About securonix
Company Description
Securonix is a leading provider of next-generation security information and event management (SIEM) solutions. Founded in 2013, the company leverages machine learning and advanced analytics to deliver comprehensive threat detection, investigation, and response capabilities. Securonix's innovative platform allows organizations to identify and mitigate threats in real-time, ensuring the protection of critical assets and sensitive data. The work culture at Securonix is characterized by a commitment to excellence, collaboration, and continuous learning. Employees are encouraged to think creatively and take initiative, fostering a dynamic environment where innovation thrives. The job environment is inclusive and supportive, with a strong emphasis on professional development and work-life balance.
Job Roles Interview Questions
Based on Securonix's focus on cybersecurity and SIEM, here are some relevant job roles:
1. Security Analyst
2. Data Scientist
3. DevOps Engineer
4. Software Engineer
5. Product Manager
Security Analyst Interview Questions
Q1: What tools do you use for monitoring and analyzing security incidents?
I utilize various SIEM tools like Splunk and Securonix itself, as well as endpoint detection and response solutions like CrowdStrike. Additionally, I leverage threat intelligence platforms to stay updated on current threats.
Q2: Can you explain how you would respond to a security breach?
In the event of a security breach, I would first contain the breach to prevent further damage. Then, I would conduct a thorough investigation to determine the cause and impact, followed by documenting the findings and implementing measures to prevent future incidents.
Q3: How do you keep yourself updated with the latest cybersecurity threats?
I subscribe to cybersecurity newsletters, participate in online forums, attend webinars, and engage in continuous education programs to stay informed about the latest threats and trends in the industry.
Q4: Describe a time when you successfully identified a potential security threat.
In my previous role, I analyzed network traffic and identified unusual patterns that indicated a potential data exfiltration attempt. I escalated the issue to my manager, and we were able to mitigate the threat before any data was compromised.
Q5: What is your approach to risk assessment?
I use a structured approach that includes identifying assets, assessing vulnerabilities, determining the potential impact of threats, and prioritizing risks based on their likelihood and potential impact to the organization.
Data Scientist Interview Questions
Q1: What machine learning algorithms are you familiar with in the context of cybersecurity?
I am familiar with algorithms such as decision trees, random forests, support vector machines, and neural networks, particularly in anomaly detection and predictive modeling for threat intelligence.
Q2: How do you handle imbalanced datasets in your analysis?
I apply techniques such as oversampling the minority class, undersampling the majority class, or utilizing algorithms that are robust to imbalance. Additionally, I may use synthetic data generation methods like SMOTE.
Q3: Can you explain a project where you analyzed security data?
I worked on a project analyzing user behavior data to identify anomalous login patterns that could indicate compromised accounts. I built a predictive model that reduced false positives in our alerting system.
Q4: How do you ensure the quality of your data?
I conduct data cleansing processes, validate data sources, and implement checks to identify and correct errors or inconsistencies in the data before analysis.
Q5: What tools do you use for data visualization?
I commonly use tools like Tableau and Power BI for data visualization, as well as Python libraries such as Matplotlib and Seaborn to create visual representations of complex data sets.
DevOps Engineer Interview Questions
Q1: What is your experience with CI/CD pipelines?
I have experience designing and implementing CI/CD pipelines using tools like Jenkins and GitLab CI, which automate the testing and deployment of applications, ensuring faster and more reliable releases.
Q2: How do you manage infrastructure as code?
I use tools like Terraform and Ansible to define and manage infrastructure through code, enabling version control and automated provisioning of environments.
Q3: Can you describe a time you resolved a production incident?
Once, a critical service went down due to a misconfiguration in the load balancer. I quickly diagnosed the issue, rolled back the configuration, and implemented additional monitoring to prevent future occurrences.
Q4: What monitoring tools do you use?
I use tools like Prometheus and Grafana for system monitoring, as well as ELK Stack for logging and real-time analysis, which helps in maintaining system health and performance.
Q5: How do you ensure security in your DevOps processes?
I integrate security practices into the development lifecycle (DevSecOps) by conducting regular security assessments, using automated security scanning tools, and ensuring compliance with security policies.
Software Engineer Interview Questions
Q1: Can you describe your experience with secure coding practices?
I follow secure coding principles by validating input, implementing proper authentication and authorization, and regularly reviewing and testing code for vulnerabilities to prevent common security threats such as SQL injection and cross-site scripting.
Q2: What programming languages are you proficient in?
I am proficient in languages such as Python, Java, and JavaScript, and I have experience in developing applications that require robust security measures.
Q3: How do you approach debugging your code?
I use a systematic approach to debugging by isolating the problem, utilizing debugging tools, reviewing logs, and writing test cases to reproduce the issue, which helps in efficiently identifying and fixing bugs.
Q4: Describe a project where you implemented a security feature.
In a recent project, I implemented OAuth 2.0 for secure user authentication, ensuring that user credentials were never exposed and improving the overall security of the application.
Q5: How do you stay current with new technologies and programming languages?
I regularly participate in online courses, attend tech meetups, and contribute to open-source projects to learn about new technologies and keep my skills updated.
Product Manager Interview Questions
Q1: How do you prioritize features for a new product?
I prioritize features based on customer feedback, market research, and strategic alignment with business goals, often using frameworks like the MoSCoW method to categorize features into must-have, should-have, could-have, and won't-have.
Q2: Can you explain how you gather requirements from stakeholders?
I conduct interviews, surveys, and workshops with stakeholders to gather their needs and expectations. I also analyze market trends and competitor offerings to inform product direction.
Q3: Describe a successful product launch you managed.
I led the launch of a new security product that included conducting market research, coordinating with development and marketing teams, and ensuring proper training for sales staff. The product exceeded initial sales targets by 30% in the first quarter.
Q4: How do you measure the success of a product post-launch?
I track key performance indicators (KPIs) such as user adoption rates, customer satisfaction scores, and revenue growth to assess the product's success. Additionally, I gather user feedback for continuous improvement.
Q5: What methodologies do you use in product management?
I employ Agile methodologies, particularly Scrum, to manage product development. This allows for iterative development, frequent reassessment, and flexibility in responding to changes in requirements or market conditions.
Company Background and Industry Position
Securonix has carved a notable niche in the cybersecurity landscape, specializing in next-generation security analytics and threat detection. Founded over a decade ago, the company rides the wave of digital transformation by offering solutions that combine machine learning, big data, and behavioral analytics to preempt cyber threats. Unlike traditional security firms that rely heavily on signature-based detection, Securonix’s approach reflects a modern mindset—proactive, adaptive, and intelligence-driven.
Within this highly competitive market, Securonix stands out not just because of its technology but also because of its agility as a scale-up with enterprise-level clients. It competes head-to-head with giants like Splunk and IBM QRadar but appeals to organizations looking for more nuanced and scalable threat detection capabilities. This positioning impacts the company's talent acquisition strategy—they need sharp, innovative minds who can keep pace with rapid product evolution and complex client demands.
How the Hiring Process Works
- Application Screening: After submitting your resume and cover letter, be prepared for a thorough initial screening. Recruiters seek not only technical qualifications but also cultural fit clues—Securonix values adaptability and continuous learning.
- Recruiter Phone Interview: This is a relatively brief call focusing on your background, motivations, and a few behavioral questions. The recruiter aims to see if your expectations align with the role and company culture.
- Technical Assessment: Depending on the job role, this could be a coding challenge, case study, or hands-on technical test. The emphasis is on problem-solving, analytical thinking, and relevant technical skills rather than rote memorization.
- Technical Interview Rounds: Usually 1–2 rounds with engineering leads or managers. These dives deep into your expertise in cybersecurity concepts, programming languages, cloud security, or data analytics aligned to the role.
- HR and Leadership Interview: A more open-ended discussion involving cultural fit, career aspirations, and situational questions designed to assess communication skills and alignment with Securonix values.
- Offer and Negotiation: Successful candidates receive offers typically within a week of the final interview. The offer includes salary, benefits, and potential bonuses aligned with industry standards.
This layered approach reflects Securonix’s attention to both technical competence and cultural cohesion—a strategy that helps minimize mismatches and turnover.
Interview Stages Explained
Recruiter Screen – Setting the Tone
The recruiter call is more than a formality—it’s your chance to demonstrate genuine enthusiasm and clarity about the role. Candidates often underestimate how much recruiters pay attention to communication skills here. They want to see if you can articulate your experiences and interest without sounding rehearsed. It’s a two-way street, where you should also gauge if the company’s pace and mission resonate with you.
Technical Assessment – The Gatekeeper
Technical tests at Securonix are designed with precision. For example, a software engineer role might require coding on platforms like HackerRank or a custom portal. Security analysts might face scenario-based questions testing incident response or threat hunting skills. The test is less about passing with a perfect score and more about demonstrating your approach to problem-solving. Many candidates find this stage challenging because it requires not just technical knowledge but also time management under pressure.
Technical Interviews – Deep Dives With Experts
Once past the assessment, expect in-depth conversations with senior engineers or team leads. These interviews balance technical validation and exploratory dialogue. You might be asked to walk through your previous projects, explain your reasoning for architectural decisions, or debug code snippets on the spot. This stage also probes your understanding of cybersecurity frameworks and tools, like SIEMs (Security Information and Event Management) or UEBA (User and Entity Behavior Analytics), which are central to Securonix’s offerings.
Unlike some companies with rigid scripts, Securonix interviewers tend to adapt questions dynamically depending on your responses, which can feel unpredictable but rewarding if you think on your feet.
HR Interview – The Cultural Fit Check
This final round isn’t just about being “nice.” It’s a strategic step aiming to evaluate your long-term compatibility with the company’s values—innovation, accountability, and continuous improvement. Think behavioral questions like how you handled failure or collaborated across teams. The HR interviewer also clarifies expectations about work-life balance, remote work policies, and growth pathways, so it’s an opportunity for your own due diligence.
Examples of Questions Candidates Report
- “Explain a time when you detected a security threat and the steps you took to mitigate it.”
- “Write a function to parse and analyze log files for anomalous activities.”
- “How would you design a scalable system for real-time threat detection across multiple data sources?”
- “Describe your experience with cloud security, particularly AWS or Azure environments.”
- “What motivates you about working in cybersecurity, and how do you stay updated on emerging threats?”
- “Tell us about a challenging project and how you managed cross-functional collaboration.”
- “Walk us through the reasons for architectural choices in a previous security analytics tool you worked on.”
Eligibility Expectations
Securonix generally looks for candidates with a strong educational background—typically a bachelor’s degree in computer science, information security, or related disciplines. But that’s just the baseline. They heavily weigh practical experience and certifications like CISSP, CEH, or cloud provider certifications. For data science or engineering roles, proficiency in programming languages like Python, Java, or Scala is a must.
Moreover, the company values demonstrated problem-solving abilities and familiarity with cybersecurity ecosystems. This means that even fresh graduates who completed relevant internships or personal projects can be competitive, as long as they articulate their learning curve and motivation clearly.
Common Job Roles and Departments
Securonix’s product ecosystem necessitates a variety of specialized roles. Here’s a snapshot:
- Security Analysts: Focus on threat intelligence, incident response, and forensic analysis within Securonix’s platforms.
- Software Engineers: Build and optimize core components of the security analytics software, often working on machine learning integrations.
- Data Scientists: Develop and refine algorithms that detect anomalous behavior and potential threats.
- Cloud Security Specialists: Ensure secure deployment and management of solutions on cloud infrastructure.
- Product Managers: Translate client needs into evolving features while coordinating cross-functional teams.
- Customer Success and Technical Support: Act as a bridge between clients and development teams, crucial for retention and feedback.
Compensation and Salary Perspective
| Role | Estimated Salary |
|---|---|
| Security Analyst | $80,000 - $110,000 |
| Software Engineer | $100,000 - $140,000 |
| Data Scientist | $110,000 - $150,000 |
| Cloud Security Engineer | $120,000 - $160,000 |
| Product Manager | $115,000 - $160,000 |
| Technical Support Specialist | $70,000 - $95,000 |
These ranges fluctuate depending on geography, experience, and market demand. Securonix also offers competitive benefits and potential equity, reflecting its growth stage. Compared to industry averages, salaries are generally in line with what you’d expect from a tech-focused cybersecurity firm in the U.S.
Interview Difficulty Analysis
Many candidates find the Securonix hiring process moderately challenging but fair. It is not a mere checkbox exercise; the technical rounds can be intense because interviewers expect you to demonstrate not only knowledge but practical application. For instance, the technical assessment can feel like a mini project under time constraints, which is stressful but realistic to the actual job.
The unpredictability of follow-up questions during technical interviews requires a strong conceptual grasp rather than rote preparation, making it crucial to focus on fundamentals. On the flip side, the HR rounds provide a breathing space with more conversational interaction.
In the grand scheme of cybersecurity companies, Securonix is somewhere in the middle—harder than entry-level but not as grueling as the tech giants’ multi-day coding gauntlets.
Preparation Strategy That Works
- Build a solid foundation in cybersecurity principles and current industry tools—reading recent threat reports or whitepapers helps.
- Practice coding problems relevant to your role, especially data parsing, algorithms, and system design.
- Review the Securonix product suite online to frame your answers with relevant context.
- Prepare detailed but concise stories about your experiences, emphasizing problem-solving and collaboration.
- Mock technical interviews can be invaluable, especially to get used to thinking aloud and explaining your reasoning.
- Brush up on cloud security concepts since many roles intersect with AWS, Azure, or GCP environments.
- Get comfortable with behavioral questions—reflect on your career journey, challenges, and learnings.
This approach won’t just prepare you for questions but helps you align your mindset with the company’s expectations, which is often the hidden key.
Work Environment and Culture Insights
From what insiders share, Securonix fosters a collaborative environment that values innovation without the layers of bureaucracy typical in bigger firms. The pace is fast but balanced—the leadership encourages experimentation but within an accountable framework. This means you’re expected to own your work but supported by a team-oriented culture.
Work-life balance varies by role but the company is mindful about burnout, especially given the high-stress nature of cybersecurity. Remote work options have become more flexible post-pandemic, though some teams prefer hybrid or on-site setups to facilitate brainstorming sessions and knowledge sharing.
Career Growth and Learning Opportunities
The company’s rapid growth trajectory means there is room to move laterally or upwards relatively quickly if you demonstrate impact and commitment. They invest in continuous learning, providing access to training, certifications, and conferences. For ambitious candidates, this is a place where you can deepen both technical and leadership skills organically.
One interesting aspect is cross-functional exposure—engineers often collaborate closely with product and customer success teams, which broadens perspectives. Candidates who value hitting multiple career dimensions find this environment enriching.
Real Candidate Experience Patterns
Most candidates recount a respectful and well-organized interview process, though some mention occasional delays in communication between rounds. The technical rounds stand out as the most memorable part—challenging but fair, with interviewers genuinely interested in your thought process.
A common sentiment is that cultural fit matters a lot. Interviewers are attentive to whether you appear adaptable and eager to learn, not just technically proficient. Several candidates appreciated the transparency during the HR rounds about expectations and company culture, which helped them decide if Securonix felt right.
On the flip side, a few candidates felt the technical assessment was time-pressured and wished for more clarity upfront about what to expect.
Comparison With Other Employers
When lined up against other cybersecurity employers like Palo Alto Networks, CrowdStrike, or McAfee, Securonix offers a more specialized, analytics-driven niche. While the technical rigor is comparable, Securonix’s smaller size translates into a less corporate, more entrepreneurial vibe.
Compared to tech giants such as Google or Microsoft’s security teams, the interview rounds may be shorter and more focused on domain expertise rather than broad algorithmic challenges. This can be a breath of fresh air for seasoned cybersecurity professionals who want to showcase applied skills rather than generalized coding prowess.
Salary and benefits fall in mid to upper mid-tier ranges in the industry, with some trade-offs in global scale versus growth potential.
Expert Advice for Applicants
Focus on telling your story—not just reciting technical facts. Hiring managers want to understand your problem-solving mindset and how you handle real-world challenges. Don’t be afraid to ask clarifying questions during interviews; this shows critical thinking.
Invest time in understanding Securonix’s products and market position, even if you are applying for a purely technical role. It demonstrates initiative and prepares you to discuss how your skills align with their mission.
Remember, the hiring process is as much about your fit for the company as it is about the company’s fit for your career goals. Use HR interviews to probe growth opportunities and team dynamics.
Frequently Asked Questions
What types of interview questions does Securonix typically ask?
You can expect a blend of technical questions related to cybersecurity concepts, programming, and system design, along with behavioral questions exploring your teamwork and problem-solving experiences.
How many recruitment rounds should I anticipate?
Usually, candidates go through 4 to 6 rounds, including recruiter screening, technical assessments, one or two technical interviews, and an HR discussion.
Is prior cybersecurity experience mandatory?
While beneficial, some roles allow entry with strong technical skills and a demonstrated passion for security. Certifications and relevant internships can compensate for limited professional experience.
What is the typical salary range offered by Securonix?
Depending on the role and experience, salaries range from $70,000 for entry-level support roles to upwards of $160,000 for senior engineering and product management positions.
How should I prepare for the technical interview rounds?
Focus on understanding security frameworks, coding exercises relevant to your field, and being able to articulate your thought process clearly. Practice mock interviews and familiarize yourself with Securonix’s products and industry challenges.
Final Perspective
Landing a job at Securonix is a rewarding challenge that tests both your technical chops and your alignment with a fast-evolving cybersecurity culture. Their interview process is thoughtfully designed to assess practical skills and personal fit, reflecting the company’s commitment to innovation and collaboration.
For candidates, this means thorough preparation beyond just technical knowledge—engage deeply with the company's mission, prepare real stories that showcase your problem-solving agility, and be ready for dynamic interviews that reflect real-world complexities. Securonix isn’t just hiring employees; they’re looking for partners in securing tomorrow’s digital frontier.
securonix Interview Questions and Answers
Updated 21 Feb 2026Sales Engineer Interview Experience
Candidate: Emily R.
Experience Level: Entry-level
Applied Via: Job fair
Difficulty:
Final Result:
Interview Process
2 rounds
Questions Asked
- Explain a complex technical concept to a non-technical audience.
- Describe your experience with CRM tools.
- How do you handle objections during sales?
- What interests you about cybersecurity?
- Behavioral: Give an example of teamwork.
Advice
Gain more technical knowledge about security products and improve communication skills.
Full Experience
The first round was a phone interview focusing on communication and basic technical knowledge. I felt underprepared for some questions about the product portfolio. The interviewer was friendly and gave helpful feedback.
Product Manager Interview Experience
Candidate: David P.
Experience Level: Mid-level
Applied Via: Recruiter outreach
Difficulty:
Final Result:
Interview Process
3 rounds
Questions Asked
- How do you prioritize features for a security product?
- Describe your experience working with engineering teams.
- What metrics do you track for product success?
- How would you handle conflicting stakeholder demands?
- Behavioral: Tell me about a challenging project you managed.
Advice
Focus on product management skills and understanding of cybersecurity market.
Full Experience
The interview process included a recruiter call, a case study presentation, and a final interview with senior leadership. The case study involved creating a roadmap for a new security analytics feature. Feedback was positive and the team was collaborative.
Data Scientist Interview Experience
Candidate: Cynthia L.
Experience Level: Senior
Applied Via: LinkedIn job post
Difficulty: Hard
Final Result:
Interview Process
3 rounds
Questions Asked
- Explain how you would detect insider threats using data analytics.
- Describe your experience with machine learning models in cybersecurity.
- How do you handle imbalanced datasets?
- Walk me through a project where you improved threat detection accuracy.
- Behavioral: How do you handle conflicting priorities?
Advice
Demonstrate strong analytical skills and cybersecurity knowledge.
Full Experience
The interviews were technical and scenario-based, focusing on applying data science to security problems. The team valued clear communication and practical examples from my past work. The process was intense but rewarding.
Software Engineer Interview Experience
Candidate: Brian K.
Experience Level: Entry-level
Applied Via: Referral from current employee
Difficulty:
Final Result:
Interview Process
4 rounds
Questions Asked
- Implement a function to detect anomalies in a data stream.
- Explain object-oriented programming principles.
- Describe your experience with cloud platforms.
- How would you optimize a slow-running query?
- Behavioral: Describe a time you worked in a team under pressure.
Advice
Prepare coding problems thoroughly and understand system design basics.
Full Experience
The process involved an initial phone screen, a coding challenge, a technical interview with system design questions, and a final behavioral round. The coding challenge was timed and required efficient algorithms. Feedback was constructive.
Security Analyst Interview Experience
Candidate: Alice M.
Experience Level: Mid-level
Applied Via: Online application via company website
Difficulty:
Final Result:
Interview Process
3 rounds
Questions Asked
- Explain the difference between IDS and IPS.
- Describe a time you identified a security threat.
- How do you stay updated on cybersecurity trends?
- What is SIEM and how does it work?
- Walk me through a recent security incident you handled.
Advice
Brush up on security fundamentals and be ready to discuss real-life scenarios.
Full Experience
The interview process started with an HR screening, followed by a technical interview focusing on security concepts and incident response. The final round was a panel interview where I discussed my previous experience and problem-solving skills. The team was friendly and the questions were practical.
Frequently Asked Questions in securonix
Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.
Common Interview Questions in securonix
Q: In a sports contest there were m medals awarded on n successive days (n > 1). 1. On the first day 1 medal and 1/7 of the remaining m - 1 medals were awarded. 2. On the second day 2 medals and 1/7 of the now remaining medals was awarded; and so on.On the nth and last day, the remaining n medals were awarded.How many days did the contest last, and how many medals were awarded altogether?
Q: A rich merchant had collected many gold coins. He did not want anybody to know about them. One day his wife asked, "How many gold coins do we have?" After pausing a moment, he replied, "Well! If I divide the coins into two unequal numbers, then 32 times the difference between the two numbers equals the difference between the squares of the two numbers."The wife looked puzzled. Can you help the merchant's wife by finding out how many gold coins they have?
Q: Suppose a newly-born pair of rabbits, one male, one female, are put in a field. Rabbits are able to mate at the age of one month so that at the end of its second month a female can produce another pair of rabbits. Suppose that our rabbits never die and that the female always produces one new pair (one male, one female) every month from the second month on.
Q: A rich man died. In his will, he has divided his gold coins among his 5 sons, 5 daughters and a manager. According to his will: First give one coin to manager. 1/5th of the remaining to the elder son.Now give one coin to the manager and 1/5th of the remaining to second son and so on..... After giving coins to 5th son, divided the remaining coins among five daughters equally.All should get full coins. Find the minimum number of coins he has?
Q: There are two balls touching each other circumferencically. The radius of the big ball is 4 times the diameter of the small all. The outer small ball rotates in anticlockwise direction circumferencically over the bigger one at the rate of 16 rev/sec. The bigger wheel also rotates anticlockwise at N rev/sec. What is 'N' for the horizontal line from the centre of small wheel always is horizontal.
Q: There are 3 clans in an island - The Arcs who never lie, the Dons who always lie and the Slons who lie alternately with the truth. Once a tourist meets 2 guides who stress that the other is a Slon. They proceed on a tour and see a sports meet. The first guide says that the prizes have been won in the order Don, Arc, Slon. The other says that, the order is Slon, Don, Arc. (the order need not be exact). To which clan did each of the guides and the players belong? ...
Q: 36 people {a1, a2, ..., a36} meet and shake hands in a circular fashion. In other words, there are totally 36 handshakes involving the pairs, {a1, a2}, {a2, a3}, ..., {a35, a36}, {a36, a1}. Then size of the smallest set of people such that the res...
Q: ABCDE are sisters. Each of them gives 4 gifts and each receives 4 gifts No two sisters give the same combination ( e.g. if A gives 4 gifts to B then no other sisters can give four to other one.)Â (i) B gives four to A.(ii) C gives 3 to E. How much did A,B,C,E give to D?
Q: The egg vendor calls on his first customer and sells half his eggs and half an egg. To the second customer, he sells half of what he had left and half an egg and to the third customer he sells half of what he had then left and half an egg. By the way he did not break any eggs. In the end three eggs were remaining . How many total eggs he was having ?
Q: Every day a cyclist meets a train at a particular crossing .The road is straight before the crossing and both are travelling in the same direction.Cyclist travels with a speed of 10 kmph.One day the cyclist come late by 25 minutes and meets the train 5 km before the crossing.What is the speed of the train?
Q: Tom has three boxes with fruits in his barn: one box with apples, one box with pears, and one box with both apples and pears. The boxes have labels that describe the contents, but none of these labels is on the right box. How can Tom, by taking only one p
Q: A vessel is full of liquid. From the vessel, 1/3rd of the liquid evaporates on the first day. On the second day 3/4th of the remaining liquid evaporates. What fraction of the volume is present at the end of the second day
Q: There are 7 letters A,B,C,D,E,F,GAll are assigned some numbers from 1,2 to 7.B is in the middle if arranged as per the numbers.A is greater than G same as F is less than C.G comes earlier than E.Which is the fourth letter
Q: Raj has a jewel chest containing Rings, Pins and Ear-rings. The chest contains 26 pieces. Raj has 2 and 1/2 times as many rings as pins, and the number of pairs of earrings is 4 less than the number of rings. How many earrings does Raj have?...
Q: There are four dogs/ants/people at four corners of a square of unit distance. At the same instant all of them start running with unit speed towards the person on their clockwise direction and will always run towards that target. How long does it take for them to meet and where?
Q: Given a collection of points P in the plane , a 1-set is a point in P that can be separated from the rest by a line, .i.e the point lies on one side of the line while the others lie on the other side. The number of 1-sets of P is denoted by n1(P)....
Q: Jack and his wife went to a party where four other married couples were present. Every person shook hands with everyone he or she was not acquainted with. When the handshaking was over, Jack asked everyone, including his own wife, how many hands they shook?
Q: A family X went for a vacation. Unfortunately it rained for 13 days when they were there. But whenever it rained in the mornings, they had clear afternoons and vice versa. In all they enjoyed 11 mornings and 12 afternoons. How many days did they stay there totally?
Q: A man driving the car at twice the speed of auto one day he was driven car for 10 min. and car is failed. he left the car and took auto to go to the office .he spent 30 min. in the auto. what will be the time take by car to go office?
Q: A person meets a train at a railway station coming daily at a particular time. One day he is late by 25 minutes, and he meets the train 5 k.m. before the station. If his speed is 12 kmph, what is the speed of the train.