0% found this document useful (0 votes)
50 views

GIT Model Paper TL Academy

Model Exam paper for GIT subject in Sri Lanka for A/L Students

Uploaded by

Aakila Hamasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

GIT Model Paper TL Academy

Model Exam paper for GIT subject in Sri Lanka for A/L Students

Uploaded by

Aakila Hamasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1. Identify the device through which data and instruction are entered into a computer?

a. Software
b. Output device
c. Input device
d. No of the above

2. Arrange in descending order the units of memory?


a. TB>MB>GB>KB
b. MB>GB>TB>KB
c. GB>MB>KB>TB
d. TB>GB>MB>KB

3. ------------- is the technology that connects machines and people within a site in a small area ?
a. LAN
b. WAN
c. MAN
d. No of these

4. Which statement accurately describes the difference between the hub and switch?
a. A hub only always on device to send data at a time, whereas a switch works in full duplex
b. Switch operate at the physical layer while hubs operate at the link layer
c. Hubs operate at the data link layer while switch operator at the network layer
d. A hub broadcast data to all connected devices while a switch send data only to the intended receipt based
on MAC Address, improving security and efficiency

5. Which of the following is usually connected to a computer with the help of a cable?
a. Icon
b. Virus
c. Database
d. Peripheral devices

pg. 1
6. Convert the Binary equivalent 100101 to its decimal equivalent?
a. 21
b. 12
c. 22
d. 31

7. Which of the following is the correct representation of a binary number?


a. (124) 2
b. (1110)
c. (110) 2
d. (000)2

8. The octal equivalent of the decimal number (417)10 is _____?


a. (641)8
b. (619)8
c. (640)8
d. (598)8

9. Following gate section connected in a complete suitable circuit?

a. A= 0, B=1, C=1, D=1


b. A=1, B=0, C=0, D=0
c. A=0, B=0, C=0, D=1
d. A=1, B=1, C=1, D=0

10. Which of the following logic gates are called universal gates?
a. NOR and NAND gates
b. OR and NOR gates
c. AND and NAND gates
d. More than one of the above

pg. 2
11. Software program developed for performing a particular task related to managing computer resources
is called ?
a. System software
b. Utility software
c. Application
d. Operating system

12. Identify the blank space in the diagram?

a. Processor
b. Memory
c. CPU
d. Storage

13. What is the primary purpose of the watermark features in MS word?


a. Add the background image to the document
b. Watermark your signature on the document
c. Check for water image on print document
d. to signify ownership, discourage unauthorized use

14. In MS Word , what is the purpose of the “ Mail merge “ Features?


a. Send Emails Directly from word
b. Combine a document with a data source to create customised documents.
c. Attach files to a document
d. Create envelopes and labels

15. Which function show be written in M15 Cell to calculate total marks of students named vimal?
a. =SUM (J15: $L15)
b. =SUM (J15: L15)
c. =SUM (J15;L15)
d. =SUM ($J15: L15)
pg. 3
16. Which function show be written in O13 Cell to calculate Rank of students named Ansar?
a. =RANK(N13,$N$12:$N$16)
b. =RANK($N$13,$N$12:$N$16)
c. =RANK(N13,$N12:$N16)
d. =RANK(N13,N12:N16)
17. What is the correct syntax of IF() function?
a. =IF (logical_test, {[value_if_true]}, {[value_if_false]})
b. =IF (logical_test, TRUE([value_if_true]), FALSE([value_if_false]))
c. =IF (logical_test: [value_if_true], [value_if_false])
d. =IF (logical_test, [value_if_true], [value_if_false])

18. PowerPoint presentations are widely used as?


a. Note outline for teachers.
b. Project presentation by student.
c. Communication of planning
d. All of above

19. Which of the following statements is not true?


a. You can type text directly into a powerpoint slide but typing in a text box is more convenient.
b. From the insert menu choose a picture and then file to insert your images into slides.
c. You can view a powerpoint presentation in normal, slide sorter or slide show view.
d. You can show or hide the task pane from view >> toolbars.

Students Table Department Table

20. What is the data type for name, age, tell fields?
a. Text, Number, Number
b. Text, Date, Number
c. Number, Date, Currency
d. Text , Date , Currency

pg. 4
21.Number of Records fields in Students table?
a. 5,6
b. 4,6
c. 6,4
d. 6,5

22. Which of the following statements is incorrect about primary keys?


a. A primary key can be made up of more than one column.
b. Every table must have a primary key.
c. A primary key column can store NULL values.
d. The primary key uniquely identifies each row in the table.

23. Which of the following is not an example of system software?


a. Language Translator
b. Utility software
c. Device Driver
d. Word processor

24. In a_________ topology, a dedicated link connects a device to a central controller?


a. Ring
b. Bus
c. Mesh
d. Start

25. Which type of a network topology diagram mention in the picture?


a. Bus Topology
b. Start Topology
c. Mesh Topology
d. Hybrid Topology
26. In graphic design, which color model is primarily used for digital screens?
a. CMYK
b. RGB
c. Pantone
d. HSL
pg. 5
27. Which one of the following network devices has more than two ports?
a. Router
b. Bridge
c. Both a and b
d. None of the above

28. What is the email attachment size limit in Gamil?


a. 10MB
b. 15MB
c. 50MB
d. 25MB

29. Marquee is a tag in HTML to?


a. Display text with scrolling effect
b. Mark the list of items to maintain inqueue
c. Mark the text so that it is hidden in browser
d. Display text with strikeout effect

30. 1 2 3

4 5. Path Where the resource is located

a. 1-Hypper text transfer protocol, 2-Resource, 3-Domain Name, 4-World Wide Web
b. 1-Domain Name, 2-Resource, 3-Hypper text transfer protocol, 4-World Wide Web
c. 1-Hypper text transfer protocol, 2-Domain Name, 3-Resource, 4-World Wide Web
d. 1-Resource, 2-Domain Name, 3-Hypper text transfer protocol, 4-World Wide Web

31. Which HTML tag is used to insert an image?

a. <img url=”htmllogo.jpg” />


b. <img alt=”htmllogo.jpg” />
c. <img src=”htmllogo.jpg” />
d. <img link=”htmllogo.jpg” />

pg. 6
32. Which of the following is a primary function of HTTPS (Hypertext Transfer Protocol Secure)?
a. Retrieves emails from the server
b. Sends TCP/IP packets to web servers
c. Encrypts data for secure transmission
d. Transfers files over the Internet

33. Identify which type of port from given following fig?

a. Serial
b. Parallel
c. Concurrent
d. Both a and c

Mohan tells his friends, Sohan ([email protected]), Rohan ([email protected]) and John ([email protected]),
date of his birthday party through an email as shown below:
To: [email protected]
Cc: [email protected]
Bcc: [email protected]
Subjects: My birthday party is on 15/01/2019
Hello all,
Call me if you can come.
Mohan

34.Which of the following cannot be derived from this email?


a. Sohan knows that Rohan receives the email.
b. Rohan knows that John receives the email.
c. John knows that both Sohan and Rohan receive the email.
d. Sohan knows that the birthday party will be held on 15/01/2019.

pg. 7
35. You were asked to create a hyperlink for "About MOE" word, by using URL:"http://www.moe.gov.lk".
What is the correct format of following codes?
a. <a href="About MOE ">http://www.moe.gov.lk</a>
b. <a href="http://www.moe.gov.lk">About MOE</a>
c. <a href="http://www.moe.gov.lk" alt="About MOE"></a>
d. <a src="http://www.moe.gov.lk">About MOE</a>

36. Which of the following is the most important phase of SDLC?


a. Requirements analysis
b. Design
c. Testing
d. Coding

37. how do you define one to one relationship in MS-Access database?


