Please enable JavaScript to use CodeHS

WA 3B: 3B-IC-27

CodeHS Lessons

Predict how computational innovations that have revolutionized aspects of our culture might evolve.

Standard
3.2 Uses of Programs
8.10 Cryptography
11.2 Internet Hardware
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
Standard
3.2 Uses of Programs
8.10 Cryptography
11.2 Internet Hardware
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
Standard
3.2 Uses of Programs
13.2 Internet Hardware
13.9 The Impact of the Internet
13.10 Creative Credit & Copyright
13.10 Creative Credit & Copyright
41.1 Cryptography
32.1 The Effects of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
3.1 Computer Model
3.1 Computer Model
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
9.5 Information Literacy
9.5 Information Literacy
9.6 Creative Credit & Copyright
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.4 The CIA Triad
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
10.1 Introduction to the Internet
10.1 Introduction to the Internet
10.11 Impact of the Internet
10.11 Impact of the Internet
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
Standard
10.5 Future of Computing
10.6 Computer Model
10.5 Future of Computing
10.6 Computer Model
Standard
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
2.5 Future of Computing
2.5 Future of Computing
2.6 Computer Model
2.6 Computer Model
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.5 Future of Computing
4.5 Future of Computing
5.2 Internet Hardware
5.2 Internet Hardware
5.8 The Impact of the Internet
5.8 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.5 Future of Computing
4.5 Future of Computing
4.6 Computer Model
4.6 Computer Model
8.2 Internet Hardware
8.2 Internet Hardware
8.8 The Impact of the Internet
8.8 The Impact of the Internet
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.2 History of Cryptography
21.1 Cryptography, Cryptology, Cryptanalysis
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
10.4 Final Project
8.4 The CIA Triad
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
8.4 The CIA Triad
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.1 Introduction to the Internet
5.1 Introduction to the Internet
5.8 Impact of the Internet
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.3 The CIA Triad
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.8 Information Literacy
1.8 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
2.5 Future of Computing
2.5 Future of Computing
2.6 Computer Model
2.6 Computer Model
5.2 Internet Hardware
5.2 Internet Hardware
5.7 The Impact of the Internet
5.7 The Impact of the Internet
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Information Literacy
4.5 Information Literacy
4.7 Creative Credit & Copyright
4.7 Creative Credit & Copyright
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Information Literacy
1.4 Information Literacy
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
9.1 Introduction to the Internet
9.1 Introduction to the Internet
9.10 Impact of the Internet
9.10 Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.2 Internet Hardware
4.2 Internet Hardware
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
2.5 Future of Computing
2.5 Future of Computing
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
15.4 Final Project
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.18 Uses of Programs
5.8 The Impact of the Internet
Standard
1.18 Uses of Programs
5.8 The Impact of the Internet