Starting Out with Programming Logic and Design (5th Edition) (What's New in Computer Science)
5th Edition
ISBN: 9780134801155
Author: Tony Gaddis
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 12, Problem 12PE
Password Weakness Detector
Design a
- Fewer than 8 characters
- Does not contain at least one uppercase letter and one lowercase letter
- Does not contain at least one numeric digit
- Does not contain at least one special character (a character that is not a letter or a numeric digit)
- Is a sequence of consecutive uppercase letters (such as ABCDE)
- Is a sequence of consecutive lowercase letters (such as abcde)
- Is a sequence of consecutive numeric digits (such as 12345)
- Is a repeating sequence of characters (such as ZZZZZ or 55555)
The program should display messages indicating whether any of these weaknesses are found in the password.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Single mistake will dislike
Pseudocode is code that is written with administrator privileges, granting the user access to functions that are normally restricted for security reasons.
O True
O False
Personal library softwareTo develop a software that would be used by individuals to manage their personal collection of books.A person can have up to a few hundreds of books. The details of all the books such as name of the book,year of publication, date of purchase, price, and publisher would be entered by the owner. A book shouldbe assigned a unique serial number by the computer. This number would be written by the owner usinga pen on the inside page of the book. Only a registered friend can be lent a book. While registering afriend, the following data would have to be supplied—name of the friend, his address, land line number,and mobile number. Whenever a book issue request is given, the name of the friend to whom the book isto be issued and the unique id of the book is entered. At this, the various books outstanding against theborrower along with the date borrowed are displayed for information of the owner. If the owner wishesto go ahead with the issue of the book, then the date of…
Chapter 12 Solutions
Starting Out with Programming Logic and Design (5th Edition) (What's New in Computer Science)
Ch. 12.2 - Prob. 12.1CPCh. 12.2 - Prob. 12.2CPCh. 12.2 - Design an algorithm that determines whether the...Ch. 12.2 - Design an algorithm that determines whether the...Ch. 12.2 - Prob. 12.5CPCh. 12.2 - Prob. 12.6CPCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - If the str variable contains the string "berry",...Ch. 12 - If the str variable contains the string "Redmond",...
Ch. 12 - Prob. 5MCCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - If the String variable str contains the string...Ch. 12 - The insert library module automatically expands...Ch. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 1SACh. 12 - If the following pseudocode were an actual...Ch. 12 - Prob. 3SACh. 12 - Prob. 4SACh. 12 - Prob. 5SACh. 12 - Design an algorithm that counts the number of...Ch. 12 - Prob. 2AWCh. 12 - Design an algorithm that counts the number of...Ch. 12 - Design an algorithm that deletes the first and...Ch. 12 - Design an algorithm that converts each occurrence...Ch. 12 - Design an algorithm that replaces each occurrence...Ch. 12 - Assume the following declaration exists in a...Ch. 12 - Prob. 1DECh. 12 - Prob. 2DECh. 12 - Prob. 3DECh. 12 - Prob. 1PECh. 12 - Sentence Capitalizer Design a program that prompts...Ch. 12 - Prob. 3PECh. 12 - Sum of Digits in a String Design a program that...Ch. 12 - Prob. 5PECh. 12 - Alphabetic Telephone Number Translator Many...Ch. 12 - Word Separator Design a program that accepts as...Ch. 12 - Pig Latin Design a program that reads a sentence...Ch. 12 - Prob. 9PECh. 12 - File Encryption File encryption is the science of...Ch. 12 - File Decryption Filter Design a program that...Ch. 12 - Password Weakness Detector Design a program that...
Additional Engineering Textbook Solutions
Find more solutions based on key concepts
What is the class access specification of the base class named below? class Pet : public Dog
Starting Out with C++ from Control Structures to Objects (9th Edition)
When is the output of a NAND gate HIGH?
Digital Fundamentals (11th Edition)
What is the general problem with static scoping?
Concepts of Programming Languages (11th Edition)
While a program is running, a control is said to lose focus when the focus moves from that control to another c...
Introduction To Programming Using Visual Basic (11th Edition)
Write an input validation loop that asks the user to enter Yes or No.
Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- PYTHON FILE HANDLING Write a python program that can create, add, and view books (Note: Do only 1,2 and 3). Create, Add and View REFERENCE: 1 - Create (1) Create a book.csv and enter at least five books. The following fields must be included. - Book Id - automatically generated - Title of the Book - Author - Publisher - Year - ISBN Sample Screen (1) Create Enter the following fields. Book Id: Title Author : Publisher: Year : ISBN : Add another: [Y/N]_ Sample Screen (2) Add Enter the following fields. Book Id : Title : Author : Publisher: Year : ISBN : The book has been added. Add another: [Y/N]_ Sample Screen (4) Search Search Title Book Id Title Book Id Title Sample Screen (3) View Book Id: Title 1) View by Title 2) View by Author 3) View by Year Sample Screen (5) Edit : Author : Publisher: Year : : ISBN Search Author Display the book you want to edit. (book id) Author Book Id : Title : The book has been updated. Sample Screen (6) Delete Display the book you want to delete. (book id)…arrow_forwardTrue or False An error will occur if the compiler finds a statement that tries to change the value of a constant field.arrow_forwardMarriage Validity You were hired by the City Hall of Kulafu as a programmer. Your task is to write a spreadsheet program that will determine whether two individuals can be married legally or not. The marriage will be legal depending on the following conditions: both individuals should be at least 18 years old the individuals should not have the same gender (same gender marriage is not legal in Kulafu) the individuals should not have a married status (in Kulafu, status are single, widow/widower, divorced and married) Write a program that will accept via keyboard the information regarding the age, gender and marital status of the two individuals. The following numeric coding system should be used: for gender: M or m represents Male and F or f represents Female. For marital status: S or s represents Single, W or w represents Widow/Widower, D or d represents Divorced and MA or ma represents Married. The word should output the word "LEGAL" if all the criteria above are met. Otherwise, the…arrow_forward
- PROGRAMMING LANGUAGE: C++ The following codes are required to run the program [3 CODES IN TOTAL]: dateType.cpp, dateType.h, main.cpparrow_forwardASSIGNMENT BRIEF Introduction Roulette is a popular casino game named after the French word for 'little wheel'. In the game, players may choose to place bets on single numbers or various groupings which will determine their payout. To determine the winning number a ball is spun in the opposite direction of a spinning wheel. As the ball loses momentum it comes to rest in one of the slots of the wheel. Winnings are then paid to anyone who places a successful bet. n 00 2. 1ST12 2ND12 3RD12 1T018 EVEN ODD |19то36 Figure 1: Layout of a European roulette table Numbers can be classified in several ways: 1. Red or Black 2. Odd or Even 3. High or Low - if a number is in the first half of the table it is considered low (1-18). If a number is in the second half of the table, it is considered high (19-36). 4. Dozens - a number can be in the first dozen(1-12), second dozen (13-24) or third dozen (25-36) 5. Columns - A number may be in any of the three columns of the table 6. Zero - the number '0'…arrow_forwardhi this my firs time i need ur help i want to solev this proplem by uesing online java compiler A registration officer in an academic institution wants to display the Student transcript in a given semester after entering the required student details. A student is characterized by an ID, full name, the semester in which he/she is registered and other details. The student can take from 3 to 4 modules every semester and has two assessments in each module. You are requested to write the program that will help the officer to display the indicated transcript using Classes, methods, arrays and various control statements.The following shows an example of execution of this program.Questions:a. What is the role of a normal constructor? Create the class Student, which must have a normal constructor and at least 5 attributes. Note: The attributes must include all the details mentioned in the scenario and others of your choice. The marks of the student in different modules must be stored using…arrow_forward
- Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F An access control system that uses passwords is a possessed knowledge access system.arrow_forwardComputer Science : What is the reason the field values are coded sometimes.arrow_forwardGreenLawn a local lawn care company has different pricing policies for its customers. GreenLawn sends out monthly invoices and will give discounts if payments are made within 5 days. The discounting policy is as follow: If the amount of the monthly bill is greater than $300, subtract 4 percent from the invoice; if the amount is between $300 and $100, subtract a 2-percent discount; if the amount is less than $100, do not apply any discount. All bills made via the web automatically receive an extra 3-percent discount. Develop a decision for GreenLawn discounting decisions. Decision Table submission: Include the initial table with all rules, and the most simplified table. Use different colors in the columns to easily show how columns are collapsed/simplified. please do not provideo solution in image format thank you!arrow_forward
- Computer Science Write the C statement that will close a file called "accounts". C Languagearrow_forwardA key-value store can be used to quickly grow an application, but some features of an application make it impossible to use a key-value store.arrow_forwardProgramming Problem 1 – Calculating a Number As part of the discussion forum for this unit, you will be solving a programming problem from the book. This assignment will have you calculating the chapter and the number of the programming problem that you will solve for the online discussion forum. To calculate the chapter from which you solve the programming exercise: • Divide the integer number representing your student ID by 3, consider the remainder and increment it by 3. The result you obtain represents the chapter number, and it should be either 2, 3, 4, or 5. Depending on the chapter number obtained above, consider the following rules in calculating the problem number to solve: • If the chapter number is 3, divide your student ID by 34, consider the remainder and increment it by 1. The result you obtain represents the number of the programming exercise you will solve for online discussions, which should be from chapter 3. • If the chapter number is 4 (you need to go to chapter 6),…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Memory Management Tutorial in Java | Java Stack vs Heap | Java Training | Edureka; Author: edureka!;https://www.youtube.com/watch?v=fM8yj93X80s;License: Standard YouTube License, CC-BY