Question
Quantity-I: Determine the value of (x + y -
z)3 + (x - y + z)3 - 8x3 . Quantity-II: Determine the value of 6x(z - y - x) (x - y + z) In the question, two Quantities I and II are given. You have to solve both the Quantity to establish the correct relation between Quantity-I and Quantity-II and choose the correct option.Solution
ATQ, Quantity I: Given = (x + y - z)3 + (x - y + z)3- 8x3 Or, (x + y - z)3 + (x - y + z)3 + (-2a)3 We know that, a3 + b3 + c3 = 3abc, when (a + b + c) = 0 Here, (x + y - z) = 'a' And, (x - y + z) = 'b' And, (-2x) = 'c' So, a + b + c = (x + y - z) + (x - y + z) - 2x = 0 So, required value = 3 × (x + y - z) × (x - y + z) × -2x = 6x(x + y - z) (y - x - z) So, Quantity I = 6x(x + y - z) (y - x - z) Quantity II: 6x(z - y - x) (x - y + z) Or, 6x × (-1) × (x + y - z) × (x - y + z) Or, 6x × (-1) × (-1) × (x + y - z) × (y - x - z) So, 6x(z - y - x) (x - y + z) = 6x × (x + y - z) (y - x - z) So, Quantity II = 6x × (x + y - z) (y - x - z) So, Quantity I = Quantity II
What does HTML stand for in web technology?
Which layer of the OSI model provides flow control, error checking, and reliability in data transmission?
In C programming, which header file is commonly used to work with DMA?
What is the data transmission direction in a Token Ring network?
Store data in single table
State true/false
Once the email is compromised, all other sites and services online associated with this email can be compromised.
Which of the following backup types provides the fastest backup and recovery performance but requires the most storage space?
What is the purpose of a semaphore in synchronization?
In which programming language is dynamic memory allocation commonly used?
What does the term "phishing" refer to in the context of cybersecurity?