Please enable JavaScript to use CodeHS

ID 9-10: 9-10.IC.01

CodeHS Lessons

Explain the social and economic implications associated with unethical computing practices (e.g. software piracy, intrusion, malware, current corporate fraud examples).

Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.4 Additional Attacks
5.6 Internal Threats
Standard
9.4 Privacy & Security
Standard
13.7 Network Attacks
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
1.11 Hacking Ethics
12.9 Common Security Problems
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
8.3 Network Attacks
8.4 Malware Types and Prevention
8.6 Additional Attacks
8.7 Internal Threats
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Common Security Problems
8.7 Network Attacks
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
12.7 Hacking Ethics
14.9 Common Security Problems
Standard
9.9 Common Security Problems
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
6.9 Network Attacks
10.9 Common Security Problems
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
5.9 Network Attacks
Standard
2.1 Privacy & Security
Standard
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
8.1 Network Attacks
8.2 Malware Types and Prevention
17.9 Common Security Problems
17.9 Common Security Problems
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
7.4 Common Security Problems
13.1 Network Attacks
13.2 Malware Types and Prevention
13.4 Additional Attacks
13.6 Internal Threats
Standard
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
5.10 Common Security Problems
Standard
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
8.9 Common Security Problems