Question
How many persons completed the training between G and
C? Study the following information carefully and answer the questions given below. Eight persons A, B, C, D, E, F, G and H completed Army training in eight different years viz. 2012 to 2019, but not necessarily in the same order. D completed the training three years after F. Only three persons completed the training between C and F. C doesn’t complete on an odd numbered year. The number of persons completed before D is one more than the number of persons completed after B. Only one person completed the training between B and A. The difference between the years in which G and E completed is three years. Both H and E completed the training in consecutive years.Solution
We have, D completed the training three years after F. Only three persons completed the training between C and F. C doesn’t complete on an odd numbered year. From the above condition, there are three possibilities  Again we have, The number of persons completed before D is one more than the number of persons completed after B. Only one person completed the training between B and A.
 Again we have, The number of persons completed before D is one more than the number of persons completed after B. Only one person completed the training between B and A.  Again we have, The difference between the years in which G and E completed is three years. Both H and E completed the training in consecutive years. So Case2 and 3 get eliminated, hence the final arrangement becomes
 Again we have, The difference between the years in which G and E completed is three years. Both H and E completed the training in consecutive years. So Case2 and 3 get eliminated, hence the final arrangement becomes 
- Which bus is responsible for transferring data between the CPU and memory? 
- Which of the following is an example of a message-passing IPC mechanism? 
- Which type of variable has the widest scope and can be accessed from any part of the program? 
- Which statement is true about nested try-catch blocks? 
- Virtual memory allows for the efficient management of: 
- Which of the following synchronization mechanisms provides a more structured approach to synchronization, allowing only one thread to access a resource... 
- Which of the following techniques is used for dimensionality reduction while preserving the data’s variance? 
- Standard C library functions will always invoke a system call when executed from a single-threaded process in a UNIX/Linux operating system? 
- What does the term "phishing" refer to in the context of cybersecurity? 
- What is an ER diagram used for?