Questions
Comprehensive Problem 1-1 Patty Banyan is a single taxpayer, age 35, living at 543 Space Drive,...

Comprehensive Problem 1-1

Patty Banyan is a single taxpayer, age 35, living at 543 Space Drive, Houston, TX 77099. Her Social Security number is 466-33-1234. For 2016, Patty has no dependents, and her W-2, from her job at a local restaurant where she parks cars, contains the following information:

a Employee's social security number

466-33-1234

OMB No. 1545-0008 Safe, accurate,
FAST! Use
IRSe ~ file Visit the IRS website at
www.irs.gov/efile
b Employer identification number (EIN)
33-1235672
1 Wages, tips, other compensation
19,600.00
2 Federal income tax withheld
2,940.00
c Employer's name, address, and ZIP code

Burger Box
1234 Mountain Road
Houston, TX 77099
3 Social security wages
19,600.00
4 Social security tax withheld
1,215.20
5 Medicare wages and tips
19,600.00
6 Medicare tax withheld
284.20
7 Social security tips 8 Allocated tips
d Control number 9 10 Dependent care benefits
e Employee's first name and initialLast nameSuff.

Patty Banyan
543 Space Drive
Houston, TX 77099
11 Nonqualified plans 12a See instructions for box 12
f Employee's address and ZIP code
13Statutory employee Retirement plan Third-party sick pay

□ □ □

CodeD $
12b
14 Other Code $
12c
Code $
12d
Code $
15 State
TX
Employer's state ID number 16 State wages, tips, etc. 17 State income tax 18 Local wages, tips, etc. 19 Local income tax 20 Locality name
Form W-2 Wage and Tax Statement
Copy—To Be Filed With Employee's FEDERAL Tax Return.
This information is being furnished to the Internal Revenue Service.
2016 Department of the Treasury—Internal Revenue Service

These wages are Patty's only income for 2016. Patty wants to donate $3 to the Presidential Election Campaign Fund. The election to donate does not affect tax liability in any way.

Click here to access the table tax to use for this problem.

Required:

Complete Form 1040EZ for Patty Banyan for the 2016 tax year.

Enter all amounts as positive numbers. If an amount box requires no entry or the amount is zero, enter "0".

Department of the Treasury—Internal Revenue Service
Income Tax Return for Single and
Joint Filers With No Dependents    (99)
Form
1040EZ

2016
OMB No. 1545-0074
Your first name and initial
Patty
Last name
Banyan
Your social security number
466-33-1234
If a joint return, spouse's first name and initial
Last name Spouse's social security number
Home address (number and street). If you have a P.O. box, see instructions.
543 Space Drive
Apt. no. ▲ Make sure the SSN(s) above are correct.
City, town or post office, state, and ZIP code. If you have a foreign address, also complete spaces below (see instructions).
Houston, TX 77099
  Presidential Election Campaign
Check here if you, or your spouse if filing jointly, want $3 to go to this fund. Checking a box below will not change your tax or refund.
             ☒ You    ▢ Spouse
Foreign country name
Foreign province/state/country
Foreign postal code
Income

Attach
Form(s) W-2
here.


Enclose, but do not attach, any payment.
1 Wages, salaries, and tips. This should be shown in box 1 of your Form(s) W-2. Attach your Form(s) W-2. 1  
2 Taxable interest. If the total is over $1,500, you cannot use Form 1040EZ. 2  
3 Unemployment compensation and Alaska Permanent Fund dividends (see instructions). 3  
4 Add lines 1, 2, and 3. This is your adjusted gross income. 4  
5 If someone can claim you (or your spouse if a joint return) as a dependent, check the applicable box(es) below and enter the amount from the worksheet on back.
You       ▢ Spouse
If no one can claim you (or your spouse if a joint return), enter $10,350 if single; $20,700 if married filing jointly. See back for explanation.




5  



6 Subtract line 5 from line 4. If line 5 is larger than line 4, enter -0-.
This is your taxable income.


6  
Payments,
Credits,
and Tax
7 Federal income tax withheld from Form(s) W-2 and 1099. 7  
8a Earned income credit (EIC) (see instructions) 8a
b Nontaxable combat pay election. 8b
9 Add lines 7 and 8a. These are your total payments and credits. 9  
10 Tax. Use the amount on line 6 above to find your tax in the tax table in the instructions. Then, enter the tax from the table on this line. 10  
11 Health care: individual responsibility (see instructions) Full-year coverage ▢ 11  
12 Add lines 10 and 11. This is your total tax. 12  
Refund
Have it directly deposited! See instructions and fill in 13b, 13c, and 13d, or Form 8888.
13a If line 9 is larger than line 12, subtract line 12 from line 9. This is your refund. If Form 8888 is attached, check here ► ▢ 13a
b Routing number
c Type: ▢ Checking    ▢ Savings
d Account number
Amount You Owe 14 If line 12 is larger than line 9, subtract line 9 from line 12. This is the amount you owe. For details on how to pay, see instructions. 14
Third Party Designee Do you want to allow another person to discuss this return with the IRS (see instructions)? ▢ Yes. Complete below. ▢ No
Designee's
name

Phone
no.

Personal identification
number (PIN) ►
Sign
Here


Joint return? See instructions.

Keep a copy for your records.
Under penalties of perjury, I declare that I have examined this return and, to the best of my knowledge and belief, it is true, correct, and accurately lists all amounts and sources of income I received during the tax year. Declaration of preparer (other than the taxpayer) is based on all information of which the preparer has any knowledge.
Your signature
Patty Banyan
Date Your occupation
Parking Attendant
Daytime phone number
Spouse's signature. If a joint return, bothmust sign. Date Spouse's occupation
If the IRS sent you an Identity Protection PIN, enter it here
(see inst.)
Paid Preparer Use Only Print/Type preparer's name Preparer's signature Date Check ▢ if self-employed PTIN
Firm's name Firm's EIN ►
Firm's address ► Phone no.
For Disclosure, Privacy Act, and Paperwork Reduction Act Notice, see instructions. Cat. No. 11329W Form 1040EZ (2016)

In: Finance

Discuss the major findings/rulings and selection/recruitment implications of the following select court cases. *Griggs v. Duke...

Discuss the major findings/rulings and selection/recruitment implications of the following select court cases.

*Griggs v. Duke Power (1971)
*US v. Georgia Power (1973)
*Spurlock v. United Airlines (1972)
*Watson v. Fort Worth Bank and Trust (1988)
*Rudder v. District of Columbia (1995)
*Frank Ricci et al. v. Hohn DeStefano et al. (2009)
*OFCCP v. Ozark Airlines (1986)
*Gross v. FBL Financial Services (2009)

In: Operations Management

Assessment Question Week 2: Production Possibility Frontier In 2017, Nepal production of rice and machinery in...

Assessment Question Week 2: Production Possibility Frontier
In 2017, Nepal production of rice and machinery in 2017 was published by the Nepal Bureau of Statistics as indicated by the table below.
Production in Nepal
   P   Q   R   S   T   U   V   W   X   Y   Z
Rice (1000 tons)   0   10   26   37   45   50   55   59   66   77   80
Machinery (units)   90   89   85   80   75   70   65   60   50   30   0

                                          

Based on the table above, a production possibility frontier for Nepal can be plotted as below:

Use the Nepal production table and production possibility frontier to answer the following questions.
(a)   Name positions B, V and D. Explain the implications of each of the production positions (B, V, D) on Nepal’s economy.
(b)   Supposing Nepal is operating at level T what is the opportunity cost of producing 10,000 more tons of rice? Also, suppose Nepal is operating at X what is the opportunity cost of producing 70 units of machinery?

(c)   Use the graph below to answer the questions that follow


(i)   Suppose Nepal begins to manufacture fertilizers, explain the impact of the discovery of fertilizers to Nepal’s economy using PPF.
(ii)   Supposing there is a discovery of steel in Nepal, explain the impact of steel to the economy of Nepal using a PPF.
(iii)   The Minister of Finance in Nepal advices that in order to increase rice production and machinery, each sector requires USD 50 billion. Explain the impact of the budgetary allocation on the economy of Nepal using PPF.

In: Economics

Problem: Clique In this problem IS stands for Independent Set. The usual IS problem, that we...

Problem: Clique

In this problem IS stands for Independent Set.

The usual IS problem, that we showed in class in NP-complete is as follows:

Input: Unidrected graph G(V, E) and number k, with 1 ≤ k ≤ n.
Output: YES if G has an independent set of containing at least k vertices.
  NO if all independent sets of G contain strictly less than k vertices.

Definition: Let G(V, E) be an undirected graph and let V ′ be a proper subset of vertives of V : V ′ ⊂ V . We sat thay V is a clique of size k=|V′| if and only if, for all u∈V′ and for all u != v in V′ the edge{u,v}∈E.

Now define the Clique problem as follows:

Input: Unidrected graph G(V, E) and number k, with 1⌉ ≤ k ≤ n.
Output: YES if G has a clique containing at least k vertices.
  NO if cliques of G contain strictly less than k vertices.

Show that IS≤ pCLIQUE.

In: Statistics and Probability

In Simple Chat, if the server shuts down while a client is connected, the client does...

In Simple Chat, if the server shuts down while a client is connected, the client does not respond, and continues to wait for messages. Modify the client so that it responds to the shutdown of server by printing a message saying the server has shut down, and quitting. (look at the methods called connectionClosed and connectionException).

//ChatClient.java

// This file contains material supporting section 3.7 of the textbook:
// "Object Oriented Software Engineering" and is issued under the open-source
// license found at www.lloseng.com 

package client;

import ocsf.client.*;
import common.*;
import java.io.*;

/**
 * This class overrides some of the methods defined in the abstract
 * superclass in order to give more functionality to the client.
 *
 * @author Dr Timothy C. Lethbridge
 * @author Dr Robert Laganiè
 * @author François Bélanger
 * @version July 2000
 */
public class ChatClient extends AbstractClient
{
  //Instance variables **********************************************
  
  /**
   * The interface type variable.  It allows the implementation of 
   * the display method in the client.
   */
  ChatIF clientUI; 

  
  //Constructors ****************************************************
  
  /**
   * Constructs an instance of the chat client.
   *
   * @param host The server to connect to.
   * @param port The port number to connect on.
   * @param clientUI The interface type variable.
   */
  
  public ChatClient(String host, int port, ChatIF clientUI) 
    throws IOException 
  {
    super(host, port); //Call the superclass constructor
    this.clientUI = clientUI;
    openConnection();
  }

  
  //Instance methods ************************************************
    
  /**
   * This method handles all data that comes in from the server.
   *
   * @param msg The message from the server.
   */
  public void handleMessageFromServer(Object msg) 
  {
    clientUI.display(msg.toString());
  }

  /**
   * This method handles all data coming from the UI            
   *
   * @param message The message from the UI.    
   */
  public void handleMessageFromClientUI(String message)
  {
    try
    {
      sendToServer(message);
    }
    catch(IOException e)
    {
      clientUI.display
        ("Could not send message to server.  Terminating client.");
      quit();
    }
  }
  
  /**
   * This method terminates the client.
   */
  public void quit()
  {
    try
    {
      closeConnection();
    }
    catch(IOException e) {}
    System.exit(0);
  }
}
//End of ChatClient class

//EchoServer.java

// This file contains material supporting section 3.7 of the textbook:
// "Object Oriented Software Engineering" and is issued under the open-source
// license found at www.lloseng.com 

import java.io.*;
import ocsf.server.*;

/**
 * This class overrides some of the methods in the abstract 
 * superclass in order to give more functionality to the server.
 *
 * @author Dr Timothy C. Lethbridge
 * @author Dr Robert Laganière
 * @author François Bélanger
 * @author Paul Holden
 * @version July 2000
 */
public class EchoServer extends AbstractServer 
{
  //Class variables *************************************************
  
  /**
   * The default port to listen on.
   */
  final public static int DEFAULT_PORT = 5555;
  
  //Constructors ****************************************************
  
  /**
   * Constructs an instance of the echo server.
   *
   * @param port The port number to connect on.
   */
  public EchoServer(int port) 
  {
    super(port);
  }

  
  //Instance methods ************************************************
  
  /**
   * This method handles any messages received from the client.
   *
   * @param msg The message received from the client.
   * @param client The connection from which the message originated.
   */
  public void handleMessageFromClient
    (Object msg, ConnectionToClient client)
  {
    System.out.println("Message received: " + msg + " from " + client);
    this.sendToAllClients(msg);
  }
    
  /**
   * This method overrides the one in the superclass.  Called
   * when the server starts listening for connections.
   */
  protected void serverStarted()
  {
    System.out.println
      ("Server listening for connections on port " + getPort());
  }
  
  /**
   * This method overrides the one in the superclass.  Called
   * when the server stops listening for connections.
   */
  protected void serverStopped()
  {
    System.out.println
      ("Server has stopped listening for connections.");
  }
  
  //Class methods ***************************************************
  
  /**
   * This method is responsible for the creation of 
   * the server instance (there is no UI in this phase).
   *
   * @param args[0] The port number to listen on.  Defaults to 5555 
   *          if no argument is entered.
   */
  public static void main(String[] args) 
  {
    int port = 0; //Port to listen on

    try
    {
      port = Integer.parseInt(args[0]); //Get port from command line
    }
    catch(Throwable t)
    {
      port = DEFAULT_PORT; //Set port to 5555
    }
   
    EchoServer sv = new EchoServer(port);
    
    try 
    {
      sv.listen(); //Start listening for connections
    } 
    catch (Exception ex) 
    {
      System.out.println("ERROR - Could not listen for clients!");
    }
  }
}
//End of EchoServer class

//ChatIF.java

// This file contains material supporting section 3.7 of the textbook:
// "Object Oriented Software Engineering" and is issued under the open-source
// license found at www.lloseng.com 

package common;

/**
 * This interface implements the abstract method used to display
 * objects onto the client or server UIs.
 *
 * @author Dr Robert Laganière
 * @author Dr Timothy C. Lethbridge
 * @version July 2000
 */
public interface ChatIF 
{
  /**
   * Method that when overriden is used to display objects onto
   * a UI.
   */
  public abstract void display(String message);
}

//ClientConsole.java

// This file contains material supporting section 3.7 of the textbook:
// "Object Oriented Software Engineering" and is issued under the open-source
// license found at www.lloseng.com 

import java.io.*;
import client.*;
import common.*;

/**
 * This class constructs the UI for a chat client.  It implements the
 * chat interface in order to activate the display() method.
 * Warning: Some of the code here is cloned in ServerConsole 
 *
 * @author François Bélanger
 * @author Dr Timothy C. Lethbridge  
 * @author Dr Robert Laganière
 * @version July 2000
 */
public class ClientConsole implements ChatIF 
{
  //Class variables *************************************************
  
  /**
   * The default port to connect on.
   */
  final public static int DEFAULT_PORT = 5555;
  
  //Instance variables **********************************************
  
  /**
   * The instance of the client that created this ConsoleChat.
   */
  ChatClient client;

  
  //Constructors ****************************************************

  /**
   * Constructs an instance of the ClientConsole UI.
   *
   * @param host The host to connect to.
   * @param port The port to connect on.
   */
  public ClientConsole(String host, int port) 
  {
    try 
    {
      client= new ChatClient(host, port, this);
    } 
    catch(IOException exception) 
    {
      System.out.println("Error: Can't setup connection!"
                + " Terminating client.");
      System.exit(1);
    }
  }

  
  //Instance methods ************************************************
  
  /**
   * This method waits for input from the console.  Once it is 
   * received, it sends it to the client's message handler.
   */
  public void accept() 
  {
    try
    {
      BufferedReader fromConsole = 
        new BufferedReader(new InputStreamReader(System.in));
      String message;

      while (true) 
      {
        message = fromConsole.readLine();
        client.handleMessageFromClientUI(message);
      }
    } 
    catch (Exception ex) 
    {
      System.out.println
        ("Unexpected error while reading from console!");
    }
  }

  /**
   * This method overrides the method in the ChatIF interface.  It
   * displays a message onto the screen.
   *
   * @param message The string to be displayed.
   */
  public void display(String message) 
  {
    System.out.println("> " + message);
  }

  
  //Class methods ***************************************************
  
  /**
   * This method is responsible for the creation of the Client UI.
   *
   * @param args[0] The host to connect to.
   */
  public static void main(String[] args) 
  {
    String host = "";
    int port = 0;  //The port number

    try
    {
      host = args[0];
    }
    catch(ArrayIndexOutOfBoundsException e)
    {
      host = "localhost";
    }
    ClientConsole chat= new ClientConsole(host, DEFAULT_PORT);
    chat.accept();  //Wait for console data
  }
}
//End of ConsoleChat class

Do not know how to do for this question, could you give me some suggestions for that?

In: Computer Science

(please type the answers) (system and technology 5360)case 5-1: Yahoo Wins the Gold and Silver Me......

(please type the answers) (system and technology 5360)case 5-1: Yahoo Wins the Gold and Silver Me...
(please type the answers) (system and technology 5360)

case 5-1: Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History, case study listed below

Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History!
It wasn’t until Fall 2016 that Yahoo alerted its users and the public to the first of two of the largest known breaches of user information in history that had occurred 2–3 years earlier. On September 22, 2016, Yahoo publicly disclosed that over 1 billion Yahoo account records were stolen in mid-2013. A second news release on December 15, 2016, revealed a second attack that occurred in 2014 when the account information of over 500 million Yahoo account holders was breached. The delay in reporting is partly due to the fact that Yahoo itself did not know of the breach until shortly before releasing these statements to the public. The information leaked in the attacks included e-mail accounts, telephone numbers, street addresses, unencrypted security questions and answers, but no financial information.

To add insult to injury, at the time of the first news release, Yahoo was in negotiations with mega-corporation Verizon to acquire Yahoo for $4.83 billion. After the first news release, Verizon said that the announcement could have a negative impact on their purchasing decision. The second news release caused Verizon to further review the financial implications of the two breaches and reduce its offer by $350 million.

The 2013 breach was conducted by an unknown unauthorized third party. The information stolen in the 2014 attack was sold by a “state-sponsored actor” on the Dark Web for 3 Bitcoins (approx. $1,900). The actor, who used the name “Peace” is of Russian origin and attempted to sell data from 200 million Yahoo users online. Yahoo urged all of its users to change their passwords and security questions and to review their accounts for suspicious activity. To date, little information has been released on the 2013 breach, but more is known about the incident that occurred in 2014.

How the Second Attack was Carried Out

The data theft was similar to the way in which a typical online attack of a database is carried out. The protections used for database containing the login and personal information were insufficient to protect against the advanced methods used by the hackers. In this case, the encryption method employed in the database was broken by the hacker. Additionally, cybercrime analyst Vitali Kremez maintains that the hacker stole the information from Yahoo slowly and methodically so as to not draw attention to the breach taking place.

Since the breach was not immediately detected, the hacker had plenty of time to leverage the information in a financially, personal, or politically beneficial manner. It is not clear if the seller is the original hacker.

Impact of the Data Breach

Since the breaches were so devastating and far reaching to most of Yahoo’s customer base, Verizon is having second thoughts about the acquisition. Craig Silliman, general counsel to Verizon, said Verizon has “a reasonable basis” to believe that the data breach will have a significant impact on the deal proceedings and the likelihood that it will actually happen (Fiegerman, 2016). He furthers to explain that Yahoo will have to convince Verizon that the breach will not affect future processes in the company and that more security features have been and will be implemented. Also, the incidents could make the Yahoo deal worth about $200 million less than the $4.8 billion initially settled upon. In addition to the decreased value of Yahoo’s core assets, the company’s stock fell about 2% after the comments by Craig Silliman.

Justice is Served

On March 17, 2017, the U.S. Department of Justice indicted two Russian Intelligence agents and two state-sponsored hackers, Alexsey Belan and Karim Baratov, for the theft of the Yahoo user data in 2014. Belan, one of the FBI’s most notorious criminal hackers, had been previously indicted in two other cases. In the indictments it was revealed that the targets of the theft included Russian journalists, U.S. and Russian government officials, military personnel, and private-sector employees of financial, transportation, and other companies (Balakrishnan, 2017).

The obvious issue surrounding the Yahoo data breaches is Internet security. Simple username, password, and security questions simply are not enough to keep hackers at bay. UC Davis professor Hemant Bhargava notes that two-factor authentication (TFA) is successful in many other companies and that Yahoo should follow suit (Matwyshyn & Bhargava, 2016). An example of TFA would be that a user is asked to enter information such as username and password, then a mobile app generates and sends a random number code for the user to enter before being granted access to his or her account. Both the Yahoo account and the mobile app are linked to a common, secure account. This method is exceptionally popular and useful since over 50% of Web users access the Web through their mobile phones.



question 1. provide a detailed overview of the case study and a detailed problem statement of the case study

In: Operations Management

From the following balances you are required to calculate cash from operating activities. Name of accounts...

From the following balances you are required to calculate cash from operating activities.

