0% found this document useful (0 votes)
1K views22 pages

2019 AL ICT Past Paper English Medium

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views22 pages

2019 AL ICT Past Paper English Medium

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

I

i
I

I
I
Department of Examinations - Sri Lanka Co.nfidential
t
I
Al-t20tyz0tB-r (NEW
fu A W etffi / 1yt1pu ugituqf;atoulot_,Ue,t /AU Re.servedl
t

S- Goilr Do)G aie)6.ro0,{qe 6 ooe) e6ro cq,5)oococql


$+:r*r.i, iorrr. aii! tr$-\ !it .j> rflli iebf gd, tl:t . il *rt .;, 1it:r*.j,rrrtri
rs. {ri i.;ink:r l.icpana;ciit i . :t i I .r:lka I )c6,ar tI:( t!t r!: l'\.rlI nilti, {ri- \: i I iillk r
q cqrx66oo6Jqa € scD Ssre occ;6oq0dolE
,1.$r i,t,,rrrr 1i."r,.t,,i,l,ir r,ir .1.i.i, .r,.*r"rirri.tc:ri

qo::orrr oocg ccodrs og (Cad oog) Eocoo, 2.019 qoo#rg


66bollt 6ungl$ Fftrbyil u$$ry (e-u.rV Oilit ufLor, 2019 psoi$
General Certificate of Education (Adv. lrvel) Examination, August 2019

oolcd4dl eoc errJEe'8qze nrceicr<5i: e(a @,Qa3


Boouoi:, GlpnL-funL-ei: G]png!guluar!,"r-roil
@IBItr @feair@ ocwfrgg9iutrersLb
Two hours

Instructions:
*, Answer all the questions.
;li lUrite ,*our lndex Number in the space provided in the answer sheet.
'* Instructions are also given on tlrc hack ol the answer sheet. Folktv,them carefitlly.
it, In each of rhe questions L to 5A, pick one of lhe obernatives Jrom (l), (2), (3), (4), (5)
which is correct or most appropriate and mark lo.rr response on the atuswer sheet with
a cross (x) in accordance with the instructions given on the back of the answer sheet.
* Use of cttlculators is not allowed.

1. Which of the following is a hardrvare devicc that maps virtual ad.dresses to plq,-sical addresses?
(l) bus (2) cache nrernory (3) control unit
(4) memory management unit (5) registcr
2. Which of the following represents the bitwise AND opcration of the two binary numbers 0l0l0l0l
and 101010'10?
(1) 00000000 (2) 0000llll (3) ll00ll00 (4)-il110000 (5) rilililr
3. Use of public key and privatc kcy in encrr-ptiott and decryplrol, proccsses is called
(l) asymmetric encryption. (2) digital encryption. (3) hybrid encryption
(4) private key encryption. (-5) symmetric encryption.

4. In a particular netrvork, each n<xle is connected directly to a central network devicc. This topology is
referred to as a
(l) bus. (2) hybrid. (3) rnesh. (4) ring. (.5) star.

5. Consider the following activities related to c-commerce:


A - online purchase of a pair of shoes
B - online purchase of an e-book of your favourite novel
C - onlinc bcnking of a taxi to the airport from your horne
Which of the above activities represcntis the pure-click type business model?
(l) A only (2) B only (3) C only (4) A and C only (5) B and C only
6. Which o[ the following shows the corrcct order of soft*'ttre testing?
(l) acceptance testing ---l system testing -{ intcgration testing -J unit testing
integration testing
i
(2) unit testing -{ acceptance testing ---} system testing
(3) unit testing --) integration testing -}
acccptance testing system testing
I

(4) unit testing -)


integration testing -{ system testing ---)-)acceptance tcsting
I

-) i Utack-box iesting --+ system testing


(5) rvhite-box testing unit testing
i
I

-) __)
lSee page two .W:
ryK '
#?i:it::iri'
Depaftment of Examinations - Sri Lanka Confidential

AU20t9tz0tB-l

7. A software development company identifies that their new system development projcct has complex
requirements and has a rnedium to high risk level. Further, an evaluation is needed to clear the
requirements and significant changes are expected during system development.
What is the most suitablc software development process model for this projea?
(l) agile (2) prototyping
(3) rapid application dcvelopment (4) spiral .i!
(5) waterfall u

8. Which of the following macle a significant contribution to the growth of Infornntim ad Commrric{rr
'Icchnology (lCT) usagc?
A - exponential progress of the semiconductor technology paving the way fu low cmt hadrrae
B - introduction of user-friendly softrvare and interfaces to compulers
C - merge of computer and communication technologies to produce smart and mobile devices
(l) Aonly (2) B only (3) AandConly
(4)BandConly (5) AllA, B and C
9. Which of the following is the correct statcment to connect to "login.php" from an HTML form?
(l) <form action ="GEI" method ="/login.php">
(2) <form action ="/login.php" method ="GEl">
(3) <form submit ="GET" merhod="ilogin.php">
(4) <form submit='1'login.php" method="GET">
(5) dorm target"=/login.php" method="GET'l
10. Which of the following HIML code lines is correct to create a hyperlink to the words "Department
of Examinations" using the URL: http://wwrv.d<x.indcx.html?
(l) <a href="Department of Exanf nations"> http://www.doe.index.html </a>
(2) <a href="http://www.doe.inclex.htrnl'lDepartment of Eraminations </a>
(3) <a href="http://www.doe.index.html" alt="Department of Examinations"> ca>
(4) <a src="Depanrnent of Exanrinations"> htrp://rvrvrv.doc.index.html </a>
(5) <a src="http://rvww.doe.index.html">Department of Exami nations </a>

11. On his single processor computer, a user starts a spreadsheet application and creates a new
spreadshcet. To get sonrc information rcquircd for the spreadsheet he opens a large d.atabase using
his Databasc Management S-vstenr (DBMS). After completing his spreadsheet he saves it.
Which of the following operating systern features has/have bcing used by the above user?
A - context su,itching
B - file managemcnt
C - virtual memory
(l) A only (2) l) only (3) AandBonly
(4)AandConly (s) AllA,ll and C

12. A smart cnvironment can be created by having an interconnected network of hardware devices,
sensors, connectivity and required software, which is often referred to as the Internet oJ'fhings
(/o7). Which of the following statemenrs is correct about IoT?
(l) Evcry IoT devicc or item must be connected using UTP cables.
(2) lf any item of the IoT setup fails to opcrate the cntire IoT setup will be shutdown.
(3) IoT environments cannot be monitored and controlled remotely.
(4) Modern smart mobile phones cannot bc connected to an IoT setup.
(5) The lnternet connectivity is not essential for an IoT setup to function.

120- ICT (Marking Schem-EIlrLew syllabus/ c.Ct. (R/L) Examination - 2Otgfamendment?to bel ffi
W
E

Department of Exarninations - Sri Lanka Confidential


E

13. Which of the following indicates a non-functio,nal requirement?


A - A user shall be allowed .to upload an image to the system to be used as his/her profile
picture.
B - The correct invoice value should be calculated including applicable tax rates at the check-out.
C - The system must satisfy 99.9Vo availability of service.
(1) A only (2) B only (3) C only
(4)AandBonly (5) An A, B and C

14. Consider the process transition diagram in the figure:


If the transitions shown are as follows:
I - Process blocks for input/output
2 - Scheduler picks another process
3 - Scheduler picks this process
4 - InpuUoutput is completed
then what are the states indicated by the labels A, B and C respectively?
(l) A: Blocked B: Nerv C: Ready
(2) A: Nerv B: Ready C: Running
(3) A: Ready B: Running C: Blockcd
(4) A: Running B: Rlocked C: Ready
(5) A: Running B: New C: Blocked
. Consider the following database table to answer the questions 15 to 17'
Student Sport
Student_Id Event_Id Event Name
10012 s-02 Carrom
t0022 s-01 Basketball
10018 s-02 Carrom
10012 s-03 - Volleyball
10025 s-o4 Chess
r00r8 s-0r Basketball

15. In which normal form does the above table exist?


(1) BCNF (2) First normal form (3) Sec<xd normalform
(4) Third normal form (5) Zero nomral form
16. Consider the following statements regarding the above table:
A - It has a composite pnmary key.
B - Event_Narne attribute is fully dependent on the primary key of Student-Sport lable.
C - Event_ld is a candidate key.
Which of the above slatements is/are corrcct?
(1) A only (2) B only (3) AandBonly
(4) AandConly (5) All A, B and C
17. It is required to add a new field called Age lo thc Student-.Sport table and the values of the new
field must be greater than 10.

r Which one is the correct SQL statement to implement thc above requirement?
(I ) Altcr tablc Student-Sport ctdd check (Age> 1A)',
F (2) Alter table Srudent-Sport add where (Age> 10);
(3) Alter tablc Student-Sport set check (Aga l0);
F
I (4) Update table Student-Sport adtl check (Age> 10);
I (5) tlpdate table Student-Sport add where (Age> l0);
I
*
l
r Scheme G.C.E. (AiL Examination - 2019/Amendments to be
t
i
t
Department of Examinations - Sri Lanka Confidential
ALr,Llngl zuttt-t

lft. Which of the follorving SQL commands is not availabte in the Data Manipulation tanguage (DML)? i
(l) CRE/\TE (2) DEI-ETII (3) INSERT (4) SELECT (s) UPDATE I

19. In the mernory hierarchy diagriun given. rvhich of the following represents @, @,,I @ and @ |
respectively?
a
,6\ I

/--a cache Memory |

@ I .{h
J Solid Sute Storage I
|* :+.i

(o
OpticalDisk r
@

(l) Magnetic Tape, Magnetic (l{ard) Disk, Il.andom Access Memory (RAM), Prooessor Registers
(2) ftocessor Registers. Magnctic (Hard) Disk, Random Access Memory (RAM), Magnetic Tape
(3) hocessor Registers, Random Access Memory (RAM), Magnetic (Hard) Disk, Magnetic Tape
(4) Processor Registem, Random Access Mernory (RAM), Magnctic Tape, Magnetic (Hard) Disk
(5) Random Access Memory GAM), Processor Rcgisters, Magnetic (Hard) Disk, Magnetic Tape
20. Which of the following represent"s the result of the binary arithmetic operation of 11001100 - 01010101?
(r) 00r1001r (2) 0ll00110 (3) 0lll0lll (4) I00ll00l (s) l0l0l0l0 "r*

21. Which of the following statcments is/are correct about tvo's complement?
A - Subtraction is canied out as addition.
B - Calculations are more efficient.
C - It is prrssiblc to represent negative numbcrs within the two's complement.
(l) A only (2) B only (3) AandBonly
(4) BandConly (s) AllA, B and C
22. Which of the following statements correctly describe/desci*s hacker.t'l
A - They are bored and loncly anti-social teenagers who attack computer syslems as a challenge
and sometimes for profit.
B - 'Ihey are I'l' skilled people who attack computer systems of individuals and busincsses as
a form of compctition.
C - They are organized crime groups that dcploy highly automated and sometimes highly
targeted attacks against computer sysrems of individuals and businesses for certain benefits.
(l) A only (2) B only (3) AandConly
(4) BandConly (5) AllA, B and C
23. Which is the most suitable fmML form element input type in which the user can enter his credit
card sccret number?
(l) textarea (2) type="6heckbox" (3) type="hidden"
(4) type="password" (5) typs="1sx1'
24. Consider the following statements regarding the Extended Entity Relationship (EER).model.
A - EER modcl includes all the concepts of the original ER model.
B - EER rnodel has additional concepts of specialization/generalization.
C - EER model includcs a new concept to model the weak entities.
Which cf the above statement/s is/are correct?
(l) A only (2) B only (3) Aand B only
(4) AandConly (5) All A, B and C

A/L) Examination - 2019/Amendments

n
I
I

Department of Examinations - Sri Lanka Confidential


AI'/20t9t20n-t NEW) 5-

25. Which of the following are the properties of a signal?


(l) Amplitude, Clock time, Frequency and Wavelength
(2) Amplitude, Frequency, Phase and Time
(3) Amplitude, Frequency, Phase and Wavelength
(4) Amplitude, Frcquency, Time and Wavelength
(5) Amplitude, Impulse, Phase and Wavelength

26. Which of the following options contains only guided media?

r (l) Coaxial, Fiber optics and lnfrared


(2) Coaxial, Fiber optics and Microwave
(3) Coaxial, Fibcr optics and Twisted pair
(4) Coaxial, Infrared and Trvisted pair
(5) Fiber optics, Satellite communication and lwisted pair

27.The frequencv ntodulation technique is used to change only


(l) the amplitude and frequency.
(2) the amplitude, frequency and phase.
(3) the amplitude and phasc.
(4) the frequency.
(5) the frequency and phase.

28. Which of the following is a valid example for a PHP variable name?
(l) @class_nanrc (2) &cluss-name (3) $class nlme
(4) $class-name (5) _classlanrc
29. What is the binary equivalent to decimal 54.25 ?
(l) 000il r.il1r (2) 00101010.01 (3) 00il0r r0.0r
(4) 001r r0l l.r (5) 00t I I I l0.l
30. Which of the follorving is a valid example for CSS cDss selectors?
(I ) .mycl ass{color: bl ue ;font-fami I y: seri f ; }
(2) #myclass{color:bl ue;fonrfamily: serif;}
(3) myclass{color:blue;font-family:serif;}
(4) myclass:{color: blue;fonrfamily:serif;}
(5) myclass;{colorblue;font-fami ly:serif;}

31. Which one of the following is false regarding the H'tML, form methods CET and POST?
(l) Both methods are used to transfer data from client side to thc server.
(2) GE-f method is more efficient than the K)ST method
(3) GET method is more suitable to send sensitivc data.
(4) POST method does not have a limit on size of data.
(5) POST requests cannot be bookmarked.

F
F

W
#ffi
Department of Examinations - Sri Lanka Confidential
ALl20t9t20tF.-l NEW

32. The diagram shorvs the variation of value of information rvith time for five events of a single mission
in the chronological order. lnformation about the entire mission especially about the occurrences of
each event is made available on-linc real time.

t
Value

(o' 0)
Time -+
Consider the following statemcnts related to the above mission:
A- Only' the events P, Q and R comply rvith the Golden Rule of Infonnation.
B- Event S has the highest demand and needs to be facilitated with the highest technical
resources.
C - The value of an event can be determined reasonably using the demand for the information
about the particular event.
''(-*
Which of the above statements related to this mission islare valid?
(l) A only (2) C only (3) AandBonly
(4)BandConly (5) All A, B and C
33. Consider the following statements related to nuttffe inspiretl contputing:
A - In rutture inspired contpuling natural phenomena/scenario are observcd and used to design and
develop computing models to solve complex problems.
B - Artificial Intelligence can use nature inspired contputing for improving its ability to
understand and solve computationally challenging problems.
C - Computing models and algorithms developed under nature inspired computing can only be
used in natural environments such as rain forests, occans and wild-lit'c sanctuarics.
\&hich of the above statemcnts islare inconrect?
(l) A only (2) B only (3) C only
(4)AandConly (-5) All A, B and C

34. What is the correcl statement related to system deployment'l


(l) Direct deployment is the most cornplex and the slowest form of deployment.
(2) In pilot deploymcnt, all the users have the ability to use the system at the bcginning.
(3) In parallel deployment old and ncw systents are used at the same time.
(4) Phased deployment do nrx allorv users to develop skills required for new system gradually
(5) Phased deployment means the cntire system is used in one location.
35. Considcr thc follorving staremcnts:
A - A /raD connects only the nctrvorked computers but a .swilcli connects multiple devices.
B - A switr:h manages the ports and the VLAN sccurity settings.
C - tn data transmission, a liul.r uses bits while a switclt uscs fuames and packets.
D -'the data transmission speed in a hub is highcr than that in a switch.
\
Which of the above statements irre corect?
i

I (l) A, B and C onll' (2) A, B and D only (3) A, C and D onl_v

It t+l R, (l and D only (-5) All A, B. C and I)


