Name of the Organisation : National Institute of Electronics & Information Technology – NIELIT
Examination : B Level Course Examination 2018
Document Type : Old Question Papers
Year : January 2018
Subject Code : B5.1-R4/B5.2-R4/B5.3-R4/BE1-R4/BE2-R4/BE3-R4/BE6-R4
Website : http://www.nielit.gov.in/content/january-2018
NIELIT B Level Course Examination Old Question Papers
Question Paper of B Level Course Examination All subject Question Paper January 2018 is now available in the official website of Directorate Of Economics And Statistics
Related : NIELIT A Level Course Examination 2018 Question Paper : www.pdfquestion.in/29543.html
Instructions for Candidate
** Carefully read the instructions given on Question Paper, OMR Sheet and Answer Sheet.
** Question Paper is in Hindi and English language. Candidate can choose to answer in any one of the language (i.e., either Hindi or English)
** There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions.
** PART ONE is Objective type and carries 40 Marks. PART TWO is subjective type and carries 60 Marks.
** PART ONE is to be answered in the OMR ANSWER SHEET only, supplied with the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book for PART TWO.
** Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE.
** Candidate cannot leave the examination hall/room without signing on the attendance sheet or handing over his Answer sheet to the invigilator. Failing in doing so, will amount to disqualification of Candidate in this Module/Paper.
** After receiving the instruction to open the booklet and before answering the questions, the candidate should ensure that the Question booklet is complete in all respect.
Download Question Paper :
Software Project : https://www.pdfquestion.in/uploads/B51-R4.pdf
Automata Theory : https://www.pdfquestion.in/uploads/B52-R4.pdf
Network Management : https://www.pdfquestion.in/uploads/B53-R4.pdf
Artificial Intelligence : https://www.pdfquestion.in/uploads/BE2-R4.pdf
E-Business : https://www.pdfquestion.in/uploads/BE3-R4.pdf
Data Warehouse : https://www.pdfquestion.in/uploads/BE6-R4.pdf
Model Questions
Note :
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same sequence.
Software Project Management
Time: 3 Hours
Total Marks: 100
1. a) What is Quality in terms of software? List important attributes of Quality, which all software products should have. Explain each of them.
b) Explain why it is necessary for a project manager to decompose the tasks of a project using Work Breakdown Structure (WBS)?To what granularity level are the tasks decomposed.
c) List common types of Risk that typical Software project might suffer from. Briefly explain the Risk of schedule slippage for a medium size project.
d) Explain the kind of team structure for small, medium and large software Projects.
e) What is the difference between Version and Revision?
f) What is Pareto analysis? When it is useful?
g) What is the objective of the Project Planning Process? List various activities a software project manger performs in planning. (7×4)
2.a) Explain the special features of web-based software projects and embedded system projects. What are the quality issues which should be addressed in each case?
b) Explain phases of Project Management Life cycle. How it is different from Software Development Life Cycle?
c) What is the use of the following tools in Software Project Scheduling? Also, mention its significance:
i) WBS
ii) CPM
iii) PERT charts
3. a) Describe the role of project management plan.
b) Compare ISO 9000 certification and SEI CMM.Is it possible for an organization to achieve a higher level of CMM without achieving a lower one?
c) How can we estimate the cost of software? Explain COCOMO model. (6+4+8)
Automata Theory & Compiler Design
1. a) How strings differ from words of a language? Given an alphabet S, what do you mean by a language L over S?
b) What is the difference between deterministic and nondeterministic finite state automata?
c) Distinguish between context free and context sensitive language.
d) When is a language said to be recursively enumerable?
e) What is a cross compiler? Give an example.
f) What are the disadvantages of operator precedence parsing?
g) What is meant by peephole optimization? What are its characteristics? (7×4)
2. a) Show that R is an equivalence relation in the following question: R is the relation on the set of integers such that (a,b) ? R if and only if 3a + 4b = 7n for some integer n.
b) Use mathematical induction to prove that n3 + 2n is divisible by 3, for n = 1.
c) Solve the recurrence relation an = 2an-1 + 2n; a0 = 2. (6+6+6)
3. a) Show that the language L = {ak | k = i2, i = 1} is not a finite state language.
b) Construct the transition diagram of the finite automaton M given below and then a minimum state automaton equivalent to M.
Network Management
1. a) What are the most commonly used cryptographic protocols for managing secure communication between a client and server over the Web?
b) List and briefly explain the system security threats.
c) Compare and contrast the problems and benefits of KDC and PKI.
d) Briefly explain, why IPsec has not the same problem as TLS? Also indicate what is additionally needed in a IPsec based Virtual Private Network (VPN).
e) Briefly explain the key elements of any security policy?
f) Differentiate between Brute Force and Dictionary Attacks.
g) What is Reverse Address Resolution Protocol? (7×4)
2. a) Briefly explain the services provided by IPSec at the network layer.
b) What are sweeps? Compare and contrast TCP/UDP sweeps and ping sweeps.
c) Briefly explain the Distributed Denial-of-Service (DDoS) Attack. (6+6+6)
3. a) Why there is need of security at every layer of Open System Interconnection (OSI) model. Discuss the security methods used at each layer of OSI model.
b) Differentiate between symmetry and asymmetric key based cryptography. Given a symmetric and asymmetry system of n-users, how many keys are needed for pairwise secure communication? (9+9)
Artificial Intelligence
1. a) Explain Formal tasks, Mundane tasks, and Expert tasks in AI.
b) Describe a Production System in AI.
c) Discuss Strengths and weaknesses of propositional logic.
d) Prepare a semantic net for the following sentence: John is 72” tall and taller than Johny.
e) Explain Fuzzy Logic Systems Architecture.
f) Discuss supervised learning, unsupervised learning and reinforced learning in neural networks.
g) Explain the term Linearly Separable Patterns and explain the XOR problem in the context of linearly seperability. (7×4)
2. a) Explain the State Space Search of The water jug problem.
b) Explain Travelling Salesman Problem. (9+9)
3. a) Describe Unification Algorithm with an example.
b) What do you mean by Knowledge Engineering?
c) Compare Expert Systems and Conventional Computers.
d) Explain the Expert System Architecture. (7+4+3+4)
4. a) Prepare a fuzzy system for air conditioning system.
b) Describe the general steps of Natural Language Processing.
c) Write a program in Prolog to count the number of vowels in a list. (6+6+6)
5. a) What is Credit assignment problem?
b) Explain Backpropagation learning algorithm of ANN. (6+12)
E-Business
1. a) “E-Commerce is about developing Web Pages.” Do you agree with the statement? Justify your answer.
b) What is URL? Why do we need it?
c) Explain the concept of payment gateways and how they function?
d) Explain the online business models of Flipkart and OLX? Are these business models same
or different? Give justification for your answer.
e) Differentiate between various types of E-Auctions with examples.
f) Explain the use of SSL to secure the network.
g) Explain Domain Name Disputes with an example. (7×4)
2. a) List and explain the functions of various components of the architecture of Web-based E-Commerce system.
b) List and discuss most important features that E-retailing website must have to run online business smoothly. (9+9)
3. a) What is the significance of Firewall in ensuring security of transactions? Further differentiate between application level and circuit level firewall with examples.
b) What is an Internet cookie? How do cookies make personalized Web page possible? (10+8)
4. a) Explain Encryption Laws in E-Commerce.
b) Explain Life Cycle of planning an On-line Business. (9+9)
5. a) Explain various steps involved in the digital signature generation process in detail.
b) What is virtual organization? What are the benefits and limitations of virtual organizations? (9+9)