2.4
Producing Robust Programs
Testing, validation, and maintainability
Defensive design: Anticipate misuse, validate input
Input validation: Range check, type check, presence check, length check
Authentication verifies user identity
Testing: Normal, boundary, erroneous data
Syntax errors: Grammar mistakes, found by translator
Logic errors: Program runs but gives wrong output
Exam Tips
- •Always define key terms before explaining concepts
- •Use specific examples where possible to demonstrate understanding
- •Check mark allocation - one point per mark is a good guide