2012 AL ICT Model Paper Answers English at Apepanthiya - LK

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

G.C.E.

A/L - 2012
Subject – Information and communication Technology

Answer sheet – Part I

Question Answer Question Answer Question Answer Question Answer Question Answer
Number Number Number Number Number
01 2 11 4 21 3 31 2 41 1
02 3 12 4 22 5 32 5 42 2
03 5 13 2 23 5 33 3 43 4
04 2 14 2 24 1 34 1 44 1
05 2 15 4 25 4 35 5 45 3
06 1 16 3 26 4 36 3 46 5
07 5 17 4 27 3 37 3 47 4
08 3 18 2 28 1 38 4 48 4
09 2 19 3 29 2 39 2 49 5
10 3 20 5 30 1 40 2 50 4
Paper II - A

Answer sheet and marks allocated.

(1) (a). Second generation - Transistors


Fourth generation - Microprocessor
(1 marks)
Advantages of Fourth Generation computers
 low cost
 small in size
 low power wastage
 low heat generation
 high capacity for storing data
 high speed
(1 marks )
(b). CISC – This technique was used in processor architecture by Intel.
Introduced in as X86.
Used in Intel AMD processors.
Took long time to execute as they contain complex instructions.
RISC- Used Simple set of instructions.
So computer could be executed faster.
Used in Apple Macintosh.

( 1 marks x 2 =2)
(c). -123.75 floating point single precision
(i) sign bit – 1
(ii) 1111011.112
(iii) 1.11101111 x 26
(iv) 6
(v) 11101111
(vi)
1 1 0 0 0 0 1 0 1 1 1 1 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

Sign bit Exponent (8 bits) Mantissa (23 bits) (ලකුණු 1x 6 =


(1 marks x 6 =6)

(2) (a).
Software Classification
Disk Defragmentation Utility program
Opera Application software
Mac Operating system
Screen Server Utility software
Joomla Application software
Mint Operating system
(0.5 marks x 6 =3)

1
(b). (i) Memory Allocation

In program execution digital output should be received and it should be connected to memory.
So there should be enough space in primary memory.

(ii) Memory swapping

A program in memory for a long period of time is transformed to cash memory where there is
an urgent program to run. Again the previously transferred program comes to line after the
urgent program finished execution.
(1 marks x 2 =2)
(c). (i) Total no. of pages) = 28 = 256
(1 marks )
(ii) [01011101|0100111101]

Pages displacement

(1 marks) (1 marks)

(d).
Fat 32 NTFS
1 Maximum file size is limited File size is unlimited.
2 Length of the file name is limited. Length of the file name is unlimited.
3 No security Secured
4 Can not work with unicode Compatible with unicode
(1 marks x 2 =2)

(3)
(a). MN LN

FN
name TpNo

EmpN
o employee hour

DOB CourseID
age
follow Course

CourseName

(4 marks )

2
(b). The relation between employee and courses m:n

m n
employee follow course

m
n
employee do follow do course

(1 marks )

(c). Descriptive attribute

No of hours is not a attribute of course of employees. It depends on the relationship .Thus it’s a
descriptive attribute.

emp follow course

hours
(2 marks )

(d). Employe (EmpNo, FN, MN, LN, DOB, Age)


TpNo (EmpNo, TelNo1, TelNo2)
Flow (EmpID, CourseID, hours)
Course (CourseID, CourseName)
(3 marks )
(4) (a).

Memory type Criteria


Physical size Access time Access speed Capacity Cost
per byte
Register 1 1 5 1 5
Cache memory 2 2 4 2 4

Secondary
storage memory 2
4 4 2 4

Remote
1
secondary 5 5 1 5
storage memory
Random Access
3 3 3 3 3
Memory
(0.2 marks X20=4.0)

3
(b). (i)

Dynamic random access memory (DRAM) Static random access memory (SRAM)
1. Frequent refreshing is necessary keep data 1. Frequent refreshing is not necessary
stored. 2. Speed is higher.
2. Speed is less. 3. Less data can be stored.
3. More data can be stored.
(1 marks X 2 = 2)

(ii) High data access speed. (1 marks )

(c). (i) Create Table Student

Ad_NO Varchar (10) Not Null,

Std_name Varchar (50),

Grade Varchar (10),

Gender Varchar (7),

Primary Key (Ad_No));

(ii). insert into Student (Ad_No, Std_name, Grade, Gender)

Values (‘A005’,’Nimal’,’12 sc’,’male’);

(iii). Alter Table Student Add Tel-No Varchar (10);

(1 marks x 3 = 3)

4
Part II - B

Answer sheet and marks allocated

(1) (a). i. RAM (0.5 marks)


Store operating system as long as the computer is working.
Temporary stores data, instructions, information and application software according to user
requirements
(0.5 marks)
ii. Cache memory (0.5 marks)
Since it takes long time to access data which needed by processor from main memory,
cache memory is used. They are located in or closed to processor and have lower capacity
than main memory and support to data access.
(0.5marks)
iii. Register (0.5marks)
Temporary storage of data which needed in data processing until they sent to ALU and
tempory storage of processed information until released to main memory.
(0.5marks)

(b).

(0.5 marks)
To get bytes and remaining 78 (0.5 marks)
To show wastage in file space as 78 bytes (0.5marks )

1
(c). (i) Truth table

A B C D F(ABCD)

0 0 0 0 0

0 0 0 1 0

0 0 1 0 0

0 0 1 1 1

0 1 0 0 0

0 1 0 1 1

0 1 1 0 0

0 1 1 1 1

1 0 0 0 0

1 0 0 1 0

1 0 1 0 0

1 0 1 1 1

1 1 0 0 0

1 1 0 1 1

1 1 1 0 0

1 1 1 1 1

(0.25 marks x 16 = 4)

2
(ii)

(1 marks)

(iii)

(1.5 marks)
AB
A A
CD

C D

1 1
Or D
1 1 1 1
C
D

B C B

BD + CD

(iv) F = BD + CD

B
F

(2 marks)

3
(v)

(2 marks)

(2) (a).
FTP HTTP

FTP is a two-way system as files are transferred HTTP is a one-way system as files are
back and forth between servers and workstation. transferred only from the server to the
workstation browser.

FTP, where entire files are transferred from one HTTP only transfer the content of a web page in
device to another and copied into memory. to a browser for viewing.

FTP is a protocol used to upload files from a HTTP is a protocol used to transfer files from a
workstation to FTP server or download files from web server on to a browser in order to view a
a FTP server to workstation. web page that is on the internet.

(2 marks)

(b). A repeater
 Is an electronic devices that receives a signal and retransmits it at a higher level and /or higher
power ,or on to the other side of an obstruction, so that the signal can cover longer distances.
(1.5 marks)
A bridge
 Is a device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a
LAN by dividing it into two segments.
(1.5 marks )

(c). To avoid the wastage of IP address. (2 marks )

4
(d).

IP Address Subnet Mask Network ID Class

172.16.10.0/16 255.255.0.0 172.16.0.0 B

10.10.10.0/10 255.192.0.0 10.0.0.0 A

192.168.10.0/26 255.255.255.192 192.168.10.0 C

190.100.100.10/19 255.255.224.0 190.100.96.0 D

(1 marks x 3 = 3)
(3) (a). CSS minimizes complex coding and repetitive coding.
CSS can be developed externally.
(2 marks )
(b). p{Color:red; font-family;arial; font size : 16pt} (2 marks)
(c).

(5 marks)
(d). <img src = “images/abc.jpg”> (3 marks)
(e). <a href =”admin.html”> contact administrator</a> (3 marks)

(4) (a).When the program is compiled it runs on any same type of interface. But if the program is
converted to a byte code, it can be interpreted line by line and execute itself on any interface. Then
Syntax errors can be avoided. The processing speed is also high.
(2 marks)

(b).ISA- Second generation language

Low level programming language. Written in Assembly language.

SQL-Fourth generation language


High level programming language . No procedures.

(2 marks )

5
(c).
 A Sequence control structure Start
 B selection control structure
 C Repetition control structure d1=open('data.txt'
)
(1 marks)
A li=d1.readline()

info=li.split(',')

for c in info:
N
Y
x=0

while x<len(info)-1:
N
Y
If int(info[x])> int(info[x+1])
N
Y
s=int(info[x])
C
B info[x]=int(info[x+1])

info[x+1]=s

x+=1

print info

End

(3 marks)

6
(d) (i) Data in data.txt file is taken into variable info (2 marks )

 In first line, file object called d1 is declared and open the data.txt file.
 In second, redline()function is executed with in d1 file object and read the first line
of data.txt file and store it as string variable.
 The value in li variable is separated where comma’s are located and processed as the
elements of the list variable called info.
(ii) Bubble sort (1 marks)
(iii) The elements in info list are arrange in ascending order and displayed.
 Elements in the list are compared in pairs.
 If the value of first element is higher than the second elements they interchange
their places and if not they remain the same way
 Then the second and third elements are compared. Thus this program runs until the
one less than number of all elements.
(2 marks)
(iv) [1, 2, 3, 4, 4, 5, 6, 7, 8, 9] (2 marks)

(5) (a). Black box testing-. To input data into information system and whether the output is accurate.
eg. Acceptance Testing
White box testing- To check internal coding system in the information system.
eg. Unit testing, Integrated Testing
(3 marks)
(b). Steps of SDLC
1. Problem definition
2. Feasibility study
3. System Analysis
4. System Design
5. Software Development
6. Testing
7. Implementation
8. Maintenance (4 marks )
(c).
Waterfall model Spiral model

All requirements are identified at the beginning of As system developments steps are repeated new
system development. requirements can be adopted when necessary.
As it consuming more time, the requirements may
change when time of deployment.
It is more suitable for risk prone compute systems

(4 marks )

7
(d) – Distinguish the system from the external environment.
- Display data flow within the system. (2 marks)
(e). – The old system is helpful to identify the accuracy of new system.
- The old system could be used If new system has faults. (2 marks)

(6)
(a). E-Business – Entire process of business organization covers using digital technology.
E-commerce- Selling goods using digital technology and receiving income through the internet.
(2 marks)
(b). Pure Brick – Traditional business which not use digital technology.
Brick-click – Business that use traditional and e-business methodologies both.
Pure-click –Business that uses purely digital technology
(1 marks x 3 = 3)
(c). Advantages of G2C-
- Efficient service for the public.
- Ability to receive the service without going out of house.
- more secure.
- no need of brokers.
- In the government point of view easy for data management of recipients of citizen services.
Disadvantages of G2C -
- Accessibility of general public to internet
- Difficult to ensure identification.
(0.5 marks x4 = 2)

(d). - To get mental satisfaction by responding human feeling.


- Entertainment.
- Controls in risky situations by understanding human reactions.
Ex: provide responses for drowsiness while driving.
-Ability to use in crime investigating.
(4 marks)
(e). Von Neumann –All data is represented with bites of 1 and 0
Quantum –A large quantity of data can be displayed using qubit in multi dimensional way
(2 marks)
Data processing speed is higher than the traditional computers.
Suitable for large scale data processing.
Can be used for large data base management such as modeling and cryptographic .
(2 marks)

You might also like