Please enable JavaScript to use CodeHS

Tennessee Computer Science Foundations: 1

CodeHS Lessons

Accurately read, interpret, and demonstrate adherence to safety rules, including (1) rules published by the National Science Teachers Association (NSTA), (2) rules pertaining to electrical safety, (3) Internet safety, (4) Occupational Safety and Health Administration (OSHA) guidelines, and (5) state and national code requirements. Be able to distinguish between rules and explain why certain rules apply.

Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
12.3 Internet Safety
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
21.4 Privacy & Security
21.7 Hacking Ethics
21.3 Internet Safety
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
8.4 Privacy & Security
8.3 Internet Safety
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
2.1 Privacy & Security
Standard
5.5 Internet Safety
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
3.1 Safety Guidelines
Standard
1.3 Internet Safety
2.4 Hacking Ethics
Standard
10.3 Internet Safety
10.4 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
3.5 Internet Safety
3.6 Privacy & Security
3.11 Hacking Ethics