Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Can comeone help me with is Python HW? please upload a .py file using google drive or other cloud servers. Regular expressions are widely used

Can comeone help me with is Python HW? please upload a .py file using google drive or other cloud servers.

Regular expressions are widely used to search text for patterns, including for spell checking and word counts.

For this assignment, using this sample file :

( Steps to take if you become a victim If you are a victim of identity theft, theFederal Trade Commission recommends these steps: File a complaint with the FTCat identitytheft.gov. Contact one of the three major credit bureaus to place a'fraud alert' on your credit records: Equifax, www.Equifax.com, 1-800-766-0008Experian, www.Experian.com, 1 888-397-3742 TransUnion, www.TransUnion.org, 1(800) 680-7289 Contact your financial institutions, and close any financial orcredit accounts opened without your permission or tampered with by identitythieves. If your SSN is compromised and you know or suspect you are a victim oftax-related identity theft, the IRS recommends these additional steps:Respondimmediately to any IRS notice; call the number provided. Complete IRS Form14039, Identity Theft Affidavit, if your efiled return rejects because of aduplicate filing under your SSN or you are instructed to do so. Use a fillableform at IRS.gov, print, then attach the form to your return and mailaccordingto instructions. If you previously contacted the IRS and did not have aresolution, contact us for specialized assistance at 1-800-908-4490. We haveteams available to assist. About data breaches and your taxes Not all databreaches or computer hacks result in tax-related identity theft. It's importanttoknow what type of personal information was stolen. If you've been a victim ofa data breach, keep in touch with the company to learn what it is doing toprotect you and follow the 'Steps for victims of identity theft'. Data breachvictims should submit a Form 14039, Identity Theft Affidavit, only if yourSocial Security number has been compromised and your efile return was rejectedas a duplicate or IRS has informed you that you may be a victim of tax-relatedidentity theft. How to reduce your risk Join efforts by the IRS, states and taxindustry to protect your data. Taxes. Security. Together. We all have a roletoplay. Here's how you can help: Always use security software with firewall andanti-virus protections. Use strong passwords. Learn to recognize and avoidphishing emails, threatening calls and texts from thieves posing as legitimateorganizations such as your bank, credit card companies and even the IRS. Donotclick on links or download attachments from unknown or suspicious emails.Protect your personal data. Don't routinely carry your Social Security card, andmake sure your tax records are secure. See Publication 4524, Security Awarenessfor Taxpayers, to learn more For phishing scams by phone, fax or mail, call 1-800-366-4484.)

and your knowledge of regular expressions in Python to:

print the total # of words (don't worry that numbers are considered words)

print the # of occurrences of 'tax' or 'taxes' (case-insensitve), but exclude words like 'taxpayers',

list all phone #'s mentioned in the content

list all IRS forms & publications mentioned in the content. (e.g. Form NNNN or Publication NNNN)

list all web addresses in the content

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

AutoCAD Database Connectivity

Authors: Scott McFarlane

1st Edition

0766816400, 978-0766816404

More Books

Students also viewed these Databases questions