Please enable JavaScript to use CodeHS

SC FCS: C.4

CodeHS Lessons

Explain the consequences of social, illegal, and unethical uses of technology (e.g., cyberbullying, piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).

1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.6 Creative Credit & Copyright
14.2 What is Cybersecurity?
14.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.2 What is Cybersecurity?
1.4 The CIA Triad
6.5 Software Licenses
21.2 Cyberbullying
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
21.1 Digital Footprint and Reputation
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
6.5 Software Licenses
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
8.2 What is Cybersecurity?
8.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
13.2 What is Cybersecurity?
13.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.6 Creative Credit & Copyright
15.2 What is Cybersecurity?
15.4 The CIA Triad
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
4.5 Software Licenses
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.7 Creative Credit & Copyright
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.4 The CIA Triad
4.8 Cyberbullying
4.9 Creative Credit & Copyright
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.7 Creative Credit & Copyright
13.10 Creative Credit & Copyright
11.11 Creative Credit & Copyright
5.8 Creative Credit & Copyright
1.5 Software Licenses
2.10 Creative Credit & Copyright
1.2 What is Cybersecurity?
2.2 Creative Credit & Copyright
3.5 Software Licenses
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
8.12 Creative Credit & Copyright
11.11 Creative Credit & Copyright
1.2 Digital Footprint and Reputation
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
6.5 Software Licenses
13.1 What is Cybersecurity?
13.8 The CIA Triad