subject

Create an application that will check for valid passwords. The following rules must be followed to create a valid password. 1. At least 8 characters long
2. At least 1 numeric character
3. At least 1 uppercase alphabetic character
4. At least 1 lowercase alphabetic character
5. No more than 2 of the same character in a sequence Hello123 – OK AAAbb123 – not OK Aaabb123 – OK
Operation: When the application begins, the user will be presented with a screen that states the above instructions for creating a password, two text entry boxes for typing in a password, and three buttons.
If the user wants to check a single password, they will type in the password in both boxes and select the "Check Password" button.
If the user wants to read in and check a list of passwords, they will select the "Check Passwords in File" button, be presented with a file explorer, and select the file to read from. Those passwords that failed the check will be displayed, with their error message. If the user presses the "Alt" key, a letter will be underlined in each button label. That letter is the "mnemonic" that can used as a shortcut (Alt plus the letter) to execute the button.
If the user hovers his cursor over a button, a tooltip will be shown.
Specifications: The Data Element String
The Data Structure ArrayList of Strings
The Data Manager Create a PasswordChecker class that implements PasswordCheckerInterface. The PasswordChecker class will have at least two methods: One method that checks the validity of one password that returns true if the password is valid and that throws an exception if invalid. One that checks an ArrayList of passwords and returns an ArrayList with the status of any invalid passwords. The ArrayList of invalid passwords will be of the following format: Create exception classes for each exception listed in PasswordCheckerInterface. java. Always check for the length of the password first, since that is the easiest and fastest check. Once the password fails one rule, you do not need to check the rest of the rules.
The GUI
• Provide buttons to allow user to check validity of one password or a file of passwords.
• Ask the user to enter the password and to re-type the password. If the two are not the same, inform the user.
• Create a tool tip and a mnemonic for each of the buttons.
• Use a FileChooser for the user to select the input file.
• Use methods of PasswordChecker to process the passwords.
• Use try/catch structure to catch exceptions thrown by PasswordChecker methods
Exceptions
Provide exception classes for the following:
1. Length of password is less than 8 characters (class LengthException) Message – The password must be at least 8 characters long
2. Password doesn’t contain an uppercase alpha character (class NoUpperAlphaException) Message – The password must contain at least one uppercase alphabetic character
3. Password doesn’t contain a lowercase alpha character (class NoLowerAlphaException) Message – The password must contain at least one lowercase alphabetic character
4. Password doesn’t contain a numeric character (class NoDigitException) Message – The password must contain at least one digit
5. Password contains more than 2 of the same character in sequence (class InvalidSequenceException) Message – The password cannot contain more than two of the same character in sequence.
6. For GUI – check if Password and re-typed Password are identical (class UnmatchedExcpetion) Message – The passwords do not match
import java. util. ArrayList;
public interface PasswordCheckerInterface {
public boolean isValidPassword (String passwordString) throws LengthException, NoDigitException, NoUpperAlphaException, NoLowerAlphaException, InvalidSequenceException;
public ArrayList validPasswords (ArrayList passwords);}

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 15:30
The song about casey jones a railroad engineer who gives his life on the job would most likely gall under the folk song category of? a-work song b-nonsense song c-religious song d-ballad
Answers: 1
question
Computers and Technology, 24.06.2019 01:00
Me if you do then you get 10 points and brainliest
Answers: 1
question
Computers and Technology, 24.06.2019 08:00
Can someone work out the answer as it comes up in one of my computer science exams and i don't understand the cryptovariables
Answers: 1
question
Computers and Technology, 24.06.2019 15:20
Local area networks use many of the same network technologies and the internet, only on a smaller scale. devices that access lans are equipped with a network interface that contains circuitry for wireless or wired connections. devices also have a physical address, in addition to the ip addresses acquired from a dhcp server. the most popular wired technology is . the most popular wireless technology is , which can be configured as a(n) or star topology. setting up a lan and configuring its router is fairly easy. the first step is to change the standard to one that is secure. next, create a(n) that uniquely identifies the network by name. it is also important to activate wireless to prevent wireless signals from being intercepted during transmission. a limited-access network can be created for visitors to use. by activating , the router will be able to assign ip addresses to each device that joins the network. to connect to a secure lan that is protected by encryption, an encryption , or password, is required. lans can be used to access data collected by iot devices and the networks that tie these devices together. technologies such as rfid, nfc, bluetooth smart, zigbee, and z-wave offer -power links, essential for battery-powered devices that can’t expend excess amounts of energy transmitting data.
Answers: 1
You know the right answer?
Create an application that will check for valid passwords. The following rules must be followed to c...
Questions
question
English, 05.05.2021 21:00
question
Mathematics, 05.05.2021 21:00
Questions on the website: 13722361