Defensive Design

Defensive Design

Assessment

Assessment

Created by

Rachel Pugh

Computers

9th - 12th Grade

23 plays

Medium

Student preview

quiz-placeholder

20 questions

Show all answers

1.

MULTIPLE CHOICE

30 sec • 1 pt

Which of these is NOT a method for ensuring that a program is robust

2.

MULTIPLE CHOICE

30 sec • 1 pt

what is data validation?

3.

MULTIPLE CHOICE

30 sec • 1 pt

which of these is NOT an example of data validation?

4.

MULTIPLE CHOICE

30 sec • 1 pt

what does a range check do?

5.

MULTIPLE CHOICE

30 sec • 1 pt

A user is asked to enter their full name, which is valid data?

6.

MULTIPLE CHOICE

30 sec • 1 pt

what is defensive design?

7.

MULTIPLE CHOICE

30 sec • 1 pt

A user is attempting to enter extra data, which method would identify this issue?

8.

MULTIPLE CHOICE

30 sec • 1 pt

Deliberately misusing or breaking computer systems is illegal.

9.

MULTIPLE CHOICE

30 sec • 1 pt

Inputting invalid data can cause errors in a system.

10.

MULTIPLE CHOICE

30 sec • 1 pt

Whitelists and blacklists are used in validation.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?