Question
Who among the following person sits fourth to the left
of N? Study the following information carefully and answer the questions given below: A certain number of persons are sitting around the circular table. All of them are facing towards the center. P sits third to the left of M who sits an immediate neighbour of O. Three persons sit between J and O who sits second to the left of K. L sits to the immediate left of N who sits second to the left of P. Both L and J sit adjacent to each other. The number of persons sits between N and O is one less than the number of persons sits between O and L when counted from the right of both N and O respectively. At least one person sits between K and L when counted from the right of K.Solution
STEP I: P sits third to the left of M who sits an immediate neighbour of O. Three persons sit between J and O who sits second to the left of K. As per these statements, we can say that there are three possible cases and the arrangement will look like this:
STEP II: L sits to the immediate left of N who sits second to the left of P. Both L and J sit adjacent to each other. The number of persons sits between N and O is one less than the number of persons sits between O and L when counted from the right of both N and O respectively. At least one person sits between K and L when counted from the right of K. As per these statements, CASE I and CASE III get eliminated and we continue with CASE II and the final arrangement will look like this:
Which of the following components is used to amplify an analog signal?
Which layer of the OSI model is responsible for establishing, managing, and terminating connections between applications?
A problem is NP-complete if:
What is the primary difference between a breadth-first search (BFS) and a depth-first search (DFS) in graph traversal?
What is the port number for HTTPS?
In the software development life cycle, what is the phase where the actual code is written?
Which of the following is not a commonly used lock-based concurrency control protocol in a DBMS?
Which of the following is an example of two-factor authentication?
How to debug bash script
In RAID 1, how are data and its mirror image typically stored?