Please enable JavaScript to use CodeHS

IL 9-10: 9-10.IC.30

CodeHS Lessons

Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

Standard
7.7 Ethical Issues Around Data Collection
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.8 Cybersecurity
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
13.3 Data Collection & Limitations
Standard
31.1 Practice PT: Steganography
41.1 Cryptography
Standard
2.6 Copyright
Standard
4.1 Collecting and Storing Data
4.9 Challenge: Collecting User Clicks
Standard
8.3 The Value of Data
Standard
2.8 Copyright
Standard
3.2 Big Data and Bias
Standard
2.2 Big Data and Bias
Standard
2.2 Big Data and Bias
Standard
6.6 Copyright
Standard
5.13 Ethical Issues Around Data Collection
Standard
2.6 Copyright
10.1 Collecting and Storing Data
10.9 Challenge: Collecting User Clicks
12.3 The Value of Data
Standard
6.6 Copyright
Standard
6.6 Copyright
Standard
11.4 Collecting and Storing Data
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
Standard
1.6 Copyright
8.1 Collecting and Storing Data
8.9 Challenge: Collecting User Clicks
Standard
14.3 The Value of Data
Standard
9.3 The Value of Data
Standard
6.6 Copyright
Standard
6.6 Copyright
Standard
6.6 Copyright
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
11.6 Copyright
Standard
6.6 Copyright
Standard
7.3 Data Collection & Limitations
Standard
17.3 The Value of Data
Standard
7.9 Cybersecurity
Standard
5.4 The Value of Data
Standard
6.6 Copyright
Standard
2.6 Copyright
Standard
2.6 Copyright
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection
Standard
2.5 Cybersecurity
3.6 Copyright
10.1 Collecting and Storing Data
10.9 Challenge: Collecting User Clicks
Standard
1.5 Cybersecurity
2.6 Copyright
Standard
4.1 Collecting and Storing Data
4.9 Challenge: Collecting User Clicks
Standard
1.5 Cybersecurity
2.6 Copyright
9.1 Collecting and Storing Data
9.9 Challenge: Collecting User Clicks
Standard
7.13 Ethical Issues Around Data Collection
Standard
7.8 Cryptography
10.9 Cybersecurity
12.3 Data Collection & Limitations