Boomerangs Phil and Cath make and sell boomerangs for a school event. The money they raise will go to charity. They plan to make them in two sizes: small and large. Phil will carve them from wood. The small boomerang takes 2 hours to carve and the large one takes 3 hours to carve. Phil has a total of 24 hours available for carving. Cath will decorate them. She only has time to decorate 10 boomerangs of either size. The small boomerang will make $8 for charity. The large boomerang will make $10 for charity. They want to make as much money for charity as they can. How many small and large boomerangs should they make? How much money will they then make?

Student materials

Maximizing Profit: Selling Boomerangs © 2015 MARS, Shell Center, University of Nottingham

S-1

Sample Responses to Discuss: Alex

What assumptions has Alex made?

Are these assumptions correct? Explain your answer.

General comments:

Student materials

Maximizing Profit: Selling Boomerangs © 2015 MARS, Shell Center, University of Nottingham

S-2

Sample Responses to Discuss: Danny

Why do you think Danny starts with 0 small and 8 large boomerangs and stops at 6 small and 3 large boomerangs?

What piece of information has Danny forgotten to use?

General comments:

Student materials

Maximizing Profit: Selling Boomerangs © 2015 MARS, Shell Center, University of Nottingham

S-3

Sample Responses to Discuss: Jeremiah

Is it correct to use the equals sign in equations 1, 2 and 3? Explain your answer?

Why is Jeremiah’s solution incomplete?

General comments:

Student materials

Maximizing Profit: Selling Boomerangs © 2015 MARS, Shell Center, University of Nottingham

S-4

Sample Responses to Discuss: Tanya

What is the purpose of the graph?

What is the point of figuring out the slope and intercept?

General comments:

Student materials

Maximizing Profit: Selling Boomerangs © 2015 MARS, Shell Center, University of Nottingham

S-5

Our group’s method is different from all sample responses

Because:

OR

Because:

My own method is different from all of the sample responses

Controlling variables systematically

Creating inequalities

the most appropriate activities.)

(a)

Maximizing Profit: Selling Boomerangs © 2015 MARS, Shell Center, University of Nottingham

(b)

What I found difficult about (a) solving this problem and (b) the mathematics in the problem was:

Because:

S-6

Of all the methods I have seen, the one that I prefer is: My own / Our group’s / Alex’s / Danny’s / Jeremiah’s / Tanya’s / Other (Circle)

Because:

(insert name of sample response)

Our group’s method is similar to the sample response of:

Because:

(insert name of sample response)

OR

Solving simultaneous equations

Drawing graphs

My own method is similar to the sample response of:

Creating equations

Calculating costs and times

Whilst working on the Boomerangs task I could see that this problem could involve: (Mark

Student materials

5.

4.

3.

2.

1.

How Did You Work?

Boomerang task.pdf

Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

497KB Sizes 5 Downloads 163 Views

Recommend Documents

impossible boomerang attack and its application to the ... - Springer Link
Aug 10, 2010 - Department of Mathematics and Computer Science, Eindhoven University of Technology,. 5600 MB Eindhoven, The Netherlands e-mail: [email protected] .... AES-128/192/256, and MA refers to the number of memory accesses. The reminder of

Watch Boomerang (1992) Full Movie Online.pdf
Page 1 of 1. Page 1 of 1. Watch Boomerang (1992) Full Movie Online.pdf. Watch Boomerang (1992) Full Movie Online.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Watch Boomerang (1992) Full Movie Online.pdf.

pdf-14109\49-the-bombay-boomerang-the-hardy-boys ...
pdf-14109\49-the-bombay-boomerang-the-hardy-boys-from-grosset-dunlap.pdf. pdf-14109\49-the-bombay-boomerang-the-hardy-boys-from-grosset-dunlap.pdf.

Hash Functions and the (Amplified) Boomerang Attack
longer be considered secure collision free hash functions. These attacks use ... Damgård extension domain and their compression function is build upon a block cipher in Davies-Meyer mode: the ...... 1nu001------1--1-100-1-10-un-0n-. 08:.

Avoiding the Boomerang: Testing the Relative ...
Data were obtained from 3608 students in grades 5 through 12 in 10 schools. The ethni- cally diverse ... media campaign to reduce “risky” behaviors and to promote ... For example, to the best of ...... more it changed perceptions of social norms.

Watch Boomerang (2015) Full Movie Online.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Watch Boomerang (2015) Full Movie Online.pdf. Watch Boomerang (2015) Full Movie Online.pdf. Open. Extract. O

Hash Functions and the (Amplified) Boomerang Attack
variant (so-called amplified boomerang attack [9]), can be adapted to the hash function ..... We managed to place five auxiliary differentials ..... in Fast Software Encryption – FSE'07, Lecture Notes in Computer Science, Springer-Verlag,. 2007.

Avoiding the Boomerang: Testing the Relative ...
Data were obtained from 3608 students in grades 5 through 12 in 10 schools. .... nally driven in one population, it may be nor- ...... Social Marketing: Theoretical and Practical Per- ... the norm: a strategy to decrease binge drinking among.

Watch Boomerang (1992) Full Movie Online.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Watch Boomerang (1992) Full Movie Online.pdf. Watch Boomerang (1992) Full Movie Online.pdf. Open. Extract. O

impossible boomerang attack and its application to the ... - Springer Link
Aug 10, 2010 - Department of Mathematics and Computer Science, Eindhoven University of .... Source. AES-128. 1. Square. 7. 2119−2128CP. 2120Enc. [21].