Please enable JavaScript to use CodeHS

Georgia Introduction to Hardware Technology - Outline

  1. Digital Citizenship and Cyber Hygiene

    1. 1.1 Welcome to Introduction to Hardware Technology

    2. Notes 1.1.1 Course Introduction
    3. Free Response 1.1.2 Course Goals
    4. 1.2 Digital Footprint and Reputation

    5. Video 1.2.1 Digital Footprint and Reputation
    6. Check for Understanding 1.2.2 Digital Footprint and Reputation
    7. Free Response 1.2.3 Building a Positive Digital Footprint
    8. Connection 1.2.4 Right to be Forgotten?
    9. Free Response 1.2.5 Right to be Forgotten
    10. Free Response 1.2.6 What is your Digital Footprint?
    11. 1.3 Privacy & Security

    12. Video 1.3.1 What is Data Privacy & Security?
    13. Check for Understanding 1.3.2 Privacy & Security Quiz
    14. Connection 1.3.3 How Strong is your Password?
    15. Free Response 1.3.4 How Strong is your password?
    16. Example 1.3.5 Guess: Password List
    17. Example 1.3.6 Guess: Using an Algorithm
    18. Example 1.3.7 Guess: Brute Force
    19. Connection 1.3.8 Google Privacy Policy Search
    20. Free Response 1.3.9 Google Privacy Policy Search
    21. Resource 1.3.10 Is Your Head in the Cloud?
    22. Example 1.3.11 You Can Be Tracked!
    23. 1.4 Creative Credit & Copyright

    24. Video 1.4.1 Creative Credit and Copyright
    25. Check for Understanding 1.4.2 Creative Credit and Copyright
    26. Free Response 1.4.3 Cite!
    27. Connection 1.4.4 Exploring Creative Commons
    28. Free Response 1.4.5 Respond: Creative Commons
    29. Free Response 1.4.6 Finding Images
    30. Free Response 1.4.7 Reflection: Why is Copyright Important?
    31. Free Response 1.4.8 Consequences
    32. 1.5 Hacking Ethics

    33. Video 1.5.1 Hacking Ethics & Legality
    34. Check for Understanding 1.5.2 Hacking Ethics & Legality
    35. Connection 1.5.3 Penetration Testing
    36. Free Response 1.5.4 Reflection: Penetration Testing
    37. Connection 1.5.5 Hack the Pentagon?
    38. Free Response 1.5.6 Reflection: Hack the Pentagon
    39. Check for Understanding 1.5.7 Ethical Hacker Agreement
    40. 1.6 Common Security Problems

    41. Video 1.6.1 Common Security Problems
    42. Check for Understanding 1.6.2 Common Security Problems
    43. Connection 1.6.3 Meet Security Engineers at Google
    44. Free Response 1.6.4 Security Engineering Reflection
    45. Video 1.6.5 Living in a Digital World
    46. Free Response 1.6.6 Living in a Digital World
    47. 1.7 Always Connected

    48. Free Response 1.7.1 Pre-Lesson Reflection
    49. Notes 1.7.2 Time to Do Some Research
    50. Connection 1.7.3 Internet Addiction Pt 1
    51. Connection 1.7.4 Internet Addiction Pt 2
    52. Connection 1.7.5 Cell Phone Addiction
    53. Connection 1.7.6 Video Game Addiction
    54. Presentation 1.7.7 Present Your Findings
  2. Operating Systems and Software

    1. 2.1 Software vs. Hardware

    2. Video 2.1.1 Software
    3. Check for Understanding 2.1.2 Software Quiz
    4. Connection 2.1.3 Software Explained
    5. Check for Understanding 2.1.4 Hardware Review
    6. Free Response 2.1.5 Hardware vs. Software
    7. Resource 2.1.6 What Do You Suggest?
    8. 2.2 Operating Systems

    9. Video 2.2.1 Operating Systems
    10. Check for Understanding 2.2.2 Operating Systems Quiz
    11. Example 2.2.3 Detect My OS
    12. Connection 2.2.4 Upgrading a Mac OS
    13. Example 2.2.5 Windows OS Installation Simulation
    14. Free Response 2.2.6 Installing an OS
    15. 2.3 Comparing Operating Systems

    16. Video 2.3.1 Comparing Operating Systems
    17. Check for Understanding 2.3.2 Comparing Operating Systems Quiz
    18. Example 2.3.3 Windows Simulation
    19. Example 2.3.4 MacOS Simulation
    20. Connection 2.3.5 Choose a Linux Distro!
    21. Free Response 2.3.6 Which would you choose?
    22. 2.4 File and Folder Management

    23. Connection 2.4.1 File Management, Pt 1
    24. Connection 2.4.2 File Management, Pt 2
    25. Free Response 2.4.3 Organize These Files!
    26. Presentation 2.4.4 Back Up These Files!
    27. 2.5 Compatibility

    28. Video 2.5.1 Compatibility
    29. Check for Understanding 2.5.2 Compatibility Quiz
    30. Example 2.5.3 What Processor? Windows
    31. Example 2.5.4 What Processor? Mac
    32. Free Response 2.5.5 What Processor are you running?
    33. Connection 2.5.6 Compatibility Testing
    34. Free Response 2.5.7 Compatibility Reflection
    35. 2.6 Software and Applications

    36. Video 2.6.1 Software and Applications
    37. Check for Understanding 2.6.2 Software and Applications Quiz
    38. Example 2.6.3 Spreadsheet Simulation
    39. Example 2.6.4 Messaging Simulation
    40. Example 2.6.5 Kanban Board Simulation
    41. Free Response 2.6.6 Software Simulations
    42. 2.7 Software Licenses

    43. Video 2.7.1 Software Licenses
    44. Check for Understanding 2.7.2 Software Licenses Quiz
    45. Free Response 2.7.3 Do I need a Software License?
    46. Free Response 2.7.4 Is This Original?
    47. 2.8 Software Development

    48. Video 2.8.1 Development Life Cycle
    49. Check for Understanding 2.8.2 Development Life Cycle
    50. Connection 2.8.3 Scrum Framework
    51. Free Response 2.8.4 SCRUM Response
    52. Connection 2.8.5 Using Flowcharts
    53. Presentation 2.8.6 Project: Mapping an App
    54. 2.9 What is Artificial Intelligence?

    55. Video 2.9.1 What is Artificial Intelligence?
    56. Quiz 2.9.2 What is Artificial Intelligence?
    57. Connection 2.9.3 A Day in the Life of AI
    58. Free Response 2.9.4 A Day in the Life of AI
    59. Connection 2.9.5 Guess the Drawing
    60. Connection 2.9.6 Drawing with AI
    61. Free Response 2.9.7 Drawing with AI
    62. 2.10 The Ethics of Artificial Intelligence

    63. Video 2.10.1 The Ethics of Artificial Intelligence
    64. Quiz 2.10.2 The Ethics of Artificial Intelligence
    65. Connection 2.10.3 Bias in Facial Recognition Software
    66. Free Response 2.10.4 Bias in Facial Recognition Software
    67. Notes 2.10.5 Testing a Biased Dataset
    68. Free Response 2.10.6 Debating the Ethics of Self Driving Cars
  3. Hardware

    1. 3.1 Internal Components

    2. Video 3.1.1 Internal Components
    3. Check for Understanding 3.1.2 Internal Components
    4. Connection 3.1.3 Build a Computer
    5. Free Response 3.1.4 Build a Computer
    6. Example 3.1.5 Test Your Brain's RAM!
    7. Free Response 3.1.6 Test Your Brain's RAM! Reflection
    8. Connection 3.1.7 The Machine Instruction Cycle
    9. Connection 3.1.8 Computer Crashes
    10. Free Response 3.1.9 Computer Crashes Reflection
    11. 3.2 Storage Options

    12. Video 3.2.1 Storage Options
    13. Check for Understanding 3.2.2 Storage Options Quiz
    14. Connection 3.2.3 Security of Cloud Storage
    15. Free Response 3.2.4 Security of Cloud Storage
    16. Free Response 3.2.5 Storage Suggestions
    17. 3.3 Lab: Computer Disassembly

    18. Resource 3.3.1 Lab: Computer Disassembly
    19. Connection 3.3.2 Video: Disassemble a Computer
    20. Connection 3.3.3 Article: Disassemble a Computer
    21. 3.4 Peripheral Devices

    22. Video 3.4.1 Peripheral Devices
    23. Check for Understanding 3.4.2 Peripheral Devices
    24. Free Response 3.4.3 Personalized Peripherals
    25. Free Response 3.4.4 IT Help
    26. Free Response 3.4.5 Your Ideal Computer Setup
    27. 3.5 Network Devices

    28. Video 3.5.1 Network Devices
    29. Check for Understanding 3.5.2 Network Devices
    30. Connection 3.5.3 Speed Test
    31. Free Response 3.5.4 Speed Test
    32. Connection 3.5.5 Fiber Optics Bend Light!
    33. Free Response 3.5.6 Fiber Optics Bend Light!
    34. Connection 3.5.7 Ethernet Standards
    35. Free Response 3.5.8 Ethernet Standards
    36. Connection 3.5.9 Copper vs. Fiber Optic
    37. Free Response 3.5.10 Copper vs. Fiber Optic
    38. Free Response 3.5.11 Network Troubleshooting
    39. Connection 3.5.12 Troubleshooting Cable Issues
    40. Free Response 3.5.13 Troubleshooting Cable Issues
    41. 3.6 Laptops and Tablets

    42. Free Response 3.6.1 Form Factor
    43. Connection 3.6.2 Laptop vs. Tablet
    44. Free Response 3.6.3 Laptop vs. Tablet
    45. Notes 3.6.4 Which is best?
    46. Video 3.6.5 Product Chart
    47. Free Response 3.6.6 Device Comparison
    48. 3.7 Mobile Devices

    49. Video 3.7.1 Mobile Devices
    50. Check for Understanding 3.7.2 Mobile Devices Quiz
    51. Connection 3.7.3 How Apple FaceID Works
    52. Free Response 3.7.4 How Apple FaceID Works Response
    53. Free Response 3.7.5 Biometric Data Debate
    54. Connection 3.7.6 BYOD and MDM Concept Map
    55. Free Response 3.7.7 BYOD and MDM Conclusions
    56. 3.8 Lab: Mobile Device Connectivity

    57. Connection 3.8.1 Mobile Device Features
    58. Notes 3.8.2 Mobile Device Simulator
    59. Resource 3.8.3 Lab: Mobile Device Connectivity
    60. 3.9 The Internet of Things

    61. Connection 3.9.1 Internet of Things
    62. Connection 3.9.2 IoT Deep Dive
    63. Free Response 3.9.3 Smart Devices in Your Life
    64. Free Response 3.9.4 IoT Reflection
  4. Project: Troubleshooting

    1. 4.1 Methodology

    2. Notes 4.1.1 Troubleshooting Methodology
    3. Free Response 4.1.2 Identify the Problem
    4. Free Response 4.1.3 Research Solutions
    5. Free Response 4.1.4 Establish a Theory
    6. Free Response 4.1.5 Test the Theory
    7. Free Response 4.1.6 Fix the Problem!
    8. Connection 4.1.7 Diagnostic Tools
    9. 4.2 Support Practice

