Please enable JavaScript to use CodeHS

TX FOC: 130.428.1C

CodeHS Lessons

(C) solve problems and think critically;

Standard
2.19 Putting Together Control Structures
10.1 Project: Guess the Word
13.1 Advanced Challenges with Tracy
16.1 Project: Who Said It?
Standard
29.1 Project: Who Said It?
Standard
13.19 Putting Together Control Structures
Standard
4.2 Programming with Karel
4.3 Looping
4.4 Branching
4.5 Arrays and Objects
4.6 Organizational Techniques
4.7 Programming Fundamentals Quiz
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
8.7 Basic Querying in SQL
8.8 Filtering Queries in SQL
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
12.1 Methodology
12.2 Support Practice
9.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.4 Hash Functions
1.5 Hash Function Development
4.2 Building a Knowledge Base
5.5 Cross-site Scripting
Standard
6.1 Putting Together Control Structures
Standard
3.19 Putting Together Control Structures
Standard
6.19 Putting Together Control Structures
Standard
3.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
2.3 Basic Crypto Systems: Caesar Cipher
2.4 Basic Crypto Systems: Cracking Caesar
2.5 Basic Crypto Systems: Vigenere Cipher
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
21.4 Basic Crypto Systems: Caesar Cipher
21.5 Basic Crypto Systems: Cracking Caesar
21.6 Basic Crypto Systems: Vigenere Cipher
21.7 Advanced Cryptography
21.8 Hash Functions
21.9 Hash Function Development
22.8 Filtering Queries in SQL
22.7 Basic Querying in SQL
22.11 Cross-site Scripting
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.12 Project: Security Assessment Report
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
10.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
3.20 Putting Together Control Structures
5.10 Securing a Network
5.11 Project: Secure the Company's Network
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges
Standard
23.2 Building a Knowledge Base
Standard
5.8 Basic Querying in SQL
5.9 Filtering Queries in SQL
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
8.3 Basic Crypto Systems: Caesar Cipher
8.4 Basic Crypto Systems: Cracking Caesar
8.5 Basic Crypto Systems: Vigenere Cipher
11.1 Methodology
11.2 Support Practice
12.2 Building a Knowledge Base
6.1 Project: Security Assessment Report
Standard
1.19 Putting Together Control Structures
5.3 Basic Crypto Systems: Caesar Cipher
5.4 Basic Crypto Systems: Cracking Caesar
5.5 Basic Crypto Systems: Vigenere Cipher
15.1 micro:bit Challenges