0% found this document useful (0 votes)
84 views1 page

SIT384 Cyber Security Analytics: Pass Task 2.3P: Email Validation

The document provides instructions for a task to create a function that validates email addresses using regular expressions. The function should accept a string, check if it is a valid email, and if so, print the email, username, and host. Students are asked to submit their program source code and a screenshot of it running, and to add proper comments to the code. The validation should allow letters, dots, and hyphens, with one '@' symbol required.

Uploaded by

Audi Gameboy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views1 page

SIT384 Cyber Security Analytics: Pass Task 2.3P: Email Validation

The document provides instructions for a task to create a function that validates email addresses using regular expressions. The function should accept a string, check if it is a valid email, and if so, print the email, username, and host. Students are asked to submit their program source code and a screenshot of it running, and to add proper comments to the code. The validation should allow letters, dots, and hyphens, with one '@' symbol required.

Uploaded by

Audi Gameboy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

SIT384 Cyber security analytics

Pass Task 2.3P: Email validation

Task description:
Use regular expression to implement a function which accepts a passed string and check if it is a
valid email address. A program accepts user’s input and calls the email validation function. If the
email is valid, print out the email, username and host. (Please note: letters, dot, and hyphen are
considered as valid characters in an email address, besides of one ‘@’.)
(Sample output as shown in the following figure is for demonstration purposes only.)

Submission:
Submit the following files to the Google Classroom:

1. Your program source code (e.g. task2-3.ipynb)


2. A screen shot of your program running

Check the following things before submitting:

1. Add proper comments to your code

You might also like