Unit 2.3 Robust Programs

Description

My Unit 2.3 Mind Map for OCR GCSE Computing
Mathew Wheatley
Mind Map by Mathew Wheatley, updated more than 1 year ago
Mathew Wheatley
Created by Mathew Wheatley almost 6 years ago
90
2

Resource summary

Unit 2.3 Robust Programs
  1. Key Words and Phrases on Robustness
    1. Authentication - A coding method that checks that the user really is who they say they are. It can also be physical, for example through the use of a banking secure key
      1. Maintainability - Code must be maintainable. We can use comments and indentation to provide information to future users and programmers that may be required to maintain the code.
        1. Comments - Help explain the code and its function Using the hash symbol.
          1. Indentation - Used to help group together a function
            1. Anticipating Misuse - We predict how someone could abuse the program and the plan for these issues
              1. Data Sanitisation - Cleaning up inputted data so it is ready for apps or the program to use.
                1. Data Validation - Makes sure that data entered is reasonable. Comes in many forms.
                  1. Check Digit - The last one or two digits in a code are used to check the other digits are correct
                    1. Format Check - Checks inputs are in the right format
                      1. Length Check - Checks it isn't too long/short
                        1. Lookup Table - Looks up acceptable values in a table
                          1. Presence Check - Checks if data has been entered into a field
                            1. Range Check - Checks that the value falls in the specified range
                              1. Spell Check - Looks up spellings in the dictionary
                              2. Data Verification - Makes sure that data entered is accurate through either dual entry or double checking.
                              3. Different types of Test Data
                                1. Normal - Data in the range
                                  1. Extreme - Data lying on the edge of the range (Min/Max)
                                    1. Erroneous - Data outside of the range
                                      1. Null Value - Nothing is entered
                                        1. Invalid - Wrong type of data inputted
                                        2. Key Terms on Testing
                                          1. Iterative Testing - Testing as you go along. Done line by line or section by section
                                            1. Final Testing - Carried out at the ending, when it's fully written
                                              1. Syntax Errors - Mistakes in the way the code is written
                                                1. Logic Errors - A bug in the program that makes it run incorrectly
                                                  1. Bugs - These cause programs to run incorrectly and are often caused by erroneous code
                                                    1. SYSTEMS LIFECYCLE - THIS CYCLE LOOPS
                                                      1. Background Investigation
                                                        1. Analysis
                                                          1. Design - Test Plan is created here
                                                            1. Implementation - Iterative Testing takes place
                                                              1. Testing - Final Testing occurs
                                                                1. Evaluation - We feedback on our testing here
                                                    Show full summary Hide full summary

                                                    Similar

                                                    Types and Components of Computer Systems
                                                    Jess Peason
                                                    Input Devices
                                                    Jess Peason
                                                    Output Devices
                                                    Jess Peason
                                                    Computing
                                                    Kwame Oteng-Adusei
                                                    Pack of playing cards answer
                                                    Karl Taylor
                                                    Code Challenge Flow Chart
                                                    Charlotte Hilton
                                                    Computing Hardware - CPU and Memory
                                                    ollietablet123
                                                    Computer Systems
                                                    lisawinkler10
                                                    Computer science quiz
                                                    Ryan Barton
                                                    Input, output and storage devices
                                                    Mr A Esch
                                                    GCSE Computing - 4 - Representation of data in computer systems
                                                    lilymate