Please enable JavaScript to use CodeHS

Natrona CS Principles: L2.IC.SLE.02

CodeHS Lessons

Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.

Standard
8.10 Cryptography
11.9 Cybersecurity
11.11 Creative Credit & Copyright
15.1 The Impacts of Computing
Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
8.2 Assessing Risks
Standard
12.10 Creative Credit & Copyright
17.1 The Impacts of Computing
41.1 Cryptography
Standard
9.6 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.9 Creative Credit & Copyright
Standard
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
Standard
1.5 Hacking Ethics
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
Standard
8.10 Cryptography
11.9 Cybersecurity
11.11 Creative Credit & Copyright
15.1 The Impacts of Computing
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
12.6 Creative Credit & Copyright
12.7 Hacking Ethics
Standard
12.2 Assessing Risks
21.7 Hacking Ethics
21.6 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
7.7 Cryptography
8.10 Cybersecurity
8.12 Creative Credit & Copyright
Standard
7.7 Cryptography
8.10 Cybersecurity
8.12 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
2.2 Creative Credit & Copyright
Standard
5.11 Creative Credit & Copyright
5.13 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
5.8 Creative Credit & Copyright
Standard
6.10 Cryptography
7.9 Cybersecurity
7.10 The Impact of the Internet
7.11 Creative Credit & Copyright
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
8.4 Creative Credit & Copyright
Standard
8.4 Creative Credit & Copyright
Standard
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
8.1 Network Attacks
8.2 Malware Types and Prevention
13.2 Assessing Risks
Standard
7.9 Cybersecurity
7.11 Creative Credit & Copyright
Standard
1.4 Creative Credit & Copyright
2.4 Hacking Ethics
Standard
10.6 Creative Credit & Copyright
Standard
4.6 Creative Credit & Copyright
Standard
1.7 Creative Credit & Copyright
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
15.2 Assessing Risks
Standard
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
13.2 Assessing Risks
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
2.10 Creative Credit & Copyright
Standard
7.8 Cryptography
10.9 Cybersecurity
10.10 The Impact of the Internet
10.11 Creative Credit & Copyright
Standard
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
1.10 Creative Credit & Copyright
1.11 Hacking Ethics