0% found this document useful (0 votes)
40 views

Ifrka: ?fi Information Communication Technology

This document describes an electrical circuit used to operate a light in a staircase using two switches. The circuit diagram and its functionality are explained. A truth table is constructed to represent the circuit. A Boolean expression is derived from the truth table. The equivalent logic gate for the Boolean expression is identified as an XOR gate. Finally, a logic circuit is constructed using NOT, AND and OR gates for the Boolean expression.

Uploaded by

Malan Mankh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Ifrka: ?fi Information Communication Technology

This document describes an electrical circuit used to operate a light in a staircase using two switches. The circuit diagram and its functionality are explained. A truth table is constructed to represent the circuit. A Boolean expression is derived from the truth table. The equivalent logic gate for the Boolean expression is identified as an XOR gate. Finally, a logic circuit is constructed using NOT, AND and OR gates for the Boolean expression.

Uploaded by

Malan Mankh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

q**r

Department of Examinations - Sri Ifrka


G.C.E. (A/L) Exmination -2015
?fi - Information & Communication
Technology
Itilh*iqg Sciheme

ltis has bccnptpoodfctheuseof ma*iag cxanine*s. S@G chnges wonldbeoadearodingbtheviows


pesened at tle (hid Bxamine*rr Miag.
Amendments to be indudod All Rig[tl R€s€rv€d
Part ll - A
Question Part Answer Marks
No
1 a <h2>Send Text Message</h2>
<p>Fill in all the fields and click Send Message</p>
<form action="" method="POST">
<div class = "a">
<div class = "1">Phone No.:</dirr>
<div,class = "r,'xinpgt typs=. ..!&4r L
p669="phone" size="20'] ></div>
</diw
<div class = "a">
<div class = "1">Message:</div>
<div class="r"rffi
name="message" rows="7" cols="30"> 1

</diP '/ffiduiv'
<div class = "a">
<div class = "r"><input type="submit"
vatueffiffiffiffi ></div> 1
</dirr>
</form>
car. -!r.{il.lJ, I o ,, '
b Possible Answers : mark *2
1. source link is incorrect. 2 Marks
2. browser does not support images
3. Problem in downloading image
4. lmase has been corruDted.
c (i) lncorrect t
p{font-family: Ariah} 1
c(ii) lncorrect Cfl'*-- 1

body{ color: red; or body{color: red;} ?


background-color: yellow; ) body{ backgrou nd-color: Veffow;)( 7
ro czr.f i,br or.lq 'cr',ff^r* ,
(iii) Correct L

c(ii) c
,rl -o
+
N-{^",1,1 3Av,^,r
7 a(i) 00001010 1
a(ii) 11100111 1
a(ii0 Add two numbers together 1
11110001 (Optional)
do| 6r(.b- @ur',r^t-l(a, ht,ttr k altlu
a(iv) Check the most significant tiit. 1
]f it is 0, the sign is positive, just convert the number to
decimal. (Optional)
lf it is 1, the sign is negative, perform the 2's complement.
Cor.,lW llu }ur^rik{^ -tD &cfrr"r.l
b(i) Possible answers l Mark *
Seeurity, Privacy, Reliability 2=2
l'fr,,"b,- Marks
b(ii) Yes. l Mark
Justification : B2C or Business to Consumer" is a business l Mark
transaction where products and services are sold through the
lnternet for convenience of consumers. lntemet banking is a B2C
form of a service organization where banking services are offered
to customers online.

b(iii) Yes. 1 Mark

A bank usually evaluates certain conditions to screen loan l Mark


applications before senrling the application for further processing
and approval. These conditions are domain specific and usually
checked by a domain expert.

Note: As the.decision making process involves reasoning under


uncertainty, lack of data etc. and gan be implemented as a set of lf-
Hse cdnditions, it could be automated as an expert system. That
expert system could be used to provide a loan pre-processing
interface for loan applicants to check their suitabiiity to apply for a
loan before submitting an application to the bank.
3 a(i) YES ordosed t
a(ii) Energy cannot be created or destroyed 1

Therefore no possibility of new enerBy coming from outside and I


destroyed energy going out.

b(i) instituteCode + unitCode 0ah L& (lq,l + " a,{ I


b(ii) NOT NUI-1, 1
ad*- b"ra^alu ir^,ta,1{\
PRIMARY KEY,
€(< ^ ?44ede^1,,\ h.fa,iri\ 2

FOREIGN rcY pK - gh+i\ i\ta,i,i\ 1

c(i) 3 1

cfii) 4 1

4 (a) Address size = 32 bits


No. of unique addresses = 232 1

Max no. of bytes uniquely addressable = 2u 1

Max no. of bytes usatrle = 2tz =22 *2w 2


Max usable size of memory = 4GB

(b) Current Next Condition for 1 Mark *


state possible traruition from the 6=6
state running Sate Mark
Running Exit
?arv"*,nn\ 0ompletion of the
process
ftc "e,
Ready Allowed time slice
t{xiti}q finished7.
fir-< owf,
'1dt-"ldwJb
Blocked

Pet Event weir


ll - Part A
l. (a) Explain how !o derive a Bmlm exprcssion ftom a given truth table.
(b) In residential electrical wiring, the followinB circuit htr been ued to opemte a light in a staircme.

As in the above circuit, two switches S1 and 52 are installed at the bottom md the top of the staircase
to operate the lamp L. The lamp tumed on by using the switch Sl at the bottom of the staircre m
be tumed off by using tbe srvitch 52 at tlrc top of the staircase. Further, the lmp tumed on by using
switch 52 at the top of the staircase can also be tumed ofr by ming the switch 51 at the bottom of
the staire. Morcover, the lmp L tumed on by a switch can be tumed off by the same switch.
Assume that tbe connectioro to pcitiom X and Y of a switch in the above circuit re reprcsented by the
truth values I md 0 resp€ctively md the tumed on and hmed off states of the lamp L ile reprcsented
by the truth va.lues I md 0 ropectively.
(i) Construct a tsuth table to represent the functionality of the above circuit.
(ii) Deriv€ a Boolm exprcssion to rcpffint the truth table obtained in setion (i) above.
(iiD What is the logic gats which is equivalent tro the fmctiomlity of the Bmlm expression obtained
in section (ii) above?
(iv) Construct a togic circuit for the Bmlm exprcssion obtained in section (ii) above with NoT, AND
md OR gates only.
Ques Part Answer ll - Part A Marks
No
U a Case 1:Logical truth value of outpullr 1
Sum of products (SOP)
crse 2: l-ogical truth value of output is 0 3
Products of sums (PpS)

Any ofthe above cases, 3 mark

b) i) lrth{r
a. o.^{CJp
,il' }.tu} l,+}o
"&,1
&l-i I
4

ii) s::-si::'*:l-_.6Y (sr"3r1.13*sD


Complete staternent
=u r rprt( or alk'rl L 3

iiil

7
N
iv)
sl s!

Complete diaSram 3 ma.ks (if not 0 markl


2. (a) The IP address l2'2l4.l6i)218 is assigned to the servq www.doenets.lk. Ttre ping l:15214.169218
command issu€d flom thc.machine A r€ported a rcmd trip time (KIT) of 20 ms.
However, the ping www.doeneb.Ik command, issued some time later from the. machine A, rcported an
em)r.
(i) Draw a network diagram to depict the server, rrachine A and any other tequircd componenrs to
describe thp above ,scenado.
(ii) Identify.two possible causes for the above behaviour and explain them using the diagram devoloped
in section,.(a) (i) above'
(b) An organization has only one public IP address, 1922.48.17.1, allocated !o it. The organization has decided
to allow wcb browsing on the computers on its tAN with 100 computers. It also wants to optimize the
usagp of its Intemet connection by redrrcing the traffic on the link as much as poosible.
Draw a rctwork diagram to satisfy the above rEquirements. kplain the major decisions you made.

2l a(i) 3

ffi
A

tsuE

r
11{.?1t.1$.}t0
CceFr
bM.f

a(iil ldenufy, two possibh causes for the above behavior and explain using the diagram developed 4
in section 9^*t.7
-x rS,l- Crr,"L?- Dct S sadw * 4d.i*
( r$+ u$yu odS ScVl, - G\!!r.,+tq prl,^,
+r td€r./. )a,ib i^ &cc^-t #r^o-
- JU-+ p,>tLr-,1.
Diagram (2 ma*s for prory server, 1 mark for IAN and 1 showing public lP at proxy
server) @
{-
g!lg!!q l!!
Ilqes. Any of nnge within the following: l markl
(

1o.o.o.o -
10.255.'255.255
L7 2.16.O.O- 77 2.31. 255. 255
192.168.0.0 - 192.168.25s.255
Sr,'un
The proxy server can also be used as a cache to ootimize the usase of internirt connectivltv ( or

*s.88.1r.1

ffi
g{q

3. The National University of Information Technology is a well-recognized university. They offer both bachelors
and post-graduate degr€e progmmmes, diplomas as well as short courses in information technology and
business management. All teaching of the above courses is being conducted at their sophisticated clasirooms
and state-of-the-art computer laboratories specifically dcsigned to provide a student-centred interactive leaming
experience. The management of the university has realized that their brand name has beome well known
in the country as the number of inquiries they rec€ive from far away plovinces has increased. Furthermore,
a recent study has revealed that their short courses and diplomas are also very popular among working
professionals dcspite the burdens of their busy work schedules as well as the limited time ayailable to
devote for.education. Hence, the management has proposed to start a distance education programme with the
objectives of.provi{ing new value:added services and capturing new markets.
(a) Prcpose an ICT based system to implement the above distance education progmmme. Describe its main
@mponents by using a simple diagrarn.
(b) Explain three advantages of the proposed system.
(c) Discus thrce challenges of the proposed system.
(d) The management thinks thal agent technology based techniques could be used to overcome sorne of the
above challenges. Do you agree with this statement? Iustifo your answer.
3) a ldentification of "E learning system"/ "E education platform" (oisimilar) 1

Note: lf Learning Support System ii written as the answer, the environment needs to be
mentioned as e{earning.

b 6
i. Learning at preferred times
2-rr.o(d
ii. No geographical barriers
iii. lncreaseemploymentopportunities txSl e1
iv. Online testing ,r3\- 3
v. Less operational costs
vi. LearningatownP'ltacer Pa@
gdh a. or tr{lc g-/* at-- a6
(1 mark for list of advantages and 1 mark for explanation)

S*ll* r.V p.;$s I a, 6-l -S ,j;{+I p"{nfA.


c 3
i, How to facilitate active teacher student interactions 1xlef
ii. Getting students to interact with other students
iii. CondUctingpracticalexaminations
iv. €ourse material preparation
v. Evaluation ofthe learning process and progress
vi. Lack of ICT resources and infrastructure

8)o^l4q4y* ut4,* u41arl


^
d 3
Yes/No (if the.challenges are not related to agent technology) @mark)

Explanation including anytwo ofthe below @ marks) l+z-t


i. Material preparation aBent {locating materials from the web) rfr^'
ii. Learning process management agent (lippropriate learning sequence/lesson
planning)
iii. tearner support agent (ldentification of weak peiformers, providing additional
learning resources, etc.)
iv. Collaboration support agent
v. Assessment agent

4. (a) Explain why compilers or intelpreten are n€e.ded when using high level programming languages.
(b) Your teacher has requested you to writ€ a
Sthon plogram to record. the marks obtained by students al
the term test. Each student has sat for the same three papers and each mark was given as an integer
value out of lfi) marks. Fach student is identified by a unique index member which is also an integer.
You should rccord the marks of student in a t€xt file named 'mfiks.txt'in tlrc following format.
Index_no_l,rnark_l l,rnark_l2,ma*_13
Indetnoj,mark -21 ma*-22 lrllafu?3

Where
Index-no-X : Index number of the Xfi student; X = I, ..............,, n
markJY : Marks obtaiired by the Xft student for the Yth paper; Y = l, 2, 3.

Index numbers and mark of the students should be entered through the keyboard, one ircrn at a time
and the program should be terminated wlrcn -l
is enteied as the index number.
(D Propose an algorithm by using a flowchart for the program
(ii) Write a fothon program !o implement your flowchart.
Programs written in high level languages cannot be understood by the processors of a
computer. Thus lnterpreters/Compilers are needed to convert the programs in high level
understood bv the computer {Machine
Start
and end
i mark

Read a index number (i)

Read the first mark (xl


Read 3
inputs 1
Read the second mark {v) mark

Read the third mark (z)

Write l,Lv,z to th€ file

b(i0 f = open("mark.t<t","w') r+ q
index_no = int(input("Enterthe next index no:"))
while (index_no t= -1): "T
x = input("Enter the first mark :")
y = input("Enter the second mark :")
z = input("Enter the third mark :")
data = str(index_no)+","+x+","+y+","+z+'\n'
f.write(data)
index-no = int(input("Enter the next index no :"))
f.closefl

correct open statement {Mark (Should have the left side variable to = + open
keyword + file name "marks.txf in double quotation + "u/' in double quatation;
corect close rl.l"msnt=q_ft4a*
correct statement to read an ;66x n6 =@Mark (the result may be converted to int)
Correct loop statems6i =Qtrrark ( while kepvoed + correct comparison - index-no can
be a string or an integer depending on how it is read)
Reading marks =@Mark - if at least syntax of a single line is correct
Making the output string to write {tvtark - f.write n€eds a string as its parameter
writing to the file = Qtvtark
g. A pharmacy named "DR Chemists" sells drugs to patients. A patient should poduce a prescription to a
pharmacist at the pharmacy to buy drugs. A presoiption has one or more drugs prescribcd by a doctor. A
doclor can issue more than one prescripion for a patient. Howevet, a prcscription is issued by one doctor.
Pharmacist preparcs a bill for each prescdption and gives it to the patient. Five (05) pharmacists at the
pharmacy handle all prescriptions.

A pharmacist handles more than one prescription rvhile one prescription is handled only by one pharmacist.
The upper part of the prcscilption contains the patient information such as name, age, addr€ss and telephone
numbcr. The middle part of the prescription consists of ohe or more drug names, quantities to be issued and
the dosages. At the bottom part nam€, address and telephone number of the hocpital and the name of the
doctor are available.

The owner of the pharmacy wants to keep the necessary information to pr€pare the following list of reports.

l. Number of prescriptions handled by each pharmacist.

2. Number of prescriptions issued by each doctor.


3. List of information abut doclors, their hospitals and drugs prescribed by them.

4. Ust of daily cash collection of the pharmacy.


Prepare an ER diagram to model the data requircd to produce the above repor6. Sate clearly all your
assumptions, if any.

- each entity {1 x 8 entities)


- each relationship ( except relationshipJ with Pharmacy entity) (1 x 5 relationships)
- Correct attributes attached to Hospital and Doctor entities

e ra;;l--r | \
g^o qY.,
6. Draw a @ntext diagram to show the overview of lhe library system doscdbed below. Clearly indicate extemal
entities and data flows of your diagram and state any acceptable assumptions that you have made.

The National Information Technology Ubrary (NffL) provides e-books to its users through an online system
named'Library Information Processing System (LIPS)".

A person should submit an application to NITL to become a member of the LIPS. The NITL evaluates the
application and enters it to the LIPS, if it is approved. After entcring the application d8a, LIPS issues an
ictivation code to NITL which in turn passes it to the relevant person. Once the activation code is rcceived
the person bocomes a member of LIPS. A member can otrtain his/her usemame and passwod by providing
.the activation codc to the UPS. A member can subsoquently.lccess e-books by ent€dng his/her usemame
and the password to the LIPS.
6) 1GtL

*-
al,tE@ed lEbcrs-
trrs hip 4E li6ci@
"-o*Lt
I

| '*' ,t Ed:
I

| *rT*
ured
ad.Bbil,

'#{
.tErl,:LcaEi6
lz*tt
I
llp!
lser 6ed
Eqd I

lrt

\t@'

Strictly follow standard not rtions.


Data flows between Externi rl Entities should n specified with dotted lines.

*;l(*
Part I

1 4 11 2 21, 5 31 5 41 4
2 5 t2 3 22 1 32 1 42 2
3 3 13 1.4 23 s,1(T) 33 5 tt3 3
4 4 t4 5 24 1 34 2 4 1
5 3 15 5 25 1 35 1 45 5
5 4 15 1 26 3 36 3 46 4
7 1 L7 3 27 2 37 3 47 2
8 3 18 2.4 28 5 38 2 48 3
9 5 19 5 29 L 39 I 49 5
10 1 20 2 30 5 4{) .2 50 3

*(**

You might also like