Please enable JavaScript to use CodeHS

AK 6-8: 6.GCEI.C.01

CodeHS Lessons

Explain how computing impacts people's' everyday activities and explore carriers related to the field of computer science.

Standard
12.7 The Impact of the Internet
Standard
2.7 Hacking Ethics
8.9 Common Security Problems
9.10 Impact of the Internet
Standard
4.7 The Future of Computing
Standard
3.7 The Future of Computing
Standard
2.5 Future of Computing
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
2.5 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
11.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
12.2 Future of Computing
Standard
1.12 Hacking Ethics
14.2 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.12 Hacking Ethics
4.5 Future of Computing
Standard
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
2.7 Impact of the Internet
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
4.5 Impact of the Internet
4.6 Future of Computing
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
5.2 Impact of the Internet
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
4.5 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
Standard
12.7 Hacking Ethics
14.9 Common Security Problems
15.10 Impact of the Internet
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
9.9 Common Security Problems
24.10 Impact of the Internet
21.7 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
3.8 The Impact of the Internet
9.5 Future of Computing
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.7 Hacking Ethics
6.8 Impact of the Internet
10.9 Common Security Problems
13.7 The Impact of the Internet
14.1 Project: The Effects of the Internet
Standard
2.7 Hacking Ethics
5.8 Impact of the Internet
Standard
2.11 Impact of the Internet
Standard
7.11 Impact of the Internet
Standard
1.5 Future of Computing
5.13 Hacking Ethics
Standard
3.7 The Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.12 Hacking Ethics
2.5 Future of Computing
Standard
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
10.10 Impact of the Internet
Standard
2.6 Future of Computing
Standard
1.8 Future of Computing
2.4 Hacking Ethics
Standard
4.6 Future of Computing
7.7 The Impact of the Internet
Standard
1.8 Future of Computing
Standard
3.7 The Impact of the Internet
7.8 Future of Computing
13.1 Project: The Effects of the Internet
Standard
2.7 Hacking Ethics
7.4 Common Security Problems
9.12 Impact of the Internet
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.10 Common Security Problems
9.10 Impact of the Internet
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
2.11 Impact of the Internet
Standard
3.11 Hacking Ethics
Standard
3.7 The Future of Computing