Please enable JavaScript to use CodeHS

IN CS 1: CSI-8.1

CodeHS Lessons

Identify computer science occupations and the roles and responsibilities of each.

1.12 Hacking Ethics
11.1 Computer Science Careers
1.12 Hacking Ethics
13.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.8 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
11.1 Computer Science Careers
1.11 Hacking Ethics
12.1 Computer Science Careers
1.12 Hacking Ethics
9.1 Computer Science Careers
6.1 Computer Science Careers
1.1 Computer Science Careers
1.17 Computer Science Careers
9.4 Databases
9.5 Clients and Servers
9.9 Common Security Problems
21.7 Hacking Ethics
2.7 Hacking Ethics
7.1 Clients and Servers
7.4 Common Security Problems
2.7 Hacking Ethics
5.5 Databases
5.6 Clients and Servers
5.10 Common Security Problems
2.7 Hacking Ethics
8.6 Common Security Problems
2.7 Hacking Ethics
5.10 Securing a Network
2.8 Securing a Network
4.3 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
22.3 Databases
22.4 Clients and Servers
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
1.5 Hacking Ethics
1.6 Common Security Problems
7.6 Clients and Servers
2.3 Clients and Servers