2.3.1 Flashcards

1
Q

defensive design

A

“The practice of planning for contingencies in the design stage of a project.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

anticipating misuse

A

Considering how an end user might accidentally or deliberately break a program and writing additional code to handle these situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

“Verifying a user’s identity before they can use a system. Strong passwords over a certain length with symbols and mixed-case letters are advised.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Input validation

A

“Ensuring data input by a user meets specific criteria before processing. Range check (e.g., 1 – 31); type check (e.g., a number, not a symbol); presence check (e.g., data has been input); format check (e.g., a postcode is written LLN(N) NLL). ”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maintainability

A

“Techniques and methods that make code easier to debug, update and maintain.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Naming conventions

A

“Many programmers use defined naming conventions for variables, contents and procedures. Camel case is a popular one used in the industry where the first word of an identifier uses all lower case and all subsequent words start with a capital letter – e.g., studentsFirstName.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

indentation

A

“Makes it easier to see where structures begin and end. Conditions, iterations and code inside procedures and functions should be indented.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Commenting

A

“Used to explains sections of code. Ignored by the compiler.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly