Please enable JavaScript to use CodeHS

SC FCS: C.4

CodeHS Lessons

Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).

Standard
11.10 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
1.4 Digital Footprint and Reputation
Standard
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.6 Creative Credit & Copyright
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
6.6 Software Licenses
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
4.8 Cyberbullying
4.9 Creative Credit & Copyright
Standard
1.2 Digital Footprint and Reputation
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
5.5 Software Licenses
Standard
1.2 Digital Footprint and Reputation
1.5 Hacking Ethics
2.7 Software Licenses
Standard
11.11 Creative Credit & Copyright
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.2 Cyberbullying
12.6 Creative Credit & Copyright
12.7 Hacking Ethics
13.5 Software Licenses
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
6.5 Software Licenses
21.2 Cyberbullying
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
21.1 Digital Footprint and Reputation
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
8.12 Creative Credit & Copyright
Standard
8.12 Creative Credit & Copyright
Standard
8.2 Cyberbullying
16.2 What is Cybersecurity?
16.4 The CIA Triad
8.1 Digital Footprint and Reputation
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
1.5 Software Licenses
2.10 Creative Credit & Copyright
Standard
1.2 What is Cybersecurity?
2.2 Creative Credit & Copyright
3.5 Software Licenses
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.4 Cyberbullying
5.11 Creative Credit & Copyright
5.12 Software Licenses
5.13 Hacking Ethics
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
5.8 Creative Credit & Copyright
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
11.2 What is Cybersecurity?
11.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
Standard
7.11 Creative Credit & Copyright
9.1 What is Cybersecurity?
9.3 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.4 Creative Credit & Copyright
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.4 Hacking Ethics
Standard
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.6 Creative Credit & Copyright
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.7 Software Licenses
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.6 Creative Credit & Copyright
Standard
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.7 Creative Credit & Copyright
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
6.5 Software Licenses
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
4.5 Software Licenses
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
2.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation
Standard
1.5 Software Licenses
2.10 Creative Credit & Copyright
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
3.3 Digital Footprint and Reputation
3.4 Cyberbullying
3.10 Creative Credit & Copyright
3.11 Hacking Ethics
Standard
2.5 The CIA Triad