Preview

09 - Final Assessment Test

 1. Which of the following is a way in which companies can design computer systems to prevent software misuse?

  Secure Firewall and setting filters on all email accounts

  All of the above

  Regular backups and data encryption

  Strong Passwords

 2. CAPTCHAs are sometimes used when you are signing into a website (e..g having to type in a series of letters and numbers). What is the purpose?

  to differentiate between a human and a machine. To ensure that the system is not misused.

  None of the above

  to ensure that the user is not unintelligent and therefore unsuitable to use the system

  to ensure that the user is a machine and not a human

 3. Making a copy of licensed software to give to a friend is acceptable use of software (not misuse)

  TRUE

  FALSE

 4. Unauthorised use of someone elses login details would count as software misuse

  TRUE

  FALSE

 5. Changing default settings on some software to suit your own personal needs is software misuse.

  TRUE

  FALSE

 6. Describe what would happen when the code is translated if all the syntax errors were corrected by the logic errors were left unchanged.

  The code will stop at the logic errors and fail to run

  None of the above

  The code will translate and run with the logic errors

  The code will fail to run at all and revert back to the syntax errors

 7. A type of error caused by the code not following the ______________________________ of the programming language is a syntax error

  mathematical accuracy

  correct logic

  rules of grammar

  None of the above

 8. True or False: a Test plan should ideally take the user down all possible paths of the program to test it.

  TRUE

  FALSE

 9. A good test plan will only use normal data to test user input (e..g correct and acceptable data input only)

  TRUE

  FALSE

 10. When testing a program, how does the 'tester' know there is a problem?

  When the syntax error speaks to the tester to provide a message

  When the actual output does not meet the expected output or outcome

  When the expected outcome is the same as the actual outcome

  None of the above

 11. Identify the error in the following code:
def main():
    print("ADDITION PROGRAM")
    print("A + B =?")
    a=int(input("Enter number A:"))
    b=int(input("Enter number B:"))
    c=(a/b)
    print(c)
    print("....and there's your answer:",c)
    

main()
          
          

  A Syntax Error

  A Runtime Error

  A Logic Error

  A murderous Error

 12. What type of error is this?
    z = x / 0
ZeroDivisionError: division by zero

  A Logic Error

  A murderous Error

  A Runtime Error

  A Syntax Error

 13. Multiplying when you should be dividing is an example of a …

  A Syntax Error

  A Runtime Error

  A Logic Error

  A murderous Error

 14. Displaying the wrong message is an example of a …

  A Syntax Error

  A murderous Error

  A Logic Error

  A Runtime Error

 15. Trying to open a file that does not exist would cause a…

  A Syntax Error

  A murderous Error

  A Runtime Error

  A Logic Error

 16. Missing semi colons would be examples of a …

  A murderous Error

  A Runtime Error

  A Syntax Error

  A Logic Error

 17. Improperly matching brackets and /or curly braces would usually cause a ….

  Brace Error

  Logic Error

  Minch Error

  Syntax Error

 18. Most ______________ errors are quite subtle and are much harder to find and fix.

  Syntax

  Logic

  Runtime

  Cartail

 19. Use of a reserved word such as 'print' as a variable would cause an error.

  FALSE

  TRUE

 20. A programmer is trying to work out the no. of months in a year and writes this. What is the error?
MonthsInYear = 13
Average = Total / MonthsInYear

  A logic error as you cannot use a variable called MonthsInYear

  A syntax error - you cannot use the number 13

  A syntax error because the line Average =Total/MonthsInYear is incorrect

  A logic error - there are 12 months in a year

 21. It is usually the CPU and Assembly language that directly uncovers syntax errors

  FALSE

  TRUE

 22. A logic error is a bug in a program that

  allows it to run but causes it to do so with an incorrect outcome due to some logical inaccuracy

  is logically correct but creates a logical issue within the compiler if syntax errors are present

  None of the above

  is logically sound but has inaccurate syntax

 23. Data that falls outside of what is acceptable and should be rejected is called….

  Abnormal or Erroneous Data

  None of the above

  Borderline Data

  Acceptable Data

 24. A system has validation to ensure that only numerical values between 1 and 10 are entered as input. The borderline test data for this could be:

