Question
'S' allocated 40% of his monthly income to SIP P, where
it accrues a simple interest of 18% p.a. The remaining 60% was directed to SIP Q, with a compound interest of 20% p.a., compounded annually. After 2 years, the total amount gained from both SIPs matches the amount yielded by investing Rs. 6000 at 19% p.a. simple interest for 4 years. Calculate 'S's total monthly income.Solution
ATQ, Let monthly income of 'S' is Rs.100a Amount invested in SIP P = 0.40 × 100a = Rs. 40a Amount invested in SIP Q = 0.60 × 100a = Rs. 60a Amount obtained when Rs. 6000 is invested at 19% p.a. simple interest for 4 years = 6000 + 6000 × 0.19 × 4 = Rs. 10560 According to question; [40a + 40a × 0.18 × 2] + (1.20)2 × 60a = 10560 Or, 54.4a + 86.4a = 10560 Or, 140.8a = 10560 Or, a = 75 Desired Income = 75 × 100 = Rs.7500
In each of the questions below, a sentence is given with two blanks, indicating that some parts are missing. Identify the correct pair of words that fit...
Fill in the blank/s with suitable Word/s:
The teacher wanted to _________ the students to think critically about the topic.
In the following question ,sentences are given with blanks to be filled in with an appropriate word.four alternative is suggested for each question.
Given below is a sentence with one blank in each. Below each sentence are given four words among which one word might fill the blank. If none of the wo...
The …………… of Sri Lankan fisherman and their boats that were released on the orders of the State Government is being d...
Select the most appropriate option to fill in the blank.
She ______Â why I had not sent her an invitation.
A poor man and his family ate ________ little other residents of the town were kind enough to spare. One day, when he and his family sat down to eat, a ...
It is possible to plug into remote databases to ____________ information.
Select the most appropriate option to fill in the blank.
The pleasant ______ of the rain as it fell on the dust made me feel nostalgic.
Unauthorised leaks, hacking and other cybercrimes have _________ data bases vulnerable.Â
(A) fulfilled     Â
(B) left