PART 1: Imagine you are developing a software package for Amazon.com that requires users to enter their own passwords. Your software requires that users’ passwords meet the following requirements The password should be at least 8 characters The password should contain at least one uppercase and at least one lowercase letter The password should contain at least one digit The password should contain at least one of the following symbols: @*#$%? (You may want to create a string containing these characters and use that to check) The password may not contain a blank Write a program that verifies that passwords are valid. Read a series of passwords from an external input file (Scanner), one per line. Remove any leading or trailing blanks. For each password, determine if it is valid by calling a method to test for criteria above. The main method should print each password, and a message that it is valid or not valid. When it is done reading and processing all data input, print a message that the program is ending. Print to an external output (PrintWriter) file. Your data should include at least 12 passwords, though your program doesn’t know how many there will be. Include 2-3 valid passwords, and at least one invalid for each one (and only one) of the above criterion. Have some that are invalid for more than one criterion. Also, include leading or trailing blanks in some of the passwords, and remove them from the password. PART 2: Write a program that accepts as input a sentence in which all the words are run together, but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example, the string “StopAndSmellTheRoses.” would be converted to “Stop and smell the roses.” If the word is “I”, leave it as an uppercase I. Also check if the sentence ends with a “.”(period). If it does not, add a period at the end of the sentence. You should use a method to perform the editing to the sentence. Print the original sentence and the converted version. You may do this in the method or in the main program, having returned the new string. Repeat this for as many lines as there are in the input file. Use at least 8 lines of data. Have some with only one word. Have some words with only one letter(a), and at least one time the word I in the middle of the sentence. Some should end with a “.” and some not. You may use standard input (System.in) or an input file. Use a PrintWriter file for output.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

PART 1:
Imagine you are developing a software package for Amazon.com that requires users to enter their own passwords. Your software requires that users’ passwords meet the following requirements

The password should be at least 8 characters
The password should contain at least one uppercase and at least one lowercase letter
The password should contain at least one digit
The password should contain at least one of the following symbols: @*#$%?
(You may want to create a string containing these characters and use that to check)
The password may not contain a blank

Write a program that verifies that passwords are valid.
Read a series of passwords from an external input file (Scanner), one per line. Remove any leading or trailing blanks. For each password, determine if it is valid by calling a method to test for criteria above. The main method should print each password, and a message that it is valid or not valid. When it is done reading and processing all data input, print a message that the program is ending. Print to an external output (PrintWriter) file.
Your data should include at least 12 passwords, though your program doesn’t know how many there will be. Include 2-3 valid passwords, and at least one invalid for each one (and only one) of the above criterion. Have some that are invalid for more than one criterion. Also, include leading or trailing blanks in some of the passwords, and remove them from the password.

PART 2:
Write a program that accepts as input a sentence in which all the words are run together, but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example, the string “StopAndSmellTheRoses.” would be converted to “Stop and smell the roses.” If the word is “I”, leave it as an uppercase I. Also check if the sentence ends with a “.”(period). If it does not, add a period at the end of the sentence.
You should use a method to perform the editing to the sentence.
Print the original sentence and the converted version. You may do this in the method or in the main program, having returned the new string.
Repeat this for as many lines as there are in the input file. Use at least 8 lines of data. Have some with only one word. Have some words with only one letter(a), and at least one time the word I in the middle of the sentence. Some should end with a “.” and some not. You may use standard input (System.in) or an input file. Use a PrintWriter file for output.



Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 3 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY