Please enable JavaScript to use CodeHS

ID 9-10: 9-10.CS.02

CodeHS Lessons

Explore the unique features of embedded computers in areas such as mobile devices, sensors, and vehicles.

Standard
1.2 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
Standard
12.1 Arduino Challenges
12.2 Explore a New Sensor
12.3 Step-by-Step Arduino Project
12.4 Final Project
Standard
14.1 Arduino Challenges
14.2 Explore a New Sensor
14.3 Step-by-Step Arduino Project
14.4 Final Project
Standard
9.1 micro:bit Challenges
9.2 Explore a New Sensor
9.3 Follow a Step-by-Step Project
9.4 Final Project
Standard
10.1 micro:bit Challenges
10.2 Explore a New Sensor
10.3 Follow a Step-by-Step Project
10.4 Final Project
Standard
3.1 micro:bit Challenges
3.2 Explore a New Sensor
3.3 Follow a Step-by-Step Project
3.4 Final Project
Standard
3.1 Arduino Challenges
3.2 Explore a New Sensor
3.3 Step-by-Step Arduino Project
3.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
4.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
10.1 micro:bit Challenges
10.2 Explore a New Sensor
10.3 Follow a Step-by-Step Project
10.4 Final Project
Standard
11.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
16.2 What is Cybersecurity?
7.1 micro:bit Challenges
7.2 Explore a New Sensor
7.3 Follow a Step-by-Step Project
7.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.2 What is Cybersecurity?
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.1 What is Cybersecurity?
Standard
11.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
Standard
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
15.1 micro:bit Challenges
15.2 Explore a New Sensor
15.3 Follow a Step-by-Step Project
15.4 Final Project
Standard
3.7 Explore a New Sensor
8.1 micro:bit Challenges
8.2 Follow a Step-by-Step Project
8.3 Final Project
Standard
3.1 What is Cybersecurity?