Search Header Logo
Defensive Design

Defensive Design

Assessment

Presentation

Computers

9th - 11th Grade

Practice Problem

Medium

Created by

N Monconduit

Used 3+ times

FREE Resource

20 Slides • 15 Questions

1

media

2

media

3

media

4

media

5

media

6

Multiple Choice

Q. 

Which of these is not a method for ensuring a program is robust?

1

Keeping passwords safe

2

Data Sanitisation

3

Authentication

4

Data Validation

7

Multiple Choice

 

What does a range check do?

1

Checks data across a range of numbers

2

Checks the data is within an acceptable range

3

Where three types of data are used

4

Checks that the data is in the correct format

8

media

9

Multiple Choice

What is the difference between Data Validation and Input Sanitisation?

1

Nothing, they are the same?

2

Data Validation checks the data is reasonable and Sanitisation removes unexpected or unrequired data

3

Data Validation checks the data is correct and Sanitisation removes data that contains errors

4

Sanitisation checks the data is correct and Validation removes invalid

5

Calculating answers from formula

10

Multiple Choice

A user enters in extra data attempting to access the system, which method would identify this issue?

1

Data Validation

2

Input Sanitisation

3

Input Check

4

Format Check

11

media

12

media

13

Multiple Choice

What is a defensive programming design?

1

Making your code / program error free

2

Creating code that is easy to use and understand

3

A method of ensuring that your code is not misused

4

Code where the data is validated

14

Multiple Choice

 

Which of these is not a method for authenticating a user?

1

Password

2

Password and Username

3

Finger print scanner

4

Encryption

15

media

16

media

17

media

18

media

19

Multiple Choice

 

Which one of these is not a method for planning for misuse?

1

Limiting the number of login attempts

2

Requesting a password and username

3

Authentication

4

Not validating the data entry

20

Multiple Choice

What is data validation?

1

Checking that the data entered is wrong

2

Checking that the data entered is correct

3

Checking that the data entered is sensible or reasonable

21

Multiple Choice

What is maintainability?

1

Checking programs work

2

Updating Code so that it is compatible with current requirements

3

Testing a program for errors

4

Training staff to use the program correctly

22

Multiple Choice

Which of these IS NOT an example of validation.

1

Checking the number entered is 2 digits

2

Asking the user to enter the same data in twice

3

Use of a Lookup table

4

Use of a presence check

23

media

24

media

25

media

26

Multiple Choice

When a program runs it asks the user to enter their full name. Which is an example of Valid data?

1

Mr Jones

2

Sarah

3

Sarah Jones

4

Mrs Jones

27

media

28

media

29

Multiple Choice

 

A user attempts to enter in an incorrect password, what method would identify this issues?

1

Data Validation

2

Authentication

3

Program Comments

4

Indentation

30

media

31

media

32

media

33

Multiple Choice

Why is code indented?

1

To group together a function

2

The code does not use a { syntax and indentation is used instead

3

To make the code easier to read

4

All of the above

34

Multiple Choice

When should comments be used within a program?

1

To help describe what code and structures are expected to do

2

To remind the developer when lunch is

3

Every line, so that you know exactly what is happening

4

To add random jokes to the code to make it interesting

35

Multiple Choice

What is a subroutine?

1

Subroutines are small blocks of code in a modular program designed to perform a particular task

2

Sequence, selection and iteration

3

A programming construct that determines the order in which data is stored

4

POSITIVE or NEGATIVE

media

Show answer

Auto Play

Slide 1 / 35

SLIDE