Question
Each question is followed by three statements I, II and
III. You have to decide whether the data given in the statements are sufficient to answer the question. What is the speed of Train A in km/h? I. Train A passes a pole in 12 seconds. II. Train A passes a 480 m long platform in 36 seconds. III. Train A crosses another train B of length 160 m, running in the same direction at 36 km/h, in 40 seconds.Solution
ATQ, Let length of Train A = L metres, speed of Train A = v m/s. Convert 36 km/h of Train B to m/s: 36 Γ (5/18) = 10 m/s. Statement I: Time to pass a pole = L / v = 12 β L = 12v One equation, two unknowns β not sufficient alone. Statement II: Time to pass platform length 480 m: (L + 480)/v = 36 β L + 480 = 36v β¦(A) Again one equation, two unknowns β not sufficient alone. Statement III: Trains in same direction, relative speed = v β 10 m/s. Distance to cover = L + 160. Time = 40 s: (L + 160)/(v β 10) = 40 β L + 160 = 40(v β 10) = 40v β 400 β¦(B) Again one equation, two unknowns β not sufficient alone. Now check any two: I + II: From I: L = 12v Substitute into (A): 12v + 480 = 36v β 480 = 24v β v = 20 m/s Convert to km/h: 20 Γ (18/5) = 72 km/h. Unique speed β I + II sufficient. I + III: From I: L = 12v Substitute into (B): 12v + 160 = 40v β 400 β 40v β 12v = 160 + 400 β 28v = 560 β v = 20 m/s β 72 km/h. I + III also sufficient. II + III: From (A): L = 36v β 480 From (B): L = 40v β 560 Equate: 36v β 480 = 40v β 560 β 40v β 36v = β480 + 560 β 4v = 80 β v = 20 m/s β 72 km/h. II + III also sufficient. Thus: β No single statement alone is sufficient. β Any two statements together are sufficient to find the speed of Train A.
A 4-bit ADC converter has a full-scale analog imput of 5 Volt. Its resolution is _________
What is the main goal of the Dining Philosophers Problem in computer science?
The precision is composed of which of the following two characteristics?
Which of the following statements accurately describes the use of the SQL CREATE statement?
Fill in the correct option for 27 blank space.
cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal ...
Which statement is FALSE for analog input module for PLCs?Β
What is the primary characteristic of the Spiral Model in software development?
Which component in Hadoop is responsible for managing cluster resources and scheduling tasks?
In a binomial heap, if the root is greater than the left child and less than the right child, which of the following statements is correct?