AL Model Paper1 E MCQ
AL Model Paper1 E MCQ
1. Choose the incorrect statement about copyrighted software and free and open source software
(1) Once a person buys a licensed software, it can be installed on multiple computers without any
legal restrictions.
(2) The user only has the right to use free and open source software and its distribution and copying is
illegal.
(3) Free and open source software is available without any payment.
(4) Licensed software often needs to be renewed after a certain period of time.
(5) The source code of free software cannot be edited
2. Which of the following systems is not suitable for real time data processing?
(1) weather forecasting system
(2) Flight Reservation system
(3) Radar detection system
(4) spacecraft controlling system
(5) payroll system
3. What is the memory unit that can be identified as logical in the hard disk?
(1) Read Only Memory(ROM) (2) Main Memory) (3) Cache Memory
(4) Register Memory (5) Virtual memory
1
5. What is the decimal representation of the binary value 1111.011?
(1) 2B16 (2) 3E16 (3) 2E16 (4) CD16 (5) 3D16
7. The characters in the table below are presented using ASCII character encoding systems.
Accordingly, indicate how the following words are represented by the ASCII coding system. This word
ends with the (line feed) attribute.
Hello World
(1) 72 101 108 108 111 32 87 111 114 108 100 10
(2) 72 101 108 108 111 87 111 114 108 100 10
(3) 72 101 108 108 111 32 87 111 114 108 100
(4) 104 101 108 108 111 32 87 111 114 108 10
(5) 104 101 108 108 111 87 111 114 108 100 10
8. According to the fetch execute cycle, the instruction is decoded from which of the following component?
(1) Cache Memory (2) Arithmetic and Logic Unit (3) Main Memory
(4) Control Unit (5) Register
9. How many 2-input NANDs are required to construct the Boolean expression 𝐴̅.B+A.𝐵̅ using only
NAND gates?
10. Consider the given Karnaugh map. Its A,B,C are inputs and Z is
output.
What should be the values of e,f,g,h in the following K-map to
̅ C?
give the output Z=𝐴.
(1) e=1 , f=0 , g=1 , h=0 (2) e=1 , f=0 , g=0 , h=1
(3) e=0 , f=0 , g=0 , h=0 (4) e=1 , f=1 , g=0 , h=0
(5) e=1 , f=1 , g=1 , h=1
2
11. Mohan logs into a single processor computer, starts the spreadsheet software and works. It also opens a
web browser to retrieve information from the Internet. The following transition diagram shows the
stages of operation related to Mohan's spreadsheet operation.
12. What is the size of virtual memory if its address consists of 32 bits and the memory is byte addressable.
(1) 4 x 1024 MB (2) 4 x 1024 GB (3) 8 x 1024 GB
(4) 4 x 1024 KB (5) 8 x 1024 MB
3
14. The size of a block of a disk is 8KB. A part of the File Allocation Table (FAT) of that disk will look
like this in a certain case. That section also shows the blocks of the firstprog.py file.
Directory Entry Note :
1. The last block of a file is indicated by -1.
500 504
2. The first block no of a file is indicated in the directory
501 entry.
502 500
503 -1
504 503
Which of the following represents the directory entry of the firstprog.py file and the amount of disk
space allocated for the firstprog.py file, respectively?
(1) 500, 24 KB (2) 500 , 32 KB (3) 502 , 24 KB (4) 502 , 32 KB (5) 504,32KB
(1) A only (2) A and B only (3) A and C only (4) B and C only (5) A,B,C all
16. Which of the following is correct regarding unguided media used in data communication?
A – No physical path is required for data transmission
B – Twisted pair is an example.
C - The signal is transmitted visibly through the atmosphere
(1) A only (2) A and B only (3) A and C only (4) B and C only (5) A,B,C all
4
19. Which of the following server computer enables the SMTP protocol ?
20. For the security of the data sent in data communication, the data is converted into an unreadable state,
i.e. a code text (cipher text). An instance of doing so is as follows.
plaintext H E L L 0
+ key +1 +1 +1 +1 +1
= cipher text I F M M P
If the value of the key (KEY) in the above conversion process is +2, the coded text will be output.
21. When a data packet arrives at the router from an external network, the ......A .......address in the packet
is converted into the ....B.......address in the network and the network Outgoing messages are converted
by the router to ........ C , ... D ....... This process is called Network address translation (NAT).
5
24. Choose the correct statement/s about object orientation from the following clauses.
A. Ideal for designing systems with rapidly changing requirements.
B. Identifies the objects and interactions between them related to the problem
C. Homogeneity involves grouping objects together to create classes.
D. Creates objects based on classes.
(1) A, B (2) C, D (3) A ,B, D (4) B,C, D (5) All are correct
25. Which of the following tests can be done by both the white box testing and black box testing methods?
A. Unit testing
B. Integration testing
C. System testing
D. Acceptance testing
(1) A ,B (2) C,D (3)A,B,D (4) B,C,D (5) All are correct
26. Which of the following statement is incorrect regarding drawing data flow diagram
(1) A data flow can occur between an external entity and a process
(2) A data flow can occur between an external entity and a datastore.
(3) A data flow can occur between a process and a datastore.
(4) A Data flow cannot occur between two data stores.
(5) Data cannot flow between two processes.
28. When implementing the QR code fuel issuing system in Sri Lanka, it was first tried in the suburbs of
Colombo and then started to be implemented in other districts. This software installation method is best
suited for…
29. Considering a table in a database, which can be selected among Candidate key
(1) Composite key (4) Alternate Key
(2) Super Key (5) Unique Key
(3) Foreign key
6
Consider the table below to write answers to question numbers 30 to 33.
(1) Num (2) ProdID (3) Num and ProdID (4) City (5) Num සහ City
31. What will be the result when the above table is subjected to Second Normal Form (2NF),
(1) A only (2) B only (3) C only (4) A and B only (5) all of the above.
32. By subjecting this table to the Third normalization (3 NF), the resulting table/tables are...
33. The SQL code to change Bill's name to John in the above table could be...
34. The features that can be present in an extended ER diagram (EER) created by extending an ER diagram
are
A -Generalization B- Specialization C – Inheritance
7
• Consider the algorithm expressed by the flowchart below and answer questions 36 and 37. This is
expected to represent the number of positive and negative numbers among the 10 digits entered.
37. Which of the following Python programs represents the above flowchart?
8
39. The output of the following Python code is…
st = “ Know Program”
print(st[:5] + “ Python”)
Set1 = {0,0,9}
Print(set1)
(1) {0,0,9} (2) {0,9} (3) {9} (4) {0} (5) Syntax Error
41. W = [3,2,5,1,6]
for x in range (1, W [4] -1):
print (x , end ="")
The output here is,
(1) 1 2 3 4 5 (2) 1 2 3 4 (3) 3 2 5 1 (4) 6 1 5 2 (5)1 2 3 4
43. Which of the following can be used to display a hyperlink without underline using CSS is
(1) a{decoration:no-underline;} (2) a{underline:none;} (3) a{text-decoration:none;}
(4) a{text-decoration:no-underline;} (5) a{no:underline;}
44. The code that can be used to insert a video into a web page using HTML is….....
(1) <Video> (2) <movie> (3) <media> (4) <audio> (5) <film>
9
45. The way of preparing an array using PHP is...
(1) $car = array[“Volvo” , “BMW” , “Toyota”];
(2) $car = array(“Volvo” , “BMW” , “Toyota”);
(3) $car = Volvo” , “BMW” , “Toyota”;
(4) $car = array{“Volvo” , “BMW” , “Toyota”};
(5) $car = arry in (“Volvo” , “BMW” , “Toyota”);
(1) Only I is correct. (2) Only I and II are correct. (3) Only I and III are correct.
(4) All are correct. (5) All are incorrect
47. In the digital economy, reducing the price of goods using buyers' power occurs in ...............
Which of the following is most suitable to fill the blank.
10