This term refers to the order in which instructions are executed in a program, following a top-to-bottom approach unless control structures change the flow.
What is sequence?
I am the kind of data used to check if a program correctly handles values at, just below, and just above decision limits. What am I?
What is boundary data?
This type of hacking is performed legally and with permission to find and fix security vulnerabilities before malicious hackers exploit them.
What is ethical hacking?
This method tricks users into giving away sensitive information via emails or messages that look legitimate.
What is phishing?
Raw facts, which on their own have little meaning but can be processed to produce meaningful output, are called this.
What is data?
I’m the type of control structure that allows a program to make decisions and choose different paths, such as using if or else.
What is selection?
I’m the type of error that occurs when code runs but produces the wrong output because the logic is incorrect. What am I?
What is a logic error?
This process simulates cyberattacks on a system to evaluate its security and identify weaknesses.
What is penetration testing?
This type of attack floods a system with traffic, making it unavailable to legitimate users.
What is a denial of service (DoS) attack?
Unlike relational databases, this type of database stores all data in a single table, often leading to redundancy and anomalies.
What is a flat file database?
This data structure can hold a list of values of the same type, accessed using an index.
What is a one-dimensional array?
When a programmer includes extra print statements or logging in their code to trace variable values and program flow, they’re performing this process. What is it called?
What is debugging
This Australian law, introduced in 1988, sets out how personal information must be handled by organisations.
What is the Privacy Act 1988?
This attack involves intercepting and potentially altering communication between two parties without their knowledge.
What is man-in-the-middle?
In a relational database, a column that uniquely identifies each record in a table is called this.
What is a primary key?
Variables that can be accessed only inside the function they are created in are said to have this type of scope.
What is local scope?
Copying code from another source without acknowledgment breaches this ethical and legal principle under Australian copyright law. What is it?
What is plagiarism (a violation of intellectual property rights)?
This authentication method adds an extra layer of security by requiring two or more independent credentials, such as a password and a fingerprint.
What is two-factor authentication (2FA)?
This type of cipher uses multiple substitution alphabets to encrypt text, making frequency analysis more difficult.
What is a polyalphabetic cipher (e.g., Vigenère)?
These types of problems occur in databases when inserting, updating, or deleting records leads to inconsistencies or loss of data integrity.
What are data anomalies (insert, update, delete anomalies)?
This stage of the framework involves testing with users and reviewing performance after the system is developed.
What is the Evaluate phase?
I’m the process that checks whether input data is of the correct type or within an acceptable range. What am I?
What is type and range checking?
In this type of encryption, one key is used to encrypt data and a different key is used to decrypt it — the keys are mathematically related but not identical.
What is public-key (asymmetric) encryption?
A method of breaking encryption that tries every possible key until the correct one is found is known as this.
What is brute force?
Maintaining the correctness, reliability, and relevance of data over time, including checking for outliers and ensuring data is up-to-date, is part of this broader database principle.
What is data integrity?