- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
TX MS Tech Apps: 126.15.C.5.D
CodeHS Lessons
understand the negative impact of inappropriate technology use, including online bullying and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as software, music, video, and other media
Standard |
6.4 Cybersecurity |
6.5 The CIA Triad |
7.2 Cyberbullying |
Standard |
1.4 Digital Footprint and Reputation |
Standard |
5.2 Cyberbullying |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
Standard |
12.7 The Impact of the Internet |
Standard |
12.7 The Impact of the Internet |
13.8 The CIA Triad |
Standard |
7.7 The Impact of the Internet |
9.1 Digital Footprint and Reputation |
9.2 Cyberbullying |
9.3 Internet Safety |
9.4 Privacy & Security |
15.4 The CIA Triad |
Standard |
3.7 The Impact of the Internet |
Standard |
1.2 Cyberbullying |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.4 Digital Footprint and Reputation |
1.5 Cyberbullying |
1.6 Internet Safety |
1.7 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.8 The Impact of the Internet |
Standard |
4.3 Hacking Ethics |
4.4 The CIA Triad |
4.5 Privacy & Security |
4.8 Cyberbullying |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
8.4 The CIA Triad |
Standard |
11.3 The CIA Triad |
12.1 Digital Footprint and Reputation |
12.2 Cyberbullying |
12.3 Internet Safety |
12.4 Privacy & Security |
12.7 Hacking Ethics |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
Standard |
2.2 Cyberbullying |
Standard |
6.7 The Impact of the Internet |
Standard |
6.7 The Impact of the Internet |
Standard |
1.4 The CIA Triad |
21.7 Hacking Ethics |
21.2 Cyberbullying |
21.1 Digital Footprint and Reputation |
21.3 Internet Safety |
21.4 Privacy & Security |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
3.8 The Impact of the Internet |
8.2 Cyberbullying |
8.1 Digital Footprint and Reputation |
8.3 Internet Safety |
8.4 Privacy & Security |
16.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
1.7 Hacking Ethics |
13.7 The Impact of the Internet |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
2.1 Privacy & Security |
Standard |
5.2 The CIA Triad |
5.3 Digital Footprint and Reputation |
5.4 Cyberbullying |
5.5 Internet Safety |
5.6 Privacy & Security |
5.13 Hacking Ethics |
Standard |
1.2 Cyberbullying |
4.4 Cybersecurity |
4.5 The CIA Triad |
Standard |
5.7 Privacy & Security |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.6 Cybersecurity |
5.2 Cyberbullying |
Standard |
4.6 Cybersecurity |
5.2 Cyberbullying |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
11.4 The CIA Triad |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.3 The CIA Triad |
1.4 Digital Footprint and Reputation |
1.5 Cyberbullying |
1.6 Internet Safety |
1.7 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.5 The CIA Triad |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
2.3 Digital Footprint and Reputation |
Standard |
2.3 Digital Footprint and Reputation |
Standard |
9.3 The CIA Triad |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
2.2 The CIA Triad |
2.4 Hacking Ethics |
Standard |
7.7 The Impact of the Internet |
10.1 Digital Footprint and Reputation |
10.2 Cyberbullying |
10.3 Internet Safety |
10.4 Privacy & Security |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Cyberbullying |
1.5 Privacy & Security |
3.7 The Impact of the Internet |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Privacy & Security |
1.8 Hacking Ethics |
Standard |
1.4 The CIA Triad |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
4.4 Cybersecurity |
4.5 The CIA Triad |
6.2 Cyberbullying |
Standard |
1.3 Digital Footprint and Reputation |
Standard |
1.3 Digital Footprint and Reputation |
Standard |
1.4 The CIA Triad |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
5.2 Cyberbullying |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
9.7 The Impact of the Internet |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.6 Cybersecurity |
4.7 The CIA Triad |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company