Please enable JavaScript to use CodeHS

Arkansas Cybersecurity Year 2: CSCS.Y2.6.2

CodeHS Lessons

Discuss and apply best practices of program design and format (e.g., descriptive names, documentation, indentation, user experience design, whitespace). Discuss the vulnerabilities of not applying best practices of program design, format, and distribution

12.2 Assessing Risks
23.1 Programming Concepts
5.1 Programming Concepts
13.2 Assessing Risks
13.2 Assessing Risks
17.1 Programming Concepts
16.2 Assessing Risks
21.1 Programming Concepts
4.1 Programming Concepts
8.2 Assessing Risks