subject

having a secure password is a very important practice, particularly when much of our personal information is stored online.

write a program that validates a new password, following these 4 rules:

the password must be at least 8 characters long.
the password must have at least one upper case letter.
the password must have at least one lower case letter.
the password must have at least one digit.
1) your program should ask for a password, and then check first to see if the password is valid (i. e., conforms to the specifications outlined above.) if not, the program should allow the user to continue to enter passwords until s/he enters a valid password.

2) then your program should confirm the password by requesting that the user enter the password again, and verify that the two match. if they don't match, allow the user to try it again (for a total of 3 tries only).

you will need a minimum of two methods, one to confirm the two passwords, and at least one (or more) to check to see if the password meets the 4 required specifications outlined above.

carefully examine and follow all the program requirements. make sure you use prologue comments for your program, including prologue comments for each of your methods. you will find both the java string methods as well as the character class methods immensely for this lab. use comments as well for any part of your code that may not be self-explanatory or may require some additional documentation.

you will find both the java string methods as well as the character class methods immensely for this

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:50
The instruction ishl (shift left integer) exists in jvm but not in ijvm. it uses the top two values on the stack, replacing the two with a single value, the result. the sec- ond-from-top word of the stack is the operand to be shifted. its content is shifted left by a value between 0 and 31, inclusive, depending on the value of the 5 least signifi- cant bits of the top word on the stack (the other 27 bits of the top word are ignored). zeros are shifted in from the right for as many bits as the shift count. the opcode for ishl is 120 (0x78).a. what is the arithmetic operation equivalent to shifting left with a count of 2? b. extend the microcode to include this instruction as a part of ijv.
Answers: 1
question
Computers and Technology, 23.06.2019 04:31
Type the correct answer in the box. spell all words correctly. the managing director of a company sends a christmas greeting to all his employees through the company email. which type of network does he use? he uses an
Answers: 1
question
Computers and Technology, 23.06.2019 18:30
Janice recently received her college degree and is looking for a job. she is worried that since she just finished school, she will be required to repay her perkins and direct subsidized loans immediately. janice pulls out the paperwork she signed and reviews it again for repayment information. after reading all of the information, janice discovers that
Answers: 2
question
Computers and Technology, 24.06.2019 01:00
The initial tableau of a linear programming problem is given. use the simplex method to solve it. x 1 x 2 x 3 s 1 s 2 z 1 2 4 1 0 0 8 3 4 1 0 1 0 10 minus3 minus12 1 0 0 1 0 the maximum is nothing when x 1equals nothing, x 2equals nothing, x 3equals nothing, s 1equals3, and s 2equals0. (be sure to simplify to lowest terms if necessary.)
Answers: 2
You know the right answer?
having a secure password is a very important practice, particularly when much of our personal inform...
Questions
question
English, 12.11.2020 20:10
question
Mathematics, 12.11.2020 20:10
question
History, 12.11.2020 20:10
question
English, 12.11.2020 20:10
question
Mathematics, 12.11.2020 20:10
Questions on the website: 13722360