Search Header Logo

2.3 Defensive Design

Authored by Alice Adlam

others

Used 15+ times

2.3 Defensive Design
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a method for ensuring a program is robust?

Keeping passwords safe
Data Validation
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is code indented?

To group together a function
The code does not use a { syntax and indentation is used instead
To make it easier to read
All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data validation?

Checking that the data entered is wrong
Checking that the data entered is correct
Checking that the data entered is sensible or reasonable

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these authentication methods is most secure?

Password
Password and username
Key Card
2 factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is these IS NOT an example of validation?

Checking the number entered is 2 digits
Asking a user to type in a number
Use of a Lookup table
Use of a presence check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a range check do?

Checks data across a range of numbers
Checks the data is within an acceptable range
Sorts numbers into ascending order
Checks that the data is in the correct format

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a program runs it asks the user to enter their first name. Which is an example of Valid data?

00000
Sarah
Sarah J0n3s
Sarah Jones

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?