About Simeio
Company Description
Simeio is a leading identity and access management (IAM) solutions provider that specializes in helping organizations secure and manage their digital identities. With a strong focus on innovation and customer satisfaction, Simeio offers a comprehensive suite of services, including identity governance, access management, and identity as a service (IDaaS). The company prides itself on its cutting-edge technology and commitment to delivering tailored solutions that meet the unique needs of its clients. Simeio fosters a collaborative work culture that encourages creativity, diversity, and continuous learning, making it an attractive environment for professionals seeking to make a significant impact in the field of cybersecurity and identity management.
Identity and Access Management Consultant Interview Questions
Q1: What are the key components of an identity and access management system?
The key components include identity governance, access management, user provisioning, authentication, and auditing. Each of these components plays a crucial role in managing user identities and controlling access to resources.
Q2: How do you approach a client who has no existing IAM strategy?
I would first conduct a thorough assessment of their current security posture and business needs. Then, I would educate them about the importance of IAM, present a tailored strategy that aligns with their goals, and outline a phased implementation plan.
Q3: Can you explain the difference between SSO and MFA?
Single Sign-On (SSO) allows users to log in once and gain access to multiple applications without re-authenticating, while Multi-Factor Authentication (MFA) requires users to provide two or more verification methods (like a password and a fingerprint) to enhance security.
Q4: Describe a challenging IAM project you've worked on.
In a previous role, I led an IAM implementation for a large enterprise facing compliance issues. The challenge was integrating disparate systems. I coordinated with multiple stakeholders, developed a comprehensive plan, and successfully unified their IAM processes.
Q5: How do you keep up with the latest trends in IAM?
I regularly attend industry conferences, participate in webinars, read relevant publications, and engage with professional networks to stay informed about emerging technologies and best practices in IAM.
Security Analyst Interview Questions
Q1: What are the primary responsibilities of a Security Analyst in IAM?
A Security Analyst in IAM is responsible for monitoring security systems, analyzing security incidents, conducting risk assessments, and ensuring compliance with security policies and regulations.
Q2: How do you evaluate the effectiveness of an IAM solution?
I evaluate effectiveness by assessing the solution’s ability to meet business requirements, its performance in real-world scenarios, user satisfaction, and compliance with regulatory standards.
Q3: What tools do you use for security monitoring and incident response?
I utilize tools such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and vulnerability scanning tools to monitor for threats and respond to incidents effectively.
Q4: Can you explain a time when you identified a security vulnerability?
In a past project, I discovered a misconfigured access control setting in an application that allowed unauthorized users to access sensitive data. I reported it immediately, and we implemented corrective measures to fortify security.
Q5: How do you handle a data breach incident?
I would follow the incident response plan, which includes containing the breach, assessing the impact, notifying affected parties, and working on remediation steps to prevent future occurrences.
Software Engineer Interview Questions
Q1: What programming languages and technologies are you proficient in for developing IAM solutions?
I am proficient in languages such as Java, Python, and JavaScript, and have experience with IAM technologies like OAuth, OpenID Connect, and SAML for secure identity management.
Q2: Can you describe your experience with API integrations in IAM?
I have developed and integrated APIs for various IAM solutions, ensuring secure communication between systems, and enabling features like user provisioning and access management.
Q3: How do you ensure the security of the applications you develop?
I follow secure coding practices, conduct code reviews, utilize security testing tools, and incorporate security frameworks to identify and mitigate vulnerabilities throughout the development lifecycle.
Q4: What is your experience with cloud-based IAM solutions?
I have worked extensively with cloud-based IAM solutions, implementing identity management on platforms like AWS and Azure, and leveraging their native security features for enhanced protection.
Q5: Describe a challenging software project you worked on and how you overcame the challenges.
I worked on an IAM project that required integrating multiple legacy systems. The challenge was dealing with incompatible architectures. I overcame this by creating middleware that facilitated communication between the systems, enabling a seamless user experience.
Project Manager Interview Questions
Q1: What project management methodologies are you familiar with?
I am well-versed in Agile, Scrum, and Waterfall methodologies, allowing me to tailor the project approach based on the team's needs and project complexity.
Q2: How do you ensure that IAM projects are completed on time and within budget?
I employ diligent planning, regular monitoring of progress, stakeholder communication, and risk management to ensure that projects stay on track and within budget.
Q3: Can you give an example of a project you successfully managed?
I managed an IAM migration project for a large organization. Through careful planning, stakeholder engagement, and resource allocation, we completed the project ahead of schedule and improved their security posture.
Q4: How do you handle changes in project scope?
I assess the impact of the change, communicate with stakeholders, and if necessary, update the project plan and resources to accommodate the new requirements while ensuring minimal disruption.
Q5: What techniques do you use to motivate your team?
I foster a supportive environment, recognize individual contributions, set clear goals, and encourage open communication, which helps keep the team motivated and engaged.
Company Background and Industry Position
Simeio Solutions has steadily carved its niche as a trusted provider in the identity and access management (IAM) space. Founded in the early 2010s, the company focuses on secure digital identities, authentication, and compliance solutions, catering primarily to enterprise clients across sectors like finance, healthcare, and government. Unlike some tech giants that offer a broad spectrum of IT services, Simeio’s specialization in IAM gives it a sharp focus, addressing growing cybersecurity demands.
In an era where digital trust and secure access are paramount, Simeio’s market positioning taps into a thriving segment. Organizations worldwide grapple with protecting sensitive data, and Simeio’s portfolio of cloud-based access management services and consulting expertise keeps it relevant. For job seekers, this means opportunities in a domain with long-term growth potential, especially as regulations tighten and cyber threats evolve.
Understanding Simeio’s place in the industry helps set expectations for its hiring ethos. It’s not a casual tech startup boom; this company demands domain knowledge and a mindset geared towards security and compliance rigor. Those who thrive here usually appreciate the challenge of balancing innovation with risk mitigation.
How the Hiring Process Works
- Application and Resume Screening: Simeio’s recruitment usually begins with online applications through their careers portal or referrals. Recruiters screen resumes primarily for relevant IAM experience, certifications (like CISSP, CISA), and role-specific skills. They tend to favor candidates demonstrating hands-on knowledge of identity governance, multi-factor authentication, and related tech stacks.
- Initial HR Interview: Candidates passing resume checks often get a phone or video conversation with HR. This stage gauges cultural fit, communication clarity, and motivation. Don’t expect deep technical probing here; instead, prepare to discuss your background, understanding of the role, and alignment with company values.
- Technical Interview Rounds: Depending on the position—whether IAM engineer, consultant, or analyst—candidates face one or two technical rounds. These can be live coding sessions, scenario-based problem solving, or case studies around IAM challenges. Interviewers look for analytical thinking, practical knowledge of IAM protocols (like SAML, OAuth), and troubleshooting skills.
- Managerial Round: For senior roles especially, there’s an interview with the hiring manager or team lead. This conversation delves into project management style, leadership capabilities, and strategic thinking. Candidates may be asked to outline how they would handle complex client scenarios or compliance issues.
- Offer and Negotiation: Successful applicants receive an offer outlining salary, benefits, and role expectations. Simeio tends to offer competitive packages aligned with industry standards but also weighs experience heavily, so negotiation room depends on demonstrated skills.
This multi-stage process reflects Simeio’s desire to hire both technically skilled professionals and team players who fit their culture of security-first thinking.
Interview Stages Explained
Resume Screening and Application Funnel
From what I’ve observed and heard through insider chatter, Simeio’s recruiters prioritize a strong IAM background. Generic IT skills won’t cut it. They want proof of direct experience with identity lifecycle management, access policy enforcement, or cloud security frameworks. Resumes that mention certifications or relevant projects jump to the top. This first hurdle weeds out candidates who might be strong but lack domain focus.
HR Interview: More Than Just Chit-chat
At first glance, the HR round might seem like a mere formality—checking availability and salary expectations. But it’s also a subtle test of communication skills and cultural compatibility. Simeio values clarity and honesty. Candidates who can articulate their career journey, motivations for joining, and knowledge of the company tend to impress. A vague or generic pitch might raise red flags. It’s about showing you’re not just job hunting, but genuinely interested in Simeio’s mission.
Technical Assessment: A Real Challenge
This is where many stumble. The technical rounds aren’t just textbook quizzes; they simulate real-world problems. Candidates might be presented with an access breach scenario and asked how they'd diagnose or contain it. Alternatively, they could be asked to walk through the implementation of a single sign-on system or discuss encryption standards. Interviewers expect candidates to connect theory with practical execution. Simply reciting definitions won’t suffice.
For coding roles, the emphasis is on scripting for automation in IAM environments—think PowerShell or Python—more than generic programming. This specificity helps Simeio ensure hires can hit the ground running.
Managerial and Final Interviews: Vision and Fit
When you reach this stage, the conversations get strategic. Interviewers explore your approach to managing client expectations, dealing with compliance audits, or leading cross-functional teams. It's less about right answers and more about judgment and thought process. Candidates who share nuanced experiences or reflective insights into past challenges resonate well. For those applying to leadership positions, demonstrating emotional intelligence and adaptability is critical.
Examples of Questions Candidates Report
- Technical: “Explain how OAuth 2.0 differs from OpenID Connect, and when you'd use each.”
- Scenario-Based: “You notice an unusual spike in failed login attempts in an IAM system. Walk me through your investigation.”
- Behavioral: “Describe a time you had to enforce a strict security policy that was unpopular with users. How did you handle it?”
- HR: “Why Simeio? What attracts you to specialize in identity and access management?”
- Managerial: “How do you prioritize multiple client requests when resources are limited?”
Eligibility Expectations
Realistically, Simeio looks for candidates with several key ingredients. A bachelor’s degree in computer science, information security, or a related field is often expected. But experience can sometimes substitute formal education, especially if paired with certifications like CISSP, CISM, or technical badges in cloud IAM tools (Okta, ForgeRock).
Given the complexity of IAM, a minimum of 2-3 years hands-on professional experience is typical for mid-level roles. Entry-level openings exist but tend to be rare and highly competitive. The company also values soft skills—clear communication, problem-solving aptitude, and an eagerness to learn within a fast-evolving security landscape.
Applicants must demonstrate a clear understanding of regulatory environments such as GDPR or HIPAA, since many Simeio clients operate under tight compliance mandates. This isn’t a place for novices to security but rather those ready to engage with intricate policy and technology intersections.
Common Job Roles and Departments
Simeio’s organizational structure is quite specialized, reflecting its IAM focus. Common roles include:
- IAM Engineer: Implementing and maintaining access controls, identity provisioning, and authentication mechanisms.
- Security Consultant: Advising clients on IAM strategies, risk assessments, and compliance frameworks.
- Technical Support Analyst: Troubleshooting IAM software issues and assisting clients with deployment challenges.
- Project Manager: Overseeing IAM implementation projects, coordinating between technical teams and clients.
- Sales Engineer: Bridging technical capabilities and client needs during pre-sales engagements.
Departments generally revolve around Consulting, Engineering, Client Services, and Sales Support. The diversity of roles allows candidates from various career paths to find a fitting niche, though all roles demand a solid grasp of identity management principles.
Compensation and Salary Perspective
| Role | Estimated Salary (USD) |
|---|---|
| IAM Engineer (Mid-Level) | 75,000 - 95,000 |
| Security Consultant | 80,000 - 110,000 |
| Technical Support Analyst | 55,000 - 70,000 |
| Project Manager (IAM Projects) | 90,000 - 120,000 |
| Sales Engineer | 80,000 - 115,000 + commission |
These figures reflect national averages and can vary based on geography, experience, and negotiation. Simeio’s salary ranges tend to align with industry standards for IAM roles, sometimes leaning slightly higher in competitive markets such as New York or California. Candidates often report that benefits and remote work flexibility add to the overall compensation appeal.
Interview Difficulty Analysis
Interview difficulty at Simeio isn’t uniform. For entry-level or support positions, the process is manageable but demands familiarity with IAM basics and soft skills. Mid to senior-level technical roles present a steep challenge—expect deep dives into protocols, problem-solving under pressure, and scenario analysis.
Compared to peers in enterprise security firms like Ping Identity or Okta, Simeio interviews are reportedly on par or slightly more rigorous, particularly in technical rounds. That’s because Simeio serves complex client environments requiring precision and reliability. If you’re unprepared or overly theoretical, you’ll notice quickly.
Also, the pace can feel brisk. Interviewers often appreciate concise, confident answers rather than meandering explanations. This tests not only your knowledge but your ability to communicate technical ideas efficiently.
Preparation Strategy That Works
- Understand Core IAM Concepts: Master protocols such as SAML, OAuth, OpenID Connect, and multi-factor authentication. Don’t just memorize definitions—practice explaining how and why they’re used in real scenarios.
- Brush Up on Regulatory Frameworks: Familiarize yourself with GDPR, HIPAA, SOX, and their IAM implications. Simeio clients often require compliance-savvy hires.
- Hands-On Practice: Set up small IAM projects using tools like Okta or Microsoft Azure AD. Real experience, even in a sandbox, speaks volumes.
- Mock Interviews: Conduct scenario-based mock sessions focusing on incident response or access management challenges. This trains your analytical thinking under pressure.
- Prepare Behavioral Stories: Use the STAR method (Situation, Task, Action, Result) to frame past experiences addressing conflict, project management, or policy enforcement.
- Research Simeio’s Culture: Read recent company news, client case studies, and employee reviews to tailor your answers to their values and priorities.
Work Environment and Culture Insights
From discussions with former employees, Simeio offers a professional yet flexible environment. The culture leans heavily towards collaboration, with an emphasis on continuous learning due to the fast-changing IAM landscape. Many appreciate the low bureaucracy, allowing technical experts to contribute meaningfully.
However, given the client-driven nature of the work, periods of high pressure and tight deadlines are not uncommon. Employees often mention the satisfaction of solving tough security puzzles but also warn against burnout if boundaries aren’t respected. Remote and hybrid work options help balance this.
Overall, the culture values detail-oriented individuals who are comfortable with accountability and passionate about cybersecurity. If you like structured problem solving with a sprinkle of innovation, you’ll probably fit right in.
Career Growth and Learning Opportunities
Simeio invests in its talent with ongoing training and certification support. The company encourages staff to pursue advanced credentials in security and cloud technologies, recognizing that IAM is a domain of constant evolution.
Career paths often move from technical expert roles into consulting or management tracks. Many engineers find themselves transitioning into client-facing consultant positions after gaining experience, broadening their skill set and impact. Others leverage their problem-solving expertise to lead specialized projects or internal training initiatives.
For job seekers, this upward mobility combined with mentorship opportunities can be a real draw. It’s not just a job but a place to build a career in a niche yet expanding field.
Real Candidate Experience Patterns
Listening to candidates’ stories, a few themes emerge. Many recount initial surprise at the specificity of technical questions—some felt underprepared for the depth on particular protocols. Those who passed often praised the interviewers’ professionalism and willingness to engage in detailed discussions rather than rapid-fire questioning.
Some applicants mention a waiting period between rounds that can test patience. Timelines vary—some complete the process in two weeks; others have taken close to a month. Communication from recruiters is generally courteous but can occasionally feel sparse during busy hiring cycles.
On the positive side, candidates appreciate the transparent feedback during HR interviews and the genuine effort to assess fit beyond just technical skills. The process may be demanding, but it also feels fair and comprehensive.
Comparison With Other Employers
When compared with big names like Okta, CyberArk, or Ping Identity, Simeio’s recruitment is somewhat more specialized. Larger firms may cast wider nets, sometimes placing more weight on general cloud security or software development skills. Simeio drills down into identity management nuances early on.
In terms of interview intensity, Simeio sits in the mid to upper tier—harder than general IT roles but less grueling than some top-tier cybersecurity consultancies like Mandiant. Salary-wise, it’s competitive but rarely outbids the largest firms aggressively, focusing more on work-life balance and domain expertise as selling points.
For candidates passionate about IAM specifically, Simeio offers a more focused and arguably more rewarding recruitment and career journey than sprawling cybersecurity conglomerates.
Expert Advice for Applicants
Don’t underestimate the value of storytelling in your interviews with Simeio. Technical prowess is essential, but how you frame your experiences, especially those involving problem-solving under pressure, can tip the scales.
Invest time in understanding the client environments Simeio serves. Being able to discuss real-world compliance or operational challenges shows you’re not just abstractly knowledgeable but ready for the role.
A practical tip: during technical rounds, clarify your thinking out loud. Interviewers appreciate candidates who can communicate their logic clearly—it’s a skill critical in consulting and collaborative environments.
Lastly, be honest about your gaps but express a growth mindset. Simeio values learners as much as experts.
Frequently Asked Questions
What kind of interview questions should I expect for a technical IAM role at Simeio?
Expect scenario-based questions that explore your understanding of authentication protocols, identity governance, and troubleshooting access issues. Interviewers often focus on real-world problem solving rather than theoretical definitions. For example, explaining how you’d respond to suspicious login attempts or implement multi-factor authentication.
How long does the typical Simeio hiring process take?
It varies. Some candidates complete all rounds within two weeks, while others experience a month-long process depending on the role’s seniority and scheduling logistics. Patience and polite follow-ups to recruiters help.
Are there opportunities for remote work at Simeio?
Yes, Simeio supports remote and hybrid work arrangements, especially post-pandemic. However, certain client-facing roles might require occasional onsite presence or travel.
What qualifications boost my chances of getting hired?
Certifications like CISSP, CISM, or vendor-specific IAM badges (Okta, Microsoft Azure AD) significantly strengthen applications. Practical experience with IAM tools and a solid grasp of compliance regulations are equally important.
How competitive is the salary compared to other IAM employers?
Salaries at Simeio are generally competitive with similar companies in the IAM domain. While not always topping the charts, their compensation packages are balanced with benefits and a healthy work environment.
Final Perspective
Landing a job at Simeio is no walk in the park, but for those invested in identity and access management, the effort pays dividends. The interview process mirrors the company’s core values: depth of expertise, practical problem solving, and cultural alignment. If you're passionate about cybersecurity’s human and technological intersection, Simeio offers a career path that’s both challenging and rewarding.
Approach your preparation strategically—focus on real scenarios, sharpen communication, and understand the regulatory landscape. And remember: the journey is as much about demonstrating your fit for Simeio’s unique culture as it is about your technical chops. That’s what sets candidates apart here.
In the end, Simeio is looking for people who don’t just know IAM but live it—ready to tackle today’s identity challenges with clarity, integrity, and a persistent hunger to learn.
Simeio Interview Questions and Answers
Updated 21 Feb 2026Product Manager Interview Experience
Candidate: Emily R.
Experience Level: Senior
Applied Via: Recruiter outreach
Difficulty:
Final Result: Rejected
Interview Process
3
Questions Asked
- How do you prioritize features in a cybersecurity product?
- Describe your experience working with engineering teams.
- How do you handle conflicting stakeholder requirements?
Advice
Gain deeper understanding of cybersecurity product challenges and metrics.
Full Experience
The process included an initial recruiter call, a technical interview with the product team, and a final cultural fit interview. Although I had strong PM skills, they wanted more domain-specific experience.
Technical Support Specialist Interview Experience
Candidate: David L.
Experience Level: Mid-level
Applied Via: Company career portal
Difficulty:
Final Result:
Interview Process
2
Questions Asked
- How do you troubleshoot access issues?
- Describe a time you dealt with a difficult customer.
- What IAM tools have you used?
Advice
Highlight your communication skills and technical troubleshooting experience.
Full Experience
The first round was a phone interview focusing on my experience and customer service skills. The second was a video call with scenario questions. The interviewers were supportive and interested in how I handle pressure.
Software Developer Interview Experience
Candidate: Carla S.
Experience Level: Senior
Applied Via: LinkedIn application
Difficulty: Hard
Final Result:
Interview Process
4
Questions Asked
- Explain OAuth 2.0 workflow.
- Design a secure login system.
- Solve a coding challenge in Python.
- How do you ensure code quality in security-sensitive applications?
Advice
Prepare for both coding and security design questions. Demonstrate knowledge of secure development lifecycle.
Full Experience
The interview process was intense with multiple rounds including a coding test and design discussion. The team valued security best practices highly. I appreciated the technical depth and the professionalism of the interviewers.
Identity Access Management Analyst Interview Experience
Candidate: Brian K.
Experience Level: Entry-level
Applied Via: Referral
Difficulty: Easy
Final Result: Rejected
Interview Process
2
Questions Asked
- What is multi-factor authentication?
- Describe a time you handled sensitive information.
- How do you stay updated on cybersecurity trends?
Advice
Gain more hands-on experience with IAM tools and be prepared to discuss specific projects.
Full Experience
I was referred by a friend and had a phone interview followed by a video interview. The questions were straightforward but I felt underprepared for some technical aspects. Feedback indicated I needed more practical experience.
Security Engineer Interview Experience
Candidate: Alice M.
Experience Level: Mid-level
Applied Via: Online application via company website
Difficulty:
Final Result:
Interview Process
3
Questions Asked
- Explain the difference between symmetric and asymmetric encryption.
- How do you handle a security breach?
- Describe your experience with IAM solutions.
- Write a script to automate user access reviews.
Advice
Brush up on IAM concepts and practical scripting skills. Be ready to discuss real-world security incidents.
Full Experience
The process started with an online application, followed by a phone screen focusing on my background. The second round was a technical interview with scenario-based questions. The final round was with the team lead and included a practical scripting task. The interviewers were friendly and focused on problem-solving skills.
Frequently Asked Questions in Simeio
Have a question about the hiring process, company policies, or work environment? Ask the community or browse existing questions here.
Common Interview Questions in Simeio
Q: A hare and a tortoise have a race along a circle of 100 yards diameter. The tortoise goes in one directionand the hare in the other. The hare starts after the tortoise has covered 1/5 of its distance and that too leisurely.The hare and tortoise meet when the hare has covered only 1/8 of the distance. By what factor should the hareincrease its speed so as to tie the race?
Q: A rich merchant had collected many gold coins. He did not want anybody to know about them. One day his wife asked, "How many gold coins do we have?" After pausing a moment, he replied, "Well! If I divide the coins into two unequal numbers, then 32 times the difference between the two numbers equals the difference between the squares of the two numbers."The wife looked puzzled. Can you help the merchant's wife by finding out how many gold coins they have?
Q: 9 cards are there. You have to arrange them in a 3*3 matrix. Cards are of 4 colors. They are red, yellow, blue and green. Conditions for arrangement: one red card must be in first row or second row. 2 green cards should be in 3rd column. Yellow cards must be in the 3 corners only. Two blue cards must be in the 2nd row. At least one green card in each row.
Q: A rich man died. In his will, he has divided his gold coins among his 5 sons, 5 daughters and a manager. According to his will: First give one coin to manager. 1/5th of the remaining to the elder son.Now give one coin to the manager and 1/5th of the remaining to second son and so on..... After giving coins to 5th son, divided the remaining coins among five daughters equally.All should get full coins. Find the minimum number of coins he has?
Q: 36 people {a1, a2, ..., a36} meet and shake hands in a circular fashion. In other words, there are totally 36 handshakes involving the pairs, {a1, a2}, {a2, a3}, ..., {a35, a36}, {a36, a1}. Then size of the smallest set of people such that the res...
Q: T, U, V are 3 friends digging groups in fields. If T & U can complete i groove in 4 days &, U & V can complete 1 groove in 3 days & V & T can complete in 2 days. Find how many days each takes to complete 1 groove individually.
Q: A light bulb is hanging in a room. Outside of the room there are three switches, of which only one is connected to the lamp. In the starting situation, all switches are 'off' and the bulb is not lit. If it is allowed to check in the room only once.How would you know which is the switch?
Q: There are 3 sticks placed at right angles to each other and a sphere is placed between the sticks . Now another sphere is placed in the gap between the sticks and Larger sphere . Find the radius of smaller sphere in terms of radius of larger sphere.
Q: ABCDE are sisters. Each of them gives 4 gifts and each receives 4 gifts No two sisters give the same combination ( e.g. if A gives 4 gifts to B then no other sisters can give four to other one.)Â (i) B gives four to A.(ii) C gives 3 to E. How much did A,B,C,E give to D?
Q: At 6?o a clock ticks 6 times.The time between first and last ticks is 30 seconds.How long does it tick at 12?o clock?2.A hotel has 10 storey. Which floor is above the floor below the floor, below the floor above the floor, below the floor above the fifth.
Q: Tom has three boxes with fruits in his barn: one box with apples, one box with pears, and one box with both apples and pears. The boxes have labels that describe the contents, but none of these labels is on the right box. How can Tom, by taking only one p
Q: A vessel is full of liquid. From the vessel, 1/3rd of the liquid evaporates on the first day. On the second day 3/4th of the remaining liquid evaporates. What fraction of the volume is present at the end of the second day
Q: Jarius and Kylar are playing the game. If Jarius wins, then he wins twice as many games as Kylar. If Jarius loses, then Kylar wins as the same number of games that Jarius wins. How many do Jarius and Kylar play before this match?
Q: In a Park, N persons stand on the circumference of a circle at distinct points. Each possible pair of persons, not standing next to each other, sings a two-minute song ? one pair immediately after the other. If the total time taken for singing is 28 minutes, what is N?
Q: If I walk with 30 miles/hr i reach 1 hour before and if i walk with 20 miles/hr i reach 1 hour late. Find the distance between 2 points and the exact time of reaching destination is 11 am then find the speed with which it walks.
Q: Consider a series in which 8 teams are participating. each team plays twice with all other teams. 4 of them will go to the semi final. How many matches should a team win, so that it will ensure that it will go to semi finals.?
Q: A person meets a train at a railway station coming daily at a particular time. One day he is late by 25 minutes, and he meets the train 5 k.m. before the station. If his speed is 12 kmph, what is the speed of the train.
Q: Joe started from Bombay towards Pune and her friend julie in opposite direction. they met at a point . distance traveled by joe was 1.8 miles more than that of julie.after spending some both started there way. joe reaches in 2 hours while julie in 3.5 hours.Assuming both were traveling with constant speed. What is the distance between the two cities.
Q: There are some chickens in a poultry. They are fed with corn. One sack of corn will come for 9 days. The farmer decides to sell some chickens and wanted to hold 12 chicken with him. He cuts the feed by 10% and sack of corn comes for 30...
Q: Motorboat A leaves shore P as B leaves Q; they move across the lake at a constant speed. They meet first time 600 yards from P. Each returns from the opposite shore without halting, and they meet 200 yards from. How long is the lake?