Extract e-mails and passwords from several .txt files from a path to the folder to be searched and rewrite them in a symbolic .txt file : in Python code Example: hey... email: username+123@example.com, password: 627hsjwu* these are my company's credentials... See you later Now I want to put in a result.txt the email and the password separated by the symbol :
Q: When it is feasible to do so, what are the advantages of moving the execution of the process to the…
A: Moving the execution of a process to the input/output queue first can have several advantages.…
Q: logies that can help protect the integrity of the data throu
A: Yes, there are tools available that can protect the integrity of data while also helping with data…
Q: 2. Implement the logic circuit and the truth table for the Boolean expressions shown below. X = (A +…
A: And operator : AB : is 1 when both A and B are 1, otherwise it is 0 Or operator : A+B : is 0 when…
Q: Tell me about the four goals and twelve rules in the agile statement.
A: The Agile Manifesto is a set of guiding principles for software development that prioritize…
Q: Prove that (p →(q →r)) → ((p →q) →(p →r)) ≡ T for all propositions p, q, r.
A: A tautology is a logical statement that is true for all possible truth values of its propositional…
Q: What are your impressions of the meteoric rise in internet use all around the world
A: Answer is given below
Q: If the networks are already linked, why do we need another layer to join them?
A: While it is true that networks can be linked together without the need for additional layers, the…
Q: What three conditions must be met for a network to be effective and successful? Let's examine each…
A: An effective and successful network is crucial for seamless communication and data transfer. Three…
Q: When and how should you use software quality assurance?
A: Software quality assurance (SQA) is the process of ensuring that software products and processes…
Q: What are the key distinctions between software and physical hardware?
A: Software and actual hardware are two separate parts of a computer system. The following are some…
Q: If a processor sends a cache-unfulfilled request while a block is being written back to main memory,…
A: In computer systems, cache is used to store frequently used data to reduce access latency to main…
Q: Assume that there is no code in the programme that can be moved to a different location. What kinds…
A: In computer science, paging is a memory management technique that allows a computer to use secondary…
Q: I did submit again from 4 to 6 steps
A: here i am solving other parts i have answered step 4 , step5 , step 6
Q: Write a complete program that uses loops and methods to print the "99 Bottles of Beer" song. Your…
A: Define constants for the strings needed to convert numbers to words (e.g. "Ninety", "Eighty",…
Q: Where do batch files reside on a computer, and what do they do?
A: Batch files are plain text files with a .bat extension that contain a series of commands to be…
Q: The truth table for the Boolean expression: (A XOR B) + ((notA)(C)) = Y
A: Below is the complete solution with explanation in detail for the given question about constructing…
Q: A. Create the following three discrete-time signals, assuming a time range of [0,12] x = a box of…
A: import numpy as np # Signal xx = np.zeros(13)x[2:9] = 1 # Signal h1h1 = np.zeros(13)h1[0:4] = 1 #…
Q: What are the drawbacks of having many
A: Having numerous information systems to choose from can offer a wide range of options for…
Q: It is necessary to have a discussion on the relevance of quality assurance and software engineering.
A: Quality assurance and software engineering are two crucial elements of the software development…
Q: Can the working setting be described and explained in only 300 words?
A: In the context of computer discipline, a working setting refers to the surroundings in which…
Q: If the FSM has 11 states, how many bits must the state register store?
A: If the FSM has 11 states, then the minimum number of bits required to store the state register is 4.…
Q: What aspects of one another do they share, and what characteristics distinguish them from one…
A: The question seeks to compare and contrast two entities that are not openly Mention. However, the…
Q: What do you name the index of a Pandas Series or DataFrame that is composed of timestamps?…
A: In Pandas, indexing is crucial for efficient data manipulation and retrieval. When working with time…
Q: Describe a situation in which two different computing machines are collaborating to share a video…
A: Two computing machines are collaborating to share a video clip using an unsecured FTP (File Transfer…
Q: Computer Science In java Output should look like this: PreOrder: 1 2 5 6 9 InOrder: 1 2 5 6…
A: Here's the Java code that can read the input file, populate a binary search tree, delete nodes if…
Q: In the field of computers, could you please explain the difference between hardware and software?
A: The terms "hardware" and "software" in the context of computers refer to two distinct parts of a…
Q: Using PYTHON Implement Knuth-Morris-Pratt Algorithm
A: The KMP (Knuth-Morris-Pratt) algorithm is a popular string matching algorithm that aims to find the…
Q: Can you define a computer for me?
A: A computer is an essential component of modern life, playing a significant role in various fields…
Q: Which of the following, in light of the criteria, would be considered an example of improper…
A: In technical terminology , the terms "problem," "glitch," "issue," and "flaw" all refer to…
Q: Java Programming Joyce Farrell 14-10: Create an application for Paula’s Portraits, a photography…
A: Define a class `PaulaPortraits` that extends `JFrame` and implements the `ActionListener` interface.…
Q: Where else besides the page size may we make adjustments (without rewriting the programme)? Evaluate…
A: Hello student Greetings In computer science and information technology, system optimization and…
Q: The two most important things an operating system does should be quickly explained here.
A: Operating system An operating system (OS) is a program that helps your computer work smoothly by…
Q: Explain the link between dependability and availability as it relates to the environment of a…
A: Given, Explain the link between dependability and availability as it relates to the environment of…
Q: ven in order to begin the process of redistributing a route into EIGRP? The administrative distance,…
A: In the context of computer networking, EIGRP (Enhanced Interior Gateway Routing Protocol) is a…
Q: Provide an overview of the compiler and comment on its testability.
A: A compiler is a generalized software curriculum that translates high-level brainwashing language…
Q: A security compromise of personal information has resulted in identity theft over the past three…
A: Someone commits identity theft when they fraudulently utilize your private Information, including…
Q: Please provide an explanation of the advantages that may be gained by using the agile methodology.
A: Agile methodology is a project management approach that emphasizes flexibility, collaboration, and…
Q: Create a program in MIPS Assembler that allows you to create the following sequence of numbers: 3 6…
A: Create a program in MIPS Assembler that allows you to create the following sequence of numbers: 3 6…
Q: What exactly are the terms "information system analysis" and "information system design?"
A: The terms "information system analysis" and "information system design" are essential concepts in…
Q: You just started your summer internship with NU Bank as part of its growing development team. Your…
A: 1. Create a class called Customer with the required attributes 2. Create a method called get_age()…
Q: It is possible for those who are knowledgeable in the field of computer and network security to take…
A: Computer and network security is a critical issue in today's world, as technology plays a vital role…
Q: Explain why Random Early Detection calculates drop probability using two thresholds. Diagrams…
A: Random Early Detection (RED) is a congestion avoidance mechanism used in network routers to control…
Q: Get a printout of update.txt if you can't remember where it is saved.
A: Searching for a Specific Folder: If you remember the name of the file but don't know where it is…
Q: When passing a property on to a method in the form of a parameter, there is one requirement that…
A: When passing a property to a method as a parameter, it is essential to ensure that the parameter…
Q: Does the operating system's microkernel follow any particular design guidelines? What is the key…
A: Yes, microkernels typically follow a set of design guidelines that aim to achieve their intended…
Q: What's the difference between making sure software is good and making sure it is good? Tell me…
A: The distinction between ensuring software is "good" and ensuring it is "good enough" depends on…
Q: What are the top three characteristics of an efficient network? Think of some words to describe one…
A: Hello student Greetings Efficiency is a critical aspect of networking as it directly impacts the…
Q: The more traditional methods of acquiring software are weighed against their internet counterparts…
A: Acquiring software through traditional methods, such as purchasing physical media (e.g. CDs, DVDs)…
Q: I need help finalizing this C program assignment. [This is not a graded assignment] my code here…
A: 1. Define a Student struct containing name, grades, and other performance metrics. 2. Define a…
Step by step
Solved in 4 steps with 1 images
- Extract emails and passwords from several .txt files and rewrite them in a .txt file that is symbolic : in Python code Example: hey... email: username+123@example.com, password: 627hsjwu* these are my company credentials... See you later Now I want to place in a result.txt the email and password separated by the symbol :Challenge 3: Encryption.java and Decryption.java Write an Encryption class that encrypts the contents of a binary file. Your encryption program should work like a filter, reading the contents of one file, modifying the data into a code, and then writing the coded content out to a second file. The second file will be a version of the first file, but written in a secret code. Use a simple encryption technique, such as reading one character at a time, and add 10 to the character code of each character before it is written to the second file. Come up with your own encryption method. Also write a Decryption class that reads the file produced by the Encryption program. The decryption file will use the method that you used and restore the data to its original state, and write it to a new file.IN PYTHON: Decrypting with ascii I have a file called 'dict.txt'. This file contains over 50,000 english words. One word from this file is used as a key (we do not know which one of course). Some have capital letters. I have another file called 'decrypt.txt' which is a file containing a string of numbers i must decrypt using a key found in the 'dict.txt'. This 'decrypt.txt' file message has length of 300. My question is, since i do not know which word (from the file with the 50,000+ words) is the key I must use to decrypt the other file, how do I write a function that: loops through all possible keys from 'dict.txt' to find the one that decrypts my file 'decrypt.txt' best? Somehow i must count how many 'words' are actual words to determine which key is best and then print my final decrypted message.
- This is a python file Fix this code and the output is the attachment #filename: modValidateEmail.py def isValidMSUMEmail(email): if email.count('@') != 1: return False tmp= email.split('@') if len(tmp) == 0: return False userName = tmp[0] if not userName[0].isalpha(): return False for c in userName: if not c.isalpha() and c != '.': return False inst= tmp[1] if inst != 'mnstate.edu': return False else: return True #filename: UnitTestValidEmail.py from unittest import * from modValidateEmail import * class TestValidEmail(TestCase): #create a subclass of unittest.TestCase def testUserName(self): self.assertEqual(isValidMSUMEmail('.joe@mnstate.edu'),False) self.assertEqual(isValidMSUMEmail('joe4@mnstate.edu'),False) self.assertEqual(isValidMSUMEmail('joe$smith@mnstate.edu'),False) self.assertEqual(isValidMSUMEmail('joe.smith@mnstate.edu'),True) def…Could you help me with this one too, please Regex, APIs, BeautifulSoup: python import requests, refrom pprint import pprintfrom bs4 import BeautifulSoup complete the missing bodies of the functions below: def group_chat(text_message, friend):"""Question 2- Your friends are blowing up your group chat. Given a string of text messagesfrom your friends and a specific friend's name, return the first text messagethey sent, excluding their name.- Each text message ends with either a ?, !, or .- Your code must be written in one line. Args:text_message (astr)friend (astr)Returns:str of first match>>> text_message = "Madison: How are you guys going today?" + \"Anna: I'm doing pretty well!" + \"Madison: That's good to hear. How is everyone else?">>> friend = "Madison">>>group_chat(text_message, friend)How are you guys going today?"""pass test code: # text_message = "Madison: How are you guys going today?" + \# "Anna: I'm doing pretty well!" + \#…Using Python Focus on string operations and methodsYou work for a small company that keeps the following information about its clients: • first name• last name • a 5-digit user code assigned by your company.The information is stored in a file clients.txt with the information for each client on one line(last name first), with commas between the parts. For exampleJones, Sally,00345Lin ,Nenya,00548Fule,A,00000Smythe , Mary Ann , 00012Your job is to create a program assign usernames for a login system. First: write a function named get_parts(string) that will that will receive as its arguments a string with the client data for one client, for example “Lin ,Nenya,00548”, and return the separate first name, last name, and client code. You should remove any extra whitespace from the beginning and newlines from the end of the parts.You’ll need to use some of the string methods that we covered in this lessonYou can test your function by with a main() that is just the function call with the…
- Using Python Focus on string operations and methodsYou work for a small company that keeps the following information about its clients: • first name• last name • a 5-digit user code assigned by your company.The information is stored in a file clients.txt with the information for each client on one line(last name first), with commas between the parts. For exampleJones, Sally,00345Lin ,Nenya,00548Fule,A,00000Smythe , Mary Ann , 00012Your job is to create a program assign usernames for a login system. First: write a function named get_parts(string) that will that will receive as its arguments a string with the client data for one client, for example “Lin ,Nenya,00548”, and return the separate first name, last name, and client code. You should remove any extra whitespace from the beginning and newlines from the end of the parts.You’ll need to use some of the string methods that we covered in this lessonYou can test your function by with a main() that is just the function call with the…Write a python program that scans in a large number of tweets from a file, and prints the top 5 hashtags. Approach Parse each word in the file Find a way to isolate the hashtags from the rest of the tweet Compute the frequency of each unique hashtag. Find the top 5 hashtags. Caveats 1. Because this is public dataset, there are many tweets that use special characters that may cause issues during reading in your file. To avoid this, explicitly specify the encoding mode in open when reading in the file. with open('twitter_data.txt', 'r', encoding='utf8') as f: 2. When parsing hashtags be sure to change everything to lowercase. There are cases in the file where two hashtags are the same but differ in case. 3. There is no standard way of sorting a dictionary based on the values. Python gives you access to a sorted function where you can pass in a collection and also specify a comparator which outlines how you want to sort the values. This can be done with a one line lambda function.Write a java program that: 1. Create a file with the name "BankAccount.txt" and has the following content (the account name, account number and balance of each account) The file will look like this: Amani Ali 12345432 500 Sarah Mohammad 456663343 4000 Omimah khalid 998787655 2000 Monirah Ahmad 55433424 10000 2. Read the file "BankAccount.txt" content one by one and increase the balance by 50% for each account, then write the result in a new file with the name "UpdatedAccount.txt". The new file content should have the following structure: Amani Ali 12345432 750 Sarah Mohammad 456663343 6000 Omimah khalid 998787655 3000 Monirah Ahmad 55433424 15000 3. Read an account number from the user and search the file "UpdatedAccount.txt", then print all the information of this account if exists, otherwise display a message "this account not found". Note:- Search google to find some of the built-in methods to help you in this program, such as trim(), split(), equals(), Integer.parseInt().
- USE JAVA Write the code for this program to work: A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991 An example of the program is shown below: Enter name to look up. Type 'quit' to quit. Gina Gina's phone number is…Write a PHP program to demonstrate the concept of Forms and File handling e.g Write a PHP program to write 20 integers in to a text file. Read 10 numbers at a time randomly from the file using PHP script and find the numbers which occurs odd number of times.Please do this in PYTHON PROGRAMMING Write an address book program that stores your contacts' names and their email addresses. The names and email addresses are originally stored in a file called phonebook.in, in the format:Harry P..d@hogwarts.eduHermione G..h@hogwarts.eduRon W..b@hogwarts.eduDraco M..s@hogwarts.eduSeverus S..e@hogwarts.eduAlbus D..x@hogwarts.eduYour program should read from the file, storing the names and corresponding email addresses in a dictionary as key-value pairs. Then, the program should display a menu that lets the user enter the numbers 1 through 5, each corresponding to a different menu item:1) look up an email address2) add a new name and email address3) change an email address4) delete a name and email address5) save address book and exitWhen the user enters 1, the program should prompt them for a name, and then print the corresponding email address. If there is no dictionary entry under that name, the program should print, "Sorry, no contact exists…