
defensive design
Authored by crabby .
Computers
University
Used 23+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is defensive design?
Contingency planning for protection against hackers
Contingency planning for protection against malware
Contingency planning using validation, maintainable code and testing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of validation?
To ensure that data entered is sensible and possible
To ensure that the programmer has met all requirements
To ensure that data entered is correct
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does validation not do?
Ensure that data entered is of the right data type
Ensure that data is actually entered
Ensure that data entered is correct
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are validation techniques?
Presence check, length check, verification check
Presence check, format check, range check
Presence check, range check, verification check
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are part of maintainability?
Comments, sensible variable names and indentation
Comments, sensible variable names and verification
Comments, indentation and verification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the two types of programming error?
Syntax errors and logic errors
Syntax errors and validation errors
Logic errors and validation errors
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of validation would be used on a field to check that data has been entered?
Spell check
Lookup table
Presence check
Length check
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?