Please enable JavaScript to use CodeHS

PRAXIS 5652: I.A.3.b

CodeHS Lessons

identify trade-offs between beneficial and harmful effects of computer innovations

Standard
5.10 Ethical and Social Implications of Computing
Standard
11.9 The Impact of the Internet
Standard
13.9 The Impact of the Internet
Standard
2.4 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
9.4 Privacy & Security
Standard
10.1 History of Computers
10.5 Future of Computing
Standard
10.1 History of Computers
10.5 Future of Computing
Standard
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
4.18 Ethical and Social Implications of Computing
Standard
1.7 Privacy & Security
Standard
8.10 Ethical and Social Implications of Computing
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
4.2 History of Computers
12.2 Future of Computing
Standard
1.6 Privacy & Security
3.2 History of Computers
14.2 Future of Computing
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.6 Privacy & Security
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
Standard
1.1 History of Computers
1.5 Future of Computing
Standard
1.3 Privacy & Security
4.6 Future of Computing
Standard
1.3 Privacy & Security
Standard
11.10 The Impact of the Internet
Standard
1.6 Privacy & Security
4.1 History of Computers
4.5 Future of Computing
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
12.4 Privacy & Security
Standard
4.1 History of Computers
4.5 Future of Computing
Standard
4.1 History of Computers
4.5 Future of Computing
Standard
21.4 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
8.11 The Impact of the Internet
Standard
8.11 The Impact of the Internet
Standard
9.1 History of Computers
9.5 Future of Computing
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
6.18 Ethical and Social Implications of Computing
Standard
2.1 Privacy & Security
Standard
1.1 History of Computers
1.5 Future of Computing
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
1.7 Privacy & Security
21.1 History of Computers
21.1 History of Computers
2.5 Future of Computing
Standard
2.4 Privacy & Security
Standard
2.1 History of Computers
2.6 Future of Computing
7.10 The Impact of the Internet
Standard
1.8 Future of Computing
Standard
4.1 History of Computers
4.6 Future of Computing
10.4 Privacy & Security
Standard
1.8 Future of Computing
4.4 Privacy & Security
Standard
1.5 Privacy & Security
7.1 History of Computers
7.8 Future of Computing
Standard
2.4 Privacy & Security
Standard
4.1 History of Computers
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.1 History of Computers
2.5 Future of Computing
4.4 Privacy & Security
Standard
5.8 The Impact of the Internet
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
Standard
5.8 The Impact of the Internet
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
Standard
6.19 Ethical and Social Implications of Computing
Standard
3.6 Privacy & Security