(EM) FWC ICT 2025 1st Term Paper With Scheme-1
(EM) FWC ICT 2025 1st Term Paper With Scheme-1
Instructions:
Answer all questions
Write down your index number on the space provided.
In each of the questions 1 to 40, pick one of the alternatives (1),(2),(3),(4),(5) which is correct or most
appropriate. Mark a cross (X) on the number corresponding to your choice in the answer sheet provided.
No use of calculators.
Part - I
1. Which of the following major technology was used in second generation computers?
(1) Vacuum tube (2) Transistor (3) Microprocessor
(4) Integrated circuit (5) LSI
5. Which of the following is called the decoding component of the instructions brought into the central
processing unit?
(1) Program counter (2) Arithmetic logi unit (3) Control unit (CU)
(4) Register unit (5) Main memory
[see page no. 2
A/L ICT 2026 (Gr.12) – April FWC
-2-
AL/2026/20/E-I Copyrights reserved.
6. Which of the following does not influence the reduction of the digital divide gap?
(1) Development of communication infrastructure at village levels
(2) To develop awareness among the public about information communication technology
(3) Providing used computers to low income earners for learning purposes
(4) Providing opportunities for all students in schools to learn information communication technology
(5) Granting of loans to the general public by banks
8. F2B16 =
(1) 50538 (2) 74358 (3) 73458 (4) 74538 (5) 35478
9. Which of the following is the simplified form of Boolean expression 𝑥̅ (𝑥 + 𝑦) + (𝑥 + 𝑦)(𝑥 + 𝑦̅) ?
(1) 𝑥 (2) 𝑦̅ (3) 𝑥𝑦 (4) 𝑥 + 𝑦 (5) 𝑦
11. “Units of capacity and speed of Random access memory (RAM) modules are frequently compared
respectively by …………………….. and ………………………..”.
Appropriate to fill the blanks in are respectively.
(1) Kilobytes, Gigabytes
(2) Gigabytes, megabits per second
(3) Gigabytes, megahertz
(4) Megahertz, Kilohertz
(5) Gigabits, megabits per second
12. “……………………. holds the address of the next instruction to be executed in the program”.
Which of the following is most suitable to fill the blank in?
(1) Arithmetic Logic Unit (ALU)
(2) Program Counter
(3) Control Unit (CU)
(4) L1 cache memory
(5) Main memory
Computer memory is broadly classified into primary and secondary memory .………… includes
Random Access Memory and Read-Only Memory .………… is volatile, meaning it loses its data when
the power is turned off, and is used for temporary storage while the computer is running .………… is
non-volatile and retains its contents even when the power is off. Secondary memory includes storage
devices like hard drives, solid-state drives, and optical disks, which provide long-term data storage.
Unlike primary memory, secondary memory is …………. and used for permanently storing data and
programs.
20. Time for study of students in a school is limited from 7.30 am to 1.30 pm weekdays. Which of the
following is the most appropriate data validation check for this purpose?
(1) Presence check
(2) Range check
(3) Length check
(4) Format check
(5) Type check
22. Which of the following is incorrect statement about computer data storage?
(1) Secondary storage is a kind of non-volatile memory
(2) Secondary storage is not directly accessible by central processing unit (CPU)
(3) Main memory is directly accessible by central processing unit
(4) Random access memory (RAM) uses sequential data access method
(5) Main memory is considered as a secondary storage device
30. 25.7510 =
(1) 10101.102 (2) 11000.012 (3) 100000.102 (4) 11001.112 (5) 100000.012
31. Which of the following data storage device that uses laser technology for reading and writing data?
(1) Hard disk
(2) Floppy disk
(3) Compact disc
(4) Magnetic tape
(5) Solid-sate drive (SSD)
