1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
10

Constantine forms the following hypothesis. Let n be any non-negative number that meets the following condition: when n is divid

ed by 5, the remainder cannot equal 2. For such values of n, the quantity Q = 97 − 6n is a prime number so long as Q > 0. Which of the following values of n would provide a counterexample to this hypothesis? Indicate all such values.
Computers and Technology
1 answer:
notka56 [123]3 years ago
8 0

Answer:

n=5

Explanation:

if n= 5

i.     n/5=5/5=1  so it divides completely the remainder is 0

ii.  97 - 6(5) = 97 - 30 = 67,   67 is a prime number.

You might be interested in
Janelle is organizing an outline for an investigative report about the benefits of taking a 30-minute walk each day. which of th
Xelga [282]

Answer:

Err. I'm getting vibes from C.

Explanation:

Janelle is organizing an outline for an investigative report about the benefits of taking a 30-minute walk each day.

Benefits - Good/Helpful

8 0
3 years ago
Read 2 more answers
How many answer or point do I answer/need to sent message?
Grace [21]

I'm a little confused about the question, but if you're asking how many points you need to ask a question, the minimum is 10.


4 0
3 years ago
When installing wire into a terminal it is important the stripped part of the wire
lianna [129]
D is the answer.......
5 0
3 years ago
Which audio format is used to create chiptunes?
Scilla [17]
Chiptune, also known as chip music or 8-bit music, is synthesized electronic music which is made for programmable sound generator suns chops used in vintage computers,consoles , and arcade machines.
5 0
3 years ago
Read 2 more answers
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
2 years ago
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • A __________ is the column of data in a database that is used as the basis for arranging data.
    8·2 answers
  • Which of the following is NOT a web browser?<br> Safari<br> Chrome<br> Bing<br> Firefox
    8·2 answers
  • 5. Tricks of the language commercials use are called Rhetorical Devices?
    9·1 answer
  • What do vector handles point at?
    13·2 answers
  • Which one of the following is a correct declaration for a method named passAList that has as arguments an array list myList of s
    8·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • A computer virus is a program that can copy itself and infect a computer without the permission of the owner. How do you think a
    9·1 answer
  • An optical fibre has an attenuation of 0.3 dB/km. If a laser launches an optical power level of PIN (mW) into 35 km length of th
    8·1 answer
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!