|
What is p5.js?Creator: Zach GalantGet a sneak peek at what p5.js is all about. |
|
Intro to Brython - CalculatorCreator: Zach Galant |
|
Introduction to Multiprocessing in CCreator: Neel Kishnani |
![]() |
Unit Tests in JavaCreator: David Burnham |
|
How to use the CodeHS JS Library on your WebsiteCreator: Zach GalantThis tutorial shows you how you can use the CodeHS Graphics JavaScript library outside of CodeHS on any website. |
|
Coding in Python: How Fast is Your Code?Creator: Ashwin AggarwalAs we learn to use code to solve all types of problems in the world, questioning the efficiency of our programs becomes increasingly important. In this tutorial, you'll learn how to analyze your Python programs' speed and efficiency so you can write fast code! |
|
Comprehensions in PythonCreator: Neel KishnaniHow to use list and dictionary comprehensions in Python. |
![]() |
Which CodeHS Plan is Right for You?Creator: Meg DavisCodeHS offers different membership plans to meet your needs. Learn more about plan features below. |
|
Hello worldCreator: Jeremy KeeshinHow to write your first program in a few different languages |
|
Python3 REPLCreator: Zach Galant |
|
run.shCreator: Zach GalantThis tutorial shows you how the `run.sh` file works in the CodeHS IDE. |
|
Sample A CSP Performance Task in PythonCreator: David Burnham |
|
Sample B CSP Performance Task in PythonCreator: David Burnham |
|
Sample A CSP Performance Task in JavaScriptCreator: David Burnham |
|
Sample B CSP Performance Task in JavaScriptCreator: David Burnham |
|
Programming Sprites in JavaScriptCreator: Andy BayerAnimate sprites using JavaScript to create games in CodeHS |
![]() |
Java in CodeHSCreator: Andy BayerEverything you can do in CodeHS Java programs! |
|
Visualizing Music with JavaScriptCreator: Calvin StudebakerStep by step guide to creating your own music visualizations with JavaScript! |
![]() |
How Strong is Your Password?Creator: Jennifer CampbellWhat are some ways that you keep your personal data secure and private? Do you use strong passwords? How would you rate the strength of your passwords? In this tutorial, learn how to create a password that can combat hacking attempts such as brute force attacks, dictionary attacks, and algorithm attacks. |
![]() |
Don't Fall for a Phishing Email!Creator: Jennifer CampbellPhishing is a method used to gather personal information such as usernames and passwords using deceptive emails and websites. Learn how to recognize and avoid these types of malicious emails in this tutorial! |
![]() |
HTML ListsCreator: Jennifer CampbellLearn how to use ordered and unordered lists in HTML. |
![]() |
HTML TablesCreator: Jennifer CampbellLearn how to create tables in HTML. |
![]() |
Caesar and Vigenere CiphersCreator: Jennifer CampbellIn this tutorial, you will learn about two very early encryption systems known as the Caesar and the Vigenère ciphers. |