a. A relationship where one record in one table can be related to one or more records in another table.
b. The rows of the first table can be associated with one or more rows of the second table, but the rows of
the second table can only be related to the first table's only row
c. A relationship where one record in one table can be related to exactly one record in another table.
d. A relationship where one or more records in one table can be related to one record in another table

38. what is the memo data type field used for?


a. to add table
b. to store objects created in other programs
c. for long text entries
d. for short text entries of no more than 255 characters

39. Which one of the following is not an image/graphic file format?


a. PNG
b. GIF
c. BMP
d. GUI

40. Identify the false statement?


a. You can find deleted files in recycle bin
b. You can restore any files in recycle bin if you ever need
c. You can increase free space of disk by sending files in recycle bin
d. You can right click and choose Empty Recycle Bin to clean it at once
pg. 8
41. At what time you should choose Sleep option?
a. You are leaving for a very short time and want to resume you work shortly
b. When computer gets hanged frequently. Let it sleep for some time
c. You finish working and going to bed
d. The computer is tired after working for the whole day

42. With regard to computer memory, which of the following statement(s) is are TRUE?
P: Read Only Memory (ROM) is "Volatile" memory
Q: Random Access Memory (RAM) is "Volatile" memory
R: Secondary Memory is "Volatile" memory
a. P only
b. Q only
c. P and Q only
d. P and R only

43. Why Drop Caps are used in document?


a. To drop all the capital letters
b. To automatically begin each paragraph with capital letter
c. Bold the first letter of the sentence
d. To begin a paragraph with a large dropped initial capital letter

44. To place something in the same position on every slide of presentation automatically, insert into?
a. Slide master
b. Notes master
c. Handout master
d. None of the above

45. Which of the following loops will execute the body of loop even when condition controlling
the loop is initially false?
a. while
b. do-while
c. for
d. none of the mentioned

pg. 9
46. In MS Word, the space left between the margin and the start of a paragraph is called?
a. Spacing
b. Gutter
c. Indentation
d. Alignment

47. What type of chart is useful for showing trends or changes over time ?
a. Line Chart
b. Pie Chart
c. Column Chart
d. Dot Graph

48. In the email which of the following term briefly describes the contents of the messages?
a. subject
b. content
c. cc
d. to

49. The standard Size of the version 4 Ip address?


a. 16 Bits
b. 64 Bits
c. 128 Bits
d. 32Bits

50. What is the correct HTML for creating a hyper link?


a. <a name = “ ” > A </a>
b. <a> B </a>
c. <a href="http://www.example.com"> example </a>
d. d. <a URL = "http: // www.example.com"> example </a>

51. Which of the following usually observe each activity on the internet of the victim, gather all information
in the background, and send it to someone else?
a. Malware
b. Spyware
c. Adware
d. All of the above

pg. 10
52. It can be a software program or a hardware device that filters all data packets coming through the
internet, a network, etc. it is known as the__________________?
a. Antivirus
b. Firewall
c. Cookies
d. Malware

53. Which of the following statements is correct about the firewall?


a. It is a device installed at the boundary of a company to prevent unauthorized physical access.
b. It is a device installed at the boundary of an incorporate to protect it against the unauthorized access.
c. It is a kind of wall built to prevent files form damaging the corporate.
d. None of the above.

54. Which symbol is used to represent data input or output in a flowchart?


a. Oval
b. Rectangle
c. Parallelogram
d. Diamond

55. Method which uses a list of well-defined instructions to complete a task starting from a given initial
state from a given initial state to end state is calls as?
a. Program
b. Flowchart
c. Algorithm
d. A&B
56. Which PowerPoint feature allows the user to create a simple presentation without having to spend too
much time on it?

a. AutoContent Wizard
b. Animation
c. Color Schemes
d. Chart Wizard

57. How MS Word will respond in repeated word?


a. Green wavy line under the repeated word
b. Red wavy line under the repeated word
c. A Blue wavy line under the repeated word
d. None of above

pg. 11
Question:
(1) Flowcharts play a crucial role in visualizing algorithms, aiding in both the design and debugging of complex
programs. They offer a clear, step-by-step representation of the logical flow, making it easier for programmers
to spot inefficiencies or errors. Understanding how to effectively create and interpret flowcharts is a
fundamental skill in software development, particularly when handling intricate workflows and decision-
making processes.

