Please enable JavaScript to use CodeHS

FL FOC: 11.02

CodeHS Lessons

Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection.

Standard
4.8 Application Security
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
Standard
5.8 Application Security
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.8 Application Security
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
13.6 Application Security
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.6 Application Security
Standard
1.3 Impact of Cybersecurity
3.6 Application Security
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
13.3 Impact of Cybersecurity
Standard
10.8 Application Security
Standard
11.3 Impact of Cybersecurity
Standard
1.4 Impact of Cybersecurity
7.6 Application Security
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
6.6 Application Security
Standard
1.3 Impact of Cybersecurity
4.6 Application Security
Standard
13.3 Impact of Cybersecurity
Standard
1.6 Application Security
Standard
1.3 Impact of Cybersecurity
7.6 Application Security