2019 AL ICT Past Paper English Medium
2019 AL ICT Past Paper English Medium
i
I
I
I
Department of Examinations - Sri Lanka Co.nfidential
t
I
Al-t20tyz0tB-r (NEW
fu A W etffi / 1yt1pu ugituqf;atoulot_,Ue,t /AU Re.servedl
t
Instructions:
*, Answer all the questions.
;li lUrite ,*our lndex Number in the space provided in the answer sheet.
'* Instructions are also given on tlrc hack ol the answer sheet. Folktv,them carefitlly.
it, In each of rhe questions L to 5A, pick one of lhe obernatives Jrom (l), (2), (3), (4), (5)
which is correct or most appropriate and mark lo.rr response on the atuswer sheet with
a cross (x) in accordance with the instructions given on the back of the answer sheet.
* Use of cttlculators is not allowed.
1. Which of the following is a hardrvare devicc that maps virtual ad.dresses to plq,-sical addresses?
(l) bus (2) cache nrernory (3) control unit
(4) memory management unit (5) registcr
2. Which of the following represents the bitwise AND opcration of the two binary numbers 0l0l0l0l
and 101010'10?
(1) 00000000 (2) 0000llll (3) ll00ll00 (4)-il110000 (5) rilililr
3. Use of public key and privatc kcy in encrr-ptiott and decryplrol, proccsses is called
(l) asymmetric encryption. (2) digital encryption. (3) hybrid encryption
(4) private key encryption. (-5) symmetric encryption.
4. In a particular netrvork, each n<xle is connected directly to a central network devicc. This topology is
referred to as a
(l) bus. (2) hybrid. (3) rnesh. (4) ring. (.5) star.
-) __)
lSee page two .W:
ryK '
#?i:it::iri'
Depaftment of Examinations - Sri Lanka Confidential
AU20t9tz0tB-l
7. A software development company identifies that their new system development projcct has complex
requirements and has a rnedium to high risk level. Further, an evaluation is needed to clear the
requirements and significant changes are expected during system development.
What is the most suitablc software development process model for this projea?
(l) agile (2) prototyping
(3) rapid application dcvelopment (4) spiral .i!
(5) waterfall u
8. Which of the following macle a significant contribution to the growth of Infornntim ad Commrric{rr
'Icchnology (lCT) usagc?
A - exponential progress of the semiconductor technology paving the way fu low cmt hadrrae
B - introduction of user-friendly softrvare and interfaces to compulers
C - merge of computer and communication technologies to produce smart and mobile devices
(l) Aonly (2) B only (3) AandConly
(4)BandConly (5) AllA, B and C
9. Which of the following is the correct statcment to connect to "login.php" from an HTML form?
(l) <form action ="GEI" method ="/login.php">
(2) <form action ="/login.php" method ="GEl">
(3) <form submit ="GET" merhod="ilogin.php">
(4) <form submit='1'login.php" method="GET">
(5) dorm target"=/login.php" method="GET'l
10. Which of the following HIML code lines is correct to create a hyperlink to the words "Department
of Examinations" using the URL: http://wwrv.d<x.indcx.html?
(l) <a href="Department of Exanf nations"> http://www.doe.index.html </a>
(2) <a href="http://www.doe.inclex.htrnl'lDepartment of Eraminations </a>
(3) <a href="http://www.doe.index.html" alt="Department of Examinations"> ca>
(4) <a src="Depanrnent of Exanrinations"> htrp://rvrvrv.doc.index.html </a>
(5) <a src="http://rvww.doe.index.html">Department of Exami nations </a>
11. On his single processor computer, a user starts a spreadsheet application and creates a new
spreadshcet. To get sonrc information rcquircd for the spreadsheet he opens a large d.atabase using
his Databasc Management S-vstenr (DBMS). After completing his spreadsheet he saves it.
Which of the following operating systern features has/have bcing used by the above user?
A - context su,itching
B - file managemcnt
C - virtual memory
(l) A only (2) l) only (3) AandBonly
(4)AandConly (s) AllA,ll and C
12. A smart cnvironment can be created by having an interconnected network of hardware devices,
sensors, connectivity and required software, which is often referred to as the Internet oJ'fhings
(/o7). Which of the following statemenrs is correct about IoT?
