please create a python script for the practice exercise with an explanation. I provided my starter code and my desired outcome in the images. my starter code: ## Program to generate emailId and temporary password given a students's fullname ## for funnyville highschool following given guidelines. import random # Useful global constants SPECIAL_CHARS = ['!', '@', '#', '$', '%', '*'] def generate_EmailID(fullname): ''' Generate and return email id. takes the user’s full name in the form “First Last” Generates and returns email id which is all lower case. is of the form “last.first@fhs.edu” Ex: if fullname is "John Doe", emailID will be "doe.john@fhs.edu". ''' emailID = "" pass #IMPLEMENT THIS return emailID def generate_Password(fullname): '''Generates and returns temporary password such that: The temporary password starts with the first 2 letters of the first name, made lower case. followed by a number that's product of the lengths of the first and last name followed by a single random letter from '!@#$%*' followed by the last 2 letters of the last name, made upper case. Ex: if fullname is "John Doe" possible passwords generated could be: "jo12%OE" or "jo12$OE" ''' passwd = "" pass #IMPLEMENT THIS return passwd def main(): print("Welcome to Funnyville High School registration") ans = 'y' while (ans == 'y'): fullname = input("\nEnter your full name: ").strip() email = generate_EmailID(fullname) password = generate_Password(fullname) # Give user email id and password print("Your FHS email id: " + email) print("Your temporary passwd: " + password) #prompt to check if want to continue ans = input("\nContinue?(y/n)").lower() print("Good Bye!") if __name__ == "__main__": main() In that file implement the functions listed below by following the guidelines given. Assume the user enters the full name as "First Last". (No need to validate input) generate_EmailID: This function takes the user’s full name in the form “First Last” and creates and returns the email id by using these rules: The email id is all lower case. email id is of the form “last.first@fhs.edu”. e.g. For "John Doe" it will be "doe.john@fhs.edu". See sample runs above. generate_Password: This function takes the user's full name and generates and returns a temporary password by using these rules. The temporary password starts with the first 2 letters of the first name, made lower case. followed by a number which is the product of the lengths of the first and last name followed by a single random letter from these special characters: '!', '@', '#', '$', '%', '*' followed by the last 2 letters of the last name, made upper case. So for "John Doe" possible passwords generated could be: "jo12%OE" or "jo12$OE" See sample runs above. The starter file has a global list of the special characters SPECIAL_CHARS and an import statement which you will find useful.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

 please create a python script for the practice exercise with an explanation. I provided my starter code and my desired outcome in the images.

my starter code:

## Program to generate emailId and temporary password given a students's fullname
## for funnyville highschool following given guidelines.

import random

# Useful global constants
SPECIAL_CHARS = ['!', '@', '#', '$', '%', '*']

def generate_EmailID(fullname):
''' Generate and return email id.
takes the user’s full name in the form “First Last”
Generates and returns email id which
is all lower case.
is of the form “last.first@fhs.edu”
Ex: if fullname is "John Doe", emailID will be "doe.john@fhs.edu".
'''
emailID = ""
pass #IMPLEMENT THIS
return emailID

def generate_Password(fullname):
'''Generates and returns temporary password such that:
The temporary password
starts with the first 2 letters of the first name, made lower case.
followed by a number that's product of the lengths of the first and last name
followed by a single random letter from '!@#$%*'
followed by the last 2 letters of the last name, made upper case.
Ex: if fullname is "John Doe" possible passwords generated
could be: "jo12%OE" or "jo12$OE"
'''
passwd = ""
pass #IMPLEMENT THIS
return passwd

def main():
print("Welcome to Funnyville High School registration")
ans = 'y'
while (ans == 'y'):
fullname = input("\nEnter your full name: ").strip()
email = generate_EmailID(fullname)
password = generate_Password(fullname)
# Give user email id and password
print("Your FHS email id: " + email)
print("Your temporary passwd: " + password)

#prompt to check if want to continue
ans = input("\nContinue?(y/n)").lower()

print("Good Bye!")


if __name__ == "__main__":
main()

In that file implement the functions listed below by following the guidelines given. Assume the user enters the full name as "First Last". (No need to validate input)

generate_EmailID: This function takes the user’s full name in the form “First Last” and creates and returns the email id by using these rules:
The email id is all lower case.
email id is of the form “last.first@fhs.edu”. e.g. For "John Doe" it will be "doe.john@fhs.edu".
See sample runs above.
generate_Password: This function takes the user's full name and generates and returns a temporary password by using these rules. The temporary password
starts with the first 2 letters of the first name, made lower case.
followed by a number which is the product of the lengths of the first and last name
followed by a single random letter from these special characters: '!', '@', '#', '$', '%', '*'
followed by the last 2 letters of the last name, made upper case.
So for "John Doe" possible passwords generated could be: "jo12%OE" or "jo12$OE"
See sample runs above.
The starter file has a global list of the special characters SPECIAL_CHARS and an import statement which you will find useful.

Python 381 Shell
Ble Edt She Debug Options Window Help
Melcome to Punnyville High School registration
**
Enter your full name: John Doe
Your FHS email id: doe.johne fha.edu
Your temporary pasawd: jo1200E
Continue? ty/n)y
Enter your full name: Harry Potter
Your FHS email id: potter.harryeths.edu
Your temporary passwd: ha3ONER
Continue? ly/n) y
Enter your full name: ronald veasley
Your PHS email id: weasley.ronalde ths.edu
Your temporary pasawd: ro42KY
Continue? (y/n)y
Enter your full name: HERMIONE GRAINGER
Your FHS email id: grainger. hermionet fhs.edu
Your temporary passwd: he640KR
Continue? (y/n)n
Good Bye!
>>>
Transcribed Image Text:Python 381 Shell Ble Edt She Debug Options Window Help Melcome to Punnyville High School registration ** Enter your full name: John Doe Your FHS email id: doe.johne fha.edu Your temporary pasawd: jo1200E Continue? ty/n)y Enter your full name: Harry Potter Your FHS email id: potter.harryeths.edu Your temporary passwd: ha3ONER Continue? ly/n) y Enter your full name: ronald veasley Your PHS email id: weasley.ronalde ths.edu Your temporary pasawd: ro42KY Continue? (y/n)y Enter your full name: HERMIONE GRAINGER Your FHS email id: grainger. hermionet fhs.edu Your temporary passwd: he640KR Continue? (y/n)n Good Bye! >>>
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps with 2 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY