There are 85 people in a warehouse, out of which some have been turned into zombies while some are still alive. If the ratio of zombies to living human beings is 2:3, calculate the total number of zombies.
zombies : human = 2:3 ∴ zombie = 2 ratio human = 3 ratio
There are 85 people in a warehouse, out of which some have been turned into zombies while some are still alive. If the ratio of zombies to living human beings is 2:3, calculate the total number of zombies.
zombies : human = 2:3 ∴ zombie = 2 ratio human = 3 ratio
and, zombies + human = 85 ratio = 2+3 = 5
so, 1 ratio = 85 ÷ 5 1 ration = 17
zombie = 2 x 17 = 34 human = 3 x 17 = 51
Answer: 34
BY Riddles Repository - Answers
Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283
Among the actives, Ascendas REIT sank 0.64 percent, while CapitaLand Integrated Commercial Trust plummeted 1.42 percent, City Developments plunged 1.12 percent, Dairy Farm International tumbled 0.86 percent, DBS Group skidded 0.68 percent, Genting Singapore retreated 0.67 percent, Hongkong Land climbed 1.30 percent, Mapletree Commercial Trust lost 0.47 percent, Mapletree Logistics Trust tanked 0.95 percent, Oversea-Chinese Banking Corporation dropped 0.61 percent, SATS rose 0.24 percent, SembCorp Industries shed 0.54 percent, Singapore Airlines surrendered 0.79 percent, Singapore Exchange slid 0.30 percent, Singapore Press Holdings declined 1.03 percent, Singapore Technologies Engineering dipped 0.26 percent, SingTel advanced 0.81 percent, United Overseas Bank fell 0.39 percent, Wilmar International eased 0.24 percent, Yangzijiang Shipbuilding jumped 1.42 percent and Keppel Corp, Thai Beverage, CapitaLand and Comfort DelGro were unchanged.
Why Telegram?
Telegram has no known backdoors and, even though it is come in for criticism for using proprietary encryption methods instead of open-source ones, those have yet to be compromised. While no messaging app can guarantee a 100% impermeable defense against determined attackers, Telegram is vulnerabilities are few and either theoretical or based on spoof files fooling users into actively enabling an attack.