The purpose of defensive design is to ensure that a program runs correctly and continues to run no matter what actions a user takes. This is done through ____ for all possibilities (contingencies) and thinking about what a ____ may do that the program does not expect. Defensive design encompasses three areas: 1. Protection against unexpected user ____ or actions, such as a user entering a letter where a number was expected 2. Maintainability - ensuring code is ____ and understandable 3. Minimising/ removing ____ This anticipation and protection is done through: 1. Validation 2. Input sanitisation 3. Authentication 4. Maintenance 5. Testing Authentication Authentication is the process of a user ____ that they are who they say they are on a ____ system. In a network, this is often done through inputting a ____ and password. For networks that require high levels of ____, authentication may include other methods. The factors of authentication can be broken down into three main groups: 1. Something you ____ - username, bank account number, or anything that identifies the user uniquely 2. Something you know - password, pin, secret answer to a question 3. Something you ____ - swipe card, biometrics, any other physical identifying device A programmer should consider that any ____ a user makes may be incorrect and should ____ arrangements for such unexpected actions. Using validation helps a programmer to ensure that any data input is possible and sensible. Validation applies rules to inputted data. If the data does not follow the ____, it is rejected, reducing the risk that incorrectly input data may crash a program. A programmer can build various types of validation into a program: 1. ____ check - the input must fall within a specified range. 2. ____ check - the input must not be too long or too short. 3. Presence check - a data value must be ____. 4. ____ check - the data must be in the correct format, such as entering a date in the format DD/MM/YYYY. 5. ____ check - the data must be of a specified data type, such as an integer when specifying a quantity. Many programs use one or more of these ____ checks. For example, when signing up for a user account on a website, the validation might include: 1. Presence check - a username must be ____ 2. Length check - a password must be at least eight ____ long 3. Range check - age ____ may require the user's date of birth to be before a certain date 4. Format check - the user's date of birth must be entered in the specified format 5. Type check - the password may need to have a mixture of upper and lower case letters, a number and a special character Validation does not ensure that the data entered is correct, just that it is possible and sensible. A user may accidentally enter a date of birth that is possible and sensible, but ____. The program has no way of knowing that the date has been entered incorrectly.
0%
2.3 Producing Robust Programs
שתף
שתף
שתף
על ידי
Dprice7
KS4
Computing
עריכת תוכן
הדפסה
הטבעה
עוד
הקצאות
לוח תוצאות מובילות
הצג עוד
הצג פחות
לוח התוצאות הזה הוא כרגע פרטי. לחץ
שתף
כדי להפוך אותו לציבורי.
לוח תוצאות זה הפך ללא זמין על-ידי בעל המשאב.
לוח תוצאות זה אינו זמין מכיוון שהאפשרויות שלך שונות מאשר של בעל המשאב.
אפשרויות חזרה
השלם את המשפט
היא תבנית פתוחה. זה לא יוצר ציונים עבור לוח התוצאות.
נדרשת כניסה
סגנון חזותי
גופנים
נדרש מנוי
אפשרויות
החלף תבנית
הצג הכל
תבניות נוספות יופיעו במהלך המשחק.
תוצאות פתוחות
העתק קישור
קוד QR
מחיקה
האם לשחזר את הנתונים שנשמרו באופן אוטומטי:
?