Start learning 50% faster. Sign in now
We Have, At most two boxes are kept below box U. Three boxes are kept between R and the box which is kept immediately above box U. Again we have, W is kept two boxes above box R. Two boxes are kept between W and S.
Case-III gets eliminated because no space left for W. Again we have, Box Z is kept immediately below box X. Box Y is kept three boxes below box X. Box T is kept above box V. Case-I gets eliminated because no space left for X and Y. So final arrangement is Case-2
Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
Unauthorized copying of software to be used for personal gain instead of for personal backups is called
A modem is connected to
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
The process of transferring files from a computer on the Internet to your computer is called
Analytical Engine was developed by ___
What is the full form of QSAM?
A set of possible data values is called
Term hub is related to which of the following topology?
Which among the following is not an input device?