1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
3 years ago
10

Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va

lues from this sequence which are prime. We provide a function is_prime to assist you with this. Call it like this: is_prime( 5 ).
Computers and Technology
1 answer:
omeli [17]3 years ago
5 0

Answer:

primes = []

for n in range(2,16):

   pn = n*n - 1

   if is_prime(pn):

       primes.append(pn)

You might be interested in
Create the HTML code for this
Marta_Voda [28]

Answer:

index.html:

<!DOCTYPE html>

<html>

 <head>

   <title>Brainly</title>

   <link href="style.css" rel="stylesheet" type="text/css" />

 </head>

 <body>    

   <table id="myTable">

     <caption>Duty Roster for last two days</caption>

     <tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>

     <tr><td>Monday</td><td colspan="2">John</td></tr>

     <tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>

     <tr><td>Wednesday</td><td>simon</td></tr>

   </table>

 </body>

</html>

<u>style.css:</u>

#myTable {

 background-color: Cyan;

 border-collapse: collapse;  

 height: 200px;

 width: 500px;

 font-size: 20px;

}

#myTable td,th {

 border: 2px black solid;

 text-align: center;

}

#myTable td:first-child, th {

 background-color: lightgray;

 font-weight: bold;

}

3 0
3 years ago
which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst
Ugo [173]

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

7 0
3 years ago
The ____________________ of a function consists of the function name and its formal parameter list.
storchak [24]
Function signature I think
8 0
3 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
PolarNik [594]

Answer:

C. Escalate the problem to a server administrator to check for issues with the server.

Explanation:

Pinging is a tool or program that IT technicians and professional for testing if a particular host or server is reachable. Since after the support technician pinged the email server from various location and the LAN results in 0% packet loss, this means that the fault is not from the LAN, but that the host server or server administrator is unreachable or have issues. Thus, the next step of troubleshooting is to escalate the issue to the server administrator to check for issues with their server.

5 0
3 years ago
Which of the following is true regarding Moore’s Law? A.) explained the growth in computing capabilities between 1965 and 1995 B
liraira [26]

answer is B :)

Moore's Law states that we can expect the speed and capability of ... will double about every two years

3 0
3 years ago
Other questions:
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • What is a network of high-capacity communication links is the internet?
    8·1 answer
  • Data cannot be sorted or filterd accuratly if there are ________.
    12·1 answer
  • (15) What is the best definition of a contextual tab?
    8·1 answer
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • What would you do if you experienced academic frustrations in school? Check all that apply.
    15·2 answers
  • Write a program to implement problem statement below; provide the menu for input N and number of experiment M to calculate avera
    9·1 answer
  • Rectangular box formed when each column meet​
    11·1 answer
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!