edited by
211 views
0 votes
0 votes

Read the information given below and on the basis of the information, select the correct alternative for question given after the information.

  1. Eleven students $\text{A, B, C, D, E, F, G, H, I, J}$ and $\text{K}$ are sitting in a row of the class facing the teacher.
  2. $\text{D},$ who is to the immediate left to $\text{F},$ is second to the right of $\text{C}.$
  3. $\text{A},$ is the second to the right of $\text{E},$ who is at one of the ends.
  4. $\text{J}$ is the immediate neighbor of $\text{A}$ and $\text{B}$ and third to the left of $\text{G}.$
  5. $\text{H}$ is to the immediate left of $\text{D}$ and third to the right of $\text{I}.$

 

Who is sitting in the middle of the row ?

  1. $\text{C}$
  2. $\text{I}$
  3. $\text{B}$
  4. $\text{G}$
edited by

1 Answer

Related questions

1 votes
1 votes
1 answer
1
soujanyareddy13 asked Jan 9, 2022
945 views
Let the predicates $D(x,y)$ mean “team $x$ defeated team $y$” and $P(x,y)$ mean “team $x$ has played team $y$”. The quantified formula for the statement that ther...
0 votes
0 votes
1 answer
2
soujanyareddy13 asked Jan 9, 2022
603 views
The File Transfer Protocol is built on ______________.data centric architectureservice-oriented architectureclient server architectureconnection-oriented architecture
0 votes
0 votes
1 answer
3
soujanyareddy13 asked Jan 9, 2022
529 views
More than one word is put in one cache block to:exploit the temporal locality of reference in a programexploit the spatial locality of reference in a programreduce the mi...
0 votes
0 votes
1 answer
4
soujanyareddy13 asked Jan 9, 2022
442 views
In $\text{DPSK}$ technique, the technique used to encode bits is :$\text{AMI}$Differential codeUnipolar $\text{RZ}$ formatManchester formate