Please enable JavaScript to use CodeHS

APCSP20: IOC-2.B.11

CodeHS Lessons

Users can control the permissions applications have for collecting user information. Users should review the permissions of applications to protect their privacy.

Standard
11.9 Cybersecurity
Standard
14.11 Cybersecurity Risk Model-Security Controls
Standard
10.4 Cybersecurity Risk Model-Security Controls
Standard
10.4 Cybersecurity Risk Model-Security Controls
Standard
11.9 Cybersecurity
Standard
8.10 Cybersecurity
Standard
7.9 Cybersecurity
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity