Please enable JavaScript to use CodeHS

Points

Activity Points
Digital Citizenship and Cyber Hygiene
1.1 Welcome to Introduction to Hardware Technology
1.1.1 Course Introduction 5
1.1.2 Course Goals 5
1.2 Digital Footprint and Reputation
1.2.1 Digital Footprint and Reputation 1
1.2.2 Digital Footprint and Reputation 5
1.2.3 Building a Positive Digital Footprint 5
1.2.4 Right to be Forgotten? 1
1.2.5 Right to be Forgotten 5
1.2.6 What is your Digital Footprint? 5
1.3 Privacy & Security
1.3.1 What is Data Privacy & Security? 1
1.3.2 Privacy & Security Quiz 5
1.3.3 How Strong is your Password? 1
1.3.4 How Strong is your password? 5
1.3.5 Guess: Password List 1
1.3.6 Guess: Using an Algorithm 1
1.3.7 Guess: Brute Force 1
1.3.8 Google Privacy Policy Search 1
1.3.9 Google Privacy Policy Search 5
1.3.10 Is Your Head in the Cloud? 5
1.3.11 You Can Be Tracked! 1
1.4 Creative Credit & Copyright
1.4.1 Creative Credit and Copyright 1
1.4.2 Creative Credit and Copyright 5
1.4.3 Cite! 5
1.4.4 Exploring Creative Commons 1
1.4.5 Respond: Creative Commons 5
1.4.6 Finding Images 5
1.4.7 Reflection: Why is Copyright Important? 5
1.4.8 Consequences 5
1.5 Hacking Ethics
1.5.1 Hacking Ethics & Legality 1
1.5.2 Hacking Ethics & Legality 5
1.5.3 Penetration Testing 1
1.5.4 Reflection: Penetration Testing 5
1.5.5 Hack the Pentagon? 1
1.5.6 Reflection: Hack the Pentagon 5
1.5.7 Ethical Hacker Agreement 1
1.6 Common Security Problems
1.6.1 Common Security Problems 1
1.6.2 Common Security Problems 5
1.6.3 Meet Security Engineers at Google 1
1.6.4 Security Engineering Reflection 5
1.6.5 Living in a Digital World 1
1.6.6 Living in a Digital World 5
1.7 Always Connected
1.7.1 Pre-Lesson Reflection 5
1.7.2 Time to Do Some Research 5
1.7.3 Internet Addiction Pt 1 5
1.7.4 Internet Addiction Pt 2 5
1.7.5 Cell Phone Addiction 5
1.7.6 Video Game Addiction 5
1.7.7 Present Your Findings 5
Operating Systems and Software
2.1 Software vs. Hardware
2.1.1 Software 1
2.1.2 Software Quiz 2
2.1.3 Software Explained 1
2.1.4 Hardware Review 4
2.1.5 Hardware vs. Software 5
2.1.6 What Do You Suggest? 5
2.2 Operating Systems
2.2.1 Operating Systems 1
2.2.2 Operating Systems Quiz 5
2.2.3 Detect My OS 1
2.2.4 Upgrading a Mac OS 1
2.2.5 Windows OS Installation Simulation 1
2.2.6 Installing an OS 5
2.3 Comparing Operating Systems
2.3.1 Comparing Operating Systems 1
2.3.2 Comparing Operating Systems Quiz 5
2.3.3 Windows Simulation 1
2.3.4 MacOS Simulation 1
2.3.5 Choose a Linux Distro! 1
2.3.6 Which would you choose? 5
2.4 File and Folder Management
2.4.1 File Management, Pt 1 5
2.4.2 File Management, Pt 2 5
2.4.3 Organize These Files! 5
2.4.4 Back Up These Files! 5
2.5 Compatibility
2.5.1 Compatibility 1
2.5.2 Compatibility Quiz 5
2.5.3 What Processor? Windows 1
2.5.4 What Processor? Mac 1
2.5.5 What Processor are you running? 5
2.5.6 Compatibility Testing 5
2.5.7 Compatibility Reflection 5
2.6 Software and Applications
2.6.1 Software and Applications 1
2.6.2 Software and Applications Quiz 5
2.6.3 Spreadsheet Simulation 1
2.6.4 Messaging Simulation 1
2.6.5 Kanban Board Simulation 1
2.6.6 Software Simulations 5
2.7 Software Licenses
2.7.1 Software Licenses 1
2.7.2 Software Licenses Quiz 5
2.7.3 Do I need a Software License? 5
2.7.4 Is This Original? 5
2.8 Software Development
2.8.1 Development Life Cycle 1
2.8.2 Development Life Cycle 3
2.8.3 Scrum Framework 1
2.8.4 SCRUM Response 5
2.8.5 Using Flowcharts 5
2.8.6 Project: Mapping an App 5
2.9 What is Artificial Intelligence?
2.9.1 What is Artificial Intelligence? 5
2.9.2 What is Artificial Intelligence? 5
2.9.3 A Day in the Life of AI 5
2.9.4 A Day in the Life of AI 5
2.9.5 Guess the Drawing 5
2.9.6 Drawing with AI 5
2.9.7 Drawing with AI 5
2.10 The Ethics of Artificial Intelligence
2.10.1 The Ethics of Artificial Intelligence 5
2.10.2 The Ethics of Artificial Intelligence 5
2.10.3 Bias in Facial Recognition Software 5
2.10.4 Bias in Facial Recognition Software 5
2.10.5 Testing a Biased Dataset 5
2.10.6 Debating the Ethics of Self Driving Cars 5
Hardware
3.1 Internal Components
3.1.1 Internal Components 1
3.1.2 Internal Components 5
3.1.3 Build a Computer 1
3.1.4 Build a Computer 5
3.1.5 Test Your Brain's RAM! 1
3.1.6 Test Your Brain's RAM! Reflection 5
3.1.7 The Machine Instruction Cycle 5
3.1.8 Computer Crashes 5
3.1.9 Computer Crashes Reflection 5
3.2 Storage Options
3.2.1 Storage Options 1
3.2.2 Storage Options Quiz 5
3.2.3 Security of Cloud Storage 1
3.2.4 Security of Cloud Storage 5
3.2.5 Storage Suggestions 5
3.3 Lab: Computer Disassembly
3.3.1 Lab: Computer Disassembly 5
3.3.2 Video: Disassemble a Computer 1
3.3.3 Article: Disassemble a Computer 5
3.4 Peripheral Devices
3.4.1 Peripheral Devices 1
3.4.2 Peripheral Devices 5
3.4.3 Personalized Peripherals 5
3.4.4 IT Help 5
3.4.5 Your Ideal Computer Setup 5
3.5 Network Devices
3.5.1 Network Devices 1
3.5.2 Network Devices 5
3.5.3 Speed Test 1
3.5.4 Speed Test 5
3.5.5 Fiber Optics Bend Light! 1
3.5.6 Fiber Optics Bend Light! 5
3.5.7 Ethernet Standards 1
3.5.8 Ethernet Standards 5
3.5.9 Copper vs. Fiber Optic 1
3.5.10 Copper vs. Fiber Optic 5
3.5.11 Network Troubleshooting 5
3.5.12 Troubleshooting Cable Issues 1
3.5.13 Troubleshooting Cable Issues 5
3.6 Laptops and Tablets
3.6.1 Form Factor 5
3.6.2 Laptop vs. Tablet 1
3.6.3 Laptop vs. Tablet 5
3.6.4 Which is best? 1
3.6.5 Product Chart 5
3.6.6 Device Comparison 5
3.7 Mobile Devices
3.7.1 Mobile Devices 1
3.7.2 Mobile Devices Quiz 5
3.7.3 How Apple FaceID Works 1
3.7.4 How Apple FaceID Works Response 5
3.7.5 Biometric Data Debate 5
3.7.6 BYOD and MDM Concept Map 1
3.7.7 BYOD and MDM Conclusions 5
3.8 Lab: Mobile Device Connectivity
3.8.1 Mobile Device Features 1
3.8.2 Mobile Device Simulator 1
3.8.3 Lab: Mobile Device Connectivity 5
3.9 The Internet of Things
3.9.1 Internet of Things 1
3.9.2 IoT Deep Dive 5
3.9.3 Smart Devices in Your Life 5
3.9.4 IoT Reflection 5
Project: Troubleshooting
4.1 Methodology
4.1.1 Troubleshooting Methodology 1
4.1.2 Identify the Problem 5
4.1.3 Research Solutions 5
4.1.4 Establish a Theory 5
4.1.5 Test the Theory 5
4.1.6 Fix the Problem! 5
4.1.7 Diagnostic Tools 5
4.2 Support Practice
4.2.1 Signal Strength 10
4.2.2 Interference 10
Networking
5.1 Introduction to the Internet
5.1.1 Welcome to the Internet 1
5.1.2 Intro to the Internet 5
5.1.3 Inside Facebook's Connectivity Lab 1
5.1.4 Connectivity Lab Reflection 5
5.2 Impact of the Internet
5.2.1 Impact of the Internet 1
5.2.2 Impact of the Internet 5
5.2.3 What is the Digital Divide? 1
5.2.4 What is the Digital Divide? 5
5.3 Internet Hardware and Sending Information
5.3.1 Internet Hardware 1
5.3.2 Internet Hardware 2
5.3.3 Sending Information 1
5.3.4 Sending Information 3
5.3.5 The Internet is in the Ocean 1
5.3.6 Internet in the Ocean Reflection 5
5.4 Internet Addresses
5.4.1 Internet Addresses 1
5.4.2 Internet Addresses 5
5.4.3 The Need for Addresses 5
5.4.4 IPv4 vs. IPv6 1
5.4.5 Reflection: IPv4 vs IPv6 5
5.5 Domain Name System (DNS)
5.5.1 Domain Name System (DNS) 1
5.5.2 Domain Name System 5
5.5.3 How Does DNS Work? 1
5.5.4 How Does DNS Work? 5
5.6 Routing
5.6.1 Routing 1
5.6.2 Routing 5
5.6.3 Route Tracing 1
5.6.4 Redundancy 5
5.7 Packets & Protocols
5.7.1 Packets 1
5.7.2 Packets 2
5.7.3 Protocols 1
5.7.4 Protocols 3
5.7.5 How the Internet Works 1
5.7.6 The Journey of an Image 5
5.8 Protocols and Standards
5.8.1 Protocols 1
5.8.2 Protocols Quiz 3
5.8.3 Standards 1
5.8.4 Standards Quiz 2
5.8.5 The New Wireless Standard 1
5.8.6 801.11ax 1
5.8.7 Wavelength 1
5.8.8 801.11ax FR 5
5.9 Viewing a Webpage
5.9.1 Viewing a Webpage 1
5.9.2 Viewing a Webpage 5
5.9.3 Explaining a URL 5
5.9.4 Net Neutrality Explained 1
5.9.5 FCCs Net Neutrality Rules Officially Repealed 1
5.9.6 Take a Side on Net Neutrality 5
5.9.7 Net Neutrality and Cybersecurity 1
5.9.8 Net Neutrality and Cybersecurity Research 5
5.10 Network Options
5.10.1 Network Options 1
5.10.2 Network Options Quiz 5
5.10.3 What is an SSID? 1
5.10.4 What is an SSID? 5
5.10.5 Wireless Threats 1
5.10.6 Wireless Threats 5
5.10.7 Wireless Network Setup 5
5.11 Network Administrator
5.11.1 Advanced Devices 1
5.11.2 Advanced Devices Quiz 5
5.11.3 Network Administrator Career 1
5.11.4 Network Administrator Career 5
5.11.5 Choosing the Best Devices 5
5.11.6 Network Diagram 5
5.12 Network Communication
5.12.1 Network Communication 1
5.12.2 Network Communication Quiz 5
5.12.3 Setting up a Firewall 1
5.12.4 iptables 5
5.12.5 iptables simulation 1
5.13 Network Management
5.13.1 Linux/MacOS vs. Windows 1
5.13.2 Network Management 1
5.13.3 Network Management Quiz 5
5.13.4 MacOS Terminal Simulation 1
