About nCircle
Company Description
NCircle is a leading technology company specializing in innovative solutions for data management and analytics. With a commitment to excellence, NCircle fosters a collaborative and inclusive work culture that encourages creativity and professional growth. The company's work environment is characterized by open communication, teamwork, and a strong emphasis on work-life balance. NCircle values diversity and strives to create a supportive atmosphere where every employee can thrive. Employees are empowered to take initiative and contribute to projects that drive the company's mission of delivering cutting-edge technology solutions to clients worldwide.
Software Engineer Interview Questions
Q1: What programming languages are you proficient in?
I am proficient in several programming languages, including Java, Python, and JavaScript. I have used these languages extensively in various projects to develop scalable applications.
Q2: Can you explain the software development lifecycle?
The software development lifecycle (SDLC) consists of several phases: planning, analysis, design, implementation, testing, deployment, and maintenance. Each phase plays a critical role in ensuring that the software meets the requirements and is delivered on time.
Q3: How do you approach debugging a complex issue in your code?
I start by reproducing the issue to understand its context. Then, I systematically isolate parts of the code to identify the root cause. Utilizing debugging tools and logging can also help pinpoint where things are going wrong.
Q4: Describe a project where you had to work as part of a team.
In a recent project, I collaborated with a team of developers to create a web application. We divided tasks based on our strengths, held daily stand-ups to discuss progress, and conducted code reviews to ensure quality.
Q5: What is your experience with version control systems?
I have extensive experience using Git for version control. I am familiar with branching, merging, and resolving conflicts, which are essential for collaborative coding.
Data Analyst Interview Questions
Q1: What tools do you use for data analysis?
I primarily use tools such as Excel, SQL, and Python for data analysis. Additionally, I am familiar with data visualization tools like Tableau and Power BI for presenting data insights.
Q2: Can you explain the importance of data cleaning?
Data cleaning is crucial because it ensures the accuracy and reliability of the analysis. It involves removing duplicates, correcting errors, and dealing with missing values to provide a clear and trustworthy dataset.
Q3: Describe a time when you used data to influence a business decision.
In my previous role, I analyzed customer feedback data and identified trends that indicated a need for product improvements. I presented these findings to management, which led to important changes that enhanced customer satisfaction.
Q4: What statistical methods are you familiar with?
I am familiar with various statistical methods, including regression analysis, hypothesis testing, and descriptive statistics. These methods help in deriving insights and making data-driven decisions.
Q5: How do you ensure the integrity of your data analysis?
I ensure data integrity by following best practices such as validating data sources, using consistent methodologies, and regularly cross-checking results with team members for accuracy.
Project Manager Interview Questions
Q1: How do you prioritize tasks in a project?
I prioritize tasks based on their urgency and impact on project goals. I use project management tools to track progress and ensure that critical tasks are completed first while keeping an eye on the overall timeline.
Q2: Can you describe your experience with Agile project management?
I have worked with Agile methodologies for several projects, where I facilitated sprint planning and retrospective meetings. This approach allowed for flexibility and continuous improvement throughout the project lifecycle.
Q3: How do you handle conflicts within your team?
I address conflicts by encouraging open communication among team members. I facilitate discussions to understand different perspectives and work towards a resolution that aligns with our project goals.
Q4: Describe a successful project you managed.
I successfully managed a software development project that was delivered on time and within budget. I coordinated efforts between cross-functional teams, maintained clear communication, and adapted to changes in requirements effectively.
Q5: What tools do you use for project management?
I use tools like Trello, Jira, and Microsoft Project to plan, track, and manage projects. These tools help me keep the team organized and ensure deadlines are met.
Company Background and Industry Position
nCircle operates in the cybersecurity software space, specializing in vulnerability management solutions designed to help enterprises identify and mitigate cyber risks. Founded in the early 2000s, it quickly carved out a niche by focusing on comprehensive network scanning tools paired with insightful risk analytics. While not a household name like some giant tech firms, nCircle is highly respected in cybersecurity circles for its sharp focus and consistent innovation.
Their products and services primarily cater to medium to large enterprises that require advanced threat detection and compliance management. Given the increasing importance of cybersecurity across industries—finance, healthcare, government sectors—the company sustains steady growth by adapting to evolving market demands and integrating AI-driven threat intelligence.
From a recruitment perspective, nCircle balances startup agility with the stability of an established company. They look for candidates who can navigate both detailed technical challenges and the broader imperatives of cybersecurity strategy. It’s a place where domain expertise meets practical application, making it a meaningful environment for those passionate about defense against cyber threats.
How the Hiring Process Works
- Application and Resume Screening: Initial filtering focuses on matching candidate skills with the job’s technical requirements and relevant experience. Recruiters look beyond keywords to assess concrete achievements in cybersecurity and software development.
- Initial HR Interview: Conducted via phone or video call, this round explores a candidate’s cultural fit, communication skills, and motivation for joining nCircle. It’s less technical and more about alignment with company values and role expectations.
- Technical Assessment: A crucial step involving coding tests, vulnerability analysis exercises, or scenario-based problem-solving relevant to the role. This can be a timed online test or a take-home assignment, depending on the job level.
- Technical Interview: Usually one or two rounds with senior engineers or team leads. Here, candidates dive into deeper technical discussions, system design questions, and domain-specific challenges like penetration testing methodologies or network security protocols.
- Managerial Interview: Focused on leadership qualities, cross-team collaboration, and strategic thinking. Candidates might be asked to reflect on past project management instances or how they handle crisis situations in security.
- Offer and Negotiation: Upon clearing the previous rounds, candidates receive a formal offer. Compensation discussions generally happen here, with room for negotiation based on experience and market benchmarks.
- Onboarding Preparation: Once hired, onboarding is tailored to quickly immerse new hires into both the technical stack and organizational culture.
Interview Stages Explained
Initial Resume Scrutiny and HR Screen
At this stage, recruiters assess more than just qualifications. They’re hunting for problem solvers who can thrive in a dynamic, security-focused environment. Expect questions that probe your understanding of cybersecurity trends and your motivation for joining a specialized firm like nCircle. This round is a filter not just for skills but for enthusiasm and potential cultural fit.
Technical Assessment: The Gatekeeper
This step is pivotal. It’s designed to quickly surface candidates with solid hands-on skills. Depending on the role—be it developer, analyst, or penetration tester—candidates face tailored tasks. For developers, coding challenges on languages like Python or Java are common, along with algorithm questions. Security analysts might tackle case studies involving vulnerability prioritization or incident response plans.
What’s insightful here is that nCircle’s tests aren’t just about textbook knowledge. They emphasize practical application. For instance, a vulnerability analyst might be presented with a simulated network scenario and asked to identify weak points and recommend mitigation strategies. The aim is to mirror real daily challenges.
Technical Interviews: Deep Dive into Expertise
Once you clear the assessment, the conversation shifts to a more interactive format. These interviews are often with senior engineers who expect you to articulate your thought process clearly—no vague answers. You’ll likely face questions about previous projects, detailed explanations of cybersecurity concepts, and perhaps live problem-solving exercises.
One candidate recounted an interview where they had to explain how they would secure a cloud infrastructure against common threats. The interviewer’s goal was to see how candidates integrate theory with practical solutions, and how they stay updated on emerging vulnerabilities.
Managerial Round: Beyond Technical Skills
This phase evaluates soft skills — leadership, decision-making, and teamwork. Cybersecurity is collaborative by nature, often requiring coordination across departments. Managers want to know if you can communicate complex risks to non-technical stakeholders and handle pressure during incidents.
Expect scenario-based questions such as, “Describe a time when you had to persuade a skeptical team to adopt a new security protocol.” It’s less about right or wrong answers and more about your approach and interpersonal skills.
Offer and Onboarding
Offers are competitive but realistic, taking into account current market salary ranges and the candidate’s experience. The onboarding process is structured but flexible, aiming to get new hires productive quickly while supporting continued learning.
Examples of Questions Candidates Report
- “Explain the difference between IDS and IPS systems and their roles in network security.”
- “Write a function to detect SQL injection attack patterns from incoming queries.”
- “How would you prioritize vulnerabilities found in a penetration test report?”
- “Describe a challenging security incident you’ve managed and the steps you took to resolve it.”
- “What strategies do you use to keep up with the latest cybersecurity threats and patches?”
- “In your opinion, how does cloud security differ from traditional on-premises security?”
- “Tell me about a time when you had to communicate a security risk to a non-technical team member.”
- “Walk me through securing a corporate Wi-Fi network in a high-risk environment.”
Eligibility Expectations
nCircle’s hiring criteria are clear but nuanced. Candidates should possess a strong technical foundation—degrees in computer science or related fields are common but not strictly mandatory if supplemented with relevant certifications like CISSP, CEH, or OSCP. Experience in cybersecurity roles is highly valued, especially practical exposure to vulnerability assessment, threat modeling, or network defense.
Soft skills play a significant role too. Because the work entails frequent collaboration and communication beyond technical teams, recruiters prioritize candidates who demonstrate adaptability, critical thinking, and clear communication.
While fresh graduates can find entry points, mid to senior roles typically require 3–5 years of relevant experience. Moreover, knowledge of industry regulations such as GDPR or HIPAA can give candidates a noticeable edge, since compliance is integral to the solutions nCircle provides.
Common Job Roles and Departments
Within nCircle, job roles reflect the spectrum of cybersecurity disciplines, each with distinct hiring nuances:
- Security Analyst: Focuses on vulnerability scanning and incident response. Candidates need to be adept at interpreting scan results and recommending remediation.
- Software Developer: Builds and enhances security tools. Strong coding skills, especially in languages like Python, Java, or C++, are a must.
- Penetration Tester: Simulates cyber attacks to identify weaknesses. Requires a hacker mindset combined with deep technical knowledge.
- Product Manager (Security): Oversees product development with a security lens, bridging technical teams and business goals.
- Technical Support Engineer: Provides client-facing assistance on security products, demanding both technical expertise and customer service skills.
- Compliance Specialist: Ensures products meet regulatory standards, often coordinating with legal and engineering teams.
Compensation and Salary Perspective
| Role | Estimated Salary |
|---|---|
| Security Analyst | $70,000 - $95,000 |
| Software Developer (Security) | $85,000 - $120,000 |
| Penetration Tester | $80,000 - $115,000 |
| Product Manager (Security) | $100,000 - $140,000 |
| Technical Support Engineer | $60,000 - $80,000 |
| Compliance Specialist | $75,000 - $100,000 |
These figures reflect approximate U.S. salaries and can vary based on location, experience, and negotiation. Notably, nCircle’s compensation aligns with market standards for specialized cybersecurity firms, though it might trail behind large tech giants by a small margin. However, the tradeoff often lies in more targeted work, closer team collaboration, and faster career growth opportunities.
Interview Difficulty Analysis
Many candidates find the nCircle interview moderately challenging, particularly at the technical assessment and interview stages. The problem-solving demands are practical, not just theoretical, which can catch those who have learned cybersecurity concepts solely from textbooks.
Compared to other cybersecurity firms, nCircle leans toward a balanced difficulty level—more rigorous than typical IT companies but less intimidating than top-tier consultancies known for brainteasers. The emphasis is clearly on applicable knowledge and problem-solving clarity rather than stress-inducing puzzles.
That said, candidates sometimes express surprise at the depth of domain-specific questions, especially relating to vulnerability management tools and compliance requirements. They advise preparing for scenario-based queries and brushing up on real-world attack vectors to succeed.
Preparation Strategy That Works
- Understand nCircle’s Product Suite: Familiarize yourself with their vulnerability management tools and how they integrate into enterprise security frameworks.
- Brush Up on Core Concepts: Network security fundamentals, common exploits, and defense mechanisms are frequently tested.
- Practice Coding and Scripting: Especially in Python, since automation often plays a major role in security workflows.
- Review Past Projects Thoroughly: Be ready to discuss your real-world experience with specific examples of how you handled security challenges.
- Study Compliance Standards: GDPR, HIPAA, PCI-DSS — understanding these shows you can operate within legal frameworks.
- Mock Interviews: Simulate technical and behavioral interviews with peers to build confidence and improve articulation.
- Keep Updated on Cybersecurity Trends: Read recent vulnerability reports, breach analyses, and emerging threats; this demonstrates genuine interest and knowledge.
- Prepare Questions: Thoughtful questions about team dynamics, tools used, and growth opportunities signal engagement and foresight.
Work Environment and Culture Insights
From the inside, nCircle tends to foster a culture driven by curiosity and continuous learning. Security professionals there often describe an atmosphere where collaboration is encouraged but autonomy respected. Because cybersecurity is a rapidly evolving field, innovation and adaptability are prized traits.
People often notice a pragmatic approach: processes exist for a reason, but there’s space to propose improvements. The company is neither a rigid bureaucratic maze nor a chaotic startup; it strikes a moderate balance that appeals to those who want structure but not stifling rules.
Work-life balance is reportedly handled with some flexibility, mostly because security incidents demand urgent responses from time to time, but the management understands the need for downtime as well. Overall, the culture aligns with the values of professionals who take their work seriously but appreciate a supportive environment.
Career Growth and Learning Opportunities
One of nCircle’s strong points is promoting internal growth. They offer access to continuing education through certifications, conferences, and workshops. Employees are encouraged to pursue advanced credentials, with the company often providing financial support or study time.
The career paths tend to be clear: technical experts can progress into senior engineering roles, or pivot into management and product leadership. Cross-functional moves, such as shifting from development to security analysis or compliance, are possible and supported.
Moreover, since the cybersecurity landscape shifts constantly, ongoing learning isn’t just encouraged—it’s mandatory. This keeps employees engaged and helps the company stay competitive. Candidates who demonstrate a learning mindset often find themselves fast-tracked for promotions and exciting projects.
Real Candidate Experience Patterns
Candidates frequently remark on the transparency throughout the process. Recruiters tend to keep communication clear, which is a relief compared to some companies where silence is deafening. However, the technical interviews can be intense, with several rounds that require mental stamina.
Some have shared stories of feeling challenged but appreciated the interviewers’ respectful tone and willingness to clarify questions. Others, especially those newer to the field, sometimes find the technical assessments unexpectedly tough but fair.
A recurring theme is the value placed on problem-solving approach over “right answers.” Interviewers want to see how you think, not just what you know. This can be a refreshing change from rigid technical tests elsewhere.
Comparison With Other Employers
| Aspect | nCircle | Major Cybersecurity Firm (e.g., Palo Alto Networks) | General IT Company (e.g., Accenture) |
|---|---|---|---|
| Interview Difficulty | Moderate to high, practical focus | High, theory + case study heavy | Moderate, broad IT questions |
| Technical Focus | Deep domain-specific knowledge | Wide security domain + leadership | Varies, less specialized |
| Culture | Collaborative, balanced structure | Fast-paced, high pressure | Process-driven, corporate |
| Growth Opportunities | Strong internal mobility | Large-scale, diverse roles | Varied but less specialized |
| Salary Range | Competitive | Above average | Average to above average |
Expert Advice for Applicants
Don’t underestimate the value of demonstrating how you think. nCircle interviewers appreciate candidates who articulate their reasoning with clarity and honesty—even if you don’t know the perfect answer. It’s about problem-solving, not perfection.
Invest time in understanding the company’s products and the challenges they aim to solve. This insight will set you apart in interviews by showing genuine interest and initiative.
When preparing for technical rounds, focus on hands-on practice rather than rote memorization. Try replicating realistic scenarios or labs that mirror vulnerabilities and attack vectors relevant to nCircle’s domain.
Finally, cultivate your storytelling skills for behavioral questions. Concrete examples of past experiences, especially those involving collaboration or crisis management, resonate well.
Frequently Asked Questions
What kind of technical interview questions does nCircle typically ask?
Expect questions centered around cybersecurity fundamentals, vulnerability assessment, network security protocols, and sometimes coding exercises. Candidates often encounter scenario-based problems requiring them to analyze risks or design mitigation strategies.
How many recruitment rounds are there at nCircle?
Generally, candidates go through around three to five rounds, starting with HR screening, followed by a technical assessment, one or two technical interviews, and a managerial discussion before the offer stage.
Is prior experience in cybersecurity mandatory?
While it is highly preferred, especially for mid-level and senior roles, entry-level positions may accept candidates with strong foundational knowledge and relevant certifications.
How important are certifications like CISSP or OSCP?
These certifications add significant value by validating expertise. Though not always mandatory, they boost candidacy, demonstrating commitment and proficiency in security practices.
What is the expected salary range for a mid-level security analyst at nCircle?
Typically, the mid-level security analyst salary falls between $75,000 and $90,000, depending on experience and location.
Does nCircle provide opportunities for professional development?
Absolutely. The company supports continuous learning through training programs, certifications, and attendance at industry conferences.
How can I improve my chances of passing the technical assessment?
Focus on practicing real-world security problems, brush up on coding (if applicable), and familiarize yourself with nCircle’s tools and cybersecurity trends. Time management and clear explanation of your approach during problem-solving are also key.
What is the company culture like at nCircle?
It’s known for being collaborative, adaptive, and learning-focused, offering a balanced work environment that values both innovation and structure.
Final Perspective
Landing a role at nCircle isn’t simply about answering questions correctly—it’s about demonstrating that you understand the cyber threat landscape, can think critically under pressure, and communicate your ideas clearly. Their interview process reflects the realities of cybersecurity work: complex, dynamic, and highly impactful. While the journey may challenge you, the payoff is a meaningful career with a company that values both expertise and growth.
For candidates, the best approach is to prepare thoughtfully, lean into your real experiences, and come ready to engage in problem-solving conversations rather than rote recitations. If you can navigate the practical assessments and express your passion for security, nCircle offers a platform to thrive and contribute to something that truly matters.
nCircle Interview Questions and Answers
Updated 21 Feb 2026Security Consultant Interview Experience
Candidate: Emily S.
Experience Level: Senior
Applied Via: LinkedIn
Difficulty: Hard
Final Result: Rejected
Interview Process
4
Questions Asked
- How do you approach a security assessment for a new client?
- Explain risk management frameworks you have used.
- Describe a challenging client situation and how you handled it.
- What emerging threats do you think are most critical?
Advice
Prepare to discuss consulting methodologies and client management experiences in depth.
Full Experience
I was contacted via LinkedIn and went through an initial phone interview focused on my consulting background. The next two rounds were technical and behavioral interviews with senior consultants, including case studies and role-play scenarios. The final round was a presentation to leadership. Although I had strong technical skills, the feedback suggested I needed to demonstrate more strategic client management experience.
Incident Response Specialist Interview Experience
Candidate: David R.
Experience Level: Mid-level
Applied Via: Company website
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- Describe your process for handling a malware outbreak.
- What tools do you use for forensic analysis?
- Have you ever coordinated with law enforcement?
- How do you document incidents?
Advice
Focus on incident handling workflows and be ready to discuss tools and coordination experience.
Full Experience
Applied through the company website and had a phone screening that covered my background in incident response. The second round was a technical interview with scenario questions about malware outbreaks and forensic tools. The final round was with the manager and HR, discussing team fit and communication skills. The interviewers valued my practical experience and clear communication.
Security Engineer Interview Experience
Candidate: Cynthia L.
Experience Level: Entry-level
Applied Via: Career fair
Difficulty: Easy
Final Result:
Interview Process
2
Questions Asked
- What is the CIA triad?
- Describe a firewall and its purpose.
- How do you stay updated on cybersecurity trends?
Advice
Have a solid understanding of fundamental security concepts and be enthusiastic about learning.
Full Experience
I met a recruiter at a career fair and submitted my resume. The first interview was a phone call focusing on basic security concepts and my academic projects. The second was an in-person technical interview with practical questions about network security basics. The team was friendly and supportive, making it a great entry point into cybersecurity.
Penetration Tester Interview Experience
Candidate: Brian K.
Experience Level: Senior
Applied Via: Referral
Difficulty: Hard
Final Result: Rejected
Interview Process
4
Questions Asked
- Walk me through a recent penetration test you conducted.
- What tools do you prefer for network scanning and why?
- How do you prioritize vulnerabilities?
- Explain a time you had to convince management about a security risk.
Advice
Prepare detailed examples of penetration tests and be ready to discuss tool choices and risk communication strategies.
Full Experience
Referred by a former employee, I went through an initial HR screening, followed by two technical interviews focusing on penetration testing methodologies and tools. The final round was a case study presentation where I had to analyze a simulated network and present findings. Despite strong technical skills, I felt the communication aspect could have been stronger, which might have influenced the outcome.
Security Analyst Interview Experience
Candidate: Alice M.
Experience Level: Mid-level
Applied Via: Online application
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- Explain the difference between IDS and IPS.
- How do you handle a security breach?
- Describe a time you identified a security vulnerability.
Advice
Brush up on incident response scenarios and be ready to discuss past experiences in detail.
Full Experience
The process started with an online application followed by a phone screen focusing on my background in cybersecurity. The second round was a technical interview with scenario-based questions about intrusion detection systems and handling breaches. The final round was with the team lead, where I discussed my previous projects and how I contributed to improving security posture. Overall, a positive experience that tested both technical knowledge and practical skills.
Frequently Asked Questions in nCircle
Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.
Common Interview Questions in nCircle
Q: A hare and a tortoise have a race along a circle of 100 yards diameter. The tortoise goes in one directionand the hare in the other. The hare starts after the tortoise has covered 1/5 of its distance and that too leisurely.The hare and tortoise meet when the hare has covered only 1/8 of the distance. By what factor should the hareincrease its speed so as to tie the race?
