Please enable JavaScript to use CodeHS

AL 9-12: 11

CodeHS Lessons

Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world. a. Recognize user tracking methods and hazards. Examples: Cookies, WiFi packet sniffing. b. Understand how to apply techniques to mitigate effects of user tracking methods. c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities. d. Explain the relationship between online privacy and personal security. Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information. e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors. Examples: Cyberbullying/harassment, inappropriate sexual communications. f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
Standard
5.1 Network Attacks
5.3 Common Network Attacks
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
4.8 Cyberbullying
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.3 Network Attacks
8.5 Common Network Attacks
Standard
11.9 Cybersecurity
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.10 Cybersecurity
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.7 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
10.2 Cyberbullying
10.3 Internet Safety
10.4 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
1.3 Cyberbullying
1.5 Privacy & Security
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
14.1 Network Attacks
14.3 Common Network Attacks
Standard
1.3 Privacy & Security
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.8 Browser Configuration
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
7.8 Browser Configuration
11.10 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection