You are here: Home > Competitive Exams
All posts from

nielit.gov.in C Level Course Examination Old Question Papers 2018 : National Institute of Electronics & Information Technolog

Name of the Organisation : National Institute of Electronics & Information Technology – NIELIT
Examination : C Level Course Examination 2018
Document Type : Old Question Papers
Year : January 2018
Subject Code : CE1.3-R4 /CE1.4-R4 /CE1.5-R4/C8-R4/C9-R4/C10-R4
Website : http://www.nielit.gov.in/content/january-2018

NIELIT C Level Course Examination Old Question Papers

Question Paper of C Level Course Examination All subject Question Paper January 2018 is now available in the official website of Directorate Of Economics And Statistics

Related / Similar Question Paper :
NIELIT Patna Group-C CCAC Exam Model Question Paper

Instructions for Candidate

** Carefully read the instructions given on Question Paper, OMR Sheet and Answer Sheet.
** Question Paper is in Hindi and English language. Candidate can choose to answer in any one of the language (i.e., either Hindi or English)

** There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions.
** PART ONE is Objective type and carries 40 Marks. PART TWO is subjective type and carries 60 Marks.

** PART ONE is to be answered in the OMR ANSWER SHEET only, supplied with the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book for PART TWO.

** Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE.

** Candidate cannot leave the examination hall/room without signing on the attendance sheet or handing over his Answer sheet to the invigilator. Failing in doing so, will amount to disqualification of Candidate in this Module/Paper.

** After receiving the instruction to open the booklet and before answering the questions, the candidate should ensure that the Question booklet is complete in all respect.

Download Question Paper :
CE1.3-R4 : https://www.pdfquestion.in/uploads/CE13-R4.pdf
CE1.4-R4 : https://www.pdfquestion.in/uploads/CE14-R4.pdf
CE1.5-R4 : https://www.pdfquestion.in/uploads/CE15-R4.pdf
C8-R4 : https://www.pdfquestion.in/uploads/C8-R4.pdf
C9-R4 : https://www.pdfquestion.in/uploads/C9-R4.pdf
C10-R4 : https://www.pdfquestion.in/uploads/C10-R4.pdf

Model Questions

Note :
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same sequence.

Mobile Computing

Time: 3 Hours
Total Marks: 100
1.
a) Why are the operating system and middleware needed for a mobile system?
b) Describe the localization process of GSM.
c) What are the advantages and disadvantages of snooping TCP?
d) What is MESI protocol? Explain.
e) What is a Protocol Conversion Gateway?
f) What are the features of a WML script?
g) List the advantages of Wireless LANs. (7×4)

2.
a) Describe the functions, services and architecture of a GPRS system.
b) Explain the basic access mechanism used by the MAC layer in wireless LANs. (10+8)

3.
a) How does a mobile node finds and connects to a new foreign agent once it has moved?
b) How does mobile IP works? (10+8)

4.
a) Explain Session Initiation Protocol (SIP).
b) Compare CDMA and GSM.
c) Describe Short Messaging Service (SMS). (8+5+5)

5.
a) How does mobile TCP works? What are the advantages and disadvantages of mobile TCP?
b) What are the various components of Information Security? Describe the various categories of attacks that an information system can suffer. (8+10)

Project Management

1.
a) Explain the phases of a typical project life cycle with a neat diagram. Also mention some of the
advantages for developing a project life cycle.
b) What do you understand by a project close out report? Explain briefly.
c) Explain what do you understand by risk management plan?
d) Explain the difference between forward pass and backward pass.
e) Differentiate between quality assurance and quality control. Are they synonyms? Justify.
f) How to manage the allocation of resources within programs with examples.
g) Define contract management? What are the different types of contract? (7×4)

2.
a) What is functional point? Mention its importance. Write any three advantages of function point analysis.
b) Differentiate between groups and teams.
c) What is risk Identification? What are the three activities of risk assessment? (6+6+6)

3.
a) Identify the risks in the following domain:
i) software requirement risks
ii) software quality risks
iii) software scheduling risks
b) Discuss the tools and techniques that project managers can use to ensure knowledge and lessons learned from previous projects are not lost, and can be shared for the benefit of future projects. (9+9)

4.
a) Discuss types and sources of conflicts.
b) Discuss why is project estimation so hard? Explain in short following project estimation techniques: expert judgement, bottom up and top down (9+9)

Cyber Forensic & Law

1.
a) What is the goal of forensic investigation? Write steps to do forensic investigation examination.
b) Why organizations need to employ Cyber Forensic Analysis?
c) What is Spoliation? Explain three component parts of spoliation.
d) Explain how tools can be useful in acquiring following type non-volatile operating system data from the file system. Users and Groups, Passwords, Network Shares, Logs
e) What are the additional features supported by Network Forensic Analysis Tool to further facilitate network forensics?
f) What does the common law say about privacy?
g) Explain the use of recycle bin and restoring from recycle bin. (7×4)

2.
a) What is Auditing? Differentiate Auditing with Cyber Forensic Investigation in concern of following criteria. Definition, Objectives & Scope, Methodology and Impact
b) Cryptographic algorithms will be categorized based on the number of keys that are employed for encryption and decryption. Explain following three categories of cryptographic algorithms.
i) Secret Key Cryptography
ii) Public Key Cryptography
iii) Hash Functions (9+9)

3.
a) What are different types of volatile operating system data? Explain how forensic tools can be used in collecting each type of data.
b) What is Personal Digital Assistant? Briefly mention the applications of Personal Digital Assistant.
c) What care should be taken by the cyber forensic investigator in the collection and preservation of data stored on hard drive? (6+6+6)

Software Systems

1.
a) Differentiate validation and verification.
b) Compare agent oriented software development and object oriented software development.
c) When we use the UML to develop a design, normally we have to develop which two kinds of design model?
d) “Patterns and Pattern Languages are ways to describe best practices, good designs, and capture experience in a way that it is possible for others to reuse this experience.”- Given statement is true/false? Justify your answer.
e) Why MTBF is a more useful metric than defects/KLOC?
f) Which are the benefits from software reengineering rather than software replacement?
g) Explain various software engineering layers. (7×4)

2.
a) State diagram is one of the diagrams of UML. With the help of a suitable example of state diagram, explain the terms: state, transition and event.
b) Explain SDLC with all its different phases.
c) Explain three different types of user testing. (6+6+6)

3.
a) Compare the Object-Oriented approach with Module Oriented approach.
b) Write a short note for a process model which is particularly useful when staffing is unavailable for a complete implementation by the business deadline that has been established for the project.
c) Prepare Data Flow Diagram for Library Management System also give the problem statement and define the scope. (6+6+6)

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap