Write a program that will prompt the user for a username and validate that username is in the approvedUsers dictionary before prompting for the password. # approvedUsers = {"user1": "paswd", “user2":"paswd2", “user3": "paswd3", “user4":"paswd4"} # Hint: multiple function should be used
Write a program that will prompt the user for a username and validate that username is in the approvedUsers dictionary before prompting for the password. # approvedUsers = {"user1": "paswd", “user2":"paswd2", “user3": "paswd3", “user4":"paswd4"} # Hint: multiple function should be used
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question

Transcribed Image Text:**Educational Resource - Programming Task**
**Objective:**
Develop a program that asks the user for a username and checks if the username exists within a predefined dictionary called `approvedUsers`. If the username is valid, then prompt the user to enter a password.
**Instructions:**
1. Begin by creating a dictionary named `approvedUsers` where:
- Keys represent usernames.
- Values represent corresponding passwords.
Example:
```python
approvedUsers = {
"user1": "paswd",
"user2": "paswd2",
"user3": "paswd3",
"user4": "paswd4"
}
```
2. Write a program that:
- Prompts the user to input their username.
- Checks if the entered username exists in the `approvedUsers` dictionary.
- If the username exists, proceed to ask for the password.
- Utilize multiple functions to break down tasks for better modularity and organization.
**Hint:** Multiple functions should be utilized to ensure the program is well-structured and concise.
**Key Concepts:**
- Dictionary operations
- User input handling
- Conditional statements
- Function creation and usage
This task will enhance your understanding of basic data validation and user authentication techniques in programming.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps with 3 images

Recommended textbooks for you

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education

Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY