Please enable JavaScript to use CodeHS

Natrona CS Principles: L1.IC.SLE.04

CodeHS Lessons

Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.

Standard
11.8 Cybersecurity
11.10 Creative Credit & Copyright
15.1 The Impacts of Computing
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
18.1 The Impacts of Computing
Standard
12.7 The Impact of the Internet
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
8.9 Common Security Problems
8.10 SQL Injection Overview
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
8.2 Assessing Risks
Standard
9.6 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
11.9 Common Security Problems
11.10 SQL Injection Overview
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.9 Creative Credit & Copyright
Standard
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
Standard
11.9 Cybersecurity
11.11 Creative Credit & Copyright
15.1 The Impacts of Computing
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Common Security Problems
22.9 SQL Injection Overview
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
12.6 Creative Credit & Copyright
12.7 Hacking Ethics
14.9 Common Security Problems
14.10 SQL Injection Overview
Standard
9.9 Common Security Problems
9.10 SQL Injection Overview
12.2 Assessing Risks
21.7 Hacking Ethics
21.6 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
8.10 Cybersecurity
8.12 Creative Credit & Copyright
Standard
8.10 Cybersecurity
8.12 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
10.9 Common Security Problems
10.10 SQL Injection Overview
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
2.2 Creative Credit & Copyright
Standard
5.11 Creative Credit & Copyright
5.13 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
5.8 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
8.4 Creative Credit & Copyright
Standard
8.4 Creative Credit & Copyright
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
8.1 Network Attacks
8.2 Malware Types and Prevention
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.2 Assessing Risks
Standard
7.9 Cybersecurity
7.11 Creative Credit & Copyright
Standard
1.4 Creative Credit & Copyright
2.4 Hacking Ethics
Standard
10.6 Creative Credit & Copyright
Standard
4.6 Creative Credit & Copyright
Standard
1.7 Creative Credit & Copyright
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.4 Common Security Problems
7.5 SQL Injection Overview
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
15.2 Assessing Risks
Standard
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
5.10 Common Security Problems
5.11 SQL Injection Overview
13.2 Assessing Risks
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
8.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
2.10 Creative Credit & Copyright
Standard
10.9 Cybersecurity
10.10 The Impact of the Internet
10.11 Creative Credit & Copyright
Standard
3.10 Creative Credit & Copyright
3.11 Hacking Ethics