April 2013 Flashcards
1.) In the sales campaign for a certain product, a full-page advertisement is run a total of
three times in three magazines A, B, and C. When the effects expected from running
a full-page advertisement zero to three times in each of the magazines are as shown in
the table below, how many times should the advertisement be run in magazine A to
gain the largest possible effect? Here, the effects of the advertisements placed in the
individual magazines are independent of one another, and the effects from multiple
magazines can be calculated by simply adding the individual effects.
Number of times that the
full-page advertisement is run
Zero
times
One
time
Two
times
Three
times
Effect of magazine A 0 2 7 7
Effect of magazine B 0 1 6 10
Effect of magazine C 0 5 8 9
a) 0 b) 1 c) 2 d) 3
Which of the following is the appropriate meaning of the units that are shown in the
specifications given in brochures or catalogs?
a) “2-Tbyte hard disk” refers to a capacity of 2× 1012 bytes.
b) “9600-dpi printer” refers to a printing precision of 9600 dots/cm2
.
c) “CPU operates at a base clock of 3.3 GHz” refers to operation at a frequency of
3.3× 220 Hz.
d) “Modem with a transmission speed of 56 kbps” refers to a minimum transmission
speed of 5.6× 210 bits/second.
a
There is a standard that can represent data in a hierarchical structure by enclosing data
that corresponds to attribute N with the tags <N>, which means the start, and </N>,
which means the end, and then linking and nesting these tags. Company A decides to
comply with this standard and create a paper by using the structural rules (1) through
(3) below. Which of the following is the appropriate header of a paper named “New
Document Management” that is created by Jack Smith of the Information Systems
Department (I/S Department) in accordance with this standard and these structural
rules?
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.
a) <header>
<author>
<title>New Document Management
<name>Jack Smith</name><dept>I/S Department</dept>
</title>
</author info>
</header>
b) <header>
<title>New Document Management</title>
<author><name>Jack Smith</name></author info>
<dept>I/S Department</dept>
</header>
c) <header>
<title>New Document Management</title>
<author>
<name>Jack Smith</name><dept>I/S Department</dept>
</author info>
</header>
d) <header>
<title>New Document Management</title>
<name>Jack Smith
<author><dept>I/S Department</dept></author info>
</name>
</header>
</author></name></header></author></header></author></header></author>
c
Which of the following is an appropriate description concerning HTML?
a) It is a markup language that can specify the logical structure and layout of a Web
page by using tags.
b) It is a script language that can describe the program or processing steps executed on
a browser.
c) It is a communication protocol that is used between a browser and a Web server.
d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.
a
Which of the following is an appropriate description concerning an applet?
a) A document file that is transmitted from a Web site and saved onto the user’s PC
when the Web browser accesses the Web site
b) A language that is used for creating a Web page
c) A program that is downloaded from a Web server and embedded into a client
browser, and then executed in the browser
d) A language that is used for database manipulation such as data addition,
modification, deletion, and search
c
Which of the following is an appropriate characteristic of tree structure that is one of
data structures?
a) Data elements can be retrieved by traversing a hierarchy of nodes from a higher
level node to a lower level node.
b) Data elements can be retrieved in the order in which they are stored.
c) Data elements can be retrieved in the reverse order to the order in which they are
stored.
d) Data elements can be retrieved by traversing cells composed of a data field and a
pointer field.
a
Which of the following is a DVD disc in which users can write data, but cannot rewrite
data?
a) DVD-R
b) DVD-RAM
c) DVD-ROM
d) DVD-RW
a
Which of the following is an appropriate characteristic of flash memory?
a) It allows high-speed access, so it is used for cache memory.
b) Data can be written only once, so it is used for program memory.
c) It is rewritable and nonvolatile, so it is used for USB memory or SD card.
d) Although refresh cycles are required, it is used for main memory because of the
capability of rewriting data any number of times.
c
Which of the following is the correct comparison of the amount of data?
a) 1 KB < 1 MB < 1 GB < 1 TB
b) 1 KB < 1 MB < 1 TB < 1 GB
c) 1 KB < 1 TB < 1 MB < 1 GB
d) 1 TB < 1 KB < 1 MB < 1 GB
a
Which of the following is a characteristic common to IEEE 1394 and USB that are
often used for connection interfaces between PCs and peripheral devices?
a) Peripheral devices can be connected and disconnected while the PC and/or devices
are powered on.
b) A maximum transfer rate is 100 Mbits/second.
c) A unique ID needs to be assigned to each device connected to a PC.
d) Data can be transmitted in parallel over multiple data lines.
a
Among the functions of client management tools, which of the following is the most
effective function for detecting whether or not software unrelated to the business
operations is installed on client PCs?
a) Inventory collection
b) Remote operation
c) Software distribution
d) Lifecycle management
a
Which of the following is an appropriate characteristic of a distributed processing
system, in comparison with a centralized processing system?
a) The partial failure of a system often leads to a shutdown of the entire system.
b) It is difficult to expand the system in line with the expansion of functions or the
increase in the volume of work.
c) It is easy to protect data and ensure security.
d) From a viewpoint of operations management, it often becomes complex to operate
the entire system efficiently.
d
Which of the following is the system that receives a processing request from a terminal
via a network and sends back the result immediately?
a) Operating system
b) Online real-time system
c) Database system
d) Multimedia system
b
What is the minimum amount (in Mbytes) of virtual memory that is required under the
conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
- Memory required for applications: An amount of 50 Mbytes is required for each
application, and a total can be calculated by multiplying it by the number of
applications that run concurrently. Eight applications run concurrently. - Memory required for controlling main memory or other related functions: In
addition to 512 Mbytes of main memory, a minimum amount of 20 Mbytes is
required. - Required virtual memory: The required amount is the sum of the above items 1
through 3.
a) 762
b) 782
c) 1,112
d) 1,132
d
When a new program was added and executed on a server that has the virtual memory
function, a lot of swapping occurred and the performance of existing programs in
operation was decreased. In order to resolve this problem, which of the following is
the most appropriate method?
a) Installation of a high-speed CPU
b) Installation of a faster type of main memory
c) Installation of additional hard disk drives to expand the capacity of auxiliary storage
d) Installation of more main memory
d
16.) Company A plans to make a backup copy of the data on a server, which is used for
business operations, in preparation of future hardware failures. Which of the
following is an appropriate backup plan that satisfies the backup requirements shown
below?
17.) As shown in the directory structure below, when D3 marked by an asterisk (*) is the
current directory, which of the following the appropriate directory path that can
designate file A under directory D4 marked by an arrow? Here, a file is designated as
follows:
Which of the following is the most appropriate purpose of installing a business
application software package instead of self-developed application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire the knowledge of software development methods
d) To improve the skills of application developers
b
Which of the following is an appropriate description concerning OSS (Open Source
Software)?
a) The program is free to use for a certain trial period, but a fee is required to continue
using it.
b) Modifications and derived works are allowed to be distributed under the same terms
as the license of the original software.
c) The copyright is waived, so any modified program can be distributed without
permission.
d) The program may be restricted from being used in a business, or from being used for
a specific field.
b
Which of the following is the effect that is expected as a result of performing
defragmentation of a hard disk?
a) The cluster with an error is replaced with an alternate cluster.
b) The apparent volume of files is decreased.
c) The number of read errors is decreased when files are accessed.
d) The access time to continuously read files is shortened.
d
Which of the following is an appropriate type of menu that enables users to make
multiple selections on common GUIs as seen in PC operating systems?
a) Check box
b) Text box
c) Pull-down menu
d) Radio button
a
Some sample photos of luxury women’s clothing, which were taken with a digital
camera in an uncompressed format, are to be provided on a shared server after image
processing such as color-correction and trimming. In such a situation, which of the
following is an appropriate compression format that can be used to reduce the amount
of image data?
a) BMP
b) JPEG
c) MPEG
d) MP3
b
- From the “Product” table below, products whose supplier is “Company A” and the
price is 1.4 dollars or more, and products whose supplier is “Company B” and the price
is 1.7 dollars or less are extracted. Which of the following is a list of all of the
obtained product names?
