Please enable JavaScript to use CodeHS

NV 9-12: 9-12.IC.SLE.2

CodeHS Lessons

Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.

Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.8 Cybersecurity
11.9 The Impact of the Internet
12.1 The Effects of the Internet
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
13.9 The Impact of the Internet
41.1 Cryptography
31.1 Practice PT: Steganography
32.1 The Effects of the Internet
Standard
4.1 Collecting and Storing Data
Standard
2.4 Privacy & Security
7.5 Software Licenses
7.7 Browser Configuration
Standard
7.4 Level 4: Data and Licenses
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
11.1 Computer Ethics
Standard
1.7 Privacy & Security
9.1 Collecting and Storing Data
Standard
6.6 Software Licenses
6.9 Browser Configuration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.3 Privacy & Security
5.5 Software Licenses
11.4 Collecting and Storing Data
Standard
1.3 Privacy & Security
2.7 Software Licenses
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
1.6 Privacy & Security
Standard
8.1 Collecting and Storing Data
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.5 Software Licenses
13.7 Browser Configuration
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
6.5 Software Licenses
6.7 Browser Configuration
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.5 Software Licenses
3.7 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.5 Software Licenses
1.7 Browser Configuration
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.5 Software Licenses
3.7 Browser Configuration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
5.12 Software Licenses
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.7 Software Licenses
10.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.5 Software Licenses
7.7 Browser Configuration
19.4 Level 4: Data and Licenses
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
Standard
10.4 Privacy & Security
Standard
1.7 Software Licenses
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.5 Software Licenses
6.7 Browser Configuration
14.4 Level 4: Data and Licenses
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.5 Software Licenses
4.7 Browser Configuration
7.4 Level 4: Data and Licenses
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
6.8 Browser Configuration
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
7.8 Browser Configuration
Standard
4.1 Collecting and Storing Data
Standard
9.1 Collecting and Storing Data
Standard
1.5 Software Licenses
1.7 Browser Configuration
Standard
3.6 Privacy & Security