Solved

quick riddle for the "developers" :)

Posted on 2012-03-23
7
1,112 Views
Last Modified: 2012-03-23
Check out this "problem": solved by pre-school kids in 5-10 minutes, and developers (like me) usually take average 1 hour, and higher-graded people ...
Well, check it out for yourself: what should be the solution of the last line:

8809=6
7111=0
2172=0
6666=4
1111=0
3213=0
7662=2
9313=1
0000=4
2222=0
3333=0
5555=0
8193=3
8096=5
7777=0
9999=4
7756=1
6855=3
9881=5
5531=0
2581=?
0
Comment
7 Comments
 
LVL 84

Assisted Solution

by:ozo
ozo earned 167 total points
ID: 37756074
2
0
 
LVL 10

Assisted Solution

by:abbright
abbright earned 333 total points
ID: 37756083
2
0
 
LVL 84

Expert Comment

by:ozo
ID: 37756088
What would
4444=?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 10

Expert Comment

by:abbright
ID: 37756090
4444=4
0
 
LVL 10

Accepted Solution

by:
abbright earned 333 total points
ID: 37756101
The number behind the "=" gives the amount of enclosed space in the numbers before.
1,2,3,5,7 don't enclose any space
4,6,9 have one enclosure
8 has two enclosures
Therefore: 2581=2 (the two enclosures of the eight), 4444=4 (four times the one enclosure of the four).
These can be easily counted but there is no real mathematics envolved, so it can be solved by pre-school kids very easily.
0
 
LVL 142

Author Closing Comment

by:Guy Hengel [angelIII / a3]
ID: 37756111
I see, no "challenge" for the real experts :)
0
 
LVL 53

Expert Comment

by:Infinity08
ID: 37756117
depends on how you write your 4 (or what font you use - think of a digital clock eg.) ... which is presumably why it was left out of the riddle (to avoid confusion)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Build an array called $myWeek which will hold the array elements Today, Yesterday and then builds up the rest of the week by the name of the day going back 1 week.   (CODE) (CODE) Then you just need to pass your date to the function. If i…
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

937 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

5 Experts available now in Live!

Get 1:1 Help Now