subject

having a secure password is a very important practice, particularly when much of our personal information is stored online.

write a program that validates a new password, following these 4 rules:

the password must be at least 8 characters long.
the password must have at least one upper case letter.
the password must have at least one lower case letter.
the password must have at least one digit.
1) your program should ask for a password, and then check first to see if the password is valid (i. e., conforms to the specifications outlined above.) if not, the program should allow the user to continue to enter passwords until s/he enters a valid password.

2) then your program should confirm the password by requesting that the user enter the password again, and verify that the two match. if they don't match, allow the user to try it again (for a total of 3 tries only).

you will need a minimum of two methods, one to confirm the two passwords, and at least one (or more) to check to see if the password meets the 4 required specifications outlined above.

carefully examine and follow all the program requirements. make sure you use prologue comments for your program, including prologue comments for each of your methods. you will find both the java string methods as well as the character class methods immensely for this lab. use comments as well for any part of your code that may not be self-explanatory or may require some additional documentation.

you will find both the java string methods as well as the character class methods immensely for this

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 09:30
The place where the extended axis of the earth would touch the celestial sphere is called the celestial
Answers: 1
question
Computers and Technology, 24.06.2019 15:30
What type of forensic evidence was recovered during the bomb set off at the new mexico facility on the video that was similar to the evidence obtained at the boston bombings and how did the evidence allow the researchers to connect other pieces of evidence to the same bomb?
Answers: 2
question
Computers and Technology, 24.06.2019 15:50
Andy would like to create a bulleted list. how should he do this? andy should click on the bullet icon or select the bullet option from the menu and then type the list. andy should press the shift key and the 8 key at the beginning of each line of text. andy should type the text and then click on the bullet command. andy should press return and the bullets will automatically
Answers: 2
question
Computers and Technology, 24.06.2019 20:00
Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices.true/fasle
Answers: 2
You know the right answer?
having a secure password is a very important practice, particularly when much of our personal inform...
Questions
question
Social Studies, 18.12.2019 01:31
question
Mathematics, 18.12.2019 01:31
question
Biology, 18.12.2019 01:31
question
Mathematics, 18.12.2019 01:31
question
Social Studies, 18.12.2019 01:31
question
Health, 18.12.2019 01:31
Questions on the website: 13722367