You are on page 1of 100

Table of contents

BASIC CONCEPTS OF ICT ......................................................................................................................... 1

INTRODUCTION TO COMPUTER ............................................................................................................. 6

NUMBER SYSTEMS - DATA REPRESENTATION ...................................................................................... 14

BOOLEAN | LOGIC FUNDAMENTALS OF DIGITAL CIRCUITS.................................................................. 17

OS | COMPUTER OPERATING SYSTEM ................................................................................................. 22

NETWORKING | DATA COMMUNICATION AND NETWORKING ........................................................... 26

SYSTEM ANALYSIS AND DESIGN ........................................................................................................... 35

DATABASE MANAGEMENT ................................................................................................................... 44

PROGRAMMING ................................................................................................................................... 56

WEB DEVELOPMENT ............................................................................................................................ 77

INTERNET OF THINGS ........................................................................................................................... 88

ICT IN BUSINESS.................................................................................................................................... 89

NEW TRENDS AND FUTURE DIRECTIONS ............................................................................................. 91


Basic Concepts of ICT
2012
1. Consider the following statements about data and information.
A. The symbols ‘101011101’
B. Numbers, characters and images
C. Facts derived from a study
D. Facts that have been processed in such a way as to be meaningful to the person who receives it.
Which of the above statements best describe/s ‘information’?
i. D only ii. A and B only iii. C and D only
iv. A, B and C only v. B, C and D only

2. “Video conferencing is best described as a/an __________ discussion through __________ between two
or more individuals in different locations.”
i. video, TV ii. audio, telephone iii. audio, network
iv. audio visual, TV v. audio visual, network

2013
3. Which of the following statements is true with regard to data and information?
i. Decision can be made only when a massive volume of data is available.
ii. Validity of information depends on the accuracy of data.
iii. Information obtained by processing data is always accurate.
iv. In order to obtain information, data must be collected from multiple resources.
v. The accuracy of information depends only on the accuracy of input data.

4. Consider the following techniques:


A. Computer Aided Learning (CAL)
B. Computer Based Learning (CBL)
C. Computer Based Assessment (CBA)
Which of the above techniques is/are used in ICT based teaching and learning?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

5. Consider the following statements about firmware.


A. Firmware is the program required to bootup a computer system.
B. Firmware is incorporated in washing machine.
C. Firmware can be easily changed later on.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

DYLEN A. WOLFF 1
2014
6. A special digit inserted into a sequence of digits for data validation is called the _________ digit. Which
of the following is most appropriate to fill the blank in the above statement?
i. check ii. sign iii. least significant
iv. most significant v. error

7. The Sri Lankan team won the T-20 World Cup-2014 tournament. The Sei Lankan cricket fans had the
highest value of this information when _________.
i. the final match started
ii. Thisara Perera scored the winning run
iii. the captain Lasith Malinga received the trophy
iv. they saw the news on the newspapers
v. they saw the cricket team at the Katunayake Airport

8. Facebook is a popular social network connecting millions of people with new members joining daily.
Which of the following statements is correct?
i. Facebook plays a very important role in building and maintaining your family relationships.
ii. Facebook is the only social network available today.
iii. Privacy settings of Facebook assure the privacy of its users completely.
iv. Publishing private information in Facebook has resulted in unfortunate incidents.
v. Real identity of a person is guaranteed on Facebook.

9. Which of the following statement is true?


i. Computer based learning is a teacher-oriented learning technique.
ii. Skype is a famous video conferencing technique.
iii. Virtual Private Network (VPN) provides a medium for telecommuting.
iv. Conducting offline examinations can be considered as computer aided assessments.
v. Microsoft PowerPoint is Free and Open-Source Software (FOSS) for computer-based presentations.

2015
10. Consider the following statements about social networking sites:
A. They are being used increasingly as a medium for election campaigns.
B. A user’s true identity is always guaranteed in a social networking site.
C. They are absolutely necessary to maintain human relationships in the modern society.
Which of the above statement(s) is/are true?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

11. Consider the following terms related to computer systems:


A. Malware B. Hardware C. Software D. Liveware
Which of the above are basic components of a computer system?
i. A and B only ii. A and C only iii. A and D only
iv. B and C only v. B, C and D only

DYLEN A. WOLFF 2
12. Consider the following statements about the World Wide Web (WWW):
A. It is a collection of interlined, hypertext documents accessed via the internet.
B. It is a protocol for distributing information via computers connected to the internet.
C. It was invented by the World Wide Web Consortium (W3C).
Which of the above statement(s) is/are true?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

13. ABC Holdings is a manufacturing organization in Sri Lanka which has its head-office in Japan. What is the
most convenient method to conduct weekly progress review meetings between the local staff in Sri Lanka
and the senior management team in Japan?
i. Telephone calls ii. Skype iii. Email
iv. SMS v. YouTube

14. Which of the following graphs represent the Golden rule of information?
i. ii. iii.

iv. v.

2016
15. Consider the following statements:
A. Plagiarism is a common threat to information systems.
B. Plagiarism means claiming someone else’s creation as one’s own.
C. Piracy is a synonym for plagiarism.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

16. “Employees of modern organizations perform their duties from home.” Which of the following best
describes the above statement?
i. Social networking ii. Telecommuting iii. Instant messaging
iv. Office automation v. Blogging’

DYLEN A. WOLFF 3
2017
17. Students in a school are given tablet computers to improve their studies. Which of the following is the
most appropriate activity to achieve this objective?
i. Downloading computerized study material ii. Watching entertainment videos
iii. Instant messaging among friends iv. Blog writing
v. Playing computer games

2018
18. Which of the following describes the term ‘telecommuting’?
i. Ability of an employee to perform duties conveniently from different geographical locations using
modern technology.
ii. Having online meetings with people at different geographic locations.
iii. Using ICT for community services.
iv. Using web-based applications to retrieve information.
v. Performing financial transactions online.

19. Consider the space voyage for landing a human being on the surface of the moon for the first time 1969.
The entire event was broadcast on the radio in Sri Lanka by several commentators based in Sri Lanka and
the USA.
Which of the following events relates to the highest value of information?
i. Counting down for the launching of the rocket that carried the space shuttle.
ii. The moment the space shuttle escaped from the gravitational field of the earth.
iii. The moment the space shuttle entered the moon’s gravitational field.
iv. The moment the astronaut Neil Armstrong placed his first step on the surface of the moon.
v. The moment the astronauts landed on the sea in their return voyage to earth.

20. Consider the following statements.


A. Providing the personal information of customers stored in a computer by a vehicle servicing centre
to an insurance agent is, an issue related to the privacy of customers.
B. Providing a copy of a single user licensed software to another party is a piracy issue related to the
copyright owner of the software.
C. Unauthorized access to another person’s computer is both illegal and unethical.
Which of the above statements is/are valid?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

2019
21. Which of the following made a significant contribution to the growth of Information and Communication
Technology (ICT) usage?
A. Exponential progress of the semiconductor technology paving the way for low-cost hardware.
B. Introduction of user-friendly software and interfaces to computers.
C. Merge of computer and communication technologies to produce smart and mobile devices.

i. A only ii. B only iii. A and C only


iv. B and C only v. All A, B and C

DYLEN A. WOLFF 4
22. The diagram shows the variation of information with time for five events of a single mission in the
chronological order. Information about the entire mission especially about the occurrences of each event
is made available online real time.

Consider the following statements related to the above mission.


A. Only the events P, Q and R comply with the Golden Rule of Information.
B. Event S has the highest demand and needs to be facilitated with the highest technical resources.
C. The value of an event can be determined reasonably using the demand for the information about
the particular event.
Which of the above statements related to this mission is/are valid?
i. A only ii. C only iii. A and B only
iv. B and C only v. All A, B and C

DYLEN A. WOLFF 5
Introduction to Computer
2012
1. Who is considered as the first computer programmer?
i. John Von Neumann ii. Blaise Pascal iii. Charles Babbage
iv. John Presper Eckert v. Ada Augusta Lovelace

2. Which of the following technologies has been used in third generation computers?
i. Integrated Circuits – IC ii. Large Scale Integration – LSI
iii. Micro Processors iv. Transistors
v. Vacuum Tubes

3. “The data in …… is read by using the laser technology.


Which of the following statements is most appropriate to fill the blank in the above statement?
i. Floppy Disk ii. Magnetic Tape iii. Compact Disk
iv. Magnetic Hard Disk v. Flash Memory

4. The component that decodes the instructions fetched into the CPU is called the
i. Primary memory ii. Register unit iii. Control unit
iv. ALU v. Program counter

5. The component that decodes the instructions fetched into the CPU is called the
i. Main memory ii. Magnetic disk iii. CD/DVD
iv. Flash drive v. Hard disk

6. Consider the following terms


A. Input B. Output C. Process D. Storage
Which of the above are essential for a system?
i. A and B only ii. A, B and C only iii. A, C and D only
iv. B, C and D only v. All A, B, C and D

2013
7. High speed temporary storage, which is a part of the microprocessor that holds data and instructions
during the execution is called _________.
i. Registers ii. RAM iii. Virtual memory
iv. EPROM v. Flash memory

8. Microprocessors are usually compared by their clock speed, measured in _________ or by their word
side measured in _________ that can be processed in a single clock cycle. Which of the following is most
appropriate to fill the blanks in the above statement?
i. Bits, Megahertz ii. Bytes, Gigahertz iii. Gigahertz, Bytes
iv. Megahertz, Bits v. Seconds, Bits

DYLEN A. WOLFF 6
9. Which of the following components is located outside the microprocessor?
i. Arithmetic Logic Unit (ALU) ii. RAM
iii. Control Unit iv. Register
v. Level 1 cache memory

10. Typically, the cache memory is used to store _________.


i. A large volume of data temporarily
ii. The least frequently accessed data permanently
iii. The lease frequently accessed data temporarily
iv. The most frequently accessed data temporarily
v. The most frequently accessed data temporarily

11. Babbage’s Difference Engine is based on _________.


i. Mechanical technology
ii. Vacuum tube technology
iii. Transistor technology
iv. Integrated Circuit (IC) technology
v. Very Large Scale Integrated (VLSI) Circuit technology

2014
12. One of the principal inventors of the Electronic Numerical Integrator and Computer (ENIAC) was
i. Blaise Pascal ii. Charles Babbage iii. John Von Neumann
iv. Ada Augusta Lovelace v. John Presper Eckert

13. Which of the following statements is correct with respect to the evolution of computing devices?
i. Vacuum tubes were used by Blaise Pascal to build the Pascaline.
ii. The Pascaline is considered as a first-generation computing device.
iii. Computers built using vacuum tubes are considered as second-generation computers.
iv. Electronic Numerical Integrator and Computer (ENIAC) was built using vacuum tubes
v. Apple I and Apple II are two examples for second generation computers.

14. Which of the following has the fastest access speed?


i. Extended memory ii. Register memory iii. Flash memory
iv. Cache memory v. Virtual memory

15. Consider the following statements on Static Random-Access Memory (SRAM):


A. SRAM needs periodic refreshing
B. It is used for Cache Memory
C. Registers are made of SRAMs
Which of the above statements are correct?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

DYLEN A. WOLFF 7
2015
16. Charles Babbage is considered as the “father of the computer” by some people. That is because he
i. invented the mechanical calculator Pascaline.
ii. invented the first re-programmable electronic computing machine.
iii. took the leadership in building the first personal computer at IBM.
iv. introduced the concept of “Input, Process and Output” that is used in modern computers, for the first
time
v. is the founder of the first electronic digital computer ENIAC (Electronic Numerical Integrator And
Computer)

17. The first-generation computers were based on


i. Very Large-Scale Integration (VLSI) technology ii. Large-Scale Integration (LSI) technology
iii. Integrated Circuits (ICs) iv. Transistors
v. Vacuum tubes

18. Random Access Memory (RAM) modules are often compared by their capacity, measured in _________
and by their speed, measured in _________.
Most suitable words to full the blanks of the above statements are respectively
i. Kilobytes, Gigabytes ii. Gigabytes, Megabits per second
iii. Gigabytes, Megahertz iv. Megahertz, Kilohertz
v. Gigabits, Megabits per second

19. Which of the following is not a typical use of the Random-Access Memory (RAM) of a personal computer?
i. Keeping data for processing. ii. Holding instructions for operations.
iii. Providing storage for operating system. iv. Retaining information for output.
v. Keeping the BIOS program for boot-up.

20. Consider the following statements on Dynamic Random-Access Memory (DRAM) and Static Random-
Access Memory (SRAM):
A. Registers are made of DRAM
B. DRAM is faster than SRAM
C. DRAM is denser than SRAM
Which of the above statement(s) is/are true?
i. A only ii. B only iii. C only
iv. A and B only i. B and C only

2016
21. Which of the following statements is true?
i. The first-generation computers were build using transistors.
ii. Electronic Numerical Integrator and Computer (ENIAC) is a second-generation computer.
iii. Ada Lovelace is the inventor of the Analytical Engine.
iv. Alan Turing is considered as the first computer programmer.
v. The first calculating device is believed to be he Abacus.

DYLEN A. WOLFF 8
22. Which of the followings is a component of the Central Processing Unit (CPU)?
i. ROM ii. RAM iii. ALU
iv. L3 Cache memory v. Power supply unit

23. Which of the following binary numbers is equivalent to 10910?


i. 11001002 ii. 11011012 iii. 10011012
iv. 11010012 v. 11011002

24. The content store in _________ is read by using the optical technology.
Which of the following answers is most appropriate to fil the blank in the above statement?
i. flash memory ii. floppy disk iii. magnetic tape
iv. compact disc v. hard disk

25. In modern computers, multiple levels of cache memory are used to optimize the performance. Among
them, the _________ cache which is on/in _________ is the fastest and most expensive cache memory.
Which of the following terms are correct to fill the blanks respectively in the above statement?
i. Level 1 (L1), main memory ii. Level 3 (L3), motherboard
iii. Level 1 (L1), microprocessor iv. Level 2 (L2), microprocessor
v. Level 3 (L3), microprocessor

26. Consider the following statements about Dynamic Random-Access Memory (DRAM):
A. Periodic refreshing is required for DRAM.
B. Registers in the processor are made of DRAMs.
C. Memory density of DRAM is higher than of Static RAM.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

27. Which of the following statements is correct with respect to a scanner?


i. A scanner is a software which scans a printed documents and converts them into digital images.
ii. A scanner is an output device of a computer.
iii. The optical character reader (OCR) software is an essential component of the scanner.
iv. A scanner is an input device of a computer.
v. Scanners are used to store moving pictures in digital form.

2017
28. Who proposed the stored program concept first?
i. Lady Ada Augusta ii. Charles Babbage iii. Howard Aiken
iv. Blaise Pascal v. Von Neumann

29. Which of the following components is generally seen outside the Central Processing Unit (CPU) of a
computer?
i. RAM ii. Control Unit iii. ALU
iv. General purpose registers v. L1 cache memory

DYLEN A. WOLFF 9
30. Which of the following secondary storage devices is generally considered to provide the fastest access to
data?
i. Compact Disk ii. Digital Versatile Disk iii. Internal hard disk
iv. Magnetic tape v. Floppy disk

31. Which of the followings is usually used to boot-up personal computers?


i. Firmware ii. Malware iii. Adware
iv. Ransomware v. Liveware

32. Which of the followings is a main use of Complementary Metal-Oxide Semiconductor (CMOS) memory of
a personal computer?
i. Keeping inputs for processing ii. Holding instructions for operations
iii. Providing space for loading operating system iv. Retaining information for output
v. Keeping Basic Input Output System settings for the booting procedure

33. The execution of a series of non-interactive jobs on a personal computer with relative to its user is known
as _________.
i. multitasking ii. multiuser processing iii. multiprocessing
iv. batch processing v. online processing

34. A _________ on motherboard is used to expand the functionality of a computer.


Which of the following is the most appropriate to fill in the blank of the above statement?
i. Bus ii. Clock iii. RAM iv. Slot v. ROM

35. Which of the following statements is correct?


i. Application software load application into the main memory.
ii. The programs stored in ROM are known as system software.
iii. System software support data communication between peripheral devices.
iv. Utility software is generally stored in ROM.
v. Utility software are incorporated in washing machines.

36. Consider the following data input devices:


A. On screen keyboard (virtual keyboard)
B. Barcode reader
C. Magnetic card reader
Which of the above devices can be used to input data more efficiently?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

DYLEN A. WOLFF 10
2018
37. Consider the following statements.
A. Word size is the number of bits processed by the CPU of a computer in a single action (instance).
B. Data bus width and register width are directly related to word size of a computer.
C. Word size of modern general-purpose computers is either 32 or 64 bits.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. B and C only v. All A, B and C

38. Which of the following correctly list the given computer storage components in the descending order of
access speed?
i. cache memory > main memory > magnetic disk > register
ii. magnetic disk > main memory > cache memory > register
iii. magnetic disk > main memory > register > cache memory
iv. register > cache memory > main memory > magnetic disk
v. register > main memory > magnetic disk > cache memory

39. Consider the following computer memory types.


A. CMOS memory D. Hard-disk
B. Cache memory E. RAM
C. Flash memory F. Registers
Which of the above are volatile memory?
i. A, C and D only ii. A, D and E only iii. A, E and F only
iv. B, E and F only v. C, E and F only

40. Consider the following statements related to the development of computers over time.
A. Both processing speed and power consumption of computers have increased.
B. Processing speed of a computer has increased while physical size of a computer has decreased.
C. Both power consumption and the physical size of a computer have reduced.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

41. Consider the following statements.


A. BIOS is an example of application software.
B. A utility software is an example for firmware.
C. Spyware is an example for malware.
Which of the above is/are true?
i. A only ii. B only iii. C only
iv. B and C only v. All A, B and C

2019
42. Which of the following is a hardware device that maps virtual addresses to physical addresses?
i. bus ii. cache memory iii. control unit
iv. memory management unit v. register

DYLEN A. WOLFF 11
43. In the memory hierarchy diagram given, which of the following represents A, B, C and D respectively?
A
Cache
memory
B

Solid state drive

Optical Disk

i. Magnetic Tape, Magnetic (Hard) Disk, Random Access Memory (RAM), Processor Registers
ii. Processor Registers, Magnetic (Hard) Disk, Random Access Memory (RAM), Magnetic tape
iii. Processor Registers, Random Access Memory (RAM), Magnetic (Hard) Disk, Magnetic tape
iv. Processor Registers, Random Access Memory (RAM), Magnetic tape, Magnetic (Hard) Disk
v. Random Access Memory (RAM), Processor Registers, Magnetic (Hard) Disk, Magnetic tape

2020
44. A computer processor will operate fastest when the data that it wants is in the _________.
i. cache memory ii. hard disk iii. magnetic tape
iv. main memory v. optical disk

45. Which of the following hardware components will lose data when the power to a computer is switched
off?
A. registers
B. cache memory
C. main memory
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

46. Computer has evolved from the early main frames to the relatively small smart devices with high
computing power used today. Which of the following inventions contributed to reduce the physical size
of computers?
i. bus ii. integrated circuits iii. registers
iv. solid state memory v. vacuum tubes

DYLEN A. WOLFF 12
47. Consider the following diagrams showing some hardware component connections on a computer system.

The hardware port within the CPU indicated by Ⓐ in the above diagram has a set of registers that has
the memory translation maps of the currently running process. When given an input virtual address of
the currency process it outputs the relevant physical address (if any).
The Ⓐ in the above diagram denote the
i. Arithmetic and Logic Unit (ALU) ii. Control unit
iii. L1 cache memory iv. Memory management unit
v. Page table

DYLEN A. WOLFF 13
Number systems - Data Representation
2012
1. The binary equivalent to 3710 is
i. 0100101 ii. 0100111 iii. 0100100
iv. 0110110 v. 0110111

2. 1448 + 1758 =
i. 2258 ii. 3418 iii. 4418
iv. 5318 v. 3148

2013
3. The binary number equivalent to the 2510 is
i. 0100101 ii. 0100111 iii. 0011001
iv. 0010110 v. 0010111

4. 1248 + 1658 =
i. 2018 ii. 28910 iii. 2898
iv. 3118 v. 3898

5. What is the two’s complement of -610?


i. 11111010 ii. 00000110 iii. 11111001
iv. 01011111 v. 00000101

2014
6. The decimal equivalent to 1001112 is
i. 40 ii. 39 iii. 38 iv. 37 v. 36

7. 4A616 + 9910 =
i. 61516 ii. 61510 iii. 50910
iv. 50916 v. 65916

8. Representations of 510 and -910 in 8-bit Two’s complement forms are


i. 00000101 and 11110111 respectively ii. 11111011 and 11110111 respectively
iii. 00000101 and 10001001 respectively iv. 00000101 and 11110110 respectively
v. 11111011 and 11110110 respectively

2015
9. The decimal number equivalent to 1101102 is
i. 39 ii. 48 iii. 54 iv. 55 v. 108

10. 48B16 + 001010112 =


i. 4B616 ii. 31016 iii. 50316 iv. 51316 v. 55916

DYLEN A. WOLFF 14
11. What is the two’s complement representation of 610?
i. 11111010 ii. 00000110 iii. 11111001
iv. 01011111 v. 00000101

2016
12. 10116 + 1108 =
i. 42910 ii. 101110 iii. 32910 iv. 52910 v. 13710

13. What is the two’s complement of the representation of 8910?


i. 01111011 ii. 01011001 iii. 10100111
iv. 01001001 v. 01011101

2017
48. What is the two’s complement representation of 45, of am integer is represented by 8 bits?
i. 11010011 ii. 10110011 iii. 11001101
iv. 00101111 v. 00101101

49. Which of the following numbers is equivalent to the binary number 1011112?
i. 578 ii. 5716 iii. 5710 iv. 5916 v. 5F16

50. 5D16 + 101112 =


i. 738 ii. 7516 iii. 1168 iv. 1638 v. 1648

51. What is the binary representation of 9.2510?


i. 1110011101 ii. 00001001.01 iii. 0000100101
iv. 1000100101 v. 10001001.01

2018
52. Consider the following three numbers in decimal, octal and hexadecimal notations, respectively.
A. 23110 B. 3478 C. E716
Which of the above is/are equivalent to 111001112 in binary notation?
i. A only ii. B only iii. A and C only
iv. B and C only v. All A, B and C

53. What is the decimal equivalent to the binary 110101.112?


i. 53.0010 ii. 53.5010 iii. 53.7510 iv. 54.2510 v. 54.7510

2019
54. Which of the following represents the bitwise AND operation of the two binary numbers 01010101 and
10101010?
i. 00000000 ii. 00001111 iii. 11001100
iv. 11110000 v. 11111111

DYLEN A. WOLFF 15
55. Which of the following represents the result of the binary arithmetic operation of 11001100 – 01010101?
i. 00110011 ii. 01100110 iii. 01110111
iv. 10011001 v. 10101010

56. Which of the following statements is/are true about two’s complement?
A. Subtraction is carried out as addition
B. Calculations are more efficient
C. It is possible to represent negative numbers within the two’s complement.
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

57. What is the binary equivalent to decimal 54.25?


i. 00011111.11 ii. 00101010.01 iii. 00110110.01
iv. 00111011.1 v. 00111110.1

58. Consider the two binary numbers P = 10110001 and Q = 01001110. If X = P OR Q and Y = P AND Q, what
will be the values of X and Y respectively?
i. 01001110, 10110001
ii. 10110001, 00000000
iii. 10110001, 11111111
iv. 11111111, 00000000
v. 11111111, 10110001

59. What is the 2’s complement of decimal -12?


i. 00001100 ii. 00110011 iii. 11110011
iv. 11110100 v. 11111011

60. Which of the following is true about 2’s complement?


i. An extra bit is used to represent the sign.
ii. Makes it possible to build low-cost, high-speed hardware to perform arithmetic operations.
iii. Addition and subtraction are used as two different operations.
iv. Usually represented in hexadecimal number system.
v. Used in first generation computers to perform logic operations.

61. Consider the character representations in Table 1 and Table 2 given below.
අ ආ ඇ ඈ அ ஆ இ ஈ
Table 1: Table 2:
0D85 0D86 0D87 0D89 0B85 0B86 0B87 0B88
In which of the character encoding systems given below, the above characters in Table 1 and Table 2 are
represented?
i. Both Tables 1 and 2 : in ASCII
ii. Both Tables 1 and 2 : in UNICODE
iii. Table 1: in ASCII, Table 2: in UNICODE
iv. Table 1: in EBSIDIC, Table 2: in ASCII
v. Table 1: in UNICODE, Table 2: in ASCII

DYLEN A. WOLFF 16
Boolean | Logic Fundamentals of Digital Circuits
2012
1. What would be the result if the following Boolean expression is simplified?
𝐹(𝑥, 𝑦) = 𝑥𝑦(𝑥 + 𝑦)(𝑦 + 𝑦)
i. 𝑥 ii. 𝑦 iii. 𝑥
iv. 𝑦 v. 𝑥𝑦

2. Which of the following Boolean expressions represent the output of the given logic gate?
i. 𝐴 + 𝐵 + (𝐵 ∙ 𝐶)
ii. 𝐴 + 𝐵 ∙ (𝐵 ∙ 𝐶)
iii. (𝐴 + 𝐵) + (𝐵 ⋅ 𝐶)
iv. 𝐴 ⋅ 𝐵 + (𝐵 ∙ 𝐶)
v. (𝐴 ⋅ 𝐵) + (𝐵 + 𝐶)

2013
3. The Boolean expression (x + y).(x + z) simplifies to _________.
i. x ii. x.(y + z) iii. x . y . z
iv. x + y . z v. x + y + z

4. Which of the following Boolean expressions represent the output (Q) of the circuit given below? A and B
are inputs.
i. A’.B’+A.B’
ii. A’.B’+A.B
iii. A.B+A’.B’
iv. A’.B+A.B’
v. A’.B+A’.B’

5. Which of the following is an incorrect Karnaugh Map layout to represent a Boolean function of four (4)
Boolean variables a, b, c and d?
i. ii. iii.

iv. v.

DYLEN A. WOLFF 17
2014
1. Consider the following logic circuit

2. Which of the following circuit diagrams represents a simplified version of the above circuit?
i. ii.

iii. iv.

v.

3. Consider the following circuit with four push button switches namely: S1, S2, S3 and S4. These four
switches can either be in pushed or released states which are represented by 1 and 0 respectively.

Which of the following Boolean expressions represents the function of the bulb, if the on state of the bulb is
represented by the value 1?
i. S1 + (S2 . S3) + S4 ii. (S1 + S2) . (S3 + S4) iii. (S1 . S2) + (S3 . S4)
iv. S1 . S4 . (S2 + S3) v. S2 + (S1 . S4) + S3

2015
6. Consider the following combinatory circuit implemented using universal gates:

The above circuit is equivalent to a/an _________ gate.


i. AND ii. OR iii. NAND iv. NOR v. NOT

DYLEN A. WOLFF 18
2016
7. Consider the following combinatory circuit implemented using universal gates:

The above circuit is equivalent to a/an _________ gate.


i. NOT ii. AND iii. OR iv. NAND v. NOR

2017
8. Consider the following statements on using NAND, NOR gates over NOT, AND, OR gates when
constructing logic circuits:
A. They make logic circuit design simpler.
B. They help to construct logic circuits that consumes less electricity.
C. They make logic circuit construction more economical.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

2018
9. Consider the following Boolean expression.
𝐴 + 𝐵 ⋅ 𝐶̅
Which of the following is/are equivalent to the above expression?
I. 𝐴̅ + 𝐵 ⋅ 𝐶
II. 𝐴̅ + 𝐵 ⋅ 𝐶
III. 𝐴̅ + 𝐵 ⋅ 𝐶
i. I only ii. II only iii. III only
iv. I and II only v. II and III only

10. Consider the following logic circuit.

Which of the following circuits is/are equivalent to the above circuit?

I II III

i. I only ii. II only iii. III only


iv. I and II only v. All I, II and III

DYLEN A. WOLFF 19
2019
 Consider the following logic circuit diagram to answer the questions 11 and 12.

11. Which of the following statements is/are correct about the above circuit?
I. It implements a full adder.
II. The logic function of S can be stated as S = A ⊕ B ⊕ Cin
III. The logic function of Cout can be stated as Cout = AB + BCin + ACin
i. I only ii. II only iii. I and II only
iv. II and III only v. All I, II and III

12. Which of the following statements is/are correct about the part of the circuit within the are surrounded
by the dotted line?
I. It implements a half adder.
II. It can be implemented using only AND and OR gates.
III. It can be implemented using only NAND gates.
i. I only ii. II only iii. I and II only
iv. II and III only v. All I, II and III

13. Consider the Karnaugh map shown below.


AB
00 01 11 10
0 0 0 0 1
C
1 1 1 0 1
Which of the following is the correct logic expression that corresponds to the two marked segments on
the Karnaugh map?
i. 𝐴𝐵 + 𝐵𝐶̅ ii. 𝐴𝐶 + 𝐴𝐵 iii. (𝐴̅ + 𝐶̅ )(𝐴 + 𝐵)
iv. (𝐴 + 𝐶)(𝐴̅ + 𝐵 ) v. 𝐴𝐶 + 𝐴𝐵

14. Which of the following is the most simplified expression equivalent to 𝐴𝐵 𝐶̅ + 𝐵𝐶̅ + 𝐴̅𝐵 𝐶 + 𝐵𝐶 ?
i. 𝐴𝐵 𝐶̅ + 𝐴̅𝐵 𝐶 + 𝐵 ii. 𝐵 (𝐴𝐶̅ + 𝐴̅𝐶 ) + 𝐵
iii. 𝐶̅ (𝐴𝐵 + 𝐵) + 𝐶(𝐴̅𝐵 + 𝐵) iv. 𝐴𝐶̅ + 𝐴̅𝐶 + 𝐵
v. 𝐴̅𝐶̅ + 𝐵

DYLEN A. WOLFF 20
15. A block diagram of a sequential logic circuit is shown below, with one block labelled as “A” and the other
labelled as “B”

Which of the following statements about the above block diagram are correct?
I. The block A is a combinational logic circuit.
II. The block B is a memory element
III. Only the block A can be implemented using logic gates.
i. Only I ii. Only II iii. Only I and II
iv. Only I and III v. All I, II and III

16. Consider the following logic circuit consisting of NAND gates:

If the required output of the above circuit is 𝐴𝐵 + 𝐴̅𝐵 + 𝐶̅ , then what should the inputs X and Y be?
i. 𝑋 = 𝐵 and 𝑌 = 𝐶 ii. 𝑋 = 𝐵 and 𝑌 = 𝐶̅ iii. 𝑋 = 𝐵 and 𝑌 = 𝐶
iv. 𝑋 = 𝐵 and 𝑌 = 𝐶 ̅ v. 𝑋 = 𝐶̅ and 𝑌 = 𝐵

DYLEN A. WOLFF 21
OS | Computer Operating System
2012
1. The type of operating system that is most suitable for an automated air traffic control system is
i. Multi-user multi-tasking ii. Single-user multi-tasking iii. Real time
iv. Single-user multi-tasking v. Multi-threading

2. The main advantage of creating more than one partition in a hard-disk is the
i. Separation of the operating system and program files
ii. Ability to retrieve files efficiently
iii. Easiness of making directories and subdirectories
iv. Easiness of creating multiple users
v. Easiness of taking backups of selected files

2013
3. Sharing a single microprocessor among number of application programs using context switching is known
as
i. Multi-user processing ii. Multi-tasking iii. Multi-processing
iv. Batch processing v. Online processing

4. The generation of monthly salary slips of employees in an organization is an example for


i. Batch processing ii. Real time processing iii. Online processing
iv. Transaction processing v. Interactive processing

2014
5. Which of the following is not a main function of an operating system?
i. Memory management ii. Process scheduling iii. File handling
iv. Virus detection v. User interfacing

6. In an operating system, moving a process from the main memory to the secondary storage in order to
bring another process to the main memory is called _________.
i. Demand paging ii. Context switching iii. Swapping
iv. Interrupting v. Scheduling

2015
7. An application which requires more memory space than the maximum memory space available in the
primary memory of a computer is ready for execution. Which of the followings is used by the operating
system of that computer to satisfy this need?
i. Random Access Memory (RAM) ii. Read Only Memory (ROM)
iii. Cache Memory iv. Virtual Memory
v. Extended Memory

DYLEN A. WOLFF 22
8. The feature in modern operating systems which allows the automatic installation of new hardware
devices connected to a computer is commonly known as __________.
i. Add/Remove Hardware ii. Easy Installer iii. Plug and Play
iv. Add Hardware Utility v. Fetch and Store

2016
9. In an operating system, suspending the currently executing process and then resuming or starting
another process is termed as
i. paging ii. context switching iii. swapping
iv. interrupting v. blocking

10. In modern operating system, the _________ scheduler determines the transition of the processes from
the new state to the ready state.
Which of the followings is the correct term to fill the blank in the above statement?
i. mid-term ii. long-term iii. very long-term
iv. very short-term v. short-term

2018
11. Consider the following statements.
A. Disk defragmentation files that are fragmented in a disk, contiguous.
B. Swapping is a memory management technique where the main memory contents which were not
recently used are copied to disk to make the memory available for other processes.
C. A File Allocation Table (FAT) is a able that an Operating System maintains which provides a map of
the clusters that a file has been stored in.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

12. Through which of the following, will a device controller that controls a device deal with the operating
system?
i. Application software ii. Assembler iii. Compiler
iv. Device driver v. Utility software

2019
13. On his single processor computer, a user starts a spreadsheet application and creates a new spreadsheet.
To set some information required for the spreadsheet he opens a large database using his Database
Management System (DBMS). After completing his spreadsheet, he saves it.
Which of the following Operating System features has/have been used by the above user?
A. Context switching
B. File management
C. Virtual memory
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C

DYLEN A. WOLFF 23
14. Consider the process transition diagram given in the figure.
If the transitions shown are as follows;
1. Process blocks for input/output
2. Scheduler picks another process
3. Scheduler picks this process
4. Input/output is completed

Then what are the states indicated by the labels A, B and C respectively?
i. A: Blocked B: New C: Ready
ii. A: New B: Ready C: Running
iii. A: Ready B: Running C: Blocked
iv. A: Running B: Blocked C: Ready
v. A: Running B: New C: Blocked

15. Which of the following is not an information stored in a Process Control Block (PCB) of the operating
system?
i. Free disk slots (free disk blocks that could be utilized by the process)
ii. Memory management information for the process
iii. Program counter (address of the next instruction to be executed for the process)
iv. Process identification number (unique identifier for the process)
v. Process state (e.g.: blocked, ready, etc)

2020
16. The operating system (OS) is another program that runs on the computer that has some special
responsibilities. Memory management, file management and input/output management are some of
these responsibilities. What is another important responsibility of the OS?
i. Backup management ii. Cache memory management
iii. Compiler management iv. Process management
v. System clock management

17. When the number of processes started by a user on a single-processor computer increases, what happens
to the response time of each process as perceived by the user and the memory management related
work of the operating system respectively?
i. Both the response time and the memory management related work increase.
ii. Response time decreases while the memory management related work increases.
iii. Response time increases while the memory management related work decreases.
iv. Both the response time and the memory management related work decrease.
v. There is no change in either of them.

18. Which of the following is not a responsibility of the operating system?


i. Allocating physical memory to processes/
ii. Deciding which process to run.
iii. Keeping track of the usage of compiled program, files on a hard disk.
iv. Keeping track of which parts of physical memory are in use, which are free.
v. Swapping processes between physical memory and disk.

DYLEN A. WOLFF 24
19. In a computer, the size of user program could exceed the size of physical memory. Also, only the
demanded areas of programs are kept in physical memory.
The above are due to which of the following?
i. The use of cache memory.
ii. The use of contiguous file allocation.
iii. The use of a file allocation table (FAT).
iv. The use of memory management unit (MMU)
v. The use of pages, frames and page tables.

DYLEN A. WOLFF 25
Networking | Data Communication and Networking
2012
1. In computer networks, acronym DHCP stands for
i. Dynamic Host Control Protocol
ii. Dynamic Host Configuration Protocol
iii. Domain Host Configuration Protocol
iv. Dynamic Host Configuration Protocol
v. Dynamic Host Control Parameters

2. What is the function of a DNS in a Computer Network?


i. Assigns IP addresses
ii. Translates domain names to IP addresses
iii. Protects a network from viruses
iv. Provides directory services to users
v. Connects multiple computer networks together

3. The command that can be used to check the network configuration of a computer is
i. Traceroute ii. Netstat iii. Hostname
iv. Ipconfig v. Pin

4. Which of the following statements is correct about IP addresses and subnet masks?
i. 92.248.32.3 is a Class B IF address
ii. A network with a subnet mask 255.255.255.248 can accommodate six hosts.
iii. An IP address consists of 16 bits
iv. 10.32.1.5 is a Class C IP address
v. 255.255.255.0 is a Class C IP address

5. The network layer of the OSI reference model provides


i. Error correction ii. Inter-process communication
iii. Flow control iv. Routing of data packets
v. Error detection

2013
6. What is the main function of a PROXY server in Internet communication?
i. Allocate and release IP addresses
ii. Translate domain names to IP addresses
iii. Protect a network from viruses
iv. Provide printing services to users
v. Share an Internet connection among several computers

DYLEN A. WOLFF 26
7. An organization has been allocated a class C IP address range having a subnet mask of 255.255.255.0. If
the organization is to setup a web server and an email server, what IP addresses that can be allocated to
these two servers?
i. 192.248.87.2, 192.248.32.3 ii. 192.248.87.4, 192.248.87.5
iii. 192.248.32.3, 192.248.33.3 iv. 192.248.40.2, 192.248.41.3
v. 192.248.87.1, 192.248.60.2

8. In communication networks, ISDN stands for


i. Integrated Service Domain Name
ii. Integrated Service Directory Name
iii. Integrated Service Digital Network
iv. Internet Service Digital Network
v. Integrated Service Domain Network

9. In the OSI reference model, detection of errors during communication between two computers in a
network is a function of the _________.
i. physical layer ii. data link layer iii. network layer
iv. transport layer v. application layer

10. The command that can be used to login to a remote computer network is
i. ipconfig ii. ftp iii. telnet
iv. tracert v. route

11. Which of the following devices can be used to connect two physical networks having IP addresses
72.110.0.0 (subnet mask 255.255.0.0) and 192.248.10.0 (subnet mask 255.255.255.0)?
i. Hub ii. Repeater iii. Switch
iv. Router v. Multiplexer

2014
12. Which of the following converts digital data to analog data to transmit over an analog telephone
network?
i. Network Interface Card (NIC) ii. Modem
iii. Multiplexer iv. Bluetooth adapter
v. Wi-Fi card

13. Computer attached to a LAN use the default gateway connected to the same network
i. to translate the domain names to IP addresses.
ii. to forward IP packets when they do not know any specific rout to the destination,
iii. as the firewall for the network.
iv. to send all the data packets to other computers in the same LAN.
v. to assign IP address to a computer on the LAN.

14. The command that can be used to measure the round-trip propagation delay between two computers
on the internet is _________.
i. ping ii. ipconfig iii. ssh iv. ftp v. telnet

DYLEN A. WOLFF 27
15. In the OSI seven-layer reference model. IP protocol maps to the _________ layer.
Which of the following is most appropriate to fill the blank in the above statement?
i. application ii. session iii. transport
iv. network v. physical

16. The function of the DHCP server in an IP network is to


i. translate domain names to IP addresses. ii. cache the web pages.
iii. dynamically allocate IP addresses. iv. filter IP packets.
v. provide security.

17. Which of the following is a valid subnet mask?


i. 255.255.255.192 ii. 255.0.255.0 iii. 256.255.255.64
iv. 255.256.255.96 v. 0.0.0.255

18. The ping command indicates that there is a 5% packet loss between computers X and Y. There is an FTP
server running on Y. A file is downloaded to X from Y using FTP protocol. Which of the following is the
most appropriate statement regarding this file download?
i. The downloaded file has exactly 5% of the data missing
ii. The downloaded file has more than 5% of the data missing
iii. The downloaded file has exactly 5% of the data in a different order than the original file.
iv. The downloaded file has the data exactly the same order as the original file.
v. FTP protocol cannot run on a network connection with errors.

2015
19. _________ is used for analog signal to digital signal conversion.
Which of the following is most appropriate to fill the blank in the above statement?
i. Amplitude Modulation (AM) ii. Frequency Modulation (FM)
iii. Pulse Code Modulation (PCM) iv. Phase Modulation (PM)
v. Time Division Modulation (TDM)

20. A computer network is configured with the IP address 192.248.16.91 and the subnet mask
255.255.255.128. Which of the following IP addresses cannot be assigned to a computer in the same
network?
i. 192.248.16.161 ii. 192.248.16.78 iii. 192.248.16.110
iv. 192.248.16.75 i. 192.248.16.120

21. Which of the following statements is correct with respect to the Transmission Control Protocol (TCP)?
i. TCP is a network layer protocol.
ii. TCP guarantees that each byte sent is received at the receiver.
iii. Only one application at a time can use TCP in a computer.
iv. HTTP uses TCP.
v. TCP uses User Datagram Protocol (UDP) as the transport protocol.

22. A LAN uses the subnet mask 255.255.240.0. How many different IP addresses can be assigned to devices
in this LAN?
i. 254 ii. 256 iii. 1024 iv. 2046 v. 4094

DYLEN A. WOLFF 28
23. Which of the following statements is correct with respect to routing in the internet?
i. There can be at most one router in any given LAN.
ii. A router can have more than one network interface.
iii. Routing is a functionality of the Transport Layer.
iv. All routers function as HTTP proxies.
v. The internet does not need routing if all applications use TCP.

24. In a public key encryption system, the private key of a person x is given by the function priv(x) and the
public key is given by pub(x). Consider the following statements.
A. pub(x) is used to encrypt a message that can only be decrypted using priv(x).
B. pub(x) is used to sign a message to be sent to x.
C. A message encrypted using pub(x) can be decrypted using pub(x).
Which of the above statement(s) is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

25. Consider the following statements regarding a server with the domain name www.bogus.lk:
A. The server www.bogus.lk can be located anywhere in the world.
B. www.bogus.lk must be a web server.
C. The domain names www.bogus.lk and www.bogus.com can be resolved to the same IP address.
Which of the above statement(s) is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

26. A file of 1 MB has been successfully sent from the machine X to machine Y in a network over a TCP
connection. It has been observed that the 10th byte of the file has passed through router R. Consider the
following statements regarding this communication:
A. The 10,000th byte must have gone through the router R after the 10th byte.
B. The 10,000th byte must have gone through the same path from X to Y as the 10th byte.
C. The 10,000th byte may or may not have gone through router R.
Which of the above statement(s) is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

2016
27. “An analog signal is sampled at regular intervals and represented as 16-bit values.”
Which of the followings is best described by the above statement?
i. Amplitude Modulation (AM) ii. Frequency Modulation (FM)
iii. Pulse Code Modulation (PCM) iv. Phase Modulation (PM)
v. Pulse Width Modulation (PWM)

28. Two machines with the IP addresses 192.248.16.30 and 192.248.16.90 are connected to a Local Area
Network (LAN). Which of the following is a suitable subnet mask for this network?
i. 192.255.255.255 ii. 192.248.16.0 iii. 255.255.255.224
iv. 255.255.255.128 v. 255.255.255.255

DYLEN A. WOLFF 29
29. Which of the following is a correct IPv4 address?
i. 192.248.0.0.1 ii. 192.258.2.1 iii. 8.8.8.8
iv. 10.256.8.9 v. 255.255.255.268

30. User Datagram Protocol (UDP) is a _________ layer protocol.


Which of the following layers is the most suitable to fill the blank in the above statement?
i. physical ii. data link iii. network
iv. transport v. application

31. Consider the following statements regarding routing in IP networks:


A. All routers must use a DNS server for IP packet forwarding.
B. Routers must forward all receiving IP packets along the same path.
C. A router may discard an IP packet.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

32. In a public key cryptographic system, the private key of a person x is given by the function priv(x) and the
public key is given by the function pub(x).
Consider the following statements:
A. priv(x) and pub(x) should be the same for better security.
B. A message encrypted using pub(x) can be decrypted using pub(x).
C. The person x knows both priv(x) and pub(x).
Which of the above statements is/are correct?
i. A only ii. C only iii. A and B only
iv. A and C only v. B and C only

33. Local Area Network (LAN) has 500 network devices. What is the most appropriate subnet mask for this
computer network?
i. 255.255.255.0 ii. 255.255.255.128 iii. 255.255.255.192
iv. 255.255.255.224 v. 255.255.254.0

2017
34. The electronic mail systems, the protocol used by mail clients to retrieve messages from the mail server
is _________.
i. Simple Mail Transfer Protocol (SMTP) ii. File Transfer Protocol (FTP)
iii. Internet Control Message Protocol (ICMP) iv. Internet Message Access Protocol (IMAP)
v. Telnet

35. The transport layer protocol User Datagram Protocol (UDP) can be used for _________.
i. reliable communication ii. guaranteed delivery
iii. connection oriented communication iv. ordered delivery
v. exchanging state information among servers

DYLEN A. WOLFF 30
36. Which of the following statements regarding MAC address is correct?
i. Every network device has a unique MAC address.
ii. Every network host has a unique MAC address.
iii. Every network interface has a unique MAC address.
iv. It is assigned for a device at the time of installation.
v. It is used for routing.

