Please enable JavaScript to use CodeHS

WV M: CS.M.37

CodeHS Lessons

Summarize appropriate and inappropriate technological behaviors, including issues of privacy, copyright, security, legalities, and politics.

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.11 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
Standard
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
9.6 Creative Credit & Copyright
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
10.10 Creative Credit & Copyright
10.10 Creative Credit & Copyright
2.7 Hacking Ethics
7.5 Software Licenses
Standard
7.4 Level 4: Data and Licenses
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.7 Creative Credit & Copyright
Standard
1.3 Privacy & Security
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
Standard
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
4.5 Software Licenses
7.4 Level 4: Data and Licenses
Standard
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
Standard
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
Standard
14.7 Ethical Issues Around Data Collection
Standard
13.7 Ethical Issues Around Data Collection