Please enable JavaScript to use CodeHS

SC 6-8: 8.IC.1.2

CodeHS Lessons

Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).

Standard
12.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.4 Software and Applications
9.10 Impact of the Internet
Standard
4.7 The Future of Computing
7.1 Digital Footprint and Reputation
7.2 Cyberbullying
7.6 Creative Credit & Copyright
7.7 Hacking Ethics
Standard
3.7 The Future of Computing
5.1 Digital Footprint and Reputation
5.2 Cyberbullying
5.6 Creative Credit & Copyright
5.7 Hacking Ethics
Standard
7.7 The Impact of the Internet
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
12.7 The Impact of the Internet
Standard
12.7 The Impact of the Internet
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
3.7 The Impact of the Internet
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
Standard
6.5 Software and Applications
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.8 The Impact of the Internet
Standard
1.7 Software and Applications
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
Standard
4.5 Impact of the Internet
5.4 Software and Applications
Standard
2.6 Software and Applications
5.2 Impact of the Internet
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
13.4 Software and Applications
15.10 Impact of the Internet
Standard
6.7 The Impact of the Internet
14.4 Software and Applications
Standard
6.7 The Impact of the Internet
14.4 Software and Applications
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.4 Software and Applications
24.10 Impact of the Internet
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
3.4 Software and Applications
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.2 Software and Applications
Standard
8.2 Software and Applications
Standard
3.8 The Impact of the Internet
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
6.8 Impact of the Internet
13.7 The Impact of the Internet
Standard
5.8 Impact of the Internet
Standard
1.4 Software and Applications
2.11 Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
3.4 Software and Applications
7.11 Impact of the Internet
Standard
5.1 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
3.7 The Future of Computing
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
10.6 Software and Applications
Standard
9.7 The Impact of the Internet
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
7.4 Software and Applications
10.10 Impact of the Internet
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
7.7 The Impact of the Internet
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
3.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
6.4 Software and Applications
8.12 Impact of the Internet
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
4.4 Software and Applications
9.10 Impact of the Internet
Standard
1.1 What is Cybersecurity?
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
6.7 Software and Applications
Standard
7.7 Software and Applications
Standard
6.1 Digital Footprint and Reputation
6.2 Cyberbullying
6.6 Creative Credit & Copyright
6.7 Hacking Ethics
Standard
1.4 Software and Applications
2.11 Impact of the Internet
Standard
3.1 What is Cybersecurity?
Standard
3.7 The Future of Computing
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.6 Creative Credit & Copyright
2.7 Hacking Ethics