April 2012 Flashcards
In the worksheet of spreadsheet software shown below, rows 1 through 4 are sorted in
ascending order by using the last (or low order) two digits of each numeric value in
column A. When the numeric values of column B that are calculated from those of
column A are used as sort keys, which of the following is the appropriate calculation
result to be entered into column B?
A | B
1 123411
2 156711
3 119813
4 123815
a) The quotient obtained when the numeric value in column A is divided by 10
b) The remainder obtained when the numeric value in column A is divided by 10
c) The quotient obtained when the numeric value in column A is divided by 100
d) The remainder obtained when the numeric value in column A is divided by 100
d
- ) When a path goes from node A1 to node C2 in Fig. 1 and the passing nodes are counted
as shown in Fig. 2, it is found that there are three shortest paths with the minimum
number of passing nodes. How many shortest paths are there available to go from
node A1 to node D4 via node C2?
Which of the following is an appropriate purpose of appending a check digit to a
customer code?
a) To check the customer code for input errors
b) To arrange customers in order of acquisition when a list of customers is created
c) To enable customers to be inferred easily and quickly
d) To enable the grouping of customers by geographical area or other attributes
a
Which of the following is an appropriate description concerning the characteristics of
EUC (End User Computing)?
a) EUC enables users to directly access, reference, and manipulate data that they need
for business operations.
b) EUC gives priority to system operation and maintenance, so it causes backlogs to
increase in the information systems department.
c) EUC requires more development staff members in the information systems
department, so it often leads to an increase in the operating costs of the department.
d) EUC allows the information systems department to take a leadership role in
application development, so it can reduce the workload of users.
a
The procedure described below is sequentially performed for two variables x and y,
starting with step (1). When the procedure is completed, what is the resulting value of
x?
[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
Which of the following refers to an XML-based document format that is used for
efficient information collection and distribution on Web sites such as a blog, a news site,
or an electronic bulletin board, and is also used for describing metadata such as page
header, abstract, and update time in a structured form?
a) CSS (Cascading Style Sheets)
b) DTD (Document Type Definition)
c) RSS (RDF(Resource Description Framework) Site Summary)
d) XSL (Extensible Stylesheet Language)
c
Which of the following is an appropriate description concerning a CPU?
a) The cache memory that is integrated into a CPU is used to virtually extend the
capacity of the main memory.
b) A CPU is equipped with the arithmetic and logical unit that should serve as part of
control functions.
c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data
volume processed at a time, but the width in bits is not related to the performance.
d) For CPUs that have the same architecture, the higher the clock frequency, the faster
the response time.
d
Which of the following is an appropriate description concerning USB?
a) Some peripheral devices with low power consumption can receive power through a
USB cable without any additional power supply.
b) All peripheral devices connected to the USB port of a PC must be turned on before
the PC is powered on.
c) The data is transmitted in parallel over multiple data lines, in order to achieve high
speed data transfer.
d) The USB interface is suitable for a low speed peripheral device, such as a keyboard
or a mouse, rather than a high speed device like a hard disk.
a
Which of the following is used for image sensors in digital cameras?
a) CCD
b) PDP
c) STN
d) TFT
a
10.) Which of the following is the interface that enables a PC and its peripheral devices to
be connected in the configuration shown in the diagram below? Here,
represents a hub.
11.) Among the system configurations shown below, which of the following has the lowest
probability of causing the entire system to stop at the occurrence of a failure? Here,
represents an identical device. When the devices are connected in parallel,
only one device must be running, and when the devices are connected in serial, all
devices must be running.
- ) When a computer is installed under the conditions below, which of the following is an
appropriate graph to represent the relationship between the number of years of use
(horizontal axis) and the monthly costs (vertical axis)?
[Conditions]
(1) Computer costs
* For the initial five years, an amount that is calculated from a lease rate based
on the cost of purchasing the computer is paid in fixed monthly installments.
* From the sixth year on, an amount that is calculated from a lease rate based on
one tenth (1/10) of the cost of purchasing the computer is paid in fixed monthly
installments.
(2) Maintenance costs
* From initial installation, the maintenance fee is paid to a maintenance service
provider in fixed monthly installments.
- The graph below shows the relationship between the failure rate “λ(t)” of the devices
comprising the system and the time “t ” elapsed since the start of use. Which of the
following is a device that is expected to show the greatest increase in the failure rate
during the wear-out failure period?
When a PC is powered on, which of the following is first activated to access a hard
disk or other bootable media before the OS is started?
a) BIOS
b) POST
c) MBR
d) Disk driver
a
When print processing is executed using an application program such as word
processing software or spreadsheet software, there is a method that allows data for
printing to be stored temporarily on the hard disk without direct output to the printer,
and allows actual printer output to be performed by a dedicated program. Which of
the following is the advantage of separating actual printer output from application
execution in this way?
a) The time from the start of application execution until the end of printing can be
reduced.
b) The modification of a document that contains a large number of images becomes
possible.
c) The processing volume per unit time increases.
d) The font can be changed easily at the time of printer output.
c
- In the description below concerning a file system, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
When files and directories on a PC are managed hierarchically, the directory at the
highest level is called the A directory, and the directory that a user is now
manipulating is called the B directory. A notation format that uses the
B directory as its starting point and shows the location of a file or a
directory is called a(n) C path.
When the log file of a Web server is analyzed as a part of daily system administration,
which of the following can be found?
a) Web pages accessed by Web site visitors
b) The model name of a computer used by each visitor
c) The speed of a Web browser on each visitor’s computer
d) Personal information about individual Web site visitors
a
- Which of the following is the expression to be entered into cell D4 in order to calculate
the tax-inclusive prices of the products shown in cells A4 and A5 by using the two
tentative sales tax rates that are set in cells D2 and E2? Here, the expression to be
entered into cell D4 is copied to cells D5, E4, and E5.
Which of the following is an appropriate description concerning the symptom and its
measures to be taken at the occurrence of file fragmentation?
a) Since more files are accessed simultaneously and the seek operation of the hard disk
takes more time, the efficiency of file access drops. The measure to be taken is to
store the simultaneously accessed files close together in the hard disk.
b) Since the recycle bin is full and an old file in the recycle bin is removed physically
each time a file is created or deleted, the efficiency of file access drops. The
measure to be taken is to remove the files in the recycle bin all together.
c) Since small separated areas, instead of a single contiguous area, are allocated when a
file is created, the efficiency of file access drops. The measure to be taken is to
reallocate contiguous areas to files and unused space.
d) The data area for files is large enough, but the control area for files is not sufficient
and it takes time to allocate the control area when a file is created. The measure to
be taken is to combine multiple files into one or to expand the control area.
c
20.) Candidates for operating a new business are selected from all of the employees based
on the conditions below. When a decision table is used to represent the selection
process, which of the following is the appropriate “conditions table” to be inserted into
the decision table?
[Conditions for candidates]
(1) The employee has selected “I am interested in IT” in the questionnaire.
(2) The employee has a score of 85 or higher on the IT aptitude test.
(3) An employee with a test score lower than 85 can become a substitute candidate
if the employee has worked for five or more years in the current workplace.
21.) In a company which has its offices dispersed in several buildings, it is decided to
construct a relational database to manage the locations where PCs are installed.
“Asset” table, “Room” table, and “Building” table are created, and these tables are
linked. When new data is entered, data in the table to be referenced should exist
beforehand. Which of the following is the appropriate sequence of entering data into
each table? Note that the underlined items in each table indicate the primary keys or
the foreign keys.
22.) Which of the following is an appropriate explanation of the table obtained when the
SELECT statement shown below is executed?
