Please enable JavaScript to use CodeHS

Texas Principles of Information Technology: 130.302.3A

CodeHS Lessons

identify and describe functions of various evolving and emerging technologies

Standard
1.6 Cybersecurity Essentials
2.1 Cryptography: Then, Now, and Future
6.5 Network Devices
Standard
10.1 History of Computers
10.5 Future of Computing
Standard
10.1 History of Computers
10.5 Future of Computing
Standard
2.1 History of Computers
2.5 Future of Computing
Standard
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.2 History of Computers
12.2 Future of Computing
Standard
3.2 History of Computers
14.2 Future of Computing
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
Standard
1.1 History of Computers
1.5 Future of Computing
Standard
2.1 Introduction to the Internet
2.7 Impact of the Internet
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
4.5 Impact of the Internet
4.6 Future of Computing
Standard
5.1 Introduction to the Internet
5.2 Impact of the Internet
Standard
4.1 History of Computers
4.5 Future of Computing
21.2 History of Cryptography
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
4.5 Impact of the Internet
4.6 Future of Computing
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
15.1 Introduction to the Internet
15.10 Impact of the Internet
Standard
4.1 History of Computers
4.5 Future of Computing
Standard
4.1 History of Computers
4.5 Future of Computing
Standard
3.7 Cybersecurity Essentials
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
24.10 Impact of the Internet
24.1 Introduction to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
1.6 Cybersecurity Essentials
2.1 Cryptography: Then, Now, and Future
Standard
1.6 Cybersecurity Essentials
2.1 Cryptography: Then, Now, and Future
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
9.1 History of Computers
9.5 Future of Computing
10.2 History of Cryptography
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
6.1 Introduction to the Internet
6.8 Impact of the Internet
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
Standard
5.1 Introduction to the Internet
5.8 Impact of the Internet
Standard
2.1 Introduction to the Internet
2.11 Impact of the Internet
Standard
7.1 Introduction to the Internet
7.11 Impact of the Internet
Standard
1.1 History of Computers
1.5 Future of Computing
Standard
1.6 Cybersecurity Essentials
2.1 Cryptography: Then, Now, and Future
6.5 Network Devices
Standard
1.6 Cybersecurity Essentials
2.1 Cryptography: Then, Now, and Future
6.5 Network Devices
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
5.6 Cybersecurity Essentials
12.5 Network Devices
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
2.1 History of Computers
2.5 Future of Computing
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
10.1 Introduction to the Internet
10.10 Impact of the Internet
Standard
2.1 History of Computers
2.6 Future of Computing
Standard
1.8 Future of Computing
Standard
4.1 History of Computers
4.6 Future of Computing
Standard
1.8 Future of Computing
Standard
7.1 History of Computers
7.8 Future of Computing
Standard
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
8.1 Introduction to the Internet
8.12 Impact of the Internet
Standard
4.1 History of Computers
Standard
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
9.1 Introduction to the Internet
9.10 Impact of the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
Standard
4.6 Cybersecurity Essentials
Standard
2.1 Introduction to the Internet
2.11 Impact of the Internet
Standard
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Introduction to the Internet
9.10 Impact of the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography