Security measures may include physical security tokens, two-factor authentication, and biometric verification. Potential security problems,such as denial-of-service attacks, ransomware, viruses, worms, spyware, and phishing, exemplify why sensitive data should be securely stored and transmitted. The timely and reliable access to data and information services by authorized users, referred to as availability, is ensured through adequate bandwidth, backups, and other measures. Students should systematically evaluate the feasibility of using computational tools to solve given problems or subproblems, such as through a cost-benefit analysis. Eventually, students should include more factors in their evaluations, such as how efficiency affects feasibility or whether a proposed approach raises ethical concerns.
Standard detail
Depth 2Parent ID: 693281606F484191BADF2A3378132517Standard set: Level 3A: Grades 9-10 (Ages 14-16)
Original statement
Quick facts
- Statement code
- Standard ID
- 1C8A1BB7F7824EAF84AEBD2CFBEBBAB1
- Subject
- Computer Science
- Grades
- 09, 10
- Ancestor IDs
- 693281606F484191BADF2A3378132517B35BD3ECB674406E82E1F4AF5072563C
- Source document
- CSTA K-12 Computer Science Standards (Revised 2017)
- License
- CC BY 4.0 US