Please enable JavaScript to use CodeHS

TX Foundations of Cyber: 127.792.d.7.c

CodeHS Lessons

describe the impact of granting applications unnecessary permissions such as mobile devices accessing camera and contacts

Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
Standard
3.3 Personal Data and Collection
3.6 Personal Data Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
Standard
1.2 Personal Data and Collection
1.5 Personal Data Security
Standard
5.2 Personal Data and Collection
5.5 Personal Data Security
Standard
2.4 Privacy & Security
Standard
4.2 Personal Data and Collection
4.5 Personal Data Security