April 2016 Flashcards
Which of the following is an appropriate combination of compression techniques that
are used for still images, moving images, and audio?
Still image | Moving image | Audio
a) GIF | MPEG | MP3
b) JPEG | MP3 | GIF
c) MP3 | JPEG | GIF
d) MPEG | GIF | MP3
a
Which of the following is the logical operation that is equivalent to the truth table
below?
Input A | Input B | Output
___________________________
0 | 0 | 0
0 | 1 | 0
1 | 0 | 0
1 | 1 | 1
a) AND
b) NOT
c) OR
d) XOR
a
Which of the following is a standard encoding system that is widely used for handling
multilingual text and symbols around the world in a single character set?
a) ASCII
b) EBCDIC
c) EUC
d) Unicode
d
Which of the following describes the relationship that is always true for two (2) sets A
and B? Here, (X Y) represents the part that belongs to both X and Y (intersection set),
and (X Y) represents the part that belongs to at least one of X or Y (union set).
a) (A B) is a subset of the complement of (A B).
b) (A B) is a subset of A.
c) (A B) is a subset of (A B).
d) (A B) is a subset of the complement of A.
c
In a queue, three elements 33, 27, and 12 are stored (i.e., enqueued) in this order.
After another element 45 is enqueued to the queue, two elements are retrieved (i.e.,
dequeued). Which of the following is the second element that has been dequeued?
a) 12
b) 27
c) 33
d) 45
b
Which of the following is an appropriate description concerning an applet?
a) A document file that is transmitted from a Web site and saved onto the user’s PC
when the Web browser accesses the Web site
b) A language that is used for creating a Web page
c) A program that is downloaded from a Web server and embedded into a client
browser, and then executed in the browser
d) A language that is used for database manipulation such as data addition,
modification, deletion, and search
c
Which of the following is an appropriate description concerning the Java language?
a) It is a general-purpose language developed mainly for business applications.
b) It is a language developed for scientific and engineering calculations.
c) It is a markup language used for describing Web pages.
d) It is an object-oriented language that provides platform-independent portability.
d
In a markup language with the purpose of displaying a screen or printing, it is possible
to directly embed not only the body of a document but specifications of the structure
and layout of the document, and the font and size of the characters. Which of the
following is classified as such a markup language?
a) CASL
b) HTML
c) SQL
d) URL
b
Which of the following is the correct comparison of the amount of data?
a) 1 KB < 1 MB < 1 GB < 1 TB
b) 1 KB < 1 MB < 1 TB < 1 GB
c) 1 KB < 1 TB < 1 MB < 1 GB
d) 1 TB < 1 KB < 1 MB < 1 GB
a
Which of the following is the most appropriate description concerning a compatible
CPU?
a) It can run the OS or the application software that can be run on the original CPU.
b) It must not be developed nor manufactured as long as the patent of the original CPU
is valid.
c) A compatible CPU for single-core CPU has been developed, while one for multi-core CPU does not exist.
d) It is a CPU that is intended to improve the performance of an outdated PC, and is not
adopted for a new model of PC.
a
Which of the following is designed to improve the processing efficiency of a PC by
effectively reducing the time for the CPU to access the main memory?
a) SSD
b) Virtual memory
c) Cache memory
d) Defragmentation
c
Which of the following is appropriate as a description concerning Plug and Play?
a) When a peripheral device is connected to a PC, installation and settings of the device
driver are performed automatically.
b) Software for enhancing the functions of application software is installed at a later
stage.
c) Power is supplied from a PC to a peripheral device via a cable connecting them.
d) A specific program is executed, and the system performance is evaluated on the
basis of the time taken for the processing.
a
Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership), which is a major factor when any purchasing decision is made for a
system?
a) It is the sum of the operation and management costs incurred after the installation of
the system.
b) It is the sum of the costs required to troubleshoot software and hardware faults that occur after the installation of the system.
c) It is the sum of the costs incurred during the installation of the system and the
operation and management costs incurred after the installation.
d) It is the sum of the costs incurred during the installation of the system in addition to
the planning phase of the system.
c
A total of 60,000 hours have passed since a computer system was put into operation.
During this operation period, a total of 100 failures occurred, and the system was
repaired each time. The last repair was completed at the 60,000th hours. If the
MTTR is 60 hours, how many hours is the MTBF of the system during this period?
a) 480
b) 540
c) 599.4
d) 600
b
Which of the following is an appropriate explanation of multitasking?
a) Several computers connected via a network build a system that work together to
achieve a high-performance system.
b) Several processor cores composed of arithmetic circuits and other control circuits
are implemented in a single CPU.
c) The CPU processing time is allocated to several processes in turn so that the
processes can be executed simultaneously.
d) The same processing is performed for multiple data items by executing a single
instruction.
c
16.)
The diagram below shows the directory structure for a part of a certain file system.
Which of the following is the reference from the current directory D3 (indicated with
an asterisk “*”) to the file “a” under the directory D4 (indicated with an arrow)?
Here, files are specified as follows
Which of the following is the most appropriate method for restricting the content of
database to display in accordance with the needs of each user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data
a
Which of the following is the term for the form of using a PC by itself without
connecting it to any network?
a) Thin client
b) Single processor
c) Standalone
d) Peer to peer
c
Which of the following is an appropriate explanation of plug-in software?
a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.
b) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a Web browser, to enhance their functions.
c) Plug-in software is often included in applications such as a spreadsheet, and allows
the users to record and replay the series of operations performed.
d) Plug-in software is provided to replace part of a program for the purpose of
modifying functions or fixing bugs
b
Which of the following is a unit that is used to represent “resolution”, one of the
performance indicators of a display or a printer?
a) bps
b) dpi
c) fps
d) psi
b
Which of the following is an e-mail software that is an OSS (Open Source Software)?
a) Android
b) Firefox
c) MySQL
d) Thunderbird
d
Which of the following is a typical example of a system operating on a super
computer?
a) A Supply Chain Management system that is required for linkage between enterprises
b) A global weather change forecast system that requires large-scale scientific and
technical computing
c) A banking system that requires a high reliability
d) An engine control system of a vehicle that requires advanced real-time control
b
Which of the following is an appropriate example of benefits of cookies?
a) When a person is registered beforehand as a reader, only e-mails whose content
matches the registered genre and preference are delivered automatically.
b) When a search is performed by an Internet search engine, in addition to the search
results, articles and advertisements with related content are displayed.
c) When a link to another person’s blog is pasted in one’s own blog, a notification is
sent automatically to the person.
d) When a user accesses a website that he/she has accessed before, the Web page is displayed according to the settings tailored to him/her
d
Which of the following is an appropriate description concerning the characteristics of video streaming?
a) It is mandatory to have the data on the server beforehand, and videos of events and
sports cannot be distributed while they are being shot.
b) Deterioration in picture quality due to partial lack of reception data can be
completely eliminated.
c) Preparation time is not required for starting playback of a video, and therefore, the
viewer can immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as
soon as some data has been read.
d
Q25. )
From the “Product” table below, products whose supplier is “Company A” and the
price is 1.4 dollars or more, and products whose supplier is “Company B” and the price
is 1.7 dollars or less are extracted. Which of the following is a list of all of the
obtained product names?
Product
Product code | Product name | Price (dollars) | Supplier
________________________________
S001 | Chocolate | 1.5 Company A
S002 | Cake | 2.6| Company B
S003 | Sponge cake | 2.9 | Company C
S004 | Apple | 1.9 | Company A
S005 | Strawberry | 2.2 | Company B
S006 | Melon | 2.8 | Company C
S007 | Juice | 1.2 | Company A
S008 | Coffee |1.6 | Company B
S009 | Beer | 2.2 | Company C
a) Cake, Strawberry, Coffee
b) Cake, Strawberry, Juice
c) Chocolate, Apple, Coffee
d) Chocolate, Apple, Juice
c
Q26. The icon illustrated below, generally called a feed icon, sometimes appears on a web
page. Which of the following corresponds to what this icon explains?
Which of the following is a communication network built in a limited area, such as the
inside of a building?
a) IP-VPN
b) LAN
c) WAN
d) Wide-area Ethernet
b
Which of the following is an appropriate explanation of tethering?
a) A type of virus that replicates itself and spreads infection throughout a network
b) A function of connecting a PC to the Internet by using a communication terminal
such as a smartphone like a mobile router
c) A method of detecting a tampering by using a hash function and public key
cryptography for electronic data
d) An attack that attempts to illegally manipulate the information in a database by
deliberately entering an SQL command in an input field on a web page
b
Which of the following is a mechanism by which, if an e-mail is sent to a specific
e-mail address, in correspondence to the address, the e-mail with the same content is distributed to multiple e-mail addresses that are already registered?
a) Web mail
b) Chain mail
c) Mailing list
d) Reply mail
c
Which of the following is an appropriate description concerning encryption of
communication when a website with the URL beginning with “https://” is browsed
through a PC browser?
a) Only the communication from the PC to the web server is encrypted.
b) Only the communication from the web server to the PC is encrypted.
c) The bi-directional communication between the web server and PC is encrypted.
d) The direction in which communication will be encrypted depends on the settings of
the web server.
c
Which of the following is the threat that can be prevented by encrypting data?
a) Deletion of data because of an operational error
b) Social engineering
c) Tapping of communication content
d) DoS attack on the server in which data is stored
c
Q32. The authentication technology is classified into three (3) types, namely authentication
based on one’s possession, authentication based on physical characteristics, and
authentication based on knowledge. Which of the following is the appropriate
classifications of the implementation examples (1) through (3)?
Which of the following is an encryption method of wireless LAN?
a) ESSID
b) HTTPS
c) POP3
d) WPA2
d
Which of the following is the most appropriate as a set of documents that
comprehensively define the approach to information security of a company or an
organization, sometimes including information security standards?
a) Information security policy
b) Information security management system
c) Social engineering
d) Risk assessment
a
Security risk treatment in ISMS includes risk transfer, risk avoidance, risk acceptance,
and risk reduction. Which of the following is an example of risk avoidance?
a) A security measure was taken, which lowered the possibility of problems arising.
b) The company took out insurance in case a problem arises and causes damage.
c) The risk was confirmed to be small, and it was decided that damage would be borne
by the company when a problem arises.
d) The company withdrew from the services that carried high risk.
d