Start learning 50% faster. Sign in now
We have: The one, who visits Udaipur, visits on any day after Friday, that means we have two possible day for the one who visits Udaipur, in case (1) the one who visits Udaipur, visits on Saturday, in case (2) the one who visits Udaipur, visits on Sunday. There were two days gap between the one, who have Yellow and F who visits Udaipur. A visits Raipur on Tuesday. There were two days gap between A and the one who has Green. The one, who visits Kanpur, visits on adjacent day of the one who has Green, that means we have three possible day for the one who visits Kanpur, in case (1) & case (2a) the one who visits Kanpur visits on Thursday, in case (2b) the one who visits Kanpur visits on Saturday. Based on above given information we have: Again, we have: C neither visits on adjacent day of the one has Yellow nor on adjacent day of F. One person visits between the one who visits Bilaspur and C, who has Red, that means C visits on Monday. There were three days gap between the one who has Pink and the one who visits Bilaspur. G neither has Pink nor he visits before the one who visits Kanpur and he visits Rudrapur. There were two days gap between G and the one who likes White, who visits on adjacent day of the one who has Yellow, that means case (2b) is not valid, in case (1) G visits on Friday, in case (2a) G visits on Saturday.
Case (2b) is not valid as G doesn’t visit before the one who visits Kanpur. Again, we have: The one who has BLACK and D visits on adjacent days. There were three days gap between D and the one who visits Jaipur, that means in case (1) D visits on Wednesday, in case (2) D visits on Friday. Neither D nor B visits Jaipur, that means in case (1) B visits Kanpur. At least three person visits between the one, who visits Rampur and the one, who has Blue, that means case (2a) is not valid. Based on above given information we have final arrangement we have:
Which security measure helps protect against unauthorized access to a computer system by requiring users to log in multiple times?
In EBCDIC , Which type of computers uses the 8-bit code ?
Which one is the first search engine in internet?
What is the shortcut for bold text in most of the word processors?
Ethernet uses which of the following topologies?
Which of the following companies developed MS office?
Bluetooth is a type of radio wave information transmission system that is good for about ____________
Which of the following is the main function of the Central Processing Unit (CPU) in a computer?
In the given email address, which part is the Domain name Server?
[email protected]
Which component on a motherboard is responsible for managing the flow of data between the CPU, RAM, and other hardware components?