Computing
Computer Science LearnITWithMrC ⛯ Year 7 Year 8 Year 9 GCSE
Responsive image

Lesson Video

31

Lesson Tasks

  • Watch the Lesson video
    Make notes on your notes sheet.
  • Read the lesson notes
    Make notes on your notes sheet.
  • Complete the learning activities
    Make any notes on your notes sheet.
  • Check the Learning outcomes
    Update your learning objectives

What do I need to Learn?

I need to learn how to check if an entered string has a minimum length
I need to learn how to check if an entered string is empty
I need to learn how to check if data entered lies within a given range (eg between 1 and 10).
I need to learn how to write a simple authentication routine to check a username and password

Key Terms

validation authentication length check presence check range check flag variable

Verification and authentication - Learning Activities


The purpose of verification and authentication is to check if a user is allowed to access a system. The most common method use for verification is a user ID and password.

We use authentication an check to see both if a user is allowed access to a system and to check that they are who they say they are. To do this we might ask for details that only they would know, like a pin number or a mother’s maiden name.

In more recent times sometimes authentication is done via biometrics, which can include:

  • Fingerprints
  • Facial recognition
  • Retina or Iris patterns
  • Voice recognition

Coding activity

Task 1: Length check

Look at the 'Lesson Notes' and write code for a length check from the psuedocode given.


Task 2: Presence check

Look at the 'Lesson Notes' and write code for a presence check from the psuedocode given.


Task 3: Range check

Look at the 'Lesson Notes' and write code for a range check from the psuedocode given.


Task 4: Password authentication routine

Look at the 'Lesson Notes' and write code for an authentication from the psuedocode given.


Extension Task : Password authentication routine

Look at the 'BBC link' and write code for an authentication from the psuedocode given on the second page.


Learning Outcomes

  • I can explain what authentication is.
  • I can create code to authenticate some data.
  • I can create code to validate and authenticate data
    using a range of different methods