Please enable JavaScript to use CodeHS

PRAXIS 5652: I.B.2.c

CodeHS Lessons

identify the conditions under which a given computing practice is ethical or legal

Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
11.10 The Impact of the Internet
Standard
12.9 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
Standard
1.11 Hacking Ethics
Standard
7.10 Ethical and Social Implications of Computing
8.13 Ethical Issues Around Data Collection
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
11.10 The Impact of the Internet
Standard
1.11 Hacking Ethics
Standard
12.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
8.11 The Impact of the Internet
Standard
8.11 The Impact of the Internet
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
7.10 The Impact of the Internet
Standard
2.7 Hacking Ethics
Standard
1.8 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
5.8 The Impact of the Internet
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
5.8 The Impact of the Internet
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection
Standard
6.19 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
2.7 Hacking Ethics