1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
10

Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va

lues from this sequence which are prime. We provide a function is_prime to assist you with this. Call it like this: is_prime( 5 ).
Computers and Technology
1 answer:
omeli [17]2 years ago
5 0

Answer:

primes = []

for n in range(2,16):

   pn = n*n - 1

   if is_prime(pn):

       primes.append(pn)

You might be interested in
What technology uses mathematical algorithms to render information unreadable to those lacking the required key
hoa [83]

Data encryption is the name of the technology that uses mathematical algorithms to render information unreadable to those lacking the required key.

<h3>What is Data encryption technology?</h3>

This is a technology that helps to secure data by applying a technique known as cryptography. What this basically means is that a secret code (or key) is generated which would provide access to the cryptographically stored information, and failure to provide the correct key makes the data or information unreadable.

You can learn more about how data encryption works here brainly.com/question/9238983

#SPJ1

6 0
2 years ago
What's my favorite song by Maluma
Ahat [919]

Answer:

hawai

Explanation:

80x+90=170 x=1 hope this helps for any future reference plz mark brainliest:D

7 0
3 years ago
Read 2 more answers
How to start to study computer science
yuradex [85]
Start to study about hardwware parts of computer,software, numbersystem, multimedia, programming
5 0
3 years ago
Read 2 more answers
You will write a flowchart, and C code for a program that does the following: Within main(), it asks for the user's annual incom
elena-s [515]

Answer:

Explanation:

To write a C program for the above problem:

#include <stdio.h>

int main()

{

// we define the variable to get the annual income

float AnIncome;

// to get the annual income from the user

printf("Enter your annual income here: ");

scanf("%f", &Anincome);

// This is the function to test the annual income

float printIt(x){

//we test the amount inputted now

if (x>= 90000){

printf("Congratulations on your income\n"); // This is the congratulatory message

}

if (x<=0){

// This statement is included to avoid putting zero as annual income

printf("Annual Income cannot be zero or less than zero\n");

}

else{

printf("You WILL make $90,000, if you keep going.\n");

}

}

printIt(AnIncome);

return 0;

}

Attached is the image for a flow chat for the program

7 0
3 years ago
Which of the following types of listening occurs in a more formal setting?
Darya [45]

Answer:

informational listening

8 0
2 years ago
Other questions:
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    15·1 answer
  • What is the letter for the trash directory on windows 10?
    13·2 answers
  • A _______ is a particular type of report that is made up of strategic objectives and metrics to help the organization reach its
    10·1 answer
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • The SQL WHERE clause: Limits the row data that are returned. Limits the column data that are returned. ALL Limits the column and
    8·1 answer
  • What do economists call a decline in the real GDP combined with a temporary rise in price level?
    8·2 answers
  • Given the integer variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another integer va
    7·1 answer
  • Prepare the truth table for the following boolean expressions: (A+B).(A+C).(B)
    12·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
  • What component of a change management program includes final testing that the software functions properly
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!