Producing Robust Programs In Computer Science - Computing - Assignment

1852 words - 8 pages

End of Unit Quiz – Unit 2.3 Producing robust programs
1.
ai. Maintainability of code allows a team of Programmers to work effectively. One way of improving maintainability of code is to use comments. What is meant by using comments in code?
aii. Explain using an example why you should use comments in code.
bi. Another way of improving maintainability of code is to use indentation. What is meant by indentation?
bii. Why should you use indentation? Give an example.
Version 1 1 © OCR 2017
2.
a. Why is it important that a business has robust validation on their registration web page?
b. What are two examples of validation that a business can implement on their registration page?
3.
The program below outputs the correct size of football for a certain age using the information from the table. The program should also output the circumference and weight.
Age
Circumference (cm)
Weight (g)
Size
<8
58
311
3
9-11
64
369
4
12+
70
425
5
01 Input age
02 Select age
03 Case Is >12
04 Size=5
05 Weight=311
06 Circumference=58
07 Case Is >8 AND <=11
08 Size=4
09 Weight=369
10 Circumference=64
11 Case Is <=8
12 Size=3
13 Weight=311
14 Circumference=58
15 End Select
16 Ball_Info=”The correct size is:” & ” “ & size & “ “ & “With a Circumference of” & Circumference & “ “ _& “and a weight of” & “ “ & weight &”.”
17 OUTPUT BallInfo
ai. What line is the Syntax error is on?
aii. Justify your answer for (ai).
bi. What line is the Logic error on?
bii. Justify your answer for (bi).
4. What is the purpose of testing?
5.
a. How could a software company use iterative testing to develop an app?
b. How could the software company use final testing to develop the product?
6. Complete the definitions for the types of testing below:
Test Data
Reason for use
Valid data
Invalid data
Borderline data
7. John has to write a program to convert exam marks out of 100 to a Grade.
A=80+, B=70-79, C=60-69, D=50-59, E=40-49, F=30-39, G=20-29, U=0-19
Complete the table below by stating the marks to be tested, the reason for test and the expected outcome. The first row has been completed for you.
Test Data
Reason for test
Expected outcome
Mark 78
Test a valid input between 0-100 to check the correct grade is output.
B
Mark……
Mark……
8. When designing computer systems it is important to plan for contingencies. This is very important because it will allow developers to account for situations that were not planned.
What are two situations that might occur and what contingency could be planned to account for them?
9. Software can be misused in a number of ways. The table below lists statements that state acceptable use or software misuse. Tick one box in each row to show which use applies.
Use
Acceptable Use
Software Misuse
Making a copy of licensed software to give to a friend.
Changing the default settings to suit your personal needs.
Copying company data onto a secondary storage device
Using somebody els...

More like Producing Robust Programs In Computer Science - Computing - Assignment

Computing Fields And How They Vary - Orientation To Computer Science - Essay

1003 words - 5 pages Free ... systems is a more business-oriented computing degree. It is more focused on how information can be used to solve business problems. This degree does not go as in-depth as computer science, but it gives the most expansive view of the computing field. This makes it a very fitting degree for someone who wants to be a project manager. It allows them to have knowledge and lead others to produce the desired program or product. While this approach of ...

Moral Dilemma Of Computer Science & Government - TAMU Comp Sci - Short Research Assignment

489 words - 2 pages ... Name a) My dilemma is one that happened between Apple and the FBI in 2015. There was a dispute between the two organizations over the unlocking of an iPhone 5C, specifically, the one used by one of the terrorists involved in the San Bernardino shooting. The FBI tried to force Apple to create a special OS that would allow them to unlock the phone without the password. Apple declined to do so because doing this would violate their policy of not ...

Depth Study 3 Patterns In Nature - Science - Assignment

474 words - 2 pages ... CALLAGHAN COLLEGE Investigating Science While this task is not part of the Assessment Schedule, it does fulfill the requirements for Depth Study hours and achievement of outcomes. Failure to demonstrate the required hours or products will result in an? N? warning. Task type: Depth Study (1 hour) Skills outcomes 1. Analysing data and information INS11/12-5 analyses and evaluates primary and secondary data and information 2. Analysing data ...

American Democracy In Peril Economic Inequality - Stan State Political Science - Assignment

492 words - 2 pages Free ... Economic Inequality In this chapter I believe the main theme Hudson discusses is both political and social equality and inequality. Political equality is defined as all people being equally qualified to rule. Hudson says this is the core value of democratic theory. Hudson thinks we should be Skeptical of elite leadership because of their alleged superiority. He states that this has lead to revolutions. Despite this fact there are many theories ...

Civics Assignment Which Makes Student Create A Video On The Different Issues In Today's Society - Science - Poster

718 words - 3 pages ... Khalsa Community School Grade 10, Civics, CHV20 The Rant Assignment Student Name: ____________________ Date: __________________ K T C A Student Mark Possible Mark 6 8 10 8 Expectations Covered: A2, B1, B3 TASK: · Watch an example of a Rick Mercer Rant · Choose a current, social issue topic (get it approved). This topic needs to be about something that has been reported on frequently in recent months in the media. (i.e. effects of teen ...

Great Computer Assignment For Highschool Students

465 words - 2 pages Free ... of human thought, and the technological development of increasingly sophisticated computing systems.In the latter sense, the term AI has been applied to computer systems and programs capable of performing tasks more complex than straightforward programming, although still far from the realm of actual thought. The most important fields of research in this area are information processing, pattern recognition, game-playing computers, and applied ...

Virtual Reality

1674 words - 7 pages ... networking, human interfacing techniques (for example, voice and gesture recognition), audio synthesis, and high-performance computing are needed to assure its use in manufacturing, education, science, and art. Virtual reality is the new frontier of the computer-human interface. Researchers in computer-imaging technology are developing systems by which users can experience a simulated three-dimensional reality. This simulated reality is known as ...

History Of Computers In America

2950 words - 12 pages ... machines did the bulk of the world's business computing and a good portion of the computing work in science (Chposky, 73).By the late 1930's punched-card machine techniques had become sowell established and reliable that Howard Hathaway Aiken, incollaboration with engineers at IBM, undertook construction of a large automatic digital computer based on standard IBM electromechanical parts. Aiken's machine, called the Harvard Mark I, handled 23 ...

Internet And Computing Core Certification Guide

1909 words - 8 pages ... people who are new to computers or have limited exposure to a computer prior to taking this course. The intent of this courseware is to introduce computer knowledge and skill sets that a participant can acquire and then apply to tasks he/she may want to perform on a computing device. Course Prerequisites This courseware was designed to provide the essential skills for computer literacy, using application programs commonly found in school and ...

ABC Sex Education - The Ultimate Essay - Camden High School - Essay

865 words - 4 pages ... ://www.amazon.com/Skytech-Gaming-ST-SHADOW-II-002-Computer -Desktop/dp/B0771BZY8Z AP Computer Science Principles Effective Fall 2017 Page 1​ of 3 https://www.videoblocks.com/video/wifi-symbol-logo-a-sign-for-wireless-int ernet-loop-black-rhhcqvwuzjd58gqj0 Computing Innovation 2c)  VR has many beneficial benefits. One of these is the ability to bring office workers digitally together in events such as conferences and meetings. In this case, rather than just ...

Information System Paper On Digital IT - York University - Essay

4589 words - 19 pages ... Nevin Buconjic in class, digital IT is facing some critical issues now and as a city we should work together to resolve the problems and promote economic development. Some of the issues include; there not enough Computer Science graduates and Programs in the city. Sault Ste. Marie has two college institutions that offer computer science and often after graduation, the students move to different school to complete the program or move to different ...

ENG 114 Source Evaluation Assignment

633 words - 3 pages ... Previewing the Text The authors are Jesus TellezIsaac who is an associate professor from University of Carabobo and Zeadally Sherali who is from University of Kentucky. TellezIsaac's research is forcing on internet security, mobile computing and mobile payment systems. Moreover, TellezIsaac has his doctorate about telematics engineering area from the University Politcnica de Catalunya which is the top one science university in Spain. Sherali is ...

Testing

5352 words - 22 pages ... students who have won the most games, see Fig. 6. These boards are shown in the homepage after each student logs into PeerSpace. It provides a strong incentive for the students to be more active in participating in PeerSpace activities and to play more games. E. Collaborative Programming for Community Building To Computer Science students, one shared interest is writing computer programs for competition style problems. To engage the students, a ...

Hospitility Progress

1483 words - 6 pages ... computer was unveiled in 1964. In 1937 first digital computer was built by Dr. John V. Atanasoff and Clifford Berry. The colossus election computer was build for military in 1943. The new invention for computers became smaller, more powerful m and they are capable to run many different programs. In 1980 first Microsoft operating system was born. The first personal Computer for home and office use was introduced in 1081 The Macintosh computer was ...

Accounting Info Systems

1018 words - 5 pages Free ... will use the Internet for e-business (Pepe, 2011). Accountants typically use the Internet to execute major business processes in the enterprise. E-Business allows the accounting firm to coordinate activities for internal management and combines the clients' relationships with the use of digital networks. As for the Intranet, it can distribute information to employees such as corporate policies, and programs. Companies create a portal within their ...