Please enable JavaScript to use CodeHS

South Carolina Intermediate Computer Programming

Description

In this lesson, students will learn how to navigate the digital world safely by understanding common cyber threats and implementing protective measures. Through interactive activities and creative storytelling, students will explore various cyberattacks, their consequences, and strategies for defense. This awareness will empower them to make responsible choices online and protect themselves from cybercrime.

Objective

Students will be able to:

  • Identify and define different types of cyberattacks (malware, viruses, ransomware, spyware, phishing)
  • Explain the importance of preventative measures like antivirus software, updates, HTTPS, and firewalls
  • Analyze real-world examples of phishing attacks and develop strategies for identifying suspicious online activities
Description

In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

Objective

Students will be able to:

  • Explain what copyright laws are and why they are important
  • Find images they are legally allowed to use in their projects
  • Accurately attribute images they find and want to use
Description

In this lesson, students will learn about ethical and legal considerations in computing and how these can create bias.

Objective

Students will be able to:

  • Explain how bias can be prevented or minimized in computing.
  • Identify ethical and legal considerations when using computing technologies.
Description

In this lesson, students learn about the importance of giving proper attribution when using someone else’s code. Students also learn about the license agreements and the implications of using a third-party resource during program development.

Objective

Students will be able to:

  • Explain how to give proper attribution when using non-user-created resources
  • Document a program that uses non-user-created code and give attribution to the author
  • Explain the difference between open-source and proprietary licenses
  • Explain the benefits and implications of using licensed code
  • Define API
Description

In this lesson, students explore the impacts of being online. Students reflect on social media use and their digital footprint as well as learn how to identify and respond to cyberbullying.

Objective

Students will be able to:

  • Analyze the impact of social media and technology use on the lives of teenagers
  • Explain how one’s digital footprint can impact their future employment options
  • Analyze their own digital footprint and explain how they can maintain a positive digital footprint
  • Define cyberbullying
  • Explain how to respond to cyberbullying
  • (Optional) Choose the best privacy settings to protect their digital footprint and prevent cyberbullying
Description

In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Objective

Students will be able to:

  • Evaluate the accuracy, relevance, comprehensiveness, appropriateness, and bias of electronic information resources
  • Evaluate quality of digital resources for reliability
  • Reflect on the growth of artificial intelligence in terms of trustworthy content
  • Explore and use search engine keywords and special characters to refine search results