Please enable JavaScript to use CodeHS

PRAXIS 5652: I.A.1

CodeHS Lessons

Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers

Standard
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
Standard
4.1 Communication is Key!
Standard
2.1 History of Computers
2.5 Future of Computing
7.7 The Impact of the Internet
Standard
10.1 History of Computers
10.5 Future of Computing
12.7 The Impact of the Internet
Standard
10.1 History of Computers
10.5 Future of Computing
12.7 The Impact of the Internet
Standard
3.7 The Impact of the Internet
Standard
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
12.4 Clients and Servers
12.8 Databases
12.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
4.2 History of Computers
12.2 Future of Computing
Standard
1.12 Hacking Ethics
3.2 History of Computers
14.2 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.12 Hacking Ethics
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
Standard
1.1 History of Computers
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
4.6 Future of Computing
6.1 Communication is Key!
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
4.1 History of Computers
4.5 Future of Computing
22.3 Databases
22.4 Clients and Servers
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
Standard
12.7 Hacking Ethics
14.4 Databases
14.5 Clients and Servers
14.9 Common Security Problems
Standard
4.1 History of Computers
4.5 Future of Computing
6.7 The Impact of the Internet
Standard
4.1 History of Computers
4.5 Future of Computing
6.7 The Impact of the Internet
Standard
9.4 Databases
9.5 Clients and Servers
9.9 Common Security Problems
21.7 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
3.8 The Impact of the Internet
9.1 History of Computers
9.5 Future of Computing
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.7 Hacking Ethics
10.3 Databases
10.4 Clients and Servers
10.9 Common Security Problems
13.7 The Impact of the Internet
Standard
2.7 Hacking Ethics
Standard
6.1 Communication is Key!
Standard
1.1 History of Computers
1.5 Future of Computing
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.12 Hacking Ethics
21.1 History of Computers
21.1 History of Computers
2.5 Future of Computing
23.1 Communication is Key!
Standard
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
17.4 Databases
17.5 Clients and Servers
Standard
2.1 History of Computers
2.6 Future of Computing
Standard
1.8 Future of Computing
2.4 Hacking Ethics
Standard
4.1 History of Computers
4.6 Future of Computing
7.7 The Impact of the Internet
Standard
1.8 Future of Computing
Standard
2.3 Clients and Servers
Standard
3.7 The Impact of the Internet
7.1 History of Computers
7.6 Clients and Servers
7.8 Future of Computing
Standard
2.7 Hacking Ethics
7.1 Clients and Servers
7.4 Common Security Problems
11.2 Communication is Key!
Standard
4.1 History of Computers
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.5 Databases
5.6 Clients and Servers
5.10 Common Security Problems
12.1 Communication is Key!
Standard
2.1 History of Computers
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
3.11 Hacking Ethics