1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
10

Constantine forms the following hypothesis. Let n be any non-negative number that meets the following condition: when n is divid

ed by 5, the remainder cannot equal 2. For such values of n, the quantity Q = 97 − 6n is a prime number so long as Q > 0. Which of the following values of n would provide a counterexample to this hypothesis? Indicate all such values.
Computers and Technology
1 answer:
notka56 [123]3 years ago
8 0

Answer:

n=5

Explanation:

if n= 5

i.     n/5=5/5=1  so it divides completely the remainder is 0

ii.  97 - 6(5) = 97 - 30 = 67,   67 is a prime number.

You might be interested in
Please please help I don’t understand this
garik1379 [7]

Answer:

It is this because yass

Explanation:

And yes

6 0
2 years ago
Read 2 more answers
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
3 years ago
Consider the following code: x=random.randint (1, 100) The randint is a ____.​
Mrrafil [7]
Random integer, in this case betweeen 1 and 100
5 0
3 years ago
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
Sergeu [11.5K]

Answer:

Active Attack

• It is an active attack 1, because someone is actively attacking your system. It is also an active attack because it is affecting the way your system works negatively, and visibly.

• 2, because they have been caught for actively committing a crime.

• lastly, because a brute-force is classified as an active attack, regardless. It is an illegal way to attempt to damage, steal or change a root password.

•<em> Fun fact </em>

 <em>A DDoS(distributed denial-of-service) is also classified as an active attack.</em>

6 0
2 years ago
Today, trending current events are often present on websites. Which of the following early developments in audiovisual technolog
Sloan [31]

Answer: Newsreels

Explanation:

Options not included however with the early audio visual technologies known, the Newsreel is the closest when it comes to displaying news and current events.

Like the name suggests, Newsreels showed news and they did this of events around the world. They were short films that captured events and then displayed them in cinemas and any other viewing locations capable of showing them.

By this means, people were able to keep up to date with events around the world without having to read newspapers. The advent of news channels killed this industry and logically so.

8 0
3 years ago
Other questions:
  • The ____ contains methods that allow you to set physical properties such as height and width, as well as methods that allow you
    14·1 answer
  • What is pressure?
    7·2 answers
  • House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers.
    11·1 answer
  • Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
    7·1 answer
  • Internet is for everyone but it wont be if its users cannot protect their privacy and the confidentiality of transactions conduc
    6·1 answer
  • A digital designer might do computer animation or video games true or false
    13·2 answers
  • NEED FIVE QUESTIONS ANSWERED!!!
    7·1 answer
  • Compound conditions require a computer to sense whether multiple conditions are true or false.
    9·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • Help plz (will give brainliest)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!