Question
How many persons sit between the one who sits to the
immediate right of O and the one who sits to the immediate right of C? Study the following information carefully and answer the questions given below. Eight persons A, B, C, M, N, O, Y and Z are sitting in straight line. Some of them are facing north while some of the facing south but not necessarily in the same order. Y sits at one of the extreme ends of the line. Only three persons sit between O and Y. A sits second to the right of O. Both C and B are facing the same direction. M faces north. N sits to the immediate right of Y. C sits third to the right of B. Both O and N face the same direction as A. Only three persons sit between M and Z. O sits to the immediate left of M. Z is not facing the same direction as Y. Both the immediate neighbors of M face opposite directions.Solution
Y sits at one of the extreme ends of the line. Only three persons sit between O and Y. N sits to the immediate right of Y. O sits to the immediate left of M. M faces north. Case-1 Only three persons sit between M and Z. Z is not facing the same direction as Y. C sits third to the right of B. Both C and B are facing the same direction. A sits second to the right of O. Both the immediate neighbors of M face opposite directions. Both O and N face the same direction as A. Hence, case 1 gets eliminated.
In Java, what will be the output of the following code snippet?
public class Test {
public static void main(String[] args) { <...
Which sorting algorithm is considered the most efficient for large datasets with no additional memory constraints?
What is a fundamental characteristic of a singly linked list?
Which cryptographic concept ensures that data integrity is preserved and cannot be altered during transmission?
Which of the following correctly describes the primary difference between Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS)?
...Which of the following is a core characteristic of Big Data?
In the context of asymmetric encryption, which of the following is a key feature of public-private key pairs?
- Computer Architecture
Which architectural feature is crucial for improving the performance of modern multi-core processors?
In a binary tree, what is the maximum number of children a node can have?
What is the base case in a recursive function?