Please enable JavaScript to use CodeHS

FL 6-8: SC.68.CS-PC.1.1

CodeHS Lessons

Recognize and describe legal and ethical behaviors when using information and technology and describe the consequences of misuse

Standard
2.6 Copyright
Standard
1.6 Copyright
Standard
4.6 Ethics and Legal Considerations
7.6 Creative Credit & Copyright
Standard
2.8 Copyright
Standard
3.6 Ethics and Legal Considerations
5.6 Creative Credit & Copyright
Standard
9.4 Privacy & Security
Standard
1.6 Creative Credit & Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
11.1 Computer Ethics
Standard
1.7 Privacy & Security
1.11 Hacking Ethics
2.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Copyright
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
Standard
2.6 Creative Credit & Copyright
Standard
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
8.4 Privacy & Security
11.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
4.6 Copyright
Standard
2.1 Privacy & Security
Standard
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.6 Creative Credit & Copyright
3.6 Ethics and Legal Considerations
Standard
4.6 Ethics and Legal Considerations
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
2.9 Ethics and Legal Considerations
5.6 Creative Credit & Copyright
Standard
2.9 Ethics and Legal Considerations
5.6 Creative Credit & Copyright
Standard
2.6 Copyright
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
2.6 Copyright
Standard
2.6 Copyright
Standard
2.7 Ethics and Legal Considerations
6.6 Creative Credit & Copyright
Standard
2.6 Copyright
Standard
2.6 Copyright
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
5.6 Creative Credit & Copyright
Standard
4.4 Privacy & Security
6.6 Copyright
Standard
1.6 Privacy & Security
1.11 Hacking Ethics