1. Create and call a function to: Open a text file for storing the user information. The file must
be opened so that entered data is added to the data already in the file. 2. Create and call a
function to use a loop that will obtain user input until terminated by the user typing End. Allow
the user to input a user ID, password, and authorization code. Validate that only Admin or User
is entered as an authorization code. Write the user ID, password, and validation code as a pipe-
delimited list to the text file. 3. After the user terminates the data entry loop, create and call a
new function that will: Open the text file that contains the user login information. Display the
user ID, password, and authorization code for all users. 4. Create and call a function for login
process: Open the text file with the user login information. Read each record from the file and
store the user ID, password, and authorization code in a list object. Note: Multiple list objects
may be needed for this functionality. Enter a user ID. Validate the user ID by reading the list
object. If the user does not exist, display an appropriate message and exit the application. If the
user ID is valid, store the authentication code in a variable. If the user ID is invalid, display a
message and terminate the application. 5. Modify code for authorization functionality: If the
authorization code is Admin, allow the user to enter and display data. If the authorization code is
User, allow the user to display data only. Modify the display of the data and totals to first
display the user ID and authorization code. Ensure all functionality is working correctly and
code is written efficiently. For purposes of this assignment, writing code efficiently is defined as:
Using correct naming conventions for all variables and objects. Using correct naming
conventions for functions and methods. Using built-in functions whenever possible. Using the
fewest lines of code needed to return multiple values from functions. Using the fewest lines of
code needed to complete the functionality defined. 6. Submit the Python source code files and a
Word document that contains a screenshot of input and display for user login information and of
data entry and the display of detail and totals when the authorization code is Admin; a screenshot
of display of detail and totals only when the authorization code is User." Include a 12 sentence
reflection on the successes and challenges you had with this assignment.

More Related Content

DOC
SRS wifistudy.com
DOCX
Using the application code in W1 Assignment 3, you will further ex.docx
PDF
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
DOC
Step by step exercise for bw 365
PPTX
ASP.NET Lecture 5
PPT
EMPLOYEE WELFARE ASSOCIATION NTPC
PPTX
Job Portal
 
PPTX
STOCK MARKET TIPS
SRS wifistudy.com
Using the application code in W1 Assignment 3, you will further ex.docx
Developing Dynamic PeopleSoft Field Security Applications:A PeopleSoft Develo...
Step by step exercise for bw 365
ASP.NET Lecture 5
EMPLOYEE WELFARE ASSOCIATION NTPC
Job Portal
 
STOCK MARKET TIPS

Similar to 1. Create and call a function to � Open a text file for storing the.pdf (20)

PPT
Requirements Tool
DOCX
Attach
DOCX
Api testing bible using postman
PPTX
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
PPT
Shibboleth 2.0 IdP slides - Installfest (Edited)
PPTX
Mvc by asp.net development company in india - part 2
DOCX
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
PPTX
AndroidLab_IT.pptx
PDF
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
PPTX
Delma Hagen Portfolio
DOCX
E-LEARNING
PPTX
Multi attribute login feature
PDF
How to create profile creation. (1).pdf
DOCX
My Conference Android ApplicationProject ProposalCourse Na.docx
PDF
Document of Record
DOCX
eProject Expo Management System - Report
PPTX
PPT ch 3 Requirement Analysis and Specification.pptx
DOCX
1 Goals. 1. To use a text file for output and later for in.docx
PDF
SOP_ERP_AdministrationModule
PPTX
Event Management System Document
Requirements Tool
Attach
Api testing bible using postman
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
Shibboleth 2.0 IdP slides - Installfest (Edited)
Mvc by asp.net development company in india - part 2
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
AndroidLab_IT.pptx
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Delma Hagen Portfolio
E-LEARNING
Multi attribute login feature
How to create profile creation. (1).pdf
My Conference Android ApplicationProject ProposalCourse Na.docx
Document of Record
eProject Expo Management System - Report
PPT ch 3 Requirement Analysis and Specification.pptx
1 Goals. 1. To use a text file for output and later for in.docx
SOP_ERP_AdministrationModule
Event Management System Document

More from agaramjareld (20)

