Question: **Please only provide the answer question 2** Part 5 Writing programs. (12 points in total 4 bonus points) Nowadays cyber security becomes a critique issue

**Please only provide the answer question 2**

**Please only provide the answer question 2** Part 5 Writing programs. (12

Part 5 Writing programs. (12 points in total 4 bonus points) Nowadays cyber security becomes a critique issue in our daily life. Creating a secure password can help us prevent others from breaking into our account, and thus protect our information. The article in the following link provides 15 tips make passwords secure. https://securin mcafee.com/consumer/family-safety/15-tips-to-better as can check your pas Another website at security using a list of evaluation criteria. Please try one password and check the what is the output. Also you would see a list of evaluation criteria in the output. Then please answer the following questions. sword for 1) (3 points) Write a C program checkPasswdLength.c to check if the length of a given password string is 10 characters or not. If not, deduct 5 points per missing character. If the total deduction is greater than 30 points, print out the deduction and message "The password is unsafe! Please reset."; otherwise, print out "The password is safe." [Hint: you do not need to use array. Please use getchar) to get user's input. Assume the password has no spaces in it. ] A sample of the output is like below: Enter a password ThisTest Score=-10 The password is unsafe! Please reset. 2) (3 points) Similar to above question, write a C program checkPasswdLetter.c to check if a password is safe or by not by checking only the evaluation criteria below. It will still print out the final score, and "safe" or "unsafe" when dduction is more than 30 points o o o Missing lower case Lack of capital letters Missing numbers -20 points -20 points -20 points

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!