edited by
176 views
0 votes
0 votes

Read the information given below and on the basis of the information, select the correct alternative for question given after the information.

  1. Eleven students $\text{A, B, C, D, E, F, G, H, I, J}$ and $\text{K}$ are sitting in a row of the class facing the teacher.
  2. $\text{D},$ who is to the immediate left to $\text{F},$ is second to the right of $\text{C}.$
  3. $\text{A},$ is the second to the right of $\text{E},$ who is at one of the ends.
  4. $\text{J}$ is the immediate neighbor of $\text{A}$ and $\text{B}$ and third to the left of $\text{G}.$
  5. $\text{H}$ is to the immediate left of $\text{D}$ and third to the right of $\text{I}.$

 

Which of the following groups of friends is sitting to the right of $\text{G}$ ?

  1. $\text{IBJA}$
  2. $\text{ICHDF}$
  3. $\text{CHDF}$
  4. $\text{CHDE}$
edited by

1 Answer

0 votes
0 votes

C. CHDF ..

 

On the basis of given information in the above question, the arrangement of standing will be like below..

 

--E--K--A--J--B--I--G--C--H—D—F

 

CHDF are sitting to the right of G....

Related questions

1 votes
1 votes
1 answer
1
soujanyareddy13 asked Jan 9, 2022
932 views
Let the predicates $D(x,y)$ mean “team $x$ defeated team $y$” and $P(x,y)$ mean “team $x$ has played team $y$”. The quantified formula for the statement that ther...
0 votes
0 votes
1 answer
2
soujanyareddy13 asked Jan 9, 2022
585 views
The File Transfer Protocol is built on ______________.data centric architectureservice-oriented architectureclient server architectureconnection-oriented architecture
0 votes
0 votes
1 answer
3
soujanyareddy13 asked Jan 9, 2022
517 views
More than one word is put in one cache block to:exploit the temporal locality of reference in a programexploit the spatial locality of reference in a programreduce the mi...
0 votes
0 votes
1 answer
4
soujanyareddy13 asked Jan 9, 2022
420 views
In $\text{DPSK}$ technique, the technique used to encode bits is :$\text{AMI}$Differential codeUnipolar $\text{RZ}$ formatManchester formate