Please enable JavaScript to use CodeHS

WY L1: L1.IC.C.01

CodeHS Lessons

Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.

Standard
5.10 Ethical and Social Implications of Computing
Standard
11.9 The Impact of the Internet
12.1 The Effects of the Internet
Standard
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
13.9 The Impact of the Internet
32.1 The Effects of the Internet
Standard
9.2 Empathy
12.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.7 Hacking Ethics
7.4 Software and Applications
9.10 Impact of the Internet
Standard
1.4 Digital Footprint and Reputation
Standard
2.1 History of Computers
2.5 Future of Computing
7.7 The Impact of the Internet
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
15.2 What is Cybersecurity?
Standard
10.5 Future of Computing
10.1 History of Computers
12.7 The Impact of the Internet
Standard
10.5 Future of Computing
10.1 History of Computers
12.7 The Impact of the Internet
13.1 What is Cybersecurity?
Standard
3.7 The Impact of the Internet
Standard
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
4.18 Ethical and Social Implications of Computing
Standard
1.1 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.11 Hacking Ethics
Standard
1.1 Intro to the Internet
6.5 Software and Applications
8.10 Ethical and Social Implications of Computing
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.12 Hacking Ethics
4.1 Intro to the Internet
4.2 History of Computers
12.2 Future of Computing
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.12 Hacking Ethics
3.1 Intro to the Internet
3.2 History of Computers
14.2 Future of Computing
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
5.1 Intro to the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.12 Hacking Ethics
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
5.1 Intro to the Internet
Standard
1.1 History of Computers
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
1.7 Software and Applications
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.3 Hacking Ethics
4.8 Cyberbullying
Standard
1.2 Digital Footprint and Reputation
1.5 Hacking Ethics
4.5 Impact of the Internet
4.6 Future of Computing
5.4 Software and Applications
Standard
1.2 Digital Footprint and Reputation
1.5 Hacking Ethics
2.6 Software and Applications
5.2 Impact of the Internet
Standard
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 History of Computers
4.5 Future of Computing
8.1 Intro to the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.1 Digital Footprint and Reputation
12.2 Cyberbullying
12.7 Hacking Ethics
13.4 Software and Applications
15.10 Impact of the Internet
Standard
4.1 History of Computers
4.5 Future of Computing
6.7 The Impact of the Internet
14.4 Software and Applications
Standard
4.1 History of Computers
4.5 Future of Computing
6.7 The Impact of the Internet
14.4 Software and Applications
Standard
1.2 What is Cybersecurity?
6.4 Software and Applications
24.10 Impact of the Internet
21.7 Hacking Ethics
21.1 Digital Footprint and Reputation
21.2 Cyberbullying
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
3.4 Software and Applications
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
8.2 Software and Applications
8.11 The Impact of the Internet
Standard
8.2 Software and Applications
8.11 The Impact of the Internet
Standard
3.8 The Impact of the Internet
9.5 Future of Computing
9.1 History of Computers
16.2 What is Cybersecurity?
8.1 Digital Footprint and Reputation
8.2 Cyberbullying
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.7 Hacking Ethics
6.8 Impact of the Internet
13.7 The Impact of the Internet
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.7 Hacking Ethics
5.8 Impact of the Internet
Standard
1.4 Software and Applications
2.11 Impact of the Internet
Standard
1.2 What is Cybersecurity?
3.4 Software and Applications
7.11 Impact of the Internet
Standard
1.1 History of Computers
1.5 Future of Computing
5.1 What is Cybersecurity?
5.3 Digital Footprint and Reputation
5.4 Cyberbullying
5.13 Hacking Ethics
8.1 Intro to the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
3.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
10.6 Software and Applications
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
11.2 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
2.4 Software and Applications
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
2.4 Software and Applications
Standard
1.2 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.12 Hacking Ethics
21.1 History of Computers
21.1 History of Computers
2.5 Future of Computing
5.1 Intro to the Internet
Standard
1.3 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.7 Hacking Ethics
7.4 Software and Applications
10.10 Impact of the Internet
Standard
2.1 History of Computers
2.6 Future of Computing
7.10 The Impact of the Internet
9.1 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.8 Future of Computing
2.1 What is Cybersecurity?
2.4 Hacking Ethics
Standard
4.1 History of Computers
4.6 Future of Computing
7.7 The Impact of the Internet
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
15.2 What is Cybersecurity?
Standard
1.8 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
Standard
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
3.7 The Impact of the Internet
7.1 History of Computers
7.8 Future of Computing
Standard
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.7 Hacking Ethics
6.4 Software and Applications
8.12 Impact of the Internet
Standard
4.1 History of Computers
Standard
1.1 What is Cybersecurity?
1.8 Hacking Ethics
4.1 Intro to the Internet
Standard
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.7 Hacking Ethics
4.4 Software and Applications
9.10 Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.11 Hacking Ethics
4.1 Intro to the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
9.7 The Impact of the Internet
13.2 What is Cybersecurity?
Standard
6.2 Empathy
8.7 The Impact of the Internet
Standard
6.2 Empathy
8.7 The Impact of the Internet
Standard
5.8 The Impact of the Internet
6.7 Software and Applications
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
Standard
5.8 The Impact of the Internet
7.7 Software and Applications
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
Standard
2.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation
Standard
1.4 Software and Applications
2.11 Impact of the Internet
6.19 Ethical and Social Implications of Computing
Standard
10.10 The Impact of the Internet
11.1 The Effects of the Internet
Standard
3.1 What is Cybersecurity?
3.3 Digital Footprint and Reputation
3.4 Cyberbullying
3.11 Hacking Ethics
4.1 Intro to the Internet