Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

7.6 Module 5 ZyLab - Login Credentials (PYTHON) LAB OVERVIEW In this lab, you will create a program that allows a user to store login

7.6 Module 5 ZyLab - Login Credentials (PYTHON)

LAB OVERVIEW In this lab, you will create a program that allows a user to store login credentials. Your program will obtain user emails and passwords and will create a username and store them in parallel lists. Parallel lists allow you to store different types of related information in separate lists and reference them by the element ID. Please note that each exercise below shows the program being run from the beginning. There is no need to repeat code for each exercise.

(1) Complete the getEmailAddress() function. This function has no parameters and returns a valid address. A valid email address is an address the contains both an "@" (ampersand) sign and a "." (period). If the user enters an invalid email address, the function should allow the user to re-enter a correctly formatted email address and loop until that correctly formatted address is received. We will not be concerned where the ampersand and periods are in the email address at this time. Remember to uncomment the function call in the main function. (15 Points)

Ex.

Login Verification Program -------------------------- 1. Enter new login credentials 2. Display login credentials 3. Exit Program Enter selection: 1 Enter your emil address: marywilson.com Your email address is invalid! Please re-enter: marywilson@gmil.com 

(2) Complete the getPassword() function. This function has no parameters and returns a valid password. A valid password contains at least one capital letter, one numeric character, and is at least 8 characters in length. If the user enters an invalid password, the function should allow the user to re-enter a valid password and loop until a valid password is received. You are not required to notify the user of why the password is invalid. Remember to uncomment the function call in the main function. (15 points)

Ex.

Login Verification Program -------------------------- 1. Enter new login credentials 2. Display login credentials 3. Exit Program Enter selection: 1 Enter your email address: marywilson.com Your email address is invalid! Please re-enter: marywilson@gmil.com NOTE: Passwords must be at least 8 characters in length and must contain at least one uppercase letter and one number. Enter your password: abcdef Your password is invalid! Please re-enter: abcdef123 Your password is invalid! Pease re-enter: Abcdef123 

(3) Complete the getUsername() function. This function takes the email address as a parameter and returns a username. The username will consist of all of the characters preceding the ampersand. For example, if the email address is maywilson@gmil.com, then the username will be marywilson. Remember to uncomment the function call in the main function. (10 points)

(4) Store each of the login credential items in their respective lists. Once this process is complete, display a confirmation message. (5 points)

Ex.

Login Verification Program -------------------------- 1. Enter new login credentials 2. Display login credentials 3. Exit Program Enter selection: 1 Enter your email address: marywilson.com Your email address is invalid! Please re-enter: marywilson@gmil.com NOTE: Passwords must be at least 8 characters in length and must contain at least one uppercase letter and one number. Enter your password: abcdef Your password is invalid! Please re-enter: abcdef123 Your password is invalid! Please re-enter: Abcdef123 Credentials Saved! 

(5) Complete the displayCredentialsReport() function. This function should take all 3 lists as parameters and produce a report of all of the available login credentials. You will simply need to create loop to iterate through the lists. (5 points)

Ex.

Login Credential Report ----------------------- Email Address Password Username ------------- -------- -------- marywilson@gmil.com Abcde123 marywilson jjdan123@yahoo.com Bigboy1100 jjdan123 msreese@outlook.com Ginie#11 msreese 

(PYTHON)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases 11th British National Conference On Databases Bncod 11 Keele Uk July 7 9 1993 Proceedings Lncs 696

Authors: Michael F. Worboys ,Anna F. Grundy

1993rd Edition

3540569219, 978-3540569213

More Books

Students also viewed these Databases questions

Question

Discuss the Hawthorne experiments in detail

Answered: 1 week ago

Question

Explain the characteristics of a good system of control

Answered: 1 week ago

Question

State the importance of control

Answered: 1 week ago

Question

What are the functions of top management?

Answered: 1 week ago