What is the age of the person who lives on the 5th floor?
Age of B is double the age of F. None of them lives at the third floor. Ages of F and G are 24 and 60 respectively. Age of the person living at 7 th floor is 50 and the age of the person living at 3 rd floor is 20. Using the first hint we can find out the age of B with respect to F. And after using the second hint we can say that the ages of F and G are 24 and 60 respectively. But we already have a hint that age of B is twice the age of F. So, now we can say that the age of B is 48. E lives just below the floor at which B lives and just above the floor at which F lives. E does not live at 3 rd floor. Age of E is equal to the average of sum of the ages of G and A and the age of E is 40. Using the first hint we can say that there is only one possible scenario in which we can fix the positions of B, E and F under the given conditions. This is shown in the table given below Now, with the second hint ⇒ E = (G + A)/2 It is given that the age of E is 40 years. ⇒ 40 = (60 + A)/2 ⇒ A = 20 years Therefore, the age of A is 20 years and we know that the person whose age is 20 lives on the 3 rd floor. So, we can say that A lives on 3 rd floor F, E, B, G do not live at the 1 st floor. Age of the person living at the 2 nd floor is one more than the age of the person living at 1 st floor. With the first hint we can say that G does not lives on the 1 st floor and we know that G cannot live on 7 th floor either as the person whose age is 50 lives on 7 th floor and the age of G is 60. So, now there is only one floor left for G to lives i.e. 2 nd floor. Using the second hint we can figure out that the age of the person who lives on 1 st floor is 59. Practice Next
Which type of diode allows current to flow in only one direction?
What is the main disadvantage of RAID 10 (RAID 1+0) in a DBMS?
What is the purpose of a weak entity in the ER model?
Which encryption algorithm is commonly used for secure communication over the internet, such as in HTTPS?
Various IPC mechanisms are:
...In a binary search tree (BST), what is the time complexity of finding the maximum element in the tree?
Define Mapping Process?
Which famous algorithm uses dynamic programming to find the shortest path in a weighted, directed graph?
A digital signature provides which of the following security properties?
Type of printer in which characters or letters are formed without the use of any mechanical impact is termed as