SELECT Products.Product_code, SUM(Unit_priceSales_volume)
FROM Products, Sales
WHERE Products.Product_code = Sales.Product_code
GROUP BY Products.Product_code
ORDER BY SUM(Unit_priceSales_volume)
When a database is used, the execution of a function that can update information
during search may cause data inconsistencies in the database. Which of the following
is an appropriate function to prevent this situation?
a) Commitment control
b) Deadlock avoidance
c) Exclusive control
d) Shared access
c
Which of the following is an appropriate description of VoIP?
a) It is a method that enables PC users to access data or applications available on the
Internet.
b) It is a technology that converts voice data into packets and transmits them in
real-time over an IP network.
c) It is a technology that ensures the security of communication by using authentication,
encryption, and decryption between network nodes.
d) It is a system that defines and manages a correspondence between a host name and
an IP address for a network-connected computer.
b
Which of the following prevents unauthorized external access by using packet filtering
at the connection point between a company’s internal network and the Internet?
a) DNS
b) NAT
c) Gateway
d) Firewall
d
Which of the following is an appropriate explanation concerning the function of a
router?
a) It optically reads data such as picture and text and then converts it into digital data.
b) It converts analog signals to digital signals and vice versa.
c) It controls the communication path of data and relays data across networks.
d) It archives and provides data of Web pages by using networks.
c
Which of the following is an appropriate description concerning a cookie used in the
Web?
a) It is a standard that can be used for formatting the layout of an HTML document in
detail.
b) It is the HTTP protocol to which an encryption function is added for private
communications over the Internet.
c) It is a mechanism where a Web server interacts with external programs to create Web
pages dynamically.
d) It is a mechanism where information from a Web server is temporarily saved in a
browser that accesses the Web server.
d
Which of the following is a system configuration that introduces Internet technology
into a company’s information and telecommunication system and is used for
information sharing and business support?
a) EDI
b) VAN
c) Intranet
d) Extranet
c
A PC was checked for computer viruses, and a certain number of infected files were
discovered. Which of the following is an appropriate course of action that should be
taken by the person who found the infected files?
a) Contacting the recipients to whom the files infected by an unknown virus were
forwarded, after identifying the virus so that they can take corrective action
b) Forwarding the infected files to the system administrator by e-mail so that the
administrator can promptly take measures
c) Disconnecting the infected PC immediately from the network in order to prevent
other PCs from being infected
d) Enabling the write protection of removable media that were used for a day-old
backup in order to prevent other files from being infected
c
There exists a model of communication from A to B based on public key cryptography
as shown below. Which of the following is an appropriate description concerning this
model?
The message sent by A is used to generate a message authentication code. This
authentication code is encrypted using A’s private key to generate a bit string that is
sent to B by e-mail along with the original message.
B obtains A’s public key from a trusted organization, and in addition to decrypting
the received bit string, B generates the message authentication code from the
received message to verify that both codes are the same before the message is used.
a) A can confirm that the message is delivered to B.
b) A can guarantee to B that the message is not wiretapped.
c) B is guaranteed to receive the message from A.
d) B can confirm that the message is from A and is not falsified.
d
Which of the following is an appropriate description concerning the information
security policy?
a) The security policy of a company is intended to define what should be set for each
security system, so its contents vary depending on the security-related product to be
installed.
b) The security policy of a company provides guidelines on the action and judgment to
be followed and does not cover the stance and direction on security measures.
c) It is desirable for top management of a company to disclose the vulnerability of the
information system that forces the company to create the security policy.
d) It is necessary to clarify the vision about the action and judgment to be followed to
achieve the target security level.
d
Which of the following is the term that refers to the act of setting up a bogus Web page
imitating a bank, a credit card company, or other organization, and tricking a user with
an e-mail disguised as an official message from the financial organization or a public
organization in order to guide a user to the bogus Web page and steal personal
information such as the personal identification number and credit card number?
a) Cracking
b) Buffer overflow
c) Phishing
d) Bot
c
Which of the following is an appropriate description concerning a macro virus?
a) It is a new virus that is created by combing multiple viruses into one.
b) It moves across computers connected via a network while replicating itself.
c) It is an executable file that is sent as an attachment to an e-mail message.
d) It infects data files used by word processing software or spreadsheet software.
d
Which of the following is a method that may cause a mail server to go down by
sending a large number of unsolicited e-mails to a lot of e-mail users in a short period
of time with the aim of advertising or selling goods or services?
a) Spam mail
b) Chain mail
c) E-mail bomb
d) Multi-posting
a