0% found this document useful (0 votes)
1K views14 pages

G.C.E (O.L) Practice Test - 2020: North Western Province

Uploaded by

invictus azmun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views14 pages

G.C.E (O.L) Practice Test - 2020: North Western Province

Uploaded by

invictus azmun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

G.C.E (O.

L) Practice Test - 2020


North Western Province
One hour
(80) Information and Communication Technology I
Grade 11

Important
i. Answer all Questions
ii. Underline the correct or most suitable answer for (1),(2),(3),(4) options of 1 - 40 questions

Name/ Index No. ………………………………………………………

1. Select an instance of which internet is not used for education.


(1).Use of Web sites such as e-thaksalawa
(2).Use of teaching – learning tools such as Google classroom, Microsoft teams.
(3).Marking use of social media networks for education.
(4).Watching offline telecasts of educational programs over TV channels.
2. The director general of health services daily informs the public regarding the number of Covid – 19
infected patients reported in Sri Lanka.
Which is the quality of information mainly reflected in above statement?
(1). Relevancy (2). Accuracy (3). Timeliness (4). Completeness
3. Consider the following expressions given about the evolution of the computer.
A. Punch cards were used to input and output data in….p…..generation.
B. Key board and mouse were used to input data in …q…. generation.
C. Voice recognition using Artificial Intelligence was invented in …r… generation.
(1). First, Third, Fifth (2). First, fourth, fourth
(3). Second, Fourth, Furth (4). Second, Third, Forth
4. A student has opened a document for editing which has stored in a flash drive. What is the computer
memory that opened document is stored?
(1).Hard disk (2) flash drive / pen drive (3). RAM (4).ROM
5. Select the answer that correctly matches the letter of the description and letter of the relevant port
described
A. Used to connect devices such as computer monitor, digital television, and multimedia
projector to the computer.
B. Used to connect old model printers and scanners to the computer.
C. Used to connect computers in a computer network with the network switch.

X Y Z

(1). A – X , B – Z , C – Y (2). A – X , B – X , C – Y
(3) A- Y, B – Z , C – X (4) A – Y , B - X , C – Z

1
6. Select the answer that is not equal to the binary value 10110102
(1). 1328 (2) 1528 (3) 9010 (4) 5A16
7. Select the answer that respectively mentions the Most Significant Digit and Least Significant Digit of
457. 305.
^1&' 3 and 5 ^2&' 4 and 3 ^3&' 4 and 5 ^4&' 4 and 7
8. What is the memory that has the highest data access speed?
(1) Random Access memory (2) Flash memory (3) DVD (4) Cache memory
9. What is the encoding system that can represent the letters of many languages used in the world?
(1). EBCDIC (2). UNICODE (3). BCD (4). ASCII
10. Which is not a scanning device from followings?
(1) Barcode reader (2) Web cam (3) MICR (4) OCR
11. Consider the logic circuit given below. Which is correct from followings if A= 1 and D= 0 ?

A D
B
C
(1) B = 0 and C = 0 (2) B = 0 and C = 1
(2) B = 1 and C = 1 (4) B = 1 and C = 0
12. In the following Logic circuit, A and B are inputs and C is the output. What should be the input
values when C = 1?

A C
B

(1) A should always be 0 (2) B should always be 0


(3) A should always be 1 (4) B should always be 1
13. Followings are some processes executed during the booting process of the computer.
A. Reading MBR
B. Accessing BIOS
C. POST
Select the answer correctly mention the correct order of these processes.
(1).ABC (2). BAC (3). CBA (4). BCA
14. Select the answer that correctly matches the type of operating system with the given
example.
Type of operating system Example
i. Single User P. ATM machine operating system
ii. Real Time Q. Ubuntu
iii. Multi-tasking R. MS DOS

(1). i- Q , ii- P, iii- R (2) .i- Q , ii- R, iii- P (3). i- R , ii- P, iii- Q (4). i- R , ii- Q, iii- P
15. Consider the following tasks.
A. Printing a letter
B. Retaining data for sending to the CPU
C. Use of device drivers
D. Using a file extension

2
Select the answer that mentions the management task done by the operating system related to
each of these tasks.
(1). A - Device management, B - File management, C- process management, D- Memory
management
(2). A - File management, B - process management, C- Device management, D- Memory
management
(3). A - process management, B - Memory management, C- Device management, D- File
management
(4).A - Memory management, B - File management, C- process management, D- Device
management
16. What is the shortcut key used to insert a spreadsheet file as a hyperlink to a document prepared
using a word processing software.
(1).Ctrl +H (2). Ctrl + P (3). Ctrl + K (4). Ctrl + L
17. The following sentence ‘A’ has been formatted as sentence ‘B’. What are the tools used to format
the sentence?
A- Coronavirus is a group of related RNA viruses.
B- CORONAVIRUS is a group of related RNA viruses.

(1). and (2). and (3). and (4) and

18. Select the difference between word processing software and spreadsheet software.
(1). Header and footer facility is available only in word processing software
(2).Texts can be animated in presentation software
(3). Font colour facility is available only in word processing software
(4). Hyperlinks cannot be created in a presentation.
19. What is the facility used for applying styles to display when moving between slides.
(1). Slide Transition (2). Animation Scheme
(3). Custom Animations (4). Slide Design
20. Consider following expressions given about presentation software.
A. The whole slide becomes black when the key ‘B’ is pressed during a slide show
B. A new slide is inserted when Ctrl+M keys are pressed
What can be considered as correct regarding these expressions?
(1). A is true and B is false (2). Both and B are false
(3). A is false and B is true (4). Both A and B are true
21. The content of an active cell is displayed in,
(1). Name box (2). Formula bar (3). Menu bar (4). Status bar
22. Consider the given expressions about spreadsheet software.
A. A value entered to a cell in spreadsheet is right aligned by default
B. The ctrl +Home key combination in spreadsheet is used to go to A1 cell.
C. Shift + Page Down key combination is used to move to next worksheet .
What can be considered as true from these statements?
(1).Only A (2).only B (3).only A and B (4). A,B,C all
23. Following expressions mention some features of spreadsheet software.
A. $A$1 is an absolute cell reference given to A1 cell
B. A Relative cell reference changes according to the cell of which the formula is written.
C. $B1 is an example for relative cell reference.
What can be considered as true from these expressions?

3
(1). Only A (2). Only B (3). A and B only (4). A and C only
24. Study following expressions
A. A query is used to insert data to tables
B. A printed document taken from a database is called a report
C. Query is a table created from selected fields of tables.
What can be considered as true from these expressions?
(1).Only A (2). Only B (3). A and B only (4). B and C only
25. The primary key made combing two more fields of a table to uniquely identify records is called
a………………………..
Select the suitable tern to fill in the blank of this expression.
(1). Foreign key (2). Secondary key (3). Composite key (4). Multi- field key
26. What is the process of converting data to an unreadable form for unauthorized people.
(1). Data encryption (2). Data distortion (3). Data translation (4). Data hiding
27. Select the answer that correctly mentions a function of the foreign key of a table.
(1). Uniquely identifying records of another table
(2). Uniquely identifying fields of another table
(3). Uniquely identifying the records of the same table
(4). Uniquely identifying fields of the same table
28. Select the correct expression about an information system.
(1). Testing a system in units is called system testing.
(2). The first step of developing a computer based information system is the coding of the
solution.
(3). After the deployment of the system, the requirements of the system are identified from
analyzing the system.
(4). The final testing done before the deployment of the system is acceptance testing.
29. What can be done from followings in the planning step of the system?
(1). Identifying the problems of the current system
(2). Preparing the model of new system
(3). Suggesting alternative solutions
(4). Preparing computer programs
30. Select the valid Pascal identifier from followings
(1). Holi day (2). 7Holiday (3). Holi$day (4). Holi_day
31. What is the output of following pascal statement?
)5+9 mod 2 >= 6) AND NOT(20/4 *2 > 13 DIV 2)
(1).6 (2). 8 (3). FALSE (4). TRUE

32. How many times will the following while loop be executed?
Count=13
While count>=5
Count=count-2
End while
(1).2 (2). 4 (3). 5 (4). 6
33. Select the expression that correctly describes a class and an object
(1). Smart phone is a class and mobile phone is an object
(2). Mobile phone is a class and its screen size is an object
(3). Mobile phone is a class and smart phone is an object
(4). Mobile phone is an object and the number of pixels in its camera is class.

4
34. Select the answer that respectively mention the values of number and total variables after executing
following code segment
total=0
number=1
while number<10
total=total +number
number=number +2
End while
^1&' 4"14 ^2&' 9"14 ^3&' 11"25 ^4&' 9"25
35. What is the output of following pascal program?
Program MyArray(output);
Var num:array[0..3] of integer;
n:interger;
Begin ^1& 40"20"30"10
num[3]:=40; ^2& 10"30"40"20
num[1]:=30; ^3& 10"20"30"40
num[2]:=20; ^4& 10"30"20"40
num[0]:=10;
For n:= 0 to 3 do
Begin
Write(num[n]);
End;
Readln;
End.
36. What is the most acceptable statement from followings?
(1). The resources available in internet can be uniquely identified using IP addresses.
(2). Internet is an example for Metropolitan Area Network.
(3). All resources available in internet have a uniform resource locator.
(4). Tim Berners Lee is the owner of internet.
37. What is correct about file transmission?
(1). File in any size can be transmitted via an email message.
(2). Protocol is not required to transmit large files.
(3). Multimedia files cannot be transmitted among computers.
(4). A file transfer protocol is required to host a web site.
38. What is the incorrect statement about cloud computing?
(1). Cloud computers are always server computers
(2). Internet is not required to access cloud computers
(3). Google Drive is an example for cloud storage
(4). The development environment of an information system can be established on cloud.
39. Consider the given expressions about e-wastage management
A. Recycle, Reduce, Reuse are there concepts in e-waste management.
B. Purchasing new electronic products without repairing malfunctioned electronic products.
C. Establishing centers for collecting e- waste.
Select the appropriate way/ways of managing e- waste from above expressions
(1). Only A. (2). Only A and B (3). Only A and C (4). A,B, C all
40. Select a strategy, which is not related to the logical security of the computer.
(1).Use of software firewalls
(2). Use of passwords
(3). Making backups
(4).Use of surge protector

5
G.C.E. (O.L) Practice Test- 2020
North Western Province
Two hours
(80) Information and Communication Technology II Grade 11

Important
 Answer only five questions including the first question
 Mention clearly the question numbers in the answer sheet.

^1&
^i& Many business firms have taken action to supply goods and services for customers through
online facilities as the normal lifestyle of people is disrupted due to prevailing pandemic
situation in the country. Mention an advantage and a disadvantage of purchasing goods online
compared to conventional ways of purchasing goods.
^ii&
a. The ASCII code of letter ‘E’ is 1000101. Then what is the ASCII value of letter ‘M’ ?
b. Convert 1AB16 into decimal.
^iii&
a. A building has two floors. The bulb in the staircase of the building has two switches named
switch ‘’A’’ and switch ‘’B’’. Following statements describe the function of the switches
(switch is on -1/switch is off - 0)
*The bulb can be turned on when one switch is turned on and the other is turned off.
*The bulb cannot be turned on when both switches are in turned on state or off state.
Copy the following truth table given related to this problem to your answer sheet and
complete the truth table.
Switch A Switch B Bulb
0 0
0 1
1 0
1 1
b' Write the Boolean of following logic circuit.

