Devi Balika Revision Paper
Devi Balika Revision Paper
Revision paper
Grade 13
4. Match quality of information and how it is ensured using the following list.
5. What is the decimal equivalent of the binary number 1100111 represented in two’s complement form?
1) -24 2) 25 3) -25 4) 24 5) -26
7. Which of the following is equivalent to the Boolean expression F (xy)= (x’y’)’. (x+y)’ after simplify using
Boolean laws and theorems?
1) 1 2) 0 3) x 4) y 5) xy
Which of the following logic operations is implemented by the circuit shown above?
1) OR 2) AND 3) NAND 4) NOR 5) XNOR
10. Which one of the following methods is used to find and delete unnecessary files on Hard Disk?
1) Disk cleaning
2) Disk Defragmentation
3) Disk Checking
4) Disk formatting
5) Scan Disk
14. Every address generated by the CPU is divide into two parts. Select the correct statement from the following
1) Frame and page number
2) Page number and page offset
3) Frame number and page offset
4) Frame number and frame of shit
5) Page number and frame offset
15. Memory management technique in which system store and retrieve data from secondary storage for use in
main memory is called
1) Loading 2) Mapping 3) Swapping 4) Paging 5) Fragmentation
17. The interval from the time of submission of a process to the time of completion is termed as
1) Turnaround time 2) Waiting time 3) Response time
4) Throughput 5) Execute in time
19. What is the value of total after the following loop terminates?
Total =0
Count=0
While Count<4:
Count +=1
Total+=Count
if Total>=3: Continue
print(Total)
Start
X=2, sum=5
Sum>10 Sum=x+sum
No
yes
print sum
Stop
21. What is the value of sum of the algorithm represented by this flowchart?
1) 2 2) 16 3) 8 4) 32 5) 15
22. Which of the following Python program represents this flow chart correctly?
23. What will be the output after executing the following python code segment?
x="Python 5.6"
print(x.split("."))
1) ['Python 5.6'] 2) ['Python 5 , 6'] 3) ['Python 5', '6'] 4) ('Python 5.6') 5) ('Python 5', '6')
24. Which of the following written statement open file named myfile.txt in the computer which does not exist
in the computer?
1) file= open("myfile.txt","a")
2) file= open("myfile.txt","w")
3) file= open("myfile.txt","a+")
4) file= open("myfile.txt","w+")
5) file= open("myfile.txt","r+")
DBV/ICT/G13 /Revision P ag e 4|8
25. Which of the following is incorrect with regard to the above Python statement?
mylist=(10, 15, 23, 35)
1) print(mylist[3])
2) print(len(mylist))
3) print(max(mylist))
4) print(sum(mylist))
5) mylist[3]=53
26. Networks employee devices for routing services. Routers work at which of the following OSI layers?
27. Public key encryption uses two keys. ...............key is used to encrypt data while............... key is used to
decrypt data.
29. There is a host computer with IP address of 192. 168. 80. 10 and the Subnet Mask of 255. 255. 255. 254.
What is the number of subnets and number valid host addresses respectively?
30. An organization wants to create 12 subnets with a class c network id which subnet mask can use for this
purpose?
1) 255. 255. 255. 252 2) 255. 255. 255. 255 3) 255. 255. 255. 240
4) 255. 255. 255. 248 5) 255. 255. 255. 242
31. An attempt to make a computer resource unavailable to its intended users is called,
1) Virus attack 2) DoS attack 3) Worm attack 4)Malware attack 5) Espionage attack
33. The command that can be used to view the path of an IP packet transmitted through a network is ..........
34. What is the degree of a relational table with 15 records and 7 fields?
35. Consider the following statements with regard to the relational databases.
A- A set of possible data relees is call domain.
B- A single entity can be attached to a relationship.
C-An attribute can have more than a value in row of a table.
D- A value in a foreign key field cannot be duplicated and can’t be null
Which of the above statements are correct?
M Course_name
N
sid assign course
student
Course_id
sname
assign_date
36. Identify the incorrect definitions of the following relational schema regarding to the above ER diagram
A- student ( sid, sname)
B- assign (assign_date, coursename, course_id)
C- Course (course-id, sid, course_name )
D - Course ( course _id, course_name )
E – assign (course_id , sid, assign_date)
1) select a.assign_date, c. course_name, a. sid from assign a ,course c where a.course_id= c.course_id;
2) select a.sid, c.cname, a.assign_date from assign a , student st where a.sid= st.sid;
3) select a.sid, c.course_name, a. assign_date from assign a, course c;
4) select st.sid,c.name, c.assign_date from assign a , course c where a.course_id=c.course_id;
5) select a.sid,st.cname, a.assign_date from assign a , course c where a.course_id=c.course_id;
38. The candidate key field which is not a primary key field in a database is called as ………………..
40. Which attribute can be used with <td> tag to merge two cells horizontally?
41. Which of the following HTML statement contains correct CSS syntax?
<HTML>
<HEAD>
<TITLE> A/L Examination </TITLE>
</HEAD>
<BODY>
<P> <! <H5>ICT </H5></P>
<A HREF="http://www.google.com"> WEB </A> -->
</BODY>
</HTML>
42.Which of the following is correctly describe the display when the above code is rendered?
1) That text "A/L Examination" appears on the title bar and text "ICT" appears on the body of the web
page.
2) The text "WEB" appears in the body of the web page.
3) The text "ICT" and "WEB" both appear in the body of the web page.
4) The text " A/L Examination" appears on the title bar.
5) The text "ICT" appear in the body of the web page.
43................... Software process model is based on which river and iterative fashion.
45. Which of the following testing methods is normally used as the acceptance test for a software system?
46. Which of the following is/are and advantages of online reverse auction?
49. Artificial intelligence is the science of making computers does things as done by humans. Which of the
following techniques are not used AI?
1) Neural networks
2) Genetic algorithms
3) Expert system
4) Ubiquitous computing
5) All of the above
50. What is the incorrect solution for the Von Newman bottleneck?
Index No.:………………………………………………………………………………
DBV/ICT/G13/Revision Page 1
Part A - Structured Essay
Answer all the four questions on this paper itself
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(ii) State one purpose of PCB in an Operating System.
……………………………………………………………………………………………………….
(iii) State two storage maintenance methods of an operating system.
………………………………………………………………………………………………………
(b) The memory of a computer system is byte addressable and has a maximum usable size of 4 GB.
(i) Calculate the address size in bits.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(ii) If a page size is 2 MB, how many bits are sufficient to represent the page number.Show all the
calculation steps clearly.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ReadyRunning
BlockedRunning
ReadyReady suspend
DBV/ICT/G13/Revision Page 2
2. The following diagram is a part of a ER diagram
Course_No Course_name
Course
Course_fee
(a) Write a query in SQL to convert the above ER diagram into relational database table. (Note:- course
number and course fee should contain 3,10 and 6 characters respectively)
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) Write a query in SQL to add the following data to the course table.
Course number 001
Course name Database
course fee 10000
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
(c) If the course name of the course entered in the section(b) above should be changed into Network. Write a
query in SQL to update the relevant record in the course table.
………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….
DBV/ICT/G13/Revision Page 3
3. Give examples for following types of electronic business transactions.
Type Example
C2C
B2E
B2B
B2C
(a) State three types of business organizations and give an example for each.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………..
……………………………………………………………………………………………………….....
(b)
(i) What is meant by ubiquitous computing?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………..
DBV/ICT/G13/Revision Page 4
4. A Computer represents integers as 8 bit two’s complement binary numbers.
(a)
(i) State the range of integers the above computer can represent.
…………………………………………………………………………………………………………………..
(ii) The above mentioned computer has stored 111010012. Show how to calculate decimal equivalent of the
number 111010012 .
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….
(b)
(i) Give one similarity and one difference between MICR and OCR.
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………….
DBV/ICT/G13/Revision Page 5
Part B - Essay
* Answer four questions only.
1. The following scenario has been used to operate garden light of a house. Two switches x and y are
installed in the outside of the house (lobby area) and the inside of the house(living area) to operate the
garden light Z. The light turned on by using this switch x at the lobby area can be turned off by using
the switch y in the living room. The light turned on by using switch y in the living room and turned off
by switch x at the lobby area. Assume that the truth value 0 represented turned off status of switch X
and Y and the turned on and turned off status of the garden light Z represented by the truth values 1
and 0 respectively.
(a) Construct the truth table to represent the functionality of the above circuit.
(b) Derive a SOP Boolean expression to present the truth table obtained in section (i) above.
(c) Convert the above obtained SOP Boolean expression in section(ii) into POS Boolean expression.
(d) State a logic gate which is equivalent to the functionality of the truth table obtained in section (i)
(e) Construct a logic circuit to represent the logic Gate obtained in section (iii) using three NAND gates
and two NOR logic gates only.
2. A School has several Laboratories equipped with computers as below. The School has only one LAN
and all laboratories connected to the LAN and it is divided into subnets. The network address of the
school LAN is 192. 168. 18. 0
Laboratory Computers
A/L computer Lab 40
O/L computer Lab 50
Smart Lab 05
Language Lab 15
(a)
(i) State a suitable Subnet Mask for this LAN
(ii) Give one reason for selecting the above mentioned subnet Mask
(b) What is the maximum number of computers that can we connect to one subnet? show your
calculations.
(c) Write down the first host address and the last host address of each subnet.
(d) The School has a public IP address 192.168.15.0. Computers in each subnet can access resources in
all other subnets. The school decided to connect the subnets to the internet through a proxy server.
There is also a file server which can only access by the computers in the subnet. The school also uses
a Firewall to gain security from unauthorized access.
Draw a network diagram to show the logical arrangement of the school computer network.
DBV/ICT/G13/Revision Page 6
Access of library of information or entertainment or recveiving on-
going services for a set fee
3. Consider the following website form which has been developed for sending SMS messages to mobile
phone from a web application.
Earn a revenue by marketing
or offering another's
products or srevices on your
website
(a) Write an external CSS code to rendered below effects in the above web application.
Background colour should be blue.
Main header "send free SMS" should be red colour.
Font type of all the text accept headers should be Arial.
Colour of every text except headers should be yellow.
4. A program reads in a string of numbers and converts that is string to list of integer numbers if the first
number is odd , it compute the sum of all the numbers. Otherwise if the first number is even, it
compute the product of all the numbers finally print the computed value.(note: List of numbers input
by the user should separated by a space).
(a) Write a Python program that can print the computed value of the above scenario.
(b) Convert the above Python program as a function and write the output of the function in a new file
called “out.txt”.
DBV/ICT/G13/Revision Page 7
5.
(a) State and explain the three types of data anomalies .
(b) Consider the following table and answer the questions given below.
StudentNo CourseID CouRegDate StudentName CourseName FinalMark
S001 C001 12/02/2018 Pathumi Database 60
S002 C002 12/02/2018 Ruwini Network 55
S001 C003 20/01/2018 Pathumi Graphic Design 80
S003 C001 30/01/2018 Kavini Database 70
S002 C001 20/01/2018 Ruwini Database 42
S003 C002 30/01/2018 Kavini Network 91
6.
Com-Fix is a computer repair company. The owner of the company handles all the processes manually. But he
wants to implement a system for his company in the near future. The new system should be able to do the
following processes.
When a customer comes with a faulty computer, first the customer is registered in the system by giving his
details and fault of the computer is also saved in the system. The system will give an estimated date for the
repair to be completed. When a repair is complete and the customer comes to collect the computer, the system
gives him/her an invoice and the customer pays immediately. System should generate purchase orders to the
suppliers after checking the requirement of computer parts and faulty computer details. System should maintain
the details of the all the parts available in the company. The owner wants to run this system on any platform.
(a) State one functional requirement and one non-functional requirement of the system.
(b) Draw a context diagram for the above system.
(c) Draw a level 1 DFD diagram for the above system.
DBV/ICT/G13/Revision Page 8