  1 and 10

  14

  All of the above

  3 and 4

 25. Data at the upper or lower limits of expectations that should be accepted is referred to as:

  None of the above

  Abnormal or Erroneous Data

  Borderline Data

  Acceptable Data

 26. An IDE's code editor will usually help with pointing out syntax errors - e.g. pointing out the line in which there is the error

  TRUE

  FALSE

 27. A code editor will always point out and fix a logic error, as these are obvious and crash the program on running it.

  TRUE

  FALSE

 28. The following code has no errors. Which of the following statements is correct?
Dim x As Integer
Dim y As Integer
Dim answer As Integer

x = 10.5
y = 3
answer = x * y
TextBox1.Text = answer

  There are no errors

  There are two syntax errors and seven logic errors

  There are at least five logic errors

  There are at least two syntax errors

 29. In the following python code, if the user enters 2 and 2, instead of 4, it will produce 22. This is a ….
first = input("Input the first number ")
second = input("Input the second number ")
print("The sum is",first+second)

  Major Error

  Minor Error

  Logic Error

  Syntax Error

 30. The simplest form of authentication could be:

  None of the above

  entering a passwod up to four million times

  entering a usernamd and password and checking it against a database of agreed user entries

  allowing all users to use the same username and password

 31. Authentication methods include :

  image scanners

  passwords send to phones

  All of the above

  patterns to recognise

 32. Authentication also occurs when you access a website, you request access to the ___________ which hosts the page.

  human being

  server

  physical location

  validation routine

 33. What is one example of where authentication is required?

  facebook login

  network cables requiring clearning

  getting past the security guard at Microsoft

  None of the above

 34. Maintainability is also important if a program is going to be robust. Two ways of ensuring maintainable programs is to have good:

  comments and indentation

  users and moral human beings

  passwords and code syntax

  databases and secure buildings

 35. Entry of a national insurance number may require validation of the following kind:

  validation authentication factor check

  format check

  virus check

  None of the above

 36. A white list is a list of data that the application will reject and a black list is a list of data that the application will accept as valid

  TRUE

  FALSE

 37. White lists and Blacklists are usually used within:

  software development companies

  python coding societies

  operating systems

  firewall applications

 38. Having evaluated the visual design of the software, the team must also focus on code structure. Ensuring m___________ and readability is important.

  maintainability

  marginality

  mixability

  minimalism

 39. There are generally three times of maintainance:
Corrective, Adaptive and Perfective

  TRUE

  FALSE

 40. This type of maintenance is necessary when the client needs the software to run on an environment other than the one that it was originally designed for

  adaptive

  corrective

  none of the above

  perfective

 41. This type of maintenance is concerned with altering the software to add new features or enhancements not originally requested in the software specification

  perfective

  none of the above

  corrective

  adaptive

 42. This is a formal document which details the tests to be performed on the software. It will describe the following:
Scope of Testing
The tests to be performed
The reason for each test
The data to be used in tests
The expected outcome of each test

  Binary Sheet

  Beta Test

  Test Plan

  Alpha Test

 43. This relates to the first round of testing. Before releasing new software on to the market, developers will test it in-house.

  Final Testing

  Beta Testing

  Alpha Testing

  Iterative Testing

 44. This refers to the second round of testing. The developers will trial the software with a limited number of users. The users report any problems to the developers.

  Alpha Testing

  Final Testing

  Beta Testing

  Iterative Testing

 45. Testing a program is essential because:

  it ensures the program meets the needs of the client

  it ensures that the appropriate validation has been used and will be appropriate for end users

  All of the above

  it ensures the program works correctly without errors

 46. Data Validation checks the data is reasonable and Sanitsation removes _____________ data.

  binary

  unexpected or unrequired

  all

  text and numerical

 47. A program has a section of code that could cause errors, which method could be used to identify this issue?

  Validation Routines

  Moments

  Comments

  Authentication

 48. A user attempts to enter in an incorrect password- indentation is a method that would identify this issue.

  TRUE

  FALSE

 49. Defensive programming design is a method of ensuring that your code is not misused

  FALSE

  TRUE

 50. Comments should be included in a program to include what tests must be carried out on the code

  TRUE

  FALSE