Question
"A boat takes 60 seconds to travel ______ metres
downstream and 40 seconds to travel ______ metres upstream in the same river. The speed of the stream is ______ m/s. Which of the following options will correctly fill the blanks in the same order to make the statement true?" I. 1440, 720, and 3 II. 1500, 600, and 5 III. 1200, 560, and 4Solution
ATQ, Let speed of boat in still water and speed of stream be, 'b' m/s and 's' m/s, respectively. For statement-I: Downstream speed of boat = b + s = (1440/60) So, b + s = 24 .... (i) Upstream speed of boat = b - s = (720/40) So, b - s = 18 .... (ii) Subtract equation (ii) from equation (i) , we get, b + s - b + s = 24 - 18 Or, 2s = 6 So, s = (6/2) = 3 Speed of stream = s = 3 m/s So, data given in statement-I is true. For statement-II: Downstream speed of boat = b + s = (1500/60) So, b + s = 25 .... (i) Upstream speed of boat = b - s = (600/40) So, b - s = 15 .... (ii) Subtract equation (ii) from equation (i), we get, b + s - b + s = 25 - 15 Or, 2s = 10 So, s = (10/2) = 5 Speed of stream = s = 5 m/s So, data given in statement-II is true. For statement-III: Downstream speed of boat = b + s = (1200/60) So, b + s = 20 .... (i) Upstream speed of boat = b - s = (560/40) So, b - s = 14 .... (ii) Subtract equation (ii) from equation (i) , we get, b + s - b + s = 20 - 14 Or, 2s = 6 So, s = (6/2) = 3 Speed of stream = s = 3 m/s ≠ 4 m/s So, data given in statement-III is false. Therefore, data given in both statement-I and statement-II is false
Which protocol is related to e-commerce?
Which protocol is used to securely transfer web pages?
What is the minimum number of characters needed for a WiFi password?
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
How many types of charts are there in LibreOffice?
The ‘Sort & Filter’ group is available under which of the following tabs in MS Excel 365?
Which of the following is not needed for a UPI transaction?
Which of the following is not an antivirus software?
What is a "phishing" attack?
What are Portrait and Landscape settings called?