(i) Define a flowchart and discuss its advantages in the software development lifecycle?

(ii) Explain the purpose of the following flowchart symbols: (a) Decision (b) Process (c) Terminator.?

(iii) Given the scenario where a program must calculate the total salary of an employee based on their
working hours, draw a flowchart that includes conditional logic to check for overtime pay (if working
hours exceed 40).?

Question:
(2)The architecture of computer hardware is fundamental to the overall performance and capabilities of any
computing system. From processing power to memory hierarchy, each component plays a critical role in
defining how efficiently a computer can execute tasks. Advanced knowledge of hardware allows for
optimizing performance, enhancing system design, and troubleshooting complex issues.

(i) Explain the role of cache memory in a computer system and how it differs from RAM in terms of speed,
purpose, and placement?

(ii) What is the function of the BIOS (Basic Input/Output System)?

(iii) When your computer is running slow, how do you improve the speed of the computer
Give five(05) solutions?

pg. 12
Question:
(3)The architecture of the Internet serves as the backbone for global communication and data exchange. It
consists of a layered framework of protocols, including TCP/IP, which facilitates the transfer of information
across diverse devices. Understanding this architecture is crucial for optimizing network performance and
enhancing security. This knowledge empowers users to effectively navigate and utilize the vast resources
available online.
i. What are differences between Search Engine and Web Browser? Give two examples for each?

ii. What is the primary function of the Web browsers? Give two examples for web browser?

iii. Discuss the significance of the Internet in transforming various sectors, including business, education,
healthcare, government and social interaction. Provide specific examples to illustrate its impact on
efficiency, accessibility, and communication within these sectors?

Question:
(4)Rupavahini made history in Sri Lanka by launching its first Sinhala news program using Artificial Intelligence
(AI) on May 5, followed by a Tamil prime-time bulletin on May 10. The broadcasts featured digital replicas of
leading anchors, offering a modern news experience. Produced by Gamini Bandara Menikdiwela and guided
by Chairman Dr. Prasad Samarasinghe, this initiative aims to enhance future programming. Rupavahini plans
to further explore AI technology to deliver innovative content to its audience.

i. What is Artificial Intelligence (AI)?

ii. How does AI impact the job market?

iii. What are the potential benefits of AI technology in education Sector?

Question:
(5)GlobalTech Innovations is an international leader in custom software solutions, addressing the diverse
needs of its clients. During development, the team interacts with stakeholders via individual consultations,
small group sessions, and training workshops. Throughout the process, sensitive electronic documents are
generated and securely shared, often via encrypted email. In the implementation phase, confidential
information, such as usernames and passwords, is securely transmitted. GlobalTech Innovations ensures
seamless, real-time communication while prioritizing data security and avoiding any physical contact, thus
maintaining high standards of confidentiality and efficiency.
pg. 13
i. What encryption methods are recommended for securing email communications that contain
sensitive client information?

ii. What is two-factor authentication (2FA), and how does it enhance email security?

iii. What are strong passwords, and why are they important for email accounts?

iv. What is phishing, and how can it affect email security?

Question:
(6)The Sri Lankan government is implementing a new personal income tax system from 1 January 2023.
Annual tax assessment should be done using income tax percentages as per table given below on “Income
for Annual Tax Assessment”.

i. How would you calculate the total tax for an income of LKR 2,500,000 using the given tax rate table?

ii. How would you create a bar chart in Excel to visualize the tax rates for each income slab?

iii. Uses of excel sheets?

pg. 14

You might also like