Please enable JavaScript to use CodeHS

TN HS: CS.NI.6

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts

Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
4.10 System Administration
6.4 Storage Options
6.7 Network Options
6.11 Network Management
Standard
3.4 Private Networks
3.5 Mobile Devices
5.2 Malware Types and Prevention
7.2 Level 2: User Training
7.3 Level 3: Incident Response
7.4 Level 4: Data and Licenses
6.1 Project Security Assessment Report
Standard
12.9 The Impact of the Internet
Standard
9.4 Privacy & Security
Standard
5.1 The Ethics of Artificial Intelligence
Standard
1.4 The Ethics of Artificial Intelligence
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
4.15 Network Management
Standard
1.6 Privacy & Security
3.15 Network Management
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.2 Storage Options
1.3 Network Devices
1.4 Network Options
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
2.10 The Ethics of Artificial Intelligence
3.2 Storage Options
3.5 Network Devices
3.7 Mobile Devices
5.10 Network Options
5.13 Network Management
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.3 The Ethics of Artificial Intelligence
1.4 Project: Research an Ethical Dilemma in AI
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.8 System Administration
Standard
15.3 Network Devices
Standard
15.3 Network Devices
Standard
9.4 The Ethics of Artificial Intelligence
Standard
6.8 System Administration
7.3 Network Devices
7.4 Storage Options
7.5 Network Options
7.7 Network Management
11.2 Level 2: User Training
11.3 Level 3: Incident Response
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.8 System Administration
5.3 Network Devices
5.4 Storage Options
5.5 Network Options
5.7 Network Management
Standard
4.8 System Administration
6.3 Network Devices
6.4 Storage Options
6.5 Network Options
6.7 Network Management
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
2.4 Level 2: User Training
2.5 Level 3: Incident Response
2.6 Level 4: Data and Licenses
3.8 System Administration
4.4 Network Devices
4.6 Storage Options
4.7 Network Options
4.12 Network Management
4.14 Mobile Devices
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.10 System Administration
6.4 Storage Options
6.7 Network Options
6.11 Network Management
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
Standard
4.10 System Administration
6.4 Storage Options
6.7 Network Options
6.11 Network Management
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.10 System Administration
12.4 Storage Options
12.7 Network Options
12.11 Network Management
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
2.3 Storage Options
Standard
1.4 Privacy & Security
2.3 Storage Options
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.8 System Administration
8.2 Malware Types and Prevention
11.3 Network Devices
11.4 Storage Options
11.5 Network Options
11.7 Network Management
18.4 Private Networks
18.4 Private Networks
18.5 Mobile Devices
19.2 Level 2: User Training
19.3 Level 3: Incident Response
19.4 Level 4: Data and Licenses
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
9.4 System Administration
11.3 Network Management
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.8 System Administration
9.3 Network Devices
9.4 Storage Options
9.5 Network Options
9.7 Network Management
9.8 Private Networks
13.2 Malware Types and Prevention
14.2 Level 2: User Training
14.3 Level 3: Incident Response
14.4 Level 4: Data and Licenses
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.8 System Administration
4.10 Mobile Devices
7.2 Level 2: User Training
7.3 Level 3: Incident Response
7.4 Level 4: Data and Licenses
10.3 Network Devices
10.4 Storage Options
10.5 Network Options
10.7 Network Management
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.5 Private Networks
5.6 Cybersecurity
5.8 The Impact of the Internet
6.3 Network Devices
6.4 Storage Options
6.5 Network Options
Standard
5.5 Private Networks
5.6 Cybersecurity
5.8 The Impact of the Internet
7.3 Network Devices
7.4 Storage Options
7.5 Network Options
Standard
6.4 The Ethics of Artificial Intelligence
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.8 System Administration
Standard
10.9 Cybersecurity
10.10 The Impact of the Internet
Standard
1.3 The Ethics of Artificial Intelligence
1.4 Project: Research an Ethical Dilemma in AI
Standard
1.3 The Ethics of Artificial Intelligence
1.4 Project: Research an Ethical Dilemma in AI
Standard
2.4 Privacy & Security
7.8 System Administration
10.3 Network Devices
10.4 Storage Options
10.5 Network Options
10.7 Network Management
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security