Product
Product code Product name Price (dollars) Supplier
S001 Chocolate 1.5 Company A
S002 Cake 2.6 Company B
S003 Sponge cake 2.9 Company C
S004 Apple 1.9 Company A
S005 Strawberry 2.2 Company B
S006 Melon 2.8 Company C
S007 Juice 1.2 Company A
S008 Coffee 1.6 Company B
S009 Beer 2.2 Company C
a) Cake, Strawberry, Coffee
b) Cake, Strawberry, Juice
c) Chocolate, Apple, Coffee
d) Chocolate, Apple, Juice
c
Which of the following is an appropriate purpose of normalizing the data of a relational
database?
a) To improve the compression ratio of data
b) To retain the consistency of data
c) To prevent the leakage of data
d) To enable the simultaneous access of data
b
- ) In a relational database, when (A B) and ) (A B are performed on table A and
table B shown below, which of the following is an appropriate combination of the
resulting two tables among the three tables P, Q, and R? Here, ) (A B shows the
union of A and B, and ) (A B shows the intersection of A and B.
A program in operation detected that the sales data exceeded the upper limit. As a
result of checking the input form, it was found that sales quantity exceeded the upper
limit by two digits. Which of the following is the appropriate action for the
operations department to take toward this data?
a) Correcting the data with the approval of the head of the operations department
b) Consulting the systems development department
c) Discarding the data under the responsibility of the operations department
d) Asking the requester or requesting department to check the input form
d
Which of the following is the mechanism that determines a correspondence between a
domain name and an IP address on the Internet?
a) DNS
b) FTP
c) SMTP
d) Web
a
Which of the following is required to construct a LAN to connect several computers in
a room?
a) Internet
b) Splitter
c) Hub
d) Modem
c
Which of the following is placed between an internal network and an external network
in order to prevent unauthorized access from the outside to the inside?
a) DHCP server
b) Search engine
c) Switching hub
d) Firewall
d
Which of the following is an appropriate description concerning a router used in an IP
network?
a) It maps domain names to IP addresses.
b) It selects the path for transmitting packets based on IP addresses.
c) It converts analog signals to digital signals and vice versa.
d) It executes processes and provides data upon requests from other computers.
b
When e-mails are sent and received between PCs on the Internet, which of the
following is an appropriate description concerning the selection of communication
protocols that are used between each pair of PCs and mail servers?
a) Each PC uses POP for sending e-mails and SMTP for receiving them.
b) Each PC uses SMTP for sending e-mails and POP for receiving them.
c) Each PC uses POP for both sending and receiving e-mails.
d) Each PC uses SMTP for both sending and receiving e-mails.
b
When the maintenance of a database is planned for employee information that includes
personnel information, which of the following is an appropriate item to be considered?
a) It is essential to keep employee information up to date, so administrators in each
department should be responsible for updating staff members’ items.
b) Employee information is used for deciding personnel affairs, so managers should be
able to check any information of all employees.
c) The database includes employees’ private information, so access privileges should
be established to limit the range of available information.
d) When checking employee information for internal projects, any employee of
relevant departments should be able to search for all employee information.
c
In the PDCA (Plan, Do, Check, Act) cycle of an information security management
system (ISMS), which of the following is performed during the “Act” phase?
a) Maintenance and improvement of the ISMS
b) Establishment of the ISMS
c) Monitoring and review of the ISMS
d) Installation and operations of the ISMS
a
Which of the following is a security attack that is sent to users as a part of a program
with a hidden destructive function, or as a program designed to trick users into
executing a malicious function?
a) DoS attack
b) Dictionary attack
c) Trojan horse
d) Buffer overflow attack
c
Which of the following is an appropriate description concerning the management of a
user ID and password in system operation?
a) A user ID should be unconditionally given to any applicant, and a password should
be registered by each applicant.
b) The log-in operation should be blocked unless the user changes the password during
periodic intervals.
c) Applicants should be instructed to use only passwords with eight or more characters
listed in the dictionary.
d) Even if a user retires from work or moves to another organization, the user’s ID
should be left “as is”.
b