Please enable JavaScript to use CodeHS

TX FOC: 127.769.1C

CodeHS Lessons

(C) solve problems and think critically;

Standard
14.1 Project: Guess the Word
20.1 Project: Who Said It?
25.21 Putting Together Control Structures
Standard
29.1 Project: Who Said It?
Standard
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
13.6 Organizational Techniques
13.2 Programming with Karel
13.3 Looping
13.4 Branching
13.5 Arrays and Objects
13.7 Programming Fundamentals Quiz
Standard
1.3 Advanced Cryptography
1.4 Hash Functions
1.5 Hash Function Development
4.2 Building a Knowledge Base
5.5 Cross-site Scripting
Standard
8.1 Putting Together Control Structures
Standard
8.1 Putting Together Control Structures
Standard
3.19 Putting Together Control Structures
Standard
6.19 Putting Together Control Structures
Standard
13.19 Putting Together Control Structures
Standard
1.19 Putting Together Control Structures
11.1 Project: Guess the Word
12.1 Arduino Challenges
15.1 Advanced Challenges with Tracy
Standard
14.1 Arduino Challenges
Standard
8.1 Putting Together Control Structures
9.1 micro:bit Challenges
Standard
10.1 micro:bit Challenges
Standard
3.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
6.1 Putting Together Control Structures
Standard
2.19 Putting Together Control Structures
10.1 Project: Guess the Word
13.1 Advanced Challenges with Tracy
16.1 Project: Who Said It?
Standard
3.1 Guessing Game
6.1 Breakout
Standard
12.6 Basic Querying in SQL
12.7 Filtering Queries in SQL
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
5.1 Methodology
5.2 Support Practice
Standard
2.22 Putting Together Control Structures
4.1 Methodology
4.2 Support Practice
12.1 Project: Guess the Word
16.1 Advanced Challenges with Tracy
18.1 Project: Who Said It?
Standard
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
3.19 Putting Together Control Structures
Standard
2.8 Network Administration
3.1 Methodology
3.2 Support Practice
4.7 Hash Functions
6.5 Organizational Techniques
6.2 Programming with Karel
6.3 Looping
6.4 Branching
Standard
6.2 Building a Knowledge Base
Standard
4.1 Methodology
4.2 Support Practice
6.3 Building a Knowledge Base
Standard
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
21.7 Advanced Cryptography
21.8 Hash Functions
21.9 Hash Function Development
22.8 Filtering Queries in SQL
22.7 Basic Querying in SQL
22.11 Cross-site Scripting
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
Standard
18.19 Putting Together Control Structures
13.1 Project: Guess the Word
17.1 Project: Who Said It?
Standard
6.2 Building a Knowledge Base
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
10.1 micro:bit Challenges
Standard
14.7 Basic Querying in SQL
14.8 Filtering Queries in SQL
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
4.3 Advanced Cryptography
4.4 Hash Functions
4.5 Hash Function Development
8.1 Methodology
8.2 Support Practice
9.7 Basic Querying in SQL
9.8 Filtering Queries in SQL
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
23.6 Organizational Techniques
23.2 Programming with Karel
23.3 Looping
23.4 Branching
23.5 Arrays and Objects
23.7 Programming Fundamentals Quiz
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
2.3 Asymmetric Encryption
5.8 Methodology
Standard
2.3 Asymmetric Encryption
7.1 Methodology
7.2 Support Practice
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
10.3 Basic Crypto Systems: Caesar Cipher
10.4 Basic Crypto Systems: Cracking Caesar
10.5 Basic Crypto Systems: Vigenere Cipher
7.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
3.19 Putting Together Control Structures
6.10 Network Administration
7.1 Project: Secure the Company's Network
10.7 Basic Querying in SQL
10.8 Filtering Queries in SQL
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
11.4 Basic Crypto Systems: Caesar Cipher
11.5 Basic Crypto Systems: Cracking Caesar
11.6 Basic Crypto Systems: Vigenere Cipher
11.7 Advanced Cryptography
11.8 Hash Functions
11.9 Hash Function Development
Standard
3.20 Putting Together Control Structures
5.10 Network Administration
5.11 Project: Secure the Company's Network
Standard
5.1 Methodology
5.2 Support Practice
6.2 Building a Knowledge Base
Standard
1.16 Organizational Techniques
Standard
1.20 Putting Together Control Structures
2.4 Troubleshooting Methodology
Standard
1.20 Putting Together Control Structures
2.4 Troubleshooting Methodology
Standard
2.3 Asymmetric Encryption
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
10.6 Organizational Techniques
10.2 Programming with Karel
10.3 Looping
10.4 Branching
10.5 Arrays and Objects
10.7 Programming Fundamentals Quiz
Standard
2.3 Asymmetric Encryption
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
13.6 Organizational Techniques
13.2 Programming with Karel
13.3 Looping
13.4 Branching
13.5 Arrays and Objects
13.7 Programming Fundamentals Quiz
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
16.21 Putting Together Control Structures
Standard
13.1 Project: Who Said It?
Standard
16.21 Putting Together Control Structures
Standard
13.1 Project: Who Said It?
Standard
22.2 Building a Knowledge Base
Standard
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
5.3 Advanced Cryptography
5.4 Hash Functions
5.5 Hash Function Development
17.7 Basic Querying in SQL
17.7 Basic Querying in SQL
17.8 Filtering Queries in SQL
17.8 Filtering Queries in SQL
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
12.1 Methodology
12.2 Support Practice
9.1 Project: Security Assessment Report
16.6 Organizational Techniques
16.2 Programming with Karel
16.3 Looping
16.4 Branching
16.5 Arrays and Objects
16.7 Programming Fundamentals Quiz
Standard
4.3 Basic Crypto Systems: Caesar Cipher
4.4 Basic Crypto Systems: Cracking Caesar
4.5 Basic Crypto Systems: Vigenere Cipher
4.6 Hash Functions
4.7 Hash Function Development
7.3 Basic Querying in SQL
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
10.1 Methodology
10.2 Support Practice
11.3 Building a Knowledge Base
13.5 Cross-site Scripting
20.2 Programming with Karel
20.3 Looping
20.4 Branching
20.5 Arrays and Objects
20.6 Organizational Techniques
20.7 Programming Fundamentals Quiz
Standard
6.1 Putting Together Control Structures
Standard
5.8 Basic Querying in SQL
5.9 Filtering Queries in SQL
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
11.1 Methodology
11.2 Support Practice
12.2 Building a Knowledge Base
6.1 Project: Security Assessment Report
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
8.1 micro:bit Challenges
Standard
6.1 Project: Guess the Word
Standard
8.1 Putting Together Control Structures
Standard
8.1 Putting Together Control Structures
Standard
14.1 Project: Guess the Word
Standard
11.21 Putting Together Control Structures
Standard
6.1 Project: Guess the Word
13.1 Project: Who Said It?
Standard
4.2 Programming with Karel
4.3 Looping
4.4 Branching
4.5 Arrays and Objects
4.6 Organizational Techniques
4.7 Programming Fundamentals Quiz
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
8.7 Basic Querying in SQL
8.8 Filtering Queries in SQL
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
11.1 Methodology
11.2 Support Practice
14.1 Project: Security Assessment Report
Standard
8.1 Putting Together Control Structures
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges