Please enable JavaScript to use CodeHS

Montana 9-12: CS.IC.9-12.11

CodeHS Lessons

evaluate the social and economic implications of privacy in the context of safety, law, or ethics; and

Standard
5.10 Ethical and Social Implications of Computing
Standard
11.9 Cybersecurity
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.4 Digital Footprint and Reputation
Standard
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
4.18 Ethical and Social Implications of Computing
Standard
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
8.10 Ethical and Social Implications of Computing
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
12.1 Digital Footprint and Reputation
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
21.7 Hacking Ethics
21.1 Digital Footprint and Reputation
21.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
8.1 Digital Footprint and Reputation
8.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
2.1 Privacy & Security
Standard
5.3 Digital Footprint and Reputation
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.1 Digital Footprint and Reputation
2.4 Hacking Ethics
Standard
10.1 Digital Footprint and Reputation
10.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
Standard
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
Standard
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
6.19 Ethical and Social Implications of Computing
Standard
10.9 Cybersecurity
Standard
3.3 Digital Footprint and Reputation
3.6 Privacy & Security
3.11 Hacking Ethics