Please enable JavaScript to use CodeHS

AK 6-8: 6.GCEI.SLE.01

CodeHS Lessons

Differentiate between appropriate and inappropriate content on the Internet, and identify unethical and illegal online behavior.

Standard
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.3 Internet Safety
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.12 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.8 Cyberbullying
Standard
1.2 Digital Footprint and Reputation
1.5 Hacking Ethics
Standard
1.2 Digital Footprint and Reputation
1.5 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
21.7 Hacking Ethics
21.3 Internet Safety
21.2 Cyberbullying
21.1 Digital Footprint and Reputation
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.7 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.12 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.7 Hacking Ethics
Standard
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.3 Internet Safety
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
Standard
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.7 Hacking Ethics
Standard
1.8 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety