0% found this document useful (0 votes)
64 views12 pages

Subject: Software Engineering: Jharkhand University of Technology, Ranchi

Uploaded by

Dare Devil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views12 pages

Subject: Software Engineering: Jharkhand University of Technology, Ranchi

Uploaded by

Dare Devil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

608

CSE
Jharkhand University of Technology, Ranchi
6th Semester B.Tech. Examination, 2022
Subject: Software Engineering Subject Code: CS-608
Time Allowed: 3 Hours Full Marks : 70

Pass Marks: 21
Candidates are required to give the answers in their own words
as far as practicable.
Answer any five questions in which 1 is
question No. compulsory.
All questions are of equal value.

1. Choose the correct alternative:


2x7-14
(i) What is Software Engineering?
(a) Designing a software
(b) Testing a software
e ) Application of engineering principles to the design a software
(d) None of the above

ii) What does SDLC stands for?


(a) System Design Life Cycle
(b) Software Design Life Cycle
Software Development Life Cycle
(d) System Development Life Cycle
i What is a Functional Requirement?
aSpecifies the tasks the program must complete
(b) Specifies the tasks the program should not complete
(c) Specifies the tasks the program must not work
All ofthe above
(iv) When can white-box testing be started?
(a) After SRS creation
(b) After installation
After programming (d) After designing
(vy On which of the following is Agile Software Development based?
(a) Linear development
(b) Incremental development
(c) Iterative development
d) Both incremental and iterative development
23275 Please Turn Over

O084
608
(2)
the followimg wnCh is not included in SRS?
(vi) ldentify the correct option among
(a) Functionality
WPerformance
(c) External interfaces d) Design solutions

used to capture which of the following views?


(vii) UML diagram cannot be
(a) Layer view User view
Structural view (d) None of these

SDLC.
2. (a) What is SDLC? Discuss all the phases of
(b) Explain Agile software development model. Give an example of a project for which the agile
model would be suitable. 7+7

3. (a) Discuss the characteristics of a good SRS document.


(b) What is the difference between functional and non-functional requirements? Give one
example of each type of requirement for a bank automated teller machine (ATM) system. 7+7

4. (a) What are the various software architectures available for the developer according to you?
Which is the best and why?

(b) Draw a dataflow diagram (DFD) for library management. 7+7

(a)What is Black Box Testing? Explain different types of black box testing strategies.
(b) Draw the control flow graph for the following code and determine its cyclomatic complexity.
7+7
int main ()
int n, index;
Cout < "Enter a number: " <<endl;
Reaodu
Tymo
cin >>n;
index = 2

while (index <= n -1){

i f (ns index == 0) {

cout << "It is not a prime number" << endl;

break;
index++;}
i f (index == n)

cout << "It is a prime number" << endl;


608
(3)
a ) Describe in detail about BPR model with a neat diagram
reverse engineering 7+7
Explain different activities undertaken during
0
7. Write short notes on any two:
7x2-14
(a) COCOMO model II

b) CASE TOOLS
(c) RMMM Plan

(d) Regression Testing


(e) Data Dictionary
602
CSE/IT
Jharkhand University of Technology, Ranchi
6th Semester B. Tech. Examination, 2022

Subject: Internet of Things Subject Code: 1T-602

Time Allowed: 3 Hours Full Marks: 70


Pass Marks: 21

Candidates are required to give the answers in their own words


as far as practicable.
Answer any five questions in which question No. 1 is compulsory.
The figure in the right margin indicates full marks.

1. Choose the corect alternatives: 2x7-14

i) Which interface does the fingerprint sensor use?


(a) UART interface (b) CoAP interface

.(C) SPI interface (d) 12P interface

Gi) Which of the following bit' defines the address bit in the control register?

(a) ML Co MM
(c) RX Wake d None of these

i i ) Which of the following protocols does the secure digital card application use?

(a) XMPP (b) SPI

(c) MQTT CTTPS


(iv) What does MOSI mean?

(a) MOSI is a network line.

b MOSI is a clock signal that sends the clock signals from master to slave.

(c) MOSI is a data line that sends the data from master to slave.

(d) None of the above

(v)Which of the following topology is used for ZigBee Smart Energy?

(a) Bus Topology (b) Ring Topology

Star Topology (d) Any Topology


23272 Please Turn Over

84
602 (2)
(vi) Which of the following languages does GSN work on?
(b) JAVA
(a) Python
(d) C++
(c) Android
and
(vii) Gateway provides the connection between
Controller
(a) Controller and Device (b) Network and

Network and Cloud (d) Cloud and Controller

neat diagram.
2. 2Explain the generic M2M System Solution with a
between devices
(6) Discuss various standards and technologies that enables Adhoc connectivity 7+7-14
that forms the basis of IoT.

architecture needed to target a horizontal system of


3. (a) Discuss the design objectives of IoT
real-world services.
with neat diagram. 7+7=14
(b) Illustrate ITU-IoT Reference model in detail
a

of loT.
4. (a) Summarize the Megatrends, Capabilities and Implications
services, virtual entities, users in an
(b) Explain the deployment and operational view, resources, 7+7=14
loT system by considering a Parking lot example.
5. (a) Explain device and application functional group, communication functional group,
IoT services functional group and virtual entity functional group in detail with a neat diagram
of loT functional view.
architecture and interactions with a neat diagram. 7+7-14
(b) Explain OGC functional

6. (a) Explain the potential and benefits of an lol oriented approach over M2M by considering a

Health band as the real world use case example. Compare the main characteristics of M2M
and loT.
architecture (SIA) enables the coupling of industrial
(b) Describe SOCRADES integration
machines at shop floor and enterprise systems with a neat diagram. 7+7-14

7. Write short notes on any two of the following: 7x2=14

(a) Various emerging loT applications

(b) M2M data management


(c)IETFWorking Groups and Specifications Scope
(d) Information exchange patterns in loT
602
CSEIT
Jharkhand University of Technology, Ranchi
6th Semester B.Tech. Examination, 2022
Subject: Data Science Subject Code: CS-602

Time Allowed: 3 Hours Full Marks:70


Pass Marks: 21
Candidates are required to give the answers in their own words as far as practicable.
Answer any five questions in which Question No. 1 is compulsory.
All questions are of equal value.

1. Choose the correct alternative: 2x7=14


(i) Which of the following is not a part of the data science process?

(a) Communication building (b) Model planning

(c) Operationalize Se Discovery


(i) Which of the following is key data science skill?
(a) Statistics (b) Machine Learning
(c) Data Visualization d) All of these
(ii) Which of the following characteristic of big data is relatively more concerned to data
science?

(a) Velocity (b) Variety


(c) Volume (d) Veracity
(iv) What are the 3 main concepts of Data Science?
(a) Data, Science and Knowledge
Machine Learning, Data Processing and Statistical Research

(c) Mathematics, Computer Science and Domain Expertise


(d) None of these

(v) Which of the following is NOT a machine learning algorithm?

Uay SVG (b) SVM

(c) Random Forest (d) Decision Tree

(vi) The mode has all of the following disadvantage except


(a) a data set may have no modal value.

(b) every value in a data set may be a mode.


(c) a multi-modal data set is difficult to analysis.
(d) the mode is unduly affected by extreme value.

23268 Please Turn Over

0577
602
(2)
(V11) What is the major assumption we make when computing a mean from grouped data?
(a) Every value in a class is equal to the mid point.
(b) No value occurs more than once.
(C) Each class contains
exactly the same number of values.
& (d) None of the above

(a)Suppose S is a sample
space contains E, E2. E3, ... En mutually exclusive and
events. A is an event that exhaustive
occurred in S.
Prove that P (E/ A) =
[P (E) P(A/ E)]/ [EP (E) P (A/E,) 1
(b) If X1 and x2 are two
positive values of variate, prove that their geometric mean is equal to the
geometrie mean of the r arithmetic and harmonic means i.e., if A, H and G are arithmetic,
harmonic and geometric mean then G 1/2
(A x H) =
7
3. (a) Prove that correlation coefficient of two variables (x, y) lies between -1 to +1.

i.e. -1 < = rxy <= +1


(b) Differentiate between Data Science and Big Data. Briefly explain about 5Vs of Big Data.
3+4-7
4. (a) If the regression equation of Y =0:57x + 6:93 and the regression equation of x and y be
X =
1-12y-2-46, find the correlation coefficient between x and y.
(b) Prove that regression coefficient for two variables (x, y) are
by = r
(oy Oy) and
byxr(o,/ o) where r is coefficient of correlation and also prove that the coefficient of
correlation (r) is the geometric mean of coefificient of regression i.e. r= (by x by 7
5. (a Explain the terms 'Skewness' and "Kurtosis' used in
connection with the frequency
distribution of a continuous variable. Give the measures of skewness
(any three) and kurtosis.

(b) What do you mean by regression? Differentiate between Linear


Regression. Regression and Logistic
7
6. (a) What is ensembling? Why ensemble of models is needed? Describe
about different types of
ensemble?

(b) The difference (yi xi), i =1,2,-

15,
..., are given for a set of 15 pairs of observations below:
15, 15, 13, 14, 11, 13, 12, 12, 15, 15, 15, 19, 19, 19, 14.

If mean(x) =
4934, mean(y) 64-07, standard deviation of
y =
4:30, find the coefficient of correlation
x =
3.53, standard deviation of
between x and y.
(3) 602
7Write short notes on any rwo of following 7x2-14
(a) Support Vector Machine
(b) Principal Component Analysis
(c) Regularization
(d) Feature Engineering
601
CSE/ITIECE
Jharkhand University of Technology, Ranchi
6th Semester B.Tech. Examination, 2022
Subject: Computer Networks Subject Code: CSC-601
Time Allowed: 3 Hours Full Marks: 70
Pass Marks: 21
Candidates are required to give the answers in their
own words as far as
practicable.
The figure in the
right hand margin indicate full marks.
Answer any five questions Question No. 1 is
compulsory.
1. Choose the correct
alternative 2x7=14
(1) An organization has a class B network and wishes to form subnets for 60 departments. The
subnet mask would be

(a) 255.255.0.0 (b) 255.255.64.0


(c)255.255.128.0 (d) 255.255.252.0
i) Which address is used to identify a process on a host
by the transport layer?
a Physical address b) Logical address
(c) Port address (d) Specific address
(iii) Transmission data rate is decided by
(a) Network layer (b) Physical layer
D a t a link layer (d) Transport layer
iv) A 4-byte IP address consists of.

(a) only network address


(b) only host address
network address and host address
(d) network address and MAC address
(v) The data link layer takes the packets from and encapsulates them into frames for transmission.
Sa) Network layer (b) Physical layer
(c) Transport layer (d) Application layer
(vi) The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called

Ja Piggybacking (b) Cyclic redundancy check


(c) Fletcher's checksum (d) Parity check

23267 Please Turn Over

L 582
601
(2)
(Vii) Routing tables of a router keeps track of
(a) MAC address assignments
(b) Port assignments to network devices
(c) Distribute IP address to network devices
(d) Routes to use for forwarding data to its destination
2ka) What are the different types of
topologies? Briefly describe along with their advantages and
disadvantages.
(b) What are the various components of Data
Communication? Differentiate among Simplex,
Half Duplex and Full Duplex with the
help of suitable example. 7+7-14
3 (a) What is the need of Framing? Explain character stuffing and bit stuffing for Framing.
(b) Define Transmission delay and Propagation delay. Calculate
transmission time and
propagation time for a system where sender and receiver are 270m apart. Sender transmitted
data of size 24 bits and Bandwidth is 8 AsSsume
Mbps. velocity of transmitting signal is
30 m/s.
7+7=14

4. ) What is the importance of Packet Switching'? With the help of suitable diagram explain hoOw
communication takes place with packet switching.
b) Suppose 7-bit data to be transmitted is 1011001. Find out the codeword that willbe
transferred from sender side using hamming code. 7+7-14

a Discuss the different types of internetworking devices in detail along with suitable diagram.
Differentiate between Connection Oriented and Connectionless Protocol. Discuss the
scenario when TCP will be preferred over UDP 7+7=14

Ag) An organization requires 8 subnets each having at least 63 hosts. If the allotted IP address is
193.1.1.0, determine the class of IP address, default mask, subnet mask, number of subnet id
bits and the broadcast address of the subnets.

) What is the importance of Firewall? Discuss various types of Firewall. 7+7-14

Write short notes on any two of the following: 7x2=14


(a) Synchronous TDM and Statistical TDM

(b) File Transfer Protocol (FTP)

8 (c) Post Office Protocol (POP)

(d) Digital Signature

128 64 192
603
CSE/IT
Jharkhand University of Technology, Ranchi
6th Semester B.Tech. Examination, 2022
Subject: Image Processing
Subject Code: CS-603
Time Allowed: 3
Hours Full Marks: 70

Pass Marks : 21
Candidates are
required to give the answers in their own words
far as practicable.
as

Answer any five question in No.1 is


which Question compulsory.
All questions are of equal value.
1. Choose the correct alternative: 2x7-14
a) What is pixel?
Pixel is the element of a digital image (b) Pixel is the element of an analog image
(c) Pixel is the cluster of a digital image (d) Pixel is the cluster of an analog image
(11) The number of grey values are integer powers of
(a) 4 b) 2
(C) (d) 1

(11) In which step of processing, the images are sub-divided successively into smaller regions'?

(a) Image enhancement (b) Image acquisition


e Segmentation (d) Wavelets
v) For a continuous image fx. y). how could be Sampling defined?
(a) Digitizing the coordinate values
(b) Digitizing the amplitude values
) Digitizing the coordinate and amplitude values
(d) None of the mentioned

(V) Histogram equalization or Histogram linearization is represented by of the following


equation:
(a) sk = Xkj = 1 k = 0,1,2,..,L- 1 sk = k j = 0 k = 0,1,2,.L - 1

(c) sk = X k j = 0 k = 0,1,2.., - 1 ukh sk = Xkj = n " k = 0 , 1 , 2 , . . L - 1

(vi) Which of the following low-pass filters is/are covers the range of very sharp filter function?

a ) Ideal low-pass fillers (b) Butterworth low-pass filter


(c) Gaussian low-pass filter (d) All of these

23269 Please Turn Over

140
603 (2)
(vii) The general form oflog transformations is
a ) s= c. log(1 + r) (b) s = c+ log(1 +r)
(d) s = c - log(1 - r)
(c) s=c.log(1-r)
2. (a) With a neat block diagram, explain the fundamental steps in image processing
7+7-14
(6) Discuss the procedure of quantization and sampling with example.

3. (a) Briefly explain the following terms:

() Neighbours
(i) Connectivity of pixels
(ii) Euclidean distance
(b) Consider the following dataset:

05 22 1-9 3-1 2:3 20 1-0 1-5 11


xl 2:5
x2 2:4 07 2-9 22 30 2-7 16 11 16 0.9

Find the Principal Component using Principal Component Analysis. 6+8=14

[1 1 0 1
4. (a) Find the singular values ofthe matrix A =
0 0 0 1
l1 1 0 0
7+7-14
(b) Discuss in detail about sharpening frequency filtering.

5. (a) Explain inverse filter and wiener


filter with the help of equations. Explain the advantages of
wiener filter over inverse filter.

data using Huffman Coding Technique. Illustrate for the


(b) Devise an algorithm that encodes 7+7-14
following data and compute entropy and efficiency:

Data S1 S 1 S1

Probability 0-1 0-4 0-06 0-1 0-04 0-3

JPEG compression block diagram


6. (a) Explain the parts of
Wavelet Transform in detail. 7+7-14
(b) Explain Discrete

7. Write short notes


on any two: 7x2-14
(a) Color Model

(b) Discrete Cosine Transform (DCT)

(C) Otsu's algorithm for global thresholding

You might also like