Please enable JavaScript to use CodeHS

Points

Activity Points
What is Cybersecurity?
1.1 Module Overview - Cybersecurity
1.1.1 Welcome to Cybersecurity 1
1.1.2 Welcome to Cybersecurity 5
1.1.3 Intruder Alert! 1
1.1.4 Cybersecurity and You 5
1.1.5 Course Goals 5
1.2 What is Cybersecurity?
1.2.1 What is Cybersecurity? 1
1.2.2 What is Cybersecurity? 5
1.2.3 City Services Ransomware 1
1.2.4 Ransomware Reflection 5
1.2.5 Ransomware Simulator 1
1.2.6 Internet of Things 1
1.2.7 Hackers vs. Smart Homes 1
1.2.8 Internet of Things Reflection 5
1.2.9 Threat Map 1
1.2.10 Why Learn about Cybersecurity? 5
1.2.11 QR Code Generator 1
1.3 Impact of Cybersecurity
1.3.1 Impact of Cybersecurity 1
1.3.2 Impact of Cybersecurity 5
1.3.3 Phishing for Your Info 1
1.3.4 Phishing Reflection 5
1.3.5 Cyber Game 1
1.3.6 Cyber Game Reflection 5
1.3.7 Cyber Crime Time 1
1.3.8 Cyber Crime Time Reflection 5
1.3.9 Phishing Simulator 1
1.4 The CIA Triad
1.4.1 CIA Triad 1
1.4.2 CIA Triad 5
1.4.3 Which part of the CIA Triad? 5
1.4.4 Which part of the CIA Triad? 5
1.4.5 Breach of Confidentiality 5
1.4.6 Breach of Availability 5
1.5 What is Cybersecurity? Quiz
1.5.1 What is Cybersecurity? Quiz 25
1.5.2 Intro to Cybersecurity Badge 1
Digital Citizenship and Cyber Hygiene
2.1 Digital Footprint and Reputation
2.1.1 Digital Footprint and Reputation 1
2.1.2 Digital Footprint and Reputation 5
2.1.3 Building a Positive Digital Footprint 5
2.1.4 Right to be Forgotten? 1
2.1.5 Right to be Forgotten 5
2.1.6 What is your Digital Footprint? 5
2.1.7 Social Media Clean-up 1
2.2 Cyberbullying
2.2.1 Cyberbullying 1
2.2.2 Cyberbullying 5
2.2.3 Scenario: Student Ranking 5
2.2.4 Scenario: Singled Out 5
2.2.5 Stopping Cyberbullying 5
2.3 Internet Safety
2.3.1 Internet Safety 1
2.3.2 Internet Safety 5
2.3.3 Scenario: School Stranger 5
2.3.4 Scenario: Vacation Pals 5
2.3.5 Staying Safe 5
2.4 Privacy & Security
2.4.1 What is Data Privacy & Security? 1
2.4.2 Privacy & Security Quiz 5
2.4.3 How Strong is your Password? 1
2.4.4 How Strong is your password? 5
2.4.5 Google Privacy Policy Search 1
2.4.6 Google Privacy Policy Search 5
2.4.7 Guess: Password List 1
2.4.8 Guess: Using an Algorithm 1
2.4.9 Guess: Brute Force 1
2.5 Information Literacy
2.5.1 Information Literacy 1
2.5.2 Information Literacy 5
2.5.3 Effective Internet Searches 5
2.5.4 Evaluate the Source 1 1
2.5.5 Respond: Evaluate the Source 1 5
2.5.6 Evaluate the Source 2 1
2.5.7 Respond: Evaluate the Source 2 5
2.5.8 Hero Pig? 1
2.6 Creative Credit & Copyright
2.6.1 Creative Credit and Copyright 1
2.6.2 Creative Credit and Copyright 5
2.6.3 Cite! 5
2.6.4 Exploring Creative Commons 1
2.6.5 Respond: Creative Commons 5
2.6.6 Task: Finding Images 5
2.6.7 Reflection: Why is Copyright Important? 5
2.7 Hacking Ethics
2.7.1 Hacking Ethics & Legality 1
2.7.2 Hacking Ethics & Legality 5
2.7.3 Penetration Testing 1
2.7.4 Reflection: Penetration Testing 5
2.7.5 Hack the Pentagon? 1
2.7.6 Reflection: Hack the Pentagon 5
2.7.7 Ethical Hacker Agreement 1
2.8 Digital Citizenship and Cybersecurity Quiz
