Start learning 50% faster. Sign in now
According to the definite conditions of the questions, the arrangement is- It is given that Mathew does not take leave on Tuesday so Mathew can take leave on Thursday or Saturday or Sunday. According to the question, the one who likes purple takes leave on the day just before the day on which Mathew takes leave and three people takes leave between the days on which the one who likes yellow and the one who likes brown takes. The friend who likes green takes leave just before the day on which the one who likes red takes leave and the one who likes yellow takes leave after the day on which the one who likes red take. So, three conditions are applied on all the possible arrangements of Mathew . In the first arrangement, when Mathew takes leave on Saturday. So James likes purple. According to the condition, two friends take leave between the days on which the one who likes black & the one who likes white take leave that means two people takes leave between the days on which Mathew and Daniel takes leave . So, Daniel takes leave on Monday but it is given that Lewis takes leave on Monday. So this arrangement is not possible In the second arrangement, when Mathew takes leave on Sunday so Daniel takes leave on Wednesday but it is given that James takes leave on Wednesday. So this arrangement is also not possible. In the third arrangement, Mathew takes leave on Thursday so Daniel takes leave on Sunday. Oliver likes purple . According to the given condition, Lewis likes green , Asher likes red , Caleb likes brown colour and it is given that one who likes yellow takes leave after the day on which the one who likes red takes leave. So it can be any day after Tuesday. Only one friend remains so James likes yellow
As Lewis does not work in Tata and Larson . So Lewis works in Reliance. As Daniel does not work in Hindustan & Tata . So Daniel works in LARSEN . Hence Asher works in Tata .
Which of the following is a type of malicious software designed to harm or exploit any computer system?
Which type of encryption uses the same key for both encryption and decryption?
In the context of computer security, what does 'phishing' refer to?
What was the world’s first web browser?
How many types of charts are there in LibreOffice?
Which command can change the default permissions for files and directories at creation?
Who sent the first message on the internet?
Which protocol is used to securely transfer web pages?
Which command provides a bilingual environment?
Which command shows the last shutdown or reboot date and time?