    10. Exercise 4.2.1 Signal Strength
    11. Exercise 4.2.2 Interference
  5. Networking

    1. 5.1 Introduction to the Internet

    2. Video 5.1.1 Welcome to the Internet
    3. Check for Understanding 5.1.2 Intro to the Internet
    4. Connection 5.1.3 Inside Facebook's Connectivity Lab
    5. Free Response 5.1.4 Connectivity Lab Reflection
    6. 5.2 Impact of the Internet

    7. Video 5.2.1 Impact of the Internet
    8. Check for Understanding 5.2.2 Impact of the Internet
    9. Connection 5.2.3 What is the Digital Divide?
    10. Free Response 5.2.4 What is the Digital Divide?
    11. 5.3 Internet Hardware and Sending Information

    12. Video 5.3.1 Internet Hardware
    13. Check for Understanding 5.3.2 Internet Hardware
    14. Video 5.3.3 Sending Information
    15. Check for Understanding 5.3.4 Sending Information
    16. Connection 5.3.5 The Internet is in the Ocean
    17. Free Response 5.3.6 Internet in the Ocean Reflection
    18. 5.4 Internet Addresses

    19. Video 5.4.1 Internet Addresses
    20. Check for Understanding 5.4.2 Internet Addresses
    21. Free Response 5.4.3 The Need for Addresses
    22. Connection 5.4.4 IPv4 vs. IPv6
    23. Free Response 5.4.5 Reflection: IPv4 vs IPv6
    24. 5.5 Domain Name System (DNS)

    25. Video 5.5.1 Domain Name System (DNS)
    26. Check for Understanding 5.5.2 Domain Name System
    27. Connection 5.5.3 How Does DNS Work?
    28. Free Response 5.5.4 How Does DNS Work?
    29. 5.6 Routing

    30. Video 5.6.1 Routing
    31. Check for Understanding 5.6.2 Routing
    32. Traceroute 5.6.3 Route Tracing
    33. Free Response 5.6.4 Redundancy
    34. 5.7 Packets & Protocols

    35. Video 5.7.1 Packets
    36. Check for Understanding 5.7.2 Packets
    37. Video 5.7.3 Protocols
    38. Check for Understanding 5.7.4 Protocols
    39. Connection 5.7.5 How the Internet Works
    40. Free Response 5.7.6 The Journey of an Image
    41. 5.8 Protocols and Standards

    42. Video 5.8.1 Protocols
    43. Check for Understanding 5.8.2 Protocols Quiz
    44. Video 5.8.3 Standards
    45. Check for Understanding 5.8.4 Standards Quiz
    46. Connection 5.8.5 The New Wireless Standard
    47. Connection 5.8.6 801.11ax
    48. Connection 5.8.7 Wavelength
    49. Free Response 5.8.8 801.11ax FR
    50. 5.9 Viewing a Webpage

    51. Video 5.9.1 Viewing a Webpage
    52. Check for Understanding 5.9.2 Viewing a Webpage
    53. Free Response 5.9.3 Explaining a URL
    54. Connection 5.9.4 Net Neutrality Explained
    55. Connection 5.9.5 FCCs Net Neutrality Rules Officially Repealed
    56. Free Response 5.9.6 Take a Side on Net Neutrality
    57. Connection 5.9.7 Net Neutrality and Cybersecurity
    58. Free Response 5.9.8 Net Neutrality and Cybersecurity Research
    59. 5.10 Network Options

    60. Video 5.10.1 Network Options
    61. Check for Understanding 5.10.2 Network Options Quiz
    62. Connection 5.10.3 What is an SSID?
    63. Free Response 5.10.4 What is an SSID?
    64. Connection 5.10.5 Wireless Threats
    65. Free Response 5.10.6 Wireless Threats
    66. Free Response 5.10.7 Wireless Network Setup
    67. 5.11 Network Administrator

    68. Video 5.11.1 Advanced Devices
    69. Check for Understanding 5.11.2 Advanced Devices Quiz
    70. Connection 5.11.3 Network Administrator Career
    71. Free Response 5.11.4 Network Administrator Career
    72. Free Response 5.11.5 Choosing the Best Devices
    73. Free Response 5.11.6 Network Diagram
    74. 5.12 Network Communication

