- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
TX MS Tech Apps: 126.14.C.5.D
CodeHS Lessons
understand the negative impact of inappropriate technology use, including online bullying and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as software, music, video, and other media
Standard |
6.4 Cybersecurity |
6.5 The CIA Triad |
7.2 Cyberbullying |
Standard |
5.2 Cyberbullying |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
Standard |
12.7 The Impact of the Internet |
Standard |
12.7 The Impact of the Internet |
13.8 The CIA Triad |
Standard |
7.7 The Impact of the Internet |
9.2 Cyberbullying |
9.3 Internet Safety |
9.4 Privacy & Security |
15.4 The CIA Triad |
Standard |
3.7 The Impact of the Internet |
Standard |
1.2 Cyberbullying |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.5 Cyberbullying |
1.6 Internet Safety |
1.7 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.8 The Impact of the Internet |
Standard |
4.3 Hacking Ethics |
4.4 The CIA Triad |
4.5 Privacy & Security |
4.8 Cyberbullying |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
8.4 The CIA Triad |
Standard |
11.3 The CIA Triad |
12.2 Cyberbullying |
12.3 Internet Safety |
12.4 Privacy & Security |
12.7 Hacking Ethics |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
Standard |
2.2 Cyberbullying |
Standard |
6.7 The Impact of the Internet |
Standard |
6.7 The Impact of the Internet |
Standard |
1.4 The CIA Triad |
21.2 Cyberbullying |
21.7 Hacking Ethics |
21.3 Internet Safety |
21.4 Privacy & Security |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
3.8 The Impact of the Internet |
8.2 Cyberbullying |
8.3 Internet Safety |
8.4 Privacy & Security |
16.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
1.7 Hacking Ethics |
13.7 The Impact of the Internet |
Standard |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
2.1 Privacy & Security |
Standard |
5.2 The CIA Triad |
5.4 Cyberbullying |
5.5 Internet Safety |
5.6 Privacy & Security |
5.13 Hacking Ethics |
Standard |
1.2 Cyberbullying |
4.4 Cybersecurity |
4.5 The CIA Triad |
Standard |
5.7 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.6 Cybersecurity |
5.2 Cyberbullying |
Standard |
4.6 Cybersecurity |
5.2 Cyberbullying |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
11.4 The CIA Triad |
Standard |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.3 The CIA Triad |
1.5 Cyberbullying |
1.6 Internet Safety |
1.7 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.5 The CIA Triad |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
9.3 The CIA Triad |
Standard |
1.2 Cyberbullying |
1.3 Internet Safety |
2.2 The CIA Triad |
2.4 Hacking Ethics |
Standard |
7.7 The Impact of the Internet |
10.2 Cyberbullying |
10.3 Internet Safety |
10.4 Privacy & Security |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Cyberbullying |
1.5 Privacy & Security |
3.7 The Impact of the Internet |
Standard |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Privacy & Security |
1.8 Hacking Ethics |
Standard |
1.4 The CIA Triad |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
4.4 Cybersecurity |
4.5 The CIA Triad |
6.2 Cyberbullying |
Standard |
1.4 The CIA Triad |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
5.2 Cyberbullying |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
Standard |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.6 Cybersecurity |
4.7 The CIA Triad |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company