A secure information system uses an advanced authentication mechanism through a username, password, and retina scan...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
A secure information system uses an advanced authentication mechanism through a username, password, and retina scan per user. For this purpose, the system stores user information in two text files: "UsernamesPasswords.txt" for username and password pairs, and "RetinaScans.txt" for retina scan data. A) Write a Python program that can perform the following tasks: Prompt the user to input their username, password, and retina scan data. • Check the provided username and password against the "UsernamesPasswords.txt" file. If the username and password match a valid user in the file, prompt the user to provide their retina scan data. If the retina scan data also matches the stored retina scan data in the "RetinaScans.txt" file, display: Welcome, [username]! • If any of the authentication steps fail (username or password do not match, or retina scan data is incorrect), display: Invalid login. B) Implement error handling in your program to handle the following scenarios: • If the "UsernamesPasswords.txt" file or "RetinaScans.txt" file is not found, catch the FileNotFoundError and print the following error message: The system files are not available. • If any other unexpected error occurs during runtime, catch the exception and print the following error message: An unexpected error occurred. Please try again later. Example: Assume the "UsernamesPasswords.txt" file contains the following entries: username1 hashed_password1 username2 hashed_password2 And the "RetinaScans.txt" file contains the corresponding retina scan data: username1 retina_scan_data1 username2 retina_scan_data2 Here's a sample execution of the program: In this example, the user enters valid credentials and retina scan data, and the program successfully authenticates the user using text files. Enter your username: username1 Enter your password: password1 Enter your retina scan data: retina_scan_data1 Welcome, username1! A secure information system uses an advanced authentication mechanism through a username, password, and retina scan per user. For this purpose, the system stores user information in two text files: "UsernamesPasswords.txt" for username and password pairs, and "RetinaScans.txt" for retina scan data. A) Write a Python program that can perform the following tasks: Prompt the user to input their username, password, and retina scan data. • Check the provided username and password against the "UsernamesPasswords.txt" file. If the username and password match a valid user in the file, prompt the user to provide their retina scan data. If the retina scan data also matches the stored retina scan data in the "RetinaScans.txt" file, display: Welcome, [username]! • If any of the authentication steps fail (username or password do not match, or retina scan data is incorrect), display: Invalid login. B) Implement error handling in your program to handle the following scenarios: • If the "UsernamesPasswords.txt" file or "RetinaScans.txt" file is not found, catch the FileNotFoundError and print the following error message: The system files are not available. • If any other unexpected error occurs during runtime, catch the exception and print the following error message: An unexpected error occurred. Please try again later. Example: Assume the "UsernamesPasswords.txt" file contains the following entries: username1 hashed_password1 username2 hashed_password2 And the "RetinaScans.txt" file contains the corresponding retina scan data: username1 retina_scan_data1 username2 retina_scan_data2 Here's a sample execution of the program: In this example, the user enters valid credentials and retina scan data, and the program successfully authenticates the user using text files. Enter your username: username1 Enter your password: password1 Enter your retina scan data: retina_scan_data1 Welcome, username1!
Expert Answer:
Answer rating: 100% (QA)
Heres a Python program that fulfills the given requirements python def checkcredentialsusername pass... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
Do some amendment and enhance the given research paper: Table of Content Abstract..3 Action Research.4 Research Methodology and Design...5 Literature Review: NoSQL Database7 Proposal.7 Iteration 1..8...
-
In what circumstances have courts opted to use the substantial-factor test rather than the but-for test?
-
Which is larger, 1 Co or 1 Fo?
-
Arbitrators As a client of a brokerage firm, Howsam invested in four limited partnerships. These investments were made between 1986 and 1994. The client agreement signed by Howsam required all...
-
You need to understand the approach described in question 3 in More Genetic TIPS before answering this question. A gene that is normally expressed in pancreatic cells was cloned and then subjected to...
-
Manilow Corporation operates in an industry that has a high rate of bad debts. Before any year-end adjustments, the balance in Manilow's Accounts Receivable account was $555,000 and the Allowance for...
-
Estimated total machine-hours used Estimated total fixed manufacturing overhead Estimated variable manufacturing overhead per machine-hour Molding 2,500 $ 12,000 $ 2.20 Fabrication 1,500 $ 16,200 $...
-
A residential project has the following information: Four major activities are scheduled across a 4-month time span (shown in the below bar chart). Assuming the monthly indirect cost (i.e., site...
-
8) An airplane is flying towards a radar station at constant height of 6km above the ground. If the distance between the airplane and the radar station is decreasing at a rate of 400km per hour
-
Changing a learning culture or an learned work culture can be very difficult. In the past 5 years we a needed to have a culture shift away from the arrest model and to a program...
-
The Way-Too-High Construction Company is building an apartment complex in the arid southwest on the top of a partially leveled hill. The road that winds around the hill to the apartment complex...
-
A 5 . 2 kg mass of cast iron c = 0 . 5 4 4 kj / kg k is placed into 1 0 . 3 kg of water at 3 degrees celsius. find the resulting temperature.
-
How can employees actively contribute to preserving the company culture during a significant organizational change, and what support mechanisms should be in place to facilitate this process? 2....
-
Shaunta borrowed $50,000 To pay for education and living expenses during the time she attended college. She chose not to work part time during her school years to help pay the costs. As a result...
-
1. Solve the following first order differential equations: a) (xe-3y + 3e-3y) dx = (xe + 4x) dy; b) (4y + x)y + y = 0.
-
Distinguish between the work performed by public accountants and the work performed by accountants in commerce and industry and in not-for-profit organisations.
-
Determine how to select the best risk management model.
-
Which of the following ISACA certifications, while not specifically a security certification, contains many information security systems auditing components and is only offered a few times per year?...
-
According to the text and the information security governance roles and responsibilities graphic, who is responsible for policy implementation, reporting security vulnerabilities, and breaches? a....
-
Explain why some employees are not comfortable being team players.
-
It is important to learn how to develop a comprehensive, clearly articulated team charter. Assume that you and your fellow students are a team in an organization (you choose the kind and size of...
-
Define effective listening .
Study smarter with the SolutionInn App