- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
TX MS Tech Apps: 126.16.C.5.D
CodeHS Lessons
understand and explain the negative impact of inappropriate technology use, including online bullying and harassment, hacking, intentional virus setting, invasion of privacy, and piracy such as software, music, video, and other media
Standard |
6.4 Cybersecurity |
7.2 Cyberbullying |
7.4 Privacy & Security |
7.7 Hacking Ethics |
Standard |
1.4 Digital Footprint and Reputation |
Standard |
5.2 Cyberbullying |
5.4 Privacy & Security |
5.7 Hacking Ethics |
Standard |
2.4 Cybersecurity |
Standard |
9.1 Digital Footprint and Reputation |
9.2 Cyberbullying |
9.3 Internet Safety |
9.4 Privacy & Security |
Standard |
1.2 Cyberbullying |
1.4 Privacy & Security |
1.7 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.4 Digital Footprint and Reputation |
1.5 Cyberbullying |
1.6 Internet Safety |
1.7 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.12 Hacking Ethics |
Standard |
4.3 Hacking Ethics |
4.5 Privacy & Security |
4.8 Cyberbullying |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Privacy & Security |
1.5 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
12.1 Digital Footprint and Reputation |
12.2 Cyberbullying |
12.3 Internet Safety |
12.4 Privacy & Security |
12.7 Hacking Ethics |
Standard |
2.4 Cybersecurity |
Standard |
2.2 Cyberbullying |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
21.2 Cyberbullying |
21.7 Hacking Ethics |
21.1 Digital Footprint and Reputation |
21.3 Internet Safety |
21.4 Privacy & Security |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
8.2 Cyberbullying |
8.1 Digital Footprint and Reputation |
8.3 Internet Safety |
8.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
1.7 Hacking Ethics |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
2.1 Privacy & Security |
Standard |
5.3 Digital Footprint and Reputation |
5.4 Cyberbullying |
5.5 Internet Safety |
5.6 Privacy & Security |
5.13 Hacking Ethics |
Standard |
1.2 Cyberbullying |
1.4 Privacy & Security |
1.7 Hacking Ethics |
4.4 Cybersecurity |
Standard |
5.7 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.6 Cybersecurity |
5.2 Cyberbullying |
5.4 Privacy & Security |
5.7 Hacking Ethics |
Standard |
4.6 Cybersecurity |
5.2 Cyberbullying |
5.4 Privacy & Security |
5.7 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
1.4 Privacy & Security |
Standard |
1.4 Digital Footprint and Reputation |
1.5 Cyberbullying |
1.6 Internet Safety |
1.7 Privacy & Security |
1.12 Hacking Ethics |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
2.3 Digital Footprint and Reputation |
Standard |
2.3 Digital Footprint and Reputation |
Standard |
1.1 Digital Footprint and Reputation |
1.2 Cyberbullying |
1.3 Internet Safety |
2.4 Hacking Ethics |
Standard |
10.1 Digital Footprint and Reputation |
10.2 Cyberbullying |
10.3 Internet Safety |
10.4 Privacy & Security |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.2 Digital Footprint and Reputation |
1.3 Cyberbullying |
1.5 Privacy & Security |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
1.3 Privacy & Security |
1.8 Hacking Ethics |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
4.4 Cybersecurity |
6.2 Cyberbullying |
6.4 Privacy & Security |
6.7 Hacking Ethics |
Standard |
1.3 Digital Footprint and Reputation |
Standard |
1.3 Digital Footprint and Reputation |
Standard |
2.1 Digital Footprint and Reputation |
2.2 Cyberbullying |
2.3 Internet Safety |
2.4 Privacy & Security |
2.7 Hacking Ethics |
Standard |
5.2 Cyberbullying |
5.4 Privacy & Security |
5.7 Hacking Ethics |
Standard |
2.4 Cybersecurity |
Standard |
4.1 Digital Footprint and Reputation |
4.2 Cyberbullying |
4.3 Internet Safety |
4.4 Privacy & Security |
Standard |
1.3 Digital Footprint and Reputation |
1.4 Cyberbullying |
1.5 Internet Safety |
1.6 Privacy & Security |
1.11 Hacking Ethics |
Standard |
4.6 Cybersecurity |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company