Please enable JavaScript to use CodeHS

FL FOC: 11.02

CodeHS Lessons

Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection.

Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
7.6 Application Security
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.8 Application Security
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
Standard
8.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.6 Application Security
Standard
1.3 Impact of Cybersecurity
3.6 Application Security
Standard
13.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
7.6 Application Security
Standard
9.2 Impact of Cybersecurity
Standard
14.3 Impact of Cybersecurity
Standard
1.6 Application Security
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
1.3 Impact of Cybersecurity
4.6 Application Security
Standard
13.3 Impact of Cybersecurity