Please enable JavaScript to use CodeHS

AL 9-12: R1

CodeHS Lessons

R1) Identify, demonstrate, and apply personal safe use of digital devices.

Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
Standard
3.1 Network Attacks
3.4 Additional Attacks
6.3 Private Networks
6.4 Mobile Devices
Standard
1.4 Digital Footprint and Reputation
Standard
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
11.1 Computer Ethics
Standard
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
Standard
5.8 Application Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.8 Application Security
6.8 Private Networks
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
3.7 Mobile Devices
8.3 Network Attacks
8.6 Additional Attacks
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
Standard
12.1 Digital Footprint and Reputation
12.3 Internet Safety
12.4 Privacy & Security
13.6 Application Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
2.9 Application Security
Standard
3.3 Personal Data and Collection
3.6 Personal Data Security
Standard
6.6 Application Security
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
3.6 Application Security
Standard
2.2 Personal Data and Collection
2.5 Personal Data Security
2.6 Common Cyber Attacks and Prevention
4.5 Application Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.6 Application Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
8.1 Digital Footprint and Reputation
8.3 Internet Safety
8.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
3.6 Application Security
4.14 Mobile Devices
Standard
5.3 Digital Footprint and Reputation
5.5 Internet Safety
5.6 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
Standard
8.5 Application Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
4.8 Application Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
5.2 Personal Data and Collection
5.5 Personal Data Security
5.7 Common Cyber Attacks and Prevention
10.8 Application Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
8.1 Network Attacks
18.4 Private Networks
18.4 Private Networks
18.5 Mobile Devices
Standard
2.3 Digital Footprint and Reputation
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
1.7 Common Cyber Attacks and Prevention
5.8 Application Security
Standard
1.2 Personal Data and Collection
3.6 Application Security
5.13 Private Networks
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
Standard
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
Standard
1.6 Application Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
6.6 Application Security
9.8 Private Networks
13.1 Network Attacks
13.4 Additional Attacks
Standard
1.3 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
4.6 Application Security
4.10 Mobile Devices
Standard
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
5.5 Private Networks
Standard
5.5 Private Networks
Standard
4.2 Personal Data and Collection
4.5 Personal Data Security
4.7 Common Cyber Attacks and Prevention
Standard
1.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation