1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
10

You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm s

ure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied
Computers and Technology
1 answer:
erma4kov [3.2K]3 years ago
6 0

Answer:

<em>The program written in Python is as follows (See Explanation Section for detailed explanation)</em>

password = "chEEzburg3rz"

userpassword = input("Enter Password: ")

if userpassword == password:

     print("Access granted....")

else:

     print("Access Denied")

Explanation:

The programming language was not stated; However, I answered your question using Python

The line initializes the password to chEEzburg3rz"

password = "chEEzburg3rz"

This line prompts user for input

userpassword = input("Enter Password: ")

This if condition checks if user input corresponds with the initialized password

if userpassword == password:

<em>      print("Access granted....")  </em>If yes, this line is executed

else:

<em>      print("Access Denied")  </em>If otherwise, this line is executed

You might be interested in
What is a functional simulation?
Anika [276]
D) a type of training that allows...
4 0
3 years ago
you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid
Genrish500 [490]

Question options:

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

Answer:

d. RAID 6

Explanation:

RAID is Redundant Array of Inexpensive/Independent Disks. RAID combines low cost physical hard disk drives in one hard disk drive. RAID is used to achieve data redundancy(data backup but with synchronization) or improved performance or both.

To get what the director requires he would need to use RAID 6. RAID 6 is RAID level optimized to achieve data redundancy but with slow performance.

7 0
2 years ago
he transport layer on the destination host O reassembles the application message if it has been fragmented O removes the transpo
Dafna1 [17]

Answer: Both A and B

Explanation: Transport layer is the level of the OSI model which is helpful in maintaining the overall network communication.The application process that is being executed in the layers of architecture gets logical communication through transport layer.

It has the ability to connect the data that has been divided into section for the transportation.It can also act on the transport header ,which finds the transmission flow of specific data when not required.

4 0
3 years ago
When considering changing the content of a cell which button should you press to leave the cell as it originally was?
densk [106]
Esc key or cancel .........
7 0
3 years ago
Read 2 more answers
To turn off the AutoCorrect features, navigate to the AutoCorrect menu and deselect the box labeled_____.
barxatty [35]
Option A-Show AutoCorrect buttons, then you have the options to hide the autocorrect or to turn it on/off
4 0
3 years ago
Read 2 more answers
Other questions:
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • How many host ip addresses are available on a network with a subnet mask of 255.255.255.192?
    6·1 answer
  • If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? Wha
    10·1 answer
  • When you want to avoid sending email that a recipient may feel their privacy has been invaded, how would you fill in the (To) bo
    13·1 answer
  • What laptops can you get for 2500$ and should mostly using Microsoft applications.
    14·2 answers
  • Please help me
    10·1 answer
  • 3.<br>Give two reasons why everyone should study technology<br>​
    10·1 answer
  • Write any two disadvantage of First generations computers​
    14·1 answer
  • So I tried asking for help with my code on stackoverflow but the people there were very condescending and mean plus my questions
    7·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!