    75. Video 5.12.1 Network Communication
    76. Check for Understanding 5.12.2 Network Communication Quiz
    77. Example 5.12.3 Setting up a Firewall
    78. Free Response 5.12.4 iptables
    79. Notes 5.12.5 iptables simulation
    80. 5.13 Network Management

    81. Notes 5.13.1 Linux/MacOS vs. Windows
    82. Video 5.13.2 Network Management
    83. Check for Understanding 5.13.3 Network Management Quiz
    84. Example 5.13.4 MacOS Terminal Simulation
    85. Example 5.13.5 Windows Command Prompt Simulation
    86. Video 5.13.6 Windows Command Prompt Spy
    87. Free Response 5.13.7 Windows Command Prompt Spy
    88. Notes 5.13.8 SSH Logs
    89. Example 5.13.9 SSH Logs
    90. Free Response 5.13.10 SSH Logs Submission
    91. 5.14 Advanced Networking

    92. Connection 5.14.1 The OSI Model and Network Attacks
    93. Free Response 5.14.2 The OSI Model and Network Attacks Response
    94. Connection 5.14.3 Encapsulation
    95. Connection 5.14.4 What is Virtualization?
    96. Free Response 5.14.5 Virtualization Response
    97. Free Response 5.14.6 Baseband vs. Broadband
    98. Free Response 5.14.7 Bit Rate vs. Baud Rate
    99. Resource 5.14.8 CSMA/CD vs. CSMA/CA
  6. IT Professionals

    1. 6.1 IT Helpdesk

    2. Connection 6.1.1 The Many Jobs at the IT Helpdesk
    3. Free Response 6.1.2 IT Helpdesk Scavenger Hunt
    4. Free Response 6.1.3 Find an IT Job!
    5. 6.2 Working with Customers

    6. Connection 6.2.1 What is a CRM System?
    7. Free Response 6.2.2 CRM System Reflection
    8. Connection 6.2.3 Customer Service Skills
    9. Free Response 6.2.4 Customer Service Skills Reflection
    10. Free Response 6.2.5 Act it Out!
    11. Free Response 6.2.6 Log it in the CRM!
    12. 6.3 Building a Knowledge Base

    13. Connection 6.3.1 What is a Knowledge Base?
    14. Free Response 6.3.2 Draft a KB Article
    15. Free Response 6.3.3 Share your KB Article
    16. Free Response 6.3.4 Finalize your KB Article
    17. 6.4 Star in a Video!

    18. Connection 6.4.1 Instructional Videos
    19. Connection 6.4.2 Example Tutorial
    20. Free Response 6.4.3 Instructional Video Plan
    21. Free Response 6.4.4 Write the Script
    22. Free Response 6.4.5 Create the Storyboard
    23. Free Response 6.4.6 Record Your Video
    24. 6.5 Keeping a Database

    25. Video 6.5.1 Databases
    26. Check for Understanding 6.5.2 Databases
    27. Free Response 6.5.3 Personally Identifiable Information (PII)
    28. Connection 6.5.4 FERPA
    29. Notes 6.5.5 What is SQL?
    30. Video 6.5.6 How to Structure Data in SQL
    31. Check for Understanding 6.5.7 How to Structure Data in SQL
    32. Example 6.5.8 SQL Table: Tiktok
    33. Example 6.5.9 Customer List
    34. 6.6 Compliance Laws

    35. Connection 6.6.1 IT Compliance
    36. Connection 6.6.2 National Regulation Table
    37. Free Response 6.6.3 Georgia State Regulations
    38. Free Response 6.6.4 Compliance Reflection
    39. 6.7 Asset Management

    40. Notes 6.7.1 IT Asset Management
    41. Connection 6.7.2 What is ITAM?
    42. Connection 6.7.3 Diving Deeper into ITAM
    43. Presentation 6.7.4 ITAM Presentation
    44. 6.8 Emerging Technology and IT

    45. Connection 6.8.1 What is Cloud Computing?
    46. Connection 6.8.2 Cloud Computing and IT
    47. Free Response 6.8.3 Reflection: Cloud Computing
    48. 6.9 Environmental Controls

    49. Video 6.9.1 Environmental Controls
    50. Check for Understanding 6.9.2 Environmental Controls Quiz
    51. Connection 6.9.3 Infographic
    52. Free Response 6.9.4 Infographic FR
    53. Connection 6.9.5 Electrostatic Discharge
    54. Free Response 6.9.6 Your Security Systems
    55. Free Response 6.9.7 Security Design
    56. 6.10 Personal Safety

    57. Free Response 6.10.1 Safety Precautions
    58. Free Response 6.10.2 Electrical Hazards
    59. Connection 6.10.3 Fire Suppression
    60. Free Response 6.10.4 Fire Suppression Response
    61. Connection 6.10.5 Emergency Response Plan
  7. Project: IT Proposal

    1. 7.1 IT Department Proposal

    2. Notes 7.1.1 Project Introduction
    3. Free Response 7.1.2 Find Your Companies
    4. Free Response 7.1.3 Get to Know Your Companies
    5. Free Response 7.1.4 Draft Your Pitch
    6. Presentation 7.1.5 Create Your Presentation
    7. Free Response 7.1.6 Next Steps
  8. Cybersecurity

    1. 8.1 What is Cybersecurity?

    2. Video 8.1.1 What is Cybersecurity?
    3. Check for Understanding 8.1.2 What is Cybersecurity?
    4. Connection 8.1.3 City Services Ransomware
    5. Free Response 8.1.4 Ransomware Reflection
    6. Example 8.1.5 Ransomware Simulator
    7. Connection 8.1.6 Hackers vs. Smart Homes
    8. Free Response 8.1.7 Connectivity Reflection
    9. 8.2 Impact of Cybersecurity

    10. Video 8.2.1 Impact of Cybersecurity
    11. Check for Understanding 8.2.2 Impact of Cybersecurity
    12. Example 8.2.3 Phishing Simulator
    13. Connection 8.2.4 Phishing for Your Info
    14. Free Response 8.2.5 Phishing Reflection
    15. Connection 8.2.6 Cyber Game
    16. Free Response 8.2.7 Cyber Game Reflection
    17. Connection 8.2.8 Cyber Crime Time
    18. Free Response 8.2.9 Cyber Crime Time Reflection
    19. 8.3 Network Attacks

    20. Video 8.3.1 Network Attacks Overview
    21. Check for Understanding 8.3.2 Network Attacks Quiz
    22. Notes 8.3.3 Check for Vulnerabilities
    23. Connection 8.3.4 Bug Bounty Hunting
    24. Free Response 8.3.5 Bug Bounty Hunting
    25. Connection 8.3.6 Common Port Targets
    26. Example 8.3.7 Port Scanner Simulation
    27. Free Response 8.3.8 Open Port Reflection
    28. 8.4 Malware Types and Prevention

    29. Video 8.4.1 Malware Types and Prevention
    30. Check for Understanding 8.4.2 Malware Types and Prevention
    31. Connection 8.4.3 How Anti-malware Works
    32. Free Response 8.4.4 How Anti-malware Works
    33. Free Response 8.4.5 OS Malware Security
    34. Free Response 8.4.6 Reverse Engineering Malware
    35. 8.5 Common Network Attacks

    36. Video 8.5.1 Common Network Attacks
    37. Check for Understanding 8.5.2 Network Attacks
    38. Connection 8.5.3 Social Engineering Hack
    39. Free Response 8.5.4 Social Engineering Reflection
    40. Connection 8.5.5 DDoS Attacks
    41. Example 8.5.6 DDoS Simulation
    42. Free Response 8.5.7 DDoS Reflection
    43. 8.6 Additional Attacks

