Question
Seven students named P, Q, R, S, T, U and V are sitting
around a circle facing the centre. Each one of them has secured one of different Ranks from 1 to 7 in the class. U is fourth to the left of the Rank-2 student .T is second to the right of Rank-7 student. Q is sitting to the immediate right of V who secured Rank-2. S is sitting third to the left of R. P is third to the left of V. Q secured Rank-6. S secures Rank-3. Only one student is sitting between R and U. Only one student is sitting between Rank-1 and Rank-2 students. U does not secure Rank-5. Which of the following is/are true based on the given arrangement? I. The student securing Rank-7 is sitting second to the left of the student who secure Rank-5. II. T is sitting immediately right of the person who secures Rank-2. III. U secures Rank-4 and is sitting to the immediate left of P.ÂSolution
The correct answer is C
Which of the following is the safest internet behavior?
What is the machine language made up of?
Which of the following best describes a database management system (DBMS)?
Which of the following is a translator program used for assembly language?
A_________ can either be malware or hardware. The main purpose of this malware is to record the keys pressed by a user on the keyboard.
From which panel you can insert Header and Footer in MS Word 2016?
Translator is a low level programming language, which is known as :
It is a computer programme allowing higher level computer program to interact with a hardware device-
The capacity of a CPU can be quantified in terms of:
In MICR, C stands for what ?