Sort by

recency

|

143 Discussions

|

  • + 0 comments

    That’s an interesting challenge! It looks like a fun way to test string manipulation. Speaking of breaking things down, it kind of reminds me of how we analyze content on social media. You can think of posts like "passwords" and your feed as an attempt to "crack" or curate based on what you follow or engage with. It’s a mix of fitting the right pieces together to get the perfect result, just like figuring out the correct password combinations!

  • + 0 comments

    I believe the main issue here is when we have passwords like this: [...,'aaaa' , 'aaaaaa',...]

    and loginAttempt like this: ...aaaaaaaaaa...

    We can find 'aaaa' + 'aaaa' but will remain 'aa' giving us a 'WRONG PASSWORD'. But, if we take 'aaaaaa' and then 'aaaa' we're gonna find a good answer.

  • + 0 comments

    return 'WRONG PASSWORD' if match == login: return res + match return passwordCracker, (passwords, login(minara.18_, res + match + ' ')

  • + 0 comments

    there are so many test cases and it seems working but most of them are failing because of time limit.

    `python

    for x in passwords: if x == loginAttempt[:len(x)]: # print(x) if x == loginAttempt: return x res = passwordCracker(passwords, loginAttempt[len(x):]) if res != 0 and 'WRONG PASSWORD' not in res: return x +' '+ res else: continue return 'WRONG PASSWORD'`

  • + 0 comments

    `if match is None: return 'WRONG PASSWORD' if match == login:hak_goswami return res + match

    Does not use up stack space since we use a trampoline

    return , (passwords, login[len(match):], res + match + ' ')