Provide a python program to determine

Assignment Help Computer Engineering
Reference no: EM133551225

Question: Provide a Python program to determine whether a password exactly meets the following requirements for a secure password:

the length of the password must be greater than some minimum length and less than some maximum. You should decide on the minimum (at least 6) and maximum (at least 15) allowable lengths;
it must not include any spaces;
it must contain at least one digit; and
it must contain at least one alphabetic character.
Your program must contain at least three functions:

one function to check that the password is the proper length;
a second function to check whether it contains the required number of characters/digits (Hint: to determine whether it contains at least one digit and one alphabetic character, use a loop and the isalpha or isdigit methods); and
a third function to verify that it does not contain the prohibited character (space).
Your program should prompt the user for the candidate password and then each function and display either that the password is valid or the first reason it is invalid.

You cannot use Regular Expressions (RE) !

Your program should include Header comments (what the program does) and in-line comments (the major design steps).
Completeness of your Test plan/report (at least three (probably more) test cases). You should have a test case for each invalid and one for a valid password. Include screenshots for each test case.

Reference no: EM133551225

Questions Cloud

Create bin in data range : Create Bin in data range H2: H11 as: 4, 4.5, 5, 5.5, 6, 6.5, 7, 7.5, 8, 8.5. Output range is J2. Add data labels - outside end. Remove gap among bars
Describes a thrust fault : Choose the statement that best describes a thrust fault. Group of answer choices a unique fault in which the fault plane is vertical a special type normal
Do you have a practical example of its application : Is this an oversimplification? Do you have a practical example of its application, i.e., how has it been used or abused?
Examine the companion website for economics for everyone : Examine the companion website for Economics for Everyone. Identify the facts, insights, and ideas that impress you most. Correlate your impressions with one
Provide a python program to determine : Provide a Python program to determine whether a password exactly meets the following requirements for a secure password
What you understand by selection bias and your understanding : what you understand by selection bias and your understanding of the example mentioned in the podcast by Joshua Angrist on Econometrics and Causation Dec 22 2014
Case for the Knowledge of God : Discuss and engage with scripture: A Case for the Knowledge of God, Doctrine of God. The biblical understanding of what it means to know God.
Briefly describe what was learned from the activity : EDLD 5339- Properly cite the article that you read. Briefly describe what was learned from the activity? How can this learning be used in the future?
How to create a python code that achieves : How to create a python code that achieves the following ask the user their favorite number

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a form with a text property of friends

On the Entry tabPage add 4 textboxes to take entry for a first name, last name, birth month, and birthday and add a MaskedTextbox to take entry for a phone number formatted as 999-9999.

  How many physical pages will the system support

How many virtual pages are there? How many physical pages will the system support? How many page frames are there in main memory?

  The difference between quality assurance and quality control

Briefly describe the Perform Quality Assurance Tools and Techniques. What is Quality Audit?

  What is the value of r0 after the following executes

What is the value of r0 after the following executes?What is the value of r0 after the following executes?

  How secure are cloud computing

The paper needs to create a security model (in theory) that will protection an organization database and information - How secure are Cloud Computing?

  Why did you select to pursue the EdD in Leadership

In the event that any outside resources are used, those should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question.

  What number is really represented

CSTS-UH New York University What number is really represented and Using the floating point format above (1 sign bit, 4 bits exponent, 4 bits

  Data mining-data base and data warehousing

Data mining tools and models help you address? Explain each of tasks and how data mining tools and models address each. How does the data mining relate/contrast to data base and data warehousing? Whether these different or the same approaches. exp..

  Discuss the role that ethics play in the running

Use the Agile project management methodology to develop a product backlog and the project tasks for 2 to 4 sprints. It is important to use slack for all

  Discussing iam in a federated cloud application

Write an essay of at least 500 words discussing IAM in a federated cloud application. Do not copy without providing proper attribution. This paper will be.

  5103COMP Operating Systems Assignment

5103COMP Operating Systems Assignment Help and Solution, Liverpool John Moores University - Assessment Writing Service

  Benefit and drawback of each major operating system

Benefit and drawback of each major operating system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd