Preview

09 - Final Assessment Test

 1. Which of the following is a way in which companies can design computer systems to prevent software misuse?

  Strong Passwords

  All of the above

  Secure Firewall and setting filters on all email accounts

  Regular backups and data encryption

 2. CAPTCHAs are sometimes used when you are signing into a website (e..g having to type in a series of letters and numbers). What is the purpose?

  None of the above

  to ensure that the user is not unintelligent and therefore unsuitable to use the system

  to differentiate between a human and a machine. To ensure that the system is not misused.

  to ensure that the user is a machine and not a human

 3. Making a copy of licensed software to give to a friend is acceptable use of software (not misuse)

  FALSE

  TRUE

 4. Unauthorised use of someone elses login details would count as software misuse

  TRUE

  FALSE

 5. Changing default settings on some software to suit your own personal needs is software misuse.

  FALSE

  TRUE

 6. Describe what would happen when the code is translated if all the syntax errors were corrected by the logic errors were left unchanged.

  The code will fail to run at all and revert back to the syntax errors

  None of the above

  The code will translate and run with the logic errors

  The code will stop at the logic errors and fail to run

 7. A type of error caused by the code not following the ______________________________ of the programming language is a syntax error

  rules of grammar

  correct logic

  None of the above

  mathematical accuracy

 8. True or False: a Test plan should ideally take the user down all possible paths of the program to test it.

  FALSE

  TRUE

 9. A good test plan will only use normal data to test user input (e..g correct and acceptable data input only)

  FALSE

  TRUE

 10. When testing a program, how does the 'tester' know there is a problem?

  None of the above

  When the syntax error speaks to the tester to provide a message

  When the expected outcome is the same as the actual outcome

  When the actual output does not meet the expected output or outcome

 11. Identify the error in the following code:
def main():
    print("ADDITION PROGRAM")
    print("A + B =?")
    a=int(input("Enter number A:"))
    b=int(input("Enter number B:"))
    c=(a/b)
    print(c)
    print("....and there's your answer:",c)
    

main()
          
          

  A Syntax Error

  A Logic Error

  A murderous Error

  A Runtime Error

 12. What type of error is this?
    z = x / 0
ZeroDivisionError: division by zero

  A Runtime Error

  A Logic Error

  A murderous Error

  A Syntax Error

 13. Multiplying when you should be dividing is an example of a …

  A Syntax Error

  A Runtime Error

  A Logic Error

  A murderous Error

 14. Displaying the wrong message is an example of a …

  A Syntax Error

  A Logic Error

  A Runtime Error

  A murderous Error

 15. Trying to open a file that does not exist would cause a…

  A Runtime Error

  A murderous Error

  A Syntax Error

  A Logic Error

 16. Missing semi colons would be examples of a …

  A murderous Error

  A Runtime Error

  A Logic Error

  A Syntax Error

 17. Improperly matching brackets and /or curly braces would usually cause a ….

  Logic Error

  Minch Error

  Syntax Error

  Brace Error

 18. Most ______________ errors are quite subtle and are much harder to find and fix.

  Logic

  Cartail

  Syntax

  Runtime

 19. Use of a reserved word such as 'print' as a variable would cause an error.

  TRUE

  FALSE

 20. A programmer is trying to work out the no. of months in a year and writes this. What is the error?
MonthsInYear = 13
Average = Total / MonthsInYear

  A logic error as you cannot use a variable called MonthsInYear

  A syntax error because the line Average =Total/MonthsInYear is incorrect

  A syntax error - you cannot use the number 13

  A logic error - there are 12 months in a year

 21. It is usually the CPU and Assembly language that directly uncovers syntax errors

  TRUE

  FALSE

 22. A logic error is a bug in a program that

  is logically sound but has inaccurate syntax

  None of the above

  allows it to run but causes it to do so with an incorrect outcome due to some logical inaccuracy

  is logically correct but creates a logical issue within the compiler if syntax errors are present

 23. Data that falls outside of what is acceptable and should be rejected is called….

  Abnormal or Erroneous Data

  Acceptable Data

  None of the above

  Borderline Data

 24. A system has validation to ensure that only numerical values between 1 and 10 are entered as input. The borderline test data for this could be:

  3 and 4

  All of the above

  14

  1 and 10

 25. Data at the upper or lower limits of expectations that should be accepted is referred to as:

  None of the above

  Acceptable Data

  Abnormal or Erroneous Data

  Borderline Data

 26. An IDE's code editor will usually help with pointing out syntax errors - e.g. pointing out the line in which there is the error

  FALSE

  TRUE

 27. A code editor will always point out and fix a logic error, as these are obvious and crash the program on running it.

  TRUE

  FALSE

 28. The following code has no errors. Which of the following statements is correct?
Dim x As Integer
Dim y As Integer
Dim answer As Integer

x = 10.5
y = 3
answer = x * y
TextBox1.Text = answer

  There are two syntax errors and seven logic errors

  There are at least five logic errors

  There are no errors

  There are at least two syntax errors

 29. In the following python code, if the user enters 2 and 2, instead of 4, it will produce 22. This is a ….
first = input("Input the first number ")
second = input("Input the second number ")
print("The sum is",first+second)

  Syntax Error

  Minor Error

  Major Error

  Logic Error

 30. The simplest form of authentication could be:

  entering a passwod up to four million times

  None of the above

  allowing all users to use the same username and password

  entering a usernamd and password and checking it against a database of agreed user entries

 31. Authentication methods include :

  passwords send to phones

  patterns to recognise

  image scanners

  All of the above

 32. Authentication also occurs when you access a website, you request access to the ___________ which hosts the page.

  validation routine

  physical location

  human being

  server

 33. What is one example of where authentication is required?

  network cables requiring clearning

  None of the above

  getting past the security guard at Microsoft

  facebook login

 34. Maintainability is also important if a program is going to be robust. Two ways of ensuring maintainable programs is to have good:

  users and moral human beings

  passwords and code syntax

  databases and secure buildings

  comments and indentation

 35. Entry of a national insurance number may require validation of the following kind:

  validation authentication factor check

  format check

  None of the above

  virus check

 36. A white list is a list of data that the application will reject and a black list is a list of data that the application will accept as valid

  TRUE

  FALSE

 37. White lists and Blacklists are usually used within:

  firewall applications

  python coding societies

  operating systems

  software development companies

 38. Having evaluated the visual design of the software, the team must also focus on code structure. Ensuring m___________ and readability is important.

  maintainability

  marginality

  mixability

  minimalism

 39. There are generally three times of maintainance:
Corrective, Adaptive and Perfective

  TRUE

  FALSE

 40. This type of maintenance is necessary when the client needs the software to run on an environment other than the one that it was originally designed for

  none of the above

  corrective

  perfective

  adaptive

 41. This type of maintenance is concerned with altering the software to add new features or enhancements not originally requested in the software specification

  perfective

  corrective

  none of the above

  adaptive

 42. This is a formal document which details the tests to be performed on the software. It will describe the following:
Scope of Testing
The tests to be performed
The reason for each test
The data to be used in tests
The expected outcome of each test

  Test Plan

  Beta Test

  Binary Sheet

  Alpha Test

 43. This relates to the first round of testing. Before releasing new software on to the market, developers will test it in-house.

  Alpha Testing

  Iterative Testing

  Final Testing

  Beta Testing

 44. This refers to the second round of testing. The developers will trial the software with a limited number of users. The users report any problems to the developers.

  Alpha Testing

  Final Testing

  Beta Testing

  Iterative Testing

 45. Testing a program is essential because:

  All of the above

  it ensures that the appropriate validation has been used and will be appropriate for end users

  it ensures the program meets the needs of the client

  it ensures the program works correctly without errors

 46. Data Validation checks the data is reasonable and Sanitsation removes _____________ data.

  text and numerical

  unexpected or unrequired

  all

  binary

 47. A program has a section of code that could cause errors, which method could be used to identify this issue?

  Authentication

  Validation Routines

  Moments

  Comments

 48. A user attempts to enter in an incorrect password- indentation is a method that would identify this issue.

  TRUE

  FALSE

 49. Defensive programming design is a method of ensuring that your code is not misused

  TRUE

  FALSE

 50. Comments should be included in a program to include what tests must be carried out on the code

  FALSE

  TRUE