Preview

09 - Final Assessment Test

 1. Which of the following is a way in which companies can design computer systems to prevent software misuse?

  Secure Firewall and setting filters on all email accounts

  All of the above

  Strong Passwords

  Regular backups and data encryption

 2. CAPTCHAs are sometimes used when you are signing into a website (e..g having to type in a series of letters and numbers). What is the purpose?

  to ensure that the user is not unintelligent and therefore unsuitable to use the system

  to differentiate between a human and a machine. To ensure that the system is not misused.

  None of the above

  to ensure that the user is a machine and not a human

 3. Making a copy of licensed software to give to a friend is acceptable use of software (not misuse)

  FALSE

  TRUE

 4. Unauthorised use of someone elses login details would count as software misuse

  FALSE

  TRUE

 5. Changing default settings on some software to suit your own personal needs is software misuse.

  TRUE

  FALSE

 6. Describe what would happen when the code is translated if all the syntax errors were corrected by the logic errors were left unchanged.

  None of the above

  The code will fail to run at all and revert back to the syntax errors

  The code will translate and run with the logic errors

  The code will stop at the logic errors and fail to run

 7. A type of error caused by the code not following the ______________________________ of the programming language is a syntax error

  mathematical accuracy

  rules of grammar

  None of the above

  correct logic

 8. True or False: a Test plan should ideally take the user down all possible paths of the program to test it.

  TRUE

  FALSE

 9. A good test plan will only use normal data to test user input (e..g correct and acceptable data input only)

  TRUE

  FALSE

 10. When testing a program, how does the 'tester' know there is a problem?

  None of the above

  When the expected outcome is the same as the actual outcome

  When the actual output does not meet the expected output or outcome

  When the syntax error speaks to the tester to provide a message

 11. Identify the error in the following code:
def main():
    print("ADDITION PROGRAM")
    print("A + B =?")
    a=int(input("Enter number A:"))
    b=int(input("Enter number B:"))
    c=(a/b)
    print(c)
    print("....and there's your answer:",c)
    

main()
          
          

  A Runtime Error

  A Syntax Error

  A murderous Error

  A Logic Error

 12. What type of error is this?
    z = x / 0
ZeroDivisionError: division by zero

  A Syntax Error

  A Runtime Error

  A murderous Error

  A Logic Error

 13. Multiplying when you should be dividing is an example of a …

  A murderous Error

  A Logic Error

  A Syntax Error

  A Runtime Error

 14. Displaying the wrong message is an example of a …

  A Logic Error

  A Syntax Error

  A murderous Error

  A Runtime Error

 15. Trying to open a file that does not exist would cause a…

  A murderous Error

  A Syntax Error

  A Runtime Error

  A Logic Error

 16. Missing semi colons would be examples of a …

  A murderous Error

  A Logic Error

  A Syntax Error

  A Runtime Error

 17. Improperly matching brackets and /or curly braces would usually cause a ….

  Minch Error

  Logic Error

  Syntax Error

  Brace Error

 18. Most ______________ errors are quite subtle and are much harder to find and fix.

  Runtime

  Syntax

  Logic

  Cartail

 19. Use of a reserved word such as 'print' as a variable would cause an error.

  FALSE

  TRUE

 20. A programmer is trying to work out the no. of months in a year and writes this. What is the error?
MonthsInYear = 13
Average = Total / MonthsInYear

  A syntax error - you cannot use the number 13

  A logic error - there are 12 months in a year

  A logic error as you cannot use a variable called MonthsInYear

  A syntax error because the line Average =Total/MonthsInYear is incorrect

 21. It is usually the CPU and Assembly language that directly uncovers syntax errors

  FALSE

  TRUE

 22. A logic error is a bug in a program that

  is logically correct but creates a logical issue within the compiler if syntax errors are present

  None of the above

  is logically sound but has inaccurate syntax

  allows it to run but causes it to do so with an incorrect outcome due to some logical inaccuracy

 23. Data that falls outside of what is acceptable and should be rejected is called….

  Abnormal or Erroneous Data

  Borderline Data

  None of the above

  Acceptable Data

 24. A system has validation to ensure that only numerical values between 1 and 10 are entered as input. The borderline test data for this could be:

  1 and 10

  All of the above

  14

  3 and 4

 25. Data at the upper or lower limits of expectations that should be accepted is referred to as:

  Acceptable Data

  None of the above

  Borderline Data

  Abnormal or Erroneous Data

 26. An IDE's code editor will usually help with pointing out syntax errors - e.g. pointing out the line in which there is the error

  TRUE

  FALSE

 27. A code editor will always point out and fix a logic error, as these are obvious and crash the program on running it.

  TRUE

  FALSE

 28. The following code has no errors. Which of the following statements is correct?
Dim x As Integer
Dim y As Integer
Dim answer As Integer

x = 10.5
y = 3
answer = x * y
TextBox1.Text = answer

  There are at least five logic errors

  There are at least two syntax errors

  There are no errors

  There are two syntax errors and seven logic errors

 29. In the following python code, if the user enters 2 and 2, instead of 4, it will produce 22. This is a ….
first = input("Input the first number ")
second = input("Input the second number ")
print("The sum is",first+second)

  Minor Error

  Major Error

  Logic Error

  Syntax Error

 30. The simplest form of authentication could be:

  allowing all users to use the same username and password

  entering a usernamd and password and checking it against a database of agreed user entries

  entering a passwod up to four million times

  None of the above

 31. Authentication methods include :

  patterns to recognise

  All of the above

  passwords send to phones

  image scanners

 32. Authentication also occurs when you access a website, you request access to the ___________ which hosts the page.

  validation routine

  server

  physical location

  human being

 33. What is one example of where authentication is required?

  network cables requiring clearning

  getting past the security guard at Microsoft

  facebook login

  None of the above

 34. Maintainability is also important if a program is going to be robust. Two ways of ensuring maintainable programs is to have good:

  users and moral human beings

  comments and indentation

  databases and secure buildings

  passwords and code syntax

 35. Entry of a national insurance number may require validation of the following kind:

  virus check

  validation authentication factor check

  None of the above

  format check

 36. A white list is a list of data that the application will reject and a black list is a list of data that the application will accept as valid

  FALSE

  TRUE

 37. White lists and Blacklists are usually used within:

  software development companies

  operating systems

  python coding societies

  firewall applications

 38. Having evaluated the visual design of the software, the team must also focus on code structure. Ensuring m___________ and readability is important.

  marginality

  minimalism

  maintainability

  mixability

 39. There are generally three times of maintainance:
Corrective, Adaptive and Perfective

  TRUE

  FALSE

 40. This type of maintenance is necessary when the client needs the software to run on an environment other than the one that it was originally designed for

  corrective

  none of the above

  perfective

  adaptive

 41. This type of maintenance is concerned with altering the software to add new features or enhancements not originally requested in the software specification

  perfective

  adaptive

  corrective

  none of the above

 42. This is a formal document which details the tests to be performed on the software. It will describe the following:
Scope of Testing
The tests to be performed
The reason for each test
The data to be used in tests
The expected outcome of each test

  Binary Sheet

  Test Plan

  Alpha Test

  Beta Test

 43. This relates to the first round of testing. Before releasing new software on to the market, developers will test it in-house.

  Iterative Testing

  Alpha Testing

  Final Testing

  Beta Testing

 44. This refers to the second round of testing. The developers will trial the software with a limited number of users. The users report any problems to the developers.

  Iterative Testing

  Alpha Testing

  Final Testing

  Beta Testing

 45. Testing a program is essential because:

  it ensures that the appropriate validation has been used and will be appropriate for end users

  it ensures the program meets the needs of the client

  it ensures the program works correctly without errors

  All of the above

 46. Data Validation checks the data is reasonable and Sanitsation removes _____________ data.

  unexpected or unrequired

  text and numerical

  all

  binary

 47. A program has a section of code that could cause errors, which method could be used to identify this issue?

  Authentication

  Comments

  Validation Routines

  Moments

 48. A user attempts to enter in an incorrect password- indentation is a method that would identify this issue.

  TRUE

  FALSE

 49. Defensive programming design is a method of ensuring that your code is not misused

  FALSE

  TRUE

 50. Comments should be included in a program to include what tests must be carried out on the code

  TRUE

  FALSE