& nbsp; you & mdash; An elite spy working for the Alpha secret organization. You intercepted the enemy’s message, but it is encrypted. Your liaison handed you the rules by which the keys for decryption are created. In order for the key to be accepted by the system, it must correspond to three strict criteria at the same time:
rn
rn - uniqueness: & nbsp; all symbols are all symbols The key should be unique. For example, & nbsp; key123 & nbsp; suitable, a & nbsp; Hellow1 & nbsp; & mdash; No, since the symbol & nbsp; l & nbsp; repeats.
rn - & nbsp; there should be at least one letter of any register in the key (from & nbsp; a & nbsp; to & nbsp; z , from & nbsp; a & nbsp; to & nbsp; z ).
rn - the presence of numbers: & nbsp; there should be at least one digit in the key (from & nbsp; 0 & nbsp; before & nbsp; 9 ).
rn Ol> rn & mdash; Write a program that will check the proposed lines and determine whether they are valid keys. If the line meets all three rules, the system must issue the message "Access perception". Otherwise & mdash; "Access is prohibited".
Input format
A potential key for checking (line, StR).
Output format
The result of checking the key (line, str): "access is permitted" or "access is prohibited".
Hint
There will be no clue here, decide for yourself!