Please enable JavaScript to use CodeHS

OH 7: IC.Cu.7.c

CodeHS Lessons

Identify and explore careers related to the field of computer science.

Standard
4.7 The Future of Computing
Standard
3.7 The Future of Computing
Standard
13.9 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.11 Hacking Ethics
12.8 Databases
12.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.11 Hacking Ethics
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
21.1 Cryptography, Cryptology, Cryptanalysis
22.3 Databases
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.7 Hacking Ethics
14.4 Databases
14.9 Common Security Problems
Standard
3.7 The Future of Computing
Standard
1.3 Impact of Cybersecurity
2.1 Cryptography, Cryptology, Cryptanalysis
9.4 Databases
9.9 Common Security Problems
21.7 Hacking Ethics
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
10.3 Databases
10.9 Common Security Problems
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.7 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
Standard
5.13 Hacking Ethics
Standard
3.7 The Future of Computing
Standard
4.7 The Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.10 The Future of Computing
Standard
2.10 The Future of Computing
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
11.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
4.1 Cryptography, Cryptology, Cryptanalysis
17.9 Common Security Problems
17.9 Common Security Problems
17.4 Databases
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
4.1 Cryptography, Cryptology, Cryptanalysis
7.4 Common Security Problems
Standard
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
5.5 Databases
5.10 Common Security Problems
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
5.1 Cryptography, Cryptology, Cryptanalysis
8.4 Databases
8.9 Common Security Problems
Standard
3.7 The Future of Computing
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity