About one identity
Company Description
One Identity is a leading cybersecurity company specializing in identity and access management solutions. The company is dedicated to providing organizations with the tools they need to secure their digital identities, streamline access, and enhance compliance. One Identity's innovative products are designed to protect against the rising threats of cyberattacks while enabling seamless user experiences. The work culture at One Identity is marked by collaboration, inclusivity, and a commitment to professional growth. Employees are encouraged to share ideas, innovate, and contribute to a shared mission of safeguarding identities in an increasingly digital world. The job environment is dynamic and supportive, with a focus on work-life balance, employee well-being, and ongoing development opportunities.
Software Engineer Interview Questions
Q1: Can you describe your experience with identity management systems?
I have worked extensively with identity management systems, specifically implementing and maintaining solutions that automate user provisioning and de-provisioning. My experience includes using tools such as Microsoft Azure Active Directory and Okta to create secure access protocols.
Q2: How do you approach debugging a complex software issue?
My approach involves first replicating the issue to understand the context. I then analyze logs and error messages to trace the problem systematically. I often collaborate with team members to gather different perspectives, leading to a more effective resolution.
Q3: What programming languages are you proficient in, and which have you used in previous projects?
I am proficient in Java, C#, and Python. In previous projects, I primarily used Java for backend development and Python for scripting and automation tasks.
Q4: Can you explain the concept of role-based access control (RBAC)?
Role-based access control (RBAC) is a method of restricting system access to authorized users based on their roles within an organization. Each role has specific permissions that align with the responsibilities of the position, ensuring that individuals only access the data necessary for their roles.
Q5: Describe a time when you had to work under a tight deadline. How did you handle it?
On one occasion, we had a critical software update that needed to be deployed within a week. I prioritized tasks, communicated effectively with my team, and we worked overtime to meet the deadline, ensuring quality was not compromised.
Product Manager Interview Questions
Q1: What experience do you have in managing product life cycles?
I have managed multiple product life cycles, from initial concept through launch and ongoing enhancements. This includes gathering customer feedback, conducting market research, and coordinating with cross-functional teams to ensure alignment with business goals.
Q2: How do you prioritize features for a new product?
I prioritize features by considering factors such as customer demand, alignment with business objectives, and resource availability. I also use frameworks like the MoSCoW method to categorize features into must-haves, should-haves, could-haves, and won't-haves.
Q3: Describe a successful product launch you managed.
I led the launch of a new identity management solution which involved extensive market research and customer engagement. The launch exceeded our sales targets by 30% within the first quarter due to effective marketing strategies and strong customer support.
Q4: How do you measure the success of a product post-launch?
I measure success through key performance indicators (KPIs) such as user adoption rates, customer satisfaction scores, and retention metrics. I also gather qualitative feedback from users to understand their experiences and areas for improvement.
Q5: How do you handle conflicts within your team?
I address conflicts by fostering open communication and encouraging team members to express their concerns. I facilitate discussions to find common ground and ensure all voices are heard, leading to collaborative solutions that benefit the team and the project.
Sales Executive Interview Questions
Q1: What strategies do you use to generate leads in a competitive market?
I employ a combination of networking, leveraging social media, and attending industry events to generate leads. Additionally, I utilize CRM tools to track interactions and identify potential prospects based on their engagement levels.
Q2: How do you approach a sales pitch to a potential client?
I tailor my pitch to address the specific needs and pain points of the client. I begin by understanding their challenges, then present our solutions highlighting how they can add value and improve their current situation.
Q3: Describe a time when you exceeded your sales targets.
In my previous role, I exceeded my quarterly sales target by 50% by developing a strategic partnership with a key industry player, resulting in a significant increase in referrals and joint marketing opportunities.
Q4: How do you build and maintain relationships with clients?
I prioritize regular communication, follow-ups, and personalized interactions to build trust. I also ensure that I am available to address any concerns promptly, which helps maintain long-term, positive relationships.
Q5: What do you think is the most important trait for a successful sales executive?
Resilience is critical in sales. The ability to bounce back from rejection, learn from experiences, and maintain a positive attitude is essential for sustained success in a competitive environment.
Customer Support Specialist Interview Questions
Q1: How do you ensure customer satisfaction in your interactions?
I actively listen to customers to understand their issues fully and provide clear, empathetic responses. I follow up to ensure their problems are resolved and seek feedback to improve future interactions.
Q2: Can you describe a challenging customer interaction and how you handled it?
I once dealt with an irate customer who faced repeated issues with our product. I remained calm, acknowledged their frustration, and worked to resolve the issue while keeping them informed. By the end of the call, the customer expressed appreciation for my support.
Q3: What tools or software are you familiar with in customer support?
I am familiar with customer support platforms such as Zendesk and Freshdesk, as well as CRM systems that help track customer interactions and issues.
Q4: How do you prioritize multiple customer inquiries?
I assess the urgency and complexity of each inquiry, prioritizing critical issues that impact multiple users or business operations. I also ensure that I manage my time effectively to provide timely responses to all customers.
Q5: What do you believe is the key to effective communication in customer support?
Clarity and empathy are key. I strive to communicate information in an easily understandable manner while showing genuine concern for the customer's situation. This builds trust and rapport.
Conclusion Interview Questions
With a focus on identity and access management, One Identity offers exciting career opportunities across various roles, fostering a collaborative and innovative workplace culture. The interview questions provided can help candidates prepare effectively for their desired positions within the company.
Company Background and Industry Position
One Identity is a significant player in the identity and access management (IAM) space, part of the broader cybersecurity ecosystem. Their focus is on delivering solutions that help organizations manage user identities, secure privileged accounts, and ensure compliance with data regulations. In an era where digital transformation accelerates, the importance of identity governance cannot be overstated. One Identity has carved a niche by blending innovative technology with deep industry knowledge, supporting enterprises across sectors like finance, healthcare, and government.
They’re not just another cybersecurity company; their reputation anchors on trusted IAM software that simplifies complex security needs. That reputation translates into rigorous hiring standards, especially since the roles often require a specialized understanding of security protocols and enterprise software environments. For job seekers, this means aligning with a company that values technical acumen as much as cultural fit—because in cybersecurity, one misstep can cost dearly.
How the Hiring Process Works
- Application and Resume Screening: The process typically begins with submitting an online application. One Identity recruiters look for candidates whose resumes reflect relevant job roles, specific technical skills, and professional certifications. Because the company operates in a niche tech sector, keyword matching often plays a big role here, but so does demonstrated experience in similar environments.
- Initial HR Interview: This usually takes the form of a phone or video call, designed to gauge cultural fit, communication skills, and candidate motivations. The recruiter is also keen to confirm eligibility criteria such as work authorization and availability.
- Technical Assessment: Depending on the role, candidates might face coding tests, scenario-based questions, or problem-solving exercises. For cybersecurity roles, expect questions around IAM concepts, security protocols, and sometimes even live troubleshooting tasks.
- Technical Interview Rounds: These interviews are often conducted by senior engineers or team leads and dive into the nuts and bolts of one’s expertise. Candidates will be questioned on system architecture, security frameworks, and real-world application of IAM products.
- Behavioral and Leadership Interviews: For mid to senior-level positions, interviews focus on team collaboration, conflict resolution, and leadership potential. One Identity emphasizes a strong team culture, so how you work with others matters.
- Final HR Discussion and Offer: The last step involves negotiation of salary range, benefits, and any other employment terms. Transparency is usually appreciated here as One Identity aims to maintain a positive candidate experience.
This layered approach serves a dual purpose: ensuring candidates not only match the technical bar but also align well with corporate values. It’s common for candidates to feel the process is thorough, sometimes intense, but fundamentally fair—the company invests in getting their hires right to maintain their industry edge.
Interview Stages Explained
Initial HR Interview
This stage is less about technical prowess and more about personality fit. Recruiters evaluate your communication skills, professionalism, and clarify your career aspirations. They might ask about your understanding of One Identity’s market, probing gently to see if you’ve done your homework. It’s also where logistical questions are tackled—like relocation willingness or salary expectations.
Technical Assessment
The technical evaluation can vary dramatically based on the role. For software developers, coding challenges focusing on algorithms, data structures, and sometimes domain-specific knowledge like API security are typical. For security analysts or IAM specialists, expect scenario-based questions on access management policies, identity lifecycle management, and incident response.
The rationale behind this stage is practical: the company wants to see how you apply your knowledge under time constraints, mirroring situations you might encounter on the job. It’s not just about right answers but your approach and problem-solving style.
Technical Interview Rounds
Once you’ve cleared the assessment, you enter a more conversational yet technical phase. Expect deep dives into your past projects. Interviewers want to understand your decision-making process, familiarity with IAM tools, and your ability to troubleshoot complex problems. These rounds often involve whiteboard sessions or live problem-solving discussions.
Interviewers look for candidates who can explain complex ideas clearly and show adaptability. You’re not just showcasing knowledge here—you’re demonstrating how you think.
Behavioral and Leadership Interviews
For roles beyond entry-level, leadership qualities come under scrutiny. Hiring managers assess soft skills, such as conflict resolution, mentoring ability, and cross-departmental collaboration. This stage often explores scenarios like managing a high-stakes project or leading a response to a security breach. Interviewers want to ensure you’re not only technically sound but also a culture add.
Final HR Discussion
The last interview is often a two-way street. It’s your chance to ask detailed questions about One Identity’s values, team dynamics, and growth opportunities. Simultaneously, HR confirms final details and initiates offer discussions. Transparency here helps avoid surprises and builds trust.
Examples of Questions Candidates Report
- Technical: “How would you design an access control system for a multi-tenant cloud environment?”
- Technical: “Explain the principle of least privilege and how you would implement it in an enterprise.”
- Behavioral: “Tell me about a time you had to convince a team member to follow a security policy they initially disagreed with.”
- Behavioral: “Describe a challenging project and how you managed deadlines and stakeholder expectations.”
- HR: “What do you know about One Identity’s product suite and its place in the cybersecurity market?”
- HR: “Where do you see yourself in the next three years?”
Eligibility Expectations
One Identity looks for candidates who meet clear eligibility criteria depending on the role. For technical positions, this typically means a bachelor’s degree in computer science, information security, or a related field. Professional certifications like CISSP, CISM, or vendor-specific IAM certifications often strengthen an application.
Experience-wise, they value hands-on exposure to identity governance, privileged access management, and cloud security. For entry-level roles, internships or co-op programs in cybersecurity can make a difference. Mid-level and senior roles demand several years of demonstrable experience. Additionally, candidates must be authorized to work in the country of employment—a non-negotiable hurdle.
Soft skills like communication, teamwork, and adaptability are just as critical. Candidates who can articulate complex security concepts to non-technical stakeholders stand out.
Common Job Roles and Departments
One Identity’s hiring spans a range of specialized roles, often grouped within these departments:
- Software Development: Roles include backend and frontend developers working on IAM products, APIs, and cloud integration.
- Security Engineering: Focused on designing and implementing security features within the product suite, including encryption and access control.
- Product Management: Professionals who bridge technology and customer needs, guiding product roadmaps.
- Technical Support and Consulting: Client-facing roles that require deep product knowledge and troubleshooting skills.
- Sales Engineering: Technical experts who assist sales teams by providing demos and technical validation.
- Customer Success and Training: Helping clients adopt solutions effectively and ensuring ongoing satisfaction.
The company’s layered structure means even within one department, there are sub-specialties requiring focused expertise.
Compensation and Salary Perspective
| Role | Estimated Salary |
|---|---|
| Software Engineer | $85,000 - $120,000 |
| Security Analyst | $75,000 - $110,000 |
| Product Manager | $95,000 - $140,000 |
| Technical Support Engineer | $65,000 - $90,000 |
| Sales Engineer | $90,000 - $130,000 (plus commission) |
| Customer Success Manager | $70,000 - $105,000 |
Compared to industry averages, One Identity offers competitive salary ranges, particularly when factoring in benefits and potential bonuses. Candidates should note that salaries can vary significantly with location, experience, and negotiation skills. Transparency about salary expectations early in the process tends to facilitate smoother negotiations.
Interview Difficulty Analysis
Many candidates find the One Identity hiring process moderately challenging. The technical rounds are designed to test real-world problem-solving rather than theoretical knowledge, which can catch some off guard if they prepare purely from textbooks. For example, a developer might be asked to tweak code live or debug IAM workflow issues, not just answer conceptual questions.
The behavioral interviews are typically less daunting but require thoughtful reflection on past experiences and clear storytelling. Some candidates mention the layering of technical and HR rounds as exhausting but fair—the company’s thoroughness reflects the critical nature of their products.
Compared to peers in IAM or cybersecurity, One Identity’s process is neither the easiest nor the harshest. It’s pragmatic, aiming to filter in candidates who can both think technically and fit culturally.
Preparation Strategy That Works
- Understand IAM Fundamentals: Deepen your knowledge of identity lifecycle, access control models, and privileged account management.
- Hands-On Practice: Use sandbox environments or labs to get practical experience with IAM tools and scripting.
- Brush Up on System Design: Review architecture principles related to security, cloud, and identity federation.
- Mock Interviews: Practice explaining complex concepts clearly, especially around security policies and troubleshooting scenarios.
- Research One Identity’s Products: Explore their website, case studies, and competitor landscape to show genuine interest during interviews.
- Prepare Behavioral Stories: Reflect on your past experiences to have concrete examples ready about teamwork, leadership, and problem-solving.
- Clarify Salary Expectations: Know your worth but stay flexible to facilitate negotiation.
Work Environment and Culture Insights
From what insiders and recent hires share, One Identity promotes a culture that balances innovation with accountability. Teams tend to be collaborative yet results-driven, reflecting the seriousness of cybersecurity responsibilities. Employees often mention a culture that encourages continuous learning—critical in an industry that evolves rapidly.
Work-life balance varies across departments but is generally reasonable. Remote work options have expanded, especially post-pandemic, allowing for greater flexibility. Leadership is described as approachable, with open lines for feedback and career discussions.
Cultural fit is emphasized. If you thrive in a setting where precision matters and security isn’t just a buzzword but a daily mission, you’ll find One Identity rewarding.
Career Growth and Learning Opportunities
One Identity invests in professional development, offering access to certification programs, workshops, and conferences. Technical employees frequently have the chance to rotate between projects or teams, gaining exposure to different aspects of IAM and cybersecurity.
Promotion pathways are clear but merit-based. Employees who demonstrate curiosity, initiative, and leadership tend to progress faster. The company also encourages mentoring relationships, recognizing that knowledge transfer is crucial in a fast-moving tech sector.
For candidates eager to remain at the cutting edge, One Identity doesn’t disappoint. Learning is embedded in the job, supported by both formal training and informal knowledge-sharing.
Real Candidate Experience Patterns
Candidates often describe their experience as intensive but rewarding. One software engineer recalled having to debug a live IAM scenario during a technical round, which felt nerve-wracking but ultimately fair. Another applicant noted that the behavioral interview felt like a genuine conversation rather than a grilling session, making it easier to open up.
Waiting periods between rounds can sometimes feel longer than expected, which may cause anxiety. However, most candidates appreciate the transparency of recruiters who provide regular updates. Salary discussions are reported to be candid, with HR teams willing to explain the rationale behind offers.
Overall, a pattern emerges: preparation, honesty, and patience go a long way in navigating One Identity’s recruitment rounds.