Q: A rich man died. In his will, he has divided his gold coins among his 5 sons, 5 daughters and a manager. According to his will: First give one coin to manager. 1/5th of the remaining to the elder son.Now give one coin to the manager and 1/5th of the remaining to second son and so on..... After giving coins to 5th son, divided the remaining coins among five daughters equally.All should get full coins. Find the minimum number of coins he has?
Q: 3 policemen and 3 thieves had to cross a river using a small boat. Only two can use the boat for a trip. All the 3 policemen and only 1 thief knew to ride the boat. If 2 thieves and 1 policeman were left behind they would kill him. But none of them escaped from the policemen. How would they be able to cross the river?
Q: The citizens of planet nigiet are 8 fingered and have thus developed their decimal system in base 8. A certain street in nigiet contains 1000 (in base 8) buildings numbered 1 to 1000. How many 3s are used in numbering these buildings?
Q: A light bulb is hanging in a room. Outside of the room there are three switches, of which only one is connected to the lamp. In the starting situation, all switches are 'off' and the bulb is not lit. If it is allowed to check in the room only once.How would you know which is the switch?
Q: There are 3 sticks placed at right angles to each other and a sphere is placed between the sticks . Now another sphere is placed in the gap between the sticks and Larger sphere . Find the radius of smaller sphere in terms of radius of larger sphere.
Q: ABCDE are sisters. Each of them gives 4 gifts and each receives 4 gifts No two sisters give the same combination ( e.g. if A gives 4 gifts to B then no other sisters can give four to other one.)Â (i) B gives four to A.(ii) C gives 3 to E. How much did A,B,C,E give to D?
Q: At 6?o a clock ticks 6 times.The time between first and last ticks is 30 seconds.How long does it tick at 12?o clock?2.A hotel has 10 storey. Which floor is above the floor below the floor, below the floor above the floor, below the floor above the fifth.
Q: Every day a cyclist meets a train at a particular crossing .The road is straight before the crossing and both are travelling in the same direction.Cyclist travels with a speed of 10 kmph.One day the cyclist come late by 25 minutes and meets the train 5 km before the crossing.What is the speed of the train?
Q: Tom has three boxes with fruits in his barn: one box with apples, one box with pears, and one box with both apples and pears. The boxes have labels that describe the contents, but none of these labels is on the right box. How can Tom, by taking only one p
Q: A vessel is full of liquid. From the vessel, 1/3rd of the liquid evaporates on the first day. On the second day 3/4th of the remaining liquid evaporates. What fraction of the volume is present at the end of the second day
Q: There are 7 letters A,B,C,D,E,F,GAll are assigned some numbers from 1,2 to 7.B is in the middle if arranged as per the numbers.A is greater than G same as F is less than C.G comes earlier than E.Which is the fourth letter
Q: In a Park, N persons stand on the circumference of a circle at distinct points. Each possible pair of persons, not standing next to each other, sings a two-minute song ? one pair immediately after the other. If the total time taken for singing is 28 minutes, what is N?
Q: Give two dice - one is a standard dice, the other is blank (nothing painted on any of the faces). The problem is to paint the blank dice in such a manner so that when you roll both of them together, the sum of both the faces should lie between 1 and 12. Numbers from 1-12 (both inclusive) equally likely.
Q: Raj has a jewel chest containing Rings, Pins and Ear-rings. The chest contains 26 pieces. Raj has 2 and 1/2 times as many rings as pins, and the number of pairs of earrings is 4 less than the number of rings. How many earrings does Raj have?...
Q: If I walk with 30 miles/hr i reach 1 hour before and if i walk with 20 miles/hr i reach 1 hour late. Find the distance between 2 points and the exact time of reaching destination is 11 am then find the speed with which it walks.
Q: Given a collection of points P in the plane , a 1-set is a point in P that can be separated from the rest by a line, .i.e the point lies on one side of the line while the others lie on the other side. The number of 1-sets of P is denoted by n1(P)....
Q: Jack and his wife went to a party where four other married couples were present. Every person shook hands with everyone he or she was not acquainted with. When the handshaking was over, Jack asked everyone, including his own wife, how many hands they shook?
Q: An escalator is descending at constant speed. A walks down and takes 50 steps to reach the bottom. B runs down and takes 90 steps in the same time as A takes 10 steps. How many steps are visible when the escalator is not operating.Â
Q: A family X went for a vacation. Unfortunately it rained for 13 days when they were there. But whenever it rained in the mornings, they had clear afternoons and vice versa. In all they enjoyed 11 mornings and 12 afternoons. How many days did they stay there totally?