Preview

09 - Final Assessment Test

 1. Which of the following is a way in which companies can design computer systems to prevent software misuse?

  Regular backups and data encryption

  Strong Passwords

  Secure Firewall and setting filters on all email accounts

  All of the above

 2. CAPTCHAs are sometimes used when you are signing into a website (e..g having to type in a series of letters and numbers). What is the purpose?

  None of the above

  to differentiate between a human and a machine. To ensure that the system is not misused.

  to ensure that the user is not unintelligent and therefore unsuitable to use the system

  to ensure that the user is a machine and not a human

 3. Making a copy of licensed software to give to a friend is acceptable use of software (not misuse)

  FALSE

  TRUE

 4. Unauthorised use of someone elses login details would count as software misuse

  TRUE

  FALSE

 5. Changing default settings on some software to suit your own personal needs is software misuse.

  FALSE

  TRUE

 6. Describe what would happen when the code is translated if all the syntax errors were corrected by the logic errors were left unchanged.

  The code will stop at the logic errors and fail to run

  The code will fail to run at all and revert back to the syntax errors

  The code will translate and run with the logic errors

  None of the above

 7. A type of error caused by the code not following the ______________________________ of the programming language is a syntax error

  None of the above

  mathematical accuracy

  rules of grammar

  correct logic

 8. True or False: a Test plan should ideally take the user down all possible paths of the program to test it.

  FALSE

  TRUE

 9. A good test plan will only use normal data to test user input (e..g correct and acceptable data input only)

  TRUE

  FALSE

 10. When testing a program, how does the 'tester' know there is a problem?

  When the syntax error speaks to the tester to provide a message

  None of the above

  When the expected outcome is the same as the actual outcome

  When the actual output does not meet the expected output or outcome

 11. Identify the error in the following code:
def main():
    print("ADDITION PROGRAM")
    print("A + B =?")
    a=int(input("Enter number A:"))
    b=int(input("Enter number B:"))
    c=(a/b)
    print(c)
    print("....and there's your answer:",c)
    

main()
          
          

  A Syntax Error

  A murderous Error

  A Runtime Error

  A Logic Error

 12. What type of error is this?
    z = x / 0
ZeroDivisionError: division by zero

  A murderous Error

  A Logic Error

  A Syntax Error

  A Runtime Error

 13. Multiplying when you should be dividing is an example of a …

  A murderous Error

  A Syntax Error

  A Logic Error

  A Runtime Error

 14. Displaying the wrong message is an example of a …

  A Syntax Error

  A murderous Error

  A Logic Error

  A Runtime Error

 15. Trying to open a file that does not exist would cause a…

  A murderous Error

  A Syntax Error

  A Logic Error

  A Runtime Error

 16. Missing semi colons would be examples of a …

  A Logic Error

  A Runtime Error

  A murderous Error

  A Syntax Error

 17. Improperly matching brackets and /or curly braces would usually cause a ….

  Brace Error

  Minch Error

  Logic Error

  Syntax Error

 18. Most ______________ errors are quite subtle and are much harder to find and fix.

  Syntax

  Runtime

  Cartail

  Logic

 19. Use of a reserved word such as 'print' as a variable would cause an error.

  FALSE

  TRUE

 20. A programmer is trying to work out the no. of months in a year and writes this. What is the error?
MonthsInYear = 13
Average = Total / MonthsInYear

  A syntax error - you cannot use the number 13

  A syntax error because the line Average =Total/MonthsInYear is incorrect

  A logic error - there are 12 months in a year

  A logic error as you cannot use a variable called MonthsInYear

 21. It is usually the CPU and Assembly language that directly uncovers syntax errors

  FALSE

  TRUE

 22. A logic error is a bug in a program that

  is logically correct but creates a logical issue within the compiler if syntax errors are present

  None of the above

  allows it to run but causes it to do so with an incorrect outcome due to some logical inaccuracy

  is logically sound but has inaccurate syntax

 23. Data that falls outside of what is acceptable and should be rejected is called….

  Borderline Data

  Abnormal or Erroneous Data

  Acceptable Data

  None of the above

 24. A system has validation to ensure that only numerical values between 1 and 10 are entered as input. The borderline test data for this could be:

  1 and 10

  3 and 4

  14

  All of the above

 25. Data at the upper or lower limits of expectations that should be accepted is referred to as:

  Borderline Data

  Acceptable Data

  None of the above

  Abnormal or Erroneous Data

 26. An IDE's code editor will usually help with pointing out syntax errors - e.g. pointing out the line in which there is the error

  FALSE

  TRUE

 27. A code editor will always point out and fix a logic error, as these are obvious and crash the program on running it.

  FALSE

  TRUE

 28. The following code has no errors. Which of the following statements is correct?
Dim x As Integer
Dim y As Integer
Dim answer As Integer

x = 10.5
y = 3
answer = x * y
TextBox1.Text = answer

  There are at least five logic errors

  There are no errors

  There are two syntax errors and seven logic errors

  There are at least two syntax errors

 29. In the following python code, if the user enters 2 and 2, instead of 4, it will produce 22. This is a ….
first = input("Input the first number ")
second = input("Input the second number ")
print("The sum is",first+second)

  Syntax Error

  Minor Error

  Major Error

  Logic Error

 30. The simplest form of authentication could be:

  allowing all users to use the same username and password

  entering a usernamd and password and checking it against a database of agreed user entries

  entering a passwod up to four million times

  None of the above

 31. Authentication methods include :

  All of the above

  image scanners

  passwords send to phones

  patterns to recognise

 32. Authentication also occurs when you access a website, you request access to the ___________ which hosts the page.

  validation routine

  human being

  physical location

  server

 33. What is one example of where authentication is required?

  getting past the security guard at Microsoft

  facebook login

  None of the above

  network cables requiring clearning

 34. Maintainability is also important if a program is going to be robust. Two ways of ensuring maintainable programs is to have good:

  passwords and code syntax

  databases and secure buildings

  users and moral human beings

  comments and indentation

 35. Entry of a national insurance number may require validation of the following kind:

  format check

  validation authentication factor check

  None of the above

  virus check

 36. A white list is a list of data that the application will reject and a black list is a list of data that the application will accept as valid

  TRUE

  FALSE

 37. White lists and Blacklists are usually used within:

  operating systems

  python coding societies

  firewall applications

  software development companies

 38. Having evaluated the visual design of the software, the team must also focus on code structure. Ensuring m___________ and readability is important.

  maintainability

  mixability

  marginality

  minimalism

 39. There are generally three times of maintainance:
Corrective, Adaptive and Perfective

  TRUE

  FALSE

 40. This type of maintenance is necessary when the client needs the software to run on an environment other than the one that it was originally designed for

  adaptive

  perfective

  none of the above

  corrective

 41. This type of maintenance is concerned with altering the software to add new features or enhancements not originally requested in the software specification

  corrective

  perfective

  none of the above

  adaptive

 42. This is a formal document which details the tests to be performed on the software. It will describe the following:
Scope of Testing
The tests to be performed
The reason for each test
The data to be used in tests
The expected outcome of each test

  Binary Sheet

  Alpha Test

  Beta Test

  Test Plan

 43. This relates to the first round of testing. Before releasing new software on to the market, developers will test it in-house.

  Iterative Testing

  Final Testing

  Beta Testing

  Alpha Testing

 44. This refers to the second round of testing. The developers will trial the software with a limited number of users. The users report any problems to the developers.

  Beta Testing

  Iterative Testing

  Final Testing

  Alpha Testing

 45. Testing a program is essential because:

  All of the above

  it ensures that the appropriate validation has been used and will be appropriate for end users

  it ensures the program works correctly without errors

  it ensures the program meets the needs of the client

 46. Data Validation checks the data is reasonable and Sanitsation removes _____________ data.

  all

  binary

  text and numerical

  unexpected or unrequired

 47. A program has a section of code that could cause errors, which method could be used to identify this issue?

  Validation Routines

  Comments

  Authentication

  Moments

 48. A user attempts to enter in an incorrect password- indentation is a method that would identify this issue.

  FALSE

  TRUE

 49. Defensive programming design is a method of ensuring that your code is not misused

  FALSE

  TRUE

 50. Comments should be included in a program to include what tests must be carried out on the code

  TRUE

  FALSE