Password modifier: Many user-created passwords are simply or have invalid characters. Write a program that that read original passwords from the file Password.txt, update them by doing the following changes: 1) Remove all non-alpha characters 2) Replace the first letter o with @ 3) Replace the second letter o with $ The last is to write the updated passwords to the file UpdatePassword.txt. If the file Password.txt is happy? My password! Hello, world7 You go word! We will have the file UpdatePassword.txt with the following content: happy Mypassw@rd Hell@w$rld Y@ug$word
Q: Are the TCP receive buffer and the client's application buffer How do they engage with one another…
A: TCP: Transmission Control Protocol, or TCP, is a communications standard that enables computer…
Q: Four different machine learning algorithms are shown in this section, which may be used for…
A: various machine learning techniques The amount of training data is: We may use low bias algorithms…
Q: Create an IP address plan as efficiently as possible for the network shown below. The address space…
A: Solution:- The address space given to you is 192.168.10.0/25. Network A requires 50 address…
Q: What are the Advantages of Encapsulation?
A: Lets see the solution in the next steps
Q: Answer in C++ Only Chef is becoming bored with the recent lockdown caused by the coronavirus…
A: As per the given in Question, To maximize the LCM, How to find the smallest integer for that C++…
Q: What does PC-relative addressing really mean
A: Addressing related to the PC: When using relative addressing, one specifies the address of the…
Q: What is the "Principle of Non-Repudiation" according to you?
A: Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation…
Q: Would you suggest connecting the CPU and memory using an asynchronous or synchronous bus? Your…
A: Bus: A bus is a group of cables that connects a single system's subsystems to one another. It has a…
Q: List ten key differences between information technologies and information systems
A: Consists of removing newly installed software updates, diagnosing and fixing problems with user…
Q: Your company has made the decision to replicate its product database over numerous servers in order…
A: Data replication Data replication enhances data safety. A second identical copy can be utilized if a…
Q: Virtual Page numbers 0x00002 0x00000 0x00001 0x00002 Ox00003 Page offset 0x753 0x0002 Disk 0x0006…
A: Solution:- Virtual address:- 0x00002 0x753 virtual page number page offset
Q: What does programmable array logic really mean?
A: Logic for programmable arrays: A Programmable Array Logic is a popular type of PLD (programmable…
Q: What kinds of characters and strings may you use in Java?
A: Answer is in next step.
Q: Is it harder to understand how computers operate because they save information in binary? What…
A: No, it is not harder to understand how computers operate because they save information in binary…
Q: Differentiate between packet and circuit switching The advantages of packet switching over circuit…
A: Solution for given, Differentiate between packet and circuit switching The advantages of packet…
Q: What steps are involved in starting a downgrade attack?
A: Attackers often use downgrade attacks to target services that are not completely patched and to…
Q: What is the difference between the remove and discard methods?
A: Let's see the difference between remove and discard method
Q: Name the processor lines of two major manufacturers?
A: Processor The CPU, which is another name for the processor, gives the computer the guidance and…
Q: Specify the elements that make up an information system. How significant is the individual inside…
A: The answer is given in the below step
Q: What innovative game technology do you find most fascinating?
A: Technology Games: How does gaming technology work? The term "game technology," often known as…
Q: What steps are involved in putting finite-state machine control into practice?
A: Finite-State Machine (FSM): A model of computing is said to be based on a finite state machine (also…
Q: Although elitism in genetic algorithms is regarded as a brilliant idea, it is not without its…
A: Introduction: A genetic algorithm is a local search strategy used to identify optimization and…
Q: What does the organization's history suggest? What implications does this have on the use of fresh…
A: Web server definition and history: An internet server (sometimes called a hypertext transfer…
Q: What is a Microprocessor?
A: Answer..
Q: An explanation of the Java virtual machine
A: JVM- Java Virtual Machine. Java Virtual Machine is a software that is work on an abstract virtual…
Q: Return a lambda function that takes in multiplier (the multiplier is a number) and returns a lambda…
A: Coded using Python 3.
Q: How may bank fraud be prevented in the future? What security holes are employed in bank fraud?
A: Given: A bank or other financial institution uses technology heavily, especially the Internet, and…
Q: Take a look at the following list of the five moral aspects of information systems.
A: Introduction: Information rights and obligations, property rights and obligations, system quality,…
Q: How do asynchronous and isochronous networks differ from one another, and what makes them different?
A: Introduction: These are all techniques for transferring data streams. For a visual representation of…
Q: How does a multithreaded multiprocessor architecture operate?
A: Introduction: Multicomputer: A multi-computer system is a network of computers working together to…
Q: Which four types of information systems are the most common?
A: Information Systems: An information system is a coordinated group of parts used to gather, store,…
Q: hello, may I please get some help on this program? in Python 3 and Formatted thank you in advance!!…
A: Below I have provided a program for the given question. Also, I have attached a screenshot of the…
Q: What a router does when it gets a packet with an unknown destination network address is described in…
A: Introduction: Router: A router is used to link two or more packet-switched networks or subnetworks.…
Q: What is the "Principle of Non-Repudiation" according to you?
A: Principle of Non-Repudiation is the assurance that the sender of the information is provided with…
Q: Do you know how to use stored procedures and database triggers in their most common applications?
A: Database Triggers: A database trigger is a piece of procedural code that is run automatically in…
Q: Which virus or spyware is the most dangerous? Give proof to back up your claim in your answer.
A: Which one of spyware and malware poses more hazards than the other? Spyware is not as dangerous as…
Q: Which VLAN is intended to provide access to networking equipment for managing the network…
A: A virtual local area network, often known as a VLAN, is a logical overlay network that separates the…
Q: We must use a range of countermeasure strategies to combat the threats we now face. How are these…
A: Finding some strategies for countermeasure: Against imminent threats to reserved files and…
Q: For the following Boolean function F, derive a simplified sum of products (SOP) expression using a…
A: The given function is F(A,B,C,D)=m(2,5,7,8,9,10,12,13,14,15). Then it is a 4-variable k-map, with 16…
Q: Viterbi Decoding tables.jpg (a) Using the matrices given, compute by hand the Viterbi trellis (as…
A: Using the matrices given, compute by hand the Viterbi trellis and back pointer matrix for the…
Q: What identifies the malware characteristics of a virus program?
A: A digital device can become infected by malware, which can possibly change data in the future.…
Q: What sets malware distinct from a virus program?
A: The word "malware" is an abbreviation for "harmful software," although it is often used as a…
Q: Create an IP address plan as efficiently as possible for the network shown below.
A: The answer is
Q: def area_of_circle(xc, yc, xr, yr): This function takes the coordinates of two points, the center of…
A: The PYTHON Code is given below with code and output screenshots Happy Coding ?
Q: The author claims that "machine learning is an empirical science." What does this sentence actually…
A: Introduction: Machine learning studies algorithmic improvements via experience. Machine Learning…
Q: What other kinds of materials may be utilized to make a PCB
A: Answer is in next step.
Q: What is the difference between creating a "file upload" functionality using PHP native and using the…
A: Introduction: file upload : Examine the main characteristics of upload file online that will make…
Q: After the following statement executes, what elements will be stored in the myset set? myset =…
A: Lets see the solution.
Q: Using k-fold Cross Validation in error estimates has a number of advantages over the conventional…
A: Introduction: In error estimation, k-fold Cross Validation offers various benefits over separating…
Q: What is interrupt service routine?
A: The term "interrupt service routine" refers to a piece of software that is invoked by hardware in…
please answer within 30 minutes....
Step by step
Solved in 3 steps with 1 images
- Each of the following files in the Chapter.10 folder of your downloadable student files has syntax and/or logical errors. In each case, determine the problem and fix the program. After you correct the errors, save each file using the same filename preceded with Fixed. For example, DebugTen01.cs will become FixedDebugTen01 .cs. a. DebugTen01.cs b. DebugTen02.cs c. DebugTen03.cs d. DebugTen04.csEach of the following files in the Chapter.05 folder of your downloadable student files has syntax and/or logical errors. In each case, determine the problem, and fix the program. After you correct the errors, save each file using the same filename preceded with Fixed. For example, save DebugFive1.cs as FixedDebugFive1 .cs. a. DebugFive1.cs b. DebugFive2.cs c. DebugFive3.cs d. DebugFive4.csProgram a python program that demonstrates reading and comparing Create a python program that demonstrates reading and comparing multiple files, processes the input files based on the business rules, and produces an output file. Needed Files 1. The timeclock.txt Download timeclock.txtfile contains the hours worked data for every employee as well as the shift they worked. The layout for the file is as follows: EMPLOYEE_NUMBER, HOURS_WORKED, SHIFTTimeclock.txt 22476, 45, 3 24987, 30, 148283, 50, 285437, 25, 3 2. The personnel.txt Download personnel.txtfile contains the names of all employees and their hourly pay rates. The layout for the file is as follows: EMPLOYEE_NUMBER, EMPLOYEE_NAME, PAY_RATEPersonnel.txt 11235, Bob Smith, 10.50 22476, John Roberts, 12.3524987, Mary Johnson, 15.9032743, Brad Carson, 11.2548283, Alice Martin, 14.2085437, Aaron James,15.15 Note: Both the timeclock.txt and payroll.txt files are pre-sorted by EMPLOYEE_NUMBER in ascending order. Business…
- JAVA PPROGRAM ASAP Hypergrade does not like this program because it says 2 out of 7 passed and take out the extra \n from the program. Please Modify and change this program ASAP BECAUSE IT IS HOMEWORK ASSIGNMENT so it passes all the test cases. The program must pass the test case when uploaded to Hypergrade. Also, for test cases 1-4 it wants only to input Please enter the file name or type QUIT to exit: then input the file and display the Total number of words. For test cases 5 and 7 it wants to only to input Please enter the file name or type QUIT to exit then input input5.txt and then display File: input5.txt does not exist.\n then display Please enter the file name again or type QUIT to exit:\n then type input1.txt to display the total number of words or type quit to exit the program. For test case 6 it wants only to Please enter the file name again or type QUIT to exit:\n then type quit to exit the porgram. import java.io.File;import java.io.FileNotFoundException;import…Finish this program from the code posted below! Note: There should be two files Main.py and Contact.py You will implement the edit_contact function. In the function, do the following: Ask the user to enter the name of the contact they want to edit. If the contact exists, in a loop, give them the following choices Remove one of the phone numbers from that Contact. Add a phone number to that Contact. Change that Contact's email address. Change that Contact's name (if they do this, you will have to remove the key/value pair from the dictionary and re-add it, since the key is the contact’s name. Use the dictionary's pop method for this!) Stop editing the Contact Once the user is finished making changes to the Contact, the function should return. Code:from Contact import Contactimport pickledef load_contacts():""" Unpickle the data on mydata.dat and save it to a dictionaryReturn an empty dictionary if the file doesn't exist """try:with open("mydata.dat", 'rb') as file:return…Fix the errors in the Customer class and the Program. DATA FILE ThinkAbout Tech 344 Park Ave, NY, NY 10022 Kemp Technologies 3601 Broadway, NY, NY 10021 Verizon 6 Hudson Street, NY, NY 10001 Merrill Lynch 7 World Financial Center, NY, NY 10001 Philips Laboratories 345 Scarborough Rd, Briarcliff Manor, NY 10510 CODE #include <iostream> #include <fstream>#include <string>using namespace std; class Customer { // Constructorvoid Customer(string name, string address) : cust_name(name), cust_address(address){acct_number = this.getNextAcctNumber();} // Accessor to get the account numberconst int getAcctNumber() { return acct_number; } // Accessor to get the customer namestring getCustName(} const { return cust_name; } // Accessor to get the customer addressstring getCustAddress() const { return cust_address; } // Set a customer name and addressstatic void set(string name, string address); // Set a customer addressvoid setAddress(string cust_address) { cust_address =…
- Java Problem The teacher at a school needs help grading an exam with a number of True/False questions. The students’ IDs and test answers are stored in a file. The first entry of the file contains the answer to the test in the form: TTFTFTTTFTFTFFTTFTTF Every other entry in the file is the student’s ID, followed by a blank, followed by the students’ response. For instance, the entry: ABC54102 T FTFTFTTTFTTFTTF TF The student’s ID is ABC54102, answer to question 1 is True, the answer to question 3 is False. Also, the student did not answer question 2 and question 18. The exam has 20 questions. Here is the grading policy: each correct answer is awarded two points, each wrong answer get -1 point, and no answer gets 0 point. Write a program that processes the test data. The output should be the student’s ID, followed by the answers, followed by the test score (total points), followed by the test grade. Assume the following grade scale will be used: 90%-100%, A; 80%-89.99%, B; 70%-79.99%,…Java OOP Write a complete address book maintenance application. The user of the program has four options: Add a new person, delete a person, modify the data of a person, and search for a person by giving the name. Use the AddressBook class, either the original one from the chapter or the modified one from the previous exercises. You have to decide how to allow the user to enter the values for a new person, display person information, and so forth.Create a file in your project named employees.txt with the following data (you can simply create the file by hand rather than with Python code): 123 Bob Smith345 Anne Jones256 Carol Lee845 Steve Robert Anderson132 Jill Thompson From your program's main function, give the user the following options: lookup a name based on ID number, lookup an ID number based on name, and quit the program. OPTION 1: The user chooses to lookup a name based on ID number: Use a try/except and ask the user to enter an integer. If they don't enter an integer, print an error message. If they do enter an integer, call a function named lookup_employee which takes the id as a parameter. If an employee with the given id number is found, return the name. Otherwise, return the string “Employee not found” Back in main, print the return result. OPTION 2: The user chooses to lookup an ID based on name: Ask the user to enter the first and last name (don't ask for the middle name). Call a function named…
- This question comes from the textbook:Starting out with Visual C# 5th Edition - Chapter 14 Programming Problem 2 Create an application that reads the contents of two text files and uses LINQ extension methods to perform the following: • It should display a list of all the unique words contained in both files.• It should display a list of the words that appear in both files.• It should display a list of the words that appear in the first file but not the second.• It should display a list of the words that appear in the second file but not the first.• It should display a list of the words that appear in either the first or second file but not both. Hint: Use set operations to perform these analyses. Also, see Chapter 8 for a discussion of string tokenizing.JAVA PPROGRAM ASAP Please Modify this program ASAP BECAUSE IT IS HOMEWORK ASSIGNMENT so it passes all the test cases. The program must pass the test case when uploaded to Hypergrade. Also, for test cases 1-4 it wants only to input Please enter the file name or type QUIT to exit: then input the file and display the Total number of words. For test cases 5 and 7 it wants to only to input Please enter the file name or type QUIT to exit then input input5.txt and then display File: input5.txt does not exist.\n then display Please enter the file name again or type QUIT to exit:\n then type input1.txt to display the total number of words or type quit to exit the program. For test case 6 it wants only to Please enter the file name again or type QUIT to exit:\n then type quit to exit the porgram. Chapter 9. PC #10. Word Counter (page 610) Write a program that asks the user for the name of a file. The program should display the number of words that the file contains. Input…>> classicVinyls.cpp For the following program, you will use the text file called “vinyls.txt” attached to this assignment. The file stores information about a collection of classic vinyls. The records in the file are like the ones on the following sample: Led_Zeppelin Led_Zeppelin 1969 1000.00 The_Prettiest_Star David_Bowie 1973 2000.00 Speedway Elvis_Presley 1968 5000.00 Spirit_in_the_Night Bruce_Springsteen 1973 5000.00 … Write a declaration for a structure named vinylRec that is to be used to store the records for the classic collection system. The fields in the record should include a title (string), an artist (string), the yearReleased (int), and an estimatedPrice(double). Create the following…