Question
A marked an article 60% above its cost price and when he
allows ‘X’% discount, he makes a profit of ________% and when he allows ‘1.5X’% discount, he make a profit of ________%. Find which of the following value/s comes in place of blank respectively. (i) 28, 12 (ii) 36, 24 (iii) 47.2, 40Solution
Let cost price be Rs.100a Marked price = 100a×160/100=Rs.160a From (i) Profit percent when he allows X% discount = 28% So, selling price = 100a×128/100=Rs.128a Value of X = (160a-128a)/160a×100=20% When he allows 1.5X% discount so, discount percentage = 1.5×20=30% New selling price = 160a×70/100=Rs.112a New profit percentage = (112a-100a)/100a×100=12% So, (i) is possible to fill the both respective fillers From (ii) Profit percent when he allows X% discount = 36% So, selling price = 100a×136/100=Rs.136a Value of X = (160a-136a)/160a×100=15% When he allows 1.5X% discount so, discount percentage = 1.5×15=22.5% New selling price = 160a×((100-22.5))/100=Rs.124a New profit percentage = (124a-100a)/100a×100=24% So, (ii) is possible to fill the both respective fillers From (iii) Profit percent when he allows X% discount = 47.2% So, selling price = 100a×147.2/100=Rs.147.2a Value of X = (160a-147.2a)/160a×100=8% When he allows 1.5X% discount so, discount percentage = 1.5×8=12% New selling price = 160a×((100-12))/100=Rs.140.8a New profit percentage = (140.8a-100a)/100a×100=40.8% So, (iii) can’t fill both respective fillers So, both (i) & (ii)
Which statement is TRUE regarding DIAC thyristor.
In public key cryptography ___
 key is used for encryption and ____ key is used for decryption.
...A C function attempts to find a substring.
#include
#include
char* find_substring(char* haystack, char* needle...
Which network security device typically enforces a policy based on IP, port and protocol and can operate at transport and application layer when deep in...
Which query retrieves all records from TableA that have no corresponding records in TableB?
The Process Control Block (PCB) does not typically contain which of the following information?
Which of the following HTTP methods is idempotent and is primarily used to update a specific resource's data on a server?Â
A Python function get_element(arr, index) is supposed to return the element at a given index.
def get_element(arr, index):
  # Assume ...
How many types of JDBC drivers?
In threat modeling, what does STRIDE stand for (one of the categories)? Pick the item that is NOT part of STRIDE.