2new
2new
The memory in a computer can be divided into hierarchies based on the speed as well as use.
Which of the following is/are considered as volatile storage device/devices
1
(4) Consider the following statements about firmware
A). Program that’s needs to boot up the computer is firmware.
B). Firmware are using in air-condition machines.
C). After a period of time firmware can change simply. From the above which is/are
correct statement/s
1) A only 2). B only 3). A and B 4). A and C
5). A,B and C
(5) Conversion of the decimal 0.8125 into its binary number will be
1) 0.1001 2) 0.11101 3) 0.1101 4) 0.110011
5) 0.110110
(6). What is the 8 bit 2’s complement representation of 10110010
1) 01001101 2) 01001110 3) 10110010 4) 11000010
5) 178
(7). (67.5) 8 + (45.6) 8
1) 1 3 5 . 38 2) 13.538 3) 13.5316 4)112.38
5) 1100000.10112
(11). Consider the following combinatory circuit implemented using the universal gates
2
(12). Which of the following Karnanmap is correct about full adder?
1)
2)
3)
4)
5)
1) 0 2) AB 3) AB 4) AB+C
5) 1
3
(15). Consider the following statements regarding the usage of virtual memory
(17). Which of the following operating system is suitable for a traffic control System.
1) Real time
2) Multi Threading
3) Single user-Single tasking
4) Single user-Multi tasking
5) Multi user-Multi tasking
4
(19). Identify the diagrams which have fundamental error in the following Data Flow
Diagrams (DFD)
A)
B)
C)
D)
(20). Which of the following type of HTML tag is used to define an internal style sheet?
1) <script> 2) <link> 3) <class> 4) <style>
5) <id>
(21). What will be the output of following CSS code?
(22).Which of the following anchor elements can be used to open a link in a new tab or window?
1) <a href="url" target ="_blank">
2) <a href="url" new ="tab">
3) <a href="url" open ="tab">
4) <a href="url" target ="tab">
5) <a href="url" target ="_self">
5
(23). Consider the following table and find the correct html code?
(24). Each statement in column A has to be matched with the most appropriate one form column
Column A Column B
A Expert Systems 1 This studies cost and benefits to
evaluate.
B Acceptance Testing 2 this evaluates whether the developers
have ability to construct the proposed
system.
C Unit Testing 3 carried out by test teams independent
of the programmers and/or users who
developed the system, black box
techniques are used)
D Feasibility study 4 computer applications that use
artificial intelligence.
E Economic feasibility: 5 usually carried out by programmers,
white box techniques are used
1) A -4, B -3, C-5, D-2, E-1 2) A -1, B -3, C-5, D-2, E-4
2) A -5, B -3, C-4, D-2, E-1 4) A -2, B -3, C-5, D-4, E-1
5) A -3, B -4, C-5, D-2, E-1
(25). Select the most suitable answer by looking at the following two diagram
6
1) System A is natural and System B is artificial
2) System A is Artificial and system B is natural
3) System A is open an System B is close
4) System A is close an System B is Open
5) Both system are closed an artificial
(26). Which of the following are types of information systems that help employees create
and share documents that support day-to-day workplace activities.
(27). Digital signatures allow us to verify the author, date and time of signatures, authenticate
the message contents. In the digital signature which of the following is used to encrypt the
message.
1). Sender private key 2). Sender public key 3). Receiver private key
4). Receiver public key 5). Sender Private key and public key
(28). When devices send and receive data over a network, which of the following addresses
enable the unique identification of the device interface and the correct delivery of the data
to the receiver’s interface.
(29). The reduction of the signal energy as it travels through the given medium is called
1). Latency 2). Distortion 3). Attenuation 4). Bandwidth 5). Noise
(30). During data transmission, sometimes data bits may get flipped due to various reasons.
In such situations the data bit received is an error. To correct the errors, additional bits
are added to the data bits at the time of transmission. The additional bits are called
1). Error bits 2). Detection bits 3). Correction bits 4). Parity bits 5). Binary bits
(31). You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classfull
subnet mask would you use?
1) 255.255.255.192
2) 255.255.255.224
3) 255.255.255.240
4) 255.255.255.248
5) 255.255.255.255
7
(32). You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is
your class of address, subnet address, and broadcast address?
1) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
2) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
3) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
4) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
5) Class C, Subnet 172.16.0.0, Broadcast address 172.16.255.255
(35). Hirushan renews his revenue license online. He can do it anytime at home.What kind of
business is this?
1) B2B 2) B2C 3) G2C 4). G2B
5) G2E
(36). How to Delete records from studentinfo table with name of student 'Hirushan Perera?
8
(38). Consider the following Entity Relationship Diagram (ERD).
Which of the following is/are the most suited relation(s) if the above diagram is mapped
into a relational model?
(39) When would a software piracy occur from the following statements?
1) Hirushan buys a computer and also purchases Windows 7 operating system for his
computer.
2) Hirushan downloads an e-book about computing and shares it with his friends to
improve knowledge.
3) A class teacher asks students to buy “Adobe Photoshop” which is needed for their
studies.
4) Harshan makes copies of Microsoft Office package and he sells it to his friends for a
very cheap, reasonable amount.
5) A teacher gives away Ubuntu operating system for the students in the class to complete
an assignment.
(40). What is the output when you execute the following Python code?
1) CAREY
96 COLLEGE
2) 146 3) Syntax error
4) 50 COLOMBO 08.
5) Runtime error
General certificate of
Education (Adv.Level)
Examination 2024
INFORMATION &
9
(41). What is the output of the following Python statement? print(6+28%3//2**3*6 |3)
1) 7 2) 7.0 3) 2 4) 0 5) 5.0
(42). For any given input, outputs of which of the following Pseudo codes will be the same as
the output produced by the algorithm in the above flowchart?
A.
CAREY COLLEGE
COLOMBO 08.
General certificate of
Education (Adv.Level)
Examination 2024
INFORMATION &
COMMUNICATION
B. x=[34,7,12,17,21,4,51]
t=0
for i in range(len(x)): if
not(x[i]%2! =0):
t=t+x[i]
print(t)
Begin
C. n=1
REPE
AT
Print n
n=n+1
UNTIL
1) B 2) 3) 4) 5)
5 e 1 1 0 0
3 g 3 2 1 -1
1 5 3 2 -2
10
(44). What is the output of the following python code?
11
d={“hirushan”:40,”pramod”:45}
print(list(d.keys()))
i = 2Discount is:4000
1) 50% 2) 50% Discount is :400000
while True:
3) 10% Discount is :2000 4) 10% Discount is:4000
if i%3 == 0: break
5) Error
(49). Whichprint(I,end=” “) i include
of the following += 2 characteristics of a software Agent?
(50). Microcontrollers are used in automatically controlled product and devices. The heart of
the Arduino is a microcontroller originally intended for industrial automation systems.
Contents of an Arduino board can be.
P- Rest Button
Q- I/O unit for analog and digital
signals R-Modem
S- USB Jack
T- Wi-Fi Module
12