Name of accounts

December31, 2015

December 31, 2016

Notes receivable

SR   7,800

SR   12,000

Notes payable

SR 22,000

SR 16,000

Accounts receivable

SR 49,000

SR 46,000

Furniture

SR 30,000

SR 38,000

Accounts payable

SR   30,000

SR 35,000

Advance Rent received

SR    9,000

SR    5,600

Prepaid expenses

SR    5,700

SR    4,200

Depreciation on Plant assets

SR 36,000

SR 45,000

Net Income during the year

        -----

SR 160,000    

In: Accounting

The paper “Cigarette Tar Yields in Relation to Mortality from Lung Cancer in the Cancer Prevention...

The paper “Cigarette Tar Yields in Relation to Mortality from Lung Cancer in the Cancer Prevention Study II Prospective Cohort “ (British Medical Journal [2004]: 72-79) included the accompanying data on the tar level of cigarettes smoked for a sample of male smokers who subsequently died of lung cancer.

Tar Level Frequency
0-7mg 103
8-14 mg 378
15-21 mg 563
≥ 22 mg 150

Assume it is reasonable to regard the sample as representative of male smokers who die of lung cancer. Is there convincing evidence that the proportion of male smoker long cancer death is not the same for the four given tar level categories?

In: Statistics and Probability

20 mL of 15% HCl(v/v) 1000 mL of 10% HCl(w/v) Give the percentages of the following:...

20 mL of 15% HCl(v/v)

1000 mL of 10% HCl(w/v)

Give the percentages of the following: 130 mg of HCl + 90 g of H20

How many grams of sodium chloride are there in 0.75 L of a 5% solution?

What weight of NaOH would be required to prepare 500 mL of a 1.5 M solution?

A solution contains 25 g NaCl/L. What is its molarity?

What is the molecular weight of NaCl?

What is the equivalent weight of NaCl?

What is the molecular weight of MgCl2?

What is the equivalent weight of MgCl2?

Describe how to make a 3M solution of Na2SO4

What weight of H2SO4 is required to prepare 500 mL of a 2M solution?

Explain how to prepare a 2N solution of HCl

Explain how to prepare a 3N solution of MgCl2

Please explain how to prepare the following:

400 ml of a 2% glucose solution from a 50% solution available.

A 2% solution of HCL is required for a procedure. A 6% solution is available. How much of the 6% solution will be required to make 1000 mL of a 2% solution?

A procedure calls for acetic acid and water; with the proportions being one part acetic acid to four parts water. 200 mL are needed. How much acetic acid and water are required?

1 L of 70% alcohol is needed. How much 95% alcohol is required to make the 70% solution?

75 mL of a 1N HCL solution is needed. You have a 5N solution available. How will you go about preparing this solution?

In: Chemistry

Create a Java class file for a Car class. In the File menu select New File......

  1. Create a Java class file for a Car class.
    1. In the File menu select New File...
    2. Under Categories: make sure that Java is selected.
    3. Under File Types: make sure that Java Class is selected.
    4. Click Next.
    5. For Class Name: type Car.
    6. For Package: select csci2011.lab7.
    7. Click Finish.
    8. A text editor window should pop up with the following source code (except with your actual name):
    1. csci1011.lab7;

      /**
      *
      * @author Your Name
      */
      public class Car {

      }
  1. Implement the Car class.
    1. Add the following private instance variables to the Car class:
      • An instance variable called model of type String.
      • An instance variable called color of type String.
      • An instance variable called year of type int.
      • An instance variable called currentSpeed of type double
    2. Add the following methods to the Car class:
      • A void method called initialize that takes two Strings, an int and a double as arguments, and uses those arguments to set the values of the model, color, year, and currentSpeed instance variables.
      • A void method called display that displays the model, color, year followed by the currentSpeed in parentheses. For example, if the model of the car is Ford, the color is Red, the year is 2018, and the current speed is 43 mph it should display Ford, Red, 2019 (43 mph).
    3. In the main method of your main class, create two Car objects and perform the following:
      • Initialize the car objects with a model, color, year, and current Speed of your choice, and display then. Your output might look like this:
    1. and display:
      Ford, Red, 2019 (43 mph)
      • For each instance variable change the value, then use the display method to make sure that the value changed.
    • Run the main program to see if the tests were successful.
      • Here is a sample output of the program.
      1. and display:
      2. Red, 2018 (43.0)

      1. Car's features
      2. Green, 2017 (43.0)

      1. and display:
      2. Yellow, 2019 (50.0)

      1. Car's features
      1. Purple, 2015 (70.0)

In: Computer Science