algebraic skill of finding the equation of a line between two points and the geometric axiom that any two points define a line, does both. A…
Descriptors: Mathematics Instruction, Relevance (Education), Algebra, Mathematics Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Quinnell, Lorna – Australian Mathematics Teacher, 2014
The importance of mathematical visual images is indicated by the introductory paragraph in the Statistics and Probability content strand of the Australian Curriculum, which draws attention to the importance of learners developing skills to analyse and draw inferences from data and "represent, summarise and interpret data and undertake…
Descriptors: Foreign Countries, Mathematics Curriculum, National Curriculum, Mathematics Instruction
Peer reviewed Peer reviewed
Spangler, David B. – Mathematics Teaching in the Middle School, 1999
Features a question that focuses on the use of cryptology to teach modes. (ASK)
Descriptors: Coding, Junior High Schools, Mathematics Activities, Mathematics Instruction
Peer reviewed Peer reviewed
Donohoe, L. Joyce – AMATYC Review, 1992
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
Descriptors: Algorithms, Coding, Computer Assisted Instruction, Mathematical Applications
Peer reviewed Peer reviewed
Graviss, Tom; Greaver, Joanne – Mathematics Teacher, 1992
Shares a coded version of the number line to provide concrete experiences for learning abstract concepts. Using the fundamental theorem of arithmetic, appropriate coded symbols are determined for the prime factorization of each natural number and used to study the concepts of greatest common divisor, least common multiple, square roots, and…
Descriptors: Coding, Concept Formation, Grade 9, High Schools
Peer reviewed Peer reviewed
Wheeler, Mary L. – Mathematics Teacher, 1994
Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)
Descriptors: Algebra, Coding, Mathematical Applications, Mathematics Curriculum
Peer reviewed Peer reviewed
Wright, Marie A. – Mathematics Teacher, 1993
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
Descriptors: Coding, Cryptography, Data Processing, Enrichment Activities