0% found this document useful (0 votes)
148 views9 pages

Grade 12 ICT

This document contains an assignment for Grade 12 ICT students. It includes 10 questions related to various topics in ICT including data representation, digital circuits, and system analysis and design. The questions cover topics such as Boolean logic, Karnaugh maps, two's complement representation, logic gate circuits, truth tables, data flow diagrams, and system requirements analysis. Students are asked to complete tasks like deriving logic expressions, drawing circuits, identifying missing data flows, explaining errors in diagrams, and differentiating between functional and non-functional requirements. The assignment aims to help students practice and demonstrate their understanding of key concepts in the ICT curriculum.

Uploaded by

Ajith Pathirana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views9 pages

Grade 12 ICT

This document contains an assignment for Grade 12 ICT students. It includes 10 questions related to various topics in ICT including data representation, digital circuits, and system analysis and design. The questions cover topics such as Boolean logic, Karnaugh maps, two's complement representation, logic gate circuits, truth tables, data flow diagrams, and system requirements analysis. Students are asked to complete tasks like deriving logic expressions, drawing circuits, identifying missing data flows, explaining errors in diagrams, and differentiating between functional and non-functional requirements. The assignment aims to help students practice and demonstrate their understanding of key concepts in the ICT curriculum.

Uploaded by

Ajith Pathirana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Amal International School

152, Dharmarama Road, off Havelock Road, Colombo-6.

Grade 12 Holiday Assignment ICT

Name:

2010

Unit 3- Data Representation and


Unit 4- Fundamental of Digital Circuits

1. 2019 A/L Part 2-Part B-Q1

The Boolean function known as the majority function takes n binary inputs and outputs 1 if a
majority ( at least half ) of the inputs are 1, otherwise it outputs 0. Let us consider the case when n=
3, which is the 3 input majority function, whose inputs are A, B and C and the output is Z.
a. Give the truth table for the 3- input majority function.
b. Using Karnaugh Map derive a simple Boolean expression for the output Z in the 3- input
majority function.
c. Construct a logic circuit for the 3 input majority function using NAND gates only.

2. 2018 A/L Part 2-Part A-Q2(b)

i. Write down the two's complement representation of 1210 using 8 bits.


ii. Write down the two's complement representation of -6810 using 8 bits.
iii. Compute -6810+ 1210using the' above representations (i) and (ii).
iv. State one advantage of using two's complement representation for data in internal operations
of a computer.

3. 2018 A/L Part 2-Part B-Q1


Suppose a logic circuit needs to be implemented for a digital system that has three inputs A, B and C
and one output Z. Its behaviour is as follows:
If the input C=l, the output Z has the value of A.
If the input C=O, then output Z has the value of B.
a) Obtain the truth table for the output Z.
b) Write down either a sum of products (SOP) or a product of sums (POS) Boolean expression for Z.
c) Simplify the Boolean expression for Z obtained in (b) above.
d) Using the simplified expression in (c) above, construct a logic circuit for the system using either 2-
input NAND gates only or 2-input NOR gates only.

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 1 of 9


4. 2015 A/L Part 2-Part A-Q2-(a)
i. Assume that in a particular digital device integers arc represented in 8-bits twos complement.
However, the results of computations are printed in decimal.
ii. Give the representation of l010 in the above device
iii. Give the representation of -2510 in the above device.
iv. Explain how the computation of l010- 2510 done by the device by using your representations
given in sections (i) and (ii) above.
v. List the steps necessary to transform the result obtained in section (iii) above into decimal form
in order to print the answer.

5. 2015 A/L Part 2-Part B-Q1


(a) Explain how m derive a Boolean expression from a given truth table.
(b) In residential electrical wiring, the following circuit has been used to operate a light in a staircase.

As in the above circuit, two switches S1 and 52 are installed at the bottom and the top of the staircase
to operate the lamp L. The lamp turned on by using the switch S1 at the bottom of the staircase can
be turned off by using the switch S2 at the top of the staircase. Further, the lamp turned on by using
switch S2 at the top of the staircase can also be turned off by using the switch S1 at the bottom of the
staircase. Moreover, the lamp L turned on by a switch can be turned off by the same switch.

Assume that the connections to positions X and Y of a switch in the above circuit are represented by
the truth values I and 0 respectively and the turned on and timed off states of the lamp L are
represented by the truth values I and 0 respectively.

(i) Construct a truth table to represent the functionality of the above circuit.
(ii) Derive a Boolean expression to represent the truth table obtained in section (i) above.
(iii) What is the logic gate which is equivalent to the functionality of the Boolean expression
obtained in section (ii) above?
(iv) Construct a logic circuit for the Boolean expression obtained in section (ii) above with NOT,
AND and OR gates only.

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 2 of 9


6. 2017 A/L Part 2-Part B-Q1

7. 2016 A/L Part 2-Part B-Q1

8. 2014 A/L Part 2-Part A-Q2(a)


Show the negative of 00012 is 11112, Note that both numbers are represented in two’s complement
form.

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 3 of 9


9. 2013 A/L Part 2-Part A-Q3(a)
i. Convert 13 and -19 into two’s complement numbers. Use 8 bits to represent a number.
ii. Compute 13 -19 by using two’s complement numbers obtained in section (i) above and give
the answer in tow’s complement form.
iii. Explain how the positive and negative numbers in twos complement can be converted into
decimal number.

10. 2014 A/L Part 2-Part B-Q1

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 4 of 9


1. 2014 A/L Part 2-Part B-Q1

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 5 of 9


Unit 7- System Analysis and Design

1. 2019 A/L 2018 A/L- Part 2-Part B-Q6


a) A blood testing center has the following activities,
The patient hands over the test request slip to the receiving counter. Receiving counter issues an invoice to
the patient and sends a copy to the cashier. The patient checks the invoice, approves it and hands it over to
the cashier with the payment. Cashier issues a receipt to the patient and also needs a copy of the receipt to
the laboratory. Patient hands over the receipt to the laboratory. The laboratory verifies the patient and
conducts the blood test and returns the updated receipt marked as ‘done’ to the patient. The laboratory sends
the report to the receiving counter. Later, the patient hands over the updated receipt to the receiving counter
and the receiving counter hands over the report to the patient with the re-updated receipt marked as issued’
i. The context diagram for the above activities, with missing data flows Ⓟ, Ⓠ, Ⓡ, Ⓢ, Ⓣ, is given in Figure
1 below. Identify the five missing data flows from the description given below and write them down.

ii. Level 1 of the DFD for the above context diagram is show in Figure 2.

A. Write a suitable term to replace the label Ⓦ in process 2.0.


B. Identify and write down the missing data flow labeled Ⓧ.

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 6 of 9


b)
i. What is requirement analysis?
ii. List two advantage of requirement analysis?
iii. Give one method that can be used to verify whether a functional requirement is satisfied
in a system
iv. The following list consists of some functional, non-functional and other requirements of a
proposed school library management system where users can borrow and return books in
addition to other usual task.
A. The system should authenticate user through username and password.
B. The system should enable user to search for books based on the title, type, ISBN No or
publisher name.
C. The total cost for the library system should be less than Rs.500,000.00
D. The system should be available 99% of the total time.
E. The system development should be completed within 9 months.
F. Book lending details should be preserved even if the system crashes during operation.
G. The book database of the school library management system must be secured by
preventing unauthorized access.
H. Since the past pupils association has indicated its willingness to develop the system,
preference will be given to them.
From A to H, identify and write down the labels of two functional requirements and two non-
functional requirements respectively.

2. 2018 A/L- Part 2-Part A-Q3(b)


Identify and explain the fundamental error in the following Data Flow Diagram (DFD)

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 7 of 9


3. 2018 A/L- Part 2-Part B-Q6
a) The school admission process of a certain country is explained using the description and the data
flow diagram given below.

The applicant sent the application to the respective school. The school sends an
acknowledgement to the applicant. The school then verifies the information in the application by
checking the following.
Eligibility of applicant: By using the eligibility criteria taken from the data stire
“Eligiblility Criteria”
Registration in the electorate: By requeesting the electral list from the Election Authority
( Election Authority sends the Electroral list to the school)
Residential stutus : By requesting the confirmation of residence from the Divisional
Secreterist( Divisional Secretariat sends the confirmation of residence to the school)

After the verification of information, the applicant is informed whether the application has been
accepted or rejected which is noted in the application and stired in the data store “Applications”.
The school obtains the valid applications from the data store “Applications” and schedules the
qualified applicants for interviews. Then it calls the applicants for interviews and send the
interviews scheledule to the Education Authority. The interview schdule is stored in the data
store “Interview Schedule”

The Level 1 Data flow diagram for the above scenario with some data flow labeled as Ⓐto Ⓚ is given in
figure. Identify and write down the relevant data flows against labeled Ⓐto Ⓚ.

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 8 of 9


b)
i. Briefly explain the key difference between functional and non-functional requirements as used in the
System Development Life Cycle.
ii. The following list includes some functional and non-functional requirements of a proposed e-commerce
web portal that plans to sell products on a catalogue.
A. Enable user to find products based on a variety of item characteristics
B. The system should work on any web browser
C. The system should be easy to use
D. Enable user to submit his/her comments on products and read other uses’ comments on
items
E. Data in the system should be preserved even in the case of a system failure.
F. Enable user to create and maintain a wish list of desired products.
G. Enable user to browse through products on catalogue.
H. The system should be available for use 24 hours a day, 7 days a week and 365 day a year.
I. The system should authenticate users through username and password
J. The system should have versions customized for global users. Eg French, Japanese,
German… etc
Identify and write down the labels of the non-functional requirements in Ⓐ to Ⓙ

4. 2016 A/L- Part 2-Part B-Q6


Draw a context diagram to show the operations of the online assignment management system described below
adhering to the standards of the Structured System Analysis and Designed methodology (SSADM). Cleary
indicate external entities and data flow of your diagram. State any assumptions that you made.
The National University of ICT (NUICT) conducts distance learning programs. The students of NUICT are
continuously assessed through online assignments. The students of NUICT use an online assignment
management system called NetAssign to download assignments and upload answer scripts. Once the answer
scripts are marked, the examiners enter marks into NetAssign. The students can view only the grades
determined by NetAssign. To use NetAssign, both examiners and students must provide authentication details
to the system. These authentication details are provided by NUICT to its students and examiners.

5. 2015 A/L Part 2- Part B-Q6


Draw a context diagram to show the overview of the library system described below. Clearly indicate external
entities and data flows of your diagram and state any acceptable assumptions that you have made.

The National Information Technology Library (NITL) provides e-books to its users through an online system
named "Library Information Processing System (LIPS)".

A person should submit an application to NITL to become a member of the LIPS. The NITL evaluates the
application and enters it to the LIPS, if it is approved. After entering the application data, LIPS issues an
activation code to NITL which in tum passes it to the relevant person. Once the activation code is received
the person becomes a member of LIPS. A member can obtain his/her usemame and password by providing
the activation code o the UPS. A member can subsequently access e-books by entering his/her username and
the password to the LIPS.

Prepared by : Mrs. Ahdilah Ismathdeen Grade 12 - ICT Page 9 of 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy