0% found this document useful (0 votes)
51 views9 pages

IT - 11 - Part - I

This document contains a 22 question multiple choice quiz about computers, information technology, and related topics. The questions cover subjects like computer components, binary and hexadecimal numbering systems, computer networks, spreadsheets, databases, and more. Students are asked to select the correct answer from the four options provided for each question.

Uploaded by

Tharusha Perera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views9 pages

IT - 11 - Part - I

This document contains a 22 question multiple choice quiz about computers, information technology, and related topics. The questions cover subjects like computer components, binary and hexadecimal numbering systems, computer networks, spreadsheets, databases, and more. Students are asked to select the correct answer from the four options provided for each question.

Uploaded by

Tharusha Perera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Answer all questions.

01. Consider the following statements about second generation computers.


a. Punch cards were used to input data to the computers
b. Transistors are used as the main hardware technology.
c. Producing operating systems.
d. Floppy disks and tapes were used as secondary storage devices.
Of the above statements, What are the true statements?
1. OnlyA and D 2. Only B and D
3. OnlyA, B and C 4. All A, B,C and D

02. Consider the following statements related with Data and Information
A. Dasun is the tallest boy in the class.
B. Dasun is 14.
C. Price of a pen which is in the items list purchased byAkalanka is Rs. 20.00.
Select the correct answer by considering above statements.
1. Aand B statements belong to information.
2. A, B and C statements belong to data.
3. A, B and C statements belong to information.
4. B and C statements belong to data.

03. Which of the following contains output devices only?


1. Computer screen, Web camera, Touch screen, Flatbed scanner.
2. Computer screen, Multimedia projector, Printer, Speaker.
3. Multimedia projector, Printer, Bar code reader, Web camera.
4. CCTV Camera, Touchscreen, Digital camera, Speaker.

04. …..A….. devices are used to store data and information permanently and they can be divided into
many categories. The basic concept of categorizing is ….B….. .
Select the couple of words that are suitable to fill in the above blanks respectively.
1. Primary memory, storage capacity. 2. Secondary memory, storage capacity.
3. Secondary memory, Technology. 4. Storage capacity, Size.
05. Select the correct statement about computer processor.
1. Core I3 is the manufacturer of the processor.
2. Performance of the computer is not depend on the speed of the processor.
3. Speed of the processor is calculated by using number of instructions that are executed per
second.
4. Processor is located inside the hard disk.

^2&
06. What is the binary number that is equivalent to the hexadecimal number 4EF16 ?
1. 1000111011112 2. 100111011112 3. 101111011112 4. 111101011112

07. Which of the following answer that represents the ascending order of the numbers 1E16 ,
101010012 , 8910 , 1158?
1. 1E16 , 8910 , 101010012 , 1158 2. 1E16 , 1158 , 101010012 , 8910
3. 8910 , 1158 , 1E16 , 101010012 4. 1E16 , 1158 , 8910 , 101010012

08. What is the octal number that is equivalent to the hexadecimal number 2BC16?
1. 12748 2. 13248 3. 5568 4. 13548

09. Akalanka uses a flash drive with the capacity of 8MB. What is the answer that includes the equal
value to that capacity?
1. 8 X 1024 X 1024 kilobytes 2. 4 x 1024 x 1024 x 8 bytes
3. 1024 x 1024 kilobytes 4. 8 x 1024 x 1024 x 8 bits

10. Following is the set of coding systems that are used to represent data in the computer. Select the
answer that includes the number of bits and characters in each of them respectively.
A. ASCII
B. BCD
C. EBCDIC
1. A- 4bits and 16 characters / B - 7bits and 128 characters / C- 8bits and 256 characters
2. A- 4bits and 16 characters / B - 8bits and 128 characters / C- 7bits and 256 characters
3. A- 7bits and 128 characters / B - 4bits and 16 characters / C- 8bits and 256 characters
4. A- 7bits and 128 characters / B - 4bits and 16 characters / C- 16bits and 65536 characters
11. Consider the following P, Q and R statements
P = (A>B)AND NOT (C>D) Q = (A< B) OR (C>D) R= NOT ((A< B) OR (A> B)
The values ofA, B, C and D are 30, 45, 63, 36 respectively. What is the correct answer?
1. True, False, True 2. False, True, True
3. True, False, False 4. False, True, False

^3&
12. Due to the spreading of Covid 19 virus, it is essential to wear face mask (A) and washing hands (B)
but not essential to match the last digit of NIC number (C). What is the Boolean expression that is
suitable for the above statement?
1. AAND B AND C 2. (AAND B) OR C
3. (AOR B)AND C 4. AOR B OR C

13. What are the wireless media that are represented by following symbols?

A B C D
1. A - Radio waves B - Bluetooth C - Infarred D - WiFi
2. A- Infarred B - Bluetooth C - WiFi D - Infarred
3. A- Infarred B - Wifi C - Bluetooth D - Radio waves
4. A- Radio waves B - Bluetooth C - WiFi D - Networing waves

14. Consider the following ways of connecting computer networks.


A - Router is used to connect a computer network with another external network or internet.
B - Command Line Interface is used when transferring a message to everyone connected
with a computer network.
C - Transmission mode of the switch is full duplex and transmission mode of the Hub is half
duplex.
1. OnlyAand C 2. OnlyA 3. OnlyAand B 4. All A, B and C

15. What is the picture that shows a hard disk which is after partitioning and formatting?

(1) (2) (3) (4)


16. What is the answer that includes software with command line interface (CLI) and graphical user
interface (GUI)?
1. Unix,Apple Mac 2. Dos ,Unix
3. Ubuntu, Windows XP 4. Isuru Linux , Dos
^4&
17. Following picture shows a table which was created by using word processing software. What is the
tool which was used to format the cells as A?

}A

(1) (2) (3) (4)

18. A set of tools in a tab of a word processing software is as follows. What are the tools which were
used to format the following document?

1 2 3 4 5 6 7 8

B esides getting your children to drink plenty of milk each day, be sure you
rEmh 3
don't forget the H2O! Although it has no nutrients, water is essential to
your child's health. It makes up more than half of children' body weight
and is needed to keep all Pats of the body functioning properly.

1. A- 6, B - 2, C - 7 2. A- 2, B - 3, C - 4
3. A- 8, B - 3, C - 4 4. A- 2, B - 1, C - 4

19. What is the answer If the formula =COUNT(A1:C3) is placed in the cell D1 of the following
spreadsheet?

1. 6 2. 7 3. 5 4. 4

^04&
Grade 11 THIRD TERM TEST 2020 INFORMATION & COMMUNICATION TECHNOLOGY - I
² ·Answer questions 20 and 21 using the electronic spreadsheet below.

20. The formula =CLO$5931*CLP5931 was written in the cell CLQ5931. If this formula is copied in
to the cell CLQ5932, what is the correct formula which can be in the cell CLQ5932?
1. =CLO$5931*CLP5932 2. =CLO$5931*CLP$5932
3. =CLO5931*CLP$5932 4. =CLO$5931*CLP$5932

21. If the above formula is copied in to the cell CLQ5932, what is the answer of the cell CLQ5932?
1. 35 2. 30 3. 25 4. 0
22. The following are some of the shortcut keys used in working with electronic spreadsheet software.

Statements Shortcut keys Tasks


A Ctrl + N Receives a new slide
B F5 A slide can be seen across the entire window
C Ctrl + M Receives a new submission
D Ctrl + C Cutting letters / objects

1. Only B 2. A, B and C 3. Aand B 4. All A, B, C and D

23. What is the incorrect statements about creating a Relational database?


1. If one record in a table is linked to one record in another table, then there is a one-to-one
relationship.
2. When building a relationship between two tables, one field of the two tables must be at least
one or the same.
3. When constructing a relationship between two tables, the principal fields of the two tables
must be the same.
4. If each record in a table is linked to several records in a table, then there is a one to many
relationship between the two tables.

24. What is the answer that includes the correct number of fields and records of the following
spreadsheet respectively?

1. 5,5 2. 5, 4 3. 4, 5 4. 9, 4
^05&
fuu m%Yak m;% ish¨u fi!LHdrËs; l%ufõo wkq.ukh lrñka fi!LH wud;HdxYfha ks¾foaY wkqj uqøKh" melÜ lsÍu yd fnodyeÍu isÿlr we;'
25. Figure 4 shows the objects used in a database
management system,
1. Record
2. Table
3. Query
4. Form

26. The most appropriate answer is to include the blank words in clauses A to D, which are considered
when sending an email.
a. Email address and ...................... must be present in an email account.
b. Sending an e-mail address to another person is called.....................
c. Separate unrelated files sent with email addresses are called.......................
d. ......................... is mandatory for both sender and recipient of e-mail.
1. Password / Forward / Attachments / Electronic Mail account
2. Attachments / Forward / Electronic / Mail account / Attachments
3. IPAddress / Backward / File / Computer
4. Web address / sender / attachment / signature
27. The basic building block of a digital graphics is the pixel. If the color size of a pixel is 9, what is the
correct answer for the number of bits?
1. 256 2. 512 3. 3 4. 81

28. What is the tool used to apply color or pattern to a selected part of the GIMP software which is a
graphic design software?

(1) (2) (3) (4)

29. Select false statement regarding digital graphics


1. Changing the physical scale of a graphic does not change the pixels.
2. Changing the size of a graphic can be as large or as small as the pixel size.
3. As the pixel size of graphic increases, so does its quality.
4. Enlarging a graphic with a smaller pixel size reduces the quality.

^6&
30. Consider the following tools inAudacity as software that can be used in audio editing.

B D E F
C

G
Tools used to select the desired portion of a created audio stream and move the audio portion over
time
1. A and E 2. A and F 3. B and F 4. A and G
31. Rhino Soft is a software development company. There are several ways to test a system
development life cycle.
·Unit test
·Overall test
·System testing
·Reception test
There are some of the methods which are used to test the system at Rhino Soft ?
The answer is,
1. A 2. Aand C 3. A, B and C 4. All of the above

32. Which of the following statements is true regarding the benefits of e-government?
A. The services of the Government Information Center fall under the services provided by the
Government to the employees.
B. The e-Government is a government that uses information technology to communicate with
its citizens, governmental and non-governmental organizations, as well as governments of
other countries.
C. Issuing gazette notifications and circulars is a service provided by the government to the
citizens.
1. B 2. B andA 3. B and C 4. A, B and C

33. To insert a hyperlink into a web page, select the most appropriate code
(1) <a href='http://www.moe.gov.lk'>Ministry of Education, Sri Lanka</a>
(2) <a hyperlink=' Ministry of Education, Sri Lanka '> http://www.moe.gov.lk</a>
(3) <a > http://www.moe.gov.lk</a>
(4) <a src=' http://www.moe.gov.lk'>Ministry of Education, Sri Lanka</a>

^7&
34. Choose incorrect clauses about HTML picks and their functions used in web design.
1. Uses <ol> ... </ol> supports to start a numbered list.
2. <br> to show the end of a sentence
3. The <tr> lift is used to add a new line to a table.
4. The Rowspan attribute is used to combine several columns to form a cell.

35. Listed from A to B at the bottom left are some of the problems with the use of information and
communication technology. Examples are P to S in the right-hand lane

A A legal issue P Neurological disorders, cancer and skin diseases


B A moral issue Q Theft of intellectual property
C In an environmental problem R Cybercrime
D A social problem S Stealing written things

Which of the following shows the most suitable P to Q examples for IT problems labeledAto B?

36. This is a technique that can be used for the logical security of a computer system
1. Uninterrupted Power Supply
2. Backup
3. Closed Circuit TV
4. Hardware Firewall Program project1;
Var a,b:integer;
begin
37. Study the Pascal program shown on the right and look for its a:=0;
output. for b:= o to 2 do
begin
1. 0, 2 a:=a+b;
writeln(a);
2. 0, 1, 2 end;
readln;
3. 0, 2, 4 end.
4. 0, 1, 3

38. Which of the following statements / clauses regarding computer programming languages is
correct?
A. Machine languages can be implemented directly in a computer in a language.
B. Interpreters and compilers are two translation programs.
C. High-level languages are machine-independent.
1. Aand B 2. A
3. B and C 4. A, B and C

^8&
Grade 11 THIRD TERM TEST 2020 INFORMATION & COMMUNICATION TECHNOLOGY - I

39. The following is a field program prepared using the Pascal programming language. Thisfields
what is the number of erroneous lines in the program?

1. 6 2. 4 3. 5 4. 3
40. Consider the flow chart shown below.

Select the answer that correctly indicates the output of the flow chart.
1. 1, 2, 4, 6, 11 2. 1, 2, 4, 7, 11, 16
3. 1, 2, 4, 7,11, 16, 16 4. 1, 2, 4, 7, 11, 16, 22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy