Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.2.6a

CodeHS Lessons

Identify different ways that systems might lose data or functionality.

Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
8.8 Data Compression
8.9 Lossy Compression
41.1 Cryptography
Standard
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
Standard
4.2 Building a Knowledge Base
Standard
5.1 Methodology
5.2 Support Practice
Standard
4.1 Methodology
4.2 Support Practice
Standard
3.1 Methodology
3.2 Support Practice
Standard
6.2 Building a Knowledge Base
Standard
4.1 Methodology
4.2 Support Practice
6.3 Building a Knowledge Base
Standard
8.8 Data Compression
8.9 Lossy Compression
8.10 Cryptography
11.9 Cybersecurity
Standard
6.2 Building a Knowledge Base
Standard
8.1 Methodology
8.2 Support Practice
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
5.1 Methodology
5.2 Support Practice
6.2 Building a Knowledge Base
Standard
2.4 Troubleshooting Methodology
Standard
2.4 Troubleshooting Methodology
Standard
5.4 Lossy Compression
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
Standard
5.4 Lossy Compression
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
Standard
25.2 Building a Knowledge Base
Standard
12.1 Methodology
12.2 Support Practice
Standard
6.7 Data Compression
6.8 Lossy Compression
7.9 Cybersecurity
Standard
10.1 Methodology
10.2 Support Practice
11.3 Building a Knowledge Base
Standard
11.1 Methodology
11.2 Support Practice
12.2 Building a Knowledge Base
Standard
4.7 Data Compression
4.8 Lossy Compression
5.6 Cybersecurity
Standard
4.7 Data Compression
4.8 Lossy Compression
5.6 Cybersecurity
Standard
11.1 Methodology
11.2 Support Practice