The cost price of two watches 'X' and 'Y' is Rs. 18,000 and Rs. 25,000 respectively. The shopkeeper marked up the prices of watch 'X' and 'Y' by 50% and 70% respectively. Watch 'X' is sold after allowing a discount of 20% while watch 'Y' is sold at a profit of 25%.
Which of the following statement(s) is/are false according to the given data?
(I) Selling price of watch 'X' is Rs. 21,600.
(II) Discount offered on buying watch 'Y' is 20%.
(III) Profit earned on selling watch 'Y' is more than that on selling watch 'X'.
ATQ, Marked price of watch 'X' = 150% of 18,000 = (1.5) x 18,000 = Rs. 27,000 Selling price of watch 'X' = 80% of 27,000 = (0.8) x 27,000 = Rs. 21,600 Profit earned on watch 'X' = Rs. 21,600 - Rs. 18,000 = Rs. 3,600 Marked price of watch 'Y' = 170% of 25,000 = (1.7) x 25,000 = Rs. 42,500 Selling price of watch 'Y' = 125% of 25,000 = (1.25) x 25,000 = Rs. 31,250 Discount offered on watch 'Y' = (11,250/42,500) x 100 = 26.47% Statement (I) is true. Statement (II) is false (the discount is 26.47%, not 20%). Statement (III) is true (Rs. 6,250 profit on watch 'Y' is more than Rs. 3,600 on watch 'X'). Hence, Both I and III is true
Which of the following accurately describes the primary benefit of server virtualization in a data center environment?
State True/False
With a data mart, teams can access data and gain insights faster, because they don’t have to spend time searching within a ...
Which of the following is not a valid difference between IPv4 and IPv6?
Which of the following statements correctly describes a major difference between public and private clouds?
State true or false
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for infor...
In terms of processor performance, which factor has the greatest impact on reducing instruction execution time for computationally heavy applications? ...
In deep learning, which type of neural network is most suitable for sequential data like time series?
Abstract Class in Java
The term "FAT" is stands for_____
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?