2.3 - Robust Programs

2.3 - Robust Programs

KG - University

39 Qs

quiz-placeholder

Similar activities

PowerPoint  2016

PowerPoint 2016

7th Grade - University

40 Qs

TIK KELAS 4 MENU INSERT LANJUTAN

TIK KELAS 4 MENU INSERT LANJUTAN

4th Grade

40 Qs

Y9 Computing Test - Phase 1

Y9 Computing Test - Phase 1

8th - 11th Grade

40 Qs

Sistemas de Archivos: operaciones

Sistemas de Archivos: operaciones

11th Grade

40 Qs

Pre-Test Pemrograman Lanjut

Pre-Test Pemrograman Lanjut

University

35 Qs

HTML and CSS

HTML and CSS

University - Professional Development

36 Qs

GIỮA KỲ 2 -  TIN 8

GIỮA KỲ 2 - TIN 8

8th Grade - University

36 Qs

HOJAS DE CÁLCULO SPS (2)

HOJAS DE CÁLCULO SPS (2)

11th Grade

36 Qs

2.3 - Robust Programs

2.3 - Robust Programs

Assessment

Quiz

Computers

KG - University

Hard

Used 196+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a method for ensuring a program is robust?
Keeping passwords safe
Data Validation
Authentication
Data Sanitisation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data validation?
Checking that the data entered is wrong
Checking that the data entered is correct
Checking that the data entered is sensible or reasonable
Checking that the data has been entered by the correct person

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these authentication methods is most secure?
Password
Password and username
Key Card
Physical and Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is these IS NOT an example of validation
Checking the number entered is 2 digits
Asking a user to enter the same data in twice
Use of a Lookup table
Use of a presence check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 When a program runs it asks the user to enter their full name. Which is an example of Valid data? 
Mr Jones
Sarah
Sarah Jones
Mrs Jones

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a range check do?
Checks data across a range of numbers
Checks the data is within an acceptable range
Where three types of data are used
Checks that the data is in the correct format

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is not a method for planning for misuse?
Limiting the number of login attempts
Requesting a password and user name
Authentication
Not validating the data entry

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?