Please enable JavaScript to use CodeHS

Utah Exploring Computer Science: ECS.2.2a

CodeHS Lessons

Impacts of technology on society from the following perspectives: social, economic, political, legal, ethical, and moral issues

Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
4.6 Ethics and Legal Considerations
4.7 The Future of Computing
7.7 Hacking Ethics
Standard
3.6 Ethics and Legal Considerations
3.7 The Future of Computing
5.7 Hacking Ethics
Standard
5.1 The Ethics of Artificial Intelligence
Standard
1.4 The Ethics of Artificial Intelligence
Standard
1.7 Hacking Ethics
Standard
7.7 Hacking Ethics
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
3.6 Ethics and Legal Considerations
3.7 The Future of Computing
Standard
2.7 Hacking Ethics
Standard
3.2 Digital Footprint and Responsibility
3.3 Personal Data and Collection
3.4 Can All Information Be Trusted?
3.5 Cyber Ethics and Laws
9.4 The Ethics of Artificial Intelligence
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
1.7 Hacking Ethics
3.6 Ethics and Legal Considerations
3.7 The Future of Computing
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
4.6 Ethics and Legal Considerations
4.7 The Future of Computing
Standard
2.9 Ethics and Legal Considerations
2.10 The Future of Computing
5.7 Hacking Ethics
Standard
2.9 Ethics and Legal Considerations
2.10 The Future of Computing
5.7 Hacking Ethics
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
5.1 Digital Footprint and Responsibility
5.2 Personal Data and Collection
5.3 Can All Information Be Trusted?
5.4 Cyber Ethics and Laws
Standard
1.6 Cyber Ethics and Laws
Standard
8.7 Digital Footprint and Responsibility
8.8 Can All Information Be Trusted?
Standard
8.7 Digital Footprint and Responsibility
8.8 Can All Information Be Trusted?
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
2.7 Ethics and Legal Considerations
6.7 Hacking Ethics
Standard
4.1 Digital Footprint and Responsibility
4.2 Personal Data and Collection
4.3 Can All Information Be Trusted?
4.4 Cyber Ethics and Laws
6.4 The Ethics of Artificial Intelligence
Standard
3.6 Ethics and Legal Considerations
3.7 The Future of Computing
5.7 Hacking Ethics
Standard
1.1 Digital Footprint and Responsibility
1.2 Personal Data and Collection
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
Standard
3.6 Ethics and Legal Considerations
3.7 The Future of Computing
Standard
7.6 Ethics and Legal Considerations
7.7 The Future of Computing
8.7 Hacking Ethics
Standard
3.1 Digital Footprint and Responsibility
3.2 Personal Data and Collection
3.3 Can All Information Be Trusted?
3.4 Cyber Ethics and Laws