# Producing Robust Programs In Computer Science - Computing - Assignment

1852 words - 8 pages

End of Unit Quiz – Unit 2.3 Producing robust programs
1.
ai. Maintainability of code allows a team of Programmers to work effectively. One way of improving maintainability of code is to use comments. What is meant by using comments in code?
aii. Explain using an example why you should use comments in code.
bi. Another way of improving maintainability of code is to use indentation. What is meant by indentation?
bii. Why should you use indentation? Give an example.
Version 1 1 © OCR 2017
2.
a. Why is it important that a business has robust validation on their registration web page?
b. What are two examples of validation that a business can implement on their registration page?
3.
The program below outputs the correct size of football for a certain age using the information from the table. The program should also output the circumference and weight.
Age
Circumference (cm)
Weight (g)
Size
<8
58
311
3
9-11
64
369
4
12+
70
425
5
01 Input age
02 Select age
03 Case Is >12
04 Size=5
05 Weight=311
06 Circumference=58
07 Case Is >8 AND <=11
08 Size=4
09 Weight=369
10 Circumference=64
11 Case Is <=8
12 Size=3
13 Weight=311
14 Circumference=58
15 End Select
16 Ball_Info=”The correct size is:” & ” “ & size & “ “ & “With a Circumference of” & Circumference & “ “ _& “and a weight of” & “ “ & weight &”.”
17 OUTPUT BallInfo
ai. What line is the Syntax error is on?
bi. What line is the Logic error on?
4. What is the purpose of testing?
5.
a. How could a software company use iterative testing to develop an app?
b. How could the software company use final testing to develop the product?
6. Complete the definitions for the types of testing below:
Test Data
Reason for use
Valid data
Invalid data
Borderline data
7. John has to write a program to convert exam marks out of 100 to a Grade.
A=80+, B=70-79, C=60-69, D=50-59, E=40-49, F=30-39, G=20-29, U=0-19
Complete the table below by stating the marks to be tested, the reason for test and the expected outcome. The first row has been completed for you.
Test Data
Reason for test
Expected outcome
Mark 78
Test a valid input between 0-100 to check the correct grade is output.
B
Mark……
Mark……
8. When designing computer systems it is important to plan for contingencies. This is very important because it will allow developers to account for situations that were not planned.
What are two situations that might occur and what contingency could be planned to account for them?
9. Software can be misused in a number of ways. The table below lists statements that state acceptable use or software misuse. Tick one box in each row to show which use applies.
Use
Acceptable Use
Software Misuse
Making a copy of licensed software to give to a friend.
Changing the default settings to suit your personal needs.
Copying company data onto a secondary storage device
Using somebody els...

## Computing Fields And How They Vary - Orientation To Computer Science - Essay

1003 words - 5 pages Free ... systems is a more business-oriented computing degree. It is more focused on how information can be used to solve business problems. This degree does not go as in-depth as computer science, but it gives the most expansive view of the computing field. This makes it a very fitting degree for someone who wants to be a project manager. It allows them to have knowledge and lead others to produce the desired program or product. While this approach of ...

## Moral Dilemma Of Computer Science & Government - TAMU Comp Sci - Short Research Assignment

489 words - 2 pages ... Name a) My dilemma is one that happened between Apple and the FBI in 2015. There was a dispute between the two organizations over the unlocking of an iPhone 5C, specifically, the one used by one of the terrorists involved in the San Bernardino shooting. The FBI tried to force Apple to create a special OS that would allow them to unlock the phone without the password. Apple declined to do so because doing this would violate their policy of not ...

## Depth Study 3 Patterns In Nature - Science - Assignment

474 words - 2 pages ... CALLAGHAN COLLEGE Investigating Science While this task is not part of the Assessment Schedule, it does fulfill the requirements for Depth Study hours and achievement of outcomes. Failure to demonstrate the required hours or products will result in an? N? warning. Task type: Depth Study (1 hour) Skills outcomes 1. Analysing data and information INS11/12-5 analyses and evaluates primary and secondary data and information 2. Analysing data ...

## American Democracy In Peril Economic Inequality - Stan State Political Science - Assignment

492 words - 2 pages Free ... Economic Inequality In this chapter I believe the main theme Hudson discusses is both political and social equality and inequality. Political equality is defined as all people being equally qualified to rule. Hudson says this is the core value of democratic theory. Hudson thinks we should be Skeptical of elite leadership because of their alleged superiority. He states that this has lead to revolutions. Despite this fact there are many theories ...

## Civics Assignment Which Makes Student Create A Video On The Different Issues In Today's Society - Science - Poster

718 words - 3 pages ... Khalsa Community School Grade 10, Civics, CHV20 The Rant Assignment Student Name: ____________________ Date: __________________ K T C A Student Mark Possible Mark 6 8 10 8 Expectations Covered: A2, B1, B3 TASK: · Watch an example of a Rick Mercer Rant · Choose a current, social issue topic (get it approved). This topic needs to be about something that has been reported on frequently in recent months in the media. (i.e. effects of teen ...

## Great Computer Assignment For Highschool Students

465 words - 2 pages Free ... of human thought, and the technological development of increasingly sophisticated computing systems.In the latter sense, the term AI has been applied to computer systems and programs capable of performing tasks more complex than straightforward programming, although still far from the realm of actual thought. The most important fields of research in this area are information processing, pattern recognition, game-playing computers, and applied ...

## Virtual Reality

1674 words - 7 pages ... networking, human interfacing techniques (for example, voice and gesture recognition), audio synthesis, and high-performance computing are needed to assure its use in manufacturing, education, science, and art. Virtual reality is the new frontier of the computer-human interface. Researchers in computer-imaging technology are developing systems by which users can experience a simulated three-dimensional reality. This simulated reality is known as ...

## History Of Computers In America

2950 words - 12 pages ... machines did the bulk of the world's business computing and a good portion of the computing work in science (Chposky, 73).By the late 1930's punched-card machine techniques had become sowell established and reliable that Howard Hathaway Aiken, incollaboration with engineers at IBM, undertook construction of a large automatic digital computer based on standard IBM electromechanical parts. Aiken's machine, called the Harvard Mark I, handled 23 ...

## ABC Sex Education - The Ultimate Essay - Camden High School - Essay

865 words - 4 pages ... ://www.amazon.com/Skytech-Gaming-ST-SHADOW-II-002-Computer -Desktop/dp/B0771BZY8Z AP Computer Science Principles Effective Fall 2017 Page 1​ of 3 https://www.videoblocks.com/video/wifi-symbol-logo-a-sign-for-wireless-int ernet-loop-black-rhhcqvwuzjd58gqj0 Computing Innovation 2c)  VR has many beneficial benefits. One of these is the ability to bring office workers digitally together in events such as conferences and meetings. In this case, rather than just ...

## Information System Paper On Digital IT - York University - Essay

4589 words - 19 pages ... Nevin Buconjic in class, digital IT is facing some critical issues now and as a city we should work together to resolve the problems and promote economic development. Some of the issues include; there not enough Computer Science graduates and Programs in the city. Sault Ste. Marie has two college institutions that offer computer science and often after graduation, the students move to different school to complete the program or move to different ...

## Testing

5352 words - 22 pages ... students who have won the most games, see Fig. 6. These boards are shown in the homepage after each student logs into PeerSpace. It provides a strong incentive for the students to be more active in participating in PeerSpace activities and to play more games. E. Collaborative Programming for Community Building To Computer Science students, one shared interest is writing computer programs for competition style problems. To engage the students, a ...

## Accounting Info Systems

1018 words - 5 pages Free ... will use the Internet for e-business (Pepe, 2011). Accountants typically use the Internet to execute major business processes in the enterprise. E-Business allows the accounting firm to coordinate activities for internal management and combines the clients' relationships with the use of digital networks. As for the Intranet, it can distribute information to employees such as corporate policies, and programs. Companies create a portal within their ...

## Describes The Different Fields In Computer Engineering

820 words - 4 pages ... Computer EngineersComputer engineers and electrical engineers design, build, test, and evaluate new computer chips, circuit boards, computer systems, and peripheral devices. The goal of computer engineering is to produce computing devices that run efficiently and economically.Different kinds of engineers handle different jobs. Development engineers often work in Research and Development departments of computer firms and they come up with new ...

## "computer Viruses"

394 words - 2 pages ... Computer VirusesA computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem ...

## Computers In Education

1066 words - 5 pages Free ... teacher. Teachers can construct PowerPoint presentations in order to provide their students with necessary information. Teachers can use different software programs to show geography, science, history, and math, among other things, and help their students learn visually. However, the argument presented by Clifford Stoll is one in which he feels that experiencing the real thing is far more beneficial as opposed to being shown on a computer screen ...
Other Popular Examples