Please enable JavaScript to use CodeHS

TX MS Tech Apps: 126.16.C.5.D

CodeHS Lessons

understand and explain the negative impact of inappropriate technology use, including online bullying and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as software, music, video, and other media

Standard
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security