GCSE - 2.3 Producing Robust Programs

GCSE - 2.3 Producing Robust Programs

9th - 11th Grade

15 Qs

quiz-placeholder

Similar activities

Repaso TIC- 1º-bach

Repaso TIC- 1º-bach

11th Grade

20 Qs

CSS 10 - QUIZ

CSS 10 - QUIZ

10th Grade

20 Qs

Accessing the Internet

Accessing the Internet

9th - 10th Grade

15 Qs

แบบทดสอบบทที่ 2 การเก็บรวบรวมและสำรวจข้อมูล ม.5

แบบทดสอบบทที่ 2 การเก็บรวบรวมและสำรวจข้อมูล ม.5

9th - 12th Grade

20 Qs

Grade 11 Term 4 Practice 2

Grade 11 Term 4 Practice 2

11th Grade

10 Qs

conditional constructs in Java

conditional constructs in Java

10th Grade

10 Qs

Internet

Internet

7th - 10th Grade

10 Qs

Kuis tipedata, flowchart informatima kelas X j4njang SMA

Kuis tipedata, flowchart informatima kelas X j4njang SMA

9th - 12th Grade

10 Qs

GCSE - 2.3 Producing Robust Programs

GCSE - 2.3 Producing Robust Programs

Assessment

Quiz

Computers

9th - 11th Grade

Hard

Created by

S Bourne

Used 341+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does a range check do?

Checks data across a range of numbers

Checks the data is within an acceptable range

Where three types of data are used

Checks that the data is in the correct format

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these is not a method for ensuring a program is robust?

Keeping passwords safe

Input Validation

Authentication

Anticipating Misuse

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is code indented?

To group together a function

If a programming language doesn't have syntax to define code blocks, so it uses indents

To make it easier to read

All of the above

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is these IS NOT an example of input validation

Checking the number entered is 2 digits

Asking a user to enter the same data in twice

Use of a Lookup table

Use of a presence check

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these is not a method for authenticating a user?

Password

Password & Username

Finger print scanner

Encryption

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which method identifies an incorrect password entry?

Data Validation

Authentication

Program Comments

Input Sanitisation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is iterative testing?

Testing completed after an error is found

Rom tests on a computer program

Tests completed as the program is being coded

Tests which are planned

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?