2.3 - robust programs Flashcards
Defensive design
Designing and building computer code with the ability to keep it secure, easy to maintain and robust as a priority. It is anticipating misuse
Authentication
A security mechanism which requires a password, code, fingerprint or other factor to gain access to all or part of a system.
Input validation
The process of comparing data entered into the program to a set of rules to ensure it is valid and will not damage the system before processing it.
Maintainability
The ability to keep code updated, fix bugs and add new features easily.
Naming conventions
An agreed way of naming parts of the program such as variables or sub programs such that they are easy to read and their purpose is clear.
Indentation
Inserting spaces at the start of a line or lines of code so to group them together and make the code easier to read.
Comment
Lines which do not form part of the code and are not executed but instead provide notes and explanations to those looking at the code.
Testing
The process of trialling a program in order to ensure it performs as expected
iterative testing
Testing which is carried out whilst the program is being developed.
Final testing
Testing which is carried out at the end of development just before the code is released.
syntax error
An error which breaks the rules of the programming language and stops the code from running.
logic error
An error which produces an unexpected output even though the code still runs.
normal data
Data which the program should accept without error.
boundary data
Data at the extremes of what the program should accept without error.
invalid data
Data of the correct type, but not valid for the program and which should
be rejected
erroneous data
Data which is the wrong type and should be rejected