i)- By using definite conditions, A likes Reef and sits one of the extreme end of the row (thus in case1-A either sit at the extreme right end and in case2- A sits at the extreme left end of the row). Only two persons sit between A and D. There are only two persons sit between A and the one who likes Reebok (that means D likes Reebok). (ii)- G likes PF Flyers and sits one of the extreme end of the row. J sits third to the left of F. J neither likes Moon boot nor Adidas (from all these conditions case1 will be eliminated and in case2- G sits at the extreme left end of the row then J sits to its immediate right and F at the right end of the row). The one who likes Moon boot sits diagonally opposite to the one who likes Adidas. Now in case2, there will be two possible cases, case-2(a) and case2 (b); as shown below: Case 2(a) (iii)- H is not an immediate neighbour of the one who likes Moon boot. Only two persons sit between the one who likes Moon boot and the one who likes Kangaroos. The one who likes Kangaroos is not an immediate neighbour of A (from this case2 (a) will be eliminated). E sits third to the right of the one who likes Starbury (E likes Adidas is fixed). The one who likes Heelys faces north (thus it is fixed in row-2). Now, the one who likes Nike faces the person who likes Volley. The one who likes Volley faces the one who sits immediate right of the one who likes Starbury (from this it is clear that the one who likes Starbury faces the one who likes Heelys). K doesn’t face B (thus K faces C). The final arrangement will be:
It is a link layer protocol in the TCP/IP stack, describing how networked devices can format data for transmission to other network devices on the sa...
What is a variable?
A kiosk
When a business can legally copy software to all of the computers they own, the company has a(n) ____________ license:
Date and Time are located on the desktop at
A __________ is computer software that transforms computer code written in one programming language (the source language) into another computer languag...
A __________ is a system designed to prevent unauthorized access to or from a private network
_____________ is applicable to all the computers?
What is the use of dbase III plus?
___________ connects multiple LANs to one another over great geographic distances.