Please enable JavaScript to use CodeHS

FL FOC: 1.05

CodeHS Lessons

Describe ethical, privacy, and security issues and problems associated with computers and information systems.

Standard
2.4 Privacy & Security
2.7 Hacking Ethics
7.5 Software Licenses
7.6 Application Security
8.3 The Value of Data
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
1.11 Hacking Ethics
11.3 The Value of Data
Standard
6.6 Software Licenses
6.8 Application Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.8 Application Security
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
5.5 Software Licenses
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
2.7 Software Licenses
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
12.7 Hacking Ethics
13.5 Software Licenses
13.6 Application Security
14.3 The Value of Data
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
6.5 Software Licenses
6.6 Application Security
9.3 The Value of Data
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
3.5 Software Licenses
3.6 Application Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.5 Software Licenses
1.6 Application Security
Standard
2.1 Privacy & Security
3.5 Software Licenses
3.6 Application Security
Standard
5.6 Privacy & Security
5.12 Software Licenses
5.13 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
7.5 Software Licenses
7.6 Application Security
17.3 The Value of Data
Standard
10.4 Privacy & Security
Standard
1.7 Software Licenses
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
6.5 Software Licenses
6.6 Application Security
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
4.5 Software Licenses
4.6 Application Security
5.4 The Value of Data
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.5 Software Licenses
1.6 Application Security
Standard
3.6 Privacy & Security
3.11 Hacking Ethics