5.13.5 Windows Command Prompt Simulation 1
5.13.6 Windows Command Prompt Spy 5
5.13.7 Windows Command Prompt Spy 5
5.13.8 SSH Logs 1
5.13.9 SSH Logs 1
5.13.10 Reading Logs 5
5.14 Advanced Networking
5.14.1 The OSI Model and Network Attacks 1
5.14.2 The OSI Model and Network Attacks Response 5
5.14.3 Encapsulation 1
5.14.4 What is Virtualization? 1
5.14.5 Virtualization Response 5
5.14.6 Baseband vs. Broadband 5
5.14.7 Bit Rate vs. Baud Rate 5
5.14.8 CSMA/CD vs. CSMA/CA 1
IT Professionals
6.1 IT Helpdesk
6.1.1 The Many Jobs at the IT Helpdesk 5
6.1.2 IT Helpdesk Scavenger Hunt 5
6.1.3 Find an IT Job! 5
6.2 Working with Customers
6.2.1 What is a CRM System? 5
6.2.2 CRM System Reflection 5
6.2.3 Customer Service Skills 1
6.2.4 Customer Service Skills Reflection 5
6.2.5 Act it Out! 15
6.2.6 Log it in the CRM! 5
6.3 Building a Knowledge Base
6.3.1 What is a Knowledge Base? 1
6.3.2 Draft a KB Article 5
6.3.3 Share your KB Article 5
6.3.4 Finalize your KB Article 15
6.4 Star in a Video!
6.4.1 Instructional Videos 1
6.4.2 Example Tutorial 1
6.4.3 Instructional Video Plan 5
6.4.4 Write the Script 5
6.4.5 Create the Storyboard 5
6.4.6 Record Your Video 5
6.5 Keeping a Database
6.5.1 Databases 1
6.5.2 Databases 1
6.5.3 Personally Identifiable Information (PII) 5
6.5.4 FERPA 5
6.5.5 What is SQL? 5
6.5.6 How to Structure Data in SQL 1
6.5.7 How to Structure Data in SQL 3
6.5.8 SQL Table: Tiktok 1
6.5.9 Customer List 5
6.6 Compliance Laws
6.6.1 IT Compliance 5
6.6.2 National Regulation Table 5
6.6.3 Georgia State Regulations 5
6.6.4 Compliance Reflection 5
6.7 Asset Management
6.7.1 IT Asset Management 5
6.7.2 What is ITAM? 5
6.7.3 Diving Deeper into ITAM 5
6.7.4 ITAM Presentation 5
6.8 Emerging Technology and IT
6.8.1 What is Cloud Computing? 5
6.8.2 Cloud Computing and IT 5
6.8.3 Reflection: Cloud Computing 5
6.9 Environmental Controls
6.9.1 Environmental Controls 1
6.9.2 Environmental Controls Quiz 5
6.9.3 Infographic 1
6.9.4 Infographic FR 5
6.9.5 Electrostatic Discharge 1
6.9.6 Your Security Systems 5
6.9.7 Security Design 10
6.10 Personal Safety
6.10.1 Safety Precautions 5
6.10.2 Electrical Hazards 5
6.10.3 Fire Suppression 1
6.10.4 Fire Suppression Response 5
6.10.5 Emergency Response Plan 5
Project: IT Proposal
7.1 IT Department Proposal
7.1.1 Project Introduction 5
7.1.2 Find Your Companies 5
7.1.3 Get to Know Your Companies 5
7.1.4 Draft Your Pitch 5
7.1.5 Create Your Presentation 5
7.1.6 Next Steps 5
Cybersecurity
8.1 What is Cybersecurity?
8.1.1 What is Cybersecurity? 1
8.1.2 What is Cybersecurity? 5
8.1.3 City Services Ransomware 1
8.1.4 Ransomware Reflection 5
8.1.5 Ransomware Simulator 1
8.1.6 Hackers vs. Smart Homes 1
8.1.7 Connectivity Reflection 5
8.2 Impact of Cybersecurity
8.2.1 Impact of Cybersecurity 1
8.2.2 Impact of Cybersecurity 5
8.2.3 Phishing Simulator 1
8.2.4 Phishing for Your Info 1
8.2.5 Phishing Reflection 5
8.2.6 Cyber Game 1
8.2.7 Cyber Game Reflection 5
8.2.8 Cyber Crime Time 1
8.2.9 Cyber Crime Time Reflection 5
8.3 Network Attacks
8.3.1 Network Attacks Overview 1
8.3.2 Network Attacks Quiz 5
8.3.3 Check for Vulnerabilities 1
8.3.4 Bug Bounty Hunting 1
8.3.5 Bug Bounty Hunting 5
8.3.6 Common Port Targets 1
8.3.7 Port Scanner Simulation 1
8.3.8 Open Port Reflection 5
8.4 Malware Types and Prevention
8.4.1 Malware Types and Prevention 1
8.4.2 Malware Types and Prevention 5
8.4.3 How Anti-malware Works 1
8.4.4 How Anti-malware Works 5
8.4.5 OS Malware Security 5
8.4.6 Reverse Engineering Malware 5
8.5 Common Network Attacks
8.5.1 Common Network Attacks 1
8.5.2 Network Attacks 5
8.5.3 Social Engineering Hack 1
8.5.4 Social Engineering Reflection 5
8.5.5 DDoS Attacks 1
8.5.6 DDoS Simulation 1
8.5.7 DDoS Reflection 5
8.6 Additional Attacks
8.6.1 Additional Attacks 1
8.6.2 Additional Attacks Quiz 5
8.6.3 Botnet Attacks - Mirai 1
8.6.4 Botnet Attacks - 3ve 1
8.6.5 Botnet Attacks - 3ve Video 1
8.6.6 Botnet Attacks - Reflection 5
8.6.7 Zero-day Exploit: Stuxnet 5
8.6.8 Zero-day Exploit: Stuxnet 5
8.6.9 Zero-day Exploit Reflection 5
8.6.10 US-CERT Current Activity 5
8.7 Internal Threats
8.7.1 Internal Threats 1
8.7.2 Internal Threats 5
8.7.3 BIOS/UEFI Attack Example 1
8.7.4 Accessing BIOS/UEFI 1
8.7.5 Causes of Data Breaches 5
8.7.6 Causes of Data Breaches 5
8.7.7 Protecting Data at All Times 1
8.7.8 Protecting Data at All Times 5
Project: Digital Forensics
9.1 Digital Forensics
9.1.1 Digital Forensics 1
9.1.2 Student Success Story 1
9.1.3 Student Success Story Response 5
9.2 Forensic Case 1: Logs
9.2.1 Network Logs 1
9.2.2 Network Log Evidence 1
9.2.3 Network Logs Conclusion 5
9.3 Forensic Case 2: File Metadata
9.3.1 File Metadata 1
9.3.2 File Metadata Evidence 1
9.3.3 File Metadata Conclusion 5
9.4 Forensic Case 3: Exif Data
9.4.1 Photo Exif 1
9.4.2 Exif Using Inspector 1
9.4.3 Exif Using the CLI 1
9.4.4 Photo Exif Conclusion 5
Computer Science Careers
10.1 Computer Science Careers
10.1.1 Computer Science All Around Us 1
10.1.2 Computer Science All Around Us 5
10.1.3 Coding in the Wild 1
10.1.4 Coding in the Wild Response 5
10.1.5 Emerging Technologies and Careers 5
10.1.6 The Impact of Emerging Technologies 5
10.1.7 Career Research 5
10.2 Create an Online Portfolio
10.2.1 Online Repositories 5
10.2.2 What is a Resume? 5
10.2.3 What is a Resume? 5
10.2.4 Upload Relevant Documents 5
10.3 Student Organizations
10.3.1 What Are They? 5
10.3.2 Their Mission 5
10.3.3 Career Development 5
10.3.4 Additional Opportunities 5
10.3.5 Lifelong Lessons 5
Supplemental: Unit Quizzes
11.1 Note to Teacher
11.1.1 Note to Teacher 5
11.2 IT Infrastructure Quiz
11.2.1 IT Infrastructure Quiz 20
11.3 Networking Fundamentals Quiz
11.3.1 Mindsets 1
11.3.2 Networking Fundamentals Quiz 15
11.4 Cyber Defense Quiz
11.4.1 Cyber Defense Quiz 20