Please enable JavaScript to use CodeHS

TX MS Tech Apps: 126.16.C.5.D

CodeHS Lessons

understand and explain the negative impact of inappropriate technology use, including online bullying and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as software, music, video, and other media

Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
6.4 Cybersecurity
7.2 Cyberbullying
7.4 Privacy & Security
7.7 Hacking Ethics
Standard
5.2 Cyberbullying
5.4 Privacy & Security
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
1.4 Digital Footprint and Reputation
Standard
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.2 Cyberbullying
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.5 Privacy & Security
4.8 Cyberbullying
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
12.1 Digital Footprint and Reputation
12.2 Cyberbullying
12.3 Internet Safety
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
21.2 Cyberbullying
21.7 Hacking Ethics
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
8.2 Cyberbullying
8.1 Digital Footprint and Reputation
8.3 Internet Safety
8.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
2.1 Privacy & Security
Standard
5.3 Digital Footprint and Reputation
5.4 Cyberbullying
5.5 Internet Safety
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.2 Cyberbullying
1.4 Privacy & Security
1.7 Hacking Ethics
4.4 Cybersecurity
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
2.4 Hacking Ethics
Standard
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.3 Internet Safety
10.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.5 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
2.3 Digital Footprint and Reputation
Standard
4.4 Cybersecurity
6.2 Cyberbullying
6.4 Privacy & Security
6.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation
Standard
3.3 Digital Footprint and Reputation
3.4 Cyberbullying
3.5 Internet Safety
3.6 Privacy & Security
3.11 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
2.2 Cyberbullying
2.4 Privacy & Security
2.7 Hacking Ethics