32. Which of the following is correct when the value of Boolean function 𝑓(𝑥, 𝑦, 𝑧) = 𝑥𝑦̅ + 𝑧𝑥̅ + 𝑦𝑧̅ is 0 ?
(1) 𝑥 = 1, 𝑦 = 1, 𝑧 = 0 (2) 𝑥 = 1, 𝑦 = 0, 𝑧 = 1 (3) 𝑥 = 1, 𝑦 = 1, 𝑧 = 1
(4) 𝑥 = 0, 𝑦 = 1, 𝑧 = 1 (5) 𝑥 = 0, 𝑦 = 1, 𝑧 = 0
33. What is the simplified Boolean expression represented by the following Karnaugh map?
(1) 𝐴̅ + 𝐵̅ + 𝐶̅
(2) 𝐴 + 𝐵 + 𝐶
(3) 𝐴𝐵𝐶
(4) 𝐴 + 𝐵̅𝐶
(5) 𝐴 + 𝐵𝐶
34. Register is a.
(1) Software and has the fastest data access
(2) Software and has the slowest data access
(3) Hardware and has the fastest data access
(4) Hardware and has the slowest data access
(5) Memory with slowest data access
35. Which of the following is not considered as the characteristics of big data?
(1) Volume
(2) Variety
(3) Visibility
(4) Variability
(5) Veracity
R
B
37. Which of the following Boolean expression is represented by the following Karnaugh map?
(1) 𝐴̅𝐵 + 𝐶𝐷 (2) 𝐴𝐵 + 𝐶̅ 𝐷 (3) 𝐴𝐵̅𝐶𝐷 (4) 𝐴̅𝐵 + 𝐴𝐵̅𝐷 + 𝐶̅ (5) 𝐴𝐵̅ + 𝐶𝐷
̅
38. What is the simplified result of the Boolean expression 𝐴𝐵̅𝐶̅ + 𝐴̅𝐵̅𝐶 + 𝐵𝐶 + 𝐵𝐶̅ ?
(1) 𝐴𝐶̅ + 𝐴̅𝐶 + 𝐵
(2) 𝐵̅(𝐴𝐶̅ + 𝐴̅𝐶 ) + 𝐵
(3) 𝐶̅ (𝐴𝐵̅ + 𝐵) + 𝐶(𝐴̅𝐵̅ + 𝐵)
(4) 𝐴𝐶̅ + 𝐵
(5) 𝐵 + 𝐴𝐶̅ + 𝐴̅𝐶
Which of the following Boolean expression is equivalent to the output Q of the logic circuit given above?
(1) 𝐴̅𝐵 + 𝐴𝐵̅
(2) 𝐴𝐵 + 𝐴̅𝐵̅
(3) 𝐴𝐵 + 𝐴̅
(4) 𝐴 + 𝐵̅
(5) 𝐴 + 𝐵
**
Part – II A
Answer all the questions
1.
(a)
(i) Give (+1910) in 2’s complement form with 8-bits. Show your calculations.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(ii) Give (-1510) in 2’s complement form with 8-bits. Show your calculations.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(iii) Use 2’s complement form to calculate (1910 - 1510) with 8-bits. Show your calculations.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(c) Secondary storage devices use three kinds of data reading and writing technologies or media. Do not
write in
State each them and write down one example for each. this column
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
2.
(a) Give any three service models in cloud computing.
…………………………………………………………………………………………………..
…………………………………………………………………………………………………..
…………………………………………………………………………………………………..
(b) Give the major technologies used in first four generations of computer.
…………………………………………………………………………………………………..
…………………………………………………………………………………………………..
…………………………………………………………………………………………………..
…………………………………………………………………………………………………..
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
Do not
write in
(ii) Draw the logic circuit for the simplified Boolean expression. this column
3.
(a) If each of the following statements is correct, indicate it as True, or otherwise, False.
(i) Frequently used instructions in computer are used in cache memory …………………………
(ii) Generally, the capacity of L2 cache memory is more than L1 cache memory …………………
(iii) Device driver executes or controls the specific device connected with computer ……………
(iv) Non-volatile memory is not lost data even when the power of computer is switched off
………………..
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(c) Choose the suitable words from the list given below. Write down only the appropriate numbers
for the blanks.
(i) Memory that is lost data / instructions when power is switched off ……………..
(ii) Protection of personal information in computer data bank from abuse is called data privacy
……………..
(iii) It refers to the use of small and portable computing devices in wireless enabled networks
that provide wireless connections to a central main server ……………..
(v) It is a work arrangement using of ICT tools in which employees do not commute to a central
place of work ……………..
(d) Categorize the following software each whether they are application software or system
software.
Lists:
[Google chrome, Ms-Windows, Mac OS X, Ubuntu Linux, Adobe Photoshop, GIMP]
(i)
(ii)
(iii)
4.
(a) Define the following terms briefly.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(b) Briefly explain the difference between data and information with the help of examples available
in your school Library information system [ hint: definitions are not needed].
Data
Do not
write in
this column
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
Information
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
(c) Write down the steps of fetch-execute cycle in computer instruction processing from the list
given below.
Start
Stop
………………………………………………………………………………………………….
………………………………………………………………………………………………….
………………………………………………………………………………………………….
………………………………………………………………………………………………….
[Lists: Executing instructions> decoding instructions> Fetching instructions> Increment of Program
Counter]
***
[see page no. 6
A/L ICT 2026 First Term - NFWC ICT
-6-
AL/2026/20/E-II Copyrights reserved.
Part – II B
Answer any two questions only
5.
(a) Consider the following Karnaugh map.
AB 00 01 11 10
C
0 1 0 0
0
1 1 0 1
1
(i) Obtain a simplified Boolean expression in the form of sum of products (SOP) using the
Karnaugh map. Show the loops clearly in the Karnaugh map.
(ii) Construct a logic circuit corresponding to the simplified Boolean expression using only
NAND gates.
(iii) Construct a truth table corresponding to the simplified Boolean expression.
𝐴𝐵̅𝐶̅ + 𝐴𝐵𝐶̅ 𝐷
̅ + 𝐴̅𝐵̅𝐶̅ 𝐷 + 𝐴̅𝐵̅𝐶̅ 𝐷
̅
(b) State Karnaugh map to represent Boolean expression obtained in (b) above and simplify this
Boolean expression using this Karnaugh map.
(c) Draw a logic circuit for the Boolean expression simplified in (b) above using AND, OR, NOT
gates only.
7.
(c) Give two devices that are used to capture data automatically in digital form.
***
[end.
A/L ICT 2026 First Term - NFWC ICT
A GREAT
Personalized 24 Hours
Experience Service
@Alictlibrary
JOIN OUR WHATSAPP GROUP
ICT
A/L 2026 (G.12) – ICT Scheme – FWC Examination – 2025 April 1
(1) 2 (11) 3 (21) 5 (31) 3
(2) 3 (12) 2 (22) 1 (32) 3
(3) 2 (13) 3 (23) 3 (33) 1
(4) 3 (14) 5 (24) 1 (34) 3
(5) 3 (15) 2 (25) 5 (35) 3
(6) 5 (16) 5 (26) 3 (36) 1
(7) 3 (17) 4 (27) 1 (37) ALL
(8) 4 (18) 5 (28) 5 (38) 1
(9) 4 (19) 4 (29) 4 (39) 2
(10) 5 (20) 2 (30) 4 (40) 1
000001002
Discard carry bit 1
(b) The value of information is high at the time of its generation. As time 3 marks
goes, the value of information reduces.
(c) Magnetic storage technology – Hard disk, Floppy disk, Zip drive, Jaz
drive, Magnetic tape 3 marks
Optical / Laser storage technology – CD, DVD, Blu-ray disc
Solid-state / semi-conductor storage technology – SSD, Flash drive,
memory card
2.
(a) SaaS 3 marks
PaaS
IaaS
FaaS
(d)(i) 1 marks
𝐶. (𝐵̅ + 𝐷
̅)
(d)(ii) 1 marks
3.
(a) (i) True, (ii) True, (iii) True, (iv) True 2 marks
(b) Software piracy is the illegal copying, distribution, or use of software 1 marks
without proper authorization or licensing from the owner or developer.
(d) 2 marks
Application software - Google chrome, Adobe Photoshop, GIMP
System software - Ms-Windows, Mac OS X, Ubuntu Linux
4.
(a)
(i) Hardware is a physical (tangible) components of a computer system. 2 marks
(b)
3 marks
Any examples from Library system.
(c) 3 marks
fetching instructions
increment of program counter
decoding instructions
executing instructions
(1) (a)(ii)
2
marks
(1) (a)(iii) 𝑨 𝑩 𝑪 ̅
𝑨 ̅𝑩
𝑨 ̅
𝑩 ̅𝑪
𝑩 ̅𝑩 + 𝑩
𝑨 ̅𝑪
2
0 0 0 1 0 1 0 0 marks
0 0 1 1 0 1 1 1
0 1 0 1 1 0 0 1
0 1 1 1 1 0 0 1
1 0 0 0 0 1 0 0
1 0 1 0 0 1 1 1
1 1 0 0 0 0 0 0
1 1 1 0 0 0 0 0
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
(𝐴 + (𝐴 + 𝐵)). ̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅̅̅̅̅̅ (𝐵 + (𝐴̅̅̅̅̅̅̅̅̅̅
+ 𝐵)).
̅̅̅̅̅̅̅̅̅
(𝐴 + (𝐴 ̅̅̅̅̅̅̅̅̅
+ 𝐵). (𝐵 + (𝐴 + 𝐵).
̅̅̅̅̅̅̅̅̅
𝐴𝐵 + 𝐴. (𝐴 ̅̅̅̅̅̅̅̅̅
+ 𝐵) + 𝐵. (𝐴 + 𝐵)(𝐴 ̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅
+ 𝐵). (𝐴 + 𝐵)
𝐴𝐵 + 𝐴̅. 𝐵̅ = 𝐴⨁𝐵
̅̅̅̅̅̅̅
(1) (b)(ii)
̅. 𝑩
̅ 1
A B 𝑨𝑩 + 𝑨
marks
0 0 1
0 1 0
1 0 0
1 0 1
(1) (b)(iii) 1
XNOR marks
𝐵̅𝐶̅ + 𝐴𝐶̅ 𝐷
̅
(2)(c)
3
B marks
C
D
A
(3) (b)
2
Loading basic device drivers
marks
POST – Power On Self Test process
Settings (date/time)
(3) (c)
Barcode reader, QR code reader, OCR, OMR, MICR, etc. 2
marks
(3) (d) 2
Possible to represent negative number.
marks
Subtractions are carried out as additions.
A single representation is used to represent a zero.
More efficient calculations.