^iv& Write the software category (Application software /system software/ Utility software), of the
software given below.
1' Windows media player
2' Corel Draw

6
3' Firewall software
4' Ubuntu

^v& Followings are two examples for deployment of system according to system development
life cycle. Write the system deployment method of the given examples.
a& In an online information system developed by department of education, initially deploying
the information system for entering the details of academic staff and then deploying the
information system for entering the details of nan academic staff, and finally extending
the system as an students information system.
b& Deploying initially the information system for issuing the copies of birth certificates in one
district and then extending the system for other districts.
^vi& In the following table, the first column contains few networking devices and the second
column mentions the usages of networking devices. Match the device with the usage. Write
only the device number and the letter related to the usage in your answer script.
Device Usage
1. Network Interface Card A. Connects two or more computer networks.
2.Switch/Hub B. Establishes network connection using radio
waves.
3. Router C. Connecting the computer with the computer
network and establishing the network
connection.
4.Wi - Fi adapter D. Connects two or more computers.

^vii& In the following table ‘X’ column includes some protocols and ‘y’ column includes their
descriptions. Match both columns. Write the protocol number and the letter of the
description in your answer sheet.
X Y
1' ICMP P' Transmitting HTML documents
2' HTTP Q' Mapping IP addresses.
3' TCP$IP R. Transferring large files from a computer to another computer
through internet.
4' FTP S. Detecting errors when errors occurred and controlling messages.

^viii& Give an example for a content management software and write an advantage of using
such a software
^ix& a). Write two data types used in Pascal.
b). Write the output of following pseudocode.

Begin
X=1
Repeat
display X
X=X+1
Until X>10
end
7
^x& a). A pixel used 32 colours in when creating a picture. Calculate the number of bits in the
pixel.
b)' The height and width of an image are respectively 200 and 100. What is the
resolution of this image.
^Marks 2 x 10 = 20&
2&'
A) i. Following are some symptoms of illnesses among some employees in a software
development firm. A doctor diagnosed the causes for illnesses after checking the patients
and gave them instructions to avoid those health issues. Symptoms are given in (A- C
letters). Illnesses are given in (K-N letters) and the instructions to avoid health issues are
given in (P-T letters). Match the symptom with the illness and the instruction to avoid the
illness. Write only the letters in your answer sheet.
Symptom
A. The pain extending from the shoulders to the fingers Illness
of the body. K. Computer Vision Syndrome
B. Sleeplessness, tiredness, lack of appetite L. Repetitive Stress Injury
C. Feeling of numbness and pain in the M. Carpal Tunnel Syndrome
N. Stress
Instructions to follow
P. Keep in the computer screen 150- 200 degrees below to the eye level.
Q. Use keyboard shortcuts to reduce typing and reduce moving the mouse.
R. Avoid bending the wrist. Keep wrist and fingers straight when typing.
S. Share the responsibilities in groups while managing time efficiently .
T. Refrain from pressing keys hard. use a touch keyboard if possible.

^Marks = 1x3&
ii' Government has decided to provide many services for citizens through the internet. Therefore,
people can obtain many services such as education, trade, industries, and health services in online
mode. Followings are some issues faced by people in such a circumstance. Select suitable terms
from brackets to mention the problems and solutions from a – h spaces in the table.

(Intellectual property theft, card payment frauds, Digital divide, Plagiarism, digital bridge,
Quoting or referencing, using a reliable payment service, copyright)

Nature of the problem Problem solution


A farmer in an urban area can obtain information related to a b
agriculture from Internet. But a farmer in a rural area can't obtain
such information as he does not have access for internet and due
to lack of computer literacy.
Completing an assignment by a student for subject by including c d
content of a webpage as it is into the assignment.
Selling copies of a licensed software by a person without e f
permission of the owner.
Deducting more money from the bank account than the amount g h
mentioned for a product.

8
B) Following table shows the harmful software (labels - A,B,C), the nature of threat (labels-
P,Q,R), and the precautionary measures (labels- X,Y,Z). Match the harmful software, the
nature of the threat and the precautionary measure. Write only the labels in your answer sheet.

Harmful software Nature of the threat


A- Spyware P - Cheats the user and steal money by collecting details
B - Bots of bank accounts or Digital account using email.
C - Phishing Q - Pretends itself as harmless, enters the computer
system unknowingly to the user, steal or deletes data.
R - Collects personal information by instant messages
and internet conversations.
Precautionary measure
X - Preventing from opening susceptible emails or clicking links on attachments.
Y - Scanning the documents or software using an antivirus software before
downloading
Z - Preventing from entering personal details without confirming the security of the
web site.

^Marks 1 x 3&
3&
A) Following is a picture of a program used to send emails from an email account. Answer the
questions given using this picture

1
2
3
4
5

9
^i& The email should be send tosarath@sunnet.lk, and he should not know that the same email
has been received by yamuna@gmail.com and susila@ymail.com. Write the appropriate
numbers of the boxes and relevant email addresses to send this email.
(2 Marks)

^ii& Are the email addresses mentioned in box number 3 visible to the persons whose email
addresses are mentioned in box 2?
(1 Mark)

^iii& Who are the other recipients visible to susila@ymail.com?


(1 Mark)
^iv& Box 6 in the above picture indicates the facility of attaching a file with email. There is a
maximum size for a document attachable to an email. What is the protocol suitable to send
a file that exceeds a maximum capacity of a file attachable to an email.
(1 Mark)

B& Following is a picture of a website owned by a travel agent who provide travelling facilities
in Sri Lanka for foreigner. The HTML code used to build the webpage is given below the
picture. Fill in the blanks in HTML code using the tags and attributes given within brackets.
List - ( td, ul, border, center, margin, rowspan , ol ,h2,colspan,2,1, topic, th, title, scr, source,
src,h1)

10
<html> <head> <7>Walker Travels</7></head>
<body>
<1><9>Walker Travels</9>
<h4>-Your inbound travel partner-</h4></1> <1><img 8="rock.jpg" width="1335px"></1>
<p>Sri Lanka is home to approximately ninety-one species of mammals. Of these ninety-one,
sixteen are endemic and can only be found in Sri Lanka while fourteen are threatened
including the large Sloth Bear, the Sri Lankan Leopard and the Sri Lankan Elephant. </p>
<h1>Some of beautiful places to visit in Sri Lanka</h1>
<2 type="square"><li>Colombo</li> <li>Kandy</li> <li>Udawalawa national park</li>
<li>Galleface green</li></2>
<10>Our popular tour packages</10>
<table 3="1">
<tr><4>Tours</th><th>Price</4></tr>
<tr> <td 5="6"><center>Two days</center></td></tr>
<tr><td>Ella – Witness The Countryside Charm</td><td>48000LKR</td></tr>
<tr><td>Arugam Bay– Pristine Beaches</td><td>52000LKR</td></tr>
<tr> <td 5="6"><center>Four days</center></td></tr>
<tr><td>Yala National Park – Amidst The Wildlife</td><td>98000LKR</td></tr>
<tr><td>Sinharaja Forest Reserve – Tropical Beauty</td><td>95000LKR</td></tr>
</table> </body> </html>

^Marks 0'5x10=5 &


4&
(A&' UNIX firm sales electronic products. Following worksheet includes details of sales and
salary payments of employees working in UNIX firm. A basic salary is paid for each
employee and commission is paid for the items sold. The commission is given in cell C15.
A B C D E
1 Number of Gross
Employee name Basic salary Commission
items sold salary
2 Sahan 20000 25
3 Kaweesha 15000 22
4 Nadeeka 20000 18
5 Hirushan 18000 18
6 Kavidu 15000 16
7 Denuka 20000 12
8 Buddhika 18000 19
9
10 Maximum number of items sold
11 Minimum number of items sold
12 Number of employees who sold items
13 The average number of items sold
14 Total Salary paid
15 the commission for an item 150

11
(i) Write the formula which should be inserted in the D2 cell to calculate the commission of
Sahan.(this formula is going to be copied to D3 to D8 cells to calculate the commission of
other employees)
(ii) Write the formula which should be inserted in E2 cell to calculate the gross salary of Sahan
(Gross salary = Basic salary + Commission)
(iii) Write suitable Excel functions which should be inserted in C10,C11 and C12.
a) The maximum number of items sold
b) The minimum number of items sold
c) Number of employees who sold items
(iv) Write the formula suitable to calculate the average number of items sold in C13 cell without
using a function.
(v) Write a formula to calculate total salary in E14 cell using a function.
(vi) Name a chart type suitable to make comparisons representing the number of items sold by
each employee.
^Marks 1 x 6&

^B& Write the functions of following keys during a slideshow made using a presentation
software
1& W 2& F5 3& P 4& N
^Marks 1 x 4&
5&
(i) Mention four advantages of an electronic database as compared to a manual database.
(2 Marks)
(ii) Prepare data tables for a database that fulfils the given requirements.
 Give suitable names for the database and data tables.
 Mention the primary key of each table .
 Use foreign keys for creating relationships between tables.
 Name the database, tables and field names in English.
The database is developed for a library. The database consists of the details of members, books,
and lending. The membership number, name, telephone number, book number, book title are
required to be stored in the database. When lending the books, the date lent and the returned
date are needed to be mentioned.
(3 Marks)
(iii) Consider following tables
Employee Service

Employee number Employee name Service number Service name


S01 Gardining
101 Gunasiri S02 Painting
102 Nawaz
103 Shiwakumar
104 Roshani

12
Working
Employee number Service number Date
101 S01 2020.01.01
104 S01 2020.01.01
101 S02 2020.01.02
103 S02 2020.01.02

a) Mention the primary keys of each table.


(3 Marks)
b) What is the relationship existing between Employee and Service table? Give reasons to
prove your answer.
(2 Marks)

6&
A& Covid-19 is a Global threat. Sri Lankan government established a committee for controlling
Covid-19 and the committee included health sector, defence and security sector, and
intelligence services. Further, this committee exchanged information with the World Health
Organisation. The committee first used a manual information system to maintain data and
information. When the situation became complex, it was difficult to maintain a manual
information system and required am efficient computer based information system.
(i) Mention two advantages of using a computer based information.
(ii) Write two methods of data collection to collect data about Covid infected persons and
the persons they associated.
(iii)Write two weaknesses of a system development if Waterfall model was used to develop
the new system
(iv) Mention another appropriate system development model to avoid those weaknesses
(v) Write system testing methods in the correct order to follow when testing the system
before deployment of developed new system.
(vi) Mention two tasks that should be done in system maintenance.

B) In the following table column ‘A’ mentions a short description about a system development
method and column ‘B’ mentions a system development method. Match column ‘A’ with
column ‘B’. Write only the number with the matched letter in your answer sheet.
Column A Column B
1. System deployment method that has the lowest risk level P. Pilot deployment
2. Implemented only new system Q. Phased deployment
3.One unit is deployed as a sample. R. Direct deployment
4. Deployed remaining parts of the system depending on the S. Parallel deployment
success

13
7&
^A& answer the given questions using following Pascal program.
Program grade(input, Output);
Var math,sci,eng:integer;
Var avg:real;
Begin
writeln(‘input math marks’);
readln;
writeln(‘input sci marks’);
readln;
writeln(‘input eng marks’);
readln;
avg:=(math+sci+eng)/3;
if avg>=40 then
writeln(‘You are selected to the course’)
else
writeln(‘You are not selected to the course’);
readln;
readln;
end.
^i& Write an identifier and its data type used it in the above program.
^ 2 Marks&
^ii& Write the inputs and outputs of the above program. ^2 Marks&
^iii& Write the output of the above program if 45 marks for mathematics, 40 marks for science,
and 35 marks for English are given as inputs to the above program. ^1 Mark&
^iv& Name the control structures used in above Pascal program. ^1 Mark&

B& Write the pseudocode of following flowchart.

Start

X = 21

yes
X>15 X=X-3

No
Print X

Stop

^4 Marks&

14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy