Please enable JavaScript to use CodeHS

FL FOC: 1.05

CodeHS Lessons

Describe ethical, privacy, and security issues and problems associated with computers and information systems.

Standard
4.7 Software Licenses
4.8 Application Security
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
1.11 Hacking Ethics
12.3 The Value of Data
Standard
5.6 Software Licenses
5.8 Application Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.8 Application Security
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
5.5 Software Licenses
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
2.7 Software Licenses
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
5.5 Software Licenses
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
12.7 Hacking Ethics
13.5 Software Licenses
13.6 Application Security
14.3 The Value of Data
Standard
2.8 Software Licenses
2.9 Application Security
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
6.5 Software Licenses
6.6 Application Security
9.3 The Value of Data
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
3.5 Software Licenses
3.6 Application Security
Standard
4.5 Software Licenses
4.6 Application Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.5 Software Licenses
1.6 Application Security
Standard
2.1 Privacy & Security
3.5 Software Licenses
3.6 Application Security
Standard
5.6 Privacy & Security
5.12 Software Licenses
5.13 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.7 Software Licenses
4.8 Application Security
Standard
11.1 The Value of Data
Standard
7.12 Software Licenses
8.5 Application Security
Standard
4.7 Software Licenses
4.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
10.7 Software Licenses
10.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
7.5 Software Licenses
7.6 Application Security
17.3 The Value of Data
Standard
5.7 Software Licenses
5.8 Application Security
Standard
3.5 Software Licenses
3.6 Application Security
Standard
10.4 Privacy & Security
Standard
1.7 Software Licenses
4.4 Privacy & Security
19.2 Software Licenses
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
6.5 Software Licenses
6.6 Application Security
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
4.5 Software Licenses
4.6 Application Security
5.4 The Value of Data
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.5 Software Licenses
1.6 Application Security
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
7.5 Software Licenses
7.6 Application Security
8.3 The Value of Data
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
2.7 Software Licenses
2.8 Application Security