Question
Seven boxes viz. S, T, U, V, W, X and Y are kept one
above other in the form of stack. How many boxes are kept above box W? I. Only two boxes are kept between box T and box X. Only three boxes are kept above box V. Box T and V are kept together. Only one box is kept between box W and box Y. Box S is neither kept at bottom nor adjacent to box T. II. Box U is kept second from top. Box W is kept at any place above box Y. Only three boxes are kept between box X and box U. Box V, which is neither kept adjacent to box U nor box X, which is kept at s gap of two box from S. Box T doesn’t kept adjacent to box X but kept at any place below box S. Each of the questions below consists of a question and two statements numbered I and II given below it. You have to decide whether the data provided in the statements are sufficient to answer the question:Solution
From I: We have: Only three boxes are kept above box V. Box T and V are kept together. Only two boxes are kept between box T and box X Only one box is kept between box W and box Y. Box S is neither kept at bottom nor adjacent to box T, that means box S is kept at top and box X is kept below box T. Based on above given information we have: Clearly, we don’t know exact position of box W. Hence, statement I is not sufficient. From II: We have: Box U is kept second from top. Only three boxes are kept between box X and box U, that means box X is kept second from bottom. Box V, which is neither kept adjacent to box U nor box X, which is kept at s gap of two box from S, that means box V is kept fourth from bottom. Box T doesn’t kept adjacent to box X but kept at any place below box S, that means box S is kept at top. Box W is kept at any place above box Y, that means box Y is kept at bottom.
Clearly, only four boxes are kept above box W. Hence, statement II alone is sufficient.
What is the primary objective of system testing in the software development lifecycle?
What is the best case time complexity of merge sort?
What is overfitting in the context of machine learning models?
What is a best practice for securing remote access in Windows and Unix/Linux environments?Â
State true or false
MD5 Hashing Algorithm was invented by RSA Labs (Ronald Rivest) in 1991. MD5 was invented to replace its previous version, ...
What is the primary purpose of the Banker's Algorithm in operating systems?
._______ method can be used for any SQL statements(Select and Update both).
Which of the following I/O scheduling algorithms provides the most efficient disk access for systems with many requests clustered around a central locat...
What is the primary purpose of the memory management process known as "compaction"?
How do you correctly create a new Map object in JavaScript?