0% found this document useful (0 votes)
305 views

Devi Balika Revision Paper

The document contains a 35 question revision paper on Information & Communication Technology for Grade 13. The questions cover topics such as early calculating machines, components of a computer, binary and decimal number conversions, Boolean logic, computer memory, operating systems, computer networks, cybersecurity, databases and more. Students are required to choose the correct answer from the given options for each multiple choice question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
305 views

Devi Balika Revision Paper

The document contains a 35 question revision paper on Information & Communication Technology for Grade 13. The questions cover topics such as early calculating machines, components of a computer, binary and decimal number conversions, Boolean logic, computer memory, operating systems, computer networks, cybersecurity, databases and more. Students are required to choose the correct answer from the given options for each multiple choice question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

DEVI BALIKA VIDYALAYA – COLOMBO 08

Revision paper
Grade 13

Information& Communication Technology – I 2 hours

1. Which of the following is considered as the first mechanical calculator?


1) Pascaline 2) Nepier’s rods 3) ENIAC
4) Analytical Engine 5) Abacus

2. For taking decisions data must be


1) Very accurate 2) Massive 3) Processed correctly
4) Collected from diverse sources 5) All of the above

3. Consider the following statements about components of a computer.


A- The CU, ALU, and registers are considered as the main components of a CPU
B- Software used to perform specific tasks are called system software
C- Firmware are incorporated in the process of manufacturing hardware

Which of the above statements is/are correct?


1) A Only 2) C only 3) A and B only 4) A and C only 5) All A, B and C

4. Match quality of information and how it is ensured using the following list.

Quality How ensured


A. Timeliness X. Use correct input and processing rules
B. Complete Y. include all data
C. Accurate Z. include all data up to present time

1) AY , BZ, CX 2) AZ, BY, CX 3) AX, BY, CZ


4) AZ, BX, CY 5) AY, BX, CZ

5. What is the decimal equivalent of the binary number 1100111 represented in two’s complement form?
1) -24 2) 25 3) -25 4) 24 5) -26

6. The decimal number equivalent to the 10101.01112 is


1) 31.4375 2) 21.4375 3) 22.4475 4) 31.4475 5) 30.4375

7. Which of the following is equivalent to the Boolean expression F (xy)= (x’y’)’. (x+y)’ after simplify using
Boolean laws and theorems?
1) 1 2) 0 3) x 4) y 5) xy

DBV/ICT/G13 /Revision P ag e 1|8


8. Consider the following circuit implemented using basic logic gates.

Which of the following logic operations is implemented by the circuit shown above?
1) OR 2) AND 3) NAND 4) NOR 5) XNOR

9. Which of the following combinations cannot be combined into K-MAP groups?


1) Corners in the same row
2) Overlapping combinations
3) Squares at four edges
4) Corners in the same columns
5) Diagonal combinations

10. Which one of the following methods is used to find and delete unnecessary files on Hard Disk?
1) Disk cleaning
2) Disk Defragmentation
3) Disk Checking
4) Disk formatting
5) Scan Disk

11. Which of the following is not an advantage of Dynamic RAMs?


1) High density 2) Low cost 3) High speed
4) No need of memory refresh 5) None of the above

12. Which of the following has the shortest access time?


1) Optical storage 2) cache memory 3) Hard disk
4) RAM 5) Registers

13. A file control block contains the information about


1) File extension 2) File ownership 3) File permission
4) Location of the file contents 5) All of the above

14. Every address generated by the CPU is divide into two parts. Select the correct statement from the following
1) Frame and page number
2) Page number and page offset
3) Frame number and page offset
4) Frame number and frame of shit
5) Page number and frame offset

15. Memory management technique in which system store and retrieve data from secondary storage for use in
main memory is called
1) Loading 2) Mapping 3) Swapping 4) Paging 5) Fragmentation

DBV/ICT/G13 /Revision P ag e 2|8


16. Which of the following contains the states through which process can be moved from running state?
1) Ready, blocked, terminated
2) Blocked, blocked/ suspend, ready
3) Ready, ready/suspend, terminated
4) New , Ready , Blocked
5) None of the above

17. The interval from the time of submission of a process to the time of completion is termed as
1) Turnaround time 2) Waiting time 3) Response time
4) Throughput 5) Execute in time

