Please enable JavaScript to use CodeHS

OH 8: IC.SLE.8.a

CodeHS Lessons

Explain user privacy concerns related to the collection and generation of data that may not be evident through automated processes.

Standard
4.7 Software Licenses
4.9 Browser Configuration
Standard
4.6 Ethics and Legal Considerations
7.4 Privacy & Security
7.7 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
5.4 Privacy & Security
5.7 Hacking Ethics
Standard
9.4 Privacy & Security
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.6 Software Licenses
5.9 Browser Configuration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
7.4 Privacy & Security
7.7 Hacking Ethics
Standard
1.6 Privacy & Security
Standard
1.3 Privacy & Security
5.5 Software Licenses
Standard
1.3 Privacy & Security
2.7 Software Licenses
Standard
1.6 Privacy & Security
Standard
1.3 Privacy & Security
5.5 Software Licenses
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.5 Software Licenses
13.7 Browser Configuration
Standard
3.6 Ethics and Legal Considerations
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
14.5 Software Licenses
Standard
14.5 Software Licenses
Standard
6.5 Software Licenses
6.7 Browser Configuration
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.5 Software Licenses
3.7 Browser Configuration
Standard
4.5 Software Licenses
4.7 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.5 Software Licenses
1.7 Browser Configuration
Standard
2.1 Privacy & Security
3.5 Software Licenses
3.7 Browser Configuration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
5.12 Software Licenses
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
3.6 Ethics and Legal Considerations
Standard
4.6 Ethics and Legal Considerations
Standard
1.6 Privacy & Security
Standard
2.9 Ethics and Legal Considerations
5.4 Privacy & Security
5.7 Hacking Ethics
Standard
2.9 Ethics and Legal Considerations
5.4 Privacy & Security
5.7 Hacking Ethics
Standard
4.7 Software Licenses
4.9 Browser Configuration
Standard
7.12 Software Licenses
Standard
4.7 Software Licenses
4.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.7 Software Licenses
10.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.5 Software Licenses
7.7 Browser Configuration
Standard
5.7 Software Licenses
5.9 Browser Configuration
Standard
3.5 Software Licenses
3.8 Browser Configuration
Standard
10.4 Privacy & Security
Standard
1.7 Software Licenses
4.4 Privacy & Security
19.2 Software Licenses
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.5 Software Licenses
6.7 Browser Configuration
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.5 Software Licenses
4.7 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
2.7 Ethics and Legal Considerations
6.4 Privacy & Security
6.7 Hacking Ethics
Standard
1.5 Software Licenses
1.7 Browser Configuration
Standard
2.4 Privacy & Security
7.5 Software Licenses
7.7 Browser Configuration
Standard
3.6 Ethics and Legal Considerations
5.4 Privacy & Security
5.7 Hacking Ethics
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.7 Software Licenses
2.9 Browser Configuration
Standard
3.6 Ethics and Legal Considerations
Standard
7.6 Ethics and Legal Considerations
8.4 Privacy & Security
8.7 Hacking Ethics