37. The first and the last IP addresses of a subnet are 192.192.48.0 and 192.192.63.255 respectively. Which
of the following is the subnet mask of this subnet?
i. 255.255.255.0 ii. 255.255.192.0 iii. 255.255.255.192
iv. 255.255.240.0 v. 255.240.0.0

38. 172.16.48.200/24 is a
i. host address in a class B network.
ii. network address of a class C network.
iii. host address in 172.16.48.0/24 subnet.
iv. network address of a subnet with 255 hosts.
v. host address with 8 network bits.

39. In TCP/IP computer networks, Transport Protocol Data Unit (TDPU) is referred to as a _________.
i. packet ii. frame iii. segment
iv. window v. message

40. Consider the following statements.


A. In public key encryption systems, each pair of communicating entities share a single key for
encryption and decryption.
B. Phishing is a type of social engineering attach often used to steal user data such as username and
password.
C. Port scanning is a method which can be used by attackers to identify open ports or services on a
network host.
D. Digital signatures can be used for email message authentication.
Which of the above statements are correct?
i. B and C only ii. A, B and C only iii. A, C and D only
iv. B, C and D only v. All A, B, C and D

2018
41. Consider the following statements.
A. DHCP server in an IP network dynamically allocates IP addresses to network devices.
B. DNS server translates domain names to IP addresses.
C. FTP server caches the recently accessed web pages.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

DYLEN A. WOLFF 31
42. Consider the following statements.
A. TCP is a connection oriented and a reliable protocol.
B. UDP is a connectionless and an unreliable protocol.
C. TCP and UDP are transport layer protocols.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

43. In the OSI reference model, the network layer is responsible for _________ communication.
Which of the following is suitable to fill the blank in the above statement?
i. note to note ii. source to destination iii. hop to hop
iv. switch to router v. process to process

44. Which of the following indicates the number of host bits and the number of IP addresses respectively in
a class C network?
i. 8 and 256 ii. 8 and 65536 iii. 16 and 256
iv. 16 and 65536 v. 24 and 256

45. To which network class does the IP address 192.248.254.1 belong?


i. A ii. B iii. C iv. D v. E

46. In the OSI reference model, a protocol data unit of the network layer is referred to as a _________.
Which of the following terms is suitable to fill the blank in the above statement?
i. frame ii. segment iii. window
iv. message v. packet

2019
47. Use of public key and private key in encryption and decryption process is called
i. asymmetric encryption ii. digital encryption iii. hybrid encryption
iv. private key encryption v. symmetric encryption

48. In a particular network, each node is connected directly to a central network device. This topology is
referred as to a _________.
i. bus ii. hybrid iii. mesh iv. ring v. start

49. Which of the following are the properties of a signal?


i. Amplitude, Clock time, Frequency and Wavelength
ii. Amplitude, Frequency, Phase and Time
iii. Amplitude, Frequency, Phase and Wavelength
iv. Amplitude, Frequency, Time and Wavelength
v. Amplitude, Impulse, Pulse and Wavelength

DYLEN A. WOLFF 32
50. Which of the following options contains only guided media?
i. Coaxial, Fiber optics and Infrared ii. Coaxial, Fiber optics and Microwave
iii. Coaxial, Fiber optics and Twisted pair iv. Coaxial, Infrared and Infrared
v. Fiber optics, Satellite communication and Twisted pair

51. The frequency modulation technique is used to change only _________.


i. the amplitude and frequency ii. the amplitude, frequency and phase
iii. the amplitude and phase iv. the frequency
v. the frequency and phase

52. Consider the following statements:


A. A hub connects only the networked computers but a switch connects multiple devices.
B. A switch manages the ports and the VLAN security settings.
C. In data transmission, a hub uses bits while a switch uses frames and packets.
D. The data transmission speed in a hub is higher than that in a switch.
Which of the above statements are correct?
i. A, B and C only ii. A, B and D only iii. A, C and D only
iv. B, C and D only v. All A, B, C and D

53. Consider the following statements about the proxy server.


A. It helps to hide the true IP address.
B. It is used to restrict the access of the website in the network.
C. It uses the cached data for the quick loading of regularly accessed websites.
D. It help to detect the locations of the visitors and load web pages as per their needs.
Which of the above statements are correct?
i. A, B and C only ii. A, B and D only iii. A, C and D only
iv. B, C and D only v. All A, B, C and D

2020
54. What is the process carried out in the modulation technique in data transmission?
i. Encoding information in transmission signal.
ii. Encoding signals in transmitted information.
iii. Extracting information from the transmitted signal.
iv. Extracting signal from the transmitted information.
v. Transfer information with minimum distortion.

55. Which of the following statements about bus topology are incorrect?
A. Computers and network devices are connected to a single cable.
B. All traffic flows are either clockwise or anticlockwise.
C. Bandwidth is shared among the nodes.
D. Each node is connected to two of its neighbours.
i. A and B only ii. A and D only iii. B and C only
iv. B and D only v. C and D only

DYLEN A. WOLFF 33
56. Consider the following statement with a blank.
A Media Access Control address (MAC) address is usually represented in _________ numbers.
Which of the following is suitable to fill the blank?
i. binary ii. decimal iii. hexadecimal
iv. natural v. octal

57. You are requested to create 16 subnets with Class C IP. Which subnet mask is suited to create the subnet?
i. 255.255.255.240 ii. 255.255.255.248 iii. 255.255.255.250
iv. 255.255.255.252 v. 255.255.255.224

DYLEN A. WOLFF 34
System Analysis and Design
2012
1. Human blood circulatory system can be classified as a
i. Natural and closed system ii. Artificial and closed system
iii. Artificial and open system iv. Natural and open system
v. Natural and artificial system

2. Which of the following best describes a non-functional requirement of a mobile phone?


i. Sending a short message ii. Receiving a telephone call
iii. Selecting a number from the contact list iv. Making a telephone call
v. Having one year warranty for the battery

3. An electronic washing machine can be best considered as a/an


i. Information system ii. Automated system
iii. Expert system iv. Management support system
v. Transaction processing system

2013
4. Which of the following can be best described as an expert system?
i. A bank teller machine ii. A fully automatic washing machine
iii. A microwave oven iv. An electronic blood pressure meter
v. A diagnosis system of a health care facility

5. Which of the following information system development models has an extremely short and linear
development process?
i. Waterfall model ii. Object-oriented model
iii. Spiral model iv. Incremental Development model
v. Rapid Application Development model

6. Consider the following data flow diagram:

In the above data flow diagram, A, B3 and C2 represent


i. a process, an external entity and a datastore
ii. an external entity, a process and a datastore
iii. an external entity, a datastore and a process
iv. a datastore, a process and an external entity
v. a datastore, an external entity and a process

DYLEN A. WOLFF 35
7. Consider the following systems in a human body:
A. Respiratory system
B. Digestive system
C. Nervous system
D. Blood circulatory system
Which of the above are closed systems?
i. A and B only ii. A and C only iii. B and C only
iv. B and D only v. C and D only

8. Which of the following statements best describes a non-functional requirement of a system?


i. User shall be able to measure the blood pressure using an electronic blood pressure meter
ii. A microwave oven should not exceed its temperature above 400o C.
iii. An electronic calculator should be able to compute square root of a given positive integer
iv. An Automatic Teller Machine of a bank shall be able to check the validity of an ATM card
v. An internet banking system shall provide balance inquiry facility to its customers

2014
9. The Pilot, Phase, Direct and Parallel are four different kinds of system _________ strategies. Which of the
following is most appropriate to fill the blank in the above statement?
i. analysis ii. design iii. testing
iv. implementation v. maintenance

10. Which of the following segment of a Data Flow Diagram best represents the process of getting the contact
list of a mobile phone?
i.

ii.

iii.

iv.

`
v.

DYLEN A. WOLFF 36
11. Which of the following systems should always be based on Artificial intelligence?
A. Expert systems
B. Enterprise Resource Planning (ERP) Systems
C. Multi-agent systems
D. Geographical Information Systems
i. A and B only ii. A and C only iii. A and D only
iv. B and D only v. C and D only

12. Consider the following statements about an automated system:


A. Human intervention is not required or minimally required.
B. All the operations of the machine are controlled by the microchip installed in the machine.
C. A system that processes daily banking transactions can be considered as an automated system.
Which of the above statement(s) is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

13. Consider the following statements regarding the requirements of a bank ATM:
A. A customer shall be able to inquire his/her bank balance
B. A customer should be able to deposit money through ATM
C. Maximum withdrawal amount per day is Rs. 20,000.
Which of the above statement(s) is/are functional requirement(s) of the ATM?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

14. Consider the following systems:


A. Human blood circulatory system
B. Human digestive system
C. Human nervous system
The system(s) that can be considered as open systems(s) is/are
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

2015
15. Consider the following statement regarding an Automatic Teller Machine (ATM) of a bank:
“System shall dispense cash in less than 10 seconds.”
Which of the following is correct with respect to the above statement?
i. This is an essential non-functional requirement.
ii. This is a nice to have non-functional requirement.
iii. This is an essential functional requirement.
iv. This is a nice to have functional requirement.
v. This is not a requirement of the system.

DYLEN A. WOLFF 37
16. Consider the following Data Flow Diagram:

According to the Structural System Analysis and Design Methodology (SSADM), the components A, B and
C in the above diagram represents _________ respectively.
i. an external entity, a process and a data flow
ii. a process, an entity and a data store
iii. a user, a process and a table in an electronic database
iv. a user, a function and a table in an electronic database
v. an external entity, a process and a data store

17. Which of the following statements is correct with respect to openness and closeness of a system?
i. An Automatic Teller Machine of a bank should be a close system.
ii. A general-purpose computer can be considered as an open system.
iii. Human blood circulatory system is an open system.
iv. A mobile phone is a close system.
v. A solar power generation system is a close system.

2016
18. Consider the following system implementation methods:
A. Direct B. Phase C. Parallel
Which of the above methods can be recommended to implement an emergency call handling system?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

19. Which of the following statements is an example for an essential non-functional requirement of an
internet banking system?
i. System shall facilitate its users to open accounts.
ii. System shall facilitate its users to check account balance.
iii. System shall use a 256-bit encryption for all communications.
iv. System should facilitate its users to order cheque books.
v. System should be able to render information on all popular web browsers.

20. Which of the following is the most appropriate example for a manual temporary data store?
i. A file tray ii. A cardboard file iii. A file cabinet
iv. A data file in a hard-disk v. A temporary data file in a hard-disk

21. Which of the following is correct about open systems?


i. All inputs required for an open system is available within the system itself.
ii. Open systems cannot interact with other systems.
iii. Open systems do not need other systems for its operations.
iv. Humans can make open systems
v. All natural systems are open systems.

DYLEN A. WOLFF 38
22. Which of the following high-level data flow diagram is correct with respect to the rules on data flow
modelling?
i.

ii.

iii.

Iv

v.

2017
23. Which of the following statements best describes a nice to have non-functional requirement of an
Automated Teller Machine (ATM)?
i. System shall facilitate users to withdraw money.
ii. System should let users to deposit money.
iii. System shall use 256-bit encryption for all communications.
iv. System should provide users a touchscreen interface.
v. System shall dispense money within 5 seconds.

24. The following symbol, appeared in a Data Flow Diagram (DFD) of a Sales Information System, represents
_________ containing payment details.

Which of the following is most appropriate to fill in the blank in the above statement?
i. file tray ii. cardboard file
iii. file cabinet iv. data file in a hard disk
v. temporary data file in a hard-disk

25. Which of the following organs is a part of a closed system of the human body?
i. Eye ii. Ear iii. Heart
iv. Kidney v. Lung

DYLEN A. WOLFF 39
26. Which of the following dataflow diagrams is correct with respect to the rules of a dataflow modelling?
i.

ii.

iii.

Iv

v.

27. Which of the following statement is true about Artificial Intelligence?


i. Interference Engine in an Expert System completely mimics human decision-making process.
ii. Knowledge Base in an Expert System consists only the primary knowledge of an expert.
iii. Expert systems are always implemented by using Genetic Algorithms.
iv. Genetic Algorithms provide only one solution to a given problem.
v. Genetic Algorithm evolves a solution for a given problem over a number of iterations.

28. Requirements of a system can be classified as Mandatory (Essential), Desirable (Optional), Functional and
Non-functional.
“ATM of a bank shall not allow more than three attempts to enter a user’s secret number incorrectly”
Which of following correctly classifies the above requirement?
i. Mandatory, Functional ii. Mandatory, Non-functional
iii. Desirable, Functional iv. Desirable, Non-functional
v. Mandatory or Desirable, Functional

29. Consider the following system implementation methods:


A. Direct B. Pilot C. Parallel
Which of the above methods is/are suitable generally used to implement a home security system?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

DYLEN A. WOLFF 40
2018
30. Consider the following statements relevant to external entities of Data Flow Diagrams.
A. An external entity can be a person, system or organization that has predefined behaviour.
B. An external entity can be a source of input data for a process a process or/and a destination of
the output of a process.
C. External entities are always data stores.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

31. Consider the following tasks.


A. Identifying the problems in the existing system.
B. Suggesting alternative solutions.
C. Prioritizing of the information system’s requirements.
Which of the above tasks is/are carried out during the preliminary investigations of systems development
life cycle?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

32. Which of the following feasibility types is generally not carried out during the development of a system
to be used only in-house?
i. Economic feasibility ii. Market feasibility
iii. Operational feasibility iv. Organizational feasibility
v. Technical feasibility

33. Consider the following statements regarding functional and non-functional requirements of a sales
system.
I. Reads barcodes of items purchased and produces the invoice.
II. Accepts user’s request and responds in less than 1 second.
III. Processes a minimum of 1,000 transactions per second.
Which of the following is the correct classification of requirements?
i. I, II and III all functional
ii. I – functional, II and III – non-functional
iii. II – functional, I and III – non-functional
iv. I and III – functional, II – non-functional
v. I, II and III all non-functional

34. Consider the following software development lifecycle models.


A. spiral
B. waterfall
C. Rapid Application Development (RAD)
Which of the above required defining and finalizing requirements in the early phases of the lifecycle?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

DYLEN A. WOLFF 41
35. Consider the following statements regarding Structured and Object-Oriented software development
methodologies.
A. Structured analysis and design represents systems as a hierarchy of functions.
B. Structured design is a system of interacting objects.
C. Object oriented methodology combines data and processes into individual entities.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

36. Which of the following shows the correct order of software testing?
i. acceptance testing  system testing  integration testing  unit testing
ii. unit testing  acceptance testing  system testing  integration testing
iii. unit testing  integration testing  acceptance testing  system testing
iv. unit testing  integration testing  system testing  acceptance testing
v. white-box testing  black-box testing  system testing  unit testing

37. A software development company identifies that their new system development project has complex
requirements and has a medium to high risk level. Further, an evaluation is need to clear the
requirements and significant changes are expected during system development.
What is the most suitable software development process model for this project?
i. Agile ii. Prototyping iii. Spiral
iv. Waterfall v. Rapid Application Development

2019
38. Which of the following indicates a non-functional requirement?
A. A user shall be allowed to upload an image to the system to be used as his/her profile picture.
B. The correct invoice value should be calculated including the applicable tax rates at the check-out.
C. The system must satisfy 99.9% availability of service.
i. A only ii. B only iii. C only
iv. A and B only v. All A, B and C

39. What is the correct statement related to system deployment>?


i. Direct deployment is the most complex and the slowest form of deployment.
ii. In pilot deployment, all the users have the ability to use the system in the beginning.
iii. In parallel deployment old and new systems are used at the same time.
iv. Phased deployment do not allow users to develop skills required for new system gradually.
v. Phased deployment means the entire system is used in one location.

2020
40. Which of the following statements regarding testing of a system are correct?
A. Black-box testing involves detailed checking of each line in the code.
B. Unit-testing helps to uncover errors in the codes.
C. System testing should not be performed prior to unit-testing.
i. A only ii. B only iii. C only
iv. A and C only v. B and C only

DYLEN A. WOLFF 42
41. Which of the following indicate functional requirements?
A. The users should be allowed to update their contact addresses and phone numbers.
B. Any user request must be responded within 2 ms.
C. The system must be easy to change.
i. A only ii. B only iii. C only
iv. A and C only v. All A, B and C

42. The following details are given about a software project.


A. Requirements are fixed (not allowed to change throughout the complete project)
B. Must deliver the complete software product at once.
C. Detailed descriptions and specifications must be prepared for each activity within the project.
What is the most suitable software process model for this project?
i. Agile
ii. Prototype
iii. Rapid application development
iv. Spiral
v. Waterfall

43. Which of the following statements on Data Flow Diagrams (DFD) is incorrect?
i. Context diagram is a DFD with the highest level of abstraction.
ii. All data stores in a system must be represented in the context diagram.
iii. Data flows are used to link the other components in DFDs.
iv. Elementary processes are not decomposed further.
v. External entities in DFDs act as sources or recipients of data.

DYLEN A. WOLFF 43
Database Management
2012
1. Which of the following statements is correct about relational databases?
i. The primary key of a table is selected from alternate keys
ii. Duplicate values are not allowed in a foreign key field of a table
iii. A table cannot be created without a primary key
iv. A foreign key of a table should be the primary key of another table
v. A table should have alternate keys

2. Consider the following models:


A. Network model
B. Waterfall model
C. Relational model
Which of the following is a/are database models?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

3. Consider the following statements about Relational Databases:


A. A table is considered as an object
B. A column of data is called a field/an attribute of that table
C. A row of data in a table is called a record
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

4. Consider the following statements with respect to ER diagrams:


A. A relationship in an ER diagram can be implemented as a table in a relational database.
B. A relationship may have attributes attached to it.
C. Only two entities can be attached to a relationship
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

5. Consider the following relation:


Student (stdNo, name, address, nicNo, date_of_birth)
Which of the following SQL (Structured Query Language) statements on the student relation is syntactically
correct?
i. select *.* from student ii. select all from student
iii. select * from student iv. select stdNo.name from student
v. select stdNo; name from student

DYLEN A. WOLFF 44
6. Consider the following database operations
A. Remove records from a table
B. Add new data to a table
C. Modify the existing data in a table
D. Retrieve data from a table
“The SQL statements __________ should be used to perform the database operations A, B, C and D
respectively.”
Which of the following is most appropriate to fill the blank in the above statement?
i. delete, select, update and insert ii. delete, insert, select and update
iii. select, delete, insert and update iv. insert, select, delete and update
v. delete, insert, update and select

7. Which of the following statements about relational database is correct?


i. A value of a composite key of a table can be null
ii. Null values are allowed in any column of a table
iii. Two or more columns of a table can be combined to create the primary key
iv. Values of a foreign key of a table cannot be updated
v. Once created, the structure of a table cannot be altered

2013
8. Which of the following is the most appropriate Entity Relationship (ER) diagram to represent students’
participation in different sports in school?
i.

ii.

iii.

iv.

v.

DYLEN A. WOLFF 45
9. Which of the following is correct with respect to a relational database?
i. Any subset of Alternate Key is called Candidate Key
ii. A Primary Key is selected from Alternate Keys
iii. A Foreign Key is an Alternate Key
iv. Always Primary Key and Foreign Key are combined to create a Compound Key
v. Primary Key and Foreign Key establish the relationship between two tables

10. Consider the following statements regarding relational databases.


A. Changing the column order of relations in a database structure does not necessarily require
changes in application programs.
B. Main objective of normalization of databases is to reduce data redundancy.
C. Adding new data to the databases always requires changes to the existing programs.
Which of the above statements is/are correct?
i. A only
ii. B only
iii. A and B only
iv. A and C only
v. All A, B and C

11. Consider the following two relations:


student(stdNo, name)
courseMarks(coursed, stdNo, marks)
Which of the following SQL (Structured Query Language) statements on the above relations is
syntactically correct?
i. select stdNo, marks from student, courseMarks
ii. select * from student and courseMarks
iii. select s.stdNo and c.marks from student s, courseMarks c
iv. select student.stdNo, courseMarks.marks from student, courseMarks
where student.stdNo = courseMarks.stdNo
v. select student.stdNo and courseMarks.marks from student and courseMarks
where student.stdNo = courseMarks.stdNo

2014
12. Which of the following relations is in in the 3rd normal form?
i. student(studentIndexNo, name, parentName)
ii. sport(sportId, sportName, teacherName, teacherId)
iii. teacher(teacherId, teacherName, telephoneNumber, subjectName, subjectId)
iv. book(ISBN, title)
v. patient(patientId, patientName, ward, wardId)

DYLEN A. WOLFF 46
● Consider the following three tables in a relational database to answer questions 13 to 16.
subject exam examSubject
subjectId Title examId Name examId subjectId examDate
SUB001 I.C.T. EXAM001 GCE OL EXAM001 SUB001 2014.12.12
SUB002 Chemistry EXAM002 GCE AL EXAM002 SUB001 2014.08.21
SUB003 Physics EXAM002 SUB002 2014.08.21
EXAM002 SUB003 2014.08.21

13. Which of the following is the most suitable Entity Relationship (ER) diagram to represent the above
relational database tables?
i. ii.

iii. iv.

v.

14. Which of the following is the correct primary key for the examSubject table?
i. examId ii. examId, subjectId iii. examId, examDate
iv. subjectId, examDate v. examId, subjectId, name

15. Which of the following is the correct SQL statement to retrieve examId, name, name and examDate of all
examinations?
i. select examSubject.examId, name, examDate from exam, examSubject where
exam.examId = examSubject.examId
ii. select examId, name, examDate from exam and examSubject where
exam.examId = examSubject.examId
iii. select examId and name and examDate from exam and examSubject where
exam.examId = examSubject.examId
iv. select * from exam and examSubject where exam.examId = examSubject.examId
v. select * from exam, examSubject where exam.examId = examSubject.examId

16. Which of the following SQL statements changes only the date of examination of Physics paper of GCE AL
examination to 2014.08.25?
i. update examSubject set examDate=’2014.08.25’ where subjectId=’SUB003’ or ‘sub003’
ii. update examSubject set examDate=’2014.08.25’ where examId=’EXAM002’ or subjectId=’SUB003’
iii. update examSubject set examDate=’2014.08.25’ where examId=’EXAM002’ and subjectId=’SUB003’
iv. update examSubject set examDate=’2014.08.25’ where examDate=’2014.08.21’
v. update examSubject set examDate=’2014.08.25’ where examId=’EXAM002’ or subjectId=’SUB003’ or
examDate=’2014.08.23’

DYLEN A. WOLFF 47
2015
● Consider the following relations to answer the questions from 17 to 19.
programmer(programmerId, programmerName, gender, NIC, phoneNumber, degree, universityName)
client(clientId, clientName, address, phoneNumber)
project(projectId, projectName, clientId, startDate, endDate, cost)
workFor(programmerId, projectId, startDate, endDate)

17. Consider the following statements:


A. A programmer works for at most4 one project at any given time.
B. A programmer is assigned to a single client at any given time.
C. One client can have more than one project.
Which of the above statement(s) is/are always correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

18. Which of the following is correct with respect to attributes of the relations?
i. Attributes gender, NIC and phoneNumber are candidate keys of programmer relation.
ii. Attribute startDate is a derived attribute.
iii. Attribute NIC can be considered as an alternate key for the programmer relation.
iv. Attribute startDate is a foreign key for the workFor relation.
v. Each record in the workFor relation can be uniquely identified by using projectId.

19. Which of the following is correct?


i. All relations are in 3rd normal form.
ii. All relations except the programmer are in the 3rd normal form.
iii. All relations except the client are in the 3rd normal form.
iv. All relations except the project are in the 3rd normal form.
v. All relations except the workFor are in the 3rd normal form.

20. Consider the following database constraints:


A. Primary key
B. Data type
C. Foreign key
Which of the above constraint/s does/do not allow the users to duplicate data in a database table?
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

DYLEN A. WOLFF 48
● Consider the following four relational database tables to answer questions 40 and 41.
item table supplier table
item product supplier name
T001 Laptop S001 BeLap Company Ltd.
T002 TV S002 DigiTV trading company
T003 Camera
delivery table
itemSupplier table item supplier batch quantity date
item supplier T001 S001 B01 450 1.5.2015
T001 S001 T002 S001 AB1 45 1.5.2015
T002 S001 T001 S001 B02 500 2.5.2015
T003 S002 T001 S002 C01 75 5.5.2015

21. Which of the following actions taken by a database management system when the SQL statement “delete
from item” is executed?
i. It will ask the user to select records for deletion.
ii. It may delete all the records from the ‘item’ table.
iii. It will drop the ‘item’ table.
iv. It will not delete any record from the ‘item’ table.
v. The SQL statement will not execute since it has errors.
vi.
22. Which of the following is correct with respect to the above tables?
i. All the tables are in third normal form.
ii. Normalization has been applied to these tables.
iii. Integrity constraints are correctly applied to these tables.
iv. There is no evidence to say that integrity constraints are applied properly.
v. Normalization and integrity constraints are properly applied.

2016
● Consider the following relation to answer questions 23 and 24.
book (BN, title, publisher, version, author1, author2, author3)
where BN is a unique code.
23. Which of the following statements is correct with respect to the above relation?
i. It is in zero normal form. ii. It is in the 1st normal form.
iii. It is in the 2nd normal form. iv. It is in the 3rd normal form.
v. Its normal form cannot be decided.

24. Which of the followings can be a candidate key of the above relation?
i. BN ii. publisher iii. version
iv. author1 v. author2

25. Which of the following Is correct with respect to the term ‘domain’ in a relational database?
i. It is a set of possible names for a table.
ii. It is a set of possible names for an attribute.
iii. It is the collection of all possible primary keys.
iv. It is the set of all possible values of an attribute.
v. It is the collection of foreign keys.

DYLEN A. WOLFF 49
26. Which of the following is correct with respect to the output of an SQL statement?
i. It generates an error if no data is available in the tables referred in the SQL statement.
ii. It is always a table.
iii. The order of the attributes in the output should be the same as the order of attributes in the table
definition.
iv. Outputs cannot be produced if the primary keys are not defined.
v. Names of the attributes in the output should be the same as the names in the table definition.

27. The length of an attribute defined using a Data Definition Language (DDL) statement is a/an _________
constraint.
Which of the following is the most appropriate to fill the blank in the above statement?
i. primary key ii. foreign key iii. null value
iv. domain v. application

28. Consider the following table in a relational database:


student name telephone zscore
S0001 Dananjaya 0711118337 1.8
S0002 Saluki 0712227447 1.9
S0003 Upul 0713333882 2.0
S0004 Priyankara 0714445225 1.9
S0005 Supun 0715556446 2.1
What is the minimum number of SQL statements required to update all the values of the attribute zscore in
the above table to 2.1?
i. 1 ii. 2 iii. 3 iv. 4 v. 5

2017
● Consider the following relation to answer questions 29 and 30.
Student (index_no, national_id_no, date_of_birth, gender, blood_group)
where index_no is a unique attribute and the name attribute fully depends on the index_no attribute.
29. Which of the following statements is correct with respect to the normal form of the above relation.
i. It is in the zero normal form ii. It is in the first normal form
iii. It is in the second normal form iv. It is in the third normal form
v. Its normal form cannot be decided

30. Which of the followings can be a candidate key of the above relation?
i. national_id_no ii. name iii. date_of_birth
iv. gender v. blood_group

DYLEN A. WOLFF 50
 Consider the following relations to answer questions 31 to 34.
book (book_no, title, publisher. edition)
author (authorid, name, email_address)
bookAuthor (book_no, author_id)
where book_no and author_id are unique attributes in the relations book and author respectively.
31. Which if the following statements is correct with respect to the relation bookAuthor?
i. book_no is the primary key.
ii. author_id is the primary key.
iii. Any single attribute can be a candidate key.
iv. author_id is a candidate key.
v. book_no is a part of the primary key.

32. Which of the following Entity Relationship (ER) diagram correctly represents the relation between the
entities represented by the above relations?
i.

ii.

iii.

Iv

v.

33. Assume that above relations are converted into tables in a relational database. The following SQL query
is executed on the database:
SELECT * FROM bookAuthor
Which of the following statements is correct regarding the output of the above SQL query?
i. It cannot be an empty field.
ii. title column is in it.
iii. name column is in it.
iv. All the tables book, author and bookAuthor are used to produce the output.
v. All the records in the bookAuthor table are in the output.

34. Consider the following statements regarding the Data Definition Language (DDL) used to create the table
bookAuthor while maintaining data integrity:
A. It has a primary key constraint.
B. It has a foreign key constraint.
C. It has a domain constraint.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

DYLEN A. WOLFF 51
2018
35. Consider the following statements regarding databases.
A. Candidate key is a column, or a set of columns that can uniquely identify a row in a table.
B. Alternate key is any candidate key that has not been selected as the primary key.
C. Primary key can have a NULL value.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C

36. Consider the following relational schema in a database.


Subject (SubjectId, TermId, SubjectDescription)
Here the SubjectId, TermId and SubjectDescription are _________ and Subject is _________.
Which of the following are more suitable to fill the blanks, respectively?
i. attributes, a relation ii. relations, an attribute
iii. tuples (records), a relation iv. tuples, an attribute
v. relations, a tuple

37. Consider the following statements regarding database.


A. For each attribute of a relation, there is a set of permitted values, called the domain of that
attribute.
B. The tuples (records) of the relations are always in sorted order.
C. Database schema shows the organization of data as a blueprint of how the database is
constructed.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

 Consider the following relational schema consisting of text fields in answering questions 39 and 40.
Students (admission_number, surname_with_initials, house_number, street_name, village,
postal_town, postal_code)
Assume that for a given postal_town, only one postal_code exists.
38. Consider the following statements.
A. Students relation is not normalized.
B. Students is a relation in First Normal Form (1NF) only.
C. In normalization terms, Students is a relation in Second Normal Form (2NF) and hence also in 1NF.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and C only
iv. B and C only v. All A, B and C

39. Which of the following is displayed as output if the query:


select * from Students where postal_code=’10120’ and house_number=’30A’;
is executed?
i. postal_code of all records.
ii. postal_code and house_number of records having postal_code as '10120' and house_number as '30A'
iii. postal_code and house_number of all records
iv. all fields of records having postal_code as '10120' and house_number as '30A'
v. all fields of all records

DYLEN A. WOLFF 52
40. Consider the following statements relating to Entity Relationship (ER) modelling.
A. Cardinality specifies how many instances of an entity relates to one instance of another entity.
B. An entity is a “thing” or an “object” in the real world that can be identified separately
(distinguishable) from all other objects.
C. Cardinality specifies primary key attributes of an entity.
Which of the above is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

2019
 Consider the following database table to answer the questions 42 to 44.
Student_Sport
Student_Id Event_Id Event_Name
10012 S-02 Carrom
10022 S-01 Basketball
10018 S-02 Carrom
10012 S-03 Volleyball
10025 S-04 Chess
10018 S-01 Basketball

41. In which normal form does the above table exist?


i. BCNF ii. First normal form iii. Second normal form
iv. Third normal form v. Zero normal form

42. Consider the following statements regarding the above table.


A. It has a composite key.
B. Event_Name attribute is fully dependent on the primary key of Student_Sport table.
C. Event_Id is a candidate key.
Which of the above statements is/are correct?
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C

43. It is required to add new field called Age Student_Sport table and the values of the new field must be
greater than 10.
Which one is the correct SQL statement to implement the above statement?
i. Alter table Student_Sport add check (Age > 10);
ii. Alter table Student_Sport add where (Age > 10);
iii. Alter table Student_Sport set check (Age > 10);
iv. Update table Student_Sport add check (Age > 10);
v. Update table Student_Sport add where (Age > 10);

44. Which of the following SQL commands is not available in the Data Manipulation Language (DML)?
i. Create ii. Delete iii. Insert
iv. Select v. Update

DYLEN A. WOLFF 53
45. Consider the following statements regarding the Extended Entity Relationship (EER) model.
A. EER model includes all the concepts of the original ER model.
B. EER model has additional concepts of specialization/generalization.
C. EER model includes a new concept to model the weak entities.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. A and C only v. All A, B and C

46. Consider the following SQL statement.


Update school set contact_person=’Sripal W.’ where school_id=’04’;
Which of the following is true when the above SQL statement is executed?
i. It adds an additional field with the name contact_person and adds value into that new field as
‘Sripal W.’ only in the records having school_id = 04.
ii. It adds an additional value with the name contact_person and adds value into that new field as
‘Sripal W.’ only in the records having school_id = 04.
iii. It changes the field name of contact_person as ‘Sripal W.’ when selecting the records with
school_id = 04
iv. It changes the value of contact_person as ‘Sripal W.’ when selecting the records with school_id = 04.
v. It selects all the records having school_id = 04 and contact person as ‘Sripal W.’

47. What is the correct SQL statement to delete a database called ‘ALdb’?
i. delete ALdb; ii. delete database ALdb; iii. drop ALdb;
iv. drop database ALdb; v. remove database ALdb;

48. Which of the following statements about a relation in the Second Normal Form (2NF) are true?
A. It can have a composite key.
B. It should be in the First Normal Form (1NF) as well.
C. All non-key attributes are fully functionally dependent on the primary key.
i. B only ii. C only iii. A and B only
iv. B and C only v. All A, B and C

49. Which of the following statements regarding the logical database schema are true?
A. It is a blueprint for a database.
B. It contains data and information
C. It formulates all the constraints that are to be applied on the data.
i. A only
ii. A and B only
iii. A and C only
iv. B and C only
v. All A, B and C

50. Consider the following SQL statements.


Alter table subject add primary key (Subject_Id);
Which of the following is incorrect about the above
i. It adds a primary key constraint to the table named subject.
ii. The table named subject should already exist.
iii. The field Subject_Id should not be null.
iv. A table named subject is created with a primary key named Subject_Id.
v. The values of the field Subject_Id should not be repeated in subject table.

DYLEN A. WOLFF 54
 Consider the following scenario about ‘authors’ and ‘book’ to answer the questions 52 and 53.
“An author can write books. A book has a title and a code called ISBN which is unique. A book can be
written by either one or several authors. An author has a name and a unique ID. An author can have a
type as either chief author or a co-author for a particular book.”
51. Which of the following is the most suitable Entity Relationship (ER) representation for the above
scenario?
i.

ii.

iii.

iv.

v.

52. How many tables can be derived initially, when mapping the entity relationships in the above scenario to
a relational database?
i. 1 ii. 2 iii. 3 iv. 4 v. 5

DYLEN A. WOLFF 55
Programming
2012
1. The required minimum and maximum working hours per day for an employee in a factory are 5 and 12
respectively. Which of the following is the most appropriate validation check to ensure that the integer
value entered as the working hours, through a web-based form is correct?
i. Range ii. Length iii. Type
iv. Numeric value v. Number of digits

2. What is the result of evaluating the Python expression 10 % 3?


i. 0 ii. 1 iii. 2
iv. 3 v. 10

3. Consider the following pseudo code

What is the output of the above pseudo code?


i. 10 ii. 15 iii. 20
iv. 25 v. 55

● Consider the following flow chart to answer the questions 4 and 5.


4. What flow control structure/s is/are used in
the flow chart?
i. Sequence only
ii. Sequence and selection only
iii. Sequence and iteration only
iv. Selection and iteration only
v. Sequence, selection and iteration only

5. Which of the following statements about the


algorithm represented by this flow chart is
correct if the user inputs the value 6?
i. It stops when the value of I is equal to 6
ii. It prints the value 4 as one of the outputs
iii. It prints the value 2 as one of the outputs
iv. It prints all the integers from 1 to 6
v. It prints all the integers from 1 to 5

DYLEN A. WOLFF 56
6. Consider the following assignment statements
A. a, b = “Nimal”, 30 B. a, b = 1 C. a = b = 1
D. a = True E. a = true
Which of the above are syntactically correct Python statements?
i. A and C only ii. B and D only iii. A, C and D only
iv. B, D and E only v. C, D and E only

7. Consider the following statements about Python data types:


A. A tuple consists of ordered number of values separated by commas
B. A dictionary comprises of an unordered set of key:value pairs separated by commas and enclosed
in “{”, ”}” brackets.
C. A value in a tuple can be modified as in a dictionary.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

8. Which of the following Python program is syntactically correct?


i.

ii.

iii.

iv.

v.

DYLEN A. WOLFF 57
9. Consider the following incomplete Python statement

To arrange the data items in the “name” data structure in the reverse alphabetical order, which of the
following Python statements should be included at the blank line?
i. (name[i] < name[k]): ii. (name[i] > name[k]): iii. (name[i] = name[k]):
iv. (name[i] < name[k]); v. (name[i] < name[k]);

10. Consider the following python program:

What is the output of this program?


i. 23 ii. 10 iii. 5 iv. 2 v. -3

11. Consider the following python program:

The content of the file “input.txt” is given below.

After executing the program, what would be the content of the file “output.txt” looks like?
i. ii.

iii. iv.

v.

DYLEN A. WOLFF 58
2013
12. What is the output of the following Python program?

i. Ni ii. im iii. ra iv. er v. Pe

13. Which of the following is a valid Python statement that can be used to pent a filed called “output.txt” so
that new data can be added to the end of the file without deleting its original content?
i. open = infile (“output.txt”, ”r”) ii. infile = open (“output.txt”, ”r”)
iii. infile = open (“output.txt”, ”a”) iv. open = infile (“output.txt”, ”a”)
v. infile = open(“output.txt”, ”w”)

14. Consider the following Python statements:

What are the data types of the variable a, b and c respectively?


i. 6 ii. 4 2 iii. 2 4 6 iv. 4 2 0 v. 0

15. Which of the following is an invalid Python identifier?


i. _name ii. Name iii. Name_
iv. 6Name v. _6_names

16. Consider the following Python program:

What is the output?


i. [4, 6] ii. 10 iii. [1, 2, 3, 4]
iv. [[1, 2],[3, 4]] v. 28

17. What is the value after executing the Python expression 10 – 3 * 2 + 2.0?
i. 16 ii. 16.0 iii. 6 iv. 3.0 v. 28

18. Which of the following is a syntactically correct Python program?


i. ii. iii.

iv. v.

DYLEN A. WOLFF 59
● Use the following flowchart to answer the questions 19 and 20
19. What is the output of the algorithm represented by this flowchart?
i. 0 ii. 5
iii. 4 iv. 10
v. 15

20. Which of the following Python programs correctly represent this


flowchart?
i. ii.

iii.

v.

2014
21. Which of the following statements is true with respect to comments in programming languages?
i. Machine languages belong to the second-generation programming languages.
ii. Assembly language programs can run directly on any computer.
iii. Assembly language belong to the first-generation programming languages.
iv. Assembly language is more human readable form of machine language.
v. Machine language programs can be translated into assemble language program by using assemblers.

22. Which of the following statements is true with respect to comments in programming languages?
i. At the time of execution, comments are translated into special machine instruction.
ii. Comments should always be limited to a single line.
iii. Comments should start with the symbol # in all programming languages.
iv. It is a good practice to include comments in a program to explain its functionality.
v. In Python programming, comments should always start at the first column.

23. Which of the followings is an invalid Python variable name?


i. MyCountry ii. mycountry iii. My country
iv. My_country v. _my_country

24. Which of the following is a syntactically correct Python function?


i. ii.

iii. iv.

v.

DYLEN A. WOLFF 60
● Use the following flowchart to answer questions 25 and 26.
25. If a user input 20, 27, 18 for
the variables A, B, C
respectively, the output
will be
i. 18
ii. 20
iii. 27
iv. 20, 27
v. 27, 18

26. Which of the following Python programs correctly implements the above flowchart?
i. ii.

iii. iv.

v.

DYLEN A. WOLFF 61
27. What will be the output when the following Python code is executed?

i. 2 ii. [3,’b’,4] iii. ‘b’ iv. 4 v. 22

28. What is the value of variable z after executing the Python statement z = 1 == 2?
i. 0 ii. 1 iii. True iv. False v. Null

29. Which of the following Python expression shows the correct evaluation order of the Python expression
10 + 4 * 3 / 2 – 5?
i. (((10 + 4) * 3) / 2) – 5 ii. ((10 + (4 * 3)) / 2) – 5 iii. 10 + (4 * ((3 / 2) – 5))
iv. 10 + ((4 * (3 / 2)) – 5) v. (10 + ((4 * 3) / 2)) – 5

30. Consider the following statements about syntax or semantic errors in Python programming language:
A. A program with syntax errors will not run to the end of the program.
B. A program with only semantic errors will not run to its end.
C. Syntax errors in programs is also called logical errors.
D. Programs with semantic errors man not produce correct outputs for some inputs.
Which of the following statements is correct?
i. A and B only ii. A and C only iii. A and D only
iv. B and C only v. B and D only

2015
31. Consider the following statements about computer programming languages:
A. The processor of a typical computer an understand and execute only the machine language of that
processor.
B. The processor of a typical computer can understand and execute any machine language of any
processor.
C. The processor of a typical computer can understand and execute any program in any assembly
language.
D. The processor of a typical computer can understand and execute Python language.
Which of the following statement(s) is/are true?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. C and D only

32. Consider the following python program:

What is the output of the above python program?


i. [23,45] ii. [-2,0] iii. [23,2,0]
iv. [2,-2,0] v. [23,45,2,-2,0]

DYLEN A. WOLFF 62
● Questions 67 to 70 are based on an algorithm represented by the flowchart.
33. Consider the following statements:
A. This algorithm takes only a single input
B. This algorithm does not have any repetition (loop)
C. If the user inputs -1 for X, the algorithm will not terminate.
D. When the user inputs 1 for X, the algorithm will not terminate
till the user enters another value.
Which of the above statement(s) is/are correct?
i. A only ii. A and B only
iii. A and D only iv. B and C only
v. C and D only

34. The algorithm represented by the flowchart is considered as a poor


algorithm because it does not
i. terminate for some values.
ii. contain finite number of steps.
iii. specify the next step to be performed at least for one step of the
algorithm.
iv. consist of a sequence of steps.
v. contain any variable type declarations.

35. The algorithm terminates


i. for input value 5.
ii. when values 0, 5, 4 are given as input one after the other.
iii. by printing the value 5 when it is given the input values 2, 5, 4 one after the other.
iv. by printing the value 4 when it is given the input values 2, 5, 4 one after the other.
v. by printing the value 9 when it is given the input values 2, 5, 4 one after the other.

36. Which of the following Python programs implements the behaviour of the flow chart?
i. ii.

iii. iv.

v.

DYLEN A. WOLFF 63
● Questions from 71 to 74 are based on the following Python program.

37. Consider the following statements about this Python code:


A. It contains a comment.
B. It contains a definition of a function.
C. It does not contain any selections.
D. It does not contain any iterations.
Which of the above statements are correct?
i. A and B only ii. A and C only iii. B and C only
iv. B and D only v. C and D only

38. What is the data type of the variable ‘temp’ in this Python code?
i. Integer ii. Float iii. Boolean iv. Tuple v. List

39. What is the return data type of the function named ‘f’?
i. Integer ii. Float iii. Boolean iv. Tuple v. List

40. Which of the following value/s is/are in the output of the above program?
i. 23 and 45 ii. 45 and -2 iii. -2 and 0 iv. 0 v. 23

2016
41. Consider the following statements about compilers and interpreters used in programming languages.
A. Compilers/Interpreters are not required to execute a program written in assembly language.
B. Compilers are not essential to execute a program written in machine code.
C. An executable program is translated into a source program by a compiler.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

42. Consider the following statements about flowcharts:


A. A flowchart is a pictorial representation of an algorithm.
B. A flowchart may have more than one ‘stop’ or ‘end’ termination symbol.
C. Algorithm can be represented only by using flowcharts.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

DYLEN A. WOLFF 64
43. The algorithm represented by the following flowchart reads 5 numbers and prints the sum of them.
In order to execute the flowchart correctly, A and B should
be replaced by _________ respectively.
i. i = 0 and i <= 5
ii. i = 1 and i = 5
iii. i = 0 and i > 5
iv. i = 1 and i <= 5
v. i = 1 and i >= 5

44. Which of the following Python program computes the sum of five given integers?
i. ii.

iii. iv.

v.

45. Consider the following Python statement:


temp = [23,45,2,-2,0][:2:]
What would be the value of the variable temp after executing the above statement?
i. 23,45 ii. [23,45] iii. 23,2
iv. [23,2] v. [23,2,0]

DYLEN A. WOLFF 65
46. Cof the following Python code segments is syntactically incorrect?
i. ii. iii.

iv. v.

47. Consider the following Python program segments:

What would be the data types of variables d1, d2 and d3 respectively after the execution of the
programming segment?
i. tuple, tuple, tuple ii. string, tuple, tuple iii. char, tuple, list
iv. string, tuple, list v. tuple, tuple, list

48. Which of the following Python statements is syntactically incorrect?


i. a, b = 10, 15
ii. a = b = 1, 2
iii. a = 1, 2
iv. a, b = 2, (3, 5)
v. a, b = 2, 3, 5

49. What will be the value of the variable x, after executing the following Python statement?
x = 3 – 4 * 6 / 3 + 12 / 4 * 3
i. -5.0
ii. -4.0
iii. -1.0
iv. 4.0
v. 5.0

50. Which of the following Python functions is syntactically incorrect?


i. ii. iii.

iv. v.

DYLEN A. WOLFF 66
2017
51. Consider the following flowchart:
What is the error with the flowchart?
i. It has two end symbols.
ii. Print is not a valid keyword.
iii. It has no process box.
iv. It has two print symbols.
v. A flow direction is not correct.

52. Which of the following statements is true about algorithms?


i. A set of steps used to solve a problem is called an algorithm.
ii. A sequence of activities used to solve a problem is called an algorithm.
iii. To solve any problem, there can be at most one algorithm.
iv. An algorithm can contain an infinite number of steps.
v. An algorithm does not need to terminate within a finite time.

53. Which of the following statements about Python data types/expressions is correct?
i. String is a mutable data type.
ii. List is an immutable data type.
iii. [1, 2, 3] is a tuple.
iv. The expression [1, 2, 3][1] will produce [2] when executed.
v. The type of {‘a’:1, 1:(1, 2)} is a Dictionary.

54. Consider the following Python statement:


temp = [1, 2, 3, 4, 5, 6][2::2]
Which of the following is the value of the variable temp after executing the above statement?
i. 2, 4, 6 ii. 3, 5 iii. [2, 3] iv. [3, 5] v. [2, 4, 6]

55. Consider the following Python statements:


A. a = b = 2 + 3
B. a, b = 2, 3
C. a, b = (2, 3)
D. a = (2, 3)
Which of the above are valid assignment statements in Python?
i. A and B only ii. B and C only iii. C and D only
iv. A, B and C only v. All A, B, C and D

56. Consider the following Python expressions:


A. True or False and True
B. 3 > 2 and False
C. {2, 3} == {3, 2}
D. (2, 3) == (3, 2)
Which of the above expressions would result value True?
i. A and B only ii. A and C only iii. B and C only
iv. B and D only v. C and D only

DYLEN A. WOLFF 67
57. The content of two files with names “in.csv” and “out.csv” are shown in the figures “Fig. 1” and “Fig. 2”
respectively.

Fig. 1: in.csv Fig. 2: out.csv

Which of the following Python programs can be used to transform the data in “in.csv” to the content of
the file “out.csv”?
i.

ii.

iii.

iv.

v.

DYLEN A. WOLFF 68
58. Which of the following functions gives the sum of all elements of all elements in any list of integers?
i. ii.

iii. iv.

v.

2018
59. What is the output of the following Python code segment if executed with 30 as input?

i. 1 ii. 2 iii. 3 iv. 4 v. 5

60. What is the output of the following Python code segment?

i. 0 ii. 10 iii. 45 iv. 55 v. 100

61. What is the output of the following Python code segment?

i. 0 ii. 5 iii. 16 iv. 17 v. 41

DYLEN A. WOLFF 69
 Questions 62-64 are based on the flowchart below. (Note that n % 3 represents n mod 2.)

62. Which of the following is/are correct regarding the algorithm


expressed by the above flow?
A. It takes 10 inputs
B. It compares the sum of the even numbers in the input.
C. To take 100 inputs, only modifying “is i <= 10?” will be sufficient.

i. A only ii. B only


iii. C only iv. A and B only
v. A and C only

63. If the following were fed as inputs to the above algorithm, what will
be the output?
2, 8, 9, 3, 4, 10, 6, 5, 13, 19, 12, 7

i. 10 ii. 30
iii. 42 iv. 49
v. 56

64. For any given input, outputs of which of the following Python
programs will be the same output produced by the algorithm in the
given flowchart?
I II

III

i. I only ii. II only iii. III only


iv. I and II only v. All I, II and III

65. What is the value of the following Python expression?


(5**2) // 3 ^ 4
i. 3 ii. 5 iii. 7
iv. 12 v. 4096

DYLEN A. WOLFF 70
66. Consider the following Python code segment with a blank line. (The line numbers on the left are shown
for guidance only. They are not part of the code.

The above code should consist of a programmer defined function named “sum”. Which of the following
should be entered in the blank on line 2, so that the function “sum” is correctly defined?
i. sum(arg1, arg2): ii. def sum(arg1, arg2):
iii. function sum(arg1, arg2): iv. def sum(arg1, arg2, s):
v. def sum( ):

2019
 Consider the following flowchart to answer the questions 67 to 69.
67. Which of the following statements is/are correct about the algorithm
represented by the flowchart?
A. It takes 8 inputs.
B. It outputs the product of the positive numbers in the input.
C. If every input is zero, then the output will be zero.

i. A only ii. B only


iii. C only iv. A and B only
v. B and C only

68. Which of the following Python programs has/have the same functionality
(i.e., the same output for a given input) as the algorithm in the flowchart?
A B

i. A only ii. B only iii. C only


iv. A and B only v. All A, B and C

DYLEN A. WOLFF 71
69. Which of the following statements is correct?
i. A high-level language program that is translated into machine code and executed on computer X will
not execute on another computer having the same processor as X.
ii. A program in a high-level language must be first converted into assembly language code before
converting into machine code.
iii. Interpreted programs run faster than compiled ones.
iv. Programs in some high-level languages are translated into a form called byte-code because such byte-
codes executes faster than machine codes obtained by usual compilations.
v. Some modern processors execute programs in high-level languages without translating them into
machine code.

70. What is the value of the following Python expression?


(100 // 3) % 4 | 8
i. 0 ii. 0.125 iii. 3 iv. 8 v. 9

71. What will be the output if the following Python code is executed with “abcabc” as the input?

i. 1 ii. 2 iii. 3 iv. 4 v. 5

72. What will be the output of the following Python code?

i. 0 ii. 5 iii. 85 iv. 90 v. 100

73. What will be the output of the following Python code segment?

i. 0 ii. 1 iii. 10 iv. 21 v. 31

DYLEN A. WOLFF 72
74. What will be the result when the following Python code is executed?

i. 50 ii. 2 iii. 4
iv. Syntax error v. Name error

2020
75. Which of the following statements regarding compilers and interpreters are correct?
A. A compiler transforms an entire high-level language program into its machine code.
B. An interpreter convers each high-level program statement into the relevant machine code during
the program run.
C. Compile codes usually run faster than interpreted codes.
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

76. What would be the output of the following Python code, if the input was 17?

i. 24.0 ii. 25.5 iii. 512.0


iv. 614.125 v. an error message

77. Suppose that S is a string, L is a list and T is a tuple in a Python program. The length of each is 10. Consider
the following Python statements.
I. S[2] = ‘2’
II. L[2] = ‘2’
III. T[2] = ‘2’
Which of the above three statements will generate an error?
i. Only I ii. Only II iii. Only I and II
iv. Only I and III v. All I, II and III

78. What would be the output of the following Python code segment?

i. 0 ii. 5 iii. 8 iv. 19 v. 21

DYLEN A. WOLFF 73
79. What would be the output when the following Python code is executed?

i. 1 ii. 2 iii. 3
iv. 4 v. an error occurred

80. What would be the output of the following Python code, if the input was 100?

i. A ii. B iii. C iv. D v. Z

81. What would be the output of the following Python code?

i. 100 ii. 85 iii. 79 iv. 72 v. 7

DYLEN A. WOLFF 74
 The questions 82 – 84 are based on he algorithm expressed by the flowchart. The algorithm takes a list L
of items and an item K is inputs and is expected to output the number of items in L that are equal to K.
List indices start at 0. Note that two entries labelled as Ⓟ and Ⓠ, in the flowchart are blank (unspecified).

82. For the algorithm to function correctly, what should be inserted at


the blank Ⓟ?
i. n = n – 1
ii. n = n + 1
iii. count = count + 1
iv. count = count + i
v. count = count + n

83. For the algorithm to function correctly, what should be inserted at


the blank Ⓠ?
i. Is I < n?
ii. Is I = n?
iii. Is count < n?
iv. Is count < K?
v. Is n > 0?

84. Consider the following Python programs I, II and III.


I

II

III

Which of the above Python programs implement the given


algorithm?
i. I only ii. II only iii. I and II only
iv. I and III only v. All I, II and III

DYLEN A. WOLFF 75
85. Consider the following Python program.

Which of the following statements are correct about the above program?
A. The content of the input file (inFile.txt) is checked in a loop, one line at a time.
B. The total content of one file is written onto another file.
C. If either of the two files does not exist, the program will stop and exit while executing the first two
lines of the code.
i. Only A ii. Only B iii. Only A and B
iv. Only A and C v. All A, B and C

DYLEN A. WOLFF 76
Web Development
2012
1. Which is the correct markup for a comment in HTML document?
i. <! Districts of Sri Lanka ii. <!-- Districts of Sri Lanka -->
iii. //Districts of Sri Lanka iv. <* Districts of Sri Lanka *>
v. <! Districts of Sri Lanka !>

2. Consider the following URL:


http://www.schools.org/2012/lessons/index.html
Which of the following indicates the protocol of the URL?
i. http ii. html iii. www
iv. org v. www.schools.org

3. The HTML tag;


<a href = “sriLanka.html” target=”_blank”></a>
renders the document named “sriLanka.html” by a browser on
i. the same frame ii. a new window
iii. the same window iv. a frame named “_blank”
v. a window named “_blank”

4. Consider the following statements about HTML:


A. A well-formed HTML document should comprise two sections, a head and a body.
B. An HTML document is a computer program
C. White spaces, tabs and blank lines can always be used to format the display of a document
D. The content of the body section is displayed by browsers
Which of the above are correct?
i. A and D only ii. B and C only iii. B and D only
iv. A, C and D only v. B, C and D only

5. Consider the following XML documents:


A. B.

C. D.

Which of the following has/have correct XML syntax?


i. A only ii. D only iii. B and C only
iv. A, C and D only v. B, C and D only

DYLEN A. WOLFF 77
6. Which of the following HTML codes generates the table shown below?

i ii.

iii.

v.

2013
7. Consider the following components:
A. Web authoring tool
B. Domain name
C. Web pages
D. Web server
Which of the above components are essential for hosting a website?
i. A and B only ii. B and C only iii. A, B and C only
iv. A. C and D only v. B, C and D only

DYLEN A. WOLFF 78
8. Which of the following tag is used to render a heading on an HTML page?
i. <h2> ii. <ol> iii. <ul>
iv. <hr> v. <td>

9. Which of the following could be used to define a new markup language for sharing information?
i. CSS ii. XML iii. HTML
iv. XHTML v. JavaScript

10. Consider the following HTML code segment:

Which of the following shows the correct rendering of the above HTML code segment?
i. Teacher ii. Teacher
A person who teaches in a school - A person who teaches in a school
Student Student
A person who is studying at a school - A person who is studying at a school

iii. Teacher iv. Teacher


: A person who teaches in a school : A person who teaches in a school
Student Student
: A person who is studying at a school : A person who is studying at a school

v. Teacher
- A person who teaches in a school
Student
- A person who is studying at a school

11. Which of the following statements is correct with regard to HTML tags?
i. The <br> is used to render a blank line before and after the text.
ii. The <p> is used to render a blank line before and after the text.
iii. The <br> is used to render a blank line before the text.
iv. The <p> is used to render a blank line only before the text.
v. The <p> is used to render a blank line only after the text.

12. Consider the following HTML code segments:


A. <embed height=”50” width=”100” src=”song.mp3”></embed>
B. <a href=”song.mp3”>Song</a>
C. <embed height=”50” width=”100” href=”song.mp3”></embed>
Which of the above code fragment/s can be used to embed the audio file named ‘song.mp3’ in a web
page?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

DYLEN A. WOLFF 79
2014
13. The following element is a markup for including an image to an HTML document. The name of the source
file of the image used is “arrow.jpg” which is in the same folder as the HTML document.
<img _________=”arrow.jpg”/>
Which of the following is most suitable to fill the blank in the above element?
i. alt ii. src iii. scr iv. href v. link

14. Consider the folder structure given below.

shop

index.html home images greeting

company history logo.jpg birthday

about.html history.html greeting.jpg greeting.html

Which of the followings is the correct markup to include in the index.html to link greeting.html
document?
i. <a href=”/greeting/birthday/greeting.html”>Greeting</a>
ii. <a href=”greeting/birthday/greeting.html”>Greeting</a>
iii. <a href=”shop/greeting/birthday/greeting.html”>Greeting</a>
iv. <a href=” birthday/greeting.html”>Greeting</a>
v. <a href=”greeting.html/birthday/greeting/shop/”>Greeting</a>

15. Which of the following is a client-side scripting language that is used to add interactivity to web pages?
i. CSS ii. PHP iii. XML
iv. HTML 2 v. JavaScript

16. Consider the following HTML element:


<input type=”text” size=10 />
The attribute ‘size’ on the above element refers to the _________.
i. length of the text box in pixels
ii. maximum number of characters displayed in the text box.
iii. maximum number of characters that can be typed into the text box
iv. font size of the text box
v. number of lines displayed in the text box

DYLEN A. WOLFF 80
17. Consider the following HTML style rules:
A.
B.
C.

D.
Which of the above rules will display h1 elements and all the paragraph elements of the following in red?

i. A only ii. C only iii. A and B only


iv. B and D only v. C and D only

2015
14. Consider the following list rendered by a web browser:

Which of the following HTML tags can be used to create the above list?
i. <dd> ii. <dl> iii. <li> iv. <ol> v. <ul>

18. Consider the following HTML element:


<input type = “text” name = “firstname” maxlength = ”15”/>
What is the effect of the attribute ‘maxlength’ on the functionality of the element above?
i. It sets the length of the textbox to 15 pixels.
ii. It sets the length of the textbox to 15 characters.
iii. It displays maximum of 15 characters in the textbox.
iv. The display scrolls to the right after typing 15 characters.
v. It allows to type maximum of 15 characters into the textbox.

19. Consider the following HTML element:


<a href = “attributes.html” target = “_blank”> Attributes </a>
The value of the attribute ‘target’ in the above specifies that the linked document ‘attributes.html’ should
be opened in __________.
i. a new tab or window ii. the same frame
iii. the parent frame iv. the frame named ‘blank’
v. the full body of the current window

20. What is the correct CSS rule to set the background colour of a web page to yellow?
i. body {body-color: “yellow”;} ii. body {bgcolor: yellow;}
iii. body {background-color: yellow;} iv. body {bgcolor = yellow;}
v. body {background-color: yellow;}

DYLEN A. WOLFF 81
2016
21. Consider the following description list, rendered by a web browser.
Zigzag
Moving with sharp turns.
Back and forth
Moving side to side.
Round and round
Moving in a circle
Which of the following answers contain all the HTML tags required to create the above list?
i. <di>, <dt> only ii. <ul>, <li> only iii. <ol>, <li> only
iv. <dl>, <li> only v. <dl>, <dt>, <dd> only

22. Consider the following statements:


A. HTML forms can be used to submit data.
B. HTML forms can be used to retrieve data.
C. HTML forms can be placed inside another form.
Which of the above statements is/are correct?
i. A only ii. B only iii. C only
iv. A and B only v. B and C only

23. A/An _________ is an image with clickable sub-areas.


Which of the followings is the most appropriate to fill the blank in the above statement?
i. Image button ii. Image map iii. Anchor
iv. Icon v. Thumbnail

24. Which of the following is a valid CSS rule?


i. p { color: red;} ii. p { color = red;} iii. p { text-color: “red”;}
iv. p { text-color = red;} v. p { text-color: red;}

25. A web browser running on a client computer A renders a web-page in a web-server running on a
computer B. Which of the following is not a factor that affects the speed of rendering.
i. Size of the images in the web-page
ii. Number of colours in the web-page
iii. Speed of the client computer
iv. Efficiency of the web-browser software
v. Number of users in the network

2017
26. Which of the following is another name for web publishing?
i. Offline publishing ii. Desktop publishing iii. Media publishing
iv. Online publishing
v. Self-publishing

DYLEN A. WOLFF 82
27. Consider the following HTML code:

Which of the followings correctly describes the display, when the above code is rendered?
i. The text “Countries” appears on the title bar and the text “Sri Lanka” appears as a header.
ii. The text “Sri Lanka” appears on the title bar and the text “Countries” appears as a header.
iii. The text “Countries” appears on the title bar.
iv. The text “<!-- <h1> Sri Lanka </h1> -->” appears on the title bar.
v. The text “<!-- <h1> Sri Lanka </h1> -->” appears in the body of the page.

28. Consider the “Submit” button of an HTML form given below:

Which of the following tags/elements correctly implements the intended function of the above “Submit”
button?
i. <input type = “submit” value = “Submit”>
ii. <input type = “button” value = “Submit”>
iii. <button type = “button”>Submit</button>
iv. <button type = “submit”> </button>
v. <button type = “submit” value = “Submit”>

29. Which of the following CSS rules renders the image in the file “school.png” as the background web-page?
i. body { background = “school.png”; }
ii. body { background: url(“school.png”); }
iii. body { background-image = “school.png”; }
iv. body { background-image: “school.png”; }
v. body { background-image: url(“school.png”); }

62. Consider the following statements regarding CSS used in HTML:


A. One style sheet can define the rendering of HTML elements in multiple documents.
B. No additional download is needed to import style sheets.
C. The HTML document must include a <link> tag.
D. The style attribute is required in the relevant element.
Which of the above statements are correct when using External Style Sheets?
i. A and B only ii. A and C only iii. B and D only
iv. A, C and D only v. B, C and D only

DYLEN A. WOLFF 83
2018
30. Consider the following statements regarding HTML.
A. HTML frames are used to divide a browser window into multiple sections.
B. The rows attribute of <frameset> tag defines the number of vertical frames in an HTML page.
C. <frameset cols=”100,500,100”> creates vertical frames with the specified number of millimetres.
Which of the above statements is/are true?
i. A only ii. B only iii. A and B only
iv. B and C only v. All A, B and C

31. Consider the following HTML code with labels ❶-❸ and the expected output.
HTML code Expected output
<html>
<head><title>Coffee Shop</title></head> Coffee
<body> Black hot drink
<❶> Milk
<❷>Coffee</❷> White cold drink
<❸>Black hot drink</❸>
<❷>Milk</❷>
<❸>White cold drink</❸>
</❶>
</body>
</html>

What is the correct order of tags for replacing the labels ❶, ❷ and ❸?
i. dt, dl, dd ii. dl, dt, dd iii. dd, dt, dl
iv. dt, dd, dl v. dl, dd, dt

32. Consider the following HTML code for creating a table.

Which of the following is the output generated by the above code?

(1) (2) (3) (4) (5)

33. Which of the following is the correct HTML statement for inserting an image?
i. <img href=“image.gif” alt=“MyImage”>
ii. <img alt=“MyImage”>image.gif</img>
iii. <img src=“image.gif” alt=“MyImage”>
iv. <image src=“image.gif” href=“MyImage”>
v. <img href=“image.gif” src=“MyImage”>

DYLEN A. WOLFF 84
2019
34. Which of the following is the correct statement to connect to “login.php” from an HTML form>
i. <form action = “GET” method =”/login.php”>
ii. <form action = “/login.php” method =”GET”>
iii. <form submit = “GET” method =”/login.php”>
iv. <form submit = “/login.php” method =”GET”>
v. <form target = “/login.php” method =”GET”>

35. Which of the following HTML code lines is correct to create a hyperlink to the words “Department of
Examinations” using the URL: http://www.doe.index.html?
i. <a href = “Department of Examination”> http://www.doe.index.html </a>
ii. <a href = “http://www.doe.index.html”> Department of Examination </a>
iii. <a href = “http://www.doe.index.html” alt = “Department of Examination”> </a>
iv. <a src = “Department of Examination”> http://www.doe.index.html </a>
v. <a src = “http://www.doe.index.html”> Department of Examination </a>

36. Which of the following statements correctly describe/s hackers?


A. They are bored and lonely anti-social teenagers who attack computer systems as a challenge and
sometime profit.
B. They are IT skilled people who attach computer systems of individuals and businesses as a form
of competitions.
C. They are organized crime groups that deploy highly automated and sometimes highly targeted
attacks against computer system of individuals and businesses for certain benefits.
i. A only ii. B only iii. A and C only
iv. B and C only v. All A, B and C

37. Which is the most suitable HTML form element input type in which the user can enter his credit card
secret number?
i. textarea ii. type = “checkbox” iii. type = “hidden”
iv. type = “password” v. type = “text”

38. Which of the following is a valid example for a PHP variable name?
i. @class_name ii. &class_name iii. $class name
iv. $class_name v. _class_name

39. Which of the following is a valid example for CSS class selectors?
i. .myclass { color: blue; font-family: serif;}
ii. #myclass { color: blue; font-family: serif;}
iii. myclass { color: blue; font-family: serif;}
iv. myclass: { color: blue; font-family: serif;}
v. myclass; { color: blue; font-family: serif;}

DYLEN A. WOLFF 85
40. Which one of the following is false regarding the HTML form methods GET and POST?
i. Both methods are used to transfer data from client side to the server.
ii. GET method is more efficient that the POST method.
iii. GET method is more suitable to send sensitive data.
iv. POST method does not have a limit on size of data.
v. POST requests cannot be bookmarked.

2020
41. Which of the following HTML tags are used to define a definition list?
i. <dl>, <dd>, <li> ii. <dl>, <dt>, <dd> iii. <dl>, <td>, <dd>
iv. <dl>, <th>, <dd> v. <dl>, <th>, <td>

42. Which HTML tag is used to include a caption for a fieldset grouping in a form?
i. <caption> ii. <head> iii. <label>
iv. <legend> v. <title>

43. What is the expected output of the following PHP code block?

i. Welcome.2020 ii. Welcome2020 iii. Welcome 2020


iv. Welcome,2020; v. Welcome.2020;

44. Which of the following affects the lest to the downloading speed of a webpage?
i. Capability of the web browser
ii. Number of hyperlinks in the web page
iii. Number and size of images in the web page
iv. Processing power of the server computer that stores the web page
v. The bandwidth of the internet connection which is used to access the web page

45. Which of the following statements is true about the code given below?

i. This defines internal styles and uses the CSS ‘class’ concept.
ii. This defines internal styles and uses the CSS ‘group’ concept.
iii. This defines inline styles and uses the CSS ‘group’ concept.
iv. The styles defined inside the code can be used only for one type of element.
v. This is an example of the CSS ‘Id’ concept and the name of the Id is ‘title’

DYLEN A. WOLFF 86
46. Consider the following HTML code line.

Which of the rows in the following tables describes the outcome of the above code line?
Displayed as a hyperlink To which the hyperlink connects to
i. #PartA New webpage named “Go to part A”
ii. #PartA Part of the same page named with Id “Go to part A”
iii. Go to part A New web page named “#PartA”
iv. Go to part A Part of the same web page named with Id “#PartA”
v. Go to part A Part of the same web page named with Id “#PartA”

DYLEN A. WOLFF 87
Internet of Things
2012
1. Ubiquitous computing will be useful in applications such as
i. Customisation of domestic environment
ii. Processing of large-scale examinations results
iii. Automatic Teller Machine (ATM)
iv. Point of Sales (POS) Machine
v. Controlling a wall clock

2013
2. Ubiquitous Computing is a/an __________ computing environment. The user will be able to use both
_________ and _________ services.
i. everywhere, mobile, local
ii. everywhere, local, remote
iii. everywhere, local, paid
iv. virtual, local, remote
v. virtual, mobile, global

2019
3. A smart environment can be created by having an interconnected network of hardware devices, sensors,
connectivity and required software, which is often referred to as the Internet of Things (IoT). Which of
the following statements is correct about IoT?
i. Every IoT device or item must be connected using UTP cables.
ii. If any item of the IoT setup fails to operate, the entire IoT setup will be shutdown.
iii. IoT environments cannot be monitored and controlled remotely.
iv. Modern smart mobile phones cannot be connected to an IoT setup.
v. The Internet connectivity is not essential for an IoT setup to function.

DYLEN A. WOLFF 88
ICT in Business
2012
1. A person employed in an overseas country placed an online order to deliver a birthday present to his
mother who is living in Sri Lanka, using the web-based services of a company. This transaction of ordering
the birthday present could be classified as
i. Consumer to Retailer ii. Consumer to Business iii. Business to Consumer
iv. Business to Business v. Employee to Business

2. Which of the following is most cost effective and secure in transmitting, private and confidential
messages and notices among the employees of an organization?
i. Electronic notice boards ii. Teleconferencing iii. E-mail
iv. A social network v. A website

2013
3. Consider the following attributes related to business:
A. Speed of services
B. Purchase and distribution
C. Security of goods sent
D. Confidence in quality of items ordered
Which of the above is/are disadvantage/s of e-business?
i. A only ii. C only iii. A and B only
iv. C and D only v. All A, B, C and D

2014
4. Which of the following is true?
i. www.ebay.com is an example of C2C.
ii. When the government renders its services to the public through www then it is called B2C.
iii. www.wikipedia.com is an example for C2B.
iv. www.amazon.com is an example for B2E.
v. Facebook groups are examples for E2C.

2015
5. Some provinces in Sri Lanka currently issue revenue licences for motor vehicles online. Which of the
following is the correct business type for this service?
i. B2C ii. B2B iii. C2B iv. B2E v. G2C

2016
6. Which of the followings is true about e-commerce?
i. It could be a part of e-business.
ii. It helps to combine multiple business processes into a single information system.
iii. It is a collection of platforms created for business and their customers to interact.
iv. www.google.com is a popular e-commerce website.
v. There are no Sri Lankan companies doing e-commerce yet.

DYLEN A. WOLFF 89
2017
7. Which of the following statements is true about e-business?
i. It is a business process which conducts partially online.
ii. It consists of front-end and back-end online processes.
iii. All “brick vendors” conduct their business on online.
iv. Any e-commerce application is an e-business application.
v. Any e-business application is an e-commerce application.

2018
8. Consider the following statements related to e-business.
A. Brick-and-click is a business model by which a company integrates both offline and online
presence of the business.
B. Pure-brick is a business model in which a company has only a physical presence.
C. Pure-click business has the presence only on the internet.
Which of the above statements is/are correct regarding e-business models?
i. A only ii. B only iii. C only
iv. A and C only v. All A, B and C

2019
9. Consider the following activities related to e-commerce.
A. Online purchase of a pair of shoes.
B. Online purchase of an e-book of your favourite novel.
C. Online booking of a taxi to the airport from your home.
Which of the above activities represent/s the pure-click type of business model?
i. A only ii. B only iii. C only
iv. A and C only v. B and C only

DYLEN A. WOLFF 90
New Trends and Future Directions
2012
1. Consider the following characteristics:
A. Autonomous
B. Performs in dynamic environments
C. Functions restricted to a time period
D. Interacts with highly increasing information
Which of the above are characteristics of a software agent?
i. A and B only ii. A and C only iii. A, B and C only
iv. A, B and D only v. B, C and D only

2014
2. Consider the following statements about software agents?
A. A software agent is capable of autonomous actions in order to meet its design objectives.
B. A software agent is capable of user-directed actions in order to meet users’ objectives.
C. A multi-agent system is composed of set of interacting agents.
Which of the above statements is/are true?
i. A only ii. B only iii. C only
iv. A and B only v. A and C only

2015
3. Which of the following is incorrect about software agents?
i. They exhibit some degree of autonomy.
ii. They are a subset of reactive systems.
iii. They are proactive in terms of their ability to exhibit goal-directed behaviour.
iv. Electronic commerce is one of the key application areas of them.
v. They are always cooperative in a multi-agent environment.

4. Which of the following is/are examples for artificial intelligence techniques?


A. Neural Networks
B. Genetic Algorithms
C. Ubiquitous Computing
i. A only ii. B only iii. A and B only
iv. A and C only v. B and C only

2016
5. Which of the followings is not an application of artificial intelligence?
i. Self-learning robots ii. Expert advisory system for professionals
iii. Smartphones iv. Handwriting recognition systems
v. Recommender systems on e-commerce platforms

DYLEN A. WOLFF 91
6. Consider the following statements:
A. Software agents are computer programs.
B. Some computer viruses could be considered as software agents.
C. All software agents have user interfaces.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

2017
7. Consider the following clauses:
A. Can response to relevant environment changes
B. Always acts according to well-defined user instructions
C. Performs only pre-defined set of tasks
D. Can make decisions under incomplete information
Which of the above can be considered as properties of software agent system?
i. A and B only ii. A and C only iii. A and D only
iv. B and C only v. C and D only

2018
8. A smart home application that automates the controlling of lighting, temperature, entertainment
systems and appliances is an example for _________.
i. evolutionary computing ii. multi-agent systems
iii. nature inspired computing iv. software agents
v. ubiquitous computing

9. Consider the following statements regarding artificial intelligence.


A. Artificial intelligence systems can be used in email spam filters,
B. Artificial intelligence systems are capable of analysing uncertain information.
C. An artificial intelligence system is a system for capturing, storing, processing and displaying data
related to positions on earth’s surface.
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

10. Consider the following statements relevant to the trends in modern information technology.
A. In traditional computing, data is encoded into binary digits while in quantum computing data is
represented in quantum bits or qubits.
B. A wearable device capable of activity tracking that measures data such as number of steps walked
and hear rate is an example for a sensor network.
C. A collection of nodes capable of environmental sensing, local communication and communication
with its peers or with other higher performance nodes is called a Geographic Information System.
Which of the above statements is/are correct?
i. A only ii. A and B only iii. A and C only
iv. B and C only v. All A, B and C

DYLEN A. WOLFF 92
2019
11. Consider the following statements related to nature inspired computing:
A. In nature inspired computing natural phenomena/scenario are observed and used to design and
develop computing models to solve complex problems.
B. Artificial intelligence can use nature inspired computing for improving its ability to understand and
solve computationally challenging problems.
C. Computing models and algorithms developed under nature inspired computing can only be used
in natural environments such as rain forests, oceans and wild-life structures.
Which of the above statements is/are incorrect?
i. A only ii. B only iii. C only
iv. A and C only v. All A, B and C

2020
12. Consider the following.
A. Cloud formation in the sky
B. The evolution of living species
C. How neurons function in the human brain
Which of the above could be used in bio-inspired computing?
i. A only ii. B only iii. C only
iv. A and C only v. B and C only

13. Which of the following statements about quantum computing are correct?
A. In quantum computing, principles of quantum physics are applied.
B. Quantum bits (qubits) are used in quantum computing as the information unit.
C. Quantum computers emit radiation fatal to human users.
i. A only ii. B only iii. C only
iv. A and B only v. All A, B and C

DYLEN A. WOLFF 93

You might also like