Extract emails and passwords from several .txt files and rewrite them in a .txt file that is symbolic : in Python code Example: hey... email: username+123@example.com, password: 627hsjwu* these are my company credentials... See you later Now I want to place in a result.txt the email and password separated by the symbol :
Q: What characteristics must a compiler that generates accurate and efficient code possess? Explain?
A: A compiler is a vital software instrument that understand high-level teaching verbal Communication…
Q: Compiler Phases serve multiple functions. Explain each procedure in detail?
A: Compiler phases are the different stages involved in the process of converting source code into…
Q: In general terms, what are the key distinctions between computer organisation and computer…
A: Computer organization and computer architecture are two related however particular areas of computer…
Q: Computer Science I need question (e) . Explain please! assembly MASM
A: Assembly language is a low-level programming language for a computer or other programmable devices…
Q: 261. [Display AVL tree graphically) Write a program that displays an AVL tree along with its balance…
A: Define an `AVLNode` class to represent a node in the AVL tree. Each node should have fields for the…
Q: 26 )The following processes are submitted to an operating system. which require no input/output…
A: 1.FCFS NON-PREEMPTIVE: Which means that if the process get started for execution it never ended…
Q: Are you familiar with the five moral aspects of information systems and how they connect to one…
A: Yes, I am aware of the five moral elements of information systems and how they are interconnected.…
Q: Reduce the following state table to a minimum number of Present Next State Present Output State X =…
A: SOLUTION -
Q: What do you mean by the statement that patterns and frameworks are distinct?
A: Patterns:- In the subject of software engineering, "patterns" describe recurrent issues and the…
Q: Find out the risks that are involved in creating an online library for the software engineering…
A: Creating an online library for a software engineering project can provide numerous benefits, such as…
Q: What was the name of the first computer manufactured in the United States for commercial use?
A: The first computer manufactured in the United States for commercial use was the UNIVAC I (UNIVersal…
Q: It is necessary to have a discussion on the relevance of quality assurance and software engineering.
A: Quality assurance and software engineering are two crucial elements of the software development…
Q: Define the class RectangularCube in C++. A RectangularCube has three sides length(L), width (W), and…
A: In this question we have to write a C++ for the rectangle cube class and test implementation Let's…
Q: What should the goals of the test be? What does it matter how the person being tested thinks and…
A: Below are some possible goals of a test could include 1) Assessing knowledge or understanding: Many…
Q: Does declarative/functional programming differ fundamentally from procedural/imperative programming?
A: Programming: It is the process of designing, writing, testing, and maintaining computer…
Q: Which one of the following assertions is not correct: O In public key cryptography, one key is used…
A: The paper covers many aspects of cryptography and encryption of public importance. One claim is…
Q: Is there a way that the data that is being used can have its integrity guaranteed?
A: The answer is given below step.
Q: Could you maybe elaborate on what exactly you mean by the term "partitioning of operating systems"…
A: The partitioning of an operating system refers to the practice of dividing a computer's hard disk…
Q: When modernising a data centre, consider how environmental factors like energy efficiency, carbon…
A: A data centre is a centralised location where a lot of data and digital information is kept,…
Q: work accomplish for it to be eff
A: Moving and distributing data among nodes in an information system is known as networking or computer…
Q: Describe a situation in which two different computing machines are collaborating to share a video…
A: Two computing machines are collaborating to share a video clip using an unsecured FTP (File Transfer…
Q: How can we best defend ourselves against the next generation of cyberattacks?
A: Here is your solution :
Q: ii) Describe the four abstraction levels of TCP and IP. ii) Describe a hypothetical circumstance in…
A: The TCP/IP model is a framework for devious and implement processor networks, and it consists of…
Q: What purpose does caching serve?
A: A cache's basic role is to increment data recovery execution by reducing the need to get to the…
Q: What can be done to make a computer language easier to use? How would the words be put together?
A: According to the information given:- We have to define to make a computer language easier to use.
Q: Problem 3 on pipelined computer with branch misprediction Fill the 20 table entries, a-t, with…
A: The given problem asks us to fill a table of 20 entries with the values of different pipeline stages…
Q: Machine code can be data of what nature? Tokens Which design need a stack as the core of push-down…
A: A compiler is a software tool that converts source code written in a high-level programming language…
Q: Why is it essential to differentiate between a logical division and a subsystem, and what,…
A: In this question we have to understand Why is it essential to differentiate between a logical…
Q: What exactly is the process of analysis and design for an information system?
A: The analysis as well as design process seems to be a basic stage in the development of an…
Q: What are your impressions of the meteoric rise in internet use all around the world
A: Answer is given below
Q: Discuss a technique that you would utilise to construct a high-quality machine that has a fast…
A: Constructing a high-quality machine that has a fast running speed and is economical can be achieved…
Q: a) Artificial intelligence; b) the concept of an agent; c) the ability to reason; and d) the Turing…
A: Artificial intelligence (AI) is rapidly growing field that involves the development of the…
Q: What aspects of one another do they share, and what characteristics distinguish them from one…
A: The question seeks to compare and contrast two entities that are not openly Mention. However, the…
Q: Why not give some thought to the five ethical considerations of IT systems?
A: Privacy plus Data defense: Protecting users' privacy and ensuring their data's security is a…
Q: There are three different approaches that may be used in order to raise the overall quality of your…
A: There are several approaches that organizations can use to improve the quality of their products. In…
Q: What's the difference between programmable input/output and I/O that's driven by interrupts?
A: What's the difference between programmable input/output and I/O that's driven by interrupts?
Q: What the Waterfall Model Is and How It Works
A: The waterfall model is a sequential software development process model. It builds software in a…
Q: What does it mean to say that something is a "operating system"? What do you think are the two most…
A: An essential piece of software known as an operating system serves as an interface between computer…
Q: How to answer with correct and in details for below questions based on Implementation Guideline &…
A: The field of human-computer interaction (HCI) focuses on designing and developing effective and…
Q: Provide an overview of the compiler and comment on its testability.
A: A compiler is a generalized software curriculum that translates high-level brainwashing language…
Q: What do you consider to be the three distinct levels of testing that take place inside a class?
A: When it comes to testing a class, there are three distinct levels of testing that are typically…
Q: What does it mean to be a "Cyber Security Instructor," as far as duties and tasks go?
A: As a Cyber Security Instructor, your primary responsibility is to teach students how to protect…
Q: A compiler that is both efficient and accurate must take a number of parameters into account.…
A: A compiler is a software device that deciphers source code written in a significant level…
Q: What's the difference between making sure software is good and making sure it is good? Tell me…
A: The distinction between ensuring software is "good" and ensuring it is "good enough" depends on…
Q: What are some direct and iterative approaches that are often used? Pick all of the ones that are…
A: In the realm of numerical methods and linear algebra, there are direct and iterative approaches…
Q: Why is HTTP used by network applications? How many more components does a Web app need to be built?
A: HTTP, which stands for Hypertext Transfer Protocol, is an application protocol that is widely used…
Q: Can someone help me .No matter what i do i just cant get this C program to properly compile and run…
A: The correct code is given below with output screenshot
Q: Is there room for the use of technology based on the Internet in the growth of one of the company's…
A: Yes, there is often a lot of room for the use of technology based on the internet to improve and…
Q: Why are there problems when utilising assembly language to create multipurpose programmes? Does one…
A: Assembly language is a low-level programming language that is used to write instructions that can be…
Extract emails and passwords from several .txt files and rewrite them in a .txt file that is symbolic : in Python code
Example:
hey... email: username+123@example.com, password: 627hsjwu* these are my company credentials...
See you later
Now I want to place in a result.txt the email and password separated by the symbol :
Step by step
Solved in 3 steps with 3 images
- Create using python. Program Specifications: Computer should generate 4 random numbers from 1 - 9 as the "Secret Code". User should be prompted for their guess of those four numbers. After they provide their full guess, the user is told how many are correct. As long as the user does not get all four correct, they keep getting asked for their guess. After the user finally gets all of them correct (yes - all four), they are congratulated and then told how many tries it took them. Technical Requirements: Use at least one list Use at least one function with parametersPLEASE COMMENT CODE In a python program, create a new file and call it “ tracking”. Write to it four lines each contains information about an order like this: 1-00654-021 Dell charger Toronto-WEST 99-49-ZAD011-76540-022 ASUS battery Milton-EAST 34-56-CBH561-09239-026 HP HD Scarborough-NORTH 12-98-AZC451-12349-029 Mac FD North York-LAWRENCE 34-49-ZWL01Add the file two more lines: 1-34567-055 Lenovo SSD Milton-ON 34-09-MT04 1-90432-091 Lenovo battery Oakville-ON 78-KL98 Define a function that searches for a brand (e.g. Dell, ASUS, etc.). Test the function in your program.python:def ohno_twozero(placeholder, statement): """ Question 1 - Regex You are typing a personal statement but accidentally used the number 0 instead of the letter o (the two are very close on the keyboard). After realizing this, seeing the mistake once does not bother you, but you absolutely cannot tolerate seeing it twice in a row. Therefore, you will need to replace any WORD where '00' shows up at any point with the given placeholder. Do not replace any NUMBER where 00 shows up. (e.g. '100' should stay as '100' and not be replaced with the placeholder). You may assume that when '00' shows up in a word, there will be at least one letter preceding it. Return the output string after making these changes. THIS MUST BE DONE IN ONE LINE. Args: placeholder (str) statement (str) Returns: str >>> ohno_twozero('epic', "I am n0w l00king at 500 t0tal h0urs 0n Super Smash Br0s.") "I am n0w epic at 500 t0tal h0urs 0n Super Smash…
- 12 Digit Barcode In this homework, you will develop a python program which reads a series of barcodes from "barcodes.txt" and creates an output file "output.txt" which contains the barcodes and their status as seen in the example output below. 153182953420 5+1+2.5.4-1 7+3+8+4+3+2-3 1 23601057072 6+t-13 Even : 2+6+1 +5+0 = 14 Odd: 1+3+0+ 0 +7+7 = 18 3 x8 = 24 D+3- 10 4 + 4 = 8 10 -8 = 2 (CORRECT) What to submit: 1) ipynb file which contains checkBarcode function which takes a string varlable as input and returns true or false, and a driver program which reads in "barcodes.txt" and creates "output.txt". Assume the input file contains one barcode info per line. Important: Your input file name MUST BE "barcodes.txt" and the output file name MUST BE "output.txt". Otherwise, you'l get up to 30 pts penalty Below a sample output.txt: 123601057072 is a valid 10-digits barcode lab601057072 is an invalid 10-digits barcode 172601055072 is an invalid 10-digits barcode 12345 is an invalid 10-digits…⦁ Perfect Pizza wants to install a system to record orders for pizza and chicken wings. When regular customers call Perfect Pizza on the phone, they are asked their phone number. When the number is typed into a computer, the name, address, and last order date is automatically brought up on the screen. Once the order is taken, the total, including tax and delivery, is calculated. Then the order is given to the cook. A receipt is printed. Occasionally, special offers (coupons) are printed so the customer can get a discount. Drivers who make deliveries give customers a copy of the receipt and a coupon (if any). Weekly totals are kept for comparison with last year’s performance. ⦁ Write a summary of business activities for taking an order at Perfect Pizza.⦁ Draw a context-level data flow diagram for Perfect Pizza⦁ Explode the context-level diagram in b showing all the major processes. Call this Diagram 0. ⦁ Draw a logical child diagram for Diagram 0 in c for the process…please code in python (regular expression) Using any text editor, manually create a file that contains four or five lines with the following format: Username:Firstname:Lastname:Telephone numberWrite a program that will convert such lines to a Lightweight Directory Access Protocol (LDAP) record format as shown below:dn: uid=Username, dc=example, dc=comcn: Firstname Lastnamesn: LastnametelephoneNumber: Telephone number
- In Python Take the Deck of cards we created in Problem Solving Exercise: Shuffle and Deal Cards and write the (unshuffled) deck to a csv file. It should create a csv file with a card per row with the name, value and suit in each row (example below): 2 Spades 2 3 Spades 3 4 Spades 4 5 Spades 5 6 Spades 6 7 Spades 7 8 Spades 8 9 Spades 9 10 Spades 10 J Spades 11 Q Spades 12 K Spades 13 A Spades 14 2 Hearts 2 3 Hearts 3 I'm so confused with this question. below is my code for thisUsing matplotlib, a Python program that reads the contents of the file see attached then plots the data as either a line graph or a bar chart. Be sure to display meaningful labels along the X and Y axes, as well as the tick marks. The file contains the average gas price for each week in the year 1994. (There are 52 lines in the file.) I copyed and pasted the contents of the file 0.9920.9951.0010.9991.0051.0071.0161.0091.0041.0071.0051.0071.0121.0111.0281.0331.0371.041.0451.0461.051.0561.0651.0731.0791.0951.0971.1031.1091.1141.131.1571.1611.1651.1611.1561.151.141.1291.121.1141.1061.1071.1211.1231.1221.1131.1171.1271.1311.1341.125with python do whis: Edit or delete a user profileWhen the user chooses 2, the first thing that it should do is to check whether the user information is loaded in the program (i.e., check if the user information is passed to the function that generates recipe recommendations). If the user information is passed to the function (i.e., the user chose option 1 before choosing option 2), the program should show the user the following menu:Hello (user name)You can perform one of the following operations:1) Delete your profile2) Edit your profilea. If the user chooses 1, perform the following subtasks to delete a user profile:1- Search for the user profile in the file userInformation.txt using the user name in read mode; once you find the user profile (i.e., the line that contains all the user information), pass it to a function that deletes the user information.2- The function should create a temporary file called temp.txt in write mode and search the file userInformation.txt in read mode…
- In Python code: Read all of words in the paragraph posted below and print out all of the top 5 most frequent words (sorted: most to least) and with no duplicates (select word lexicographically). The output should match the exact format shown below, which is word: count. Example: hi: 120 shoes: 100 old: 90 few: 30 car: 15 Paragraph: A few months ago, I decided to deaccession an assortment of my things by whatever means feasible: selling, donating, recycling, giving them away, losing them on the subway, or reserving a spot for them on the next Mars Explorer. I gathered my unwanteds and piled them in the living room. A fraction of what was in that jumble: seven antique glass cake stands that belonged to my mother; a dormitory's worth of new sheet sets and blankets for a bed size that is not mine; a set of Lenox china that my grandmother gave to my mother, who gave it to me, and was never used; clothes galore; a Viking stove grate that arrived cracked, and which I saved because I planned…Program in Python: You are responsible for computing the votes of the election. We have 5 candidates: Abel, Barbara, Carl, Denise and Eugenie. Make a program / script that reads from a file the total votes that each of them had in that order (first line from Abel, second line from Barbara, third line from Carl, fourth line from Denise and fifth line from Eugenie). (voters only have the option to vote for one of the 5, with no blank or null votes).Java Problem The teacher at a school needs help grading an exam with a number of True/False questions. The students’ IDs and test answers are stored in a file. The first entry of the file contains the answer to the test in the form: TTFTFTTTFTFTFFTTFTTF Every other entry in the file is the student’s ID, followed by a blank, followed by the students’ response. For instance, the entry: ABC54102 T FTFTFTTTFTTFTTF TF The student’s ID is ABC54102, answer to question 1 is True, the answer to question 3 is False. Also, the student did not answer question 2 and question 18. The exam has 20 questions. Here is the grading policy: each correct answer is awarded two points, each wrong answer get -1 point, and no answer gets 0 point. Write a program that processes the test data. The output should be the student’s ID, followed by the answers, followed by the test score (total points), followed by the test grade. Assume the following grade scale will be used: 90%-100%, A; 80%-89.99%, B; 70%-79.99%,…