Write a program for your home security system using the list. 1. Create a known list...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Write a program for your home security system using the list. 1. Create a known list (your family member's name - at least 10 names) 2. Write a while loop to run the program again and again 3. Introduce your security system to the user and ask the person at the door "what is your name i.e., "Hi my name is security buddy and what is your name"? 4. If the name is recognized ask the user "would you like to remove your name from the name list Y/N" a. If the answer is Y remove the user from the name list, and print the message with a formatted string: "Hello {name}, your name matches my records, welcome to home!" b. If the answer is N, print the message with the formatted string: "Hello {name}, your name matches my records, welcome to home!" 5. If the name is not recognized ask the user "looks like you are a new person and your name does not match my records, would you like to add your name to the known user list? Y/N?" a. If the answer is Y, add the user to the list, and print a message with a formatted string. "Hello {name} your name has successfully been added to my records, please wait to confirm with my owner if I am allowed to let you in. Thank you for your patience." b. If the answer is N, create a new list of suspected names add the name to the list and print a message "Sorry your request is not accepted this time, see you soon!" Note: Your program should be able to handle white space, name capitalization, title-case user input errors, and lower- and upper- case errors. Write a program for your home security system using the list. 1. Create a known list (your family member's name - at least 10 names) 2. Write a while loop to run the program again and again 3. Introduce your security system to the user and ask the person at the door "what is your name i.e., "Hi my name is security buddy and what is your name"? 4. If the name is recognized ask the user "would you like to remove your name from the name list Y/N" a. If the answer is Y remove the user from the name list, and print the message with a formatted string: "Hello {name}, your name matches my records, welcome to home!" b. If the answer is N, print the message with the formatted string: "Hello {name}, your name matches my records, welcome to home!" 5. If the name is not recognized ask the user "looks like you are a new person and your name does not match my records, would you like to add your name to the known user list? Y/N?" a. If the answer is Y, add the user to the list, and print a message with a formatted string. "Hello {name} your name has successfully been added to my records, please wait to confirm with my owner if I am allowed to let you in. Thank you for your patience." b. If the answer is N, create a new list of suspected names add the name to the list and print a message "Sorry your request is not accepted this time, see you soon!" Note: Your program should be able to handle white space, name capitalization, title-case user input errors, and lower- and upper- case errors.
Expert Answer:
Answer rating: 100% (QA)
Heres a Python program that implements your home security system using a list python Create a known ... View the full answer
Related Book For
Posted Date:
Students also viewed these programming questions
-
discuss the role of the cytoplasm in cellular defense mechanisms, including the assembly of stress granules, the unfolded protein response, and autophagy, in response to various internal and external...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
he tendency of groups to make decisions that are more extreme than the initial inclination of their members is called suicidal terrorism. quest for significance. learned helplessness. risky shift.
-
2. Two point charges are located at two comers of a triangle as shown. What is the electric potential at the right corner of the triangle? A. 21 10 V C. 4.5 x 10 V B. 3.4 x 10 V D. 6.3 x 10 V 10 em...
-
In the cathode-ray tube shown, electrons emitted by the cathode and attracted by the anode pass through a small hole in the anode and then travel in a straight line with a speed v0 until they strike...
-
Specify, design, and implement a class that can be one player in a game of tic-tac-toe. The constructor should specify whether the object is to be the first player (Xs) or the second player (Os)....
-
What are the important goals and considerations of information security?
-
On January 2, 2012, Banno Corporation issued $1,500,000 of 10% bonds at 97 due December 31, 2021. Interest on the bonds is payable annually each December 31. The discount on the bonds is also being...
-
Marco Company shows the following costs for three jobs worked on in April. Job 3 0 6 Job 3 0 7 Job 3 0 8 Balances on March 3 1 Direct materials used ( in March ) $ 3 1 , 8 0 0 $ 3 7 , 8 0 0 Direct...
-
George S. Avery signed a letter regarding the unpaid balance on a $20,000 promissory note owed to Jim Whitworth in the form of a letter addressed to Whitworth stating: This is your note for...
-
At times we can generate a regression equation to explain outcomes. For example, an employees salary can often be explained by their pay grade, appraisal rating, education level, etc. What variables...
-
In post-industrial society, how have education and literacy contributed to the advancement of technology? Discuss.
-
What are five ways HR in an organization has successfully utilized collaboration with marketing to impress the employers's brand into the minds of its current and potential employees. Discuss
-
What do think are the keys to success in grant writing? What makes an effective grant proposal? How would identify new, untapped sources of grant funding? Why do many requests for funding fail?...
-
How would you determine the design of your organizational chart? What is effective about it and where might there be challenges? Why is it important for healthcare organizations to have effective...
-
Work with governmental contacts to initiate regulations industry-wide Initiate a full audit of the supply chains of all K-Tai, Inc.'s consumer electronic products Negotiate with the California...
-
In order to raise revenues, a county in a state enacts a county wage tax an income tax on wages earned by individuals who either live or work in the county. Which of the following is true? - since...
-
Distinguish between the work performed by public accountants and the work performed by accountants in commerce and industry and in not-for-profit organisations.
-
Nelson Company purchased equipment and incurred the following costs: Cash price = $55,000 Sales taxes = $4,400 Insurance during transit = $400 Site preparation, installation, and testing = $2,300...
-
Kim deposits her annual bonus into a savings account that pays 8% interest compounded annually. The size of her bonus increases by $2,000 each year, and the initial bonus amount is $5,000. Determine...
-
You invest in a piece of equipment costing $30,000. The equipment will be used for two years, at the end of which time the salvage value of the machine is expected to be $10,000. The machine will be...
-
Define a closely held corporation.
-
Explain the role played by a board of directors of a corporation.
-
Explain the steps in forming a limited liability corporation.
Study smarter with the SolutionInn App