1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
9

Okay, guys, I know this one will be very hard however while trying to finish this assignment I got overwhelmed and lost by the s

heer size of it! Alrighty! Here are the instructions:
/////////////////////////////////////////////////////////////
Modify the TaxReturn class with fields that hold a taxpayer’s Social Security number (snn), last name (last), first name (first), street address (address), city (city), state (state), zip code (zipCode), annual income (income), marital status (status), and tax liability (tax). Include a constructor that requires arguments that provide values for all the fields other than the tax liability. The constructor calculates the tax liability based on annual income and the percentages in the following table.

Income Single Married
0 - 20,000 15% 14%
20,001 - 50,000 22% 20%
50,001+ 30% 28%

In the TaxReturn class, also include a display method that displays all the TaxReturn data.

Implement the PrepareTax application that prompts a user for the data needed to create a TaxReturn. Continue to prompt the user for data as long as any of the following are true:

• The Social Security number is not in the correct format, with digits and dashes in the appropriate positions—for example, 999-99-9999.

• The zip code is not five digits.

• The marital status does not begin with one of the following: S, s, M, or m.

• The annual income is negative.

After all the input data is correct, create a TaxReturn object and then display its values.

An example of the program is shown below:

Enter your Social Security number
999-99-9999
Enter your first name
Jane
Enter your last name
Doe
Enter your address
1961 Mulberry Street
Enter your city
Springfield
Enter your state
Massachusetts
Enter your Zip code
01101
Enter marital status
Single
Enter your annual income
20000
Taxpayer ssn: 999-99-9999 Jane Doe
1961 Mulberry Street
Springfield, Massachusetts 01101
Marital status: S
Income: $20000.0 Tax: $3000.0
////////////////////////////////////////////////////////////////
I also want to point out that this assignment has two different files with one being PrepareTax.java and the other being ReturnTax.java!
Computers and Technology
1 answer:
andriy [413]3 years ago
6 0
Enter your information ℹ️
You might be interested in
Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received
photoshop1234 [79]

Group of answer choices.

A) the public key had been compromised.

B) the private key had been compromised.

C) the symmetric encryption key had been compromised.

D) the asymmetric encryption key had been compromised.

Answer:

C) the symmetric encryption key had been compromised.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Email encryption is the encryption and authentication of an email to protect the message therein from being read by any person other than the intended recipients. Thus, it protects the email from hacking or invasion by a third party.

Basically, when the message is signed with the sender's private key, the receiver can verify its authenticity using the sender's public key.

Also, encrypting the email message with the receiver's public key provides confidentiality.

In this scenario, the most likely explanation for this result is that the symmetric encryption key had been compromised.

3 0
3 years ago
What does XD mean? I keep seeing people say it and I dont know what it means
Anna007 [38]

Answer: xD = haha

Explanation:

XD looks like a haha face laughing :P

have a good day :)

6 0
3 years ago
Read 2 more answers
An authenticated user can add up to how many computer accounts to the domain, by default
Brums [2.3K]
By default, 10 computers can be joined to the domain by both users and administrators. As long as a user is authenticated against the Active Directory, he or she can add up to 10 computers to the domain.
While this one posses as an advantage for smaller companies, it is not a desirable feature for bigger companies since they have to control more tightly who can add machines to their domain.
7 0
4 years ago
Which option allows you to customize the order of your data ?
Digiron [165]

✧・゚: *✧・゚:*    *:・゚✧*:・゚✧

                  Hello!

✧・゚: *✧・゚:*    *:・゚✧*:・゚✧

❖ The correct answer choice is B) sorting. When you sort, you can order your sheet however you'd like.

~ ʜᴏᴘᴇ ᴛʜɪꜱ ʜᴇʟᴘꜱ! :) ♡

~ ᴄʟᴏᴜᴛᴀɴꜱᴡᴇʀꜱ

3 0
3 years ago
Read 2 more answers
Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
sweet-ann [11.9K]
Stop cheating



It’s b
3 0
3 years ago
Other questions:
  • Microsoft words spell checker
    8·1 answer
  • Write a class that can make comparisons between the efficiency of the common methods from the List interface in the ArrayList an
    5·1 answer
  • hich of the following is a disadvantage of online surveys? They result in high response bias They lead to higher cost per comple
    14·1 answer
  • What is the full form of PDP​
    7·1 answer
  • Which of the following statements about certificates is true?
    14·2 answers
  • When saving a PowerPoint presentation as a show which object will not be saved with the presentation
    13·2 answers
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • How can you ensure that the website you are using is secured?
    8·1 answer
  • FREE BRAINLIEST!!!!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!