2.8.1 Digital Citizenship and Cybersecurity Quiz 25
2.8.2 Digital Citizenship and Cybersecurity Badge 1
Project: Public Service Announcement
3.1 Project: Public Service Announcement
3.1.1 Pick a Topic 5
3.1.2 Research 5
3.1.3 Choose Your Audience 5
3.1.4 What kind of PSA? 5
3.1.5 Draft your PSA 5
3.1.6 Finalize your PSA! 15
The ABCs of Cryptography
4.1 Cryptography, Cryptology, Cryptanalysis
4.1.1 Cryptography, Cryptology, Cryptanalysis 1
4.1.2 Cryptography, Cryptology, Cryptanalysis 5
4.1.3 Securing the Cloud 1
4.1.4 Encryption Reflection 5
4.1.5 Encrypt/Decrypt 1
4.1.6 Cryptogram Game! 1
4.2 History of Cryptography
4.2.1 Cryptography: A Brief History 1
4.2.2 Cryptography History Quiz 5
4.2.3 How the Enigma Worked 1
4.2.4 How the Enigma Worked 5
4.2.5 Unknown Languages and the Future of Cryptography 1
4.2.6 The Future of Cybersecurity 5
4.3 Why Encrypt?
4.3.1 Why encrypt? 1
4.3.2 Why encrypt? 5
4.4 Basic Crypto Systems: Caesar Cipher
4.4.1 Caesar Cipher 1
4.4.2 Caesar Cipher 5
4.4.3 Caesar Cipher Encryption 1
4.4.4 Decrypt Caesar's Cipher! 1
4.4.5 Decrypting Caesar 5
4.5 Basic Crypto Systems: Cracking Caesar
4.5.1 Cracking Caesar Cipher 1
4.5.2 Cracking Caesar Cipher 5
4.5.3 Cracking Caesar with Brute Force 1
4.5.4 Letter Frequency and Caesar 1
4.5.5 Examining Caesar Cipher 5
4.6 Basic Crypto Systems: Vigenere Cipher
4.6.1 Vigenere Cipher 1
4.6.2 Vigenere Cipher 5
4.6.3 Vigenere Cipher Example 1
4.6.4 Letter Frequency and Vigenere Cipher 1
4.6.5 Examining Vigenere Cipher 5
4.6.6 Improving Vigenere 1
4.7 Advanced Cryptography
4.7.1 Advanced Cryptography 1
4.7.2 Advanced Cryptography 5
4.7.3 Public Key Cryptography for Non-Geeks 1
4.7.4 Examining Public Key Cryptography 5
4.7.5 Public Key Cryptography 1
4.7.6 Public Key Cryptography 5
4.8 Hash Functions
4.8.1 Hash Functions 1
4.8.2 Hash Functions 5
4.8.3 Google Shattered Crypto Algorithm 1
4.8.4 Hash Functions in the News 5
4.8.5 Using a Hash Generator 1
4.8.6 Hash Generator 5
4.9 Hash Function Development
4.9.1 Hash Function Development 1
4.9.2 Hash Function Development 5
4.9.3 Modulo Math Calculator 1
4.9.4 Understanding Modulo Math 1
4.9.5 Modulo Game! 1
4.9.6 Develop a Simple Hash Function 5
4.10 The ABCs of Cryptography Quiz
4.10.1 The ABCs of Cryptography Quiz 25
4.10.2 ABCs of Cryptography Badge 1
Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
5.1.1 Overview 1
5.1.2 Preview Sample Newscasts 5
5.1.3 Investigate a Classic Cipher 1
5.1.4 Write the Script and Rehearse 5
5.1.5 Newscast Presentation 15
Software Security
6.1 Inside Web Apps
6.1.1 Inside Web Apps 1
6.1.2 Inside Web Apps 5
6.1.3 Using View Page Source 5
6.1.4 Getting Started with OWASP 1
6.1.5 Getting Started with OWASP 5
6.1.6 Recreate a Webpage? 1
6.2 Developer Tools
6.2.1 Developer Tools 1
6.2.2 Developer Tools 5
6.2.3 Using the Developer Tools 5
6.2.4 The Top Cybersecurity Blogs and Websites 1
6.2.5 Selecting a Site to Follow 5
6.2.6 Console Secrets 5
6.2.7 Local Storage 1
6.3 Databases
6.3.1 Databases 1
6.3.2 Databases 1
6.3.3 Database Administrator Career 1
