April 2011 Flashcards
1.) The graph below consists of two sets of bar graphs; one in black and the other in gray,
with the vertical axis representing the number of people and the horizontal axis
representing the score (0 through 10). Which of the following is observed in
comparison of these black and gray bar graphs?
A PC plays back moving image data recorded at 500400 pixels per frame, 30 frames
per second, and 3 bytes per pixel while reading it from a peripheral device. When the
data transfer rate between the peripheral device and the PC is 1106
bytes per second,
in order to play back the moving image without delay, the data must be compressed to
one n-th (1/n) in advance. Which of the following is the minimum value of n? Here,
the time to expand the compressed data and other impacts can be ignored.
a) 18
b) 54
c) 72
d) 144
a
Which of the following is an explanation of proportional fonts?
a) As is the case with Arabic fonts, the shape of a character changes when it is located
at the beginning or end of a word.
b) As is the case with fonts used in English newspapers, each character may occupy a
different amount of space.
c) As is the case with fonts used in the headline of an advertisement flyer, proportional
fonts are characterized with distinctive decorative designs.
d) As is the case with typewriter fonts, the number of characters per line is fixed.
b
Which of the following is an appropriate description concerning EUC (End User
Computing)?
a) As EUC is widely spread, information systems departments in companies come to
have large backlogs in software development.
b) EUC is characterized with system construction and operations management by end
users without using software packages at all.
c) To support EUC, training in programming languages such as COBOL, C, and Java
is important, and it is a key role of information systems departments.
d) In order to achieve EUC, it is necessary to provide education to end users in PCs or
commercially available applications, and also to select easy-to-operate development
tools and provide training in those tools.
d
Which of the following is an appropriate characteristic of data structure?
a) Each element in an array can be read in any order by using an index.
b) Arrays can be used to make the data structure independent from the algorithm.
c) Each element in a list can be searched for and updated using an index in lieu of a
pointer.
d) When an element is inserted in a list or deleted from a list, existing elements must
be moved.
a
There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the program
display the underlined character string? Here, the first character of the original text is
displayed in 10 points.
[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.
[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>
<S>group-level</S>
computerization</B> from a user <S>standpoint</S>.</B>
a) 10
b) 11
c) 12
d) 13
b
Which of the following is an appropriate explanation of SGML?
a) It is a language from which HTML and XML are derived and is used to describe the
logical structure of a document.
b) It is an extended HTML-based language and is used for displaying images and
documents on Web browsers.
c) It is a standard for communication between electronic musical instruments and is
used for processing music data.
d) It is a standard page description language and is used for well-formed documents
a
Which of the following is the method for describing the logical structure of a sentence
in XML?
a) Enclosing the sentence, clauses, and other elements with double quotes (“”)
b) Separating the sentence, clauses, and other elements with commas
c) Enclosing the sentence, clauses, and other elements with tags
d) Separating the sentence, clauses, and other elements with tabs
c
Which of the following is an appropriate explanation of some functional units
implemented in a computer?
a) The operation unit performs arithmetic processing at the direction of the control
unit.
b) The operation unit exchanges data with the control unit, the input unit, and the
output unit.
c) The memory unit requests the operation unit to perform arithmetic processing and
stores the results.
d) The memory unit requests the output unit to read out data from the memory unit.
a
Which of the following is the latest interface that is widely used to transfer a large
amount of data, such as 3D images or moving images, to graphics cards at higher speed?
a) AGP
b) ATA
c) ISA
d) PCI Express
d
Which of the following is the standard that is used to exchange data, such as address
book data, between cell phones by using infrared rays?
a) IEEE 1394
b) IrDA
c) RFID
d) RS-232C
b
Which of the following is an appropriate description of plug-and-play used on a PC?
a) A mechanism to start applications
b) A mechanism which performs required settings automatically when peripheral
devices are connected
c) A mechanism which starts up an OS automatically when the power is turned on
d) A mechanism to run software developed for another OS
b
Which of the following is an appropriate description concerning a characteristic of
RAID?
a) It increases the data transfer rate of each hard disk drive.
b) It provides a larger capacity than the total capacity of individual hard disk drives.
c) It enhances the performance and reliability of the entire system by using multiple
hard disk drives all together.
d) It increases data access time because it needs to access multiple hard disk drives.
c
Which of the following is an appropriate description of fail-safe?
a) Keeping the system harmless, even in the event of a failure or an operation error
b) Operating only the normal parts of the system, even in the event of a failure, so as
not to make an impact on the entire system
c) Preventing intrusion into the computer network of an organization from outside
d) Accepting only the data that meets specific conditions
a
15.) There is a system consisting of two PCs, one file server, and one printer that are all
connected to a LAN. The availability of the printer and file server are both 0.9, while
the availability of each PC is 0.8. Which of the following is the appropriate
expression to calculate the availability of the entire system? Here, the system is
considered to be operating when at least one PC is running.
File server | Printer | PC | PC
a) 2 2 0.9 0.8
b) 0.9 (1 (1 0.8) ) 2 2
c) 2 2 (1 0.9) 0.8
d) 2 2 (1 0.9 ) (1 0.8)
b
Which of the following is pertinent to the process of grouping multiple files into one,
for the purpose of making effective use of storage media or promoting the efficiency of
backup or distribution?
a) Archive
b) Allocate
c) Patch
d) Protect
a
Which of the following is the purpose of the virtual memory system that is one of the
functions provided by an OS?
a) To prevent an application program from accessing the area on the main memory
used by the OS
b) To reduce electricity consumption while work is suspended, by turning off the
power supply after data is written from the main memory to the hard disk
c) To make it possible to execute a program even if the program requires more storage
capacity than is available in the main memory
d) To accelerate CPU processing through the intervention of a higher speed memory
device than the main memory
c
Which of the following is an appropriate explanation of plug-in software?
a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.
b) Plug-in software is provided to replace parts of a program for the purpose of
modifying functions or fixing bugs.
c) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a Web browser, to enhance their functions.
d) Plug-in software is often included in applications such as spreadsheets, and allows
the users to record and replay the series of operations performed.
c
An examination is conducted, and the results of the examination are grouped into four
performance classes “Excellent,” “Good,” “Passed,” and “Not passed,” based on the
scores by using spreadsheet software. To show the results of grouping in column C,
an expression is entered in cell C1 and then copied to cells C2 through C35. Which
of the following is the appropriate expression to be entered into cell C1? Here, the
procedure for grouping is as shown below.
[Spreadsheet creation procedure]
(1) Cells A1 through A35 contain scores.
(2) Cell A36 contains a function to calculate the average score.
(3) Cell B1 contains the expression below, and this expression is copied to cells B2
through B35.
A1 − $A$36
(4) Performance classes are defined as follows: if the score is above the average by 10
points or more, it is marked as “Excellent”; if it is above the average by less than
10 points, it is marked as “Good”; if it is below the average by 10 points or less, it
is marked as “Passed”; all other scores are marked as “Not passed.”
a) IF(B1 > 10, ‘Passed’,
IF(B1 > 0, ‘Not passed’, IF(B1 < −10, ‘Excellent’, ‘Good’)))
b) IF(B1 > 10, ‘Excellent’,
IF(B1 > 0, ‘Good’, IF(B1 < −10, ‘Passed’, ‘Not passed’)))
c) IF (B1 ≥ 10, ‘Excellent’,
IF (B1 > 0, ‘Good’, IF (B1 < −10, ‘Not passed’, ‘Passed’)))
d) IF (B1 ≥ 10, ‘Excellent’,
IF (B1 ≥ 0, ‘Good’, IF (B1 < −10, ‘Not passed’, ‘Passed’)))
d
When a spreadsheet application is used to create a line graph based on actual sales in the
table below, the scale range of the vertical axis is automatically set between 0 and
1,500,000 dollars. However, as the graph does not show clearly how sales have
changed over time, the fluctuation of sales needs to be more clearly emphasized without
changing the frame size of the graph. When the graph-editing features are used for
this purpose, which of the following is the most appropriate operation to be done?
Unit: dollar
Month Actual sales
January 1,124,000
February 1,063,000
March 1,092,000
April 1,159,000
May 1,103,000
June 1,201,000
July 1,098,000
August 1,182,000
September 1,135,000
October 1,093,000
November 1,142,000
December 1,220,000
a) Changing the unit of the vertical axis to 1,000 dollars, which will make the range
from 0 to 1,500 (Unit: thousands of dollars)
b) Changing the display range of the vertical axis to 1,000,000 through 1,300,000
dollars
c) Converting the line graph to a bar graph
d) Inserting an auxiliary line parallel to the horizontal axis for the purpose of indicating
average sales
b
21.) As shown in the spreadsheet below, three types of examinations were conducted. Each
type of examination has a different perfect score. Each resulting score is converted to a
value assuming 100 points as the perfect score, and displayed in cells F3 through H10.
Which of the following is the expression to be entered in cell F3? Here, the expression
in cell F3 is copied to cells F3 through H10.
On a standalone PC, sequential access to a database is taking longer to process than
before. When the number of records remains almost unchanged, which of the
following can be considered to be the cause?
a) Unnecessary records, such as already deleted data, are read.
b) Data has been added and deleted many times, so the record area in the database file
is fragmented.
c) Access takes longer as free space in the database has increased.
d) Because of hardware deterioration, data transmission between the hard disk and the
processor has become slower.
b
Which of the following is an appropriate policy for designing data entry screens?
a) Related input items should be placed close to each other, in order to improve ease of
operation on the screen.
b) A method of entering commands should be provided, in order to ensure ease of
operation even for entry-level users.
c) A common message “Input Error” to all data entry errors should be displayed on the
screen.
d) Detailed directions for use should be displayed on the screen, in order to ensure ease
of operation for users.
a
Which of the following can provide accessible linkage between information items
represented in text, still images, video, sound, music, and other forms so that associated
information can be reached by visiting one link after another?
a) Graphical user interface
b) Groupware
c) Cyberspace
d) Hypermedia
d
When relational databases are used, which of the following is an appropriate purpose of
normalizing data?
a) To guarantee data compatibility between heterogeneous computers
b) To prevent data duplication as well as occurrence of inconsistency at the time of
updating data
c) To eliminate characters that cannot be transmitted when a database is used over a
network
d) To handle data storage areas distributed over multiple media as a contiguous storage
area
b
Under an environment where several users have access to a database simultaneously, a
user tries to view the data while another user is updating it. In order to assure data
integrity, which of the following is an appropriate control method in the database
management system?
a) Interrupting update processing and permitting the user to view the data
b) Permitting the user to view the latest data while updating
c) Permitting the user to view the data after completion of the update
d) Discarding the updated data and permitting the user to view the data before the
update
c
Which of the following is the network area that is provided by installing a firewall and is
accessible from both the Internet and the intranet but not accessible to the intranet?
a) DHCP
b) DMZ
c) DNS
d) DoS
b
A Web server in Company A provides SSL communication using a digital certificate
for the Web server generated by a certification authority. Which of the following is a
procedure in which a PC accesses the Web server of Company A and after obtaining a
digital certificate, uses the public key of the certification authority?
a) Generating a common key used for encrypted communication and encrypting it by
using the public key of the certification authority
b) Using the public key of the certification authority to decrypt the common key used
for encrypted communication
c) Using the public key of the certification authority to verify the validity of the digital
certificate
d) Encrypting confidential data by using the public key of the certification authority
c
Which of the following is a mechanism that enables a Web server to store user
information in a browser in order to identify which PC is accessing the Web server?
a) CGI
b) Cookie
c) SSL
d) URL
b
When ten e-mail messages are sent successively from Company A to Company B, they
may arrive at Company B in a different order from the order they are sent. Which of
the following is an appropriate opinion on this matter?
a) There is a problem with the setup of Company A’s mail server.
b) There is a problem with the setup of Company B’s firewall for e-mail.
c) There is a high possibility that e-mail delivered late is falsified on the way.
d) The arrival sequence is subject to change because of different transfer routes.
d
29.) Which of the following is an appropriate combination of the protocols that are used for
transmitting and receiving e-mail as shown in the diagram below?
Which of the following is an appropriate description concerning cryptography?
a) The process of turning the encrypted text back into its original plain text is called
reset.
b) In common key cryptography, the encrypted text and common key are transmitted
together.
c) In public key cryptography, the key used for encryption is different from that for
recovering the plain text from the encrypted text.
d) Common key cryptography is used for digital signature.
c
Which of the following can be made possible by using a digital signature in electronic
commerce?
a) Preventing an unintended third party from accessing any confidential file
b) Checking that a file is not infected with a virus
c) Preventing the contents of a transaction from being leaked through wiretapping
d) Authenticating the trading partner and checking that the contents of a transaction are
not falsified
d
Which of the following is the purpose of a DoS attack against a server?
a) Takeover of server administrator’s privileges
b) Blocking of services
c) Falsification of data
d) Stealing of data
b
Which of the following is the self-propagating program that can send its replication
attached to an e-mail message via a network, such as the Internet, or copy itself onto
other computers in the network?
a) Cookie
b) Spyware
c) Trojan horse
d) Worm
d