2.3 - Robust Programs

2.3 - Robust Programs

KG - University

39 Qs

quiz-placeholder

Similar activities

QCAA Digital Solutions 2025 - U3T2: Real-world Problems

QCAA Digital Solutions 2025 - U3T2: Real-world Problems

12th Grade

42 Qs

2.3 Robust Programs

2.3 Robust Programs

9th Grade - University

40 Qs

1.1 Systems Architecture Keywords

1.1 Systems Architecture Keywords

8th - 10th Grade

40 Qs

IT Revision

IT Revision

9th - 12th Grade

40 Qs

9.3.5 - Retrieval Quiz

9.3.5 - Retrieval Quiz

6th Grade

34 Qs

Year 11 T1 PG1 Python

Year 11 T1 PG1 Python

11th Grade

40 Qs

AP Computer Science Applications - Fall 2023 Exam

AP Computer Science Applications - Fall 2023 Exam

11th Grade

34 Qs

mr. w cs final review 2

mr. w cs final review 2

6th - 8th Grade

35 Qs

2.3 - Robust Programs

2.3 - Robust Programs

Assessment

Quiz

Computers

KG - University

Hard

Used 196+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a method for ensuring a program is robust?
Keeping passwords safe
Data Validation
Authentication
Data Sanitisation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data validation?
Checking that the data entered is wrong
Checking that the data entered is correct
Checking that the data entered is sensible or reasonable
Checking that the data has been entered by the correct person

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these authentication methods is most secure?
Password
Password and username
Key Card
Physical and Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is these IS NOT an example of validation
Checking the number entered is 2 digits
Asking a user to enter the same data in twice
Use of a Lookup table
Use of a presence check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 When a program runs it asks the user to enter their full name. Which is an example of Valid data? 
Mr Jones
Sarah
Sarah Jones
Mrs Jones

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a range check do?
Checks data across a range of numbers
Checks the data is within an acceptable range
Where three types of data are used
Checks that the data is in the correct format

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is not a method for planning for misuse?
Limiting the number of login attempts
Requesting a password and user name
Authentication
Not validating the data entry

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?