Skip to navigation Skip to content
Your Cart
  • × Create a cash register application for a fish and chips tuck shop. The application must have the following controls: 1. Combo box - combo boxes for chips with small, medium, and large options and fish with options snoek and hake. 2. Check box - check box to either choose a cool drink or rolls, or both. 3. Quantity text field - text fields to specify the quantity of the product being bought. 4. Amounts text fields - text fields for total, amount paid, and change amount. NB. The user must make selections (chips, fish, cool drink, or roll) and specify the quantity. In the amount text fields, the user must only enter the amount paid, and the app must calculate the total price and the change amount. Product price list:Create a cash register application for a fish and chips tuck shop. The application must have the... 1 × $30.00

Subtotal: $30.00

View cartCheckout

Gotit Pro
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • My Account
  • Customer Help
  • Checkout
$30.00 1
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • Home
  • Why Us
  • Store
  • Tracking
  • Blog
  • Contact us
  • My Account

Browse

  • My Account
  • Customer Help

Want to chat?

Call us toll free +1 789 2000

Social

  • Facebook
  • Twitter
  • Instagram
$30.00 1
Home / Computer Science / Python / Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times.
“Create a cash register application for a fish and chips tuck shop. The application must have the…” has been added to your cart. Continue shopping
Checkout View Cart
🔍
Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process. This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts Ex: If the input is: input1.csv and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts) bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4 the output is: Anomaly login attempts: nancy:8 thomas:23 zach:22 charlotte:4 Ex: If the input is: input2.csv and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts) the output is: No anomaly login attempts Note: There is a newline at the end of the output, and input1.csv is available to download.
Create a program that generates 1000 random integers between 1 and 100 (both included) and save them into a list. Create a program that generates 1000 random integers between 1 and 100 (both included) and save them into a list. $10.00 Original price was: $10.00.$5.50Current price is: $5.50.
Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. Next the program will accept input of two strings representing a potential user name, and password. The files should be read using the file.readlines( ) method. Your program should output the attempted login and password with a message that it was a successful or unsuccessful brute force attempt. Ex: If the input is: input1pass.txt input1shadow.txt bobpickle pa$$w0rd and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: the output is: Brute Force Attempt: Login: user1 Password: XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login: user2 Password: LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login: user3 Password: &^334294kksri. Unsuccessful brute force attempt Ex: If the input is: input2pass.txt input2shadow.txt demo123 password and the contents of input1pass.txt are: user1:x:15:51:User One:/home/user1:nologin user2:x:16:52:User One:/home/user1:nologin user3:x:17:53:User One:/home/user1:nologin demo123:x:18:54:Demo User:/home/demo123:nologin and the contents of the input1shadow.txt are: user1:XXPP192920r:15045:0:99999:7::: user1:LLmm928393x:15046:0:99999:7::: user1:&^334294kksri.:15047:0:99999:7::: demo123:password:15048:0:99999:7::: the output is: Brute Force Attempt: Login: user1 Password: XXPP192920r Unsuccessful brute force attempt Brute Force Attempt: Login: user2 Password: LLmm928393x Unsuccessful brute force attempt Brute Force Attempt: Login: user3 Password: &^334294kksri. Unsuccessful brute force attempt Brute Force Attempt: Login: demo123 Password: password Successful brute force attempt Downloadable files input1pass.txt and input1shadow.txt Write a program that first reads in the name of two input files; input1pass.txt and input1shadow.txt. These files will contain encrypted and non-encrypted passwords to simulate a Brute Force approach. $14.00 Original price was: $14.00.$10.00Current price is: $10.00.
Sale!

Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times.

$7.00 Original price was: $7.00.$5.00Current price is: $5.00.

-29%

Download button will appear immediately after successful payment.

Book your next exam with us and get A+ in entire semester, guaranteed!

Rated 5.00 out of 5 based on 1 customer rating
(2 customer reviews)

Free worldwide shipping on all orders over $50

  • 30 days easy returns
  • Order yours before 2.30pm for same day dispatch
Guaranteed Safe Checkout

Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process. This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts Ex: If the input is: input1.csv and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts) bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4 the output is: Anomaly login attempts: nancy:8 thomas:23 zach:22 charlotte:4 Ex: If the input is: input2.csv and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts) the output is: No anomaly login attempts Note: There is a newline at the end of the output, and input1.csv is available to download.
Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times.
Rated 5.00 out of 5
$7.00 Original price was: $7.00.$5.00Current price is: $5.00.
  • Description
  • Reviews 2

Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process. This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts Ex: If the input is: input1.csv and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts) bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4 the output is: Anomaly login attempts: nancy:8 thomas:23 zach:22 charlotte:4 Ex: If the input is: input2.csv and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts)  the output is: No anomaly login attempts Note: There is a newline at the end of the output, and input1.csv is available to download.

Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process.

This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas.

Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts

Ex: If the input is:

input1.csv

and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts)

bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4

the output is:

Anomaly login attempts:
nancy:8
thomas:23
zach:22
charlotte:4

Ex: If the input is:

input2.csv

and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts)


the output is:

No anomaly login attempts

Note: There is a newline at the end of the output, and input1.csv is available to download.

2 reviews for Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times.

  1. Rated 5 out of 5

    Kathy Henley – August 8, 2022

    I got 96% on this assignment. Anything above 95% is great in my book!

  2. Rated 5 out of 5

    Glenn Mccall – August 8, 2022

    Great service! I had an assignment theory to be done and wasn’t specific enough from my side on what I exactly needed it for. Even after messaging the expert one day before, they had it done the next day by the time I requested last minute.

Only logged in customers who have purchased this product may leave a review.

SKU: 3215 Category: Python Tags: and the contents of input1csv are store time as integers and use military time to simulate am and pm attempts, and the contents of input2csv are store time as integers and use military time to simulate am and pm attempts, CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process, Change detection CD is a method used to track changes in your network, If the login attempt is made after hours store the user name and login time in a dictionary with the user name as the key, If there are no questionable login attempts display No anomaly login attempts, It will use an input file to store data and read the file using the csvreader method, Note There is a newline at the end of the output and input1csv is available to download, Securing a network from attacks means a network administrator is watching traffic and user activity, The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt, The file will contain a list of login_names followed by login_time separated by commas, This program is going to manage user login times and attempt to detect any change in a users typical login attempts, Write a program that first reads in the name of an input file reads the information stored in that file and determines if the user login has occurred at off hour times

Related products

  • -50%
    The fourth assignment involves writing a Python program to compute the average quiz grade for a group of five students.

    Python

    The fourth assignment involves writing a Python program to compute the average quiz grade for a group of five students.
    $10.00 Original price was: $10.00.$5.00Current price is: $5.00. Add to cart
  • -33%
    Write a program that will find the total, average, max, min of the numbers

    Python

    Project 6 – Using List | Write a program that will find the total, average, max, min of the numbers.
    Rated 5.00 out of 5
    $15.00 Original price was: $15.00.$10.00Current price is: $10.00. Add to cart
  • Write a program that keeps names and emails addresses in a dictionary as key-value pairs

    Python

    Write a program that keeps names and emails addresses in a dictionary as key-value pairs
    $10.00 Add to cart
  • -33%
    Write a program that will find the sum of the digits of an integer.

    Python

    Project 8 – String manipulation | Write a program that will find the sum of the digits of an integer
    Rated 5.00 out of 5
    $15.00 Original price was: $15.00.$10.00Current price is: $10.00. Add to cart
Free Worldwide shipping

On all orders above $50

Easy 30 days returns

30 days money back guarantee

International Warranty

Offered in the country of usage

100% Secure Checkout

PayPal / MasterCard / Visa

We are providing the cheapest online ready-to-use datasets and impeccable digital services since 2020.

We are a one-stop-shop for all your digital needs.

Help
  • Contact Us
  • My Account
  • Order Tracking
  • Terms & Conditions
  • FAQ
Follow
  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • Youtube
Over 1,000 5-star reviews

Footer reviews

★★★★★
“Amazing digital services for prices I didn’t think were possible.”
Matt P.

2025 © Gotit Pro Inc.