Defensive Design

Defensive Design

KG - University

11 Qs

quiz-placeholder

Similar activities

Jaringan Nirkabel - Pertemuan 3

Jaringan Nirkabel - Pertemuan 3

University

10 Qs

Algoritma dan Pemrograman Bab 1

Algoritma dan Pemrograman Bab 1

University

15 Qs

Fechando o Bimestre 6º ano

Fechando o Bimestre 6º ano

6th Grade

11 Qs

Latihan Soal PTS Kelas 6 Semester 1

Latihan Soal PTS Kelas 6 Semester 1

10th Grade

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

5. E-safety

5. E-safety

5th Grade

10 Qs

ULANGAN HARIAN Semester 2

ULANGAN HARIAN Semester 2

10th Grade

12 Qs

Assessment 08

Assessment 08

University

15 Qs

Defensive Design

Defensive Design

Assessment

Quiz

Computers

KG - University

Hard

Created by

Doug Wilson-Wardle

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is defensive design?

Contingency planning using validation, maintainable code and testing

Contingency planning for protection against malware

Contingency planning for protection against hackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of validation?

To ensure that data entered is sensible and possible

To ensure that data entered is correct

To ensure that the programmer has met all requirements

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does validation not do?

Ensure that data entered is of the right data type

Ensure that data is actually entered

Ensure that data entered is correct

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are validation techniques?

Presence check, length check, verification check

Presence check, format check, range check

Presence check, range check, verification check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are part of maintainability?

Comments, indentation and verification

Comments, sensible variable names and verification

Comments, sensible variable names and indentation

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Cleaning up input data or removing unwanted data. E.g. removing special characters to prevent SQL injection

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Checking whether input data should be allowed. E.g. goals cannot be less than 0

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?