Question
In the following question, read the given statement and
compare Quantity I and Quantity II on its basis. (Only quantity is to be considered) (pq + y + 14)1/4 = m2 β 3y One root of the above equation is 15. Where p and q are roots of the equation : 2x2 β 39x + 70 = 0 Quantity I : m2 + 9 Quantity II : 2pqSolution
2x2 β 39x + 70 = 0 2x2 β (4 + 35)x + 70 = 0 2x2 β 4x β 35x + 70 = 0 2x(x β 2) β 35(x β 2) = 0 x = 2, 35/2 or 17.5 p/q = 2/17.5 or p/q = 17.5/2 Putting 15 in place of y(as one root of equation is 15) we get, (2 * 17.5 + 15 + 14)1/4 = m2 β 3 * 15 (64)1/4 = m2 β 45 m2 = 4 + 45 = 49 m = 7 Quantity I : m2 + 9 = 72 + 9 = 58 Quantity II : 2pq = 2 * 17.5 * 2 = 70 Quantity I < Quantity II
Which of the following correctly describes the primary difference between Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS)?
...What is the time complexity for inserting a node at the end of a singly linked list if you only have a pointer to the head?
Given a singly linked list with 'n' nodes, what is the time complexity to delete the last node?
Which of the following best describes the mechanism of a Cross-Site Scripting (XSS) attack?
What is "rubber duck debugging"?
What is the best-case time complexity of the binary search algorithm ?
If a stack is implemented using a fixed-size array, what is a significant disadvantage when the stack grows beyond its initial capacity?
KMP pattern matching avoids:
Which tree traversal gives nodes in non-decreasing order for a BST?
Suffix Trees are useful for: