2012 AL ICT Model Paper Answers English at Apepanthiya - LK
2012 AL ICT Model Paper Answers English at Apepanthiya - LK
2012 AL ICT Model Paper Answers English at Apepanthiya - LK
A/L - 2012
Subject – Information and communication Technology
Question Answer Question Answer Question Answer Question Answer Question Answer
Number Number Number Number Number
01 2 11 4 21 3 31 2 41 1
02 3 12 4 22 5 32 5 42 2
03 5 13 2 23 5 33 3 43 4
04 2 14 2 24 1 34 1 44 1
05 2 15 4 25 4 35 5 45 3
06 1 16 3 26 4 36 3 46 5
07 5 17 4 27 3 37 3 47 4
08 3 18 2 28 1 38 4 48 4
09 2 19 3 29 2 39 2 49 5
10 3 20 5 30 1 40 2 50 4
Paper II - A
( 1 marks x 2 =2)
(c). -123.75 floating point single precision
(i) sign bit – 1
(ii) 1111011.112
(iii) 1.11101111 x 26
(iv) 6
(v) 11101111
(vi)
1 1 0 0 0 0 1 0 1 1 1 1 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
(2) (a).
Software Classification
Disk Defragmentation Utility program
Opera Application software
Mac Operating system
Screen Server Utility software
Joomla Application software
Mint Operating system
(0.5 marks x 6 =3)
1
(b). (i) Memory Allocation
In program execution digital output should be received and it should be connected to memory.
So there should be enough space in primary memory.
A program in memory for a long period of time is transformed to cash memory where there is
an urgent program to run. Again the previously transferred program comes to line after the
urgent program finished execution.
(1 marks x 2 =2)
(c). (i) Total no. of pages) = 28 = 256
(1 marks )
(ii) [01011101|0100111101]
Pages displacement
(1 marks) (1 marks)
(d).
Fat 32 NTFS
1 Maximum file size is limited File size is unlimited.
2 Length of the file name is limited. Length of the file name is unlimited.
3 No security Secured
4 Can not work with unicode Compatible with unicode
(1 marks x 2 =2)
(3)
(a). MN LN
FN
name TpNo
EmpN
o employee hour
DOB CourseID
age
follow Course
CourseName
(4 marks )
2
(b). The relation between employee and courses m:n
m n
employee follow course
m
n
employee do follow do course
(1 marks )
No of hours is not a attribute of course of employees. It depends on the relationship .Thus it’s a
descriptive attribute.
hours
(2 marks )
Secondary
storage memory 2
4 4 2 4
Remote
1
secondary 5 5 1 5
storage memory
Random Access
3 3 3 3 3
Memory
(0.2 marks X20=4.0)
3
(b). (i)
Dynamic random access memory (DRAM) Static random access memory (SRAM)
1. Frequent refreshing is necessary keep data 1. Frequent refreshing is not necessary
stored. 2. Speed is higher.
2. Speed is less. 3. Less data can be stored.
3. More data can be stored.
(1 marks X 2 = 2)
(1 marks x 3 = 3)
4
Part II - B
(b).
(0.5 marks)
To get bytes and remaining 78 (0.5 marks)
To show wastage in file space as 78 bytes (0.5marks )
1
(c). (i) Truth table
A B C D F(ABCD)
0 0 0 0 0
0 0 0 1 0
0 0 1 0 0
0 0 1 1 1
0 1 0 0 0
0 1 0 1 1
0 1 1 0 0
0 1 1 1 1
1 0 0 0 0
1 0 0 1 0
1 0 1 0 0
1 0 1 1 1
1 1 0 0 0
1 1 0 1 1
1 1 1 0 0
1 1 1 1 1
(0.25 marks x 16 = 4)
2
(ii)
(1 marks)
(iii)
(1.5 marks)
AB
A A
CD
C D
1 1
Or D
1 1 1 1
C
D
B C B
BD + CD
(iv) F = BD + CD
B
F
(2 marks)
3
(v)
(2 marks)
(2) (a).
FTP HTTP
FTP is a two-way system as files are transferred HTTP is a one-way system as files are
back and forth between servers and workstation. transferred only from the server to the
workstation browser.
