- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
TN CI: C10H14.3
CodeHS Lessons
Using news articles and text of legislation, analyze ethical programming practices, including but not limited to the issues of confidentiality, privacy, piracy, fraud and misuse, liability, copyright, open source software, trade secrets, and sabotage. For example, research and report on the effects of unethical programming practices on a business.
Standard |
1.4 Cyber Ethics and Laws |
1.6 Cybersecurity Essentials |
4.7 Software Licenses |
Standard |
7.4 Level 4: Data and Licenses |
Standard |
9.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.7 Privacy & Security |
Standard |
5.6 Software Licenses |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.5 Privacy & Security |
Standard |
1.3 Privacy & Security |
5.5 Software Licenses |
Standard |
1.3 Privacy & Security |
2.7 Software Licenses |
Standard |
1.6 Privacy & Security |
Standard |
1.3 Privacy & Security |
5.5 Software Licenses |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
12.4 Privacy & Security |
13.5 Software Licenses |
Standard |
14.5 Software Licenses |
Standard |
14.5 Software Licenses |
Standard |
3.5 Cyber Ethics and Laws |
3.7 Cybersecurity Essentials |
Standard |
6.5 Software Licenses |
11.4 Level 4: Data and Licenses |
21.4 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.4 Cyber Ethics and Laws |
1.6 Cybersecurity Essentials |
3.5 Software Licenses |
Standard |
1.4 Cyber Ethics and Laws |
1.6 Cybersecurity Essentials |
4.5 Software Licenses |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
8.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
2.4 Privacy & Security |
Standard |
1.5 Software Licenses |
Standard |
2.1 Privacy & Security |
2.6 Level 4: Data and Licenses |
3.5 Software Licenses |
Standard |
5.6 Privacy & Security |
5.12 Software Licenses |
Standard |
5.7 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.4 Cyber Ethics and Laws |
1.6 Cybersecurity Essentials |
4.7 Software Licenses |
Standard |
7.12 Software Licenses |
Standard |
1.4 Cyber Ethics and Laws |
1.6 Cybersecurity Essentials |
4.7 Software Licenses |
Standard |
4.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
5.4 Cyber Ethics and Laws |
5.6 Cybersecurity Essentials |
10.7 Software Licenses |
Standard |
4.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
1.7 Privacy & Security |
Standard |
2.4 Privacy & Security |
7.5 Software Licenses |
19.4 Level 4: Data and Licenses |
Standard |
10.4 Privacy & Security |
Standard |
1.7 Software Licenses |
4.4 Privacy & Security |
19.2 Software Licenses |
Standard |
1.5 Privacy & Security |
Standard |
2.4 Privacy & Security |
6.5 Software Licenses |
14.4 Level 4: Data and Licenses |
Standard |
1.3 Privacy & Security |
Standard |
2.4 Privacy & Security |
4.5 Software Licenses |
7.4 Level 4: Data and Licenses |
Standard |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
4.6 Cybersecurity Essentials |
Standard |
1.5 Software Licenses |
Standard |
2.4 Privacy & Security |
7.5 Software Licenses |
Standard |
4.4 Privacy & Security |
Standard |
1.6 Privacy & Security |
Standard |
1.4 Cyber Ethics and Laws |
1.6 Cybersecurity Essentials |
2.7 Software Licenses |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company