Beruflich Dokumente
Kultur Dokumente
20
New Syllabus
Two hours
Instructions:
Answer all the questions.
Write your Index number in the space provided in the answer sheet.
Instructions are given on the back of the answer sheet. Follow those carefully.
In each of the questions 1 to 50, pick one of the alternatives from (1), (2), (3), (4), (5) which is correct or most
appropriate and mark your response on the answer sheet with a cross () in accordance with instruction given on
the back of the answer sheet.
Use of calculators is not allowed.
Consider the following terms related to computer system:
A Malware
B Hardware
C Software
D Firmware
Which of the above is/are not basic component/s of a computer system?
(1) A only.
(2) B only.
(3) C only.
(4) A and D only.
(5) B, C and D only.
Which of the following are correct examples for system software, firmware and hardware respectively?
(1) C++, Computer users, ROM
(2) Boot-strap program, Python, CPU
(3) Fedora, Boot-strap program, Bluetooth Dongle (4) Windows 7, Utility programs, LED Monitor
(5) Interpreter, Web browser, MySQL
The invention of the Electronic Valve by ... in ...... laid the foundation to modern computer technology.
Which of the following pairs of name and year is appropriate for and respectively?
(1) Lady Ada Augasta Lovelace, 1900
(2) Charles Babbage, 1946
(3) John V. Atanasoff, 1904.
(4) Blaise Pascal, 1918
(5) Forrest, 1906
The decimal number equivalent to 110 0110?
(1) 146
(2) 101
(3) 201
(4) 102
(5) 66
Register array modules are often compared by their capacity, measured in ................. and by their speed, measured
in ............
Most suitable words to fill the blanks of the above statements are respectively,
(1) Gigabytes, bits per second
(2) bits, Hertz
(3) bits, bits per second
(4) Gigabits, Kilohertz
(5) bits per second, bits
1F516 - 2548 =
(1) 24716
(2) 32916
(3) 5118
(4) 1010010002
(5) E916
Which of the following is a typical use of Read Only Memory (RAM) of a laptop computer?
(1) Keeping data for processing.
(2) Holding instructions for operations.
(3) Providing storage for operating system.
(4) Retaining information for output
(5) Keeping the BIOS program for boot-up.
Consider the following statements about social networking sites:
A - They are absolutely essential to use as a medium for election campaigns.
B - They are being used increasingly to maintain human relationship in the modern society.
C - The users true identity is not always guaranteed in social networking site.
Which of the above statement is/are correct?
(1) A only.
(2) B only.
(3) C only.
(4) B and C only. (5) A and C only.
www.ictezy.com
AL/ICT/I/2016/20-E
Consider the following combinatory circuit implemented using universal gates:
The above circuit is equivalent to a/an,
(1) OR Gate.
(2) NOT Gate.
Inputs
(3) NOR Gate.
(4) NAND Gate.
(5) AND Gate.
Output
Core i3
Core i5
Core i7
Which of the following HTML tags can be used to create the above list?
(1) <dd>
(2) <dl>
(3) <li>
(4) <ol>
(5) <ul>
ictezy@gmail.com | www.ictezy.com
Page | 2
AL/ICT/I/2016/20-E
A LAN uses the subnet mask 255.255.254.0. How many different IP addresses can be assigned to devices in this
LAN?
(1) 1,022
(2) 126
(3) 510
(4) 2046
(5) 62
A LAN uses the subnet mask 255.255.252.0. How many different subnetworks can be created in this LAN?
(1) 1,022
(2) 126
(3) 510
(4) 2046
(5) 62
In switching packets are transferred from source to destination using ................. . Switching is done within the
network. Whereas Router routes between the network. Routing is a process which is done between two networks
using ................. .
Most suitable words to fill the blanks of the above statements are respectively,
(1) IP addresses, MAC address
(2) MAC address, IP addresses (3) data packets, data frame
(4) data frames, data packet
(5) LAN, WAN
In a public key encryption system, the private key of a person x is given by the function priv(x) and public key is
given by pub(x). Consider the following statements:
A pub(x) is used to encrypt a message that can only be decrypted using priv(x).
B pub(x) is used to sign a message to be sent x.
C A message encrypted using priv(x) can be decrypted using pub(x).
D Digital Signatures apply the same functionality of public key encryption to an e-mail message.
Which of the above statement(s) is/are correct?
(1) A and D only. (2) A and B only
(3) B and C only. (4) C and D only. (5) A, B and D only.
Consider the following statements regarding a server with the domain name www.myhost.lk:
A The server www.myhost.lk can be located any country in the world.
B www.myhost.lk may be a e-mail server.
C The domain names www.myhost.lk and www.myhost.com should be resolved to the same IP address.
Which of the above statement(s) is/are correct?
(1) A and B only. (2) B only.
(3) C only.
(4) A and C only. (5) All A, B and C.
Consider the following statements about computer programming languages:
A - The processor of a typical computer can understand and execute only the machine language of that processor.
B - The processor of a typical computer can understand and execute any machine language of any processor.
C - The processor of a typical computer can understand and execute any program in any assembly language.
D - The processor of a typical computer can understand and execute any program in Python language.
Which of the above statement(s) is/are correct?
(1) A only.
(2) A and B only. (3) A and C only. (4) B and C only. (5) C and D only.
Consider the following statements on Dynamic Random Access Memory (DRAM) and Static Random Access
Memory (SRAM):
A Primary memory are made of SRAM.
B Access time of DRAM is higher than SRAM.
C SRAM is more dense than DRAM.
(1) A only.
(2) C only.
(3) B only.
(4) A and B only. (5) B and C only.
XYZ consulting service office in Sri Lanka which has its head office in Kandy. What is the most convenient method
to take consulting services on live interactively for the Sri Lankan employees in South Korea?
(1) Internet calls
(2) Skype
(3) E-mail
(4) SMS
(5) Google
Consider the following statements regarding the World Wide Web:
A It is a collection of interlinked, hypetext documenns acscessed via the Internet.
B It is a protocol for distributing information via computers connected to the Internet.
C In present, it is maintaning by the World Wide Web Consortium (W3C).
D In present, it is the main service for few billions of users to access of the Internet services.
Which of the above statement(s) is/are correct?
(1) A only.
(2) B only.
(3) A and B only. (4) C and D only. (5) A, C and D only.
ictezy@gmail.com | www.ictezy.com
Page | 3
AL/ICT/I/2016/20-E
Consider the following statements:
.................... the problem is dividing into Input, Process and Output of that problem.
Pseudo code is mapping to its .............. .................
An algorithm is independent of syntax of a ........... .............
Most suitable terms to fill the blanks of , and of the above three statements are respectively,
(1) Analyzing, flow chart, programming language
(2) Solving, programming language, flow chart
(3) Observe, flow chart, programming language
(4) Analyzing, programming language translator, flow chart
(5) Solving, source code, programming language translator
Consider the following Uniform Resource Locator (URL):
https://www.dropbox.com/ict/al_2016.pdf
C
B
A
Which of the following terms is correct of above labeled as A, B and C of the URL respectively?
(1) A = protocol
B = domain name
C = document
(2) A = secured protocol
B = domain name
C = document
(3) A = secured protocol
B = domain
C = directory
(4) A = protocol
B = domain
C = document
(5) A = secret protocol
B = domain
C = directory
Consider the following statement regarding an Automated Re-load machine:
System should give a re-load in less than 15 seconds.
Which of the following is correct with respect to the above statement?
(1) This is an essential non-functional requirement.
(2) This is a nice to have non-functional requirement.
(3) This is an essential functional requirement.
(4) This is a nice to have functional requirement.
(5) This is not a requirement of the system.
Consider the following Data Flow Diagram:
D1
A
D2
1
B
M1 C
D3
According to the Structured System Analysis and Design methodology (SSADM), the components A, B, C and D1
to D3 in the above diagram respect .................... respectively.
(1) External entity, a process, a data flow and a data store
(2) a process, an entity, a data store and data
(3) a user, a process, a table in an electronic database and a data flow
(4) a user, a function, a table in an electronic database and a process
(5) External entity, a process, a data store and data.
What is the twos complement representation of 810?
(1) 11111000
(2) 00001000
(3) 11110000
(4) 11110111
(5) 00001001
Which of the above statements is correct with respect to openness and closeness of a system?
(1) A Finger Print Machine of an office should be a close system.
(2) A cooling system of a vehicle can be considered as an open system.
(3) Human digestive system is a close system.
(4) A Tablet computer is a close system.
(5) A refrigerator system is a close system.
ictezy@gmail.com | www.ictezy.com
Page | 4
AL/ICT/I/2016/20-E
Consider the following four relational database tables to answer questions 32 and 33:
Stream
Subject
StreamId
Stream
SubCode
SubName
S1
Arts
08
Engineering Technology
S2
Commerce
09
Biology
S3
Biological Science
10
Combined Mathematics
S4
Physical Science
20
S5
Engineering Technology
21
Economics
S6
Biosystems Technology
22
Sinhala
Enrollment
Batch
StreamId
SubCode
StreamId
SubCode
Batch
Quantity
S1
22
S1
22
2015S
45
S1
20
S1
22
2016S
48
S2
20
S5
20
2016E
15
S5
08
S5
20
2016S
60
S5
20
S5
08
2016S
70
Which of the following actions is taken by a database management system when the SQL statement delete from
Subject is executed?
(1) It will ask the user to select records for deletion.
(2) It may delete all the records from the Subject table.
(3) It will drop the Subject table.
(4) It will not delete any record from the Subject table.
(5) The SQL statement will not be executed since it has errors.
Which of the following is correct with respect to the above tables?
(1) All tables are in 3rd normal form.
(2) Normalization has been applied to these tables.
(3) Integrity constraints are correctly applied to these tables.
(4) These is no evidence to say that integrity constraints are properly applied.
(5) Normalization and integrity constraints are properly applied.
ictezy@gmail.com | www.ictezy.com
Page | 5
AL/ICT/I/2016/20-E
Consider the following Python program:
point = [5, 2, -1, 0, 4]
print(point[::-2])
What is the output of the above program?
(1) [5, -1, 4]
(2) [0, 4]
(1)
Type of Drinks
1. Milk
Black hot drink
2. Coffee
White cold drink
(3)
Type of Drinks
Coffee
Black hot drink
Milk
White cold drink
(2)
Type of Drinks
1. Coffee
Black hot drink
2. Milk
White cold drink
(4)
Type of Drinks
Coffee
Black hot drink
Milk
White cold drink
ictezy@gmail.com | www.ictezy.com
(5)
Type of Drinks
Coffee
Black hot drink
Milk
White cold drink
Page | 6
AL/ICT/I/2016/20-E
What is the data type of the variable tem in this Python code?
(1) Integer
(2) Float
(3) Boolean
(4) List
(5) Tuple
(4) List
(5) Tuple
ictezy@gmail.com | www.ictezy.com
count = 0
Start
Is N > 0?
Yes
L = N3
No
Is N < 0?
Yes
L = N2
No
L=0
Print L
count = count + 1
No
Is count = 3?
Yes
End
Page | 7
AL/ICT/I/2016/20-E
Which of the following Python program implements the behaviour of the flowchart?
(1) count = 0
(2)
count = 0
while count == 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1
(3)
count = 0
while count <= 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1
(5)
count = 0
iterate = True
while iterate:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1
if count == 3:
iterate = False
while count != 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1
(4)
count = 0
iterate = True
while count != 3:
n=int(input("Enter a value: "))
if n > 0:
L = n ** 3
elif n < 0:
L = n ** 2
else:
L = 0
print('Result: ', L)
count = count + 1
ictezy@gmail.com | www.ictezy.com
Page | 8