1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
10

Constantine forms the following hypothesis. Let n be any non-negative number that meets the following condition: when n is divid

ed by 5, the remainder cannot equal 2. For such values of n, the quantity Q = 97 − 6n is a prime number so long as Q > 0. Which of the following values of n would provide a counterexample to this hypothesis? Indicate all such values.
Computers and Technology
1 answer:
notka56 [123]3 years ago
8 0

Answer:

n=5

Explanation:

if n= 5

i.     n/5=5/5=1  so it divides completely the remainder is 0

ii.  97 - 6(5) = 97 - 30 = 67,   67 is a prime number.

You might be interested in
Software that helps run the computer's hardware devices and coordinates instructions between applications is called
Inessa [10]

The question above contains multiple choices;

<span>a.       </span>Application

<span>b.      </span>Recovery

<span>c.       </span>Backup

<span>d.      </span>System

The answer is d) System software.


The system software consists of the operating systems and utility programs which are usually preinstalled. The operating system controls how a PC system functions. Utility programs, on the other hand, perform general tasks for the computer like system maintenance and file compression.








7 0
3 years ago
I need help also this counts as my second giveaway and last for today
kifflom [539]

Answer:

I am pretty sure its the Visual card

8 0
3 years ago
Read 2 more answers
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
Which of the following would be least effective?
Goryan [66]

Answer:

Exponential

Explanation:

The growth of an exponential function will develop much faster than all other functions included in the options meaning the execution time will take longer. This makes exponential functions the least efficient.

4 0
3 years ago
Star and peer-to-peer are types of
Naily [24]
Networks? i’m not sure, but i know peer-to-peer is a type of network. i’m not sure about lending though
3 0
2 years ago
Read 2 more answers
Other questions:
  • Write an algorithm whether the given number is positive negative or zero​
    5·1 answer
  • Create a simple main() that solves the subset sum problem for any vector of ints. Here is an example of the set-up and output. Y
    12·1 answer
  • The common programming structure that implements "conditional statements" is called an____ statement.
    8·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    11·2 answers
  • This is the term for the manual process of editing strips of the film before digital editing was created. The term is still used
    9·1 answer
  • Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf
    12·1 answer
  • What is wrong with the following code?
    11·1 answer
  • By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway)
    11·1 answer
  • Could u give me brief summary of New Years
    14·2 answers
  • ________(fill in the blank)in online education is intrinsically related to equity.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!