Please enable JavaScript to use CodeHS

NV 9-12: 9-12.NI.C.3

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
11.2 Internet Hardware
11.3 Internet Addresses
11.4 Viewing Websites
11.5 DNS
11.6 Packets and Protocols
11.7 Sequential, Parallel & Distributed Computing
11.9 The Impact of the Internet
12.1 The Effects of the Internet
40.1 Routing
Standard
11.2 Internet Hardware
11.3 Internet Addresses
11.4 Viewing Websites
11.5 DNS
11.6 Routing
11.7 Packets and Protocols
11.8 Sequential, Parallel & Distributed Computing
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
13.2 Internet Hardware
13.3 Internet Addresses
13.4 Viewing Websites
13.5 DNS
13.7 Packets and Protocols
13.8 Sequential, Parallel & Distributed Computing
13.9 The Impact of the Internet
32.1 The Effects of the Internet
Standard
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
10.7 Network Management
Standard
5.6 Internal Threats
8.2 Assessing Risks
8.3 Risk Response
Standard
13.7 Network Attacks
Standard
6.9 Browser Configuration
6.10 System Administration
Standard
4.15 Network Management
Standard
3.15 Network Management
Standard
5.7 Sequential, Parallel & Distributed Computing
Standard
1.5 Network Communication
1.9 System Administration
2.8 Network Administration
Standard
5.12 Network Communication
5.13 Network Management
8.7 Internal Threats
Standard
11.2 Internet Hardware
11.3 Internet Addresses
11.4 Viewing Websites
11.5 DNS
11.7 Packets and Protocols
11.8 Sequential, Parallel & Distributed Computing
11.10 The Impact of the Internet
12.1 The Effects of the Internet
Standard
13.7 Browser Configuration
13.8 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
12.2 Assessing Risks
12.3 Risk Response
Standard
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
5.7 Network Management
Standard
8.4 Internet Hardware
8.5 Internet Addresses
8.6 Viewing Websites
8.7 DNS
8.9 Packets and Protocols
8.11 The Impact of the Internet
Standard
8.4 Internet Hardware
8.5 Internet Addresses
8.6 Viewing Websites
8.7 DNS
8.9 Packets and Protocols
8.11 The Impact of the Internet
Standard
6.9 Network Attacks
6.10 Network Administration
Standard
5.9 Network Attacks
5.10 Network Administration
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
Standard
5.8 Browser Configuration
Standard
10.9 Browser Configuration
10.10 System Administration
12.10 Network Communication
12.11 Network Management
Standard
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
7.2 Internet Hardware
7.3 Internet Addresses
7.4 Viewing Websites
7.5 DNS
7.7 Packets and Protocols
7.8 Sequential, Parallel & Distributed Computing
7.10 The Impact of the Internet
9.4 System Administration
11.3 Network Management
Standard
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
9.7 Network Management
13.6 Internal Threats
15.2 Assessing Risks
15.3 Risk Response
Standard
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
5.2 DNS
5.3 Packets and Protocols
5.8 The Impact of the Internet
6.8 Browser Configuration
6.9 Sequential, Parallel & Distributed Computing
Standard
5.2 DNS
5.3 Packets and Protocols
5.8 The Impact of the Internet
7.8 Browser Configuration
7.9 Sequential, Parallel & Distributed Computing
Standard
1.7 Browser Configuration
1.8 System Administration