Question
Who among the following person sits fifth to the left of
R? Study the following information carefully and answer the below questions A certain number of persons are sitting around the circular table facing the center. R sits second to the left of P. Only two persons are sitting between P and N. Only one person sits between N and M. M does not sit adjacent to P. The number of persons sits between P and M is the same as the number of persons sit between P and Q. The number of persons sits between R and N is one less than the number of persons sits between Q and M, when counted to the right of both R and M respectively. M sits exactly in the middle of L and N. O sits second to the right of L.Solution
We have, R sits second to the left of P. Â Only two persons are sitting between P and N. From the above condition, there are two possibilities. Again we have, Â Only one person sits between N and M. Â M does not sit adjacent to P. Â The number of persons sits between P and M is the same as the number of persons sit between P and Q.
Again we have, The number of persons sits between R and N is one less than the number of persons sits between Q and M, when counted to the right of both R and M respectively M sits exactly in the middle of L and N. Â sits second to the right of L. From the above condition, case1 gets eliminated. Case 2 shows the final arrangement.
IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following :
Given below are two statements
Statement I:Â Cache memory is faster than random access memory
Statement II:Â Random access memory is...
Which of the following is called small single site network?
What is a key feature of object-oriented programming?
A scripting language similar to HTML and which runs only on a browser is _________.
Function in Ms-Excel to count number of cells.
Which type of encryption uses the same key for both encryption and decryption?
Which of the following statement is correct ?
It refers to how fast the disk or memory can locate and begin retrieving a specific piece of information or transfer data to the CPU.
Junk e-mail is also called _______.