Sie sind auf Seite 1von 8

General Certificate of Education (Adv.

Level) Examination, August 2016

Information & Communication Technology

20

New Syllabus

Two hours

Instructions:
Answer all the questions.
Write your Index number in the space provided in the answer sheet.
Instructions are given on the back of the answer sheet. Follow those carefully.

In each of the questions 1 to 50, pick one of the alternatives from (1), (2), (3), (4), (5) which is correct or most
appropriate and mark your response on the answer sheet with a cross () in accordance with instruction given on
the back of the answer sheet.
Use of calculators is not allowed.
Consider the following terms related to computer system:
A Malware
B Hardware
C Software
D Firmware
Which of the above is/are not basic component/s of a computer system?
(1) A only.
(2) B only.
(3) C only.
(4) A and D only.
(5) B, C and D only.
Which of the following are correct examples for system software, firmware and hardware respectively?
(1) C++, Computer users, ROM
(2) Boot-strap program, Python, CPU
(3) Fedora, Boot-strap program, Bluetooth Dongle (4) Windows 7, Utility programs, LED Monitor
(5) Interpreter, Web browser, MySQL
The invention of the Electronic Valve by ... in ...... laid the foundation to modern computer technology.
Which of the following pairs of name and year is appropriate for and respectively?
(1) Lady Ada Augasta Lovelace, 1900
(2) Charles Babbage, 1946
(3) John V. Atanasoff, 1904.
(4) Blaise Pascal, 1918
(5) Forrest, 1906
The decimal number equivalent to 110 0110?
(1) 146
(2) 101
(3) 201
(4) 102
(5) 66
Register array modules are often compared by their capacity, measured in ................. and by their speed, measured
in ............
Most suitable words to fill the blanks of the above statements are respectively,
(1) Gigabytes, bits per second
(2) bits, Hertz
(3) bits, bits per second
(4) Gigabits, Kilohertz
(5) bits per second, bits
1F516 - 2548 =
(1) 24716
(2) 32916
(3) 5118
(4) 1010010002

(5) E916

Which of the following is a typical use of Read Only Memory (RAM) of a laptop computer?
(1) Keeping data for processing.
(2) Holding instructions for operations.
(3) Providing storage for operating system.
(4) Retaining information for output
(5) Keeping the BIOS program for boot-up.
Consider the following statements about social networking sites:
A - They are absolutely essential to use as a medium for election campaigns.
B - They are being used increasingly to maintain human relationship in the modern society.
C - The users true identity is not always guaranteed in social networking site.
Which of the above statement is/are correct?
(1) A only.
(2) B only.
(3) C only.
(4) B and C only. (5) A and C only.
www.ictezy.com

AL/ICT/I/2016/20-E
Consider the following combinatory circuit implemented using universal gates:
The above circuit is equivalent to a/an,
(1) OR Gate.
(2) NOT Gate.
Inputs
(3) NOR Gate.
(4) NAND Gate.
(5) AND Gate.

Output

..................... is used for digital signal to analog signal conversion.


Which of the following is most appropriate to fill the blank in the above statement?
(1) Amplitude Modulation (AM)
(2) Frequency Shift Keying (FSK)
(3) Pulse Code Modulation (PCM)
(4) Phase Modulation (PM)
(5) Frequency Modulation (FM)
A computer in a network is configured with the IP address 192.240.16.91 and the subnet mask 255.255.255.128.
Which of the following IP address cannot be assigned to a computer in the same network?
(1) 192.240.16.101
(2) 192.240.16.78
(3) 192.240.16.110
(4) 192.240.16.0
(5) 192.240.16.120
Consider the following HTML element:
<textarea rows="4" cols="50">Some Content here ...</textarea>
What is the effect of the attribute rows on the functionality of the element above?
(1) It sets the visible length of the text area to 4 pixels.
(2) It sets the visible length of the text area to 4 characters.
(3) This allows for the content of the characters in the text area to a maximum of 4 lines.
(4) Specifies the visible width of 4 pixels of a text area.
(5) Specifies the visible 4 number of lines in a text area.
Consider the following list rendered by a web browser:
Latest Desktop Processors (CPUs):

Core i3

Core i5

Core i7

Which of the following HTML tags can be used to create the above list?
(1) <dd>
(2) <dl>
(3) <li>
(4) <ol>

(5) <ul>

Consider the following HTML element and statements of that element:


<img src="logo.png" alt="Logo of site"/>
Which of the following is not a reason, the browser does not display image, instead it only displays only the text
Logo of site which is given as the text attribute of alt?
(1) An error in the src attribute.
(2) Browser does not support images.
(3) Problem in downloading image.
(4) An image element is incorrect.
(5) Slow connection of the Internet connectivity.
What is the correct CSS rule to set the text colour of a web page to blue?
(1) body {text-color : blue;}
(2) body {textcolor : blue;}
(3) body {color : blue;}
(4) body {color = blue}
(5) body {text : blue;}
Which of the following statements is correct with respect to the User Datagram Protocol (UDP)?
(1) UDP is a network layer protocol.
(2) UDP guarantees that each byte sent is received at the receiver.
(3) There is an ordering of receiving messages according to the sending.
(4) Voice over IP (VoIP) uses UDP.
(5) UDP uses Transmission Control Protocol (TCP) as the transport protocol.

0714 165 800

ictezy@gmail.com | www.ictezy.com

Page | 2

AL/ICT/I/2016/20-E
A LAN uses the subnet mask 255.255.254.0. How many different IP addresses can be assigned to devices in this
LAN?
(1) 1,022
(2) 126
(3) 510
(4) 2046
(5) 62
A LAN uses the subnet mask 255.255.252.0. How many different subnetworks can be created in this LAN?
(1) 1,022
(2) 126
(3) 510
(4) 2046
(5) 62
In switching packets are transferred from source to destination using ................. . Switching is done within the
network. Whereas Router routes between the network. Routing is a process which is done between two networks
using ................. .
Most suitable words to fill the blanks of the above statements are respectively,
(1) IP addresses, MAC address
(2) MAC address, IP addresses (3) data packets, data frame
(4) data frames, data packet
(5) LAN, WAN
In a public key encryption system, the private key of a person x is given by the function priv(x) and public key is
given by pub(x). Consider the following statements:
A pub(x) is used to encrypt a message that can only be decrypted using priv(x).
B pub(x) is used to sign a message to be sent x.
C A message encrypted using priv(x) can be decrypted using pub(x).
D Digital Signatures apply the same functionality of public key encryption to an e-mail message.
Which of the above statement(s) is/are correct?
(1) A and D only. (2) A and B only
(3) B and C only. (4) C and D only. (5) A, B and D only.
Consider the following statements regarding a server with the domain name www.myhost.lk:
A The server www.myhost.lk can be located any country in the world.
B www.myhost.lk may be a e-mail server.
C The domain names www.myhost.lk and www.myhost.com should be resolved to the same IP address.
Which of the above statement(s) is/are correct?
(1) A and B only. (2) B only.
(3) C only.
(4) A and C only. (5) All A, B and C.
Consider the following statements about computer programming languages:
A - The processor of a typical computer can understand and execute only the machine language of that processor.
B - The processor of a typical computer can understand and execute any machine language of any processor.
C - The processor of a typical computer can understand and execute any program in any assembly language.
D - The processor of a typical computer can understand and execute any program in Python language.
Which of the above statement(s) is/are correct?
(1) A only.
(2) A and B only. (3) A and C only. (4) B and C only. (5) C and D only.
Consider the following statements on Dynamic Random Access Memory (DRAM) and Static Random Access
Memory (SRAM):
A Primary memory are made of SRAM.
B Access time of DRAM is higher than SRAM.
C SRAM is more dense than DRAM.
(1) A only.
(2) C only.
(3) B only.
(4) A and B only. (5) B and C only.
XYZ consulting service office in Sri Lanka which has its head office in Kandy. What is the most convenient method
to take consulting services on live interactively for the Sri Lankan employees in South Korea?
(1) Internet calls
(2) Skype
(3) E-mail
(4) SMS
(5) Google
Consider the following statements regarding the World Wide Web:
A It is a collection of interlinked, hypetext documenns acscessed via the Internet.
B It is a protocol for distributing information via computers connected to the Internet.
C In present, it is maintaning by the World Wide Web Consortium (W3C).
D In present, it is the main service for few billions of users to access of the Internet services.
Which of the above statement(s) is/are correct?
(1) A only.
(2) B only.
(3) A and B only. (4) C and D only. (5) A, C and D only.

0714 165 800

ictezy@gmail.com | www.ictezy.com

Page | 3

AL/ICT/I/2016/20-E
Consider the following statements:
.................... the problem is dividing into Input, Process and Output of that problem.
Pseudo code is mapping to its .............. .................
An algorithm is independent of syntax of a ........... .............
Most suitable terms to fill the blanks of , and of the above three statements are respectively,
(1) Analyzing, flow chart, programming language
(2) Solving, programming language, flow chart
(3) Observe, flow chart, programming language
(4) Analyzing, programming language translator, flow chart
(5) Solving, source code, programming language translator
Consider the following Uniform Resource Locator (URL):
https://www.dropbox.com/ict/al_2016.pdf
C
B
A
Which of the following terms is correct of above labeled as A, B and C of the URL respectively?
(1) A = protocol
B = domain name
C = document
(2) A = secured protocol
B = domain name
C = document
(3) A = secured protocol
B = domain
C = directory
(4) A = protocol
B = domain
C = document
(5) A = secret protocol
B = domain
C = directory
Consider the following statement regarding an Automated Re-load machine:
System should give a re-load in less than 15 seconds.
Which of the following is correct with respect to the above statement?
(1) This is an essential non-functional requirement.
(2) This is a nice to have non-functional requirement.
(3) This is an essential functional requirement.
(4) This is a nice to have functional requirement.
(5) This is not a requirement of the system.
Consider the following Data Flow Diagram:
D1
A

D2

1
B

M1 C

D3

According to the Structured System Analysis and Design methodology (SSADM), the components A, B, C and D1
to D3 in the above diagram respect .................... respectively.
(1) External entity, a process, a data flow and a data store
(2) a process, an entity, a data store and data
(3) a user, a process, a table in an electronic database and a data flow
(4) a user, a function, a table in an electronic database and a process
(5) External entity, a process, a data store and data.
What is the twos complement representation of 810?
(1) 11111000
(2) 00001000
(3) 11110000
(4) 11110111
(5) 00001001
Which of the above statements is correct with respect to openness and closeness of a system?
(1) A Finger Print Machine of an office should be a close system.
(2) A cooling system of a vehicle can be considered as an open system.
(3) Human digestive system is a close system.
(4) A Tablet computer is a close system.
(5) A refrigerator system is a close system.

0714 165 800

ictezy@gmail.com | www.ictezy.com

Page | 4

AL/ICT/I/2016/20-E

Consider the following four relational database tables to answer questions 32 and 33:
Stream

Subject

StreamId

Stream

SubCode

SubName

S1

Arts

08

Engineering Technology

S2

Commerce

09

Biology

S3

Biological Science

10

Combined Mathematics

S4

Physical Science

20

Information Communication Technology

S5

Engineering Technology

21

Economics

S6

Biosystems Technology

22

Sinhala

Enrollment

Batch

StreamId

SubCode

StreamId

SubCode

Batch

Quantity

S1

22

S1

22

2015S

45

S1

20

S1

22

2016S

48

S2

20

S5

20

2016E

15

S5

08

S5

20

2016S

60

S5

20

S5

08

2016S

70

Which of the following actions is taken by a database management system when the SQL statement delete from
Subject is executed?
(1) It will ask the user to select records for deletion.
(2) It may delete all the records from the Subject table.
(3) It will drop the Subject table.
(4) It will not delete any record from the Subject table.
(5) The SQL statement will not be executed since it has errors.
Which of the following is correct with respect to the above tables?
(1) All tables are in 3rd normal form.
(2) Normalization has been applied to these tables.
(3) Integrity constraints are correctly applied to these tables.
(4) These is no evidence to say that integrity constraints are properly applied.
(5) Normalization and integrity constraints are properly applied.

Questions from 34 to 36 are based on the following statements.


A - Register
B - Random Access Memory
C - Cache memory
D - Secondary storage memory
E - Distance Secondary storage memory
Which of the memory(ies) is/are in the Processor (CPU)?
(1) A, B, C and D only.
(2) D and E only.
(3) B, D and E only.
(4) B and D only.
(5) A and C only.
What is the ascending order of memories respect with cost per bit and access speed?
(1) D, E, B, C, A
(2) E, D, B, C, A
(3) E, D, B, A, C
(4) E, B, A, C, E
(5) A, C, B, D, E
What are the volatile memories?
(1) A, B and C only.
(2) C, D and E only.
(3) D and E only.
(4) A, C and E only.
(5) A, C and D only.

0714 165 800

ictezy@gmail.com | www.ictezy.com

Page | 5

AL/ICT/I/2016/20-E
Consider the following Python program:
point = [5, 2, -1, 0, 4]
print(point[::-2])
What is the output of the above program?
(1) [5, -1, 4]
(2) [0, 4]

(3) [4, -1, 5]

(4) [4, -1]

(5) [5, 2, -1]

Consider the following database constraints:


A - Primary key
B - Data type
C - Foreign key
Which of the above constraint/s does/do not allow users to null data in a database table?
(1) A only.
(2) B only.
(3) A and B only. (4) A and C only. (5) B and C only.

Consider the following relations to answer questions from 39 to 41.


lecturer (lecturerId, lectureName, facultyCode, gender, NIC, contactNumber, address, status)
faculty (facultyCode, facultyName, location)
courseUnit (courseUnitId, courseUnitName, medium, duration)
enrollment (lecturerId, courseUnitId, assignedHour)
Consider the following statements:
A - A lecturer assigns at most one course unit with number of assigned of hours.
B - A lecturer is assigned to more than one faculty.
C - A faculty can have more than one lecturers.
Which of the above statement(s) is/are always correct?
(1) A only.
(2) B only.
(3) C only.
(4) A and B only. (5) B and C only.
Which of the following is correct with respect to attributes of the relations?
(1) Attributes gender, NIC and status are candidate keys of lecturer relation.
(2) Attribute assignedHour is a derived attribute.
(3) Attribute NIC can be considered as an alternate key for the lecturer relation.
(4) Attribute assignedHour is a foreign key for the enrollment relation.
(5) Each record in the enrollment relation can be uniquely identified by using lecturerId or courseUnitId.
Which of the following is correct?
(1) All relations are in 3rd normal form.
(2) All relations except the lecturer are in 3rd normal form.
(3) All relations except the courseUnit are in 3rd normal form.
(4) All relations except the faculty are in 3rd normal form.
(5) All relations except the enrollment are in 3rd normal form.
What of the following shows the correct rendering of the given HTML code segment?
<b>Type of Drinks</b>
<dl>
<dt>Coffee</dt>
<dd>Black hot drink</dd>
<dt>Milk</dt>
<dd>White cold drink</dd>
</dl>

(1)
Type of Drinks
1. Milk
Black hot drink
2. Coffee
White cold drink

(3)
Type of Drinks
Coffee
Black hot drink
Milk
White cold drink

0714 165 800

(2)
Type of Drinks
1. Coffee
Black hot drink
2. Milk
White cold drink

(4)
Type of Drinks
Coffee
Black hot drink
Milk
White cold drink
ictezy@gmail.com | www.ictezy.com

(5)
Type of Drinks
Coffee
Black hot drink
Milk
White cold drink

Page | 6

AL/ICT/I/2016/20-E

Questions from 43 to 46 are based on the following Python program.


# Program test.py
tem = (5, 10, -2, 0, 7)
def fun(val):
n, m = val[0], val[0]
for c in val:
if c > n:
n = c
elif c < m:
m = c
return [m, n]
print (fun(tem))
Consider the following statements about this Python code:
A - It contains a comment.
B - It contains a definition of a function.
C - It does not contain any nested selections.
D - It does not contain any iterations.
Which of the above statement are correct?
(1) A and B only. (2) A and C only.

(3) B and C only. (4) B and D only. (5) C and D only.

What is the data type of the variable tem in this Python code?
(1) Integer
(2) Float
(3) Boolean

(4) List

(5) Tuple

What is the return data type of the function named fun?


(1) Integer
(2) Float
(3) Boolean

(4) List

(5) Tuple

What is the output of the above program?


(1) (-2, 10)
(2) [-2, 10]

(4) ([-2, 10])

(5) (10, -2)

(3) [10, -2]

Question 47 to 50 are based on an algorithm represented by the following flow chart.


Consider the following statements:
A This algorithm has only a single variable to input data.
B This algorithm does not have any nested selection.
C If the user input 0 for N, the algorithm will not terminate.
D After the user inputs three number of inputs for N, the algorithm
will terminate.
Which of the above statement(s) is/are correct?
(1) A only.
(2) A and B only.
(3) A and D only. (4) B and C only.
(5) C and D only.
Which of the following statement is correct regarding to the flow chart?
(1) When the user input 0 for N, will not be given an output.
(2) It will not an output when the user inputs any integer value for N.
(3) If the output will be given, the user can input any value for N
except 0.
(4) It repeats three times repetitions.
(5) It will not generate an output when execution of each repetition.
Which of the correct outputs regarding to 5, 0 and -5 of inputs for N
respectively?
(1) 25, 0, 125
(2) 125, 0, 25
(3) 0, 25, 125
(4) 125, 25, 0
(5) 125, 0, -25

0714 165 800

ictezy@gmail.com | www.ictezy.com

count = 0

Start

Read an integer for N

Is N > 0?

Yes

L = N3

No

Is N < 0?

Yes

L = N2

No
L=0
Print L
count = count + 1

No

Is count = 3?
Yes

End

Page | 7

AL/ICT/I/2016/20-E
Which of the following Python program implements the behaviour of the flowchart?
(1) count = 0
(2)
count = 0
while count == 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1

(3)

count = 0
while count <= 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1

(5)

count = 0
iterate = True
while iterate:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1
if count == 3:
iterate = False

0714 165 800

while count != 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1

(4)

count = 0
iterate = True
while count != 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1

ictezy@gmail.com | www.ictezy.com

Page | 8

Das könnte Ihnen auch gefallen