The purpose of defensive design is to ensure that a program runs correctly and continues to run no matter what actions a user takes. This is done through ____ for all possibilities (contingencies) and thinking about what a ____ may do that the program does not expect. Defensive design encompasses three areas: 1. Protection against unexpected user ____ or actions, such as a user entering a letter where a number was expected 2. Maintainability - ensuring code is ____ and understandable 3. Minimising/ removing ____ This anticipation and protection is done through: 1. Validation 2. Input sanitisation 3. Authentication 4. Maintenance 5. Testing Authentication Authentication is the process of a user ____ that they are who they say they are on a ____ system. In a network, this is often done through inputting a ____ and password. For networks that require high levels of ____, authentication may include other methods. The factors of authentication can be broken down into three main groups: 1. Something you ____ - username, bank account number, or anything that identifies the user uniquely 2. Something you know - password, pin, secret answer to a question 3. Something you ____ - swipe card, biometrics, any other physical identifying device A programmer should consider that any ____ a user makes may be incorrect and should ____ arrangements for such unexpected actions. Using validation helps a programmer to ensure that any data input is possible and sensible. Validation applies rules to inputted data. If the data does not follow the ____, it is rejected, reducing the risk that incorrectly input data may crash a program. A programmer can build various types of validation into a program: 1. ____ check - the input must fall within a specified range. 2. ____ check - the input must not be too long or too short. 3. Presence check - a data value must be ____. 4. ____ check - the data must be in the correct format, such as entering a date in the format DD/MM/YYYY. 5. ____ check - the data must be of a specified data type, such as an integer when specifying a quantity. Many programs use one or more of these ____ checks. For example, when signing up for a user account on a website, the validation might include: 1. Presence check - a username must be ____ 2. Length check - a password must be at least eight ____ long 3. Range check - age ____ may require the user's date of birth to be before a certain date 4. Format check - the user's date of birth must be entered in the specified format 5. Type check - the password may need to have a mixture of upper and lower case letters, a number and a special character Validation does not ensure that the data entered is correct, just that it is possible and sensible. A user may accidentally enter a date of birth that is possible and sensible, but ____. The program has no way of knowing that the date has been entered incorrectly.
0%
2.3 Producing Robust Programs
공유
공유
공유
만든이
Dprice7
KS4
Computing
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
문장 완성
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?