You are on page 1of 5

ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහලගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ

සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස


විදුහල
HolyCross College Gampaha HolyCross College Gampaha HolyCross College GampahaHolyCross College Gampaha HolyCross College Gampaha HolyCross College
ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහGampaha
සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස
විදුහල
HolyCross College Gampaha HolyCross College Gampaha HolyCross Collegeගම්පහ
Gampahaසිරිකුරුස විදුහල
HolyCross College GampahaHolyCross College Gampaha HolyCross College Gampaha
HolyCross college
ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල ගම්පහ
සිරිකුරුස විදුහල ගම්පහ සිරිකුරුස විදුහල

Grade 11 –2 nd Term Evaluation – 2021 (0/L)

ICT- Part I & II 80 E I 1 Hrs.

Part I
1. Consider the following incomplete sentence.................................... is a step of the System
Development Life Cycle (SDLC) what is the most appropriate statement to fill the blank?
1) Prototyping.
2) Testing and debugging.
3) Collecting of testing data.
4) Existing system is totally terminated and the new system is installed.
2. Select the answer that contains correct procedure of the following activities of SDLC.
1) Observation – Deployment of the system
2) System Testing – System maintenance.
3) Phase development – Coding of the solutions.
4) Prototyping – Identification of requirement.
3. With the advancement of the ICT, Online shopping can be identified as a new trend in the
business sector. A disadvantage of online shopping is,
1) Goods and services can be bought with 24 x 7 hours.
2) Reduce the waste of time to go and see goods.
3) Unable to touch the goods.
4) Home delivery of goods and services.7
4. According to the System Development Life Cycle, what is the correct approach when
Computerizing an information system?
1) Identify the problem  System Design  Coding
2) Coding  Testing  System Design
3) System Design  System Analysis  Software Development
4) System Design  Software Development  Implementation
5. What is correct ip address?
1)192.168.2.260
2)100.2.5.8
3)44.251.32.300
4)52.100.264.5
6. Which domain describe its country?
1) www.slt.org
2) www.moe.gov.lk
3) www.googlr.com
4) www.edu.net
7. <TITLE> tags a written with in the scope of...
(1) <BODY> </BODY> 3) <DIV> </DIV>
(2) <HEAD> </HEAD> 4) <TABLE> </TABLE>
8. Most practical solution to reduce illegal usage of the internet is,
1) Develop laws and regulations for people who use internet illegally
2) Filter unnecessary websites
3) Limit the internet access
4) Educate people on how to use internet effectively
9. User name of the E-mail address, lakmina@yahoo.com is
1) @ 2) yahoo.com 3) lakmina 4) lakmina@yahoo
10. Use user names and passwords to access a computer ........................examples.

1) Physical security 2) Legal security


2) Logical security 4) Cyber security
(10*2=20 Marks)

Part II
(1) Following are few symptoms of health issues related to use of Information and
Communication Technology.
(1) Pain extending from the shoulder to the fingers of the body.
(2) Feeling of a numbness and pain in the fingers.
(3) Dry eyes, tearing, pain in the head or neck are symptoms of this.
Select the health issue from the following list related to the above symptoms and write it in front
of the relevant number.
List : (headache, Repetitive Stress Injury, Carpel Tunnel Syndrome, Computer Vision
Syndrome.)
(a) “De-Skilling is an effect of using Information and Communication Technology.” Give two
examples for this.
(b) As electronic waste is not discarded following the correct procedure of disposal, it has caused
different health hazards. Write two health issues arose by this.
(7
Marks)
(2) . A pharmacy keeps daily sales records and issues drugs at the store, using manual method
and it is suggested to make this process automated.
(a) Write two different methods which can be applied to identify requirements of the suggested
system.
(b) If the above process is done automatically, write three inputs and three relevant outputs.
(c) When this system is used for a long time, it is essential to maintain it. Why it is required to
maintain like this? State you answer with two facts.
(d) System developers suggested Waterfall method to automate this system. Give one advantage
and one disadvantage of selecting this method.
(9
Marks)

(3)Consider the following HTML file at the right side with labels from ① to ⑧ representing
some missing tags and attributes and the output shown at the right.
Select the corrrect tag or the attribute relevent to the label numbers from ① to ⑧ represented in
the above HTML file from the following list and write them against the relevent label numbers.
(ul , em , h3 , u , href , colspan , src , br , i , table , line , td , th , a , rowspan)
(8
Marks)

(ii) Following are the steps of the process of accessing https://www.doenets.lk/ by a candidate
who is waiting for his results to check whether the grade 5 scholarship results are released Select
the correct terms from the bracket for the labels from (P) to (U),complete them and write them in
correct order.
(A) The web server with the IP address (P)……………………..returns the HTML data
stream.
(B) The user opens (Q)……………………………and inserts 'https://www.doenets.lk/'
(C) The web browser sends the request 'http Get' to the (R )…………………… which has
the IP address 222.163.157.221.
(D) The (S)……………………………………. is rendered by the web browser.
(E) The IP address 222.163.157.221 is sent to the client computer by (T)
………………………………………..
(F) The request for converting the domain name (U)…………………………….. Into its IP
address is sent to the Domain Name Server.
(222.163.157.221, web browser, Web Server, HTML page, Domain Name Server,
www.doenets.lk)
(6
Marks)
(30*2
=60)

You might also like