Start learning 50% faster. Sign in now
ATQ, Let the cost price of the rice bag be Rs.'a' Therefore, cost price of the wheat bag = Rs. (4400 – a) Selling price of the rice bag = Rs. 1.25a Statement I: Let the discount given on the rice bag be Rs. 'b' Discount given on the wheat bag = Rs. (b – 160) So, data in statement I alone is not sufficient to answer the question. Statement II: According to the question, Discount given on the wheat bag is 10% of its cost price So, data in statement II alone is not sufficient to answer the question. Statement III: Marked price of the rice bag = Rs. 1.4a Marked price of the wheat bag = Rs. 1.25(4400 – a) So, data in statement III alone is not sufficient to answer the question. Combining statement I and II: (b – 160) = 0.1(4400 – a) Therefore, statement I and statement II together is not sufficient to answer the question. Combining statement II and III: We cannot determine the selling price of the wheat bag. Therefore, statement II and statement III together is not sufficient to answer the question. Combining statement I and III: Selling price of the wheat bag = 1.25(4400 – a) – (b – 160) Therefore, statement I and statement III together is not sufficient to answer the question, Combining statement I,II and III: (b – 160) = 10% of (4400 – a) Or, b = Rs. (440 + 160 – 0.1a) Or, b = (600 – 0.1a) ….. (1) Also, 1.4p – b = 1.2a Or, b = 0.2a …….. (2) From equation (1) and (2), we get a = 600/0.3 = 2000 Therefore, marked price of the wheat bag = 1.25(4400 – a) = Rs.3000 Discount given on the wheat bag = 0.1 × (4400 – 2000) = Rs.240 Selling price of the wheat bag = 3000 – 240 = Rs.2760 Therefore, data in all the three statements together is necessary to answer the question.
What is the primary purpose of RAID (Redundant Array of Independent Disks) technology?
What is Hadoop's primary function in big data processing?
Which of the following is an example of a strong password?
In a DBMS using a "Strict Two-Phase Locking" protocol, when is a transaction allowed to release its locks?
State true/false
Approach to Data mining is Infrastructure, exploration, analysis, interpretation and exploration.
What happens when a program accesses data that is not currently in physical memory (RAM) due to virtual memory management?
What is an operating system?
What is a common characteristic of problems suitable for dynamic programming solutions?
What does A/B testing involve in data analytics?
What is polymorphism in object-oriented programming?