Please enable JavaScript to use CodeHS

SC FCS: C.3

CodeHS Lessons

Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.

Standard
11.11 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
Standard
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
9.6 Creative Credit & Copyright
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
5.8 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
8.8 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
5.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.7 Creative Credit & Copyright
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad