Provide a python program to determine

Assignment Help Computer Engineering
Reference no: EM133551225

Question: Provide a Python program to determine whether a password exactly meets the following requirements for a secure password:

the length of the password must be greater than some minimum length and less than some maximum. You should decide on the minimum (at least 6) and maximum (at least 15) allowable lengths;
it must not include any spaces;
it must contain at least one digit; and
it must contain at least one alphabetic character.
Your program must contain at least three functions:

one function to check that the password is the proper length;
a second function to check whether it contains the required number of characters/digits (Hint: to determine whether it contains at least one digit and one alphabetic character, use a loop and the isalpha or isdigit methods); and
a third function to verify that it does not contain the prohibited character (space).
Your program should prompt the user for the candidate password and then each function and display either that the password is valid or the first reason it is invalid.

You cannot use Regular Expressions (RE) !

Your program should include Header comments (what the program does) and in-line comments (the major design steps).
Completeness of your Test plan/report (at least three (probably more) test cases). You should have a test case for each invalid and one for a valid password. Include screenshots for each test case.

Reference no: EM133551225

Questions Cloud

Create bin in data range : Create Bin in data range H2: H11 as: 4, 4.5, 5, 5.5, 6, 6.5, 7, 7.5, 8, 8.5. Output range is J2. Add data labels - outside end. Remove gap among bars
Describes a thrust fault : Choose the statement that best describes a thrust fault. Group of answer choices a unique fault in which the fault plane is vertical a special type normal
Do you have a practical example of its application : Is this an oversimplification? Do you have a practical example of its application, i.e., how has it been used or abused?
Examine the companion website for economics for everyone : Examine the companion website for Economics for Everyone. Identify the facts, insights, and ideas that impress you most. Correlate your impressions with one
Provide a python program to determine : Provide a Python program to determine whether a password exactly meets the following requirements for a secure password
What you understand by selection bias and your understanding : what you understand by selection bias and your understanding of the example mentioned in the podcast by Joshua Angrist on Econometrics and Causation Dec 22 2014
Case for the Knowledge of God : Discuss and engage with scripture: A Case for the Knowledge of God, Doctrine of God. The biblical understanding of what it means to know God.
Briefly describe what was learned from the activity : EDLD 5339- Properly cite the article that you read. Briefly describe what was learned from the activity? How can this learning be used in the future?
How to create a python code that achieves : How to create a python code that achieves the following ask the user their favorite number

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd