Please enable JavaScript to use CodeHS

IA 3A: 3A-CS-01

CodeHS Lessons

Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.

2.8 Super Karel
2.8 Super Karel
2.16 Ultra Karel
2.16 Ultra Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
22.4 Clients and Servers
22.12 Project: Security Assessment Report
22.4 Clients and Servers
22.12 Project: Security Assessment Report
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
2.8 Abstraction
2.8 Abstraction
2.9 Super Karel
2.9 Super Karel
3.8 Abstraction
3.8 Abstraction
3.9 Super Karel
3.9 Super Karel
3.8 Abstraction
3.8 Abstraction
3.9 Super Karel
3.9 Super Karel
2.8 Super Karel
2.8 Super Karel
1.8 Super Karel
1.8 Super Karel
2.8 Super Karel
2.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
11.8 Super Karel
6.8 Super Karel
6.8 Super Karel
1.8 Super Karel
1.8 Super Karel
2.8 Super Karel
2.8 Super Karel
2.8 Super Karel
2.8 Super Karel
1.8 Super Karel
1.8 Super Karel
1.8 Super Karel
1.8 Super Karel
6.4 Clients and Servers
10.1 Project: Security Assessment Report
6.4 Clients and Servers
10.1 Project: Security Assessment Report
9.5 Clients and Servers
9.5 Clients and Servers
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
7.1 Clients and Servers
7.1 Clients and Servers
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
5.6 Clients and Servers
5.6 Clients and Servers
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
7.6 Clients and Servers
7.6 Clients and Servers
6.4 Clients and Servers
6.4 Clients and Servers
11.1 Project: Security Assessment Report
11.1 Project: Security Assessment Report
2.3 Clients and Servers
2.3 Clients and Servers
8.5 Clients and Servers
8.5 Clients and Servers
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
2.1 Introduction to jQuery
4.11 Using APIs
6.3 Using a CMS
1.8 Abstraction
1.9 Super Karel
4.7 JavaScript vs Karel
1.8 Abstraction
1.9 Super Karel
1.19 Ultra Karel
1.9 Abstraction
1.10 Super Karel
1.19 Ultra Karel
5.7 JavaScript vs Karel
1.9 Abstraction
1.10 Super Karel
1.19 Ultra Karel
5.7 JavaScript vs Karel
1.8 Abstraction
8.9 Wrapper Classes: Integers and Doubles
8.10 Using the Math Class
1.8 Abstraction
8.9 Wrapper Classes: Integers and Doubles
8.10 Using the Math Class
1.8 Abstraction
1.9 Super Karel
1.17 Ultra Karel
5.7 Python vs Karel
2.9 Wrapper Classes: Integers and Doubles
2.10 Using the Math Class