Create a program that generates a secure password. Prompt the user for the minimum length, the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create a program that generates a secure password. Prompt the user for the minimum length, the number of special characters, and the number of numbers. Then generate a password for the user using those inputs. Constraints Use lists to store the characters you'll use to generate the passwords. Provide 3 randomly generated passwords to let user to choose. store passwords options in a list Prompt to ask user to choose one password from 3 options and print out the one the user choose. Use try/except to catch error if user choose the password out of the list characters are in A-Z, numbers are in 0-9, special characters are !, @, #, $, %, &, * Create a function named password_gen to generate the password. function takes in number of characters, number of numbers and number of special characters 3 paramters Call password_gen function from the main function. Example Output Example 1 What's the minimum length? 5 How many special characters? 1 How many numbers? 2 you can choose below password ['06@0c', '6@0oc', 'c60@o'] which one you prefer? 2 you choose password 6@0oc Example 2 What's the minimum length? 5 How many special characters? 2. How many numbers? 2. you can choose below password ['&67g$', '&$g76', '&g6$7'] which one you prefer? 5. choice out of the range Create a program that generates a secure password. Prompt the user for the minimum length, the number of special characters, and the number of numbers. Then generate a password for the user using those inputs. Constraints Use lists to store the characters you'll use to generate the passwords. Provide 3 randomly generated passwords to let user to choose. store passwords options in a list Prompt to ask user to choose one password from 3 options and print out the one the user choose. Use try/except to catch error if user choose the password out of the list characters are in A-Z, numbers are in 0-9, special characters are !, @, #, $, %, &, * Create a function named password_gen to generate the password. function takes in number of characters, number of numbers and number of special characters 3 paramters Call password_gen function from the main function. Example Output Example 1 What's the minimum length? 5 How many special characters? 1 How many numbers? 2 you can choose below password ['06@0c', '6@0oc', 'c60@o'] which one you prefer? 2 you choose password 6@0oc Example 2 What's the minimum length? 5 How many special characters? 2. How many numbers? 2. you can choose below password ['&67g$', '&$g76', '&g6$7'] which one you prefer? 5. choice out of the range
Expert Answer:
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
How do database management systems handle table locking and concurrency control mechanisms to ensure data consistency and isolation levels during concurrent read and write operations on shared tables...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
In this assignment, you are writing a program that converts common texting abbreviations to English words to allow people like yours truly can understand. For the assignment, you are provided with a...
-
Since the early 2000s, there has been a significant increase in the price of corn-based ethanol. a. A key input in the production of corn-based ethanol is corn. Use an appropriate diagram to explain...
-
Solve the following LP problem by using the graphical procedure and by using Excel: Maximize profit = 4X + 3y Subject to the constraints 2X + 4y <72 3X + 6y > 27 3x + ioy > 0 x,y >0
-
The variable myButton references a JButton object. Write the code to set the objects background color to white and foreground color to red.
-
What kinds of changes in the business environment might lead to a decision to change the level of investment in working capital? Try to identify four possible changes that could affect the working...
-
What effect do you think each of the following factors should have on the interest rate that a firm must pay on a new issue of long-term debt? Indicate whether each factor would tend to raise lower,...
-
Barbara Morris lives with her husband and 19-year-old daughter, Alyssa, who qualifies for the disability tax credit. During 2021, Barbara paid medical expenses of $7,850 for Alyssa, none of which...
-
Tool Depot is a U.S. home improvement retailer with two stores. Theycurrently have two suppliers for the three products that they sell: wrenches, drills, and saws. Suppliers ship product directly to...
-
Zoes, a national manufacturer of lawn - mowing and snow - blowing equipment, segments its business according to cust past year: ( Click the icon to view the information. ) Data table Read the...
-
Haley Romeros had just been appointed vice president of the Rocky Mountain Region of the Bank Services Corporation (BSC). The company provides check processing services for small banks. The banks...
-
Draw a simple but complete hydraulic circuit diagram to drive two actuators, one of which must be connected to a pressure reducing valve to control its pressure because of the delicacy of the task...
-
1. What specific skills would a person have to be a successful director for a parks and recreation position? 2. What experience would a person have working with an elected board for parks and...
-
Required labor time per unit ( hours ) Maximum demand ( units ) Contribution margin per unit Product M 2 6 , 5 0 0 $ 5 . 0 0 Product N 3 8 , 0 0 0 $ 5 . 7 0 If Bush uses the most effective approach...
-
ansewr pls Repeat Exercise 5.8.1 using (a) one rectangle; (b) four rectangles. Data From Exercise 5.8.1 A square plate size \(100 \mathrm{~cm} \times 100 \mathrm{~cm}\) is subjected to an isothermal...
-
Please make sure answer should be 500 words Question 1 Explain how banks and creditors use financial information when dealing with firms (maximum 500 words)
-
Willingness to pay as a measure of a person's value for a particular good measures the maximum a person would be willing to pay requires that payment actually be made depends on the satisfaction that...
-
I. Recall the fact that some ductwork in commercial buildings may pose a security threat, as a person can climb through it to reach a destination unnoticed. II. Recommend the use of wire mesh grids...
-
Recognize that this is an excellent reference and guide for a security manager or administrator in the routine management of information security. Stress that it, however, provides little guidance...
-
Emphasize to students that the most common IP breaches involve the unlawful use or duplication of software-based intellectual property, known as software piracy. Outline that in addition to the laws...
-
16. The Willingham Museum qualifies as a component unit of the City of Willingham. How does an activity or function qualify to be a component unit of a primary government?
-
13. What does the managements discussion and analysis (MD&A) normally include? Where does a state or local government present this information?
-
12. What impact does the use of the modified approach have on reporting within the government-wide financial statements?
Study smarter with the SolutionInn App