0% found this document useful (0 votes)
88 views21 pages

(EM) FWC ICT 2025 1st Term Paper With Scheme-1

The document contains a series of multiple-choice questions related to computer science and information technology, covering topics such as computer generations, operating systems, memory types, Boolean expressions, and data storage. It includes instructions for answering the questions and emphasizes the prohibition of calculators. The questions are structured to assess knowledge in various areas of ICT for a Grade 12 examination.

Uploaded by

nifrasahamed83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views21 pages

(EM) FWC ICT 2025 1st Term Paper With Scheme-1

The document contains a series of multiple-choice questions related to computer science and information technology, covering topics such as computer generations, operating systems, memory types, Boolean expressions, and data storage. It includes instructions for answering the questions and emphasizes the prohibition of calculators. The questions are structured to assess knowledge in various areas of ICT for a Grade 12 examination.

Uploaded by

nifrasahamed83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

-1-

AL/2026/20/E-I Copyrights reserved.

Instructions:
 Answer all questions
 Write down your index number on the space provided.
 In each of the questions 1 to 40, pick one of the alternatives (1),(2),(3),(4),(5) which is correct or most
appropriate. Mark a cross (X) on the number corresponding to your choice in the answer sheet provided.
 No use of calculators.
 Part - I

1. Which of the following major technology was used in second generation computers?
(1) Vacuum tube (2) Transistor (3) Microprocessor
(4) Integrated circuit (5) LSI

2. “Adding machine was developed by ………………………….”.


Which of the following is most appropriate to fill the blank in?
(1) John von Neumann (2) Ada Lovelace (3) Blaise Pascal
(4) Maurice Wilkes (5) Charles Babbage

3. Consider the following statements.


A - all operating systems are open source software
B - all perating systems are all system software
C - all pplication software are open source software
Which of the above is / are correct?
(1) A only (2) B only (3) A,B only (4) A,C only (5) B,C only

4. Which of the following is a good example of real-time processing?


(1) Sytem that repares payroll system
(2) System that prepares electricity utility bill
(3) Flight control system
(4) Telecommunication payment system
(5) System that prepares water utility bill

5. Which of the following is called the decoding component of the instructions brought into the central
processing unit?
(1) Program counter (2) Arithmetic logi unit (3) Control unit (CU)
(4) Register unit (5) Main memory
[see page no. 2
A/L ICT 2026 (Gr.12) – April FWC
-2-
AL/2026/20/E-I Copyrights reserved.

6. Which of the following does not influence the reduction of the digital divide gap?
(1) Development of communication infrastructure at village levels
(2) To develop awareness among the public about information communication technology
(3) Providing used computers to low income earners for learning purposes
(4) Providing opportunities for all students in schools to learn information communication technology
(5) Granting of loans to the general public by banks

7. In computer system, CMOS stands for.


(1) Computer Metal Oxide Semi-conductor
(2) Complementary Metal Off Semi-conductor
(3) Complementary Metal Oxide Semi-conductor
(4) Complementary Media Oxide Semi-conductor
(5) Computer Media Oxide System

8. F2B16 =
(1) 50538 (2) 74358 (3) 73458 (4) 74538 (5) 35478

9. Which of the following is the simplified form of Boolean expression 𝑥̅ (𝑥 + 𝑦) + (𝑥 + 𝑦)(𝑥 + 𝑦̅) ?
(1) 𝑥 (2) 𝑦̅ (3) 𝑥𝑦 (4) 𝑥 + 𝑦 (5) 𝑦

10. Which of the following is not a component of central processing unit?


(1) Arithmetic Logic Unit (ALU)
(2) Program Counter
(3) Control Unit (CU)
(4) L1 cache memory
(5) Main memory

11. “Units of capacity and speed of Random access memory (RAM) modules are frequently compared
respectively by …………………….. and ………………………..”.
Appropriate to fill the blanks in are respectively.
(1) Kilobytes, Gigabytes
(2) Gigabytes, megabits per second
(3) Gigabytes, megahertz
(4) Megahertz, Kilohertz
(5) Gigabits, megabits per second

12. “……………………. holds the address of the next instruction to be executed in the program”.
Which of the following is most suitable to fill the blank in?
(1) Arithmetic Logic Unit (ALU)
(2) Program Counter
(3) Control Unit (CU)
(4) L1 cache memory
(5) Main memory

[see page no. 3


A/L ICT 2026 (Gr.12) – April FWC
-3-
AL/2026/20/E-I Copyrights reserved.

13. Consider the following statements.


A - L1 cache memory contains more capacity than L2 cache memory
B - L1 cache memory has less speed than L2 cache memory
C - L1 cache memory has more speed than L2 cache memory
Which of the above is /are correct?
(1) A only (2) B only (3) C only (4) A,B only (5) A,C only

14. Which of the following is /are equivalent of BD16 ?


A - 2758
B - 101111012
C - 18910
(1) A only (2) B only (3) A,B only (4) A,C only (5) A,B,C all

15. Which of the following is not an application software?


(1) Graphics software
(2) Operating system software
(3) Word processing software
(4) Spreadsheet software
(5) Accounting software

16. Consider the following statements.


A - Creating data
B - Data management
C - Data processing
D - Removing obsolete data
Which of the above is / are the stage(s) of data life cycle?
(1) A only (2) A,B only (3) B,C only (4) A,B,C only (5) A,B,D only

17. Consider the folowing paragraph about computer memories.

Computer memory is broadly classified into primary and secondary memory .………… includes
Random Access Memory and Read-Only Memory .………… is volatile, meaning it loses its data when
the power is turned off, and is used for temporary storage while the computer is running .………… is
non-volatile and retains its contents even when the power is off. Secondary memory includes storage
devices like hard drives, solid-state drives, and optical disks, which provide long-term data storage.
Unlike primary memory, secondary memory is …………. and used for permanently storing data and
programs.

Which of the following is correct?


(1) - Primary memory,- Random Access Memory,- Read-Only Memory,- Volatile
(2) - Read-Only Memory,- Random Access Memory,- Primary memory,- Non-volatile
(3) - Primary memory,-; Read-Only Memory,- Random Access Memory,- Volatile
(4) - Primary memory,- Random Access Memory,- Read-Only Memory,- Non-volatile
(5) - Primary memory,-; Read-Only Memory,- Random Access Memory,- Non-volatile

[see page no. 4


A/L ICT 2026 (Gr.12) – April FWC
-4-
AL/2026/20/E-I Copyrights reserved.

18. Consider the following statements.


A - CRT display is a vacuum tube containing one or more electron guns, which emit electron beams that
are manipulated to display images on a phosphorescent screen.
B - LCD display is a flat-panel display that uses the light-modulating properties of liquid
crystals combined with polarizers.
C - LED display is a flat panel display that uses an array of light-emitting diodes as pixels for a video
display.
Which of the above is / are correct?
(1) A only (2) C only (3) A,B only (4) B,C only (5) A,B,C all;

19. CMOS battery on computer motherboard is.


(1) To provide power to computer needed
(2) To provide power to motherboard needed
(3) To provide power to computer power supply unit needed
(4) To stored settings of basic input output system (BIOS) program
(5) To provide power to hard disk needed

20. Time for study of students in a school is limited from 7.30 am to 1.30 pm weekdays. Which of the
following is the most appropriate data validation check for this purpose?
(1) Presence check
(2) Range check
(3) Length check
(4) Format check
(5) Type check

21. Consider the following statements.


A - Dynamic random access memory (DRAM) technology is used in random access memory (RAM)
B - Static random access memory (SRAM) technology is more expensive than dynamic random access
memory technology
C - Cache memory is built by using Static random access memory technology
Which of the above is /are correct?
(1) A only (2) B only (3) C only (4) A,B only (5) A,B,C all

22. Which of the following is incorrect statement about computer data storage?
(1) Secondary storage is a kind of non-volatile memory
(2) Secondary storage is not directly accessible by central processing unit (CPU)
(3) Main memory is directly accessible by central processing unit
(4) Random access memory (RAM) uses sequential data access method
(5) Main memory is considered as a secondary storage device

[see page no. 5


A/L ICT 2026 (Gr.12) – April FWC
-5-
AL/2026/20/E-I Copyrights reserved.

23. Consider the following statements.


A - It is not necessary to obtain legal permission from owners of proprietary software to use it
B - All open source software can be used by downloading free of charge always
C - When comparing with proprietary software, open source software provides more rights to the users
Which of the above is/are correct?
(1) A only (2) B only (3) C only (4) A,C only (5) B,C only

24. What is the simplified result of Boolean expression 𝐴𝐵𝐶 + 𝐴̅ + 𝐴𝐵̅𝐶?


(1) 𝐴̅ + 𝐶 (2) 𝐴𝐵 + 𝐶 (3) 𝐶̅ (𝐴𝐵̅ + 𝐵) (4) 𝐴𝐶̅ + 𝐵 (5) 𝐵 + 𝐴𝐶̅

25. Consider the following Karnaugh map.


C Which of the following is the Boolean expression given by
AB 0 1
the Karnaugh map?
1 1
00 (1) 𝐴𝐶 + 𝐴̅𝐵̅
01
0 0 (2) 𝐴𝐵 + 𝐵𝐶
(3) 𝐴𝐵 + 𝐴̅𝐵𝐶
11 1 0
(4) 𝐵𝐶 + 𝐴𝐵
10 1 1 (5) 𝐴𝐶̅ + 𝐵̅

26. Consider the following logic circuit.

What is the logical equivalent Q of the above logic circuit?


(1) AND (2) NAND (3) XOR (4) NOR (5) XNOR

27. Which of the following is equivalent to 19.37510 ?


(1) 10011.0112 (2) 11011.0112 (3) 10011.1012 (4) 10011.0012 (5) 11101.0112

28. What is the result of XOR operation of 101010102 and 110101112 ?


(1) 101111012 (2) 001111012 (3) 011111002 (4) 011001012 (5) 011111012

29. Consider the following Boolean results.


̅̅̅̅̅̅̅̅
P - (𝐴 + 𝐵) = 𝐴̅ + 𝐵̅ Q - (𝐴 + 𝐵)(𝐴 + 𝐶) = 𝐴 + 𝐵𝐶
R - 𝐴. (𝐵 + 𝐶) = 𝐴. 𝐵 + 𝐴. 𝐶 S - 𝐴 + 𝐴̅𝐵 = 𝐴 + 𝐵
Which of the above is / are correct?
(1) P only (2) Q only (3) P,R only (4) Q,R,S only (5) P,Q,R,S all

30. 25.7510 =
(1) 10101.102 (2) 11000.012 (3) 100000.102 (4) 11001.112 (5) 100000.012

[see page no. 6


A/L ICT 2026 (Gr.12) – April FWC
-6-
AL/2026/20/E-I Copyrights reserved.

31. Which of the following data storage device that uses laser technology for reading and writing data?
(1) Hard disk
(2) Floppy disk
(3) Compact disc
(4) Magnetic tape
(5) Solid-sate drive (SSD)

32. Which of the following is correct when the value of Boolean function 𝑓(𝑥, 𝑦, 𝑧) = 𝑥𝑦̅ + 𝑧𝑥̅ + 𝑦𝑧̅ is 0 ?
(1) 𝑥 = 1, 𝑦 = 1, 𝑧 = 0 (2) 𝑥 = 1, 𝑦 = 0, 𝑧 = 1 (3) 𝑥 = 1, 𝑦 = 1, 𝑧 = 1
(4) 𝑥 = 0, 𝑦 = 1, 𝑧 = 1 (5) 𝑥 = 0, 𝑦 = 1, 𝑧 = 0

33. What is the simplified Boolean expression represented by the following Karnaugh map?

(1) 𝐴̅ + 𝐵̅ + 𝐶̅
(2) 𝐴 + 𝐵 + 𝐶
(3) 𝐴𝐵𝐶
(4) 𝐴 + 𝐵̅𝐶
(5) 𝐴 + 𝐵𝐶

34. Register is a.
(1) Software and has the fastest data access
(2) Software and has the slowest data access
(3) Hardware and has the fastest data access
(4) Hardware and has the slowest data access
(5) Memory with slowest data access

35. Which of the following is not considered as the characteristics of big data?
(1) Volume
(2) Variety
(3) Visibility
(4) Variability
(5) Veracity

36. Consider the following logic circuit.

R
B

What is the output R of this logic circuit?


(1) 𝐴. 𝐵 (2) 𝐴 + 𝐵 (3) ̅̅̅̅̅
𝐴. 𝐵 (4) 𝐴. 𝐵̅ (5) 𝐴̅. 𝐵̅

[see page no. 7


A/L ICT 2026 (Gr.12) – April FWC
-7-
AL/2026/20/E-I Copyrights reserved.

37. Which of the following Boolean expression is represented by the following Karnaugh map?

(1) 𝐴̅𝐵 + 𝐶𝐷 (2) 𝐴𝐵 + 𝐶̅ 𝐷 (3) 𝐴𝐵̅𝐶𝐷 (4) 𝐴̅𝐵 + 𝐴𝐵̅𝐷 + 𝐶̅ (5) 𝐴𝐵̅ + 𝐶𝐷
̅

38. What is the simplified result of the Boolean expression 𝐴𝐵̅𝐶̅ + 𝐴̅𝐵̅𝐶 + 𝐵𝐶 + 𝐵𝐶̅ ?
(1) 𝐴𝐶̅ + 𝐴̅𝐶 + 𝐵
(2) 𝐵̅(𝐴𝐶̅ + 𝐴̅𝐶 ) + 𝐵
(3) 𝐶̅ (𝐴𝐵̅ + 𝐵) + 𝐶(𝐴̅𝐵̅ + 𝐵)
(4) 𝐴𝐶̅ + 𝐵
(5) 𝐵 + 𝐴𝐶̅ + 𝐴̅𝐶

39. Consider the following Karnaugh map.


C Which of the following Boolean expression is given by
AB 0 1
1 0 Karnaugh map?
00
(1) 𝐴𝐶 + 𝐴̅𝐵̅
0 1
01 (2) 𝐴𝐵 + 𝐵𝐶 + 𝐴̅𝐵̅𝐶̅
11 1 1 (3) 𝐴𝐵 + 𝐴̅𝐵𝐶
(4) 𝐵𝐶 + 𝐴𝐵 + 𝐴𝐶̅
10 0 0
(5) 𝐵𝐶̅ + 𝐴̅𝐶

40. Consider the following logic circuit.

Which of the following Boolean expression is equivalent to the output Q of the logic circuit given above?
(1) 𝐴̅𝐵 + 𝐴𝐵̅
(2) 𝐴𝐵 + 𝐴̅𝐵̅
(3) 𝐴𝐵 + 𝐴̅
(4) 𝐴 + 𝐵̅
(5) 𝐴 + 𝐵
**

A/L ICT 2026 (Gr.12) – April FWC [end.


-1-

AL/2026/20/E-II Copyrights reserved.


Do not
write in this
column

Part – II A
Answer all the questions
1.
(a)
(i) Give (+1910) in 2’s complement form with 8-bits. Show your calculations.
……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

(ii) Give (-1510) in 2’s complement form with 8-bits. Show your calculations.

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

(iii) Use 2’s complement form to calculate (1910 - 1510) with 8-bits. Show your calculations.

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

(b) What do you mean by golden rule of information?

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

[see page no. 2


A/L ICT 2026 First Term - NFWC ICT
-2-
AL/2026/20/E-II Copyrights reserved.

(c) Secondary storage devices use three kinds of data reading and writing technologies or media. Do not
write in
State each them and write down one example for each. this column

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

2.
(a) Give any three service models in cloud computing.

 …………………………………………………………………………………………………..

 …………………………………………………………………………………………………..

 …………………………………………………………………………………………………..

(b) Give the major technologies used in first four generations of computer.

 …………………………………………………………………………………………………..

 …………………………………………………………………………………………………..

 …………………………………………………………………………………………………..

 …………………………………………………………………………………………………..

(c) Write down three steps of data management.

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

(d) Consider the following Boolean expression.


̅ )(𝐴̅ + 𝐵̅ + 𝐶 + 𝐷
̅ )(𝐴 + 𝐵̅ + 𝐶 + 𝐷
(𝐴 + 𝐵 + 𝐶 + 𝐷 ̅ )(𝐴̅ + 𝐵 + 𝐶 + 𝐷
̅ )(𝐴 + 𝐵̅ + 𝐶̅ + 𝐷
̅ )(𝐴̅ + 𝐵̅ + 𝐶̅ + 𝐷
̅)
(i) Simplify the Boolean expression given by using Karnaugh map.

[see page no. 3


A/L ICT 2026 First Term - NFWC ICT
-3-
AL/2026/20/E-II Copyrights reserved.

Do not
write in
(ii) Draw the logic circuit for the simplified Boolean expression. this column

3.
(a) If each of the following statements is correct, indicate it as True, or otherwise, False.

(i) Frequently used instructions in computer are used in cache memory …………………………

(ii) Generally, the capacity of L2 cache memory is more than L1 cache memory …………………

(iii) Device driver executes or controls the specific device connected with computer ……………

(iv) Non-volatile memory is not lost data even when the power of computer is switched off
………………..

(b) Explain briefly the term “software piracy”.


……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

(c) Choose the suitable words from the list given below. Write down only the appropriate numbers
for the blanks.

(i) Memory that is lost data / instructions when power is switched off ……………..

(ii) Protection of personal information in computer data bank from abuse is called data privacy
……………..

(iii) It refers to the use of small and portable computing devices in wireless enabled networks
that provide wireless connections to a central main server ……………..

[see page no. 4


A/L ICT 2026 First Term - NFWC ICT
AL/2026/20/E-II Copyrights reserved. -4-
Do not
(iv) It is the attempt to acquire sensitive information such as usernames, passwords, and credit write in
this column
card details for malicious reasons, by masquerading as a trustworthy entity in an electronic
communication ……………..

(v) It is a work arrangement using of ICT tools in which employees do not commute to a central
place of work ……………..

[List:  - Central processing unit (CPU) ,  - Volatile memory,  - Non-volatile memory


 - Mobile computing,  - Telecommuting,  - Phishing>  - Data privacy]

(d) Categorize the following software each whether they are application software or system
software.

Lists:
[Google chrome, Ms-Windows, Mac OS X, Ubuntu Linux, Adobe Photoshop, GIMP]

Application software System software

(i)

(ii)

(iii)

4.
(a) Define the following terms briefly.

(i) Computer hardware

………………………………………………………………………………………………………

………………………………………………………………………………………………………

(ii) Computer software

………………………………………………………………………………………………………

………………………………………………………………………………………………………

(b) Briefly explain the difference between data and information with the help of examples available
in your school Library information system [ hint: definitions are not needed].

[see page no. 5

A/L ICT 2026 First Term - NFWC ICT


-5-
AL/2026/20/E-II Copyrights reserved.

 Data
Do not
write in
this column

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

 Information

……………………………………………………………………………………………………

……………………………………………………………………………………………………

……………………………………………………………………………………………………

(c) Write down the steps of fetch-execute cycle in computer instruction processing from the list
given below.

Start

Stop

 ………………………………………………………………………………………………….

 ………………………………………………………………………………………………….

 ………………………………………………………………………………………………….

 ………………………………………………………………………………………………….
[Lists: Executing instructions> decoding instructions> Fetching instructions> Increment of Program
Counter]

***
[see page no. 6
A/L ICT 2026 First Term - NFWC ICT
-6-
AL/2026/20/E-II Copyrights reserved.

Part – II B
Answer any two questions only

5.
(a) Consider the following Karnaugh map.

AB 00 01 11 10
C
0 1 0 0
0

1 1 0 1
1

(i) Obtain a simplified Boolean expression in the form of sum of products (SOP) using the
Karnaugh map. Show the loops clearly in the Karnaugh map.
(ii) Construct a logic circuit corresponding to the simplified Boolean expression using only
NAND gates.
(iii) Construct a truth table corresponding to the simplified Boolean expression.

(b) Consider the following logic circuit.

(i) Derive the output Q of the logic circuit given above.


(ii) Construct truth table for the simplified Boolean expression.
(iii) Which is the single logic gate equivalent to the output Q?

[see page no. 7

A/L ICT 2026 First Term - NFWC ICT


-7-
AL/2026/20/E-II Copyrights reserved.

6. Consider the following Boolean expression.

𝐴𝐵̅𝐶̅ + 𝐴𝐵𝐶̅ 𝐷
̅ + 𝐴̅𝐵̅𝐶̅ 𝐷 + 𝐴̅𝐵̅𝐶̅ 𝐷
̅

(a) Convert this Boolean expression to standard SOP (Sum of Products).

(b) State Karnaugh map to represent Boolean expression obtained in (b) above and simplify this
Boolean expression using this Karnaugh map.

(c) Draw a logic circuit for the Boolean expression simplified in (b) above using AND, OR, NOT
gates only.

7.

(a) Write down four components of computer system.

(b) Give any two functions of BIOS.

(c) Give two devices that are used to capture data automatically in digital form.

(d) Write down two advantages of 2’s complement method.

***

[end.
A/L ICT 2026 First Term - NFWC ICT
A GREAT

Easy To Use, GUI User Interface


Anywhere, Anytime

Personalized 24 Hours
Experience Service

@Alictlibrary
JOIN OUR WHATSAPP GROUP

VISIT OUR WEBSITE More Details


https://sites.google.com/view/Alictlibrary 0742663484
GCE A/L ICT Marking Scheme
2025 – April (1st Term Examination)
2026 (Gr.12) Batch

National Field Work Center (NFWC)


Thondaimanaru

ICT
A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 1
(1) 2 (11) 3 (21) 5 (31) 3
(2) 3 (12) 2 (22) 1 (32) 3
(3) 2 (13) 3 (23) 3 (33) 1
(4) 3 (14) 5 (24) 1 (34) 3
(5) 3 (15) 2 (25) 5 (35) 3
(6) 5 (16) 5 (26) 3 (36) 1
(7) 3 (17) 4 (27) 1 (37) ALL
(8) 4 (18) 5 (28) 5 (38) 1
(9) 4 (19) 4 (29) 4 (39) 2
(10) 5 (20) 2 (30) 4 (40) 1

Ques. Suggested answers Marks


No.
1.
(a)(i) 000100112 1 marks

(a)(ii) 111100012 1 marks

(a)(iii) 000100112 2 marks


111100012

000001002
Discard carry bit 1

(b) The value of information is high at the time of its generation. As time 3 marks
goes, the value of information reduces.

(c)  Magnetic storage technology – Hard disk, Floppy disk, Zip drive, Jaz
drive, Magnetic tape 3 marks
 Optical / Laser storage technology – CD, DVD, Blu-ray disc
 Solid-state / semi-conductor storage technology – SSD, Flash drive,
memory card

2.
(a) SaaS 3 marks
PaaS
IaaS
FaaS

A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 2


(b) Vacuum tube / Valve 2 marks
Transistor
IC – Integrated Circuit
Microprocessor / LSI / VLSI

(c) 1. Data creation 3 marks


2. Management of data
3. Removal of obsolete data

(d)(i) 1 marks

𝐶. (𝐵̅ + 𝐷
̅)

(d)(ii) 1 marks

3.
(a) (i) True, (ii) True, (iii) True, (iv) True 2 marks

(b) Software piracy is the illegal copying, distribution, or use of software 1 marks
without proper authorization or licensing from the owner or developer.

(c) (i) (2) – Volatile memory 5 marks


(ii) (7) – Data privacy
(iii) (4) – Mobile computing
(iv) (6) - Phishing
(v) (5) - Telecommuting

(d) 2 marks
Application software - Google chrome, Adobe Photoshop, GIMP
System software - Ms-Windows, Mac OS X, Ubuntu Linux

4.
(a)
(i) Hardware is a physical (tangible) components of a computer system. 2 marks

(ii) Software is a set of instructions to the computer system. 2 marks

(b)
3 marks
Any examples from Library system.

A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 3


Data: BookID, Book Title, Author, etc. Any
related
Information: Total n o. of books borrowed in a particular
example
day/month/year, etc. could be
accepted.

(c) 3 marks
 fetching instructions
 increment of program counter
 decoding instructions
 executing instructions

Part –II B Answers

Question Suggested Answers Marks


No.

(1) (a)(i) 𝐴̅𝐵 + 𝐵̅𝐶 2


marks

(1) (a)(ii)
2
marks

(1) (a)(iii) 𝑨 𝑩 𝑪 ̅
𝑨 ̅𝑩
𝑨 ̅
𝑩 ̅𝑪
𝑩 ̅𝑩 + 𝑩
𝑨 ̅𝑪
2
0 0 0 1 0 1 0 0 marks
0 0 1 1 0 1 1 1
0 1 0 1 1 0 0 1
0 1 1 1 1 0 0 1
1 0 0 0 0 1 0 0
1 0 1 0 0 1 1 1
1 1 0 0 0 0 0 0
1 1 1 0 0 0 0 0

A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 4


(1) (b)(i) 2
marks
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
(𝐴 + (𝐴 + 𝐵)) + ̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅̅̅̅̅̅ (𝐵 + ̅̅̅̅̅̅̅̅̅̅
(𝐴 + 𝐵))

̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
(𝐴 + (𝐴 + 𝐵)). ̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅̅̅̅̅̅ (𝐵 + (𝐴̅̅̅̅̅̅̅̅̅̅
+ 𝐵)).

̅̅̅̅̅̅̅̅̅
(𝐴 + (𝐴 ̅̅̅̅̅̅̅̅̅
+ 𝐵). (𝐵 + (𝐴 + 𝐵).

̅̅̅̅̅̅̅̅̅
𝐴𝐵 + 𝐴. (𝐴 ̅̅̅̅̅̅̅̅̅
+ 𝐵) + 𝐵. (𝐴 + 𝐵)(𝐴 ̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅
+ 𝐵). (𝐴 + 𝐵)

𝐴𝐵 + 𝐴. (𝐴̅. 𝐵̅) + 𝐵. (𝐴̅. 𝐵̅) + 𝐴̅. 𝐵̅

𝐴𝐵 + 𝐴̅. 𝐵̅ = 𝐴⨁𝐵
̅̅̅̅̅̅̅

(1) (b)(ii)
̅. 𝑩
̅ 1
A B 𝑨𝑩 + 𝑨
marks
0 0 1
0 1 0
1 0 0
1 0 1

(1) (b)(iii) 1
XNOR marks

(2)(a) 𝐴𝐵̅𝐶̅ + 𝐴𝐵𝐶̅ 𝐷 ̅ + 𝐴̅𝐵̅𝐶̅ 𝐷 + 𝐴̅𝐵̅𝐶̅ 𝐷


̅ 3
𝐴𝐵̅𝐶̅ (𝐷 + 𝐷̅ ) + 𝐴𝐵𝐶̅ 𝐷̅ + 𝐴̅𝐵̅𝐶̅ 𝐷 + 𝐴̅𝐵̅𝐶̅ 𝐷 ̅ marks
𝐴𝐵̅ 𝐶̅ 𝐷 + 𝐴𝐵̅𝐶̅ 𝐷
̅ + 𝐴𝐵𝐶̅ 𝐷 ̅ + 𝐴̅𝐵̅𝐶̅ 𝐷 + 𝐴̅𝐵̅𝐶̅ 𝐷
̅
(2)(b)
4
marks

𝐵̅𝐶̅ + 𝐴𝐶̅ 𝐷
̅
(2)(c)
3
B marks
C

D
A

A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 5


(3) (a)
 Software 4
marks
 Hardware
 Liveware
 Firmware

(3) (b)
2
 Loading basic device drivers
marks
 POST – Power On Self Test process
 Settings (date/time)

(3) (c)
Barcode reader, QR code reader, OCR, OMR, MICR, etc. 2
marks

(3) (d) 2
 Possible to represent negative number.
marks
 Subtractions are carried out as additions.
 A single representation is used to represent a zero.
 More efficient calculations.

Part – I 1 x 40 =40 marks


Part – II A 10 x 4 = 40 marks
Part – II B 10 x 2 = 20 marks
Total = 100 marks
****

A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 6

You might also like