Please enable JavaScript to use CodeHS

IN CS 2: CSII-8.1

CodeHS Lessons

Identify computer science occupations and the roles and responsibilities of each.

Standard
2.7 Hacking Ethics
8.4 Databases
8.5 Clients and Servers
8.9 Common Security Problems
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
2.8 Network Administration
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.11 Hacking Ethics
1.12 Common Security Problems
22.3 Databases
22.4 Clients and Servers
Standard
1.11 Hacking Ethics
Standard
9.4 Databases
9.5 Clients and Servers
9.9 Common Security Problems
21.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.7 Hacking Ethics
6.10 Network Administration
10.3 Databases
10.4 Clients and Servers
10.9 Common Security Problems
Standard
2.7 Hacking Ethics
5.10 Network Administration
Standard
1.12 Hacking Ethics
Standard
2.7 Hacking Ethics
17.9 Common Security Problems
17.9 Common Security Problems
17.4 Databases
17.5 Clients and Servers
Standard
2.3 Clients and Servers
Standard
7.6 Clients and Servers
Standard
2.7 Hacking Ethics
7.1 Clients and Servers
7.4 Common Security Problems
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
5.5 Databases
5.6 Clients and Servers
5.10 Common Security Problems
Standard
1.12 Hacking Ethics