Please enable JavaScript to use CodeHS

AK 6-8: 6.GCEI.C.01

CodeHS Lessons

Explain how computing impacts people's' everyday activities and explore carriers related to the field of computer science.

8.7 The Impact of the Internet
8.7 The Impact of the Internet
12.7 The Impact of the Internet
2.7 Impact of the Internet
4.3 Hacking Ethics
9.9 Common Security Problems
24.10 Impact of the Internet
21.7 Hacking Ethics
2.7 Hacking Ethics
7.4 Common Security Problems
9.11 Impact of the Internet
2.7 Hacking Ethics
5.10 Common Security Problems
9.10 Impact of the Internet
2.7 Hacking Ethics
8.6 Common Security Problems
10.10 Impact of the Internet
2.7 Hacking Ethics
5.8 Impact of the Internet
2.11 Impact of the Internet
7.11 Impact of the Internet
2.7 Hacking Ethics
8.9 Common Security Problems
10.10 Impact of the Internet
1.5 Hacking Ethics
1.6 Common Security Problems
5.4 Future of Computing
8.13 Impact of the Internet
3.7 The Impact of the Internet
7.8 Future of Computing
13.1 Project: The Effects of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
2.5 Future of Computing
9.7 The Impact of the Internet
4.5 Future of Computing
7.7 The Impact of the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
1.5 Future of Computing
1.8 The Impact of the Internet
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
2.5 Future of Computing
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
2.5 Future of Computing
1.12 Hacking Ethics
4.5 Future of Computing
1.12 Hacking Ethics
2.5 Future of Computing
1.11 Hacking Ethics
1.12 Common Security Problems
4.5 Future of Computing
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics