Question
Which encryption algorithm is commonly used for securing
email communication?Solution
The correct answer is D
How many sons does S have?
I. U is mother of S’s son Q, who has two sisters F and E.
II. There are six family members – two males and ...
How many persons sit to the left of J?
In this question, a question is followed by two statements numbered (I) and (II). You have to decide whether the data provided in the statements are su...
In a certain code language which of the following is the code for “trunk”?
Statements:
I. “trunk call given” is coded as “ck g...
Is ‘MORE’ the word formed from these four letters?
I. The word starts with M. There is only one letter between E and O.
II. Th...
The question given below consists of two statements numbered I and II below them. You have to decide whether the data provided in the statements are su...
What is the speed of the train?
I. The train crosses the signal pole in 6 seconds.
II. The train crosses a platform of equal length in 18 ...
Five boys – Sammy, Perry, Pirlo, Anderson and Peter are of different heights. Who among the following is the tallest?
I. Pirlo is taller tha...
How V is related to U?
I. V is the sister in law of E who is the daughter in law of U who is wife of G.U has only one son
II. U is...
Six persons P, Q, R, S, T and U sitting in a row facing north. Who among the following sits third from the right end?
I.Q sits at an extreme en...