
2.3 Defensive Design
Authored by Alice Adlam
others
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is not a method for ensuring a program is robust?
Keeping passwords safe
Data Validation
Authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is code indented?
To group together a function
The code does not use a { syntax and indentation is used instead
To make it easier to read
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data validation?
Checking that the data entered is wrong
Checking that the data entered is correct
Checking that the data entered is sensible or reasonable
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these authentication methods is most secure?
Password
Password and username
Key Card
2 factor authentication
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is these IS NOT an example of validation?
Checking the number entered is 2 digits
Asking a user to type in a number
Use of a Lookup table
Use of a presence check
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a range check do?
Checks data across a range of numbers
Checks the data is within an acceptable range
Sorts numbers into ascending order
Checks that the data is in the correct format
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When a program runs it asks the user to enter their first name. Which is an example of Valid data?
00000
Sarah
Sarah J0n3s
Sarah Jones
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?