Create a program that generates a secure password. Prompt the user for the minimum length, the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Create a program that generates a secure password. Prompt the user for the minimum length, the number of special characters, and the number of numbers. Then generate a password for the user using those inputs. Constraints Use lists to store the characters you'll use to generate the passwords. Provide 3 randomly generated passwords to let user to choose. store passwords options in a list Prompt to ask user to choose one password from 3 options and print out the one the user choose. Use try/except to catch error if user choose the password out of the list characters are in A-Z, numbers are in 0-9, special characters are !, @, #, $, %, &, * Create a function named password_gen to generate the password. function takes in number of characters, number of numbers and number of special characters 3 paramters Call password_gen function from the main function. Example Output Example 1 What's the minimum length? 5 How many special characters? 1 How many numbers? 2 you can choose below password ['06@0c', '6@0oc', 'c60@o'] which one you prefer? 2 you choose password 6@0oc Example 2 What's the minimum length? 5 How many special characters? 2. How many numbers? 2. you can choose below password ['&67g$', '&$g76', '&g6$7'] which one you prefer? 5. choice out of the range Create a program that generates a secure password. Prompt the user for the minimum length, the number of special characters, and the number of numbers. Then generate a password for the user using those inputs. Constraints Use lists to store the characters you'll use to generate the passwords. Provide 3 randomly generated passwords to let user to choose. store passwords options in a list Prompt to ask user to choose one password from 3 options and print out the one the user choose. Use try/except to catch error if user choose the password out of the list characters are in A-Z, numbers are in 0-9, special characters are !, @, #, $, %, &, * Create a function named password_gen to generate the password. function takes in number of characters, number of numbers and number of special characters 3 paramters Call password_gen function from the main function. Example Output Example 1 What's the minimum length? 5 How many special characters? 1 How many numbers? 2 you can choose below password ['06@0c', '6@0oc', 'c60@o'] which one you prefer? 2 you choose password 6@0oc Example 2 What's the minimum length? 5 How many special characters? 2. How many numbers? 2. you can choose below password ['&67g$', '&$g76', '&g6$7'] which one you prefer? 5. choice out of the range
Expert Answer:
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
How do database management systems handle table locking and concurrency control mechanisms to ensure data consistency and isolation levels during concurrent read and write operations on shared tables...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
In this assignment, you are writing a program that converts common texting abbreviations to English words to allow people like yours truly can understand. For the assignment, you are provided with a...
-
Since the early 2000s, there has been a significant increase in the price of corn-based ethanol. a. A key input in the production of corn-based ethanol is corn. Use an appropriate diagram to explain...
-
A force P is applied to a tape wrapped around a uniform disk that rests on a frictionless horizontal surface. Show that for each 360? rotation of the disk the center of the disk will move a distance r
-
a. What is the quick ratio for 2009 b. What is debt ratio? (Use 2009 values) c. What is the return on equity? (Use 2009 values) d. How many days of sales are in receivables (Average Collection...
-
a. Consider the regression using three explanatory variables, FERTILITY, PUBLICEDUCATION, and LNHEALTH that you did in Exercise 3.3.6. Test whether PUBLICEDUCATION and LNHEALTH are jointly...
-
On January 1, 2013, HGC Camera Store adopted the dollar-value LIFO retail inventory method. Inventory transactions at both cost and retail, and cost indexes for 2013 and 2014 are as follows:...
-
3 Define the following (10) terms: 1. Augmented Reality 2. Mixed Reality 3. Digital Disruption 4. Value Proposition 5. Digital Transformation 6. Cloud Computing 7. Virtual Reality (VI) 8. Artificial...
-
Stanley Manufacturing Company, which sold 16,000 units of product at $20 per unit, collected the following information regarding three different levels of production. Required a. Construct a...
-
Carbon dioxide (CO 2 ) is a greenhouse gas that must be removed from coal-fired power plant exhaust before the exhaust can be discharged to the outside air. 150 mol/h of a gas stream containing 10...
-
Rose Company earned revenues of $15000 and incurred expenses of $9000.The withdrawals of Mary Rose,the owner,were $3000 .What is the balance in the income summary account after closing net income or...
-
Handy Inc. began March with 24,000 units in Work in Process (WIP) Inventory. An additional 32,000 units were started during the month, 12,000 of which were completed and transferred out during March....
-
During 2006, the other revenues and gains section of Totman Companys Statement of Earnings and Comprehensive Income contains $5,000 in interest revenue, $15,000 equity in Harpo Co. earnings, and...
-
6.What is the implication for the Management Reporting System of an organization that implements the formalization of tasks principle? 7.What are the reasons the companies use coding schemes in their...
-
You observe that in a given data set, when P of an ice-cream rises from $1 to $2, Q demanded rises from 400 units to 500 units. Can Anya thus declare that Law of Demand does not always work, or could...
-
Classify each feature as describing prokaryotic DNA structure or eukaryotic DNA structure. Prokaryotic DNA structure has repeating telomere region does not have telomere region arranged in a single...
-
The Dow Jones Industrial Average reached a high of $ 7801.63 on December 29, 1997. Recall from Example 18.4 that it reached a high of $ 1003 on November 14, 1972. The Consumer Price Index for...
-
I. Recall the fact that some ductwork in commercial buildings may pose a security threat, as a person can climb through it to reach a destination unnoticed. II. Recommend the use of wire mesh grids...
-
Recognize that this is an excellent reference and guide for a security manager or administrator in the routine management of information security. Stress that it, however, provides little guidance...
-
Emphasize to students that the most common IP breaches involve the unlawful use or duplication of software-based intellectual property, known as software piracy. Outline that in addition to the laws...
-
An article states there is no significant evidence that median income increased. The implied null hypothesis is: (1) Median income increased. (2) Median income changed. (3) Median income did not...
-
If you make multiple measurements of your height, you are likely to find that the results vary by nearly half an inch in either direction due to measurement error and actual variations in he ight....
-
Migrating geese tend to travel at approximately constant speed, flying in segments that are straight lines. A goose flies 32 km south, then turns to fly 20 km west. Afterward, how far is the goose...
Study smarter with the SolutionInn App