(l) Evcry IoT devicc or item must be connected using UTP cables.
(2) lf any item of the IoT setup fails to opcrate the cntire IoT setup will be shutdown.
(3) IoT environments cannot be monitored and controlled remotely.
(4) Modern smart mobile phones cannot bc connected to an IoT setup.
(5) The lnternet connectivity is not essential for an IoT setup to function.
120- ICT (Marking Schem-EIlrLew syllabus/ c.Ct. (R/L) Examination - 2Otgfamendment?to bel ffi
W
E
r Which one is the correct SQL statement to implement thc above requirement?
(I ) Altcr tablc Student-Sport ctdd check (Age> 1A)',
F (2) Alter table Srudent-Sport add where (Age> 10);
(3) Alter tablc Student-Sport set check (Aga l0);
F
I (4) Update table Student-Sport adtl check (Age> 10);
I (5) tlpdate table Student-Sport add where (Age> l0);
I
*
l
r Scheme G.C.E. (AiL Examination - 2019/Amendments to be
t
i
t
Department of Examinations - Sri Lanka Confidential
ALr,Llngl zuttt-t
lft. Which of the follorving SQL commands is not availabte in the Data Manipulation tanguage (DML)? i
(l) CRE/\TE (2) DEI-ETII (3) INSERT (4) SELECT (s) UPDATE I
19. In the mernory hierarchy diagriun given. rvhich of the following represents @, @,,I @ and @ |
respectively?
a
,6\ I
@ I .{h
J Solid Sute Storage I
|* :+.i
(o
OpticalDisk r
@
(l) Magnetic Tape, Magnetic (l{ard) Disk, Il.andom Access Memory (RAM), Prooessor Registers
(2) ftocessor Registers. Magnctic (Hard) Disk, Random Access Memory (RAM), Magnetic Tape
(3) hocessor Registers, Random Access Memory (RAM), Magnetic (Hard) Disk, Magnetic Tape
(4) Processor Registem, Random Access Mernory (RAM), Magnctic Tape, Magnetic (Hard) Disk
(5) Random Access Memory GAM), Processor Rcgisters, Magnetic (Hard) Disk, Magnetic Tape
20. Which of the following represent"s the result of the binary arithmetic operation of 11001100 - 01010101?
(r) 00r1001r (2) 0ll00110 (3) 0lll0lll (4) I00ll00l (s) l0l0l0l0 "r*
21. Which of the following statcments is/are correct about tvo's complement?
A - Subtraction is canied out as addition.
B - Calculations are more efficient.
C - It is prrssiblc to represent negative numbcrs within the two's complement.
(l) A only (2) B only (3) AandBonly
(4) BandConly (s) AllA, B and C
22. Which of the following statements correctly describe/desci*s hacker.t'l
A - They are bored and loncly anti-social teenagers who attack computer syslems as a challenge
and sometimes for profit.
B - 'Ihey are I'l' skilled people who attack computer systems of individuals and busincsses as
a form of compctition.
C - They are organized crime groups that dcploy highly automated and sometimes highly
targeted attacks against computer sysrems of individuals and businesses for certain benefits.
(l) A only (2) B only (3) AandConly
(4) BandConly (5) AllA, B and C
23. Which is the most suitable fmML form element input type in which the user can enter his credit
card sccret number?
(l) textarea (2) type="6heckbox" (3) type="hidden"
(4) type="password" (5) typs="1sx1'
24. Consider the following statements regarding the Extended Entity Relationship (EER).model.
A - EER modcl includes all the concepts of the original ER model.
B - EER rnodel has additional concepts of specialization/generalization.
C - EER model includcs a new concept to model the weak entities.
Which cf the above statement/s is/are correct?
(l) A only (2) B only (3) Aand B only
(4) AandConly (5) All A, B and C
n
I
I
28. Which of the following is a valid example for a PHP variable name?
(l) @class_nanrc (2) &cluss-name (3) $class nlme
(4) $class-name (5) _classlanrc
29. What is the binary equivalent to decimal 54.25 ?
(l) 000il r.il1r (2) 00101010.01 (3) 00il0r r0.0r
(4) 001r r0l l.r (5) 00t I I I l0.l
30. Which of the follorving is a valid example for CSS cDss selectors?
(I ) .mycl ass{color: bl ue ;font-fami I y: seri f ; }
(2) #myclass{color:bl ue;fonrfamily: serif;}
(3) myclass{color:blue;font-family:serif;}
(4) myclass:{color: blue;fonrfamily:serif;}
(5) myclass;{colorblue;font-fami ly:serif;}
31. Which one of the following is false regarding the H'tML, form methods CET and POST?
(l) Both methods are used to transfer data from client side to thc server.
(2) GE-f method is more efficient than the K)ST method
(3) GET method is more suitable to send sensitivc data.
(4) POST method does not have a limit on size of data.
(5) POST requests cannot be bookmarked.
F
F
W
#ffi
Department of Examinations - Sri Lanka Confidential
ALl20t9t20tF.-l NEW
32. The diagram shorvs the variation of value of information rvith time for five events of a single mission
in the chronological order. lnformation about the entire mission especially about the occurrences of
each event is made available on-linc real time.
t
Value
(o' 0)
Time -+
Consider the following statemcnts related to the above mission:
A- Only' the events P, Q and R comply rvith the Golden Rule of Infonnation.
B- Event S has the highest demand and needs to be facilitated with the highest technical
resources.
C - The value of an event can be determined reasonably using the demand for the information
about the particular event.
''(-*
Which of the above statements related to this mission islare valid?
(l) A only (2) C only (3) AandBonly
(4)BandConly (5) All A, B and C
33. Consider the following statements related to nuttffe inspiretl contputing:
A - In rutture inspired contpuling natural phenomena/scenario are observcd and used to design and
develop computing models to solve complex problems.
B - Artificial Intelligence can use nature inspired contputing for improving its ability to
understand and solve computationally challenging problems.
C - Computing models and algorithms developed under nature inspired computing can only be
used in natural environments such as rain forests, occans and wild-lit'c sanctuarics.
\&hich of the above statemcnts islare inconrect?
(l) A only (2) B only (3) C only
(4)AandConly (-5) All A, B and C
ffi
ffitr
rr
i
37. Which of the follorving statements is/are correct about the above circuit?
I - It implements a full adder.
II - I'he logic function of S can be srated as s= AaB@ci,,.
III - 'I'he Iogic function of C,,u, can be stated as C,uu = AB + BC;, + ACur.
(l) I only (2) II only (3) I and II only
(4) II and III only (5) All I,II and IIl
38. Which of the following staremenrs is/are correct about the part of the circuit within the area
surrounded by the dotted line?
I - It implements a half adder.
il - It can be implemented using only AND and OR gates.
III - It can be implemented using only NAND gates.
(l) I only' (2) II only (3) Ill only
(4) I and III only (5) All t,II and III
39. Considcr the Karnaugh map shown below:
AB
Which of the follorving is the corrcct logic expression that coresponcls to the two marked segments
on the Karnaugh map?
(l) AE + 8e (2) Ae + AB (3) (A+e)(a+at
(4) (A + CXA + 8) (5) AC + AE
ll
Depaftment of Examinations - Sri Lanka Confidential
I
;11
1r
1;
.lt
ALlaulutaut$-l (Nt w *
$ll
i..*)
Consider the following flowchart to answer the questions 40 to 42:
.
.i
!t
t,
t:
,:
*r,{*
result=resultxn
is i<0?
40. Which of the following statements is/are correct about the algorithm expressed by the flowchart?
A - It takes 8 inputs.
B - It outpqts the product of the positive numbers in the input.
C - lf evcry input is zero, then the output will be zero.
(l) Aonly (2) B only (3) C only (a) A and B only (5) B and C only
41. If the following is fed as the input ro the algorirhm, whar will be the output?
32441-95-6-l
(1) -2s92O (2) -216 (3) r20 {4) 2t6 (s) 2se2o
df
42. WNch of the following futhon programs has/have the same functionality (i.e., the same output for &
,&
_tF
a given input) as the algorithm in the flowchart above? #l
.$
tion - 2019/Amendments to
I Department of Examinations - Sri Lanka Confidential
F
(1) 0 (2) s (3) Ss (4) 90 (5) 100
47. what will be rhe outpur of the following llthon code segment?
L - [1,-2,4,3,2,_7, I 1,2,8,_t I
x=0
for i in range(len(L)):
r/ (tlrl < 0):
continue
f &lil > r0):
break
i x=x+Llil
print(x)
I,
I
i
t
Department of Examinations - Sri Lanka Confidential
ALILULTtaVL-r 1l!&rr
48. What will be the result when the following Python it, executed?
"oO"
x=50 q
deJ funcQt):
*l
x=2 $
!=4 irtil
func(x) '$,
print(x)
(l) 50 (2) 2 (3) 4 (4) syntax enor (5) name error
$
:'tl
49. Which of the follorving is not an information stored in a Process Conaol Block (PCB) of the
operating system?
(1) free disk slots (free disk blocks that could be utilized by the process)
(2) memory management information for the process rus
(3) program counter (address of the next instruction to be executed for the process)
(4) process identification number (unique identifier for the process) #
(5) process skte (e.9., Blocked, Ready, ctc.)
il
50. Consider the following SQI- statement: il
Update school set contactJterson='Sripal W.' where school-fu1='M';
Which of the following is true when the above SQI- siaternent is executed?
(l) It adds an additional field with the name contactJrersor zurd adds value into that new field as
'Sripal W.' only in the records having school_[d = M
(2) It adds an additional value to the contact-lterson as 'Sripal W.' only in the records having {
school-id = M
(3) It changes the field name of coiltactJ)erson as 'Sripal W.' when selecting the records with
school_id =M
t
(4) It changes the value of contactlterson as'Sripal W.' only in the reords having school_id -- M
(5) It selecs all the records having schaol_id = 04 and contaciJzerson as 'Sripal W.' {
#
{
*W
s
#fr,
*'
d
ff
Y
4
Lf, ffi
*
$
t
s
{r
f
!
I
i
i
ffi i.i
i
l
:
i
Department of Examinations - Sri Lanka Confidential
(Nt w, 2-
^LtLVtylzulD-II
Part A - Structured Essay
Answer dt four questions on this paper itself. I3:,:''
in this
l.(a) (i) Draw the expected output of the following HTML code segment when rendered by alcotumn
web brorvser.
\
4ttml>
<body>
<l--Effects of Social Networking ->
<p>Social networking has <hr> <u>advantages4t> and disadvantages 4p>
4body>.
4html>
(ii) Draw the expected output of the following HTML code segment when rendered by
a web browser.
<html>
<body>
<table border="1'>
<c aptio n> S c hed u le </ c apt i o n>
<fr> <th>Time </ t h> <t h> Ev ent </t h> </ tr>
<tr> <td> 8 am</ td> <td> Drama<l td> </ tr>
<tr> <td>0 am</td> <td>News</ td> </tr>
I
<tr><td colspan =2> I-unch</td></tr>
</table>
</body>
</html>
I
I
I
I
I
120- ICT (Marking Scheme) New syllabus/ G.C.E. (A,/L) Examination - 2O19/Amendmen-ts to bel
[!!t rsg
Department of Examinations - Sri Lanka Confidential
lt.l,l aV lrl Lt t l:-tr (rtp rt.,
(b) (i) write two advantages of using external style sheets when creating a rveb page. Do not
write
(l) in this
column
(2)
(ii) Consider the following HTML elements require the styles as given in the table.
(c) The following PtlP code is intcnded to add data into 'name' and 'class' fields of the
table named'student'in the MYSQL database called'school-db'. tlser name and
password to login to 'school_db' are 'admin' and 'A!2t*' respoctively.
Complete the PHP code segment by filling the blanks.
<?php
$conn = new mysqli('loculhost', .............);
tf ( $utnn-> connect-error ) {
die("Corutection failed: " $conn->cctnnect_error);
]
$sql = u.................. irtto . (......... .........)
