Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part IV. Login Information (30 pts) Your boss wants you to generate a program that can take a user's email from their biography, generate a

Part IV. Login Information (30 pts)

Your boss wants you to generate a program that can take a user's email from their biography, generate a password for the user, and save it into a dictionary for later use. The email will be in the f..c@uci.edu(no numbers, all lowercase). The username is the characters before the domain name (ie. johnsmith in the e..h@uci.edu). To create the password, you need to alter the username with ROT13.

ROT13 (rotate by 13 places) is a simple substitution cipher that replaces a letter with the 13th letter after it in the alphabet. For example, "j" is the 10th letter in the alphabet. Altering "j" with ROT13 will get the 23rd (10 + 13 = 23) letter of the alphabet, "w". Likewise, if you altered "w" with ROT13, you will get the 10th (23 + 13 = 46 - 26 = 10) letter of the alphabet, "j". Thus in our example w..h@uci.edu, the password will be "wbuafzvgu". Save both the username and password in a dictionary.

Input:

The input will be several sentences on a single line containing exactly one email within the biography with the f..c@uci.edu.

Output:

Print your dictionary which contains "username": and "password":

In[]:

#Example Input:  Tingting Nian, Assistant Professor at The Paul Merage School of Business at University of California, Irvine, studies social media, online communities and economics of digital goods. Her prior research has won the 2014 INFORMS Conference on Information Systems and Technology Best Conference Paper Award and a WCAI Research Award from Wharton Customer Analytics Initiative. Her email is t..n@uci.edu. She received her PhD in Business Administration (specialized in Information Systems) from Leonard N. Stern School of Business at NYU in 2015 and holds a Bachelor's degree in Business Administration from Tsinghua University.   

In[]:

#Example Output: {'username':'tnian', 'password':'gavna'} 

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Wireless and Mobile Systems

Authors: Dharma P. Agrawal, Qing An Zeng

4th edition

1305087135, 978-1305087132, 9781305259621, 1305259629, 9781305537910 , 978-130508713

More Books

Students also viewed these Programming questions