Please enable JavaScript to use CodeHS

Utah Computer Programming 2: UT.CP2.7.1a

CodeHS Lessons

Explain the ethical reasons for creating reliable and robust software

Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
4.8 Application Security
Standard
13.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
Standard
1.1 What is Cybersecurity?
12.9 Common Security Problems
Standard
5.8 Application Security
7.10 Ethical and Social Implications of Computing
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.8 Application Security
4.1 What is Cybersecurity?
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.1 What is Cybersecurity?
1.12 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
13.6 Application Security
14.9 Common Security Problems
Standard
1.2 What is Cybersecurity?
6.6 Application Security
9.9 Common Security Problems
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
10.9 Common Security Problems
Standard
1.2 What is Cybersecurity?
3.6 Application Security
Standard
5.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
Standard
10.8 Application Security
Standard
11.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
Standard
1.3 What is Cybersecurity?
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
Standard
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
15.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
6.6 Application Security
7.4 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
4.6 Application Security
5.10 Common Security Problems
Standard
1.1 What is Cybersecurity?
Standard
13.2 What is Cybersecurity?
Standard
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
Standard
9.1 Computer Science Careers
Standard
17.1 Computer Science Careers
Standard
8.1 Computer Science Careers
Standard
1.6 Application Security
6.19 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
1.2 What is Cybersecurity?
7.6 Application Security
8.9 Common Security Problems
Standard
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?