6.3.4 Database Administrator Career 5
6.3.5 Parts of a Database 1
6.3.6 Parts of a Database 1
6.3.7 SQL Database Diagram 1
6.3.8 SQL Database Diagram 5
6.3.9 Schema Brainstorm 5
6.4 Clients and Servers
6.4.1 Clients and Servers 1
6.4.2 Clients and Servers 2
6.4.3 Inside a Google Data Center 1
6.4.4 Inside a Google Data Center 5
6.4.5 Cloud Vulnerabilities 1
6.4.6 Cloud Vulnerabilities Response 5
6.4.7 Client-Server Model 1
6.4.8 Client-Server Model 2
6.4.9 The Future of User Privacy 1
6.4.10 The Future of User Privacy 5
6.5 What is SQL?
6.5.1 What is SQL Overview 1
6.5.2 Intro to SQL 1
6.5.3 Quiz: What is SQL? 1
6.6 Structuring Data in SQL
6.6.1 How to Structure Data in SQL 1
6.6.2 How to Structure Data in SQL 3
6.6.3 SQL Tables 1
6.7 Basic Querying in SQL
6.7.1 The SELECT Statement 1
6.7.2 Basic Querying in SQL 1
6.7.3 Our First SELECT Statement 1
6.7.4 Your First SELECT Statement 5
6.7.5 More SELECT Statement 1
6.7.6 More SELECT Statement 1
6.7.7 Selecting Specific Columns 1
6.7.8 Harry Potter Names 5
6.8 Filtering Queries in SQL
6.8.1 The WHERE Clause 1
6.8.2 Condition Operators 5
6.8.3 Ravenclaw House 1
6.8.4 People in Gryffindor 1
6.8.5 Filter By ID 1
6.8.6 The Weasleys 5
6.8.7 The Potters 5
6.9 Common Security Problems
6.9.1 Common Security Problems 1
6.9.2 Common Security Problems 5
6.9.3 Meet Security Engineers at Google 1
6.9.4 Security Engineering Reflection 5
6.9.5 Living in a Digital World 1
6.9.6 Living in a Digital World 5
6.10 SQL Injection Overview
6.10.1 SQL Injection Overview 1
6.10.2 SQL Injection Overview 5
6.10.3 Equifax Security Breach 1
6.10.4 Equifax Exposed Millions 1
6.10.5 Equifax SQL Injection Attack 5
6.10.6 SQLi 1
6.11 Types of SQLi and Prevention
6.11.1 Types of SQLi 1
6.11.2 Types of SQLi 3
6.11.3 Preventing SQLi 1
6.11.4 Preventing SQLi 2
6.11.5 Mitigating SQL Injection 1
6.11.6 Reflection: Mitigating SQL Injection 5
6.11.7 SQL Injection 1
6.12 Cross-site Scripting
6.12.1 Cross-site Scripting 1
6.12.2 Cross-site Scripting 5
6.12.3 XSS Bug in Yahoo Mail 1
6.12.4 XSS Bug in Yahoo Mail 5
6.12.5 XSS Demo Overview 1
6.12.6 Hacksplaining XSS Demo 1
6.12.7 Google's Tutorial for XSS 1
6.12.8 XSS Reflection 5
6.13 Software Security Quiz
6.13.1 Software Security Quiz 25
6.13.2 Software Security Badge 1
Networking Fundamentals
7.1 Introduction to the Internet
7.1.1 Welcome to the Internet 1
7.1.2 Intro to the Internet 5
7.1.3 Inside Facebook's Connectivity Lab 1
7.1.4 Connectivity Lab Reflection 5
7.2 Internet Hardware and Sending Information
7.2.1 Internet Hardware 1
7.2.2 Internet Hardware 2
7.2.3 Sending Information 1
7.2.4 Sending Information 3
7.2.5 The Internet is in the Ocean 1
7.2.6 Internet in the Ocean Reflection 5
7.3 Internet Addresses
7.3.1 Internet Addresses 1
7.3.2 Internet Addresses 5
7.3.3 The Need for Addresses 5
7.3.4 IPv4 vs. IPv6 1
7.3.5 The Long Transition to IPv6 1
7.3.6 Reflection: IPv4 vs IPv6 5
7.4 Domain Name System (DNS)
7.4.1 Domain Name System (DNS) 1
7.4.2 Domain Name System 5
7.4.3 How Does DNS Work? 1
7.4.4 How Does DNS Work? 5
7.5 Routing
7.5.1 Routing 1
7.5.2 Routing 5
7.5.3 Redundancy 5
7.6 Packets & Protocols
7.6.1 Packets 1
7.6.2 Packets 2
7.6.3 Protocols 1
7.6.4 Protocols 3
7.6.5 Passing Notes 1
7.6.6 How the Internet Works 1
7.6.7 The Journey of an Image 5
7.7 Viewing a Webpage
7.7.1 Viewing a Webpage 1
7.7.2 Viewing a Webpage 5
7.7.3 Explaining a URL 5
7.7.4 Net Neutrality Explained 1
7.7.5 FCCs Net Neutrality Rules Officially Repealed 1
7.7.6 Take a Side on Net Neutrality 5
7.7.7 Net Neutrality and Cybersecurity 1
7.7.8 Net Neutrality and Cybersecurity Research 5
7.8 Impact of the Internet
7.8.1 Impact of the Internet 1
7.8.2 Impact of the Internet 5
7.8.3 What is the Digital Divide? 1
7.8.4 What is the Digital Divide? 5
7.9 Network Attacks
7.9.1 Network Attacks Overview 1
7.9.2 Network Attacks 5
7.9.3 Common Network Attacks 1
7.9.4 Network Attacks 5
7.9.5 Social Engineering Hack 1
7.9.6 Social Engineering Reflection 5
7.9.7 DDoS Attacks 1
7.9.8 DDoS Reflection 5
7.9.9 DDoS Simulation 1
7.9.10 SUPPLEMENTARY: Other Network Attacks 1
7.10 Network Administration
7.10.1 Access Control 1
7.10.2 Access Control 5
7.10.3 RADIUS Overview with AAA Protocol 1
7.10.4 RADIUS Server Access Control 1
7.10.5 RADIUS Reflection 5
7.10.6 Detecting Intrusions to Secure a Network 1
7.10.7 Securing a Network 5
7.10.8 How to Secure your IT Network 1
7.10.9 Secure your IT Network Basics 5
7.10.10 Network Administrator Career 1
7.10.11 Network Administrator Career 5
7.10.12 Multifactor Authentication 1
7.10.13 Two Factor Authentication 1
7.10.14 Authorization 1
7.10.15 Setting up a Firewall 1
7.11 Networking Fundamentals Quiz
7.11.1 Networking Fundamentals Quiz 25
7.11.2 Networking Fundamentals Badge 1
Project: Secure the Company's Network
8.1 Project: Secure the Company's Network
8.1.1 Secure the Company's Network 1
8.1.2 Establish Firewall Rules 5
8.1.3 Establish Firewall Rules Handout 1
8.1.4 Reading Logs 5
8.1.5 Reading Logs Handout 1
8.1.6 SSH Logs 1
8.1.7 Project Reflection 5
Final Course Project
9.1 Final Course Project
9.1.1 Choose Your Own Adventure 1
9.1.2 Choose Your Adventure 5
9.1.3 Research 5
9.1.4 Choose Your Target Audience 5
9.1.5 Draft Your Presentation 5
9.1.6 Draft Your Flyer 5
9.1.7 Make Your Presentation with Handout! 5
Final Exam
10.1 Final Exam
10.1.1 Final Exam 50
Cryptocurrency
11.1 What is Currency?
11.1.1 What is Currency? 1
11.1.2 What is Currency? 5
11.1.3 What Gives Paper Money Its Actual Value 1
11.1.4 What Gives Money Its Value 5
11.1.5 Money: What is it Good For? 1
11.2 What is Cryptocurrency?
11.2.1 Cryptocurrency Basics 1
11.2.2 Cryptocurrency Basics 5
11.2.3 Cryptocurrency Module Overview 1
11.2.4 Cryptocurrencies Might Help Developing Countries 1
11.2.5 Cryptocurrencies are Helping Developing Countries 5
11.2.6 Show Me the Money 1
11.2.7 American Currency Exhibit 5
11.3 Intro to Blockchain
11.3.1 Intro to Blockchain 1
11.3.2 Intro to Blockchain 5
11.3.3 CryptoKitties 1
11.3.4 CryptoKitties 5
11.4 Hashing
11.4.1 Hashing 1
11.4.2 Hashing 5
11.4.3 SHA256 Hash Generator 1
11.4.4 Using the SHA256 Hash Generator 5
11.5 Proof of Work
11.5.1 Proof of Work 1
11.5.2 Proof of Work 5
11.5.3 Mining the Block 1
11.5.4 Mining the Block 5
11.5.5 PoW vs. Proof of Stake 1
11.5.6 PoW vs. PoS 5
11.5.7 Checking Proof of Work 1
11.6 Advanced Blockchain
11.6.1 Advanced Blockchain (part 1) 1
11.6.2 Advanced Blockchain (part 1) 5
11.6.3 Blockchain Buzz 1
11.6.4 Blockchain Buzz 5
11.6.5 Advanced Blockchain (part 2) 1
11.6.6 Advanced Blockchain (part 2) 5
11.6.7 Make a Blockchain 1
11.6.8 SUPPLEMENTARY: How to TimeStamp a Document 1
11.7 Cryptocurrencies
11.7.1 Cryptocurrencies 1
11.7.2 Cryptocurrencies 5
11.7.3 Shiny Toy Phenomenon 5
11.7.4 Walmart Using Blockchain to Stop Spread of Disease 1
11.7.5 Walmart Use of Blockchain 5
11.8 Bitcoin
11.8.1 Bitcoin 1
11.8.2 Bitcoin 5
11.8.3 51% Attack Explained 1
11.8.4 51% Attack 5
11.8.5 Why the Bitcoin Bubble will Burst in 2018 1
11.8.6 Bitcoin Bust 5
11.8.7 Explore the Bitcoin Blockchain 1
11.9 Pros, Cons, and Future of Cryptocurrencies
11.9.1 Pros, Cons, and Future of Cryptocurrencies 1
11.9.2 Pros, Cons and Future of Cryptocurrencies 5
11.9.3 Pros, Cons and future of Cryptocurrencies 5
11.9.4 Cryptocurrency Pros and Cons 1
11.9.5 Crypto Pros and Cons 5
11.9.6 What is HODL? 1
11.9.7 What is HODL? 5
11.9.8 Pros, Cons, and Future of Cryptocurrencies 5
11.10 Project: Cryptocurrency Expert Panel Talk
11.10.1 Overview 5
11.10.2 Preview Sample Expert Panels 5
11.10.3 Investigate a Cryptocurrency Topic 5
11.10.4 Write an Outline and Rehearse 5
11.10.5 Expert Panel Talk (Presentation) 5
11.11 Cryptocurrency Quiz
11.11.1 Cryptocurrency Quiz 25
11.11.2 Cryptocurrency Badge 0
Simulations
12.1 Simulations
12.1.1 Ransomware Simulator 1
12.1.2 Intruder Alert! 1
12.1.3 Phishing Simulator 1
12.1.4 QR Code Generator 1
12.1.5 You Can Be Tracked! 1
12.1.6 Social Media Clean-up 1
12.1.7 Guess: Password List 1
12.1.8 Guess: Using an Algorithm 1
12.1.9 Guess: Brute Force 1
12.1.10 Encrypt/Decrypt 1
12.1.11 Cryptogram Game! 1
12.1.12 Caesar Cipher Encryption 1
12.1.13 Decrypt Caesar's Cipher! 1
12.1.14 Cracking Caesar with Brute Force 1
12.1.15 Letter Frequency and Vigenere Cipher 1
12.1.16 Improving Vigenere 1
12.1.17 Modulo Math Calculator 1
12.1.18 Understanding Modulo Math 1
12.1.19 Modulo Game! 1
12.1.20 Recreate a Webpage? 1
12.1.21 Console Secrets 5
12.1.22 Local Storage 1
12.1.23 Schema Brainstorm 5
12.1.24 SQL Tables 1
12.1.25 SQLi 1
12.1.26 SQL Injection 1
12.1.27 DDoS Simulation 1
12.1.28 Multifactor Authentication 1
12.1.29 Two Factor Authentication 1
12.1.30 Authorization 1
12.1.31 Setting up a Firewall 1
SQL Part II: The SQL
13.1 More Filtering Practice
13.1.1 Initials 5
13.1.2 Compound Queries with BETWEEN 5
13.1.3 Gryffindors With G Names 5
13.1.4 R First Names 5
13.1.5 FF Houses 5
13.2 Ordering Results
13.2.1 The ORDER BY Keyword 1
13.2.2 ORDER BY 1
13.2.3 ORDER BY First Name 1
13.2.4 Reverse Order 1
13.2.5 Order By Multiple Fields 1
13.2.6 House Ordering 5
13.2.7 Sort the P Names 5
13.3 Renaming Fields
13.3.1 Renaming Fields with AS 1
13.3.2 Renaming in the House Table 1
13.3.3 Changing Column Names 5
13.4 Joining Tables
13.4.1 The JOIN command 1
13.4.2 Basic Joining 1
13.4.3 Letters and Numbers 1
13.4.4 Person and House 1
13.4.5 Person and House (Correct) 1
13.4.6 Person and House (with namespacing) 1
13.4.7 List All Gryffindors 5
13.4.8 JOIN With Yourself 1
13.4.9 Renaming Tables 1
13.4.10 Quidditch Matchups 1
13.4.11 Quidditch Matchups: Ravenclaw Away Games 5
13.5 More Joining Tables
13.5.1 The Course Table 1
13.5.2 Courses and Professors 5
13.5.3 Courses, Professors, and Houses 5
13.5.4 Courses Taught By Gryffindors 5
13.5.5 The Enrollment Table 1
13.5.6 Students Taking Potions 5
13.5.7 Non-Slytherins Taking Potions 5
13.5.8 Defense Students by House 5
13.5.9 Neville's Courses 5
Web Development
14.1 Introduction to HTML
14.1.1 Introduction to HTML 1
14.1.2 Introduction to HTML Quiz 5
14.1.3 Our First HTML Page 1
14.1.4 Say Hello! 5
14.2 Structure of an HTML Page
14.2.1 Structure of an HTML Page 1
14.2.2 Structure of an HTML Page Quiz 5
14.2.3 HTML Template 1
14.2.4 Hello World Page 1
14.2.5 The <title> Tag 5
14.2.6 Your First HTML Page 5
14.2.7 Structure Badge 1
14.3 Formatting Text
14.3.1 Formatting Text 1
14.3.2 Formatting Text Quiz 5
14.3.3 Dictionary 1
14.3.4 That's Bold 5
14.3.5 Artificial Intelligence 5
14.3.6 State Capitals 5
14.4 Links
14.4.1 Links 1
14.4.2 Links Quiz 5
14.4.3 The <a> Tag 1
14.4.4 Simple Link 5
14.4.5 My Favorite Websites 5
14.5 Images
14.5.1 Images 1
14.5.2 Images Quiz 5
14.5.3 The <img> Tag 1
14.5.4 Building the CodeHS Homepage 1
14.5.5 Collage on a Theme 5
14.5.6 Linking an Image 5
14.5.7 Personal Library 5
14.5.8 Images Badge 1
14.6 HTML Lists
14.6.1 HTML Lists 1
14.6.2 HTML Lists Quiz 5
14.6.3 Grocery Shopping 1
14.6.4 Favorite Things 5
14.6.5 To-Do List 5
14.6.6 List Article 5
14.7 HTML Tables
14.7.1 HTML Tables 1
14.7.2 HTML Tables Quiz 5
14.7.3 Address Book 1
14.7.4 Favorite Songs 5
14.7.5 Calendar 5
14.8 HTML Styling
14.8.1 HTML Styling 1
14.8.2 HTML Styling Quiz 5
14.8.3 Stylish Address Book 1
14.8.4 Background Colors 5
14.8.5 Style Your To-Do List 5
14.9 Introduction to CSS
14.9.1 Introduction to CSS 1
14.9.2 Introduction to CSS Quiz 5
14.9.3 Styling Your H1s 1
14.9.4 First Style with CSS 5
14.9.5 List Styling 5
14.10 CSS Select by Tag
14.10.1 CSS Select by Tag 1
14.10.2 CSS Select by Tag Quiz 5
14.10.3 Rainbow 1
14.10.4 Dog Styling 1
14.10.5 Restaurant Menu 5
14.10.6 Put Karel Together 5
14.11 CSS Select by Class
14.11.1 CSS Select by Class 1
14.11.2 CSS Select by Class Quiz 5
14.11.3 Simple Checkerboard 1
14.11.4 Tic Tac Toe 5
14.11.5 Music Library 5
14.12 CSS Select by ID
14.12.1 CSS Select by ID 1
14.12.2 CSS Select by ID Quiz 5
14.12.3 Logo 1
14.12.4 Favorite Dog 5
14.12.5 Bingo 5
14.12.6 CSS Badge 1
14.13 Viewing Websites
14.13.1 Viewing Websites 1
14.13.2 Viewing Websites Quiz 5
14.13.3 Explaining a URL 5
14.14 Web Development Quiz
14.14.1 Web Development Quiz 25
14.15 Your First Website
14.15.1 Set Up Your codehs.me Website 10
14.15.2 Practice PT: Your First Website 10
14.15.3 Website Badge 1
Midterm
15.1 Midterm
15.1.1 Midterm 25