Question
How many seats are there around the
table? Study the following information carefully and answer the questions given below: A certain number of persons are sitting around the circular table. All of them are facing towards the center. Three persons sit between A and K who sits second to the left of C. E sits to the immediate left of G who sits second to the left of M. M sits third to the left of I who sits an immediate neighbour of K. Both E and A sit adjacent to each other. The number of persons sits between G and K is one less than the number of persons sits between K and E when counted from the right of both G and K respectively. At least one person sits between C and E when counted from the right of C.Solution
STEP I: M sits third to the left of I who sits an immediate neighbour of K. Three persons sit between A and K who sits second to the left of C. As per these statements, we can say that there are three possible cases and the arrangement will look like this:
STEP II: E sits to the immediate left of G who sits second to the left of M. Both E and A sit adjacent to each other. The number of persons sits between G and K is one less than the number of persons sits between K and E when counted from the right of both G and K respectively. At least one person sits between C and E when counted from the right of C. As per these statements, CASE I and CASE III get eliminated and we continue with CASE II and the final arrangement will look like this: 
The concept of demand paging relies on:
Which service model offers virtual machines and storage resources?
Which of the following statement is INCORRECT related to mysql_list_tables() function ?
What are the different modes of fiber optic communication?
Which of the following element in XSLT is used to apply a template repeatedly on each node?
Which I/O scheduling algorithm is designed to reduce the average response time for disk operations by prioritizing requests based on proximity to the cu...
Which of the following programming language can be used to process text data for the requirements in various textual data analysis?Â
What is the primary goal of access authentication in computer systems?
Which AI technique is used for uncertain reasoning?
What is overfitting in the context of machine learning models?