Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.6a

CodeHS Lessons

Identify different ways that systems might lose data or functionality.

Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
8.8 Data Compression
8.9 Lossy Compression
41.1 Cryptography
Standard
12.1 Methodology
12.2 Support Practice
Standard
4.2 Building a Knowledge Base
Standard
5.1 Methodology
5.2 Support Practice
Standard
3.1 Methodology
3.2 Support Practice
Standard
7.2 Building a Knowledge Base
Standard
4.1 Methodology
4.2 Support Practice
6.3 Building a Knowledge Base
Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
8.1 Methodology
8.2 Support Practice
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
5.1 Methodology
5.2 Support Practice
6.2 Building a Knowledge Base
Standard
23.2 Building a Knowledge Base
Standard
12.1 Methodology
12.2 Support Practice
Standard
6.7 Data Compression
6.8 Lossy Compression
7.9 Cybersecurity
Standard
11.1 Methodology
11.2 Support Practice
12.3 Building a Knowledge Base
Standard
11.1 Methodology
11.2 Support Practice
12.2 Building a Knowledge Base
Standard
4.7 Data Compression
4.8 Lossy Compression
5.6 Cybersecurity
Standard
4.7 Data Compression
4.8 Lossy Compression
5.6 Cybersecurity
Standard
4.1 Methodology
4.2 Support Practice