\__._._
lzu- rL r trvrcil Krrg JLnc, \ce .pW ceven

ffi
ffitr
rr
i

Department of Examinations - Sri Lanka Confidential


av t rt Lwt L-l
^ur
r
I 36. Consider the following statements about thc proxy serv-er:
F A - It helps to hide the truo lP address.
I
B - It is used to restrict the access of the website in the network.
C - It uscs the cached data for the quick loading of regularly accessed websites.
D - lt helps to detect the locations of the visitors and load rveb pages as per their needs.
Which of the above statements are correct?
(1) A, B and C only (2) A, B and D only (3) A, C and D only
(4) B, C and D only (5) All A, B, C and D
. Consider the following logic circuit diagram to answer the questions 37 and 38;

37. Which of the follorving statements is/are correct about the above circuit?
I - It implements a full adder.
II - I'he logic function of S can be srated as s= AaB@ci,,.
III - 'I'he Iogic function of C,,u, can be stated as C,uu = AB + BC;, + ACur.
(l) I only (2) II only (3) I and II only
(4) II and III only (5) All I,II and IIl
38. Which of the following staremenrs is/are correct about the part of the circuit within the area
surrounded by the dotted line?
I - It implements a half adder.
il - It can be implemented using only AND and OR gates.
III - It can be implemented using only NAND gates.
(l) I only' (2) II only (3) Ill only
(4) I and III only (5) All t,II and III
39. Considcr the Karnaugh map shown below:
AB

Which of the follorving is the corrcct logic expression that coresponcls to the two marked segments
on the Karnaugh map?
(l) AE + 8e (2) Ae + AB (3) (A+e)(a+at
(4) (A + CXA + 8) (5) AC + AE

New svllabus/ G.C.E. Examination - 201


ffi
*
s
!i
B

ll
Depaftment of Examinations - Sri Lanka Confidential
I
;11

1r
1;
.lt
ALlaulutaut$-l (Nt w *
$ll
i..*)
Consider the following flowchart to answer the questions 40 to 42:
.

.i
!t
t,

t:

,:

*r,{*

result=resultxn

is i<0?

40. Which of the following statements is/are correct about the algorithm expressed by the flowchart?
A - It takes 8 inputs.
B - It outpqts the product of the positive numbers in the input.
C - lf evcry input is zero, then the output will be zero.
(l) Aonly (2) B only (3) C only (a) A and B only (5) B and C only
41. If the following is fed as the input ro the algorirhm, whar will be the output?
32441-95-6-l
(1) -2s92O (2) -216 (3) r20 {4) 2t6 (s) 2se2o
df
42. WNch of the following futhon programs has/have the same functionality (i.e., the same output for &
,&
_tF
a given input) as the algorithm in the flowchart above? #l
.$

A- i=8 B- result= I C- result= I :


;
result =I
(i> 0):
for i in range(8): i*-8 x +l
while n = int(inpur0) while 1: -il
n = int(input0) if (n > 0): n = int(inpor0) t'S ;'

if (n > 0): restrlt=result*n if (not(n <= O)): .i


result=result*n print (result) result=result*n lll

i = i-l i=i-l ?',


print (result) if (i <= 0):
break 1?
print (result) f
;*
(l) A only (2) B only (3) C only (4) A and B only (5) All A, B and C

[See page nine


I

tion - 2019/Amendments to
I Department of Examinations - Sri Lanka Confidential

43. Which of the following statements is correct?


(l) e high level language program that is translated into machine code and executed on computer
X will not execute on anothcr computer having the same processor as x.
(2) A program in a high-level language must be first converted into assembly tanguage code before
converting into machine ctxle.
(3) Interpreted programs run faster than compiled ones.
(4) Programs in some high-level languages are translated into a form called byte-code because
such byte-codes execute faster than machine codes obtained by usual compilations.
(5) Some modcrn processors execute programs in high-level languages without translating them
into machine code.
44. What is the value of the following pyhon expression?
(1A0ll3)Vc418
(1) 0 (2) O.tls (3) 3 (4) 8 (s) e
45. What will be the output if the following fothon code is executed with "abcabc" as the input?
result = I
s = irrputo
iJ (len(s) > 3):
result = 2
if (len(s) < 6):
result = 3
elif (len(s) > 6):
resuh =4
else:
result =5
print(re.rult)
(l) I (2) 2 (3) 3 (4) 4 (s) s
46. Whar will be the output of the following python code?-
x= 100
. for i in range(\.,S):
x=.r-t
print(x)

F
(1) 0 (2) s (3) Ss (4) 90 (5) 100

47. what will be rhe outpur of the following llthon code segment?
L - [1,-2,4,3,2,_7, I 1,2,8,_t I
x=0
for i in range(len(L)):
r/ (tlrl < 0):
continue
f &lil > r0):
break
i x=x+Llil
print(x)

I' (l) 0 (2) r (3) l0 (4) 2t (5) 3l


r

I,
I
i

t
Department of Examinations - Sri Lanka Confidential
ALILULTtaVL-r 1l!&rr

48. What will be the result when the following Python it, executed?
"oO"
x=50 q
deJ funcQt):
*l
x=2 $
!=4 irtil

func(x) '$,

print(x)
(l) 50 (2) 2 (3) 4 (4) syntax enor (5) name error
$
:'tl

49. Which of the follorving is not an information stored in a Process Conaol Block (PCB) of the
operating system?
(1) free disk slots (free disk blocks that could be utilized by the process)
(2) memory management information for the process rus
(3) program counter (address of the next instruction to be executed for the process)
(4) process identification number (unique identifier for the process) #
(5) process skte (e.9., Blocked, Ready, ctc.)
il
50. Consider the following SQI- statement: il
Update school set contactJterson='Sripal W.' where school-fu1='M';
Which of the following is true when the above SQI- siaternent is executed?
(l) It adds an additional field with the name contactJrersor zurd adds value into that new field as
'Sripal W.' only in the records having school_[d = M
(2) It adds an additional value to the contact-lterson as 'Sripal W.' only in the records having {
school-id = M
(3) It changes the field name of coiltactJ)erson as 'Sripal W.' when selecting the records with
school_id =M
t
(4) It changes the value of contactlterson as'Sripal W.' only in the reords having school_id -- M
(5) It selecs all the records having schaol_id = 04 and contaciJzerson as 'Sripal W.' {
#
{
*W
s
#fr,
*'

d
ff
Y

4
Lf, ffi

*
$

t
s

{r
f
!
I

i
i

ffi i.i
i
l
:

i
Department of Examinations - Sri Lanka Confidential
(Nt w, 2-
^LtLVtylzulD-II
Part A - Structured Essay
Answer dt four questions on this paper itself. I3:,:''
in this
l.(a) (i) Draw the expected output of the following HTML code segment when rendered by alcotumn
web brorvser.
\
4ttml>
<body>
<l--Effects of Social Networking ->
<p>Social networking has <hr> <u>advantages4t> and disadvantages 4p>
4body>.
4html>

(ii) Draw the expected output of the following HTML code segment when rendered by
a web browser.
<html>
<body>
<table border="1'>
<c aptio n> S c hed u le </ c apt i o n>
<fr> <th>Time </ t h> <t h> Ev ent </t h> </ tr>
<tr> <td> 8 am</ td> <td> Drama<l td> </ tr>
<tr> <td>0 am</td> <td>News</ td> </tr>
I
<tr><td colspan =2> I-unch</td></tr>
</table>
</body>
</html>
I
I
I
I
I

120- ICT (Marking Scheme) New syllabus/ G.C.E. (A,/L) Examination - 2O19/Amendmen-ts to bel
[!!t rsg
Department of Examinations - Sri Lanka Confidential
lt.l,l aV lrl Lt t l:-tr (rtp rt.,

(b) (i) write two advantages of using external style sheets when creating a rveb page. Do not
write
(l) in this
column
(2)

(ii) Consider the following HTML elements require the styles as given in the table.

Element Name Attribute Attribute Value


P color red
fttnt-family Calibri
text-aliRn justily
ht color red
font-familv Calibri
h2 color red
fonrJatnily Calibri
text-alipn iustifv
Write an c-\ternal style sheet in the most eflicient way to fulfil the above requirements
using only the CSS group selector concept.

(c) The following PtlP code is intcnded to add data into 'name' and 'class' fields of the
table named'student'in the MYSQL database called'school-db'. tlser name and
password to login to 'school_db' are 'admin' and 'A!2t*' respoctively.
Complete the PHP code segment by filling the blanks.

<?php
$conn = new mysqli('loculhost', .............);
tf ( $utnn-> connect-error ) {
die("Corutection failed: " $conn->cctnnect_error);
]
$sql = u.................. irtto . (......... .........)
values ('Piynl',' I 2-B')" ;

i ($conn->query(..................) ==true) {
echo "New record crearcd. sw:cessJully";
) else {
echo "Error: " . $sql . "<br>" . $conn->error;
]
$conn->close( ):
?>

fsee oase four


abus/ G.C.E. (A,/L) Examination -
ffi
$sffi
rtment of Examinations - Sri Lanka

I)o not
2. (a) Match each of the given phrases (i) - (vi) rclating to commerce rvith the most suitable
writc
item from the list trclorv: in this
column
List = {advertising as o reverute model, credit-cards, Govenrmenl e-Tbndering service,
Govennnent to Citiun (G2C) service, group purchasing, harmfttl explosives,
online marketpluce, pq'ment gateway, perishable goods, sociol cunmerce,
suhscriptiotr es e reverute nuxlel, traditionel nrurketplace\
Phrases:
(i) a place whcrc buyers and scllers interact physically for exchanging goods and sen'iccs
for a pricc
(ii) these are usually prohibited to be sold or purchased through e-commercc systems
(iii) users pay a regular fee to have full access to a website of a business
(iv) a subset of e-commerce that involves using social mcdia to assist in thc online buying
and selling of products and scn,ices
(v) facilitates a paynlent tmnsaction by the transfer of information between the
application and the back-end financial servicc providers through secure means
(vi) the renewal of vehiclc rcvenue liccnce using the Online Vehicle Reven
I..icence Service offered by the relevant government office
Notq Write only the rnatching item against the phrase number.
(i)
(ii)
(iii)
(iv) -........
(v)

(vi) ..............:..
_
(b) Consider the follorving tlthon program:
.r=0
n = int (input O)
while (n > O):
iJ n>.u:
.f=rl
rt = ittt (irtput ( ))
prinr (.r)
(i) Writc the output of the program if the input is.1 6 3 2 ft -1.

(ii) What is the purposc of this progranr'l


Departmeht of Examinations - Sri Lanka Confidentia!
du, av r rt -vl tr-tr tt trr tv,

(a) Consider the following Entity Relationship (ER) diagram which represents the informarion Do not
rvrite
about projects conducted by etaff attached to a software development company. in this
column

(i) The number of hours (NoOfHours) that each staff member works on each project is
recrordei'
Draw the attributc NoOftlours in the relevant position of the ER diagram with the
correct symbol and the label.
(ii) For each accepted project. a temporary location is rented for the staff, for the duration
of the projcct. For each hcation, the OwnerName, PhoneNo, Address, Rent, RentedDate
and RentcdPeriod zrc rccorded. One project has only one location. A rented location is
used for only one project. When a certain project is completed, the location rented for
the project will be released and handed over to the owner.
Draw the Entity 'l,ocation' with rclcvait attributes inside tlre area X in the diagram and
link it to the existing ER diagranr by indicating tht cardinaliry.
(b7 Write dorvn the most appropriate ternt from thc given list to lill the blank in each
statement given belorv.
List = {ALOIIA. Application krv*er. CIDR, DHCP. Domain Name System, Network l-ayer,
Pqc'ket Switching, l\tri4' Bit, Parit-t Bvte, Pro.w Server\

(i) ..... ........ provides IP addresses for the given I-JRLs and web
addresses.

(ii) File Transf'er Protocol (F]'P), Simple Mail Transfer Protocol (SMTP) and the Tclnet
service are implemented in the ...
(iii) With rhe ...... a device may ger a different lp address every
tinre it connects to thc network.

(iv) ... helps to effectively manage the available IP address


space.

(v) In data transrnission, for the process of error detection, a ......


is added to a binary string to ensurc that the total number of l-bits in the string is
either even or odd.

F
I
""m
ffi
F W,
i
Department of Examinations - Sri Lanka Confidential
LLta0tgtz0a.rr (NEW)

4. (a) An operating system uses Process Control Bloclc (PCBs) to maintain important information lt"d
about each process. lyn*
linthts
Read the following scenario and answer the given questions: lcolumn
Rani starts a computational application on a single processor computel While the relevant
computations ore in progress, she starts a web browser application as well, in order to
search Jor some informotion.
Write down rhe content rhat will be stored in the following PCB fields of the computing
process when the "computing process -+ web browser process" context switch is made.
(i) Program counter

(ii) Process state (Ready, Running or Blocked?)

(b) (i) What is meant by contiguous file space alktcation?

(ii) Write down one drawback of contiguous file space alktcation.

(iii) However, contiguous allocation is fehsible to store a set of files on a CD ROM.


why?

(iv) In addition to the normal data items, write down one other information that will
exist in a file block in the linked file space allocation scheme.

(c) Assume that a 32 KB program is run on a computer having 32 KB of physical memory.


The page size of the system is 4 KB. The page table of this process at a particular
time is shown on the table below.
Page Frame Present /
Notes: numtrer number absent
. Only a few selected fields of each page table 0 lt0
entry is shown.
001
. The frame nurnber is indicated in binary.
I

c The virtual addresses on page 0 are from 0 to I 010


4095 and on page I arc from 4O96 to 8l9l 3 r00
and so on. 4 0il
. 'lhe Preseiltlabsent bit indicates the validity of 000 0
the entry. If this bit is l, the entry is valid and
5
1
' can be used. If it is 0, then the relevant virtual 6 000 0

page is not in PhYsical memory. 7 l0l I

fsee page seven


120-

r
ICT (Markinq Scheme) New svllabus/ q.C:E. (A"/L) Examination - 2O19/Amendments to bel
Department of Examinations - Sri Lanka Confidential

i
Do not
(i) Assume this program rcquires accessing virtual address 8200. To which physiml ddress
write
will it get transformed to? in this
column

(ii) Wriie down one advantage that th€ use of page tables bring with resfrect to program
sizes compared to the size of physical memory.

(iii) Cive one rsason as to why a particular page of a prooess could be absent in physical
memory.

-x- *
Department..of Examinations - Sri Lanka Confidential
nLt aw t zt avt Lrrl \t!& t!,,
iW @ 6@ffi qffiA/1qgpli tryliqflatta4at utplAll Riglzts Reservedl

@ E6@wlq6w tnt-ggffLt-tblNew S
AdqO fi Go/E) es)o c!.o)b D oco)booodqFJ S gE6) Do)C o€c)ooooalqa,
,; i",i{ i. r,irtq ,'1' 1'u"r: rr r r ;xii,r,rui t1i*':r,rral'l r r ll-,ou.ir r6))dlii"r,6fi ii.
rA. Sri I .iirrIil Il pilii[li:It , Sri l.rrrka l)cprnnr:!n ('l I'{t,niil.itr'iBS.Sri Lanka
\ ocoroocgrteD 0 Oad) 8E)o oeo)06oCdea
,i.4i.,It i.r,iIi. lir;.:io"ti r;*d, ;j;r',r*ortl'r r rll *rioi, ;lioru*'
qO!6rD oocg oo6ro t:E (Cad eoe) Oocoo, 2019 i
is6b6flu Gur6$ byn51tt u$$q (e-uf Oilt: ufLalr, 201
General Certificatc of Blucation (Adv. I*vel) Examination,
oocJqdl or eorJ6oOqr: rrrnielG.s n
666u6i), Gpnr-furueb 6lgnglig1uuar5l,r:eit n
Information & Communication'[ II
Part B
,k Answer anv four questions onl):
l. 'I'he lloolean function known as the majorit,*
finuion takes n binary inputs and outputs I if a majority
(at least half,) ol' the inputs are l, otherwise it outputs 0. Let us consider the case when n=3, which
is the 3-input majority function. whose inputs are A, B and C and the output is Z.
(a) Cive the truth table for the 3-input majority function.
(b) Using Kamaugh maps, derive a simplified Boolean expression for the output Z in the 3-input
majority funcrion.
(c) Construct a logic circuit for the 3-input majority function using NAND gates only.

2. Consicler the foilowing scenario:


A school has acquircd thc following rcsourccs to its Administrative (Admin), lttboratory (Inb) and
Lihrary (tiD) buildings:
Buildine Resources
Adnrin -5 computers, I printer
Lab 40 computers, I printer
Lib l0 computers, I printer

A schtxrl computer network has to be created to fulfil the following requirements:


' Each building needs to have its own local area nitwork (LAN) in onler to share the printer.
' The above three networks are also to be interconnected so that the School Information
System (SIS) which is running on one computer in the Adtnin building and the l-ibrary
Inf<rrmation System (LlS) running on one conlputer in the /,ib builcling are accessible from
all computers.
' All computers are to be given eflicient lnternet connectivity as well. For this purpose,
the schcxrl has subscribed to an Intemet Service hovider (lSP) who is to supply the
Intemet connectivity to the Inb building. The Inb building is separated from the other
two buildings by approximately -500m. One computer in the laD building is to be used as
thc DNS scrvcr. Another computcr in the l^ab building is to bc used as the proxy server.
.'l'he entire netrvork is to be protected through a firervall.
(a)'l"he Principal has received the 192.248.16.012411> address block for the school. The lP addresses
for the computers are to be allocated after making three subnets from this address block for
thc three buildings.
Assuming such subnetting is done. lvrite dorvn the relevant network address, subnet nrask and
the allocated range of lP addresscs for cach building using the following table format to present
your answcr:
Building Network Addnxs Sutrnet Mask IPAddress Range
Admin
I-ab
* Lib
"!r
;*;.
{l
* bus/ G.C.E. (A/L) Examination - 20
ll
I Iill
tt
,i
il
tl
L iu
Department of Examinations - Sri Lanka ConfidentiSl

(b) Give one reason as to why a firlly connected (all-to-all) nctwork topology is not suitable for
this school computer network.
(c) The labadministrator who is responsible to sctup the school computer network has requested
for switches and a router.
Showing clearly thc nctwork connection topology and the devices, draw the network diagram
to represent the logical arrangement for the school computer network that the Lab administrator
can implement to fulfil the school requirements.
(d) Give one reason as to why TCP is preferred over UDP as the transpoft protocol for the school computer
network.

3. (a) ABC Books (Pvt.) t-td. specializes in buying and selling used secondhand books. At present
the business operations are fully manual Qture brick).
(i) ABC Books (Pvt.) Ltd. starts a wcbsitc and allows its customers to purchase books online.
What is the revenue model (mcthod of revcnue) applicable in this scenario?
(ii1 Moving {rom pure bricktype to brick and click business model , what is the lnost significant
challcnge unique to ABC's business? Explain your answer.
Hint - Compare with the online sales of new hnks
(iii) ABC Books (Pvt.) Ltd. has proposed to extend its website to an e-commerce rnarketplace for
used books.'fhis marketplace supports B2C, B2B and C2C business types and allows other
businesses to participate as well. F.xplain briefly betlveen whom the transactions in each of
the business types B2C, B2B and C2C will take place in the proposed marketplace.
(iv) Other than the revenue model you mentioned in (i) abovc, identify another suitable
revenue model to be followed hy the ABC tlooks (Pvt.) Ltd. in their proposed e-commerce
marketplace.
(v) Identify and rvrite dorvn a possible way to make paymcnts lvithin this e-commerce
marketplace.
(vi) Briefly explain how book publishing companies can use the proposed e-commerce marketplace
data for their businesses. \
(b) Multi-agent systems can bc uscful rvhen complex system interactions are implemented. The
follorving diagram shows a simplified version ol a multi-agent system that n:anages the secure
access to the server room of a data-center.

"q5
Cisl1l i

'1 i!
-=-
i.:l
o

Systems Engineer
liP
L,--,

A brief scenario of the usage is as follorvs:


_ -i.

@
All authoriz.ed system engineers must use their access code, which is a 6-digit number to enter
the restricted server room.
When the access is granted to the seryer room, a set of movable CCTV cameras starts recording
the server area.
The processed data of CCTV input are saved in the database. Interactions are shown using A,
B, C, P, Q, and R arrows.

14v- 'v' t!i's"\"rv JL"Lr"L, rrLrr Jy"uuuJ, uiL.L, r|ar-l -^u,t""u!


m]!t lsrl
"T

rtment of Examinations - Confidential


tl,.Jl LV Lrl LVt D'll llt& tt,

(i) Identify the agcnt with no user interactions (self-autonomous) in this setup.
(ii) Sense-Compute-Control
'is a widely used 3-step design style of agent-based system
implementations.
From A, B and C interactions, separately identify and write dorvn the most suitable interaction
arrow to represent each step, i.e., Sense, Compute, and Control.
(iii) C and R interaction links are shown for two directions. Explain the reasons for the duplex
links for both C and R interactions separately.
(iv) Interaction A can be seen as a user-to-agenl interaction. ldcntify an agent-lo-ager, interaction
and explain the operational use of that interaction.
(v) Givc one reirson as to why the CCTV inputs are ,sent to. the database through the Agent 2
instead of sending directly.

4. (a)'Ihe ICT teacher in a school needs to process the nrarks obtained by all the students in a
class for the ICT subject and compute the average mark for the class. Construct a flow chart
to express an algorithm for this purpose. Assume ihat th€ first input is the number of students
in the class, n. Next, the marks of n studcnts will be input one-by-one.
(b) Consider the flow chart given belorv. Note that xVaZ represents (x mod 2).

/ Input n

a=0

Yes

>d
/ lnput x I

N<r
i1
2=O?
I
i
Lr*
a= a+ I
I
n- I

/ output a
fl
Stop

(i) What would be the output if the first input (n) was 6 and the next inputs were 3,6,4.
12, 11, g'-!
(ii) What is the purposc of this algorithm?
(iii) Develop a Python program to implement the algorithm expressed by the flow chart.

Isee page ele.ven

ffi
Department of Examinations - Sri Lanka Confidential

ALtmlgtz0tB II (NEIV)

5. A vehicle rental company has registered vchicte owners. Vehicles are obtained frorn the owners
and rented to the customcrs. Consider the follorving relations regarding the vehicle rental company.
L Custorner (Custorner_Nlc, Custonrcr_Name, City" Postat_Code)
ll. Vehicle_Owner (Orvner_ld, Orvner_Name, Contact_No)
II I. Vehicle(Vchicle_Reg_No, Descri ption, Ou,ner_ld)

. 'l'he C'ustomer relation c'ontains customer's national idcntity card number (NlC) which is unique.
namc, city where he/she is living and the postal codc of the city. A customer lives in a single
city and therc are many customers in one city. The postal code depends on the city.
. The Vehicle-Owner relation contains the Owner-ld which is unique. owner's name and'the
contact number.
. The Vehicle relation contains the vehicle registration number rvhich is unique, a description
about the vehicle and thc Owner_ld.
Acustomer can rent more than onc vehicle. Also, it is possible to rent one vehicle to many
at different instanccs. Each vehicle is owned by one owner and one owner can have
cl.tstomers
more than one vehicle.
(a) ln which normql form do the above relations given in I, II, lll above exist? Justify your
answer.

(b) Convert the above relations to the next Nornwl F'orm fr<tm the current Nt>nnol Forn which
you have stated in 5(a). (Prcscnt lhe contents relevant to the labels @ to @ indicated in the
following table as your answer.)

Relation No. Next Normal F'ornr Relation/s in Next Normal Forrn


I o o
II @ o
ill @ @

rc) Draw an Entity Relationship (ER) diagram to depict. the above relations try identifying the
relationships, key attributes, other attributes and the cardinality.

(d) It is necessary for the company to keep the details of renting vehicles by customers. C-reate
a relation called "Rent", including lhe details Rcnt_Date, Srart_Time and End_'l'ime.
(e) Write an SQl, statcrnent to select Owner-ld and Vehicle_Reg_No of all the vchicles owned
by cach vchiclc owner.

l2u- tc I (Marktng Scheme) New svilabus/ G.c.t. (A41, hxamrnatton - 2U1g/Amendmehts to bel
lincludedl
Department of Examinations - Sri Lanka Confidential

A blmd tcsting ccntrc has the loilorving activitics:


l-hc patient hands ovcr {.lre'test rcqucst slip to thcr rccciving c().!nter. Rcceivir:g countcr issucsj
an invoicc to {he patienl and sends il cop]'to the cashier. The patir:nt checks:15s lnvoicc,l
approves it and hands it over to the crshier rvith the pavment. Clashier issues a receipt to thcl
patient and also sends a copy of the rcccipt to the laboratory. Paticnt hencls ovcr rhe rccciixl
to the lahoratory. The laboratory verilies the paticnt and conducts thc blood tcst and rcturns
the updatcd rrccipt marked as 'done' to the paticnt. 'Ihe latroratory sends thc rcport to the
receiving counter. l.ater, the paticnt hands over the updated tcccipt to thc rcceiving coun'.er and
the rccciving countcr hands over the lcg:rt to the palierrt rvith the re-updaied rcceipt marked
as 'issucd'.
(i) 'I'he conte.rt dialyttnr lbr thc above lrctivitics, rvith missing data Jlows O, O, @, O ana
@, is given in Figure I hclorv.

Blood
Testing
System

)-updated Rece!pt-

fjigure I

ldentify the five missing tluta flov's from thc description given abovc and write them down.
( ii) Levcl I of the DFD for the above context diaq-am is shown in Figure 2. fl
i1

Process
Blood Test
Request

{
fl

Updated Receipl

Figure 2

(A) Wrire a suitable tenn to rcplace the latrl @ in Process 2.0.


(B) ldentity ancl write down the missing data flow labelled @.

ffi
i
!

Department of Examinations - Sri Lanka Confidential

(b) (i) What is requirenten! analvsisl


(ii) l,ist two advantages of requireinent analysis.
(iii) Give one method that can bc uscd to verify whether a functional requirement is satisficd
in a system.
(iv) The fbllowing list consists of sornc lunctional , non-functiornl and other requirements of a
proposed school library management systcm where users can borrolv and return books in
addition to other usual tasks.
(A) The system should authenticate users through username and password.
(B) The system should enable users to scarch for books based on the title, type, /SBN l/n.
or publi.rher name.
(C) The toial cost for the librury syst€m should be less than Rs. 500000.00.
(D) The system should bc available 99Vo of thc total time.
(F,) The system development should be completed within 9 months.
([') Book lending dctails should be prcscrved even if the system crashes during operation.
(G) 1'hc book database of the school library management system must be secured by
preventi ng unauthorized access.

(H) Since the Pa-st Pupils .Association has indicated its willingness to develop the system,
prel'erence will bc givcn to them.
From A to H. identify and rvrite down thc labels of two functional requirements and
two non -funct io rutl re<1ui rements respectively.

Kosala Rajapakse www.itpanthiya.com

ff

tr

Examination - 20L
WWW.PastPapers.WIKI
r Past Papers Wiki - Most Extensive Wikipedia of Past Papers!

You might also like