Please enable JavaScript to use CodeHS

AK 9-12: L1.CGEI.SLE.5

CodeHS Lessons

Discuss diverse careers that are influenced by computer science and its availability to all regardless of background.

Standard
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
12.7 The Impact of the Internet
Standard
8.4 Penetration Testing
Standard
12.9 The Impact of the Internet
32.1 The Effects of the Internet
Standard
12.8 Project: The Effects of the Internet
12.7 The Impact of the Internet
10.5 Future of Computing
Standard
12.8 Project: The Effects of the Internet
12.7 The Impact of the Internet
10.5 Future of Computing
Standard
2.5 Future of Computing
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
2.5 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
12.4 Clients and Servers
12.8 Databases
12.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
12.2 Future of Computing
Standard
1.12 Hacking Ethics
14.2 Future of Computing
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.12 Hacking Ethics
4.5 Future of Computing
Standard
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
2.7 Impact of the Internet
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
4.5 Impact of the Internet
4.6 Future of Computing
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
5.2 Impact of the Internet
Standard
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
4.5 Future of Computing
22.3 Databases
22.4 Clients and Servers
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
4.5 Impact of the Internet
4.6 Future of Computing
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
Standard
12.7 Hacking Ethics
14.4 Databases
14.5 Clients and Servers
14.9 Common Security Problems
15.10 Impact of the Internet
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
9.4 Databases
9.5 Clients and Servers
9.9 Common Security Problems
12.4 Penetration Testing
24.10 Impact of the Internet
21.7 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
8.11 The Impact of the Internet
Standard
8.11 The Impact of the Internet
Standard
3.8 The Impact of the Internet
9.5 Future of Computing
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.7 Hacking Ethics
6.8 Impact of the Internet
10.3 Databases
10.4 Clients and Servers
10.9 Common Security Problems
13.7 The Impact of the Internet
14.1 Project: The Effects of the Internet
Standard
2.7 Hacking Ethics
5.8 Impact of the Internet
Standard
2.11 Impact of the Internet
Standard
7.11 Impact of the Internet
Standard
1.5 Future of Computing
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
7.10 The Impact of the Internet
Standard
12.7 The Impact of the Internet
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
1.12 Hacking Ethics
2.5 Future of Computing
Standard
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
10.10 Impact of the Internet
13.4 Penetration Testing
17.4 Databases
17.5 Clients and Servers
Standard
2.6 Future of Computing
7.10 The Impact of the Internet
Standard
1.8 Future of Computing
2.4 Hacking Ethics
Standard
4.6 Future of Computing
7.7 The Impact of the Internet
Standard
1.8 Future of Computing
Standard
2.3 Clients and Servers
Standard
3.7 The Impact of the Internet
7.6 Clients and Servers
7.8 Future of Computing
13.1 Project: The Effects of the Internet
Standard
2.7 Hacking Ethics
7.1 Clients and Servers
7.4 Common Security Problems
8.12 Impact of the Internet
15.4 Penetration Testing
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.5 Databases
5.6 Clients and Servers
5.10 Common Security Problems
9.10 Impact of the Internet
13.4 Penetration Testing
Standard
2.5 Future of Computing
9.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
5.8 The Impact of the Internet
Standard
5.8 The Impact of the Internet
Standard
2.11 Impact of the Internet
Standard
10.10 The Impact of the Internet
11.1 The Effects of the Internet
Standard
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
9.10 Impact of the Internet
Standard
2.5 Future of Computing
9.7 The Impact of the Internet