Question
Which among the following box is placed immediately
below Box T? Study the following information carefully and answer the questions given below There are eight boxes from M to T are placed one above the other but not necessarily in the same order. The lowermost box position is numbered as one and above as two and so on. Only two boxes are placed between the Box T and Box P in which Box P is placed below Box T. Box T is placed in odd numbered position. Box T is not placed above Box N. Box N is placed in even numbered position. Only one box is placed between the Box S and Box Q in which Box Q is placed below Box S. Box R is not placed above Box M. Four boxes are placed between Box R and Box N. Box N is placed above Box R.Solution
Box N is placed in even numbered position. Four boxes are placed between Box R and Box N. Box N is placed above Box R. Only two boxes are placed between the Box T and Box P in which Box P is placed below Box T. Box T is placed in odd numbered position. Box T is not placed above Box N. From above statements, Case 1: If Box N is placed at 8th position and then Box R is placed at 3rd position. Box T is placed at 7th position and Box P is placed at 4thposition. Case 1-M: If Box N is placed at 8th position and then Box R is placed at 3rd position. Box T is placed at 5th position and Box P is placed at 2ndposition. Case 2: If Box N is placed at 6th position and then Box R is placed at 1st position. Box T is placed at 5th position and Box P is placed at 2ndposition. Based on the above information, we get the initial table as follows,
In the context of databases, what does SQL stand for?
What is the primary purpose of a firewall in network security?
Which bank launched a USSD application for its users?
What is the shortcut key for copying selected text in most software applications?
Into how many parts is the MAC address divided?
Which of the following is a strong password practice?
Which malware does not require host to spread
Drum, laser, and chain are examples of what?
 In the context of computer security, what does 'phishing' refer to?
What type of system is supported by Linux?