Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.1

CodeHS Lessons

Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.

1.6 Application Security
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
5.6 Cybersecurity
11.10 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
5.6 Cybersecurity
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
1.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
6.6 Application Security
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
2.4 Privacy & Security
6.6 Application Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
1.6 Privacy & Security
9.4 Privacy & Security
2.4 Privacy & Security
4.6 Application Security
7.4 Level 4: Data and Licenses
4.4 Privacy & Security
2.4 Privacy & Security
7.6 Application Security
1.6 Privacy & Security
1.8 Application Security
4.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
2.4 Privacy & Security
7.6 Application Security
7.4 Level 4: Data and Licenses
4.2 Quality Datasets
4.1 Copyright Rules
4.3 Security in Game Design