Please enable JavaScript to use CodeHS

PRAXIS 5652: I.B.2.c

CodeHS Lessons

identify the conditions under which a given computing practice is ethical or legal

Standard
10.8 Ethical and Social Implications of Computing
Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
11.10 The Impact of the Internet
Standard
12.9 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.11 Hacking Ethics
Standard
7.10 Ethical and Social Implications of Computing
8.13 Ethical Issues Around Data Collection
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
11.10 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
12.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
8.11 The Impact of the Internet
Standard
8.11 The Impact of the Internet
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
6.11 The Impact of the Internet
Standard
2.7 Hacking Ethics
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
5.8 The Impact of the Internet
11.10 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
5.8 The Impact of the Internet
11.10 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
Standard
6.19 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
2.7 Hacking Ethics
Standard
7.10 The Impact of the Internet