18. Consider the following Python function header.


def param(w, x,y):
Which of the following is a correct to invoke the above function?
A- param(10,12,y=14)
B-param(w=10, x=12,y=14)
C-param(w=10,12,14)
D-param(10, 12,14)

1) A only 2) A and B only 3) A,B and C only


4) A,C and D only 5) All A,B,C and D

19. What is the value of total after the following loop terminates?
Total =0
Count=0
While Count<4:
Count +=1
Total+=Count
if Total>=3: Continue
print(Total)

1) 9 2) 10 3) 11 4) Semantic error 5) Syntax error

20. Which of the following is not a valid name for a function?


1) Calculate Average()
2) CalculateAverage()
3) calculate _average()
4) CALCULATEAVERAGE()
5) Calculateaverage()

DBV/ICT/G13 /Revision P ag e 3|8


Use the following flow chart to answer the question 21 and 22.

Start

X=2, sum=5

Sum>10 Sum=x+sum
No
yes

print sum

Stop

21. What is the value of sum of the algorithm represented by this flowchart?
1) 2 2) 16 3) 8 4) 32 5) 15

22. Which of the following Python program represents this flow chart correctly?

23. What will be the output after executing the following python code segment?
x="Python 5.6"
print(x.split("."))

1) ['Python 5.6'] 2) ['Python 5 , 6'] 3) ['Python 5', '6'] 4) ('Python 5.6') 5) ('Python 5', '6')

24. Which of the following written statement open file named myfile.txt in the computer which does not exist
in the computer?
1) file= open("myfile.txt","a")
2) file= open("myfile.txt","w")
3) file= open("myfile.txt","a+")
4) file= open("myfile.txt","w+")
5) file= open("myfile.txt","r+")
DBV/ICT/G13 /Revision P ag e 4|8
25. Which of the following is incorrect with regard to the above Python statement?
mylist=(10, 15, 23, 35)

1) print(mylist[3])
2) print(len(mylist))
3) print(max(mylist))
4) print(sum(mylist))
5) mylist[3]=53

26. Networks employee devices for routing services. Routers work at which of the following OSI layers?

1) Transport layer 2) Physical layer 3) Network layer


4) Data Link layer 5) Session layer

27. Public key encryption uses two keys. ...............key is used to encrypt data while............... key is used to
decrypt data.

1) Private, public 2) Encryption, decryption 3) Public, private


4) Public, secret 5) Public, cypertext

28. Select the correct statement about servers and protocols.

1) P O P is used when sending and receiving emails from client to server.


2) DHCP server allocate both Static and dynamic IP addresses.
3) Proxy server network as a firewall for a network as well as to bypass restrictions.
4) Using FTP client can only download the files from a web server.
5) Ethernet protocol used in application layer of the OSI reference model.

29. There is a host computer with IP address of 192. 168. 80. 10 and the Subnet Mask of 255. 255. 255. 254.
What is the number of subnets and number valid host addresses respectively?

1) 1 and 30 2) 8 and 254 3) 8 and 30 4) 8 and 32 5) 1 and 32

30. An organization wants to create 12 subnets with a class c network id which subnet mask can use for this
purpose?

1) 255. 255. 255. 252 2) 255. 255. 255. 255 3) 255. 255. 255. 240
4) 255. 255. 255. 248 5) 255. 255. 255. 242

31. An attempt to make a computer resource unavailable to its intended users is called,

1) Virus attack 2) DoS attack 3) Worm attack 4)Malware attack 5) Espionage attack

32. Which of the following is false with respect to UDP?

1) Unreliable 2) Connectionless 3) Network layer protocol


4) Reliable 5) Transport layer protocol

33. The command that can be used to view the path of an IP packet transmitted through a network is ..........

DBV/ICT/G13 /Revision P ag e 5|8


1) ping 2) netstat 3) telnet 4) tracert 5) route

34. What is the degree of a relational table with 15 records and 7 fields?

1) 15 2) 22 3) 7 4) 8 5) None of the above

35. Consider the following statements with regard to the relational databases.
A- A set of possible data relees is call domain.
B- A single entity can be attached to a relationship.
C-An attribute can have more than a value in row of a table.
D- A value in a foreign key field cannot be duplicated and can’t be null
Which of the above statements are correct?

1) A and B only 2) A and C only 3) A, B and C only


4) A, B, and D only 5) All, A,B,C, and D
Consider the following ER diagram to answer questions 36 and 37.

M Course_name
N
sid assign course
student

Course_id
sname
assign_date

36. Identify the incorrect definitions of the following relational schema regarding to the above ER diagram
A- student ( sid, sname)
B- assign (assign_date, coursename, course_id)
C- Course (course-id, sid, course_name )
D - Course ( course _id, course_name )
E – assign (course_id , sid, assign_date)

1) B and C only 2) A,B and D only 3) A,B and E only


4) A,D and D only 5) B,C,D and E only
37. What would be the correct SQL statement to display student id, course name and assign date of each
student?

1) select a.assign_date, c. course_name, a. sid from assign a ,course c where a.course_id= c.course_id;
2) select a.sid, c.cname, a.assign_date from assign a , student st where a.sid= st.sid;
3) select a.sid, c.course_name, a. assign_date from assign a, course c;
4) select st.sid,c.name, c.assign_date from assign a , course c where a.course_id=c.course_id;
5) select a.sid,st.cname, a.assign_date from assign a , course c where a.course_id=c.course_id;

38. The candidate key field which is not a primary key field in a database is called as ………………..

1) Foreign key 2) Secondary key 3) Super key


4) Alternate Key 5) Composite key

DBV/ICT/G13 /Revision P ag e 6|8


39. Which of the following SQL statement insert a new column named Module_fee to a table called Module?

1) insert into Module column ‘Module_fee’;


2) alter table Module insert Module_fee(currency);
3) insert into Module add ‘Module_fee’ currency;
4) alter table Module add Module_fee currency;
5) alter table Module add ‘Module_fee’ currency;

40. Which attribute can be used with <td> tag to merge two cells horizontally?

1) merge=" colspan2" 2) rowspan="2" 3) colspan="2"


4) merge="row2" 5) mergecell="2"

41. Which of the following HTML statement contains correct CSS syntax?

1) <p style=" font-family: Arial">A/L ICT </p>


2) <p style={font-family: Arial}>A/L ICT </p>
3) <p style=" font_family: Arial">A/L ICT </p>
4) <p style=font-family: "Arial">A/L ICT </p>
5) <p "style=font-family: Arial">A/L ICT </p>

Consider the following HTML code.

<HTML>
<HEAD>
<TITLE> A/L Examination </TITLE>
</HEAD>
<BODY>
<P> <! <H5>ICT </H5></P>
<A HREF="http://www.google.com"> WEB </A> -->
</BODY>
</HTML>
42.Which of the following is correctly describe the display when the above code is rendered?

1) That text "A/L Examination" appears on the title bar and text "ICT" appears on the body of the web
page.
2) The text "WEB" appears in the body of the web page.
3) The text "ICT" and "WEB" both appear in the body of the web page.
4) The text " A/L Examination" appears on the title bar.
5) The text "ICT" appear in the body of the web page.

43................... Software process model is based on which river and iterative fashion.

1) Object oriented 2) Spiral 3) Waterfall 4) R A D 5)None of the above

DBV/ICT/G13 /Revision P ag e 7|8


44. Which of the following statement is true regarding the DFD?

1) External entity cannot be located in a DFD.


2) Two data stores can we directly interconnected.
3) Context diagram consist with the process, external entity and data stores.
4) Both the external entity and process can be directly interconnected.
5) Data store has three properties: Counter, location and name.

45. Which of the following testing methods is normally used as the acceptance test for a software system?

2) Alpha testing 2) Black box testing 3) White box testing


5) Unit testing 5) System testing

46. Which of the following is/are and advantages of online reverse auction?

A- reduced the cost of the product


B- significantly substantial amount of time is high.
C- access to a large supplier/ seller base.
2) A Only 2) C only 3) A and B only 4) A and C only 5) B and C only

47. Correct relationship between e-Commerce and e-Business?

1) E-commerce overlap with e-business.


2) E-Commerce is broadly equivalent to e-business.
3) E-Commerce is a subset of e-business.
4) E-business is of subset of e-commerce.
5) None of the above.

48. Which of the following statement is incorrect about software agents?

1) They are goal oriented.


2) Can work both Static and dynamic environment.
3) Maybe semi-autonomous fully autonomous.
4) They do not communicate to one another.
5) The agent must be Proactive

49. Artificial intelligence is the science of making computers does things as done by humans. Which of the
following techniques are not used AI?

1) Neural networks
2) Genetic algorithms
3) Expert system
4) Ubiquitous computing
5) All of the above

50. What is the incorrect solution for the Von Newman bottleneck?

1) RAMBUS 2) Caching 3) PIM 4) Prefetching 5) ROMBUS

DBV/ICT/G13 /Revision P ag e 8|8


DEVI BALIKA VIDYALAYA – COLOMBO 08
Revision paper
Grade 13

Information & Communication Technology – II 3 hours

Index No.:………………………………………………………………………………

Important: For Examiner's Use Only

 This question paper consists of 8 pages. For the second paper


 This question paper comprises of two parts,
or the second paper Part A and Part B. The Part Question Marks
time allotted for both parts is 3 hours. Numbers
 _Use of calculators is not allowed. 1
2
Part A — Structured Essay A
3
Answer all the questions on this paper itself. 4
Write your answers in the space provided for
1
each question. Note that the space provided is
2
sufficient for your answers and that extensive
3
answers are not expected. B
4
5
Part B — Essay 6
Total
This part contains six questions and four
questions are to be answered. Use the papers
supplied for this purpose. At the Paper end of
the time allotted for this paper, tie the two Paper I
parts together so that Part A is top of Part B Paper II
before handing over to the Supervisor. Total
You are permitted to remove only Part B of Percentage
the question paper from the Examination Hall.
Percentage

DBV/ICT/G13/Revision Page 1
Part A - Structured Essay
Answer all the four questions on this paper itself

1. Operating system is the most important software in the computer.


(a)
(i) What is the relationship between threads and processes?

………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) State one purpose of PCB in an Operating System.

……………………………………………………………………………………………………….
(iii) State two storage maintenance methods of an operating system.

………………………………………………………………………………………………………
(b) The memory of a computer system is byte addressable and has a maximum usable size of 4 GB.
(i) Calculate the address size in bits.

……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(ii) If a page size is 2 MB, how many bits are sufficient to represent the page number.Show all the
calculation steps clearly.

……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

(c) Fill the following table.

State transition Possible/ not Reason Responsible


possible scheduler

ReadyRunning

BlockedRunning

ReadyReady suspend

DBV/ICT/G13/Revision Page 2
2. The following diagram is a part of a ER diagram

Course_No Course_name
Course

Course_fee

(a) Write a query in SQL to convert the above ER diagram into relational database table. (Note:- course
number and course fee should contain 3,10 and 6 characters respectively)

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

………………………………………………………………………………………………………………

(b) Write a query in SQL to add the following data to the course table.
Course number 001
Course name Database
course fee 10000

…………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………

(c) If the course name of the course entered in the section(b) above should be changed into Network. Write a
query in SQL to update the relevant record in the course table.

………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………

………………………………………………………………………………………………………………….

DBV/ICT/G13/Revision Page 3
3. Give examples for following types of electronic business transactions.

Type Example

C2C

B2E

B2B

B2C

(a) State three types of business organizations and give an example for each.
…………………………………………………………………………………………………………

…………………………………………………………………………………………………………..

……………………………………………………………………………………………………….....

(b)
(i) What is meant by ubiquitous computing?
……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

(ii) Give two examples for ubiquitous computing.

…………………………………………………………………………………………………………………

………………………………………………………………………………………………………………….

(c) State two solutions for Von-Newmann bottleneck.

…………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………..

DBV/ICT/G13/Revision Page 4
4. A Computer represents integers as 8 bit two’s complement binary numbers.
(a)
(i) State the range of integers the above computer can represent.

…………………………………………………………………………………………………………………..

(ii) The above mentioned computer has stored 111010012. Show how to calculate decimal equivalent of the
number 111010012 .

…………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………

………………………………………………………………………………………………………………….

(b)
(i) Give one similarity and one difference between MICR and OCR.

…………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………

………………………………………………………………………………………………………………….

(ii) State two functions of registers.

…………………………………………………………………………………………………………………

………………………………………………………………………………………………………………….

(iii) List two main characteristics of software agents.

…………………………………………………………………………………………………………………

………………………………………………………………………………………………………………….

DBV/ICT/G13/Revision Page 5
Part B - Essay
* Answer four questions only.

1. The following scenario has been used to operate garden light of a house. Two switches x and y are
installed in the outside of the house (lobby area) and the inside of the house(living area) to operate the
garden light Z. The light turned on by using this switch x at the lobby area can be turned off by using
the switch y in the living room. The light turned on by using switch y in the living room and turned off
by switch x at the lobby area. Assume that the truth value 0 represented turned off status of switch X
and Y and the turned on and turned off status of the garden light Z represented by the truth values 1
and 0 respectively.

(a) Construct the truth table to represent the functionality of the above circuit.
(b) Derive a SOP Boolean expression to present the truth table obtained in section (i) above.
(c) Convert the above obtained SOP Boolean expression in section(ii) into POS Boolean expression.
(d) State a logic gate which is equivalent to the functionality of the truth table obtained in section (i)
(e) Construct a logic circuit to represent the logic Gate obtained in section (iii) using three NAND gates
and two NOR logic gates only.

2. A School has several Laboratories equipped with computers as below. The School has only one LAN
and all laboratories connected to the LAN and it is divided into subnets. The network address of the
school LAN is 192. 168. 18. 0
Laboratory Computers
A/L computer Lab 40
O/L computer Lab 50
Smart Lab 05
Language Lab 15

(a)
(i) State a suitable Subnet Mask for this LAN
(ii) Give one reason for selecting the above mentioned subnet Mask
(b) What is the maximum number of computers that can we connect to one subnet? show your
calculations.
(c) Write down the first host address and the last host address of each subnet.

(d) The School has a public IP address 192.168.15.0. Computers in each subnet can access resources in
all other subnets. The school decided to connect the subnets to the internet through a proxy server.
There is also a file server which can only access by the computers in the subnet. The school also uses
a Firewall to gain security from unauthorized access.

Draw a network diagram to show the logical arrangement of the school computer network.

DBV/ICT/G13/Revision Page 6
Access of library of information or entertainment or recveiving on-
going services for a set fee

3. Consider the following website form which has been developed for sending SMS messages to mobile
phone from a web application.
Earn a revenue by marketing
or offering another's
products or srevices on your
website

(a) Write an external CSS code to rendered below effects in the above web application.
 Background colour should be blue.
 Main header "send free SMS" should be red colour.
 Font type of all the text accept headers should be Arial.
 Colour of every text except headers should be yellow.

(b) Write the HTML code to render the above form.


(Note: CSS file you have been written in Section (a) should link to the HTML code. CSS file name
should be form.css)

4. A program reads in a string of numbers and converts that is string to list of integer numbers if the first
number is odd , it compute the sum of all the numbers. Otherwise if the first number is even, it
compute the product of all the numbers finally print the computed value.(note: List of numbers input
by the user should separated by a space).

(a) Write a Python program that can print the computed value of the above scenario.
(b) Convert the above Python program as a function and write the output of the function in a new file
called “out.txt”.

DBV/ICT/G13/Revision Page 7
5.
(a) State and explain the three types of data anomalies .
(b) Consider the following table and answer the questions given below.
StudentNo CourseID CouRegDate StudentName CourseName FinalMark
S001 C001 12/02/2018 Pathumi Database 60
S002 C002 12/02/2018 Ruwini Network 55
S001 C003 20/01/2018 Pathumi Graphic Design 80
S003 C001 30/01/2018 Kavini Database 70
S002 C001 20/01/2018 Ruwini Database 42
S003 C002 30/01/2018 Kavini Network 91

Primary key of the above table is StudentNo, CourseID and CouRegDate.


(i) Show all the functional dependencies of the above table using a dependency diagram.
(ii) Which normal form is violate in this table? Justify your answer.
(iii) Decompose the table into the 3NF relations to be implemented in relational database.

6.

Com-Fix is a computer repair company. The owner of the company handles all the processes manually. But he
wants to implement a system for his company in the near future. The new system should be able to do the
following processes.

When a customer comes with a faulty computer, first the customer is registered in the system by giving his
details and fault of the computer is also saved in the system. The system will give an estimated date for the
repair to be completed. When a repair is complete and the customer comes to collect the computer, the system
gives him/her an invoice and the customer pays immediately. System should generate purchase orders to the
suppliers after checking the requirement of computer parts and faulty computer details. System should maintain
the details of the all the parts available in the company. The owner wants to run this system on any platform.

(a) State one functional requirement and one non-functional requirement of the system.
(b) Draw a context diagram for the above system.
(c) Draw a level 1 DFD diagram for the above system.

DBV/ICT/G13/Revision Page 8

You might also like