FTP, where entire files are transferred from one HTTP only transfer the content of a web page in
device to another and copied into memory. to a browser for viewing.
FTP is a protocol used to upload files from a HTTP is a protocol used to transfer files from a
workstation to FTP server or download files from web server on to a browser in order to view a
a FTP server to workstation. web page that is on the internet.
(2 marks)
(b). A repeater
Is an electronic devices that receives a signal and retransmits it at a higher level and /or higher
power ,or on to the other side of an obstruction, so that the signal can cover longer distances.
(1.5 marks)
A bridge
Is a device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a
LAN by dividing it into two segments.
(1.5 marks )
4
(d).
(1 marks x 3 = 3)
(3) (a). CSS minimizes complex coding and repetitive coding.
CSS can be developed externally.
(2 marks )
(b). p{Color:red; font-family;arial; font size : 16pt} (2 marks)
(c).
(5 marks)
(d). <img src = “images/abc.jpg”> (3 marks)
(e). <a href =”admin.html”> contact administrator</a> (3 marks)
(4) (a).When the program is compiled it runs on any same type of interface. But if the program is
converted to a byte code, it can be interpreted line by line and execute itself on any interface. Then
Syntax errors can be avoided. The processing speed is also high.
(2 marks)
(2 marks )
5
(c).
A Sequence control structure Start
B selection control structure
C Repetition control structure d1=open('data.txt'
)
(1 marks)
A li=d1.readline()
info=li.split(',')
for c in info:
N
Y
x=0
while x<len(info)-1:
N
Y
If int(info[x])> int(info[x+1])
N
Y
s=int(info[x])
C
B info[x]=int(info[x+1])
info[x+1]=s
x+=1
print info
End
(3 marks)
6
(d) (i) Data in data.txt file is taken into variable info (2 marks )
In first line, file object called d1 is declared and open the data.txt file.
In second, redline()function is executed with in d1 file object and read the first line
of data.txt file and store it as string variable.
The value in li variable is separated where comma’s are located and processed as the
elements of the list variable called info.
(ii) Bubble sort (1 marks)
(iii) The elements in info list are arrange in ascending order and displayed.
Elements in the list are compared in pairs.
If the value of first element is higher than the second elements they interchange
their places and if not they remain the same way
Then the second and third elements are compared. Thus this program runs until the
one less than number of all elements.
(2 marks)
(iv) [1, 2, 3, 4, 4, 5, 6, 7, 8, 9] (2 marks)
(5) (a). Black box testing-. To input data into information system and whether the output is accurate.
eg. Acceptance Testing
White box testing- To check internal coding system in the information system.
eg. Unit testing, Integrated Testing
(3 marks)
(b). Steps of SDLC
1. Problem definition
2. Feasibility study
3. System Analysis
4. System Design
5. Software Development
6. Testing
7. Implementation
8. Maintenance (4 marks )
(c).
Waterfall model Spiral model
All requirements are identified at the beginning of As system developments steps are repeated new
system development. requirements can be adopted when necessary.
As it consuming more time, the requirements may
change when time of deployment.
It is more suitable for risk prone compute systems
(4 marks )
7
(d) – Distinguish the system from the external environment.
- Display data flow within the system. (2 marks)
(e). – The old system is helpful to identify the accuracy of new system.
- The old system could be used If new system has faults. (2 marks)
(6)
(a). E-Business – Entire process of business organization covers using digital technology.
E-commerce- Selling goods using digital technology and receiving income through the internet.
(2 marks)
(b). Pure Brick – Traditional business which not use digital technology.
Brick-click – Business that use traditional and e-business methodologies both.
Pure-click –Business that uses purely digital technology
(1 marks x 3 = 3)
(c). Advantages of G2C-
- Efficient service for the public.
- Ability to receive the service without going out of house.
- more secure.
- no need of brokers.
- In the government point of view easy for data management of recipients of citizen services.
Disadvantages of G2C -
- Accessibility of general public to internet
- Difficult to ensure identification.
(0.5 marks x4 = 2)