Please enable JavaScript to use CodeHS

OH 9-12 FDN: IC.SI.9-12.F.b

CodeHS Lessons

Analyze the collection and generation of data through automated processes to explain the privacy concerns that are not always evident to users.

Standard
4.7 Software Licenses
4.9 Browser Configuration
Standard
7.4 Level 4: Data and Licenses
Standard
4.7 The Impact of the Internet
Standard
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
1.7 The Impact of the Internet
5.6 Software Licenses
5.9 Browser Configuration
Standard
4.7 The Impact of the Internet
Standard
4.12 The Impact of the Internet
Standard
3.12 The Impact of the Internet
Standard
5.7 The Impact of the Internet
Standard
4.7 The Impact of the Internet
Standard
5.8 The Impact of the Internet
Standard
5.5 Software Licenses
Standard
2.7 Software Licenses
Standard
8.8 The Impact of the Internet
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
Standard
4.7 The Impact of the Internet
Standard
13.5 Software Licenses
13.7 Browser Configuration
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
6.5 Software Licenses
6.7 Browser Configuration
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
11.4 Level 4: Data and Licenses
Standard
4.7 The Impact of the Internet
Standard
4.7 The Impact of the Internet
Standard
4.7 The Impact of the Internet
Standard
3.5 Software Licenses
3.7 Browser Configuration
Standard
4.5 Software Licenses
4.7 Browser Configuration
Standard
4.7 The Impact of the Internet
Standard
4.7 The Impact of the Internet
Standard
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
Standard
1.5 Software Licenses
1.7 Browser Configuration
Standard
2.6 Level 4: Data and Licenses
3.5 Software Licenses
3.7 Browser Configuration
Standard
5.8 Browser Configuration
5.12 Software Licenses
8.7 The Impact of the Internet
Standard
3.7 The Impact of the Internet
Standard
4.7 Software Licenses
4.9 Browser Configuration
Standard
7.12 Software Licenses
Standard
4.7 Software Licenses
4.9 Browser Configuration
Standard
4.7 The Impact of the Internet
Standard
10.7 Software Licenses
10.9 Browser Configuration
Standard
5.7 The Impact of the Internet
Standard
7.5 Software Licenses
7.7 Browser Configuration
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
19.4 Level 4: Data and Licenses
Standard
1.7 Software Licenses
19.2 Software Licenses
Standard
6.5 Software Licenses
6.7 Browser Configuration
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
14.4 Level 4: Data and Licenses
Standard
4.7 The Impact of the Internet
Standard
4.5 Software Licenses
4.7 Browser Configuration
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
7.4 Level 4: Data and Licenses
Standard
4.7 The Impact of the Internet
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.5 Software Licenses
1.7 Browser Configuration
Standard
7.5 Software Licenses
7.7 Browser Configuration
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
Standard
4.7 The Impact of the Internet