values ('Piynl',' I 2-B')" ;
i ($conn->query(..................) ==true) {
echo "New record crearcd. sw:cessJully";
) else {
echo "Error: " . $sql . "<br>" . $conn->error;
]
$conn->close( ):
?>
I)o not
2. (a) Match each of the given phrases (i) - (vi) rclating to commerce rvith the most suitable
writc
item from the list trclorv: in this
column
List = {advertising as o reverute model, credit-cards, Govenrmenl e-Tbndering service,
Govennnent to Citiun (G2C) service, group purchasing, harmfttl explosives,
online marketpluce, pq'ment gateway, perishable goods, sociol cunmerce,
suhscriptiotr es e reverute nuxlel, traditionel nrurketplace\
Phrases:
(i) a place whcrc buyers and scllers interact physically for exchanging goods and sen'iccs
for a pricc
(ii) these are usually prohibited to be sold or purchased through e-commercc systems
(iii) users pay a regular fee to have full access to a website of a business
(iv) a subset of e-commerce that involves using social mcdia to assist in thc online buying
and selling of products and scn,ices
(v) facilitates a paynlent tmnsaction by the transfer of information between the
application and the back-end financial servicc providers through secure means
(vi) the renewal of vehiclc rcvenue liccnce using the Online Vehicle Reven
I..icence Service offered by the relevant government office
Notq Write only the rnatching item against the phrase number.
(i)
(ii)
(iii)
(iv) -........
(v)
(vi) ..............:..
_
(b) Consider the follorving tlthon program:
.r=0
n = int (input O)
while (n > O):
iJ n>.u:
.f=rl
rt = ittt (irtput ( ))
prinr (.r)
(i) Writc the output of the program if the input is.1 6 3 2 ft -1.
(a) Consider the following Entity Relationship (ER) diagram which represents the informarion Do not
rvrite
about projects conducted by etaff attached to a software development company. in this
column
(i) The number of hours (NoOfHours) that each staff member works on each project is
recrordei'
Draw the attributc NoOftlours in the relevant position of the ER diagram with the
correct symbol and the label.
(ii) For each accepted project. a temporary location is rented for the staff, for the duration
of the projcct. For each hcation, the OwnerName, PhoneNo, Address, Rent, RentedDate
and RentcdPeriod zrc rccorded. One project has only one location. A rented location is
used for only one project. When a certain project is completed, the location rented for
the project will be released and handed over to the owner.
Draw the Entity 'l,ocation' with rclcvait attributes inside tlre area X in the diagram and
link it to the existing ER diagranr by indicating tht cardinaliry.
(b7 Write dorvn the most appropriate ternt from thc given list to lill the blank in each
statement given belorv.
List = {ALOIIA. Application krv*er. CIDR, DHCP. Domain Name System, Network l-ayer,
Pqc'ket Switching, l\tri4' Bit, Parit-t Bvte, Pro.w Server\
(i) ..... ........ provides IP addresses for the given I-JRLs and web
addresses.
(ii) File Transf'er Protocol (F]'P), Simple Mail Transfer Protocol (SMTP) and the Tclnet
service are implemented in the ...
(iii) With rhe ...... a device may ger a different lp address every
tinre it connects to thc network.
F
I
""m
ffi
F W,
i
Department of Examinations - Sri Lanka Confidential
LLta0tgtz0a.rr (NEW)
4. (a) An operating system uses Process Control Bloclc (PCBs) to maintain important information lt"d
about each process. lyn*
linthts
Read the following scenario and answer the given questions: lcolumn
Rani starts a computational application on a single processor computel While the relevant
computations ore in progress, she starts a web browser application as well, in order to
search Jor some informotion.
Write down rhe content rhat will be stored in the following PCB fields of the computing
process when the "computing process -+ web browser process" context switch is made.
(i) Program counter
(iv) In addition to the normal data items, write down one other information that will
exist in a file block in the linked file space allocation scheme.
r
ICT (Markinq Scheme) New svllabus/ q.C:E. (A"/L) Examination - 2O19/Amendments to bel
Department of Examinations - Sri Lanka Confidential
i
Do not
(i) Assume this program rcquires accessing virtual address 8200. To which physiml ddress
write
will it get transformed to? in this
column
(ii) Wriie down one advantage that th€ use of page tables bring with resfrect to program
sizes compared to the size of physical memory.
(iii) Cive one rsason as to why a particular page of a prooess could be absent in physical
memory.
-x- *
Department..of Examinations - Sri Lanka Confidential
nLt aw t zt avt Lrrl \t!& t!,,
iW @ 6@ffi qffiA/1qgpli tryliqflatta4at utplAll Riglzts Reservedl
@ E6@wlq6w tnt-ggffLt-tblNew S
AdqO fi Go/E) es)o c!.o)b D oco)booodqFJ S gE6) Do)C o€c)ooooalqa,
,; i",i{ i. r,irtq ,'1' 1'u"r: rr r r ;xii,r,rui t1i*':r,rral'l r r ll-,ou.ir r6))dlii"r,6fi ii.
rA. Sri I .iirrIil Il pilii[li:It , Sri l.rrrka l)cprnnr:!n ('l I'{t,niil.itr'iBS.Sri Lanka
\ ocoroocgrteD 0 Oad) 8E)o oeo)06oCdea
,i.4i.,It i.r,iIi. lir;.:io"ti r;*d, ;j;r',r*ortl'r r rll *rioi, ;lioru*'
qO!6rD oocg oo6ro t:E (Cad eoe) Oocoo, 2019 i
is6b6flu Gur6$ byn51tt u$$q (e-uf Oilt: ufLalr, 201
General Certificatc of Blucation (Adv. I*vel) Examination,
oocJqdl or eorJ6oOqr: rrrnielG.s n
666u6i), Gpnr-furueb 6lgnglig1uuar5l,r:eit n
Information & Communication'[ II
Part B
,k Answer anv four questions onl):
l. 'I'he lloolean function known as the majorit,*
finuion takes n binary inputs and outputs I if a majority
(at least half,) ol' the inputs are l, otherwise it outputs 0. Let us consider the case when n=3, which
is the 3-input majority function. whose inputs are A, B and C and the output is Z.
(a) Cive the truth table for the 3-input majority function.
(b) Using Kamaugh maps, derive a simplified Boolean expression for the output Z in the 3-input
majority funcrion.
(c) Construct a logic circuit for the 3-input majority function using NAND gates only.
(b) Give one reason as to why a firlly connected (all-to-all) nctwork topology is not suitable for
this school computer network.
(c) The labadministrator who is responsible to sctup the school computer network has requested
for switches and a router.
Showing clearly thc nctwork connection topology and the devices, draw the network diagram
to represent the logical arrangement for the school computer network that the Lab administrator
can implement to fulfil the school requirements.
(d) Give one reason as to why TCP is preferred over UDP as the transpoft protocol for the school computer
network.
3. (a) ABC Books (Pvt.) t-td. specializes in buying and selling used secondhand books. At present
the business operations are fully manual Qture brick).
(i) ABC Books (Pvt.) Ltd. starts a wcbsitc and allows its customers to purchase books online.
What is the revenue model (mcthod of revcnue) applicable in this scenario?
(ii1 Moving {rom pure bricktype to brick and click business model , what is the lnost significant
challcnge unique to ABC's business? Explain your answer.
Hint - Compare with the online sales of new hnks
(iii) ABC Books (Pvt.) Ltd. has proposed to extend its website to an e-commerce rnarketplace for
used books.'fhis marketplace supports B2C, B2B and C2C business types and allows other
businesses to participate as well. F.xplain briefly betlveen whom the transactions in each of
the business types B2C, B2B and C2C will take place in the proposed marketplace.
(iv) Other than the revenue model you mentioned in (i) abovc, identify another suitable
revenue model to be followed hy the ABC tlooks (Pvt.) Ltd. in their proposed e-commerce
marketplace.
(v) Identify and rvrite dorvn a possible way to make paymcnts lvithin this e-commerce
marketplace.
(vi) Briefly explain how book publishing companies can use the proposed e-commerce marketplace
data for their businesses. \
(b) Multi-agent systems can bc uscful rvhen complex system interactions are implemented. The
follorving diagram shows a simplified version ol a multi-agent system that n:anages the secure
access to the server room of a data-center.
"q5
Cisl1l i
'1 i!
-=-
i.:l
o
Systems Engineer
liP
L,--,
@
All authoriz.ed system engineers must use their access code, which is a 6-digit number to enter
the restricted server room.
When the access is granted to the seryer room, a set of movable CCTV cameras starts recording
the server area.
The processed data of CCTV input are saved in the database. Interactions are shown using A,
B, C, P, Q, and R arrows.
(i) Identify the agcnt with no user interactions (self-autonomous) in this setup.
(ii) Sense-Compute-Control
'is a widely used 3-step design style of agent-based system
implementations.
From A, B and C interactions, separately identify and write dorvn the most suitable interaction
arrow to represent each step, i.e., Sense, Compute, and Control.
(iii) C and R interaction links are shown for two directions. Explain the reasons for the duplex
links for both C and R interactions separately.
(iv) Interaction A can be seen as a user-to-agenl interaction. ldcntify an agent-lo-ager, interaction
and explain the operational use of that interaction.
(v) Givc one reirson as to why the CCTV inputs are ,sent to. the database through the Agent 2
instead of sending directly.
4. (a)'Ihe ICT teacher in a school needs to process the nrarks obtained by all the students in a
class for the ICT subject and compute the average mark for the class. Construct a flow chart
to express an algorithm for this purpose. Assume ihat th€ first input is the number of students
in the class, n. Next, the marks of n studcnts will be input one-by-one.
(b) Consider the flow chart given belorv. Note that xVaZ represents (x mod 2).
/ Input n
a=0
Yes
>d
/ lnput x I
N<r
i1
2=O?
I
i
Lr*
a= a+ I
I
n- I
/ output a
fl
Stop
(i) What would be the output if the first input (n) was 6 and the next inputs were 3,6,4.
12, 11, g'-!
(ii) What is the purposc of this algorithm?
(iii) Develop a Python program to implement the algorithm expressed by the flow chart.
ffi
Department of Examinations - Sri Lanka Confidential
ALtmlgtz0tB II (NEIV)
5. A vehicle rental company has registered vchicte owners. Vehicles are obtained frorn the owners
and rented to the customcrs. Consider the follorving relations regarding the vehicle rental company.
L Custorner (Custorner_Nlc, Custonrcr_Name, City" Postat_Code)
ll. Vehicle_Owner (Orvner_ld, Orvner_Name, Contact_No)
II I. Vehicle(Vchicle_Reg_No, Descri ption, Ou,ner_ld)
. 'l'he C'ustomer relation c'ontains customer's national idcntity card number (NlC) which is unique.
namc, city where he/she is living and the postal codc of the city. A customer lives in a single
city and therc are many customers in one city. The postal code depends on the city.
. The Vehicle-Owner relation contains the Owner-ld which is unique. owner's name and'the
contact number.
. The Vehicle relation contains the vehicle registration number rvhich is unique, a description
about the vehicle and thc Owner_ld.
Acustomer can rent more than onc vehicle. Also, it is possible to rent one vehicle to many
at different instanccs. Each vehicle is owned by one owner and one owner can have
cl.tstomers
more than one vehicle.
(a) ln which normql form do the above relations given in I, II, lll above exist? Justify your
answer.
(b) Convert the above relations to the next Nornwl F'orm fr<tm the current Nt>nnol Forn which
you have stated in 5(a). (Prcscnt lhe contents relevant to the labels @ to @ indicated in the
following table as your answer.)
rc) Draw an Entity Relationship (ER) diagram to depict. the above relations try identifying the
relationships, key attributes, other attributes and the cardinality.
(d) It is necessary for the company to keep the details of renting vehicles by customers. C-reate
a relation called "Rent", including lhe details Rcnt_Date, Srart_Time and End_'l'ime.
(e) Write an SQl, statcrnent to select Owner-ld and Vehicle_Reg_No of all the vchicles owned
by cach vchiclc owner.
l2u- tc I (Marktng Scheme) New svilabus/ G.c.t. (A41, hxamrnatton - 2U1g/Amendmehts to bel
lincludedl
Department of Examinations - Sri Lanka Confidential
Blood
Testing
System
)-updated Rece!pt-
fjigure I
ldentify the five missing tluta flov's from thc description given abovc and write them down.
( ii) Levcl I of the DFD for the above context diaq-am is shown in Figure 2. fl
i1
Process
Blood Test
Request
{
fl
Updated Receipl
Figure 2
ffi
i
!
(H) Since the Pa-st Pupils .Association has indicated its willingness to develop the system,
prel'erence will bc givcn to them.
From A to H. identify and rvrite down thc labels of two functional requirements and
two non -funct io rutl re<1ui rements respectively.
ff
tr
Examination - 20L
WWW.PastPapers.WIKI
r Past Papers Wiki - Most Extensive Wikipedia of Past Papers!