# 1. Create a dictionary called users, that includes the user name as the key and...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
# 1. Create a dictionary called users, that includes the user name as the key and password as the value. # Both the user name and password should be strings (3 pts.). # The dictionary should contain: tatkinson- !2054570Athu, jcarter 2#064636Cjas, hcheloa 66$90154Chan, #kmcphee 206@2113Mkar, npeterson - 2052&833Pnic # 2. Print the dictionary (1 pt.). # 3. Write a for in loop that prints the keys in the dictionary (2 pts.). # 4. Write a for in loop that prints the values in the dictionary (2 pts.). # 5. Write a for in loop that assigns the keys and values to seperate variables and prints the following # line for each user in the dictionary: "User user name has a password of password." #eg. User tatkinson has a password of !2054570Athu. (3 pts.) # 6. Write an if statement using the keywords not in to determine if user name pwheeler is in the dictionary. If pwheeler is not in the dictionary, # print out "User pwheeler is not in the dictionary.", else print out "User pwheeler is in the dictionary." (2 pts.). # 7. User kmcphee has updated their password to 2100606^Wpat. Update kmchphee's entry in the dictionary to reflect the password change (1 pt.). # 8. Add User asaris with a password of 20178*07Saly to the dictionary and add mkholay with a password of 204736?5Kmal to the dictionary (2 pts.). # 9. User tatkinson has retired, remove their entry from the dictionary. Print the dictionary (2 pts.). # 10. Write code to create a set named set_a with the following floats: 1.50, 36.32, 60.00, 72.68, 84.79 (2 pts.). # 11. Write code to create a set named set_b with the following floats: 12.50, 24.75, 36.32, 48.84, 60.00 (2 pts.). # 12. Write code that creates another set containing only the elements that are found in both set_A and set b, # and assigns the resulting set to the variable set_c. Print set c (2 pts.). # 1. Create a dictionary called users, that includes the user name as the key and password as the value. # Both the user name and password should be strings (3 pts.). # The dictionary should contain: tatkinson- !2054570Athu, jcarter 2#064636Cjas, hcheloa 66$90154Chan, #kmcphee 206@2113Mkar, npeterson - 2052&833Pnic # 2. Print the dictionary (1 pt.). # 3. Write a for in loop that prints the keys in the dictionary (2 pts.). # 4. Write a for in loop that prints the values in the dictionary (2 pts.). # 5. Write a for in loop that assigns the keys and values to seperate variables and prints the following # line for each user in the dictionary: "User user name has a password of password." #eg. User tatkinson has a password of !2054570Athu. (3 pts.) # 6. Write an if statement using the keywords not in to determine if user name pwheeler is in the dictionary. If pwheeler is not in the dictionary, # print out "User pwheeler is not in the dictionary.", else print out "User pwheeler is in the dictionary." (2 pts.). # 7. User kmcphee has updated their password to 2100606^Wpat. Update kmchphee's entry in the dictionary to reflect the password change (1 pt.). # 8. Add User asaris with a password of 20178*07Saly to the dictionary and add mkholay with a password of 204736?5Kmal to the dictionary (2 pts.). # 9. User tatkinson has retired, remove their entry from the dictionary. Print the dictionary (2 pts.). # 10. Write code to create a set named set_a with the following floats: 1.50, 36.32, 60.00, 72.68, 84.79 (2 pts.). # 11. Write code to create a set named set_b with the following floats: 12.50, 24.75, 36.32, 48.84, 60.00 (2 pts.). # 12. Write code that creates another set containing only the elements that are found in both set_A and set b, # and assigns the resulting set to the variable set_c. Print set c (2 pts.).
Expert Answer:
Answer rating: 100% (QA)
1Create a dictionary called users that includes the user name as the key and password as the value users tatkinson2054570Athu jcarter2064636Cjas hcheloa6690154Chan kmcphee2062113Mkar npeterson2052833P... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
Cullumber Company traded machinery with a book value of $ 4 9 0 0 0 0 and a fair value of $ 1 0 6 0 0 0 0 . It received in exchange from Vaughn Manufacturing a machine with a fair value of $ 9 5 4 0...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
THIRD AVENUE SOFTWARE HEALTH-CARE APP PROJECT This case is new for the ninth edition of Information Technology Project Management . The case provides an opportunity to apply agile and Scrum...
-
When my niece Michelle told me she had learned to read, she was bursting with pride. How might reflecting on this accomplishment affect how Michelle thinks about herself?
-
A parallel RLC circuit, which is driven by a variable-frequency 10-A source, has the following parameters: R=500ohm, L=0.5 mH, and C=20F. Find the resonant frequency, the BW, and the average...
-
Pam Corporation paid $170,000 for an 80 percent interest in Sun Corporation on December 31, 2016, when Sun's stockholders' equity consisted of $100,000 capital stock and $50,000 retained earnings. A...
-
To the left of z = 1.865 Find the indicated area under the standard normal curve. If convenient, use technology to find the area.
-
At Home Publications Inc. is considering two new magazine products. The estimated net cash flows from each product are as follows: Each product requires an investment of $270,000. A rate of 10% has...
-
Can you comment to these two posts of my classmates its discussion questions and i need to comment in two of them? To me, what makes someone beautiful changes in stages. My first initial perception...
-
7.32. An asteroid is at a distance of 2 106 km from Earth and is moving with a speed of 10 km/s. With- out gravitational pull, the asteroid would miss Earth by a perpendicular distance of 25,000 km...
-
What is the product 0-4 (35) (%) ? 0
-
a) Explain the meaning of electronic banking and the benefits of e-banking to banking industry (7 marks). b) Discuss four (4) reasons why a bank may dishonor a cheque (8 marks).
-
(a) Explain the following negotiable instruments that are negotiable under the law: i) Bill of exchange (2 marks). ii) Bank draft (2 marks). iii) Promissory note (2 marks). b) Describe the methods...
-
Under 175% PSA prepayment model, what is the SMM in month 24 of a mortgage?
-
def my_sum (L): X=0 y = 1 n i = 0 len (L). while x + y
-
python class has a builtin super simple way you can just shuffle a list, you can just call the shuffle method, you can put the this into a method if you like but you don't really need to) Example ...
-
100 mL of 0.8 M NaOII are used to neutralize 100 mL solution obtained by passing 2.70 g SOCl in water. Select the correct statement. (a) The solution of SOCl has 0.2 M HSO4 and 0.4 M HCl (b) The...
-
Represent each of the following combination of units in the correct SI form using an appropriate prefix: (a) m/ms, (b) k m, (c) k s /mg, and (d) k m N.
-
I. Examine in-depth the product features and quality of IDPSs. When asking for specific details of the system, apply the following top-level questions and sub-questions as outlined in the text: Is...
-
Apply knowledge presented in the text that security managers are accountable for the day-to-day operation of the information security program. They accomplish the objectives that are identified by...
-
Discuss that while a manager can work with a systems administrator to create managerial policy as described in the preceding section, the system administrator may need to create a policy to implement...
-
What are the key differences between financing entrepreneurial and established companies?
-
What is the purpose of staged financing?
-
What can and can't we learn from successful start-ups like Pandora's Box and Spotify?
Study smarter with the SolutionInn App