April 2014 Flashcards
Which of the following is the decimal number that is equivalent to the hexadecimal
number “A3”?
a) 103
b) 153
c) 163
d) 179
c
Q2. Which of the following is the logical operation that is equivalent to the truth table
below?
Input A Input B Output
0 0 0
0 1 0
1 0 0
1 1 1
a) AND
b) NOT
c) OR
d) XOR
a
Which of the following is a standard encoding system that is widely used for handling
multilingual text and symbols around the world as a single character set?
a) ASCII
b) EBCDIC
c) EUC
d) Unicode
d
Which of the following is an appropriate combination of compression techniques that
are used for still images, moving images, and audio?
Still image | Moving image | Audio
a) GIF MPEG MP3
b) JPEG MP3 GIF
c) MP3 JPEG GIF
d) MPEG GIF MP3
a
In a queue, three elements 33, 27, and 12 are stored (i.e., enqueued) in this order.
After another element 45 is enqueued to the queue, two elements are retrieved (i.e.,
dequeued). Which of the following is the second element to be dequeued?
a) 12
b) 27
c) 33
d) 45
b
Which of the following is an appropriate explanation of an algorithm that is used on a
computer?
a) A generic term for artificial languages used to enable a computer to perform a series
of operations
b) A processing procedure for enabling a computer to accomplish a specific purpose
c) Designing of buildings or industrial products with the assistance of a computer
d) Software for translating a program into a machine language that can be directly
executed by a computer
b
Q7.) Among the program control structures, which of the following is classified as a
“while-type” loop structure?
Which of the following is an appropriate description concerning the Java language?
a) It is a general-purpose language developed mainly for business applications.
b) It is a language developed for scientific and engineering calculations.
c) It is a markup language used for describing Web pages.
d) It is an object-oriented language that provides platform-independent portability.
d
In a markup language with the purpose of displaying and printing a screen, it is
possible to directly embed not only the body of a document but also various types of
specifications, such as the structure and layout of the document, and also the font and
size of the character. Which of the following is classified as such a markup language?
a) CASL
b) HTML
c) SQL
d) URL
b
Q10. Which of the following is an appropriate combination of words that are inserted into
blanks A and B in the description below concerning the execution sequence of
instructions in a computer?
In a computer, the instructions are executed in the sequence shown below.
(1) Refer to the program counter.
(2) the instruction.
(3) Set the program counter to the main memory address of the next instruction.
(4) the instruction.
(5) Execute the process corresponding to the instruction.
(6) Return to (1).
A B
a) Decode Read
b) Read Decode
c) Read Write
d) Write Decode
b
Which of the following is the most appropriate explanation of a DVD drive that is used
as an auxiliary storage device for a PC?
a) A laser beam is used for reading data, and magnetism is used for writing data.
b) It cannot be installed in a notebook PC because of its heat release and physical size.
c) It cannot read a CD-ROM disc because of the nature of the recording method.
d) Several types of media, such as DVD-R, DVD-RW, and DVD-RAM, can be used.
d
Which of the following is an appropriate description concerning a touch panel?
a) Operations are performed by using a pen-type or mouse-type device for specifying a
position on the screen, and a flat-plate input device for detecting the position.
b) Operations of a mouse pointer on the screen or other functions are performed by
tracing a flat-panel input device with a finger.
c) The movement of a finger is detected by a sensor on the surface, and operations are
performed by rotating a component called a wheel that is similar to a disc.
d) There are some methods such as electronic or electrostatic techniques, and
operations are performed through direct contact with the screen by using a finger.
d
In a client/server system, which of the following is the most appropriate system that
manages both application software and data on the server side in a centralized manner
and has only the minimum required functions on the client side?
a) Distributed processing system
b) Interactive processing system
c) Rich client system
d) Thin client system
d
Which of the following is an explanation of a dual system?
a) It is a computer system in which exactly the same processing is performed in two
computers, and its reliability is assured by cross-checking the results.
b) It is a computer system that is composed of a primary system used usually and a
secondary system kept on standby in preparation for a failure.
c) It is a distributed processing system in which the computers in a group connected via
a network have an equivalent relationship.
d) It is a distributed processing system that provides a clear hierarchical relation to the
computers in a group connected via a network.
a
The types of programs that are executed at the startup time of a PC are generally
classified into three categories: BIOS, OS, and resident applications. Which of the
following is the list that is arranged in the sequence of the execution of the programs?
a) BIOS → OS → Resident applications
b) OS → BIOS → Resident applications
c) OS → Resident applications → BIOS
d) Resident applications → BIOS → OS
a
Which of the following is an appropriate explanation of plug-in software?
a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.
b) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a Web browser, to enhance their functions.
c) Plug-in software is often included in applications such as a spreadsheet, and allows
the users to record and replay the series of operations performed.
d) Plug-in software is provided to replace part of a program for the purpose of
modifying functions or fixing bugs.
b
Which of the following is an appropriate explanation of multitasking?
a) Several computers connected via a network build a system that works together to
achieve a high-performance system.
b) Several processor cores composed of arithmetic circuits and other control circuits
are implemented in a single CPU.
c) The CPU processing time is allocated to several processes in a sequence so that the
processes can be executed concurrently.
d) The same processing is performed for multiple data items by executing a single
instruction.
c
Q18. Which of the following is the appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?
A: It is the directory at the topmost level of the hierarchy.
B: It shows all paths starting from the topmost directory of the hierarchy down to the
target file or directory according to the directory structure.
C: It is the directory that is currently being manipulated.
D: It shows all paths starting from the directory that is currently manipulated through
the target file or directory according to the directory structure.
Current directory | Absolute path | Root directory
a) A B C
b) A D C
c) C B A
d) C D A
c
Which of the following is an appropriate description concerning the characteristics of
an interpreter-based program?
a) It can be used for batch processing, but cannot be used for interactive processing or
real-time processing.
b) It generally runs faster than a compiled program, and is suitable for a large-scale
program.
c) It takes a long runtime because the program is translated and executed on a
line-by-line basis.
d) The generated object program has a tendency to be larger than a program generated
by a compiler.
c
Which of the following is the reason why it is better to store a file in contiguous area
on a hard disk?
a) Because of less movement of the magnetic head, it takes less time to read data
continuously.
b) Since fewer areas are needed to store the management information of files, the user
can use more areas.
c) Since no area where data is not stored is required in the hard disk, all the areas can
be used.
d) The number of read errors can be decreased in comparison with a file that is stored
in fragmented areas.
a
Which of the following is an appropriate description concerning a pull-down menu that
is used as a user interface on a PC?
a) A list of the options is displayed when a title is clicked, and then an item from the
list can be selected.
b) All the necessary items can be selected from among the several options displayed on
the screen.
c) During keyboard input, subsequent input is anticipated and displayed on the basis of
the past input history.
d) It can be used for displaying error messages or entering the small amount of data on
the screen.
a
Which of the following is a technique that can provide accessible links between
information items represented in text, still images, video, voice, music, or other forms
so that related information can be easily reached by jumping from one place to another
in documents or Web pages?
a) Cyberspace
b) Groupware
c) GUI
d) Hypermedia
d
Q23. Employee information is managed by creating two tables “Emp” for employees and
“Dept” for Departments in a relational database. Which of the following is an
appropriate combination of the primary key(s) and foreign key(s) that are set in the
“Emp” table and the “Dept” table as needed? Here, any employee always belongs to
a department that exists in the “Dept” table, and when the employee data is added or
updated, the referential constraints are used to ensure consistency.
Q24. There are three tables “Supplier” table, “Purchase_details” table, and “Product” table
that are managed by using a relational database. When a new product is purchased
from a new supplier, which of the following is the appropriate sequence of inserting
data into the tables? Here, an underline indicates a primary key, and a dotted
underline indicates a foreign key. An arrow (→) in the answer group represents the
sequence of the tables into which data is inserted.
Q25. Which of the following is the combination of conditions that can retrieve only three
employees including “Tom Cruise” from the “Employee” table managed in a relational
database?
Which of the following is an appropriate explanation of a commercial database
service?
a) Databases created by users are managed on behalf of the users in order to release
information to the public.
b) Information collected only from the commercial field is published free of charge in
the form of a database.
c) Information is provided for profit by creating a database of information collected in
a specific field.
d) Professional advice is provided on various issues that occur when a database is
designed and built.
c
Which of the following is a protocol that enables a client to download an e-mail that
has arrived at the mailbox of a remote server?
a) DNS
b) HTTP
c) POP3
d) SMTP
c
Which of the following is an appropriate explanation concerning URL?
a) It is a communications protocol between a Web page and a browser.
b) It is a message about the update history of a Web page.
c) It is a notation for representing the location of a Web page.
d) It is grammar for describing the content (i.e., body) of a Web page.
c
Which of the following is an appropriate description concerning a virus check for an
e-mail?
a) A virus check does not need to be performed if the e-mail is encrypted.
b) A virus check is not required for the received e-mail if it is inspected by the sender.
c) A virus check is performed even if the attached file has a file extension of “jpg”.
d) A virus check is performed only for the e-mail sent by an unknown sender
c
Which of the following is an appropriate description concerning the characteristics of
cross site scripting?
a) It is an attack by which data being considered too long is sent to an application on a
Web site where the length of input data is not checked.
b) It is an attack that illegally uses the function of recording, invoking, and executing
the operating procedures of word processing software or spreadsheet software.
c) It is an attack that intrudes into a computer under the disguise of a useful program so
that a user installs it unsuspectingly.
d) It is an attack that uses a vulnerability, whereby a malicious script included in the
data entered on a Web site is sent to a Web browser as it is.
d
Q31. Items A through C below are explanations about information security incidents.
Which of the following is an appropriate combination of the three major elements of
information security that is directly related to items A throughC?
A: The necessary information cannot be accessed because of a system failure.
B: The important customer information is leaked to competitors.
C: The design information of a new product is falsified.
Which of the following is an appropriate explanation of a DoS attack?
a) It refers to interrupting a network service by sending a large number of requests.
b) It refers to spying on the data of other people on a communication path.
c) It refers to trying various combinations of letters or numbers to unlock an account.
d) It refers to using a service illegally on a network by pretending to be another person.
a
Which of the following is an appropriate purpose of using HTTPS for accessing a Web
page?
a) To receive all data of one screen effectively through a single connection
b) To secure communications by authenticating the server and encrypting data
c) To shorten the communication time by compressing data
d) To use a dynamically generated Web page in communications
b
When a spam e-mail is received, which of the following is the most appropriate action
that should be avoided?
a) E-mails from the same sender are routed to a spam folder by setting a spam filter.
b) In order to make a complaint against the sender, a reply to the spam e-mail is sent.
c) The e-mail service provider is notified of the transmission of the spam e-mail.
d) The spam e-mail is deleted without opening, viewing, or forwarding.
b
When the current system is replaced with a new system, the data to be migrated from
the current system to the new system and the resources necessary for the migration are
assembled and organized to create a migration plan. Which of the following is the
most appropriate item to be included in the migration plan?
a) Functional requirements for the new system
b) Operational procedures for the screens and forms provided by the new system
c) Procedure for making a periodical backup copy of data files
d) Schedule and organizational framework for switching to the new system
d