Start learning 50% faster. Sign in now
We are given with the following information, Three boxes are kept between G and A. G is kept one of the box before A. Only one box is placed between A and H .Two boxes are between H and B. If box G is placed on the top then A is placed at 3rd position from the bottom of the stack. Only one box is kept between B and E. Box D is not kept immediately before or immediately after the box H. C is placed immediately above D. According to the given information, D cannot be placed immediately before or after H and box C is kept just before box D. CASE 1 AND CASE 3 got eliminated because C and D are kept together, which is not possible in both these case. So the final arrangement is:
Which of the following best describes the relationship between Distributed Parallel Computing and Cloud Computing?
Which involve two factor authentication
Which of the following statements best describes a mesh topology in network design?
Which of the following page replacement algorithms is considered optimal and aims to minimize the number of page faults?
Is every view serializable schedule also conflict serializable?
OLAP and OLTP differs in
In public key cryptography ___
key is used for encryption and ____ key is used for decryption.
...In a virtual memory system, which of the following techniques is used to maintain the illusion that each process has its own dedicated memory space?
Which of the following best describes the function of cache memory in a computer system?
Which of the following is the main advantage of using the Round Robin CPU Scheduling algorithm over First-Come-First-Serve (FCFS) in terms of process ex...