Programming 3- module 15) Flashcards

1
Q

What do you need to be able to include as part of your process to make your code robust and secure?

A

Validation + authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does validation do?

A

Checks that a user has entered any data.

Checks data entered is within a set range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does verification do?

A

Checks for double entries.

Proofreads data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is double entry used for?

A

Entering data twice often by 2 different people to ensure no crossover- + comparing the 2 copies. Effectively doubles workload + costs more too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is proofreading used for?

A

This method involves someone checking data entered against original document. Time consuming + costly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of test data are there?

A

Normal or typical.
Extreme or boundary.
Erroneous or invalid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is normal or typical data used for?

A

Testing if original check was set up accurately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is extreme or boundary data used for?

A

Checks that you’ve used ‘=>’ rather than just ‘>’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is erroneous or invalid data used for?

A

Checking that code is strong enough to withstand resulting input if user is malicious or not paying attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of error that you may encounter?

A

Syntax errors.
Runtime errors.
Logic errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When do syntax errors occur?

A

When programmer fails to obey a grammar rule of the programming language they are using. Could be putting capital letters where don’t belong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When do runtime errors occur?

A

A program running that comes across a problem it can’t resolve will throw, or stop with, a runtime error. Programming errors, hardware malfunctions or errors when accessing computer memory can cause this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When do logic errors occur?

A

Can be most difficult kind of errors to detect + fix, as no obvious error within code. Program will be run successfully, but produces incorrect results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two language classifications?

A

High-level languages.

Low-level languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are high-level languages?

A

Closest to human language, + are most recently developed. need a compiler as computer doesn’t understand them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are low-level languages?

A

Closest to way computer operates, direct commands computer understands.

17
Q

What are the advantages of high-level languages?

A

Easier to read as close to human language.
Most code written in this as can be designed for specific purpose + are easier to use.
Easier to learn as closer to way we speak.
Used to control software more than hardware: can control many computers using same language.

18
Q

What are the disadvantages of low-level languages?

A

Hard to read as closer to computer code than human language.
Only specific tasks written in these as complex to operate.
Harder to learn as not in familiar structure.

19
Q

What are examples of low-level languages?

A
Machine code (binary).
Assembly code.
20
Q

What are low-level languages used for?

A

Controlling hardware rather than software.

21
Q

What are examples of high-level languages?

A

Java, Visual Basic, BASIC, the C family, Pascal, Python.

22
Q

What are high-level languages used for?

A

Controlling software rather than hardware.

23
Q

What are embedded systems?

A

A computer system with dedicated function within larger system, typically electrical or mechanical system.

24
Q

What is the role of verification?

A

Checking if something is true. Hard for computer to do as do not yet have reliable ways to tell if someone is being honest.

25
What is the role of authentication?
Process of identifying a user accessing system or program, normally through username + password.
26
What is the role of validation?
Checks data is reasonable within any set limits.