PDF
1. Which of the following is not among the two ways in which profess.pdf
PDF
1. What is the state of democracy in that country How does that co.pdf
PDF
1. What is bathymetry How is it different from topography2. Desc.pdf
PDF
1. Watch and reflect on the movie Wit.2. write one page paper re.pdf
PDF
1. Vade yapsnn likidite primi teorisi Yant se�enekleri grubu a.B.pdf
PDF
1. Una revisi�n cr�tica de la literatura de las teor�as clave sobre .pdf
PDF
1. Una fuente primaria de capital contable es a.ingresos retenidos.pdf
PDF
1. The importance of service and civic engagement as a family value .pdf
PDF
1. The roots of this plant are using the same mechanism as the s.pdf
PDF
1. The materiality of an item of financial information refers to the.pdf
PDF
1. Sabit �cretler ile deiken �cretler arasnda birka� fark vardr. B.pdf
PDF
1. Si Susan le diera efectivo a su padre por su cumplea�os y �l depo.pdf
PDF
1. Preparar asientos para registrar tanto la declaraci�n de dividend.pdf
PDF
1. Pregunta 1 Imagina que tienes dos amigos de la infancia de fu.pdf
PDF
1. Patient X is diagnosed with salmonellosis, an infection caused by.pdf
PDF
1. Management in Action davasnda anlatlan �niversiteye kabul skandal.pdf
PDF
1. Kropotkin cree que la regla de la naturaleza no es competir sino .pdf
PDF
1. Cvanide poisoning works by inhibiting Complex lV in the electron .pdf
PDF
1. Ksa vadeli y�k�ml�l�kler A. Ksa vadeli y�k�ml�l�klerin tanm.pdf
PDF
1. Joyce trabaja por contrato ayudando a las empresas a inventariar .pdf
1. Which of the following is not among the two ways in which profess.pdf
1. What is the state of democracy in that country How does that co.pdf
1. What is bathymetry How is it different from topography2. Desc.pdf
1. Watch and reflect on the movie Wit.2. write one page paper re.pdf
1. Vade yapsnn likidite primi teorisi Yant se�enekleri grubu a.B.pdf
1. Una revisi�n cr�tica de la literatura de las teor�as clave sobre .pdf
1. Una fuente primaria de capital contable es a.ingresos retenidos.pdf
1. The importance of service and civic engagement as a family value .pdf
1. The roots of this plant are using the same mechanism as the s.pdf
1. The materiality of an item of financial information refers to the.pdf
1. Sabit �cretler ile deiken �cretler arasnda birka� fark vardr. B.pdf
1. Si Susan le diera efectivo a su padre por su cumplea�os y �l depo.pdf
1. Preparar asientos para registrar tanto la declaraci�n de dividend.pdf
1. Pregunta 1 Imagina que tienes dos amigos de la infancia de fu.pdf
1. Patient X is diagnosed with salmonellosis, an infection caused by.pdf
1. Management in Action davasnda anlatlan �niversiteye kabul skandal.pdf
1. Kropotkin cree que la regla de la naturaleza no es competir sino .pdf
1. Cvanide poisoning works by inhibiting Complex lV in the electron .pdf
1. Ksa vadeli y�k�ml�l�kler A. Ksa vadeli y�k�ml�l�klerin tanm.pdf
1. Joyce trabaja por contrato ayudando a las empresas a inventariar .pdf

Recently uploaded (20)

PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
My India Quiz Book_20210205121199924.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
advance database management system book.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
B.Sc. DS Unit 2 Software Engineering.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
HVAC Specification 2024 according to central public works department
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Empowerment Technology for Senior High School Guide
Virtual and Augmented Reality in Current Scenario
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Journal of Dental Science - UDMY (2021).pdf
International_Financial_Reporting_Standa.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
My India Quiz Book_20210205121199924.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
advance database management system book.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf

1. Create and call a function to � Open a text file for storing the.pdf

  • 1. 1. Create and call a function to: Open a text file for storing the user information. The file must be opened so that entered data is added to the data already in the file. 2. Create and call a function to use a loop that will obtain user input until terminated by the user typing End. Allow the user to input a user ID, password, and authorization code. Validate that only Admin or User is entered as an authorization code. Write the user ID, password, and validation code as a pipe- delimited list to the text file. 3. After the user terminates the data entry loop, create and call a new function that will: Open the text file that contains the user login information. Display the user ID, password, and authorization code for all users. 4. Create and call a function for login process: Open the text file with the user login information. Read each record from the file and store the user ID, password, and authorization code in a list object. Note: Multiple list objects may be needed for this functionality. Enter a user ID. Validate the user ID by reading the list object. If the user does not exist, display an appropriate message and exit the application. If the user ID is valid, store the authentication code in a variable. If the user ID is invalid, display a message and terminate the application. 5. Modify code for authorization functionality: If the authorization code is Admin, allow the user to enter and display data. If the authorization code is User, allow the user to display data only. Modify the display of the data and totals to first display the user ID and authorization code. Ensure all functionality is working correctly and code is written efficiently. For purposes of this assignment, writing code efficiently is defined as: Using correct naming conventions for all variables and objects. Using correct naming conventions for functions and methods. Using built-in functions whenever possible. Using the fewest lines of code needed to return multiple values from functions. Using the fewest lines of code needed to complete the functionality defined. 6. Submit the Python source code files and a Word document that contains a screenshot of input and display for user login information and of data entry and the display of detail and totals when the authorization code is Admin; a screenshot of display of detail and totals only when the authorization code is User." Include a 12 sentence reflection on the successes and challenges you had with this assignment.