GIT Model Paper TL Academy
GIT Model Paper TL Academy
a. Software
b. Output device
c. Input device
d. No of the above
3. ------------- is the technology that connects machines and people within a site in a small area ?
a. LAN
b. WAN
c. MAN
d. No of these
4. Which statement accurately describes the difference between the hub and switch?
a. A hub only always on device to send data at a time, whereas a switch works in full duplex
b. Switch operate at the physical layer while hubs operate at the link layer
c. Hubs operate at the data link layer while switch operator at the network layer
d. A hub broadcast data to all connected devices while a switch send data only to the intended receipt based
on MAC Address, improving security and efficiency
5. Which of the following is usually connected to a computer with the help of a cable?
a. Icon
b. Virus
c. Database
d. Peripheral devices
pg. 1
6. Convert the Binary equivalent 100101 to its decimal equivalent?
a. 21
b. 12
c. 22
d. 31
10. Which of the following logic gates are called universal gates?
a. NOR and NAND gates
b. OR and NOR gates
c. AND and NAND gates
d. More than one of the above
pg. 2
11. Software program developed for performing a particular task related to managing computer resources
is called ?
a. System software
b. Utility software
c. Application
d. Operating system
a. Processor
b. Memory
c. CPU
d. Storage
15. Which function show be written in M15 Cell to calculate total marks of students named vimal?
a. =SUM (J15: $L15)
b. =SUM (J15: L15)
c. =SUM (J15;L15)
d. =SUM ($J15: L15)
pg. 3
16. Which function show be written in O13 Cell to calculate Rank of students named Ansar?
a. =RANK(N13,$N$12:$N$16)
b. =RANK($N$13,$N$12:$N$16)
c. =RANK(N13,$N12:$N16)
d. =RANK(N13,N12:N16)
17. What is the correct syntax of IF() function?
a. =IF (logical_test, {[value_if_true]}, {[value_if_false]})
b. =IF (logical_test, TRUE([value_if_true]), FALSE([value_if_false]))
c. =IF (logical_test: [value_if_true], [value_if_false])
d. =IF (logical_test, [value_if_true], [value_if_false])
20. What is the data type for name, age, tell fields?
a. Text, Number, Number
b. Text, Date, Number
c. Number, Date, Currency
d. Text , Date , Currency
pg. 4
21.Number of Records fields in Students table?
a. 5,6
b. 4,6
c. 6,4
d. 6,5
30. 1 2 3
a. 1-Hypper text transfer protocol, 2-Resource, 3-Domain Name, 4-World Wide Web
b. 1-Domain Name, 2-Resource, 3-Hypper text transfer protocol, 4-World Wide Web
c. 1-Hypper text transfer protocol, 2-Domain Name, 3-Resource, 4-World Wide Web
d. 1-Resource, 2-Domain Name, 3-Hypper text transfer protocol, 4-World Wide Web
pg. 6
32. Which of the following is a primary function of HTTPS (Hypertext Transfer Protocol Secure)?
a. Retrieves emails from the server
b. Sends TCP/IP packets to web servers
c. Encrypts data for secure transmission
d. Transfers files over the Internet
a. Serial
b. Parallel
c. Concurrent
d. Both a and c
Mohan tells his friends, Sohan ([email protected]), Rohan ([email protected]) and John ([email protected]),
date of his birthday party through an email as shown below:
To: [email protected]
Cc: [email protected]
Bcc: [email protected]
Subjects: My birthday party is on 15/01/2019
Hello all,
Call me if you can come.
Mohan
pg. 7
35. You were asked to create a hyperlink for "About MOE" word, by using URL:"http://www.moe.gov.lk".
What is the correct format of following codes?
a. <a href="About MOE ">http://www.moe.gov.lk</a>
b. <a href="http://www.moe.gov.lk">About MOE</a>
c. <a href="http://www.moe.gov.lk" alt="About MOE"></a>
d. <a src="http://www.moe.gov.lk">About MOE</a>
42. With regard to computer memory, which of the following statement(s) is are TRUE?
P: Read Only Memory (ROM) is "Volatile" memory
Q: Random Access Memory (RAM) is "Volatile" memory
R: Secondary Memory is "Volatile" memory
a. P only
b. Q only
c. P and Q only
d. P and R only
44. To place something in the same position on every slide of presentation automatically, insert into?
a. Slide master
b. Notes master
c. Handout master
d. None of the above
45. Which of the following loops will execute the body of loop even when condition controlling
the loop is initially false?
a. while
b. do-while
c. for
d. none of the mentioned
pg. 9
46. In MS Word, the space left between the margin and the start of a paragraph is called?
a. Spacing
b. Gutter
c. Indentation
d. Alignment
47. What type of chart is useful for showing trends or changes over time ?
a. Line Chart
b. Pie Chart
c. Column Chart
d. Dot Graph
48. In the email which of the following term briefly describes the contents of the messages?
a. subject
b. content
c. cc
d. to
51. Which of the following usually observe each activity on the internet of the victim, gather all information
in the background, and send it to someone else?
a. Malware
b. Spyware
c. Adware
d. All of the above
pg. 10
52. It can be a software program or a hardware device that filters all data packets coming through the
internet, a network, etc. it is known as the__________________?
a. Antivirus
b. Firewall
c. Cookies
d. Malware
55. Method which uses a list of well-defined instructions to complete a task starting from a given initial
state from a given initial state to end state is calls as?
a. Program
b. Flowchart
c. Algorithm
d. A&B
56. Which PowerPoint feature allows the user to create a simple presentation without having to spend too
much time on it?
a. AutoContent Wizard
b. Animation
c. Color Schemes
d. Chart Wizard
pg. 11
Question:
(1) Flowcharts play a crucial role in visualizing algorithms, aiding in both the design and debugging of complex
programs. They offer a clear, step-by-step representation of the logical flow, making it easier for programmers
to spot inefficiencies or errors. Understanding how to effectively create and interpret flowcharts is a
fundamental skill in software development, particularly when handling intricate workflows and decision-
making processes.
(i) Define a flowchart and discuss its advantages in the software development lifecycle?
(ii) Explain the purpose of the following flowchart symbols: (a) Decision (b) Process (c) Terminator.?
(iii) Given the scenario where a program must calculate the total salary of an employee based on their
working hours, draw a flowchart that includes conditional logic to check for overtime pay (if working
hours exceed 40).?
Question:
(2)The architecture of computer hardware is fundamental to the overall performance and capabilities of any
computing system. From processing power to memory hierarchy, each component plays a critical role in
defining how efficiently a computer can execute tasks. Advanced knowledge of hardware allows for
optimizing performance, enhancing system design, and troubleshooting complex issues.
(i) Explain the role of cache memory in a computer system and how it differs from RAM in terms of speed,
purpose, and placement?
(iii) When your computer is running slow, how do you improve the speed of the computer
Give five(05) solutions?
pg. 12
Question:
(3)The architecture of the Internet serves as the backbone for global communication and data exchange. It
consists of a layered framework of protocols, including TCP/IP, which facilitates the transfer of information
across diverse devices. Understanding this architecture is crucial for optimizing network performance and
enhancing security. This knowledge empowers users to effectively navigate and utilize the vast resources
available online.
i. What are differences between Search Engine and Web Browser? Give two examples for each?
ii. What is the primary function of the Web browsers? Give two examples for web browser?
iii. Discuss the significance of the Internet in transforming various sectors, including business, education,
healthcare, government and social interaction. Provide specific examples to illustrate its impact on
efficiency, accessibility, and communication within these sectors?
Question:
(4)Rupavahini made history in Sri Lanka by launching its first Sinhala news program using Artificial Intelligence
(AI) on May 5, followed by a Tamil prime-time bulletin on May 10. The broadcasts featured digital replicas of
leading anchors, offering a modern news experience. Produced by Gamini Bandara Menikdiwela and guided
by Chairman Dr. Prasad Samarasinghe, this initiative aims to enhance future programming. Rupavahini plans
to further explore AI technology to deliver innovative content to its audience.
Question:
(5)GlobalTech Innovations is an international leader in custom software solutions, addressing the diverse
needs of its clients. During development, the team interacts with stakeholders via individual consultations,
small group sessions, and training workshops. Throughout the process, sensitive electronic documents are
generated and securely shared, often via encrypted email. In the implementation phase, confidential
information, such as usernames and passwords, is securely transmitted. GlobalTech Innovations ensures
seamless, real-time communication while prioritizing data security and avoiding any physical contact, thus
maintaining high standards of confidentiality and efficiency.
pg. 13
i. What encryption methods are recommended for securing email communications that contain
sensitive client information?
ii. What is two-factor authentication (2FA), and how does it enhance email security?
iii. What are strong passwords, and why are they important for email accounts?
Question:
(6)The Sri Lankan government is implementing a new personal income tax system from 1 January 2023.
Annual tax assessment should be done using income tax percentages as per table given below on “Income
for Annual Tax Assessment”.
i. How would you calculate the total tax for an income of LKR 2,500,000 using the given tax rate table?
ii. How would you create a bar chart in Excel to visualize the tax rates for each income slab?
pg. 14