Question
Speed of a ship is 6 m/s, which increases by 2 m/s after
every 5 minutes. It travels upstream for 15 minutes and then travels downstream for 15 minutes. If speed of stream is 2 m/s and difference between the upstream distance travelled and the downstream distance travelled by the ship is ‘5k’ metres, then find the sum of squares of each digit of ‘k’.Solution
Upstream speed of ship in first 5 minutes = 6 − 2 = 4 m/s Upstream distance covered by ship in first 5 minutes = 4 × 5 × 60 = 1200 metres Upstream speed of ship in next 5 minutes = (6 + 2) − 2 = 6 m/s Upstream distance covered by ship in next 5 minutes = 6 × 5 × 60 = 1800 metres Upstream speed of ship in next 5 minutes = (8 + 2) − 2 = 8 m/s Upstream distance covered by ship in next 5 minutes = 8 × 5 × 60 = 2400 metres Overall upstream distance covered by the ship: = 1200 + 1800 + 2400 = 5400 metres Downstream speed of ship in first 5 minutes = (10 + 2) + 2 = 14 m/s Downstream distance covered by ship in first 5 minutes = 14 × 5 × 60 = 4200 metres Downstream speed of ship in next 5 minutes = (12 + 2) + 2 = 16 m/s Downstream distance covered by ship in next 5 minutes = 16 × 5 × 60 = 4800 metres Downstream speed of ship in next 5 minutes = (14 + 2) + 2 = 18 m/s Downstream distance covered by ship in next 5 minutes = 18 × 5 × 60 = 5400 metres Overall downstream distance covered by the ship: = 4200 + 4800 + 5400 = 14400 metres So, 5k = 14400 − 5400 Or, 5k = 9000 Or, k = 1800 Required sum = 1² + 8² + 0² + 0² = 1 + 64 + 0 + 0 = 65
Which component in Hadoop is responsible for managing cluster resources and scheduling tasks?
What is the primary function of the Accumulator (AC) in a computer system?
What is the main role of Apache Pig?
Which network security device typically enforces a policy based on IP, port and protocol and can operate at transport and application layer when deep in...
Fill in the correct option for 24 blank space.
What is the primary function of a MAC address in a network?
What is the main drawback of the Minimax algorithm?
How do you correctly create a new Map object in JavaScript?
Which web application vulnerability is most commonly exploited through code injection, allowing attackers to manipulate database queries?
There is a BST and below is the Pre order of the BST, What will be it’s In order
150 70 60 80 250 200 350