Comparison With Other Employers
When stacked against other cybersecurity firms or IAM vendors, One Identity’s hiring protocol strikes a balance between depth and accessibility. Companies like CyberArk or SailPoint might pose tougher technical questions or have additional interview stages, yet One Identity is known for a more holistic approach—combining technical rigor with cultural evaluation.
| Aspect | One Identity | CyberArk | SailPoint |
|---|---|---|---|
| Average Number of Interview Rounds | 4-5 | 5-6 | 4-6 |
| Focus on Behavioral Questions | High | Moderate | Moderate |
| Technical Depth | Moderate to High | High | High |
| Candidate Experience | Transparent and Supportive | Competitive and Intense | Challenging but Structured |
| Salary Range | Competitive | Generally Higher | Competitive |
For candidates weighing options among IAM employers, understanding these nuances can guide preparation and expectations effectively.
Expert Advice for Applicants
Approach the One Identity hiring process with both confidence in your technical skills and humility in your learning attitude. Remember, they seek problem solvers who can adapt—not just coders who memorize answers.
Don’t underestimate the power of storytelling during behavioral interviews. Real situations where you made a difference tell more than rehearsed answers. Also, come armed with thoughtful questions about their culture and product vision; it shows engagement beyond just landing a job.
Before technical rounds, review recent developments in IAM and cybersecurity. Incorporate examples related to cloud security trends or compliance challenges—you’ll demonstrate you’re current and proactive.
Finally, be patient. The process can feel drawn out, but it’s designed to find the best mutual fit. If you don’t succeed at first, use the experience to hone your approach for future opportunities.
Frequently Asked Questions
What kind of technical interview questions should I expect for a software engineering role at One Identity?
You’ll encounter questions focused on algorithms, data structures, and system design with a twist toward security and IAM concepts. Additionally, expect scenario-based questions around handling access control or identity federation. Practical coding exercises or whiteboard sessions are common.
How long does the overall recruitment process take?
The timeline varies but typically spans 3 to 6 weeks from application to offer. Some delays occur due to scheduling multiple rounds or internal approvals. Candidates appreciate proactive communication from recruiters during this time.
Is prior experience in identity and access management mandatory?
While it strongly benefits applicants, especially for technical roles, some positions may accept candidates with general cybersecurity or software experience who demonstrate strong learning potential and relevant foundational skills.
Does One Identity offer remote work options?
Yes, particularly after the pandemic, remote and hybrid work arrangements have become common, depending on the role and team. Flexibility is part of the company’s culture now.
What is the best way to prepare for behavioral interviews with One Identity?
Reflect on your real work experiences, focusing on teamwork, conflict resolution, and leadership. Use the STAR method (Situation, Task, Action, Result) to structure compelling answers, but keep them conversational rather than robotic.
Final Perspective
Landing a job at One Identity means stepping into a company that sits at a fascinating crossroads of cybersecurity and enterprise software. Their interview process is designed not just to evaluate your skills but to understand how you think and fit within their culture. It’s a journey that demands preparation, reflection, and genuine engagement.
For candidates willing to dive deep into identity and access management, and who value a collaborative, learning-focused environment, One Identity offers more than just a job—it offers a chance to be part of a critical mission in today’s security landscape. The challenges you face during recruitment are a fair preview of the impact you’ll have once you join. So, prepare well, stay curious, and you might find a fulfilling career awaiting.
one identity Interview Questions and Answers
Updated 21 Feb 2026Cybersecurity Analyst Interview Experience
Candidate: Emily Zhang
Experience Level: Mid-Level
Applied Via: Indeed
Difficulty: Hard
Final Result: Rejected
Interview Process
4
Questions Asked
- Describe your experience with SIEM tools.
- How do you stay updated on cybersecurity threats?
- Explain a security incident you managed and the resolution steps.
- What is multi-factor authentication and why is it important?
- Perform a risk assessment on a hypothetical identity management system.
Advice
Gain hands-on experience with security tools and be prepared for scenario-based questions.
Full Experience
The process was intense with multiple technical interviews and a practical case study. The interviewers expected deep knowledge of cybersecurity frameworks and identity management challenges. Although I had relevant experience, I lacked some specific tool expertise they were seeking.
Technical Support Specialist Interview Experience
Candidate: David Kim
Experience Level: Mid-Level
Applied Via: Job Fair
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- How do you troubleshoot complex technical issues?
- Explain a time you handled a difficult customer.
- What experience do you have with identity management software?
- Describe your knowledge of networking protocols relevant to security.
Advice
Be ready to demonstrate problem-solving skills and customer service experience in a technical context.
Full Experience
I met the recruiter at a job fair and was invited to apply. The interview process included a phone screen, a technical assessment, and a final interview with the support team lead. They tested my technical knowledge and situational responses to customer issues.
Sales Executive Interview Experience
Candidate: Carmen Diaz
Experience Level: Entry-Level
Applied Via: Referral
Difficulty: Easy
Final Result:
Interview Process
2
Questions Asked
- How do you approach building relationships with clients?
- What do you know about One Identity’s products?
- Describe a time you met or exceeded sales targets.
Advice
Learn the product portfolio well and demonstrate strong interpersonal skills.
Full Experience
I was referred by a current employee and had two interviews: one with HR and one with the sales manager. The questions were straightforward and focused on my sales experience and motivation. They valued my enthusiasm and willingness to learn about cybersecurity sales.
Product Manager Interview Experience
Candidate: Brian Lee
Experience Level: Senior
Applied Via: Company Website
Difficulty: Hard
Final Result: Rejected
Interview Process
4
Questions Asked
- How would you prioritize features for an identity management product?
- Describe your experience working with cross-functional teams.
- How do you handle conflicting stakeholder requirements?
- Explain a product launch you managed end-to-end.
- What metrics would you track for a cybersecurity product?
Advice
Prepare detailed examples of product management in security-related fields and be ready to discuss metrics and prioritization frameworks.
Full Experience
The process was rigorous with multiple rounds including a case study presentation. The interviewers were very focused on my experience with security products and stakeholder management. Despite good feedback, I was not selected due to stronger candidates with more direct cybersecurity product experience.
Software Engineer Interview Experience
Candidate: Alice Johnson
Experience Level: Mid-Level
Applied Via: LinkedIn
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- Explain the concept of OAuth and how it is used in identity management.
- Describe a time you optimized a piece of code for performance.
- How do you ensure security in your software development lifecycle?
- Write a function to validate a user’s password strength.
Advice
Brush up on identity management protocols and be prepared for coding challenges focused on security.
Full Experience
I applied through LinkedIn and was contacted within a week. The first round was a technical phone screen with coding questions. The second round was a virtual interview focusing on system design and security concepts. The final round was an onsite interview with the team, including behavioral questions and a coding exercise. The interviewers emphasized the importance of security best practices in development.
Frequently Asked Questions in one identity
Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.
Common Interview Questions in one identity
Q: A rich merchant had collected many gold coins. He did not want anybody to know about them. One day his wife asked, "How many gold coins do we have?" After pausing a moment, he replied, "Well! If I divide the coins into two unequal numbers, then 32 times the difference between the two numbers equals the difference between the squares of the two numbers."The wife looked puzzled. Can you help the merchant's wife by finding out how many gold coins they have?
Q: Suppose a newly-born pair of rabbits, one male, one female, are put in a field. Rabbits are able to mate at the age of one month so that at the end of its second month a female can produce another pair of rabbits. Suppose that our rabbits never die and that the female always produces one new pair (one male, one female) every month from the second month on.
Q: A rich man died. In his will, he has divided his gold coins among his 5 sons, 5 daughters and a manager. According to his will: First give one coin to manager. 1/5th of the remaining to the elder son.Now give one coin to the manager and 1/5th of the remaining to second son and so on..... After giving coins to 5th son, divided the remaining coins among five daughters equally.All should get full coins. Find the minimum number of coins he has?
Q: Consider a pile of Diamonds on a table. A thief enters and steals 1/2 of the total quantity and then again 2 extra from the remaining. After some time a second thief enters and steals 1/2 of the remaining+2. Then 3rd thief enters and steals 1/2 of the remaining+2. Then 4th thief enters and steals 1/2 of the remaining+2. When the 5th one enters he finds 1 diamond on the table. Find out the total no. of diamonds originally on the table before the 1st thief entered.
Q: There are 3 clans in an island - The Arcs who never lie, the Dons who always lie and the Slons who lie alternately with the truth. Once a tourist meets 2 guides who stress that the other is a Slon. They proceed on a tour and see a sports meet. The first guide says that the prizes have been won in the order Don, Arc, Slon. The other says that, the order is Slon, Don, Arc. (the order need not be exact). To which clan did each of the guides and the players belong? ...
Q: 3 policemen and 3 thieves had to cross a river using a small boat. Only two can use the boat for a trip. All the 3 policemen and only 1 thief knew to ride the boat. If 2 thieves and 1 policeman were left behind they would kill him. But none of them escaped from the policemen. How would they be able to cross the river?
Q: T, U, V are 3 friends digging groups in fields. If T & U can complete i groove in 4 days &, U & V can complete 1 groove in 3 days & V & T can complete in 2 days. Find how many days each takes to complete 1 groove individually.
Q: There are 3 sticks placed at right angles to each other and a sphere is placed between the sticks . Now another sphere is placed in the gap between the sticks and Larger sphere . Find the radius of smaller sphere in terms of radius of larger sphere.
Q: There is a room with a door (closed) and three light bulbs. Outside the room there are three switches, connected to the bulbs. You may manipulate the switches as you wish, but once you open the door you can't change them. Identify each switch with its bulb.
Q: Every day a cyclist meets a train at a particular crossing .The road is straight before the crossing and both are travelling in the same direction.Cyclist travels with a speed of 10 kmph.One day the cyclist come late by 25 minutes and meets the train 5 km before the crossing.What is the speed of the train?
Q: A long, long time ago, two Egyptian camel drivers were fighting for the hand of the daughter of the sheik of Abbudzjabbu. The sheik, who liked neither of these men to become the future husband of his daughter, came up with a clever plan: a race would dete
Q: Tom has three boxes with fruits in his barn: one box with apples, one box with pears, and one box with both apples and pears. The boxes have labels that describe the contents, but none of these labels is on the right box. How can Tom, by taking only one p
Q: In a Park, N persons stand on the circumference of a circle at distinct points. Each possible pair of persons, not standing next to each other, sings a two-minute song ? one pair immediately after the other. If the total time taken for singing is 28 minutes, what is N?
Q: Consider a series in which 8 teams are participating. each team plays twice with all other teams. 4 of them will go to the semi final. How many matches should a team win, so that it will ensure that it will go to semi finals.?
Q: In a country where everyone wants a boy, each family continues having babies till they have a boy. After some time, what is the proportion of boys to girls in the country? (Assuming probability of having a boy or a girl is the same)
Q: An escalator is descending at constant speed. A walks down and takes 50 steps to reach the bottom. B runs down and takes 90 steps in the same time as A takes 10 steps. How many steps are visible when the escalator is not operating.Â
Q: A family X went for a vacation. Unfortunately it rained for 13 days when they were there. But whenever it rained in the mornings, they had clear afternoons and vice versa. In all they enjoyed 11 mornings and 12 afternoons. How many days did they stay there totally?
Q: A Man is sitting in the last coach of train could not find a seat, so he starts walking to the front coach ,he walks for 5 min and reaches front coach. Not finding a seat he walks back to last coach and when he reaches there,train had completed 5 miles. what is the speed of the train ?
Q: A man driving the car at twice the speed of auto one day he was driven car for 10 min. and car is failed. he left the car and took auto to go to the office .he spent 30 min. in the auto. what will be the time take by car to go office?
Q: A person meets a train at a railway station coming daily at a particular time. One day he is late by 25 minutes, and he meets the train 5 k.m. before the station. If his speed is 12 kmph, what is the speed of the train.