Professional Documents
Culture Documents
Publish 20220215
Publish 20220215
PROGRAMMING ................................................................................................................................... 56
ICT IN BUSINESS.................................................................................................................................... 89
2. “Video conferencing is best described as a/an __________ discussion through __________ between two
or more individuals in different locations.”
i. video, TV ii. audio, telephone iii. audio, network
iv. audio visual, TV v. audio visual, network
2013
3. Which of the following statements is true with regard to data and information?
i. Decision can be made only when a massive volume of data is available.
ii. Validity of information depends on the accuracy of data.
iii. Information obtained by processing data is always accurate.
iv. In order to obtain information, data must be collected from multiple resources.
v. The accuracy of information depends only on the accuracy of input data.
DYLEN A. WOLFF 1
2014
6. A special digit inserted into a sequence of digits for data validation is called the _________ digit. Which
of the following is most appropriate to fill the blank in the above statement?
i. check ii. sign iii. least significant
iv. most significant v. error
7. The Sri Lankan team won the T-20 World Cup-2014 tournament. The Sei Lankan cricket fans had the
highest value of this information when _________.
i. the final match started
ii. Thisara Perera scored the winning run
iii. the captain Lasith Malinga received the trophy
iv. they saw the news on the newspapers
v. they saw the cricket team at the Katunayake Airport
8. Facebook is a popular social network connecting millions of people with new members joining daily.
Which of the following statements is correct?
i. Facebook plays a very important role in building and maintaining your family relationships.
ii. Facebook is the only social network available today.
iii. Privacy settings of Facebook assure the privacy of its users completely.
iv. Publishing private information in Facebook has resulted in unfortunate incidents.
v. Real identity of a person is guaranteed on Facebook.
2015
10. Consider the following statements about social networking sites:
A. They are being used increasingly as a medium for election campaigns.
B. A user’s true identity is always guaranteed in a social networking site.
C. They are absolutely necessary to maintain human relationships in the modern society.
Which of the above statement(s) is/are true?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only
DYLEN A. WOLFF 2
12. Consider the following statements about the World Wide Web (WWW):
A. It is a collection of interlined, hypertext documents accessed via the internet.
B. It is a protocol for distributing information via computers connected to the internet.
C. It was invented by the World Wide Web Consortium (W3C).
Which of the above statement(s) is/are true?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only
13. ABC Holdings is a manufacturing organization in Sri Lanka which has its head-office in Japan. What is the
most convenient method to conduct weekly progress review meetings between the local staff in Sri Lanka
and the senior management team in Japan?
i. Telephone calls ii. Skype iii. Email
iv. SMS v. YouTube
14. Which of the following graphs represent the Golden rule of information?
i. ii. iii.
iv. v.
2016
15. Consider the following statements:
A. Plagiarism is a common threat to information systems.
B. Plagiarism means claiming someone else’s creation as one’s own.
C. Piracy is a synonym for plagiarism.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only
16. “Employees of modern organizations perform their duties from home.” Which of the following best
describes the above statement?
i. Social networking ii. Telecommuting iii. Instant messaging
iv. Office automation v. Blogging’
DYLEN A. WOLFF 3
2017
17. Students in a school are given tablet computers to improve their studies. Which of the following is the
most appropriate activity to achieve this objective?
i. Downloading computerized study material ii. Watching entertainment videos
iii. Instant messaging among friends iv. Blog writing
v. Playing computer games
2018
18. Which of the following describes the term ‘telecommuting’?
i. Ability of an employee to perform duties conveniently from different geographical locations using
modern technology.
ii. Having online meetings with people at different geographic locations.
iii. Using ICT for community services.
iv. Using web-based applications to retrieve information.
v. Performing financial transactions online.
19. Consider the space voyage for landing a human being on the surface of the moon for the first time 1969.
The entire event was broadcast on the radio in Sri Lanka by several commentators based in Sri Lanka and
the USA.
Which of the following events relates to the highest value of information?
i. Counting down for the launching of the rocket that carried the space shuttle.
ii. The moment the space shuttle escaped from the gravitational field of the earth.
iii. The moment the space shuttle entered the moon’s gravitational field.
iv. The moment the astronaut Neil Armstrong placed his first step on the surface of the moon.
v. The moment the astronauts landed on the sea in their return voyage to earth.
2019
21. Which of the following made a significant contribution to the growth of Information and Communication
Technology (ICT) usage?
A. Exponential progress of the semiconductor technology paving the way for low-cost hardware.
B. Introduction of user-friendly software and interfaces to computers.
C. Merge of computer and communication technologies to produce smart and mobile devices.
DYLEN A. WOLFF 4
22. The diagram shows the variation of information with time for five events of a single mission in the
chronological order. Information about the entire mission especially about the occurrences of each event
is made available online real time.
DYLEN A. WOLFF 5
Introduction to Computer
2012
1. Who is considered as the first computer programmer?
i. John Von Neumann ii. Blaise Pascal iii. Charles Babbage
iv. John Presper Eckert v. Ada Augusta Lovelace
2. Which of the following technologies has been used in third generation computers?
i. Integrated Circuits – IC ii. Large Scale Integration – LSI
iii. Micro Processors iv. Transistors
v. Vacuum Tubes
4. The component that decodes the instructions fetched into the CPU is called the
i. Primary memory ii. Register unit iii. Control unit
iv. ALU v. Program counter
5. The component that decodes the instructions fetched into the CPU is called the
i. Main memory ii. Magnetic disk iii. CD/DVD
iv. Flash drive v. Hard disk
2013
7. High speed temporary storage, which is a part of the microprocessor that holds data and instructions
during the execution is called _________.
i. Registers ii. RAM iii. Virtual memory
iv. EPROM v. Flash memory
8. Microprocessors are usually compared by their clock speed, measured in _________ or by their word
side measured in _________ that can be processed in a single clock cycle. Which of the following is most
appropriate to fill the blanks in the above statement?
i. Bits, Megahertz ii. Bytes, Gigahertz iii. Gigahertz, Bytes
iv. Megahertz, Bits v. Seconds, Bits
DYLEN A. WOLFF 6
9. Which of the following components is located outside the microprocessor?
i. Arithmetic Logic Unit (ALU) ii. RAM
iii. Control Unit iv. Register
v. Level 1 cache memory
2014
12. One of the principal inventors of the Electronic Numerical Integrator and Computer (ENIAC) was
i. Blaise Pascal ii. Charles Babbage iii. John Von Neumann
iv. Ada Augusta Lovelace v. John Presper Eckert
13. Which of the following statements is correct with respect to the evolution of computing devices?
i. Vacuum tubes were used by Blaise Pascal to build the Pascaline.
ii. The Pascaline is considered as a first-generation computing device.
iii. Computers built using vacuum tubes are considered as second-generation computers.
iv. Electronic Numerical Integrator and Computer (ENIAC) was built using vacuum tubes
v. Apple I and Apple II are two examples for second generation computers.
DYLEN A. WOLFF 7
2015
16. Charles Babbage is considered as the “father of the computer” by some people. That is because he
i. invented the mechanical calculator Pascaline.
ii. invented the first re-programmable electronic computing machine.
iii. took the leadership in building the first personal computer at IBM.
iv. introduced the concept of “Input, Process and Output” that is used in modern computers, for the first
time
v. is the founder of the first electronic digital computer ENIAC (Electronic Numerical Integrator And
Computer)
18. Random Access Memory (RAM) modules are often compared by their capacity, measured in _________
and by their speed, measured in _________.
Most suitable words to full the blanks of the above statements are respectively
i. Kilobytes, Gigabytes ii. Gigabytes, Megabits per second
iii. Gigabytes, Megahertz iv. Megahertz, Kilohertz
v. Gigabits, Megabits per second
19. Which of the following is not a typical use of the Random-Access Memory (RAM) of a personal computer?
i. Keeping data for processing. ii. Holding instructions for operations.
iii. Providing storage for operating system. iv. Retaining information for output.
v. Keeping the BIOS program for boot-up.
20. Consider the following statements on Dynamic Random-Access Memory (DRAM) and Static Random-
Access Memory (SRAM):
A. Registers are made of DRAM
B. DRAM is faster than SRAM
C. DRAM is denser than SRAM
Which of the above statement(s) is/are true?
i. A only ii. B only iii. C only
iv. A and B only i. B and C only
2016
21. Which of the following statements is true?
i. The first-generation computers were build using transistors.
ii. Electronic Numerical Integrator and Computer (ENIAC) is a second-generation computer.
iii. Ada Lovelace is the inventor of the Analytical Engine.
iv. Alan Turing is considered as the first computer programmer.
v. The first calculating device is believed to be he Abacus.
DYLEN A. WOLFF 8
22. Which of the followings is a component of the Central Processing Unit (CPU)?
i. ROM ii. RAM iii. ALU
iv. L3 Cache memory v. Power supply unit
24. The content store in _________ is read by using the optical technology.
Which of the following answers is most appropriate to fil the blank in the above statement?
i. flash memory ii. floppy disk iii. magnetic tape
iv. compact disc v. hard disk
25. In modern computers, multiple levels of cache memory are used to optimize the performance. Among
them, the _________ cache which is on/in _________ is the fastest and most expensive cache memory.
Which of the following terms are correct to fill the blanks respectively in the above statement?
i. Level 1 (L1), main memory ii. Level 3 (L3), motherboard
iii. Level 1 (L1), microprocessor iv. Level 2 (L2), microprocessor
v. Level 3 (L3), microprocessor
26. Consider the following statements about Dynamic Random-Access Memory (DRAM):
A. Periodic refreshing is required for DRAM.
B. Registers in the processor are made of DRAMs.
C. Memory density of DRAM is higher than of Static RAM.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only
2017
28. Who proposed the stored program concept first?
i. Lady Ada Augusta ii. Charles Babbage iii. Howard Aiken
iv. Blaise Pascal v. Von Neumann
29. Which of the following components is generally seen outside the Central Processing Unit (CPU) of a
computer?
i. RAM ii. Control Unit iii. ALU
iv. General purpose registers v. L1 cache memory
DYLEN A. WOLFF 9
30. Which of the following secondary storage devices is generally considered to provide the fastest access to
data?
i. Compact Disk ii. Digital Versatile Disk iii. Internal hard disk
iv. Magnetic tape v. Floppy disk
32. Which of the followings is a main use of Complementary Metal-Oxide Semiconductor (CMOS) memory of
a personal computer?
i. Keeping inputs for processing ii. Holding instructions for operations
iii. Providing space for loading operating system iv. Retaining information for output
v. Keeping Basic Input Output System settings for the booting procedure
33. The execution of a series of non-interactive jobs on a personal computer with relative to its user is known
as _________.
i. multitasking ii. multiuser processing iii. multiprocessing
iv. batch processing v. online processing
DYLEN A. WOLFF 10
2018
37. Consider the following statements.
A. Word size is the number of bits processed by the CPU of a computer in a single action (instance).
B. Data bus width and register width are directly related to word size of a computer.
C. Word size of modern general-purpose computers is either 32 or 64 bits.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. B and C only v. All A, B and C
38. Which of the following correctly list the given computer storage components in the descending order of
access speed?
i. cache memory > main memory > magnetic disk > register
ii. magnetic disk > main memory > cache memory > register
iii. magnetic disk > main memory > register > cache memory
iv. register > cache memory > main memory > magnetic disk
v. register > main memory > magnetic disk > cache memory
40. Consider the following statements related to the development of computers over time.
A. Both processing speed and power consumption of computers have increased.
B. Processing speed of a computer has increased while physical size of a computer has decreased.
C. Both power consumption and the physical size of a computer have reduced.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C
2019
42. Which of the following is a hardware device that maps virtual addresses to physical addresses?
i. bus ii. cache memory iii. control unit
iv. memory management unit v. register
DYLEN A. WOLFF 11
43. In the memory hierarchy diagram given, which of the following represents A, B, C and D respectively?
A
Cache
memory
B
Optical Disk
i. Magnetic Tape, Magnetic (Hard) Disk, Random Access Memory (RAM), Processor Registers
ii. Processor Registers, Magnetic (Hard) Disk, Random Access Memory (RAM), Magnetic tape
iii. Processor Registers, Random Access Memory (RAM), Magnetic (Hard) Disk, Magnetic tape
iv. Processor Registers, Random Access Memory (RAM), Magnetic tape, Magnetic (Hard) Disk
v. Random Access Memory (RAM), Processor Registers, Magnetic (Hard) Disk, Magnetic tape
2020
44. A computer processor will operate fastest when the data that it wants is in the _________.
i. cache memory ii. hard disk iii. magnetic tape
iv. main memory v. optical disk
45. Which of the following hardware components will lose data when the power to a computer is switched
off?
A. registers
B. cache memory
C. main memory
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
46. Computer has evolved from the early main frames to the relatively small smart devices with high
computing power used today. Which of the following inventions contributed to reduce the physical size
of computers?
i. bus ii. integrated circuits iii. registers
iv. solid state memory v. vacuum tubes
DYLEN A. WOLFF 12
47. Consider the following diagrams showing some hardware component connections on a computer system.
The hardware port within the CPU indicated by Ⓐ in the above diagram has a set of registers that has
the memory translation maps of the currently running process. When given an input virtual address of
the currency process it outputs the relevant physical address (if any).
The Ⓐ in the above diagram denote the
i. Arithmetic and Logic Unit (ALU) ii. Control unit
iii. L1 cache memory iv. Memory management unit
v. Page table
DYLEN A. WOLFF 13
Number systems - Data Representation
2012
1. The binary equivalent to 3710 is
i. 0100101 ii. 0100111 iii. 0100100
iv. 0110110 v. 0110111
2. 1448 + 1758 =
i. 2258 ii. 3418 iii. 4418
iv. 5318 v. 3148
2013
3. The binary number equivalent to the 2510 is
i. 0100101 ii. 0100111 iii. 0011001
iv. 0010110 v. 0010111
4. 1248 + 1658 =
i. 2018 ii. 28910 iii. 2898
iv. 3118 v. 3898
2014
6. The decimal equivalent to 1001112 is
i. 40 ii. 39 iii. 38 iv. 37 v. 36
7. 4A616 + 9910 =
i. 61516 ii. 61510 iii. 50910
iv. 50916 v. 65916
2015
9. The decimal number equivalent to 1101102 is
i. 39 ii. 48 iii. 54 iv. 55 v. 108
DYLEN A. WOLFF 14
11. What is the two’s complement representation of 610?
i. 11111010 ii. 00000110 iii. 11111001
iv. 01011111 v. 00000101
2016
12. 10116 + 1108 =
i. 42910 ii. 101110 iii. 32910 iv. 52910 v. 13710
2017
48. What is the two’s complement representation of 45, of am integer is represented by 8 bits?
i. 11010011 ii. 10110011 iii. 11001101
iv. 00101111 v. 00101101
49. Which of the following numbers is equivalent to the binary number 1011112?
i. 578 ii. 5716 iii. 5710 iv. 5916 v. 5F16
2018
52. Consider the following three numbers in decimal, octal and hexadecimal notations, respectively.
A. 23110 B. 3478 C. E716
Which of the above is/are equivalent to 111001112 in binary notation?
i. A only ii. B only iii. A and C only
iv. B and C only v. All A, B and C
2019
54. Which of the following represents the bitwise AND operation of the two binary numbers 01010101 and
10101010?
i. 00000000 ii. 00001111 iii. 11001100
iv. 11110000 v. 11111111
DYLEN A. WOLFF 15
55. Which of the following represents the result of the binary arithmetic operation of 11001100 – 01010101?
i. 00110011 ii. 01100110 iii. 01110111
iv. 10011001 v. 10101010
56. Which of the following statements is/are true about two’s complement?
A. Subtraction is carried out as addition
B. Calculations are more efficient
C. It is possible to represent negative numbers within the two’s complement.
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C
58. Consider the two binary numbers P = 10110001 and Q = 01001110. If X = P OR Q and Y = P AND Q, what
will be the values of X and Y respectively?
i. 01001110, 10110001
ii. 10110001, 00000000
iii. 10110001, 11111111
iv. 11111111, 00000000
v. 11111111, 10110001
61. Consider the character representations in Table 1 and Table 2 given below.
අ ආ ඇ ඈ அ ஆ இ ஈ
Table 1: Table 2:
0D85 0D86 0D87 0D89 0B85 0B86 0B87 0B88
In which of the character encoding systems given below, the above characters in Table 1 and Table 2 are
represented?
i. Both Tables 1 and 2 : in ASCII
ii. Both Tables 1 and 2 : in UNICODE
iii. Table 1: in ASCII, Table 2: in UNICODE
iv. Table 1: in EBSIDIC, Table 2: in ASCII
v. Table 1: in UNICODE, Table 2: in ASCII
DYLEN A. WOLFF 16
Boolean | Logic Fundamentals of Digital Circuits
2012
1. What would be the result if the following Boolean expression is simplified?
𝐹(𝑥, 𝑦) = 𝑥𝑦(𝑥 + 𝑦)(𝑦 + 𝑦)
i. 𝑥 ii. 𝑦 iii. 𝑥
iv. 𝑦 v. 𝑥𝑦
2. Which of the following Boolean expressions represent the output of the given logic gate?
i. 𝐴 + 𝐵 + (𝐵 ∙ 𝐶)
ii. 𝐴 + 𝐵 ∙ (𝐵 ∙ 𝐶)
iii. (𝐴 + 𝐵) + (𝐵 ⋅ 𝐶)
iv. 𝐴 ⋅ 𝐵 + (𝐵 ∙ 𝐶)
v. (𝐴 ⋅ 𝐵) + (𝐵 + 𝐶)
2013
3. The Boolean expression (x + y).(x + z) simplifies to _________.
i. x ii. x.(y + z) iii. x . y . z
iv. x + y . z v. x + y + z
4. Which of the following Boolean expressions represent the output (Q) of the circuit given below? A and B
are inputs.
i. A’.B’+A.B’
ii. A’.B’+A.B
iii. A.B+A’.B’
iv. A’.B+A.B’
v. A’.B+A’.B’
5. Which of the following is an incorrect Karnaugh Map layout to represent a Boolean function of four (4)
Boolean variables a, b, c and d?
i. ii. iii.
iv. v.
DYLEN A. WOLFF 17
2014
1. Consider the following logic circuit
2. Which of the following circuit diagrams represents a simplified version of the above circuit?
i. ii.
iii. iv.
v.
3. Consider the following circuit with four push button switches namely: S1, S2, S3 and S4. These four
switches can either be in pushed or released states which are represented by 1 and 0 respectively.
Which of the following Boolean expressions represents the function of the bulb, if the on state of the bulb is
represented by the value 1?
i. S1 + (S2 . S3) + S4 ii. (S1 + S2) . (S3 + S4) iii. (S1 . S2) + (S3 . S4)
iv. S1 . S4 . (S2 + S3) v. S2 + (S1 . S4) + S3
2015
6. Consider the following combinatory circuit implemented using universal gates:
DYLEN A. WOLFF 18
2016
7. Consider the following combinatory circuit implemented using universal gates:
2017
8. Consider the following statements on using NAND, NOR gates over NOT, AND, OR gates when
constructing logic circuits:
A. They make logic circuit design simpler.
B. They help to construct logic circuits that consumes less electricity.
C. They make logic circuit construction more economical.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only
2018
9. Consider the following Boolean expression.
𝐴 + 𝐵 ⋅ 𝐶̅
Which of the following is/are equivalent to the above expression?
I. 𝐴̅ + 𝐵 ⋅ 𝐶
II. 𝐴̅ + 𝐵 ⋅ 𝐶
III. 𝐴̅ + 𝐵 ⋅ 𝐶
i. I only ii. II only iii. III only
iv. I and II only v. II and III only
I II III
DYLEN A. WOLFF 19
2019
Consider the following logic circuit diagram to answer the questions 11 and 12.
11. Which of the following statements is/are correct about the above circuit?
I. It implements a full adder.
II. The logic function of S can be stated as S = A ⊕ B ⊕ Cin
III. The logic function of Cout can be stated as Cout = AB + BCin + ACin
i. I only ii. II only iii. I and II only
iv. II and III only v. All I, II and III
12. Which of the following statements is/are correct about the part of the circuit within the are surrounded
by the dotted line?
I. It implements a half adder.
II. It can be implemented using only AND and OR gates.
III. It can be implemented using only NAND gates.
i. I only ii. II only iii. I and II only
iv. II and III only v. All I, II and III
14. Which of the following is the most simplified expression equivalent to 𝐴𝐵 𝐶̅ + 𝐵𝐶̅ + 𝐴̅𝐵 𝐶 + 𝐵𝐶 ?
i. 𝐴𝐵 𝐶̅ + 𝐴̅𝐵 𝐶 + 𝐵 ii. 𝐵 (𝐴𝐶̅ + 𝐴̅𝐶 ) + 𝐵
iii. 𝐶̅ (𝐴𝐵 + 𝐵) + 𝐶(𝐴̅𝐵 + 𝐵) iv. 𝐴𝐶̅ + 𝐴̅𝐶 + 𝐵
v. 𝐴̅𝐶̅ + 𝐵
DYLEN A. WOLFF 20
15. A block diagram of a sequential logic circuit is shown below, with one block labelled as “A” and the other
labelled as “B”
Which of the following statements about the above block diagram are correct?
I. The block A is a combinational logic circuit.
II. The block B is a memory element
III. Only the block A can be implemented using logic gates.
i. Only I ii. Only II iii. Only I and II
iv. Only I and III v. All I, II and III
If the required output of the above circuit is 𝐴𝐵 + 𝐴̅𝐵 + 𝐶̅ , then what should the inputs X and Y be?
i. 𝑋 = 𝐵 and 𝑌 = 𝐶 ii. 𝑋 = 𝐵 and 𝑌 = 𝐶̅ iii. 𝑋 = 𝐵 and 𝑌 = 𝐶
iv. 𝑋 = 𝐵 and 𝑌 = 𝐶 ̅ v. 𝑋 = 𝐶̅ and 𝑌 = 𝐵
DYLEN A. WOLFF 21
OS | Computer Operating System
2012
1. The type of operating system that is most suitable for an automated air traffic control system is
i. Multi-user multi-tasking ii. Single-user multi-tasking iii. Real time
iv. Single-user multi-tasking v. Multi-threading
2. The main advantage of creating more than one partition in a hard-disk is the
i. Separation of the operating system and program files
ii. Ability to retrieve files efficiently
iii. Easiness of making directories and subdirectories
iv. Easiness of creating multiple users
v. Easiness of taking backups of selected files
2013
3. Sharing a single microprocessor among number of application programs using context switching is known
as
i. Multi-user processing ii. Multi-tasking iii. Multi-processing
iv. Batch processing v. Online processing
2014
5. Which of the following is not a main function of an operating system?
i. Memory management ii. Process scheduling iii. File handling
iv. Virus detection v. User interfacing
6. In an operating system, moving a process from the main memory to the secondary storage in order to
bring another process to the main memory is called _________.
i. Demand paging ii. Context switching iii. Swapping
iv. Interrupting v. Scheduling
2015
7. An application which requires more memory space than the maximum memory space available in the
primary memory of a computer is ready for execution. Which of the followings is used by the operating
system of that computer to satisfy this need?
i. Random Access Memory (RAM) ii. Read Only Memory (ROM)
iii. Cache Memory iv. Virtual Memory
v. Extended Memory
DYLEN A. WOLFF 22
8. The feature in modern operating systems which allows the automatic installation of new hardware
devices connected to a computer is commonly known as __________.
i. Add/Remove Hardware ii. Easy Installer iii. Plug and Play
iv. Add Hardware Utility v. Fetch and Store
2016
9. In an operating system, suspending the currently executing process and then resuming or starting
another process is termed as
i. paging ii. context switching iii. swapping
iv. interrupting v. blocking
10. In modern operating system, the _________ scheduler determines the transition of the processes from
the new state to the ready state.
Which of the followings is the correct term to fill the blank in the above statement?
i. mid-term ii. long-term iii. very long-term
iv. very short-term v. short-term
2018
11. Consider the following statements.
A. Disk defragmentation files that are fragmented in a disk, contiguous.
B. Swapping is a memory management technique where the main memory contents which were not
recently used are copied to disk to make the memory available for other processes.
C. A File Allocation Table (FAT) is a able that an Operating System maintains which provides a map of
the clusters that a file has been stored in.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
12. Through which of the following, will a device controller that controls a device deal with the operating
system?
i. Application software ii. Assembler iii. Compiler
iv. Device driver v. Utility software
2019
13. On his single processor computer, a user starts a spreadsheet application and creates a new spreadsheet.
To set some information required for the spreadsheet he opens a large database using his Database
Management System (DBMS). After completing his spreadsheet, he saves it.
Which of the following Operating System features has/have been used by the above user?
A. Context switching
B. File management
C. Virtual memory
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C
DYLEN A. WOLFF 23
14. Consider the process transition diagram given in the figure.
If the transitions shown are as follows;
1. Process blocks for input/output
2. Scheduler picks another process
3. Scheduler picks this process
4. Input/output is completed
Then what are the states indicated by the labels A, B and C respectively?
i. A: Blocked B: New C: Ready
ii. A: New B: Ready C: Running
iii. A: Ready B: Running C: Blocked
iv. A: Running B: Blocked C: Ready
v. A: Running B: New C: Blocked
15. Which of the following is not an information stored in a Process Control Block (PCB) of the operating
system?
i. Free disk slots (free disk blocks that could be utilized by the process)
ii. Memory management information for the process
iii. Program counter (address of the next instruction to be executed for the process)
iv. Process identification number (unique identifier for the process)
v. Process state (e.g.: blocked, ready, etc)
2020
16. The operating system (OS) is another program that runs on the computer that has some special
responsibilities. Memory management, file management and input/output management are some of
these responsibilities. What is another important responsibility of the OS?
i. Backup management ii. Cache memory management
iii. Compiler management iv. Process management
v. System clock management
17. When the number of processes started by a user on a single-processor computer increases, what happens
to the response time of each process as perceived by the user and the memory management related
work of the operating system respectively?
i. Both the response time and the memory management related work increase.
ii. Response time decreases while the memory management related work increases.
iii. Response time increases while the memory management related work decreases.
iv. Both the response time and the memory management related work decrease.
v. There is no change in either of them.
DYLEN A. WOLFF 24
19. In a computer, the size of user program could exceed the size of physical memory. Also, only the
demanded areas of programs are kept in physical memory.
The above are due to which of the following?
i. The use of cache memory.
ii. The use of contiguous file allocation.
iii. The use of a file allocation table (FAT).
iv. The use of memory management unit (MMU)
v. The use of pages, frames and page tables.
DYLEN A. WOLFF 25
Networking | Data Communication and Networking
2012
1. In computer networks, acronym DHCP stands for
i. Dynamic Host Control Protocol
ii. Dynamic Host Configuration Protocol
iii. Domain Host Configuration Protocol
iv. Dynamic Host Configuration Protocol
v. Dynamic Host Control Parameters
3. The command that can be used to check the network configuration of a computer is
i. Traceroute ii. Netstat iii. Hostname
iv. Ipconfig v. Pin
4. Which of the following statements is correct about IP addresses and subnet masks?
i. 92.248.32.3 is a Class B IF address
ii. A network with a subnet mask 255.255.255.248 can accommodate six hosts.
iii. An IP address consists of 16 bits
iv. 10.32.1.5 is a Class C IP address
v. 255.255.255.0 is a Class C IP address
2013
6. What is the main function of a PROXY server in Internet communication?
i. Allocate and release IP addresses
ii. Translate domain names to IP addresses
iii. Protect a network from viruses
iv. Provide printing services to users
v. Share an Internet connection among several computers
DYLEN A. WOLFF 26
7. An organization has been allocated a class C IP address range having a subnet mask of 255.255.255.0. If
the organization is to setup a web server and an email server, what IP addresses that can be allocated to
these two servers?
i. 192.248.87.2, 192.248.32.3 ii. 192.248.87.4, 192.248.87.5
iii. 192.248.32.3, 192.248.33.3 iv. 192.248.40.2, 192.248.41.3
v. 192.248.87.1, 192.248.60.2
9. In the OSI reference model, detection of errors during communication between two computers in a
network is a function of the _________.
i. physical layer ii. data link layer iii. network layer
iv. transport layer v. application layer
10. The command that can be used to login to a remote computer network is
i. ipconfig ii. ftp iii. telnet
iv. tracert v. route
11. Which of the following devices can be used to connect two physical networks having IP addresses
72.110.0.0 (subnet mask 255.255.0.0) and 192.248.10.0 (subnet mask 255.255.255.0)?
i. Hub ii. Repeater iii. Switch
iv. Router v. Multiplexer
2014
12. Which of the following converts digital data to analog data to transmit over an analog telephone
network?
i. Network Interface Card (NIC) ii. Modem
iii. Multiplexer iv. Bluetooth adapter
v. Wi-Fi card
13. Computer attached to a LAN use the default gateway connected to the same network
i. to translate the domain names to IP addresses.
ii. to forward IP packets when they do not know any specific rout to the destination,
iii. as the firewall for the network.
iv. to send all the data packets to other computers in the same LAN.
v. to assign IP address to a computer on the LAN.
14. The command that can be used to measure the round-trip propagation delay between two computers
on the internet is _________.
i. ping ii. ipconfig iii. ssh iv. ftp v. telnet
DYLEN A. WOLFF 27
15. In the OSI seven-layer reference model. IP protocol maps to the _________ layer.
Which of the following is most appropriate to fill the blank in the above statement?
i. application ii. session iii. transport
iv. network v. physical
18. The ping command indicates that there is a 5% packet loss between computers X and Y. There is an FTP
server running on Y. A file is downloaded to X from Y using FTP protocol. Which of the following is the
most appropriate statement regarding this file download?
i. The downloaded file has exactly 5% of the data missing
ii. The downloaded file has more than 5% of the data missing
iii. The downloaded file has exactly 5% of the data in a different order than the original file.
iv. The downloaded file has the data exactly the same order as the original file.
v. FTP protocol cannot run on a network connection with errors.
2015
19. _________ is used for analog signal to digital signal conversion.
Which of the following is most appropriate to fill the blank in the above statement?
i. Amplitude Modulation (AM) ii. Frequency Modulation (FM)
iii. Pulse Code Modulation (PCM) iv. Phase Modulation (PM)
v. Time Division Modulation (TDM)
20. A computer network is configured with the IP address 192.248.16.91 and the subnet mask
255.255.255.128. Which of the following IP addresses cannot be assigned to a computer in the same
network?
i. 192.248.16.161 ii. 192.248.16.78 iii. 192.248.16.110
iv. 192.248.16.75 i. 192.248.16.120
21. Which of the following statements is correct with respect to the Transmission Control Protocol (TCP)?
i. TCP is a network layer protocol.
ii. TCP guarantees that each byte sent is received at the receiver.
iii. Only one application at a time can use TCP in a computer.
iv. HTTP uses TCP.
v. TCP uses User Datagram Protocol (UDP) as the transport protocol.
22. A LAN uses the subnet mask 255.255.240.0. How many different IP addresses can be assigned to devices
in this LAN?
i. 254 ii. 256 iii. 1024 iv. 2046 v. 4094
DYLEN A. WOLFF 28
23. Which of the following statements is correct with respect to routing in the internet?
i. There can be at most one router in any given LAN.
ii. A router can have more than one network interface.
iii. Routing is a functionality of the Transport Layer.
iv. All routers function as HTTP proxies.
v. The internet does not need routing if all applications use TCP.
24. In a public key encryption system, the private key of a person x is given by the function priv(x) and the
public key is given by pub(x). Consider the following statements.
A. pub(x) is used to encrypt a message that can only be decrypted using priv(x).
B. pub(x) is used to sign a message to be sent to x.
C. A message encrypted using pub(x) can be decrypted using pub(x).
Which of the above statement(s) is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only
25. Consider the following statements regarding a server with the domain name www.bogus.lk:
A. The server www.bogus.lk can be located anywhere in the world.
B. www.bogus.lk must be a web server.
C. The domain names www.bogus.lk and www.bogus.com can be resolved to the same IP address.
Which of the above statement(s) is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only
26. A file of 1 MB has been successfully sent from the machine X to machine Y in a network over a TCP
connection. It has been observed that the 10th byte of the file has passed through router R. Consider the
following statements regarding this communication:
A. The 10,000th byte must have gone through the router R after the 10th byte.
B. The 10,000th byte must have gone through the same path from X to Y as the 10th byte.
C. The 10,000th byte may or may not have gone through router R.
Which of the above statement(s) is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only
2016
27. “An analog signal is sampled at regular intervals and represented as 16-bit values.”
Which of the followings is best described by the above statement?
i. Amplitude Modulation (AM) ii. Frequency Modulation (FM)
iii. Pulse Code Modulation (PCM) iv. Phase Modulation (PM)
v. Pulse Width Modulation (PWM)
28. Two machines with the IP addresses 192.248.16.30 and 192.248.16.90 are connected to a Local Area
Network (LAN). Which of the following is a suitable subnet mask for this network?
i. 192.255.255.255 ii. 192.248.16.0 iii. 255.255.255.224
iv. 255.255.255.128 v. 255.255.255.255
DYLEN A. WOLFF 29
29. Which of the following is a correct IPv4 address?
i. 192.248.0.0.1 ii. 192.258.2.1 iii. 8.8.8.8
iv. 10.256.8.9 v. 255.255.255.268
32. In a public key cryptographic system, the private key of a person x is given by the function priv(x) and the
public key is given by the function pub(x).
Consider the following statements:
A. priv(x) and pub(x) should be the same for better security.
B. A message encrypted using pub(x) can be decrypted using pub(x).
C. The person x knows both priv(x) and pub(x).
Which of the above statements is/are correct?
i. A only ii. C only iii. A and B only
iv. A and C only v. B and C only
33. Local Area Network (LAN) has 500 network devices. What is the most appropriate subnet mask for this
computer network?
i. 255.255.255.0 ii. 255.255.255.128 iii. 255.255.255.192
iv. 255.255.255.224 v. 255.255.254.0
2017
34. The electronic mail systems, the protocol used by mail clients to retrieve messages from the mail server
is _________.
i. Simple Mail Transfer Protocol (SMTP) ii. File Transfer Protocol (FTP)
iii. Internet Control Message Protocol (ICMP) iv. Internet Message Access Protocol (IMAP)
v. Telnet
35. The transport layer protocol User Datagram Protocol (UDP) can be used for _________.
i. reliable communication ii. guaranteed delivery
iii. connection oriented communication iv. ordered delivery
v. exchanging state information among servers
DYLEN A. WOLFF 30
36. Which of the following statements regarding MAC address is correct?
i. Every network device has a unique MAC address.
ii. Every network host has a unique MAC address.
iii. Every network interface has a unique MAC address.
iv. It is assigned for a device at the time of installation.
v. It is used for routing.
37. The first and the last IP addresses of a subnet are 192.192.48.0 and 192.192.63.255 respectively. Which
of the following is the subnet mask of this subnet?
i. 255.255.255.0 ii. 255.255.192.0 iii. 255.255.255.192
iv. 255.255.240.0 v. 255.240.0.0
38. 172.16.48.200/24 is a
i. host address in a class B network.
ii. network address of a class C network.
iii. host address in 172.16.48.0/24 subnet.
iv. network address of a subnet with 255 hosts.
v. host address with 8 network bits.
39. In TCP/IP computer networks, Transport Protocol Data Unit (TDPU) is referred to as a _________.
i. packet ii. frame iii. segment
iv. window v. message
2018
41. Consider the following statements.
A. DHCP server in an IP network dynamically allocates IP addresses to network devices.
B. DNS server translates domain names to IP addresses.
C. FTP server caches the recently accessed web pages.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C
DYLEN A. WOLFF 31
42. Consider the following statements.
A. TCP is a connection oriented and a reliable protocol.
B. UDP is a connectionless and an unreliable protocol.
C. TCP and UDP are transport layer protocols.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C
43. In the OSI reference model, the network layer is responsible for _________ communication.
Which of the following is suitable to fill the blank in the above statement?
i. note to note ii. source to destination iii. hop to hop
iv. switch to router v. process to process
44. Which of the following indicates the number of host bits and the number of IP addresses respectively in
a class C network?
i. 8 and 256 ii. 8 and 65536 iii. 16 and 256
iv. 16 and 65536 v. 24 and 256
46. In the OSI reference model, a protocol data unit of the network layer is referred to as a _________.
Which of the following terms is suitable to fill the blank in the above statement?
i. frame ii. segment iii. window
iv. message v. packet
2019
47. Use of public key and private key in encryption and decryption process is called
i. asymmetric encryption ii. digital encryption iii. hybrid encryption
iv. private key encryption v. symmetric encryption
48. In a particular network, each node is connected directly to a central network device. This topology is
referred as to a _________.
i. bus ii. hybrid iii. mesh iv. ring v. start
DYLEN A. WOLFF 32
50. Which of the following options contains only guided media?
i. Coaxial, Fiber optics and Infrared ii. Coaxial, Fiber optics and Microwave
iii. Coaxial, Fiber optics and Twisted pair iv. Coaxial, Infrared and Infrared
v. Fiber optics, Satellite communication and Twisted pair
2020
54. What is the process carried out in the modulation technique in data transmission?
i. Encoding information in transmission signal.
ii. Encoding signals in transmitted information.
iii. Extracting information from the transmitted signal.
iv. Extracting signal from the transmitted information.
v. Transfer information with minimum distortion.
55. Which of the following statements about bus topology are incorrect?
A. Computers and network devices are connected to a single cable.
B. All traffic flows are either clockwise or anticlockwise.
C. Bandwidth is shared among the nodes.
D. Each node is connected to two of its neighbours.
i. A and B only ii. A and D only iii. B and C only
iv. B and D only v. C and D only
DYLEN A. WOLFF 33
56. Consider the following statement with a blank.
A Media Access Control address (MAC) address is usually represented in _________ numbers.
Which of the following is suitable to fill the blank?
i. binary ii. decimal iii. hexadecimal
iv. natural v. octal
57. You are requested to create 16 subnets with Class C IP. Which subnet mask is suited to create the subnet?
i. 255.255.255.240 ii. 255.255.255.248 iii. 255.255.255.250
iv. 255.255.255.252 v. 255.255.255.224
DYLEN A. WOLFF 34
System Analysis and Design
2012
1. Human blood circulatory system can be classified as a
i. Natural and closed system ii. Artificial and closed system
iii. Artificial and open system iv. Natural and open system
v. Natural and artificial system
2013
4. Which of the following can be best described as an expert system?
i. A bank teller machine ii. A fully automatic washing machine
iii. A microwave oven iv. An electronic blood pressure meter
v. A diagnosis system of a health care facility
5. Which of the following information system development models has an extremely short and linear
development process?
i. Waterfall model ii. Object-oriented model
iii. Spiral model iv. Incremental Development model
v. Rapid Application Development model
DYLEN A. WOLFF 35
7. Consider the following systems in a human body:
A. Respiratory system
B. Digestive system
C. Nervous system
D. Blood circulatory system
Which of the above are closed systems?
i. A and B only ii. A and C only iii. B and C only
iv. B and D only v. C and D only
2014
9. The Pilot, Phase, Direct and Parallel are four different kinds of system _________ strategies. Which of the
following is most appropriate to fill the blank in the above statement?
i. analysis ii. design iii. testing
iv. implementation v. maintenance
10. Which of the following segment of a Data Flow Diagram best represents the process of getting the contact
list of a mobile phone?
i.
ii.
iii.
iv.
`
v.
DYLEN A. WOLFF 36
11. Which of the following systems should always be based on Artificial intelligence?
A. Expert systems
B. Enterprise Resource Planning (ERP) Systems
C. Multi-agent systems
D. Geographical Information Systems
i. A and B only ii. A and C only iii. A and D only
iv. B and D only v. C and D only
13. Consider the following statements regarding the requirements of a bank ATM:
A. A customer shall be able to inquire his/her bank balance
B. A customer should be able to deposit money through ATM
C. Maximum withdrawal amount per day is Rs. 20,000.
Which of the above statement(s) is/are functional requirement(s) of the ATM?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only
2015
15. Consider the following statement regarding an Automatic Teller Machine (ATM) of a bank:
“System shall dispense cash in less than 10 seconds.”
Which of the following is correct with respect to the above statement?
i. This is an essential non-functional requirement.
ii. This is a nice to have non-functional requirement.
iii. This is an essential functional requirement.
iv. This is a nice to have functional requirement.
v. This is not a requirement of the system.
DYLEN A. WOLFF 37
16. Consider the following Data Flow Diagram:
According to the Structural System Analysis and Design Methodology (SSADM), the components A, B and
C in the above diagram represents _________ respectively.
i. an external entity, a process and a data flow
ii. a process, an entity and a data store
iii. a user, a process and a table in an electronic database
iv. a user, a function and a table in an electronic database
v. an external entity, a process and a data store
17. Which of the following statements is correct with respect to openness and closeness of a system?
i. An Automatic Teller Machine of a bank should be a close system.
ii. A general-purpose computer can be considered as an open system.
iii. Human blood circulatory system is an open system.
iv. A mobile phone is a close system.
v. A solar power generation system is a close system.
2016
18. Consider the following system implementation methods:
A. Direct B. Phase C. Parallel
Which of the above methods can be recommended to implement an emergency call handling system?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only
19. Which of the following statements is an example for an essential non-functional requirement of an
internet banking system?
i. System shall facilitate its users to open accounts.
ii. System shall facilitate its users to check account balance.
iii. System shall use a 256-bit encryption for all communications.
iv. System should facilitate its users to order cheque books.
v. System should be able to render information on all popular web browsers.
20. Which of the following is the most appropriate example for a manual temporary data store?
i. A file tray ii. A cardboard file iii. A file cabinet
iv. A data file in a hard-disk v. A temporary data file in a hard-disk
DYLEN A. WOLFF 38
22. Which of the following high-level data flow diagram is correct with respect to the rules on data flow
modelling?
i.
ii.
iii.
Iv
v.
2017
23. Which of the following statements best describes a nice to have non-functional requirement of an
Automated Teller Machine (ATM)?
i. System shall facilitate users to withdraw money.
ii. System should let users to deposit money.
iii. System shall use 256-bit encryption for all communications.
iv. System should provide users a touchscreen interface.
v. System shall dispense money within 5 seconds.
24. The following symbol, appeared in a Data Flow Diagram (DFD) of a Sales Information System, represents
_________ containing payment details.
Which of the following is most appropriate to fill in the blank in the above statement?
i. file tray ii. cardboard file
iii. file cabinet iv. data file in a hard disk
v. temporary data file in a hard-disk
25. Which of the following organs is a part of a closed system of the human body?
i. Eye ii. Ear iii. Heart
iv. Kidney v. Lung
DYLEN A. WOLFF 39
26. Which of the following dataflow diagrams is correct with respect to the rules of a dataflow modelling?
i.
ii.
iii.
Iv
v.
28. Requirements of a system can be classified as Mandatory (Essential), Desirable (Optional), Functional and
Non-functional.
“ATM of a bank shall not allow more than three attempts to enter a user’s secret number incorrectly”
Which of following correctly classifies the above requirement?
i. Mandatory, Functional ii. Mandatory, Non-functional
iii. Desirable, Functional iv. Desirable, Non-functional
v. Mandatory or Desirable, Functional
DYLEN A. WOLFF 40
2018
30. Consider the following statements relevant to external entities of Data Flow Diagrams.
A. An external entity can be a person, system or organization that has predefined behaviour.
B. An external entity can be a source of input data for a process a process or/and a destination of
the output of a process.
C. External entities are always data stores.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C
32. Which of the following feasibility types is generally not carried out during the development of a system
to be used only in-house?
i. Economic feasibility ii. Market feasibility
iii. Operational feasibility iv. Organizational feasibility
v. Technical feasibility
33. Consider the following statements regarding functional and non-functional requirements of a sales
system.
I. Reads barcodes of items purchased and produces the invoice.
II. Accepts user’s request and responds in less than 1 second.
III. Processes a minimum of 1,000 transactions per second.
Which of the following is the correct classification of requirements?
i. I, II and III all functional
ii. I – functional, II and III – non-functional
iii. II – functional, I and III – non-functional
iv. I and III – functional, II – non-functional
v. I, II and III all non-functional
DYLEN A. WOLFF 41
35. Consider the following statements regarding Structured and Object-Oriented software development
methodologies.
A. Structured analysis and design represents systems as a hierarchy of functions.
B. Structured design is a system of interacting objects.
C. Object oriented methodology combines data and processes into individual entities.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
36. Which of the following shows the correct order of software testing?
i. acceptance testing system testing integration testing unit testing
ii. unit testing acceptance testing system testing integration testing
iii. unit testing integration testing acceptance testing system testing
iv. unit testing integration testing system testing acceptance testing
v. white-box testing black-box testing system testing unit testing
37. A software development company identifies that their new system development project has complex
requirements and has a medium to high risk level. Further, an evaluation is need to clear the
requirements and significant changes are expected during system development.
What is the most suitable software development process model for this project?
i. Agile ii. Prototyping iii. Spiral
iv. Waterfall v. Rapid Application Development
2019
38. Which of the following indicates a non-functional requirement?
A. A user shall be allowed to upload an image to the system to be used as his/her profile picture.
B. The correct invoice value should be calculated including the applicable tax rates at the check-out.
C. The system must satisfy 99.9% availability of service.
i. A only ii. B only iii. C only
iv. A and B only v. All A, B and C
2020
40. Which of the following statements regarding testing of a system are correct?
A. Black-box testing involves detailed checking of each line in the code.
B. Unit-testing helps to uncover errors in the codes.
C. System testing should not be performed prior to unit-testing.
i. A only ii. B only iii. C only
iv. A and C only v. B and C only
DYLEN A. WOLFF 42
41. Which of the following indicate functional requirements?
A. The users should be allowed to update their contact addresses and phone numbers.
B. Any user request must be responded within 2 ms.
C. The system must be easy to change.
i. A only ii. B only iii. C only
iv. A and C only v. All A, B and C
43. Which of the following statements on Data Flow Diagrams (DFD) is incorrect?
i. Context diagram is a DFD with the highest level of abstraction.
ii. All data stores in a system must be represented in the context diagram.
iii. Data flows are used to link the other components in DFDs.
iv. Elementary processes are not decomposed further.
v. External entities in DFDs act as sources or recipients of data.
DYLEN A. WOLFF 43
Database Management
2012
1. Which of the following statements is correct about relational databases?
i. The primary key of a table is selected from alternate keys
ii. Duplicate values are not allowed in a foreign key field of a table
iii. A table cannot be created without a primary key
iv. A foreign key of a table should be the primary key of another table
v. A table should have alternate keys
DYLEN A. WOLFF 44
6. Consider the following database operations
A. Remove records from a table
B. Add new data to a table
C. Modify the existing data in a table
D. Retrieve data from a table
“The SQL statements __________ should be used to perform the database operations A, B, C and D
respectively.”
Which of the following is most appropriate to fill the blank in the above statement?
i. delete, select, update and insert ii. delete, insert, select and update
iii. select, delete, insert and update iv. insert, select, delete and update
v. delete, insert, update and select
2013
8. Which of the following is the most appropriate Entity Relationship (ER) diagram to represent students’
participation in different sports in school?
i.
ii.
iii.
iv.
v.
DYLEN A. WOLFF 45
9. Which of the following is correct with respect to a relational database?
i. Any subset of Alternate Key is called Candidate Key
ii. A Primary Key is selected from Alternate Keys
iii. A Foreign Key is an Alternate Key
iv. Always Primary Key and Foreign Key are combined to create a Compound Key
v. Primary Key and Foreign Key establish the relationship between two tables
2014
12. Which of the following relations is in in the 3rd normal form?
i. student(studentIndexNo, name, parentName)
ii. sport(sportId, sportName, teacherName, teacherId)
iii. teacher(teacherId, teacherName, telephoneNumber, subjectName, subjectId)
iv. book(ISBN, title)
v. patient(patientId, patientName, ward, wardId)
DYLEN A. WOLFF 46
● Consider the following three tables in a relational database to answer questions 13 to 16.
subject exam examSubject
subjectId Title examId Name examId subjectId examDate
SUB001 I.C.T. EXAM001 GCE OL EXAM001 SUB001 2014.12.12
SUB002 Chemistry EXAM002 GCE AL EXAM002 SUB001 2014.08.21
SUB003 Physics EXAM002 SUB002 2014.08.21
EXAM002 SUB003 2014.08.21
13. Which of the following is the most suitable Entity Relationship (ER) diagram to represent the above
relational database tables?
i. ii.
iii. iv.
v.
14. Which of the following is the correct primary key for the examSubject table?
i. examId ii. examId, subjectId iii. examId, examDate
iv. subjectId, examDate v. examId, subjectId, name
15. Which of the following is the correct SQL statement to retrieve examId, name, name and examDate of all
examinations?
i. select examSubject.examId, name, examDate from exam, examSubject where
exam.examId = examSubject.examId
ii. select examId, name, examDate from exam and examSubject where
exam.examId = examSubject.examId
iii. select examId and name and examDate from exam and examSubject where
exam.examId = examSubject.examId
iv. select * from exam and examSubject where exam.examId = examSubject.examId
v. select * from exam, examSubject where exam.examId = examSubject.examId
16. Which of the following SQL statements changes only the date of examination of Physics paper of GCE AL
examination to 2014.08.25?
i. update examSubject set examDate=’2014.08.25’ where subjectId=’SUB003’ or ‘sub003’
ii. update examSubject set examDate=’2014.08.25’ where examId=’EXAM002’ or subjectId=’SUB003’
iii. update examSubject set examDate=’2014.08.25’ where examId=’EXAM002’ and subjectId=’SUB003’
iv. update examSubject set examDate=’2014.08.25’ where examDate=’2014.08.21’
v. update examSubject set examDate=’2014.08.25’ where examId=’EXAM002’ or subjectId=’SUB003’ or
examDate=’2014.08.23’
DYLEN A. WOLFF 47
2015
● Consider the following relations to answer the questions from 17 to 19.
programmer(programmerId, programmerName, gender, NIC, phoneNumber, degree, universityName)
client(clientId, clientName, address, phoneNumber)
project(projectId, projectName, clientId, startDate, endDate, cost)
workFor(programmerId, projectId, startDate, endDate)
18. Which of the following is correct with respect to attributes of the relations?
i. Attributes gender, NIC and phoneNumber are candidate keys of programmer relation.
ii. Attribute startDate is a derived attribute.
iii. Attribute NIC can be considered as an alternate key for the programmer relation.
iv. Attribute startDate is a foreign key for the workFor relation.
v. Each record in the workFor relation can be uniquely identified by using projectId.
DYLEN A. WOLFF 48
● Consider the following four relational database tables to answer questions 40 and 41.
item table supplier table
item product supplier name
T001 Laptop S001 BeLap Company Ltd.
T002 TV S002 DigiTV trading company
T003 Camera
delivery table
itemSupplier table item supplier batch quantity date
item supplier T001 S001 B01 450 1.5.2015
T001 S001 T002 S001 AB1 45 1.5.2015
T002 S001 T001 S001 B02 500 2.5.2015
T003 S002 T001 S002 C01 75 5.5.2015
21. Which of the following actions taken by a database management system when the SQL statement “delete
from item” is executed?
i. It will ask the user to select records for deletion.
ii. It may delete all the records from the ‘item’ table.
iii. It will drop the ‘item’ table.
iv. It will not delete any record from the ‘item’ table.
v. The SQL statement will not execute since it has errors.
vi.
22. Which of the following is correct with respect to the above tables?
i. All the tables are in third normal form.
ii. Normalization has been applied to these tables.
iii. Integrity constraints are correctly applied to these tables.
iv. There is no evidence to say that integrity constraints are applied properly.
v. Normalization and integrity constraints are properly applied.
2016
● Consider the following relation to answer questions 23 and 24.
book (BN, title, publisher, version, author1, author2, author3)
where BN is a unique code.
23. Which of the following statements is correct with respect to the above relation?
i. It is in zero normal form. ii. It is in the 1st normal form.
iii. It is in the 2nd normal form. iv. It is in the 3rd normal form.
v. Its normal form cannot be decided.
24. Which of the followings can be a candidate key of the above relation?
i. BN ii. publisher iii. version
iv. author1 v. author2
25. Which of the following Is correct with respect to the term ‘domain’ in a relational database?
i. It is a set of possible names for a table.
ii. It is a set of possible names for an attribute.
iii. It is the collection of all possible primary keys.
iv. It is the set of all possible values of an attribute.
v. It is the collection of foreign keys.
DYLEN A. WOLFF 49
26. Which of the following is correct with respect to the output of an SQL statement?
i. It generates an error if no data is available in the tables referred in the SQL statement.
ii. It is always a table.
iii. The order of the attributes in the output should be the same as the order of attributes in the table
definition.
iv. Outputs cannot be produced if the primary keys are not defined.
v. Names of the attributes in the output should be the same as the names in the table definition.
27. The length of an attribute defined using a Data Definition Language (DDL) statement is a/an _________
constraint.
Which of the following is the most appropriate to fill the blank in the above statement?
i. primary key ii. foreign key iii. null value
iv. domain v. application
2017
● Consider the following relation to answer questions 29 and 30.
Student (index_no, national_id_no, date_of_birth, gender, blood_group)
where index_no is a unique attribute and the name attribute fully depends on the index_no attribute.
29. Which of the following statements is correct with respect to the normal form of the above relation.
i. It is in the zero normal form ii. It is in the first normal form
iii. It is in the second normal form iv. It is in the third normal form
v. Its normal form cannot be decided
30. Which of the followings can be a candidate key of the above relation?
i. national_id_no ii. name iii. date_of_birth
iv. gender v. blood_group
DYLEN A. WOLFF 50
Consider the following relations to answer questions 31 to 34.
book (book_no, title, publisher. edition)
author (authorid, name, email_address)
bookAuthor (book_no, author_id)
where book_no and author_id are unique attributes in the relations book and author respectively.
31. Which if the following statements is correct with respect to the relation bookAuthor?
i. book_no is the primary key.
ii. author_id is the primary key.
iii. Any single attribute can be a candidate key.
iv. author_id is a candidate key.
v. book_no is a part of the primary key.
32. Which of the following Entity Relationship (ER) diagram correctly represents the relation between the
entities represented by the above relations?
i.
ii.
iii.
Iv
v.
33. Assume that above relations are converted into tables in a relational database. The following SQL query
is executed on the database:
SELECT * FROM bookAuthor
Which of the following statements is correct regarding the output of the above SQL query?
i. It cannot be an empty field.
ii. title column is in it.
iii. name column is in it.
iv. All the tables book, author and bookAuthor are used to produce the output.
v. All the records in the bookAuthor table are in the output.
34. Consider the following statements regarding the Data Definition Language (DDL) used to create the table
bookAuthor while maintaining data integrity:
A. It has a primary key constraint.
B. It has a foreign key constraint.
C. It has a domain constraint.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
DYLEN A. WOLFF 51
2018
35. Consider the following statements regarding databases.
A. Candidate key is a column, or a set of columns that can uniquely identify a row in a table.
B. Alternate key is any candidate key that has not been selected as the primary key.
C. Primary key can have a NULL value.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C
Consider the following relational schema consisting of text fields in answering questions 39 and 40.
Students (admission_number, surname_with_initials, house_number, street_name, village,
postal_town, postal_code)
Assume that for a given postal_town, only one postal_code exists.
38. Consider the following statements.
A. Students relation is not normalized.
B. Students is a relation in First Normal Form (1NF) only.
C. In normalization terms, Students is a relation in Second Normal Form (2NF) and hence also in 1NF.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and C only
iv. B and C only v. All A, B and C
DYLEN A. WOLFF 52
40. Consider the following statements relating to Entity Relationship (ER) modelling.
A. Cardinality specifies how many instances of an entity relates to one instance of another entity.
B. An entity is a “thing” or an “object” in the real world that can be identified separately
(distinguishable) from all other objects.
C. Cardinality specifies primary key attributes of an entity.
Which of the above is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
2019
Consider the following database table to answer the questions 42 to 44.
Student_Sport
Student_Id Event_Id Event_Name
10012 S-02 Carrom
10022 S-01 Basketball
10018 S-02 Carrom
10012 S-03 Volleyball
10025 S-04 Chess
10018 S-01 Basketball
43. It is required to add new field called Age Student_Sport table and the values of the new field must be
greater than 10.
Which one is the correct SQL statement to implement the above statement?
i. Alter table Student_Sport add check (Age > 10);
ii. Alter table Student_Sport add where (Age > 10);
iii. Alter table Student_Sport set check (Age > 10);
iv. Update table Student_Sport add check (Age > 10);
v. Update table Student_Sport add where (Age > 10);
44. Which of the following SQL commands is not available in the Data Manipulation Language (DML)?
i. Create ii. Delete iii. Insert
iv. Select v. Update
DYLEN A. WOLFF 53
45. Consider the following statements regarding the Extended Entity Relationship (EER) model.
A. EER model includes all the concepts of the original ER model.
B. EER model has additional concepts of specialization/generalization.
C. EER model includes a new concept to model the weak entities.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C
47. What is the correct SQL statement to delete a database called ‘ALdb’?
i. delete ALdb; ii. delete database ALdb; iii. drop ALdb;
iv. drop database ALdb; v. remove database ALdb;
48. Which of the following statements about a relation in the Second Normal Form (2NF) are true?
A. It can have a composite key.
B. It should be in the First Normal Form (1NF) as well.
C. All non-key attributes are fully functionally dependent on the primary key.
i. B only ii. C only iii. A and B only
iv. B and C only v. All A, B and C
49. Which of the following statements regarding the logical database schema are true?
A. It is a blueprint for a database.
B. It contains data and information
C. It formulates all the constraints that are to be applied on the data.
i. A only
ii. A and B only
iii. A and C only
iv. B and C only
v. All A, B and C
DYLEN A. WOLFF 54
Consider the following scenario about ‘authors’ and ‘book’ to answer the questions 52 and 53.
“An author can write books. A book has a title and a code called ISBN which is unique. A book can be
written by either one or several authors. An author has a name and a unique ID. An author can have a
type as either chief author or a co-author for a particular book.”
51. Which of the following is the most suitable Entity Relationship (ER) representation for the above
scenario?
i.
ii.
iii.
iv.
v.
52. How many tables can be derived initially, when mapping the entity relationships in the above scenario to
a relational database?
i. 1 ii. 2 iii. 3 iv. 4 v. 5
DYLEN A. WOLFF 55
Programming
2012
1. The required minimum and maximum working hours per day for an employee in a factory are 5 and 12
respectively. Which of the following is the most appropriate validation check to ensure that the integer
value entered as the working hours, through a web-based form is correct?
i. Range ii. Length iii. Type
iv. Numeric value v. Number of digits
DYLEN A. WOLFF 56
6. Consider the following assignment statements
A. a, b = “Nimal”, 30 B. a, b = 1 C. a = b = 1
D. a = True E. a = true
Which of the above are syntactically correct Python statements?
i. A and C only ii. B and D only iii. A, C and D only
iv. B, D and E only v. C, D and E only
ii.
iii.
iv.
v.
DYLEN A. WOLFF 57
9. Consider the following incomplete Python statement
To arrange the data items in the “name” data structure in the reverse alphabetical order, which of the
following Python statements should be included at the blank line?
i. (name[i] < name[k]): ii. (name[i] > name[k]): iii. (name[i] = name[k]):
iv. (name[i] < name[k]); v. (name[i] < name[k]);
After executing the program, what would be the content of the file “output.txt” looks like?
i. ii.
iii. iv.
v.
DYLEN A. WOLFF 58
2013
12. What is the output of the following Python program?
13. Which of the following is a valid Python statement that can be used to pent a filed called “output.txt” so
that new data can be added to the end of the file without deleting its original content?
i. open = infile (“output.txt”, ”r”) ii. infile = open (“output.txt”, ”r”)
iii. infile = open (“output.txt”, ”a”) iv. open = infile (“output.txt”, ”a”)
v. infile = open(“output.txt”, ”w”)
17. What is the value after executing the Python expression 10 – 3 * 2 + 2.0?
i. 16 ii. 16.0 iii. 6 iv. 3.0 v. 28
iv. v.
DYLEN A. WOLFF 59
● Use the following flowchart to answer the questions 19 and 20
19. What is the output of the algorithm represented by this flowchart?
i. 0 ii. 5
iii. 4 iv. 10
v. 15
iii.
v.
2014
21. Which of the following statements is true with respect to comments in programming languages?
i. Machine languages belong to the second-generation programming languages.
ii. Assembly language programs can run directly on any computer.
iii. Assembly language belong to the first-generation programming languages.
iv. Assembly language is more human readable form of machine language.
v. Machine language programs can be translated into assemble language program by using assemblers.
22. Which of the following statements is true with respect to comments in programming languages?
i. At the time of execution, comments are translated into special machine instruction.
ii. Comments should always be limited to a single line.
iii. Comments should start with the symbol # in all programming languages.
iv. It is a good practice to include comments in a program to explain its functionality.
v. In Python programming, comments should always start at the first column.
iii. iv.
v.
DYLEN A. WOLFF 60
● Use the following flowchart to answer questions 25 and 26.
25. If a user input 20, 27, 18 for
the variables A, B, C
respectively, the output
will be
i. 18
ii. 20
iii. 27
iv. 20, 27
v. 27, 18
26. Which of the following Python programs correctly implements the above flowchart?
i. ii.
iii. iv.
v.
DYLEN A. WOLFF 61
27. What will be the output when the following Python code is executed?
28. What is the value of variable z after executing the Python statement z = 1 == 2?
i. 0 ii. 1 iii. True iv. False v. Null
29. Which of the following Python expression shows the correct evaluation order of the Python expression
10 + 4 * 3 / 2 – 5?
i. (((10 + 4) * 3) / 2) – 5 ii. ((10 + (4 * 3)) / 2) – 5 iii. 10 + (4 * ((3 / 2) – 5))
iv. 10 + ((4 * (3 / 2)) – 5) v. (10 + ((4 * 3) / 2)) – 5
30. Consider the following statements about syntax or semantic errors in Python programming language:
A. A program with syntax errors will not run to the end of the program.
B. A program with only semantic errors will not run to its end.
C. Syntax errors in programs is also called logical errors.
D. Programs with semantic errors man not produce correct outputs for some inputs.
Which of the following statements is correct?
i. A and B only ii. A and C only iii. A and D only
iv. B and C only v. B and D only
2015
31. Consider the following statements about computer programming languages:
A. The processor of a typical computer an understand and execute only the machine language of that
processor.
B. The processor of a typical computer can understand and execute any machine language of any
processor.
C. The processor of a typical computer can understand and execute any program in any assembly
language.
D. The processor of a typical computer can understand and execute Python language.
Which of the following statement(s) is/are true?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. C and D only
DYLEN A. WOLFF 62
● Questions 67 to 70 are based on an algorithm represented by the flowchart.
33. Consider the following statements:
A. This algorithm takes only a single input
B. This algorithm does not have any repetition (loop)
C. If the user inputs -1 for X, the algorithm will not terminate.
D. When the user inputs 1 for X, the algorithm will not terminate
till the user enters another value.
Which of the above statement(s) is/are correct?
i. A only ii. A and B only
iii. A and D only iv. B and C only
v. C and D only
36. Which of the following Python programs implements the behaviour of the flow chart?
i. ii.
iii. iv.
v.
DYLEN A. WOLFF 63
● Questions from 71 to 74 are based on the following Python program.
38. What is the data type of the variable ‘temp’ in this Python code?
i. Integer ii. Float iii. Boolean iv. Tuple v. List
39. What is the return data type of the function named ‘f’?
i. Integer ii. Float iii. Boolean iv. Tuple v. List
40. Which of the following value/s is/are in the output of the above program?
i. 23 and 45 ii. 45 and -2 iii. -2 and 0 iv. 0 v. 23
2016
41. Consider the following statements about compilers and interpreters used in programming languages.
A. Compilers/Interpreters are not required to execute a program written in assembly language.
B. Compilers are not essential to execute a program written in machine code.
C. An executable program is translated into a source program by a compiler.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only
DYLEN A. WOLFF 64
43. The algorithm represented by the following flowchart reads 5 numbers and prints the sum of them.
In order to execute the flowchart correctly, A and B should
be replaced by _________ respectively.
i. i = 0 and i <= 5
ii. i = 1 and i = 5
iii. i = 0 and i > 5
iv. i = 1 and i <= 5
v. i = 1 and i >= 5
44. Which of the following Python program computes the sum of five given integers?
i. ii.
iii. iv.
v.
DYLEN A. WOLFF 65
46. Cof the following Python code segments is syntactically incorrect?
i. ii. iii.
iv. v.
What would be the data types of variables d1, d2 and d3 respectively after the execution of the
programming segment?
i. tuple, tuple, tuple ii. string, tuple, tuple iii. char, tuple, list
iv. string, tuple, list v. tuple, tuple, list
49. What will be the value of the variable x, after executing the following Python statement?
x = 3 – 4 * 6 / 3 + 12 / 4 * 3
i. -5.0
ii. -4.0
iii. -1.0
iv. 4.0
v. 5.0
iv. v.
DYLEN A. WOLFF 66
2017
51. Consider the following flowchart:
What is the error with the flowchart?
i. It has two end symbols.
ii. Print is not a valid keyword.
iii. It has no process box.
iv. It has two print symbols.
v. A flow direction is not correct.
53. Which of the following statements about Python data types/expressions is correct?
i. String is a mutable data type.
ii. List is an immutable data type.
iii. [1, 2, 3] is a tuple.
iv. The expression [1, 2, 3][1] will produce [2] when executed.
v. The type of {‘a’:1, 1:(1, 2)} is a Dictionary.
DYLEN A. WOLFF 67
57. The content of two files with names “in.csv” and “out.csv” are shown in the figures “Fig. 1” and “Fig. 2”
respectively.
Which of the following Python programs can be used to transform the data in “in.csv” to the content of
the file “out.csv”?
i.
ii.
iii.
iv.
v.
DYLEN A. WOLFF 68
58. Which of the following functions gives the sum of all elements of all elements in any list of integers?
i. ii.
iii. iv.
v.
2018
59. What is the output of the following Python code segment if executed with 30 as input?
DYLEN A. WOLFF 69
Questions 62-64 are based on the flowchart below. (Note that n % 3 represents n mod 2.)
63. If the following were fed as inputs to the above algorithm, what will
be the output?
2, 8, 9, 3, 4, 10, 6, 5, 13, 19, 12, 7
i. 10 ii. 30
iii. 42 iv. 49
v. 56
64. For any given input, outputs of which of the following Python
programs will be the same output produced by the algorithm in the
given flowchart?
I II
III
DYLEN A. WOLFF 70
66. Consider the following Python code segment with a blank line. (The line numbers on the left are shown
for guidance only. They are not part of the code.
The above code should consist of a programmer defined function named “sum”. Which of the following
should be entered in the blank on line 2, so that the function “sum” is correctly defined?
i. sum(arg1, arg2): ii. def sum(arg1, arg2):
iii. function sum(arg1, arg2): iv. def sum(arg1, arg2, s):
v. def sum( ):
2019
Consider the following flowchart to answer the questions 67 to 69.
67. Which of the following statements is/are correct about the algorithm
represented by the flowchart?
A. It takes 8 inputs.
B. It outputs the product of the positive numbers in the input.
C. If every input is zero, then the output will be zero.
68. Which of the following Python programs has/have the same functionality
(i.e., the same output for a given input) as the algorithm in the flowchart?
A B
DYLEN A. WOLFF 71
69. Which of the following statements is correct?
i. A high-level language program that is translated into machine code and executed on computer X will
not execute on another computer having the same processor as X.
ii. A program in a high-level language must be first converted into assembly language code before
converting into machine code.
iii. Interpreted programs run faster than compiled ones.
iv. Programs in some high-level languages are translated into a form called byte-code because such byte-
codes executes faster than machine codes obtained by usual compilations.
v. Some modern processors execute programs in high-level languages without translating them into
machine code.
71. What will be the output if the following Python code is executed with “abcabc” as the input?
73. What will be the output of the following Python code segment?
DYLEN A. WOLFF 72
74. What will be the result when the following Python code is executed?
i. 50 ii. 2 iii. 4
iv. Syntax error v. Name error
2020
75. Which of the following statements regarding compilers and interpreters are correct?
A. A compiler transforms an entire high-level language program into its machine code.
B. An interpreter convers each high-level program statement into the relevant machine code during
the program run.
C. Compile codes usually run faster than interpreted codes.
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
76. What would be the output of the following Python code, if the input was 17?
77. Suppose that S is a string, L is a list and T is a tuple in a Python program. The length of each is 10. Consider
the following Python statements.
I. S[2] = ‘2’
II. L[2] = ‘2’
III. T[2] = ‘2’
Which of the above three statements will generate an error?
i. Only I ii. Only II iii. Only I and II
iv. Only I and III v. All I, II and III
78. What would be the output of the following Python code segment?
DYLEN A. WOLFF 73
79. What would be the output when the following Python code is executed?
i. 1 ii. 2 iii. 3
iv. 4 v. an error occurred
80. What would be the output of the following Python code, if the input was 100?
DYLEN A. WOLFF 74
The questions 82 – 84 are based on he algorithm expressed by the flowchart. The algorithm takes a list L
of items and an item K is inputs and is expected to output the number of items in L that are equal to K.
List indices start at 0. Note that two entries labelled as Ⓟ and Ⓠ, in the flowchart are blank (unspecified).
II
III
DYLEN A. WOLFF 75
85. Consider the following Python program.
Which of the following statements are correct about the above program?
A. The content of the input file (inFile.txt) is checked in a loop, one line at a time.
B. The total content of one file is written onto another file.
C. If either of the two files does not exist, the program will stop and exit while executing the first two
lines of the code.
i. Only A ii. Only B iii. Only A and B
iv. Only A and C v. All A, B and C
DYLEN A. WOLFF 76
Web Development
2012
1. Which is the correct markup for a comment in HTML document?
i. <! Districts of Sri Lanka ii. <!-- Districts of Sri Lanka -->
iii. //Districts of Sri Lanka iv. <* Districts of Sri Lanka *>
v. <! Districts of Sri Lanka !>
C. D.
DYLEN A. WOLFF 77
6. Which of the following HTML codes generates the table shown below?
i ii.
iii.
v.
2013
7. Consider the following components:
A. Web authoring tool
B. Domain name
C. Web pages
D. Web server
Which of the above components are essential for hosting a website?
i. A and B only ii. B and C only iii. A, B and C only
iv. A. C and D only v. B, C and D only
DYLEN A. WOLFF 78
8. Which of the following tag is used to render a heading on an HTML page?
i. <h2> ii. <ol> iii. <ul>
iv. <hr> v. <td>
9. Which of the following could be used to define a new markup language for sharing information?
i. CSS ii. XML iii. HTML
iv. XHTML v. JavaScript
Which of the following shows the correct rendering of the above HTML code segment?
i. Teacher ii. Teacher
A person who teaches in a school - A person who teaches in a school
Student Student
A person who is studying at a school - A person who is studying at a school
v. Teacher
- A person who teaches in a school
Student
- A person who is studying at a school
11. Which of the following statements is correct with regard to HTML tags?
i. The <br> is used to render a blank line before and after the text.
ii. The <p> is used to render a blank line before and after the text.
iii. The <br> is used to render a blank line before the text.
iv. The <p> is used to render a blank line only before the text.
v. The <p> is used to render a blank line only after the text.
DYLEN A. WOLFF 79
2014
13. The following element is a markup for including an image to an HTML document. The name of the source
file of the image used is “arrow.jpg” which is in the same folder as the HTML document.
<img _________=”arrow.jpg”/>
Which of the following is most suitable to fill the blank in the above element?
i. alt ii. src iii. scr iv. href v. link
shop
Which of the followings is the correct markup to include in the index.html to link greeting.html
document?
i. <a href=”/greeting/birthday/greeting.html”>Greeting</a>
ii. <a href=”greeting/birthday/greeting.html”>Greeting</a>
iii. <a href=”shop/greeting/birthday/greeting.html”>Greeting</a>
iv. <a href=” birthday/greeting.html”>Greeting</a>
v. <a href=”greeting.html/birthday/greeting/shop/”>Greeting</a>
15. Which of the following is a client-side scripting language that is used to add interactivity to web pages?
i. CSS ii. PHP iii. XML
iv. HTML 2 v. JavaScript
DYLEN A. WOLFF 80
17. Consider the following HTML style rules:
A.
B.
C.
D.
Which of the above rules will display h1 elements and all the paragraph elements of the following in red?
2015
14. Consider the following list rendered by a web browser:
Which of the following HTML tags can be used to create the above list?
i. <dd> ii. <dl> iii. <li> iv. <ol> v. <ul>
20. What is the correct CSS rule to set the background colour of a web page to yellow?
i. body {body-color: “yellow”;} ii. body {bgcolor: yellow;}
iii. body {background-color: yellow;} iv. body {bgcolor = yellow;}
v. body {background-color: yellow;}
DYLEN A. WOLFF 81
2016
21. Consider the following description list, rendered by a web browser.
Zigzag
Moving with sharp turns.
Back and forth
Moving side to side.
Round and round
Moving in a circle
Which of the following answers contain all the HTML tags required to create the above list?
i. <di>, <dt> only ii. <ul>, <li> only iii. <ol>, <li> only
iv. <dl>, <li> only v. <dl>, <dt>, <dd> only
25. A web browser running on a client computer A renders a web-page in a web-server running on a
computer B. Which of the following is not a factor that affects the speed of rendering.
i. Size of the images in the web-page
ii. Number of colours in the web-page
iii. Speed of the client computer
iv. Efficiency of the web-browser software
v. Number of users in the network
2017
26. Which of the following is another name for web publishing?
i. Offline publishing ii. Desktop publishing iii. Media publishing
iv. Online publishing
v. Self-publishing
DYLEN A. WOLFF 82
27. Consider the following HTML code:
Which of the followings correctly describes the display, when the above code is rendered?
i. The text “Countries” appears on the title bar and the text “Sri Lanka” appears as a header.
ii. The text “Sri Lanka” appears on the title bar and the text “Countries” appears as a header.
iii. The text “Countries” appears on the title bar.
iv. The text “<!-- <h1> Sri Lanka </h1> -->” appears on the title bar.
v. The text “<!-- <h1> Sri Lanka </h1> -->” appears in the body of the page.
Which of the following tags/elements correctly implements the intended function of the above “Submit”
button?
i. <input type = “submit” value = “Submit”>
ii. <input type = “button” value = “Submit”>
iii. <button type = “button”>Submit</button>
iv. <button type = “submit”> </button>
v. <button type = “submit” value = “Submit”>
29. Which of the following CSS rules renders the image in the file “school.png” as the background web-page?
i. body { background = “school.png”; }
ii. body { background: url(“school.png”); }
iii. body { background-image = “school.png”; }
iv. body { background-image: “school.png”; }
v. body { background-image: url(“school.png”); }
DYLEN A. WOLFF 83
2018
30. Consider the following statements regarding HTML.
A. HTML frames are used to divide a browser window into multiple sections.
B. The rows attribute of <frameset> tag defines the number of vertical frames in an HTML page.
C. <frameset cols=”100,500,100”> creates vertical frames with the specified number of millimetres.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C
31. Consider the following HTML code with labels ❶-❸ and the expected output.
HTML code Expected output
<html>
<head><title>Coffee Shop</title></head> Coffee
<body> Black hot drink
<❶> Milk
<❷>Coffee</❷> White cold drink
<❸>Black hot drink</❸>
<❷>Milk</❷>
<❸>White cold drink</❸>
</❶>
</body>
</html>
What is the correct order of tags for replacing the labels ❶, ❷ and ❸?
i. dt, dl, dd ii. dl, dt, dd iii. dd, dt, dl
iv. dt, dd, dl v. dl, dd, dt
33. Which of the following is the correct HTML statement for inserting an image?
i. <img href=“image.gif” alt=“MyImage”>
ii. <img alt=“MyImage”>image.gif</img>
iii. <img src=“image.gif” alt=“MyImage”>
iv. <image src=“image.gif” href=“MyImage”>
v. <img href=“image.gif” src=“MyImage”>
DYLEN A. WOLFF 84
2019
34. Which of the following is the correct statement to connect to “login.php” from an HTML form>
i. <form action = “GET” method =”/login.php”>
ii. <form action = “/login.php” method =”GET”>
iii. <form submit = “GET” method =”/login.php”>
iv. <form submit = “/login.php” method =”GET”>
v. <form target = “/login.php” method =”GET”>
35. Which of the following HTML code lines is correct to create a hyperlink to the words “Department of
Examinations” using the URL: http://www.doe.index.html?
i. <a href = “Department of Examination”> http://www.doe.index.html </a>
ii. <a href = “http://www.doe.index.html”> Department of Examination </a>
iii. <a href = “http://www.doe.index.html” alt = “Department of Examination”> </a>
iv. <a src = “Department of Examination”> http://www.doe.index.html </a>
v. <a src = “http://www.doe.index.html”> Department of Examination </a>
37. Which is the most suitable HTML form element input type in which the user can enter his credit card
secret number?
i. textarea ii. type = “checkbox” iii. type = “hidden”
iv. type = “password” v. type = “text”
38. Which of the following is a valid example for a PHP variable name?
i. @class_name ii. &class_name iii. $class name
iv. $class_name v. _class_name
39. Which of the following is a valid example for CSS class selectors?
i. .myclass { color: blue; font-family: serif;}
ii. #myclass { color: blue; font-family: serif;}
iii. myclass { color: blue; font-family: serif;}
iv. myclass: { color: blue; font-family: serif;}
v. myclass; { color: blue; font-family: serif;}
DYLEN A. WOLFF 85
40. Which one of the following is false regarding the HTML form methods GET and POST?
i. Both methods are used to transfer data from client side to the server.
ii. GET method is more efficient that the POST method.
iii. GET method is more suitable to send sensitive data.
iv. POST method does not have a limit on size of data.
v. POST requests cannot be bookmarked.
2020
41. Which of the following HTML tags are used to define a definition list?
i. <dl>, <dd>, <li> ii. <dl>, <dt>, <dd> iii. <dl>, <td>, <dd>
iv. <dl>, <th>, <dd> v. <dl>, <th>, <td>
42. Which HTML tag is used to include a caption for a fieldset grouping in a form?
i. <caption> ii. <head> iii. <label>
iv. <legend> v. <title>
43. What is the expected output of the following PHP code block?
44. Which of the following affects the lest to the downloading speed of a webpage?
i. Capability of the web browser
ii. Number of hyperlinks in the web page
iii. Number and size of images in the web page
iv. Processing power of the server computer that stores the web page
v. The bandwidth of the internet connection which is used to access the web page
45. Which of the following statements is true about the code given below?
i. This defines internal styles and uses the CSS ‘class’ concept.
ii. This defines internal styles and uses the CSS ‘group’ concept.
iii. This defines inline styles and uses the CSS ‘group’ concept.
iv. The styles defined inside the code can be used only for one type of element.
v. This is an example of the CSS ‘Id’ concept and the name of the Id is ‘title’
DYLEN A. WOLFF 86
46. Consider the following HTML code line.
Which of the rows in the following tables describes the outcome of the above code line?
Displayed as a hyperlink To which the hyperlink connects to
i. #PartA New webpage named “Go to part A”
ii. #PartA Part of the same page named with Id “Go to part A”
iii. Go to part A New web page named “#PartA”
iv. Go to part A Part of the same web page named with Id “#PartA”
v. Go to part A Part of the same web page named with Id “#PartA”
DYLEN A. WOLFF 87
Internet of Things
2012
1. Ubiquitous computing will be useful in applications such as
i. Customisation of domestic environment
ii. Processing of large-scale examinations results
iii. Automatic Teller Machine (ATM)
iv. Point of Sales (POS) Machine
v. Controlling a wall clock
2013
2. Ubiquitous Computing is a/an __________ computing environment. The user will be able to use both
_________ and _________ services.
i. everywhere, mobile, local
ii. everywhere, local, remote
iii. everywhere, local, paid
iv. virtual, local, remote
v. virtual, mobile, global
2019
3. A smart environment can be created by having an interconnected network of hardware devices, sensors,
connectivity and required software, which is often referred to as the Internet of Things (IoT). Which of
the following statements is correct about IoT?
i. Every IoT device or item must be connected using UTP cables.
ii. If any item of the IoT setup fails to operate, the entire IoT setup will be shutdown.
iii. IoT environments cannot be monitored and controlled remotely.
iv. Modern smart mobile phones cannot be connected to an IoT setup.
v. The Internet connectivity is not essential for an IoT setup to function.
DYLEN A. WOLFF 88
ICT in Business
2012
1. A person employed in an overseas country placed an online order to deliver a birthday present to his
mother who is living in Sri Lanka, using the web-based services of a company. This transaction of ordering
the birthday present could be classified as
i. Consumer to Retailer ii. Consumer to Business iii. Business to Consumer
iv. Business to Business v. Employee to Business
2. Which of the following is most cost effective and secure in transmitting, private and confidential
messages and notices among the employees of an organization?
i. Electronic notice boards ii. Teleconferencing iii. E-mail
iv. A social network v. A website
2013
3. Consider the following attributes related to business:
A. Speed of services
B. Purchase and distribution
C. Security of goods sent
D. Confidence in quality of items ordered
Which of the above is/are disadvantage/s of e-business?
i. A only ii. C only iii. A and B only
iv. C and D only v. All A, B, C and D
2014
4. Which of the following is true?
i. www.ebay.com is an example of C2C.
ii. When the government renders its services to the public through www then it is called B2C.
iii. www.wikipedia.com is an example for C2B.
iv. www.amazon.com is an example for B2E.
v. Facebook groups are examples for E2C.
2015
5. Some provinces in Sri Lanka currently issue revenue licences for motor vehicles online. Which of the
following is the correct business type for this service?
i. B2C ii. B2B iii. C2B iv. B2E v. G2C
2016
6. Which of the followings is true about e-commerce?
i. It could be a part of e-business.
ii. It helps to combine multiple business processes into a single information system.
iii. It is a collection of platforms created for business and their customers to interact.
iv. www.google.com is a popular e-commerce website.
v. There are no Sri Lankan companies doing e-commerce yet.
DYLEN A. WOLFF 89
2017
7. Which of the following statements is true about e-business?
i. It is a business process which conducts partially online.
ii. It consists of front-end and back-end online processes.
iii. All “brick vendors” conduct their business on online.
iv. Any e-commerce application is an e-business application.
v. Any e-business application is an e-commerce application.
2018
8. Consider the following statements related to e-business.
A. Brick-and-click is a business model by which a company integrates both offline and online
presence of the business.
B. Pure-brick is a business model in which a company has only a physical presence.
C. Pure-click business has the presence only on the internet.
Which of the above statements is/are correct regarding e-business models?
i. A only ii. B only iii. C only
iv. A and C only v. All A, B and C
2019
9. Consider the following activities related to e-commerce.
A. Online purchase of a pair of shoes.
B. Online purchase of an e-book of your favourite novel.
C. Online booking of a taxi to the airport from your home.
Which of the above activities represent/s the pure-click type of business model?
i. A only ii. B only iii. C only
iv. A and C only v. B and C only
DYLEN A. WOLFF 90
New Trends and Future Directions
2012
1. Consider the following characteristics:
A. Autonomous
B. Performs in dynamic environments
C. Functions restricted to a time period
D. Interacts with highly increasing information
Which of the above are characteristics of a software agent?
i. A and B only ii. A and C only iii. A, B and C only
iv. A, B and D only v. B, C and D only
2014
2. Consider the following statements about software agents?
A. A software agent is capable of autonomous actions in order to meet its design objectives.
B. A software agent is capable of user-directed actions in order to meet users’ objectives.
C. A multi-agent system is composed of set of interacting agents.
Which of the above statements is/are true?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only
2015
3. Which of the following is incorrect about software agents?
i. They exhibit some degree of autonomy.
ii. They are a subset of reactive systems.
iii. They are proactive in terms of their ability to exhibit goal-directed behaviour.
iv. Electronic commerce is one of the key application areas of them.
v. They are always cooperative in a multi-agent environment.
2016
5. Which of the followings is not an application of artificial intelligence?
i. Self-learning robots ii. Expert advisory system for professionals
iii. Smartphones iv. Handwriting recognition systems
v. Recommender systems on e-commerce platforms
DYLEN A. WOLFF 91
6. Consider the following statements:
A. Software agents are computer programs.
B. Some computer viruses could be considered as software agents.
C. All software agents have user interfaces.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
2017
7. Consider the following clauses:
A. Can response to relevant environment changes
B. Always acts according to well-defined user instructions
C. Performs only pre-defined set of tasks
D. Can make decisions under incomplete information
Which of the above can be considered as properties of software agent system?
i. A and B only ii. A and C only iii. A and D only
iv. B and C only v. C and D only
2018
8. A smart home application that automates the controlling of lighting, temperature, entertainment
systems and appliances is an example for _________.
i. evolutionary computing ii. multi-agent systems
iii. nature inspired computing iv. software agents
v. ubiquitous computing
10. Consider the following statements relevant to the trends in modern information technology.
A. In traditional computing, data is encoded into binary digits while in quantum computing data is
represented in quantum bits or qubits.
B. A wearable device capable of activity tracking that measures data such as number of steps walked
and hear rate is an example for a sensor network.
C. A collection of nodes capable of environmental sensing, local communication and communication
with its peers or with other higher performance nodes is called a Geographic Information System.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C
DYLEN A. WOLFF 92
2019
11. Consider the following statements related to nature inspired computing:
A. In nature inspired computing natural phenomena/scenario are observed and used to design and
develop computing models to solve complex problems.
B. Artificial intelligence can use nature inspired computing for improving its ability to understand and
solve computationally challenging problems.
C. Computing models and algorithms developed under nature inspired computing can only be used
in natural environments such as rain forests, oceans and wild-life structures.
Which of the above statements is/are incorrect?
i. A only ii. B only iii. C only
iv. A and C only v. All A, B and C
2020
12. Consider the following.
A. Cloud formation in the sky
B. The evolution of living species
C. How neurons function in the human brain
Which of the above could be used in bio-inspired computing?
i. A only ii. B only iii. C only
iv. A and C only v. B and C only
13. Which of the following statements about quantum computing are correct?
A. In quantum computing, principles of quantum physics are applied.
B. Quantum bits (qubits) are used in quantum computing as the information unit.
C. Quantum computers emit radiation fatal to human users.
i. A only ii. B only iii. C only
iv. A and B only v. All A, B and C
DYLEN A. WOLFF 93