April 2012 Flashcards
In the worksheet of spreadsheet software shown below, rows 1 through 4 are sorted in
ascending order by using the last (or low order) two digits of each numeric value in
column A. When the numeric values of column B that are calculated from those of
column A are used as sort keys, which of the following is the appropriate calculation
result to be entered into column B?
A | B
1 123411
2 156711
3 119813
4 123815
a) The quotient obtained when the numeric value in column A is divided by 10
b) The remainder obtained when the numeric value in column A is divided by 10
c) The quotient obtained when the numeric value in column A is divided by 100
d) The remainder obtained when the numeric value in column A is divided by 100
d
- ) When a path goes from node A1 to node C2 in Fig. 1 and the passing nodes are counted
as shown in Fig. 2, it is found that there are three shortest paths with the minimum
number of passing nodes. How many shortest paths are there available to go from
node A1 to node D4 via node C2?
Which of the following is an appropriate purpose of appending a check digit to a
customer code?
a) To check the customer code for input errors
b) To arrange customers in order of acquisition when a list of customers is created
c) To enable customers to be inferred easily and quickly
d) To enable the grouping of customers by geographical area or other attributes
a
Which of the following is an appropriate description concerning the characteristics of
EUC (End User Computing)?
a) EUC enables users to directly access, reference, and manipulate data that they need
for business operations.
b) EUC gives priority to system operation and maintenance, so it causes backlogs to
increase in the information systems department.
c) EUC requires more development staff members in the information systems
department, so it often leads to an increase in the operating costs of the department.
d) EUC allows the information systems department to take a leadership role in
application development, so it can reduce the workload of users.
a
The procedure described below is sequentially performed for two variables x and y,
starting with step (1). When the procedure is completed, what is the resulting value of
x?
[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
Which of the following refers to an XML-based document format that is used for
efficient information collection and distribution on Web sites such as a blog, a news site,
or an electronic bulletin board, and is also used for describing metadata such as page
header, abstract, and update time in a structured form?
a) CSS (Cascading Style Sheets)
b) DTD (Document Type Definition)
c) RSS (RDF(Resource Description Framework) Site Summary)
d) XSL (Extensible Stylesheet Language)
c
Which of the following is an appropriate description concerning a CPU?
a) The cache memory that is integrated into a CPU is used to virtually extend the
capacity of the main memory.
b) A CPU is equipped with the arithmetic and logical unit that should serve as part of
control functions.
c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data
volume processed at a time, but the width in bits is not related to the performance.
d) For CPUs that have the same architecture, the higher the clock frequency, the faster
the response time.
d
Which of the following is an appropriate description concerning USB?
a) Some peripheral devices with low power consumption can receive power through a
USB cable without any additional power supply.
b) All peripheral devices connected to the USB port of a PC must be turned on before
the PC is powered on.
c) The data is transmitted in parallel over multiple data lines, in order to achieve high
speed data transfer.
d) The USB interface is suitable for a low speed peripheral device, such as a keyboard
or a mouse, rather than a high speed device like a hard disk.
a
Which of the following is used for image sensors in digital cameras?
a) CCD
b) PDP
c) STN
d) TFT
a
10.) Which of the following is the interface that enables a PC and its peripheral devices to
be connected in the configuration shown in the diagram below? Here,
represents a hub.
11.) Among the system configurations shown below, which of the following has the lowest
probability of causing the entire system to stop at the occurrence of a failure? Here,
represents an identical device. When the devices are connected in parallel,
only one device must be running, and when the devices are connected in serial, all
devices must be running.
- ) When a computer is installed under the conditions below, which of the following is an
appropriate graph to represent the relationship between the number of years of use
(horizontal axis) and the monthly costs (vertical axis)?
[Conditions]
(1) Computer costs
* For the initial five years, an amount that is calculated from a lease rate based
on the cost of purchasing the computer is paid in fixed monthly installments.
* From the sixth year on, an amount that is calculated from a lease rate based on
one tenth (1/10) of the cost of purchasing the computer is paid in fixed monthly
installments.
(2) Maintenance costs
* From initial installation, the maintenance fee is paid to a maintenance service
provider in fixed monthly installments.
- The graph below shows the relationship between the failure rate “λ(t)” of the devices
comprising the system and the time “t ” elapsed since the start of use. Which of the
following is a device that is expected to show the greatest increase in the failure rate
during the wear-out failure period?
When a PC is powered on, which of the following is first activated to access a hard
disk or other bootable media before the OS is started?
a) BIOS
b) POST
c) MBR
d) Disk driver
a
When print processing is executed using an application program such as word
processing software or spreadsheet software, there is a method that allows data for
printing to be stored temporarily on the hard disk without direct output to the printer,
and allows actual printer output to be performed by a dedicated program. Which of
the following is the advantage of separating actual printer output from application
execution in this way?
a) The time from the start of application execution until the end of printing can be
reduced.
b) The modification of a document that contains a large number of images becomes
possible.
c) The processing volume per unit time increases.
d) The font can be changed easily at the time of printer output.
c
- In the description below concerning a file system, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
When files and directories on a PC are managed hierarchically, the directory at the
highest level is called the A directory, and the directory that a user is now
manipulating is called the B directory. A notation format that uses the
B directory as its starting point and shows the location of a file or a
directory is called a(n) C path.
When the log file of a Web server is analyzed as a part of daily system administration,
which of the following can be found?
a) Web pages accessed by Web site visitors
b) The model name of a computer used by each visitor
c) The speed of a Web browser on each visitor’s computer
d) Personal information about individual Web site visitors
a
- Which of the following is the expression to be entered into cell D4 in order to calculate
the tax-inclusive prices of the products shown in cells A4 and A5 by using the two
tentative sales tax rates that are set in cells D2 and E2? Here, the expression to be
entered into cell D4 is copied to cells D5, E4, and E5.
Which of the following is an appropriate description concerning the symptom and its
measures to be taken at the occurrence of file fragmentation?
a) Since more files are accessed simultaneously and the seek operation of the hard disk
takes more time, the efficiency of file access drops. The measure to be taken is to
store the simultaneously accessed files close together in the hard disk.
b) Since the recycle bin is full and an old file in the recycle bin is removed physically
each time a file is created or deleted, the efficiency of file access drops. The
measure to be taken is to remove the files in the recycle bin all together.
c) Since small separated areas, instead of a single contiguous area, are allocated when a
file is created, the efficiency of file access drops. The measure to be taken is to
reallocate contiguous areas to files and unused space.
d) The data area for files is large enough, but the control area for files is not sufficient
and it takes time to allocate the control area when a file is created. The measure to
be taken is to combine multiple files into one or to expand the control area.
c
20.) Candidates for operating a new business are selected from all of the employees based
on the conditions below. When a decision table is used to represent the selection
process, which of the following is the appropriate “conditions table” to be inserted into
the decision table?
[Conditions for candidates]
(1) The employee has selected “I am interested in IT” in the questionnaire.
(2) The employee has a score of 85 or higher on the IT aptitude test.
(3) An employee with a test score lower than 85 can become a substitute candidate
if the employee has worked for five or more years in the current workplace.
21.) In a company which has its offices dispersed in several buildings, it is decided to
construct a relational database to manage the locations where PCs are installed.
“Asset” table, “Room” table, and “Building” table are created, and these tables are
linked. When new data is entered, data in the table to be referenced should exist
beforehand. Which of the following is the appropriate sequence of entering data into
each table? Note that the underlined items in each table indicate the primary keys or
the foreign keys.
22.) Which of the following is an appropriate explanation of the table obtained when the
SELECT statement shown below is executed?
SELECT Products.Product_code, SUM(Unit_priceSales_volume)
FROM Products, Sales
WHERE Products.Product_code = Sales.Product_code
GROUP BY Products.Product_code
ORDER BY SUM(Unit_priceSales_volume)
When a database is used, the execution of a function that can update information
during search may cause data inconsistencies in the database. Which of the following
is an appropriate function to prevent this situation?
a) Commitment control
b) Deadlock avoidance
c) Exclusive control
d) Shared access
c
Which of the following is an appropriate description of VoIP?
a) It is a method that enables PC users to access data or applications available on the
Internet.
b) It is a technology that converts voice data into packets and transmits them in
real-time over an IP network.
c) It is a technology that ensures the security of communication by using authentication,
encryption, and decryption between network nodes.
d) It is a system that defines and manages a correspondence between a host name and
an IP address for a network-connected computer.
b