3 ICTEnglish
3 ICTEnglish
~@~~~]
(!J1(!iU uliluur/lI(f)IDIlII(f)LUJ~]
All Rights Reserved]
~:x3l cx;.o~
~ (9Ot:!)) I @6u~Ql)6iU UIfLQD6j; ~6Ul6Rr6;a;fTTLD I Department of Examinations, Sri Lanka
• Instructions to Candidates
Very Important:
Write your Index Number here, and
Do not use Pencils on pages 3 and 5 in the spaces
to write answers. indicated.
*
/
Answer scripts where the numbers are
.......................................
Checked as correct
.......................................
not written as indicated below will not be
marked I evaluated. Invigilator's Initials
I 2 3 4
Important: For Examiner's use only
This paper consists of 65 questions on 11pages.
* Page No. QuestionNo. Marks Awarded
Before answering the paper arrange all the pages
* in order. 2 1 - 11
3 12 - 18
Answer all questions on this paper itself.
* 4 19 - 30
The time allowed for this paper is two hours.
* answering
5 31- 42
• For questions from No. 1 to SO, select the correct or the most appropriate answer and write the
number of the relevant choice on the dotted line provided against the question.
2. The memory that can be accessed by a processor having 32-bit address bus is
(1) 2KB (2) 2GB (3) 4GB (4) 32GB ( )
6. The facility that looks for hidden contents, other information and properties that might create
compatibility issues in an MS Word document is,
(1) backstage view. (2) inspect document.
(3) track changes. (4) check compatibility. ( )
8. The facility in MS Excel to step through each part of the formula individually is called
(1) trace precedents. (2) watch window.
(3) error checking. (4) evaluate formula. ( )
9. In MS Excel a field that appears on the pivot table but not a field in the source data is
called,
(1) a ghost field. (2) a calculated field.
(3) a source field. (4) a dynamic field. ( )
10. Consider the following expressions and the figure. r-:t\"""",A ... ~""~a .. ",,'r c .z,_- .._Di;~'.t 4
P: AS( Compca!Y Ltd. I
A - =CONCATENATE (A4, " ", B4) ] &..Ie,,,.. Detaib
B - =SUM (A4, B4) -3 -- -- ••• - Adchullllo .,MIdr
Which of the above will you select to enter in C4 to get the Full Name, using the Fi ame and
Last Name you have already entered in A4 and B4 as shown in the figure.
(1) A and B only. (2) B and Conly.
(3) A and Conly. (4) All A, B and C. ( )
11. What can you do when saving a Powerpoint presentation if you have to show i in a comp
which may not have the same font you used to create this presentation?
(1) check compatibility (2) font embedding
(3) check accessibility (4) font replacement (. )
12. Which of following statements is true with regard to 'slide masters' in MS Powerpoint?
(1) You can have multiple slide masters in one presentation.
(2) Slide master saves information about the theme, contents and properties of the
presentation.
(3) A presentation may not have any slide Master.
(4) Changes you do in the slide master affect all the slides of the presentation. ( )
14. Which of the following correctly implements the above ER diagram in a relational database
system?
(1) I I I
ExamD Center
(2) I ExamlD I I
Date
(3)
~ M=1 I I I I I CandiD ExamD Date Center
(4)
~
I ExamD I I I I
Date I I
CandiD ExamD Center ( ......... )
15. A relational database table in O-normal form can be converted to l-normal form by reducing
20. A primary key of a relational database table can be replaced by an attribute available in
(1) Candidate key. (2) Alternate key. (3) Composite key. (4) Foreign key. ( )
21. A and B are attributes of a composite key. If, only the attribute B decides a non-key
attribute C, there is,
(1) transitive dependency (2) partial dependency
(3) internal dependency (4) external dependency ( )
24. To which layer of the OSI model of data communication systems does the router belong?
(1) application layer (2) network layer (3) session layer (4) physical layer ( )
25. Select the answer that contains the layers of OSI model arranged in the correct order.
(1) application layer, session layer, network layer
(2) network layer, data link layer, physical layer
(3) physical layer, network layer, data link layer
(4) network layer, physical layer, data link layer ( )
27. What protocol helps to find the hardware address of a local device in a network?
(1) RARP (2) ARP (3) IP (4) ICMP ( )
29. Which of the following is true with respect to 'a frame' in a computer network?
(1) It helps error checking at the application layer.
(2) It contains only one packet.
(3) A data packet can have one or more frames.
(4) It is used by the data link layer to check communication errors. ( )
30. Which of the following is true with respect to TCPIIP based Intranet?
(1) It always assures the delivery of data to the destination.
(2) It can be considered as a fault-tolerant system.
(3) It provides a dedicated physical connection between the server and the destination.
(4) Data transmission is impossible between a TCPIIP based intranet and a Novel
Netware Intranet. ( )
31. Which of the following is correct with respect to public and private keys used in data
encryption?
(1) Data encrypted by private key of a sender can only be decrypted by public key of the
receiver.
(2) Data encrypted by public key of the sender can only be decrypted by the receiver's
private key.
(3) Data should be encrypted using sender's public key so that the receiver can decrypt
using receiver's public key.
(4) Sender's private key should be used for encryption so that the receiver can decrypt using
its private key. ( )
32. Which of the following is correct with regard to MD5 and SHA protocols used in computer
networks?
(1) Data encrypted using MD5 cannot be decrypted.
(2) Both MD5 and SHA can be used for data encryption only.
(3) Both MD5 and SHA can be used for data decryption only.
(4) Data encrypted using SHA cannot be decrypted. ( )
33. Data sent by a sender having IP address ...... will not be proceeded by the routers outside
the network.
(1) 172 . 16 . 4 . 10 (2) 192. 248 . 24 . 15
(3) 192 . 248 . 1 . 2 (4) 248 . 168 . 2 . 4 ( )
39. Which of the following is used to test the connectivity between two devices attached to the
internet?
(1) ping (2) telnet (3) tracert (4) rlogin ( )
43. Which of the following is a major weakness in Waterfall model of system development?
(1) Process invisibility.
(2) It does not support project management.
(3) It requires well defined set of requirements to begin with.
(4) Resource management is difficult. ( )
44. Which of the following SDLC model does not support process iteration?
(1) waterfall (2) agile (3) spiral (4) RAD ( )
• Consider the following user requirements for a mobile phone to answer questions 48 - 50.
A - A user shall be able to make a call
B - A user should be able to receive a call
C - The weight of the phone shall not exceed 500g
48. Which of the above represent the functional requiremenus)?
(1) A and B only (2) A and Conly (3) Band Conly (4) all A, Band C ( )
51. Write the possible range in decimal if the integers are represented using sign magnitude representation
in 16 bits.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
53. Briefly explain each of the following metrics used to measure the performance of the Central Processing
Unit (CPU).
(i) Throughput .
54. CPU burst time for four processes PI, P2, P3 and P4 are given below.
I~ss PI
20
P2
4
P3
3
P4
6
Calculate the average turnaround time for a process when 5 ms time quantum is given to Round Robin
Scheduling.
~ ~5._,.,,~_~~~l~Li ____
._~~_~'"~,~*'::0J-~ ~£~~':;!i »c~~.~~~
...........................................................................................................................
(H) To get the all details of all the employees having a Basic Salary of Rs. 40 000 or higher .
............................................................................................................................
(Hi) To get the number of employees and the total of basic salary of each branch .
...........................................................................................................................
Treatment
Patient No. Patient Name. Treatment Charge (Rs.)
Date
1005 Nimal Perera Blood Test 200.00 10.02.2015
1210 Deepika Nilmini Urine Test 300.00 11.02.2015
1403 SanjayaAlwis X - ray 450.00 12.02.2015
1005 Nimal Perera X - ray 450.00 12.02.2015
1005 Nimal Perera Urine Test 300.00 12.02.2015
1005 Nimal Perera Allergy Test 500.00
(i) What is the present normal form of the above table? Justify your answer.
58. Assume that the network address assigned to your company is 192.150.111.0.
(i) If the subnet mask is 255.255.255.224, find the answers to the below, mentioning the steps clearly.
(a) The number of usable sub-nets
•
(b) The number of hosts and the address ranges for each of the above sub-nets
(ii) If these sub-nets are named consecutively as A.B,C ... , find the subnets to which the following
IP addresses can be assigned.
(a) 192.150.111.10 (b) 192.150.111.66
(c) 192.150.11l.l00 (d) 192.150.111.200
(e) 192.150.111.220 (f) 192.150.111.251
...........................................................................................................................
............................................................................................................................
59. Compare IPv4 and IPv6 in point form .
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
...........................................................................................
[See page ten 0
- 10-
60. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two data transmission
protocols. Briefly explain when is it appropriate to use each of them giving suitable examples.
(i) Phishing .
(i) Pharming .
(i) Spoofing .
62. Info books is a book sales enterprise. A page from its web site is given below.
c...:,.o.
~
HR.. R&'t..&AS •
.u... . .........-...
.. .....
L. ..,..
(i) Write the HfML code to display the index.html when the 'Home' button is clicked .
...........................................................................................................................
(ii) In the subfolder 'image' locator in the folder 'web', where the index.html is saved, the logo of
the enterprise is saved as Books.jpg. Write the HfML code to show this logo.
(iii) Complete the following xml code to show the titles and the price of books in the table of this web page.
• < xml version = "1.0" >
64. Describe briefly two precautions to avoid the security threats you mentioned in question 64 above .
. .
....................................................................................................................................
....................................................................................................................................
o
- 12-
65. A soft drinks manufacturing Company issues soft drinks to retail sellers once a week. Sellers should
have been registered with the company to buy soft drinks. Sellers usually place orders for soft drinks
at the order clerk over the phone. A single seller can make several orders per week. Orders are
confirmed only if stocks exist. Or else, alternatives are agreed upon. The order clerk sends copies of
the orders to the stores and the cashier. When payments are settled, invoice is issued by the cashier
in two copies, one for the stores and the other for the seller. The stores issue goods to the seller
together with a goods issue notice to be produced at the gate.
Create the level-O DFD to represent the above data and processes.
***
o
Powered by TCPDF (www.tcpdf.org)