Вы находитесь на странице: 1из 8

මහින්ද රාජපක්ෂ විදයාලය Mahinda Rajapaksha Vidyalaya මහින්ද රාජපක්ෂ විදයාලය Mahinda Rajapaksha Vidyalaya

මහින්ද රාජපක්ෂ විදයාලය Mahinda Mahinda Rajapaksha


Rajapaksha මහින්ද -රාජපක්ෂ
VidyalayaCollege විදයාලය මහින්ද රාජපක්ෂ විදයාලය
Homagama
Mahinda Rajapaksha Vidyalaya මහින්ද රාජපක්ෂ විදයාලය Mahinda Rajapaksha Vidyalaya මහින්ද රාජපක්ෂ විදයාලය

General Information Technology GIT E I,II


First Term Test - November 2018 Time : 3 hrs
Grade 12

 Answer all questions


 In each of the questions 1 to 40, which you consider as correct or most appropriate.
 Mark a cross (X) on the number corresponding to your choice in the answer sheet you
provided.
01. Which of the statement/s is/are true about data and information in the table given below.

Name Language Maths Science History Health English Total Average Rank
Saman 78 89 70 95 98 80 510 85.00 2
Kasuni 90 88 79 80 95 92 524 87.33 1

a) Subject marks can be considered as data.


b) The total and the average can be considered as information.
c) Total or average can be considered as data when rank the students.
i. a and b ii. a and c iii. b and c iv. a, b, c all

02. Which one of the following is a common feature of e-learning


i. Always requires physical class attendance
ii. Cannot download documents for later reading
iii. Learning is self – paced
iv. Travel time and costs are very high

03. Which of the following can be considered as e-shopping?


i. Buy an item from a supermarket which use a terminal system
ii. Finding information about the items from a computer in a shop.
iii. Purchasing an item through internet
iv. Buy items from the shops which is noticed as Teleshops.

04. Which one of the following types of computer is most likely to be used by a travelling salesman?
i. A desktop Computer ii. A Tablet PC iii. A server iv. Super Computer

05. Which one of the following is a pointing device?


i.Joy stick ii Monitor iii Scanner iv Keyboard
06. The Answer, which includes the devices of the same category is,
i. DVD, Speaker, Keyboard
ii. Monitor, Speaker, Mouse
iii. Mouse, Keyboard, Scanner
iv. Scanner, Printer, DVD
07. Which device is used to convert a hard copy to a soft copy
i.Printer ii. Speakers iii. Scanner iv. Light Pen

1
08. The ICT tool that use to read Cheque numbers in banks.
i. OMR ii. MICR iii. UPS iv. NIC

09. RAM stands for,


i. Read Only Memory ii. Random Access Memory
iii Random Artificial Memory iv. Read Access Memory

10. The Difference between RAM and Hard Disk is that RAM is ………………….. and Hard Disk is
………………..
i. Temporary, permanent ii. Slow, fast
iii Secondary Storage, Primary Storage iv. Permanent, temporary

11. The unit, which is used to measure the processor speed?


i Hertz ii. Kb iii. Mega Byte iv. Nibbles
12. Which one of the following device is required to connect a computer to the internet?
i. Pen Drive ii. Mouse iii. DVD iv. Modem

13. Consider the following three statements about the hardware. Select the correct statement/s from
them.
A. The multimedia projector and the web camera are examples for the input devices
B. Resolution is an attribute that use to measure the quality of a screen.
C. Laser printer produces low quality printouts.
i A only ii. B only iii. A and C only iv. A and B only

14. Saman wants to buy a new printer for the Cyber Cafe. He is looking for a laser printer, because
he wants ……………………………….. and …………………………. Printing.
i. Faster / quality iii. carbonizes / cheap
ii. slow / noisy iv. color / less resolution

15. ___ (A) _________ can be used to connect the mouse and _____ (B) ______ can be used to
connect the monitor. To connect the computer to Ethernet LAN we use _______ (c) ____
Which of the following terms are select the answer appropriate for (A), (B), (C) respectively?
i. Modem port, USB port, Important slots
ii. USB port, HDMI port, RJ 45 port
iii. Modem port, serial port, Expansion slot
iv. Serial port, parallel port, Expansion slot

