Please enable JavaScript to use CodeHS

AL 9-12: 11

CodeHS Lessons

Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world. a. Recognize user tracking methods and hazards. Examples: Cookies, WiFi packet sniffing. b. Understand how to apply techniques to mitigate effects of user tracking methods. c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities. d. Explain the relationship between online privacy and personal security. Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information. e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors. Examples: Cyberbullying/harassment, inappropriate sexual communications. f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

5.6 Cybersecurity
7.8 Browser Configuration
11.10 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
5.6 Cybersecurity
6.8 Browser Configuration
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.3 Cyberbullying
1.5 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
10.2 Cyberbullying
10.3 Internet Safety
10.4 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
14.1 Network Attacks
14.3 Common Network Attacks
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
4.8 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
5.1 Network Attacks
5.3 Common Network Attacks