Defensive Design

Defensive Design

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

EA2 Ch5.2-5 Database Structure and Design

EA2 Ch5.2-5 Database Structure and Design

10th Grade

12 Qs

Data validation

Data validation

10th Grade

10 Qs

Database concepts part 1 & 2

Database concepts part 1 & 2

9th - 11th Grade

15 Qs

Understanding Processing Types in Web Development

Understanding Processing Types in Web Development

12th Grade

15 Qs

GCSE Computer Science Paper 2: Topic 3

GCSE Computer Science Paper 2: Topic 3

10th Grade

11 Qs

BTEC Level 3 - Unit 1 - Topic 5 (Validating Data)

BTEC Level 3 - Unit 1 - Topic 5 (Validating Data)

12th Grade

13 Qs

ICT PROMOTIONAL EXAMINATION SESSION 2024.

ICT PROMOTIONAL EXAMINATION SESSION 2024.

11th Grade

15 Qs

Testing

Testing

9th Grade

11 Qs

Defensive Design

Defensive Design

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Joseph Cleary

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Why do programs need to be maintained?

Improve FPS rate

Improve the code

Fix bugs

Improve bit rate

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a method for ensuring a program is robust?

Data Validation

Data sanitation

Keeping passwords safe

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data ____________ is a process in which data is double-checked for typed issues

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best code for a subprogram?

function circle(radius)   area = 3.14 * radius^2 return area

function circleFive()   area = 3.14 * 5^2 return area

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is defensive design?

Making your code error free

Code where data is validated

Creating code that is easy to understand

A method insuring your code is not misused

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

If a user tries to input invalid data, the system will stop working...

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Checking that the user is genuine is also known as...

Augmentation

Authentication

Validation

Authorisation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?