16. A certain number system includes (8) digits. The base of that number system is,
i. 6 ii. 8 iii. 7 iv. 16

17. Which of following is invalid to Binary number system,


i. 10102 ii. 120012 iii. 11112 iv. 1100112

18. What is the correct conversion of Decimal 253 into binary?


i. 111010112 ii. 111000012 iii. 111111012 iv. 111100002

19. The decimal value for following binary value is 1011011012


i. 36510 ii. 33310 iii. 36410 iv. 36310

2
20. The Binary values for following Decimal values are? 43510 , 36 10
i. 101011101 2 , 1001002 ii. 110110011 2 , 1001002
ii. . 101011101 2 , 1001102 iv. 110110011 2 , 1001102
21. Which is not a utility software
i Web Browser ii. Antivirus software
iii. Backup software iv. Compilers
22. An instruction set which is used to do some specific task is called a software. Software can be
categorized as,
i Operating systems, application software
ii. System software, application software
iii. Utility software, application software
iv. Language translators, application software

23. Management of hardware and software is done by operating systems. Which is NOT a task of
operating systems?
i Process management ii. Memory management
iii. Data Management iv. Device Management
24. A task which is NOT related to the Command line Interface
i. Typing commands and instructions
ii. There is a prompt on the screen
iii. User has to remember the commands
iv. Which can be used by a person who has poor knowledge of computing

 Question 25 to 29 are based on the following figure.


1 2 3 4 5

6 7 8 9 10 11 12 13

25. The tool which is used to highlight the text is,

i. 6 ii. 8 iii. 9 iv. 10


26. The tool which is used to decrease the font size is,

i. 2 ii. 1 iii. 4 iv. 12


27. What is the tool name of label number 11?

i. Align Left ii. Align Right iii. Justify iv. Center

3
28. The tools which are labeled in 7, 8 and 10 respectively,

i. Bold , Italic ,Underline ii. Bold , Underline , Font Color


iii.Italic , Underline , Font size iv. Bold , Superscript , Font Color

29. The above tool bar belongs to,

i. Word processing software ii. Spreadsheet software


iii. Presentation Software iv. Image editing software
30. Saving a file from the internet onto your computer is called

i. Uploading ii. Loading iii. Downloading iv. Sharing

31. What is the abbreviation of “www” written at the beginning of the name of a webpage?
i. Worldwide Wireless Windows ii. World Wide Web
iii World Wide WAN iv. World Wide Wire-woofer

32. The icon shown in the figure is,


i Save ii. New iii. Open iv. Undo

33. The category which includes antivirus software is,


i AVG, E-SET , Avira ii. AVG, E-SET , Lotus
iii. AVG, Lotus, Avira iv. AVG, MAC , Avira

34. Output of the following logic circuit is,


i Q=A+B ii. Q = A + B A Q

iii. Q = A + AB iv. Q = A . B B

35. An example for an Operating System is,

i Android ii. Opera iii. Explorer iv. DOC

36. ……………… is an image editing software,

i Photoshop ii. Java iii lotus123 iv. Joomla


37. What does ‘ATM’ stand for?

i Automatic Transfer Machine ii. Automated Teller Machine


iii. Augmented Teller Machine iv. Automobile Transfer Machine
38. Which one of the following is not a Search Engine,
i VPN ii. Yahoo iii. MSN iv. Google

4
39. Bluetooth technology allows ………………
i. Landline phone to mobile phone communication.
ii. Signal transmission on mobile phones only.
iii. Wireless communication between equipment.
iv Satellite television communication.
40. Which of the followings is not a social issue in using ICT?
i. Less consumption of stationaries
ii. Widening of digital divide
iii. Aggravation of mental strain
iv. Reduce interpersonal relationship (M 1x40=40)

General Information Technology II

 Answer five questions only, selecting the first question and four others
 First question carries 20 marks and each of the other questions carries 10 marks

01.

i. Following are some of the areas where ICT is used for their work, state one use of ICT (other than
the Internet) on the specific field.it must be different from each other.
 Health
 Education
 Transportation
 Banking
ii. State the following statements True or False (State the label in your answer script and Mark as
“True” or “False” )
A. The Hard Disk is situated in the mother board
B. Ability of filling forms through the internet and getting fertilizer by farmers in Sri Lanka
can be considered as an ICT application in field of agriculture
C. Liquid crystal technology is used to manufacturer computer monitors
D. Memory of the volatile memory has been lost when stop the supply of power
iii. State two services provided by the Internet.
iv. Convert the decimal number 56 to Binary.
v. State two characteristics of online shopping?
vi. Name two information about an item which can gather using a barcode.
vii. Write two features of a computer.
viii. Match the statement of column A with Column B. Sate the answer on your answer sheet using
only labels from P to W.
A B
P To protect the computer from virus infection T Application software
Q To prepare the storage device in order to save the files and U Operating System
folders
R Used to carry out computer based activities of the user V Disk formatting
S The software which facilitate the interaction between human W Antivirus software
user and hardware

5
ix. People often use Flash drive to transfer data from one computer to another. State two advantages
of flash drive.
x. State two ways that can be used to manage E - waste. (M 2 x 10=20)

02. Ministry of education informed the school to send all required information of students regarding
“ Suraksha “ Insurance. Our school has created an information system to collect required data
regarding the Suraksha Insurance scheme. In this information system all the data. Such as Admission
no, Full Name, Gender, Birthday, Class and Addresses are collected things from a Google form.

i. Give two examples for data regarding above mentioned information system. (M 02)
ii. Give two examples for output of the above information system. (M 02)
iii. Name two factors which the quality of information is depend on. (M 02)
iv. Name a printer which can be used to get a hard copy of information in above
system. (M 02)
v. Assume that the capacity of the information file in the above system is 455 MB. If the school
wants to send a soft copy of it to the Ministry of Education, mention a secondary storage device
which is mostly suitable for it and mention the capacity of it. (M 02)

03. Diagram of a computer architecture is shown bellow

Input Main Output


memory

i. Name the components which name as A, B, C and D. (M 04)


ii. Write the main function of A. (M 02)
iii. Name two examples for D. (M 02)
iv. Some symbols which are used to represent ports are show below identify them
and write with the label.
A B C D

(M 02)

6
04. Consider the following terms/statements labeled as A to D

i. A – e mail address B – Web browser


C – Web page D – First generations’ computer
E - Search Engine F – Social Website

Find the suitable examples for the above items from the list given below (State only the label in
your answer script and write the example)
List – (Firefox, Face Book, www.epub.gov.lk , Google , IBM701 , nimali123@sltnet.lk)
(M 06)
ii. Complete the table given below.

Binary Decimal
...................... 27 10
10112 ......................

...................... 125 10
11112 ...................... (M 04)

05.
A

B
F

D
www.lion.lk

12
1 1 1 1 1 16 15
4 0
3 7 1

6 7 8 9 1
1 2 3 4 5
8

7
Select and write number/ numbers of labels or name/ names of the tools, which appropriate to do the
following tasks. (No marks, if you mentioned more tools than required.)
i. To format to get the appropriate of A. (M 02)
ii. To insert the border labeled as B. (M 02)
iii. To insert the picture to labeled ad F to the document. (M 02)
iv. To create the paragraph labeled as C. (M 02)
v. To convert the text labeled as D to link a page. (M 01)
vi. To convert a text in to upper case as shown under label E. (M 01)

06.

i. To complete the following statements, find the most suitable word for A to E from the given list
and write in front of the label.

i. Viruses, Worms, Trojan horse are examples for ………………………


A

ii. Lock the Sever Room is an example for ……………………..


B

iii. Use passwords in a computer system is an example for ……………………


C

iv. Control entering and releasing data through the internet is a characteristic of ……………………
D

LogicalSecurity Malware
Physical Security Firewalls

(M 04)

ii. Name the following logic gates and complete the truth tables.

……………………………………… ……………………………………… ………………………………………


A A
A
B B

A B A B A

(M 06)

Вам также может понравиться