    44. Video 8.6.1 Additional Attacks
    45. Check for Understanding 8.6.2 Additional Attacks Quiz
    46. Connection 8.6.3 Botnet Attacks - Mirai
    47. Connection 8.6.4 Botnet Attacks - 3ve
    48. Connection 8.6.5 Botnet Attacks - 3ve Video
    49. Free Response 8.6.6 Botnet Attacks - Reflection
    50. Connection 8.6.7 Zero-day Exploit: Stuxnet
    51. Notes 8.6.8 Zero-day Exploit: Stuxnet
    52. Free Response 8.6.9 Zero-day Exploit Reflection
    53. Free Response 8.6.10 US-CERT Current Activity
    54. 8.7 Internal Threats

    55. Video 8.7.1 Internal Threats
    56. Check for Understanding 8.7.2 Internal Threats
    57. Connection 8.7.3 BIOS/UEFI Attack Example
    58. Notes 8.7.4 Accessing BIOS/UEFI
    59. Connection 8.7.5 Causes of Data Breaches
    60. Free Response 8.7.6 Causes of Data Breaches
    61. Connection 8.7.7 Protecting Data at All Times
    62. Free Response 8.7.8 Protecting Data at All Times
  9. Project: Digital Forensics

    1. 9.1 Digital Forensics

    2. Video 9.1.1 Digital Forensics
    3. Connection 9.1.2 Student Success Story
    4. Free Response 9.1.3 Student Success Story Response
    5. 9.2 Forensic Case 1: Logs

    6. Notes 9.2.1 Network Logs
    7. Example 9.2.2 Network Log Evidence
    8. Free Response 9.2.3 Network Logs Conclusion
    9. 9.3 Forensic Case 2: File Metadata

    10. Notes 9.3.1 File Metadata
    11. Example 9.3.2 File Metadata Evidence
    12. Free Response 9.3.3 File Metadata Conclusion
    13. 9.4 Forensic Case 3: Exif Data

    14. Notes 9.4.1 Photo Exif
    15. Connection 9.4.2 Exif Using Inspector
    16. Example 9.4.3 Exif Using the CLI
    17. Free Response 9.4.4 Photo Exif Conclusion
  10. Computer Science Careers

    1. 10.1 Computer Science Careers

    2. Video 10.1.1 Computer Science All Around Us
    3. Quiz 10.1.2 Computer Science All Around Us
    4. Connection 10.1.3 Coding in the Wild
    5. Free Response 10.1.4 Coding in the Wild Response
    6. Connection 10.1.5 Emerging Technologies and Careers
    7. Free Response 10.1.6 The Impact of Emerging Technologies
    8. Resource 10.1.7 Career Research
    9. 10.2 Create an Online Portfolio

    10. Free Response 10.2.1 Online Repositories
    11. Connection 10.2.2 What is a Resume?
    12. Free Response 10.2.3 What is a Resume?
    13. Notes 10.2.4 Upload Relevant Documents
    14. 10.3 Student Organizations

    15. Notes 10.3.1 What Are They?
    16. Free Response 10.3.2 Their Mission
    17. Free Response 10.3.3 Career Development
    18. Free Response 10.3.4 Additional Opportunities
    19. Free Response 10.3.5 Lifelong Lessons
  11. Supplemental: Unit Quizzes

    1. 11.1 Note to Teacher

    2. Notes 11.1.1 Note to Teacher
    3. 11.2 IT Infrastructure Quiz

    4. Unit Quiz 11.2.1 IT Infrastructure Quiz
    5. 11.3 Networking Fundamentals Quiz

    6. Survey 11.3.1 Mindsets
    7. Unit Quiz 11.3.2 Networking Fundamentals Quiz
    8. 11.4 Cyber Defense Quiz

    9. Unit Quiz 11.4.1 Cyber Defense Quiz