April 2017 Flashcards
1.) An analog sound signal is digitized. Sampling is performed at Time 1 through Time 5
in the figure below, and four-level quantization is performed; in other words, the levels
closest to the sampling point are selected. After that, two-bit encoding is performed.
The result is “11 01 00 10 11”. When digitization is performed in the same way, which
of the following figures represents the sound signal that results in “01 00 10 11 01”?
A search is performed by specifying a character string comprised of multiple alphabetic
characters and one delimiter character “.” (period). An “” (asterisk) represents an
arbitrary character string with zero or more characters, and a “?” (question mark)
represents an arbitrary single character. Which of the following character strings
matches the character string represented below?
X.Y??
a) XY.XYY
b) XXX.YY
c) XYX.YXY
d) YXYX.YXY
c
As shown in the table below, columns A and B contain all possible combinations of
numbers 0 through 9, and the table has 100 rows in total. When all the rows where
the value in column A is equal to or less than the value in column B are removed from
the table, how many rows remain in the table?
A | B
______
0 | 0
0 | 1
0 | 2
…| …
9 | 8
9 | 9
a) 40
b) 45
c) 50
d) 55
b
Q4. As shown in Figure 1, there is a box that generates a single output in response to two
inputs. The input to this box is either “Agree” or “Disagree.” The output “Agree” is
generated only when both inputs are “Agree,” and in other cases the output “Disagree”
is generated. When three inputs are entered into two boxes as shown in Figure 2, which
of the following is the correct description concerning the output? Here, each box of
Figure 2 has the same function as the box of Figure 1.
There is a desk that can hold at most four (4) files. On this desk, six (6) files A through
F are used for a job. When the fifth file needs to be put on the desk, the file with the
longest time since the last use among the four (4) will be put in a drawer. If the files
are put on the desk and referenced in order of A, B, C, D, E, C, B, D, F, B, which of
the following is the last file to be put in the drawer?
a) A
b) B
c) D
d) E
d
Which of the following can be created using HTML?
a) Web browser
b) Web page
c) Cookie
d) SQL program
b
The procedure described below is executed for two variables x and y, in order from step
(1) through step (4). When the procedure is terminated, what is the resulting value of
x?
[Procedure]
(1) Assign 2 to x, and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, terminate the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language that is used for describing web pages.
b) It is a language that is developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language that is developed for business-oriented calculations
c
Q9. The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” indicates that the content of “x” is replaced with the data of
“y”.
Among the interface standards (i) through (iv), which of the following contains all and
only the standards that do not need a physical connection with cables and the like?
(i) Bluetooth
(ii) IEEE 1394
(iii) IrDA
(iv) USB 3.0
a) (i), (ii)
b) (i), (iii)
c) (ii), (iii)
d) (iii), (iv)
b
Which of the following is software that mediates between a device connected to a PC and an OS or an application software, and that controls and operates the device?
a) Archiver
b) Installer
c) Device driver
d) Middleware
c
Which of the following is a storage device or medium that is based on semiconductor
memory technology?
a) CD-ROM
b) DVD-RAM
c) BD
d) SSD
d
Which of the following is a method of writing the same data to multiple hard disks
simultaneously and improving reliability rather than performance?
a) Striping
b) Paging
c) Interleaving
d) Mirroring
d
Q14. The system configurations A through C are made up by connecting multiple identical
devices. Which of the following is a list where A through C are sorted in descending
order of availability? Here, represents a device. The parallel connection requires
only one (1) of the devices to be functional, while the series connection requires all
devices to be functional.
Which of the following is an explanation of characteristics of a dual system?
a) It provides two (2) sets of systems that perform the same processing and checks
the correctness of the processing by comparing the results. If one of the systems
fails, it isolates the failed system and continues the processing.
b) The same two (2) devices are used, so that the processing capability can be
increased to double that of a simplex system.
c) It provides a currently used system for performing online processing and also a
backup system that is made on standby while performing batch processing. In the
event of a failure in the currently used system, it switches to the backup system,
starts the online processing, and continues the service.
d) It connects multiple devices in series and configures them in such a way that the
load of each function is assigned to one of them, so that processing capability is
high. But if any one of the devices in charge of any function fails, it becomes
unable to provide the service.
a
Q16. When a computer system operates for 1,200 hours, the status of the normal operation
time and the repair time is shown in the table below. What is the value of MTTR (Mean
Time To Repair, in hours) of the system?
There is a system where a full backup is made after closing time every Sunday, and an
incremental backup is made after closing time on Monday through Saturday. On a
Wednesday, a failure happened during business hours, so a decision was made to restore
data to the state at the time of closing on Tuesday by using backup files. Which of the
following contains all the necessary backup files for restoring data? Here, an incremental
backup file means a backup file that contains only the data that has been modified since
the previous backup file (a full backup file or an incremental backup file) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
a
Which of the following is an appropriate combination of software that includes only OSS
(Open Source Software)?
a) Internet Explorer, Linux, PostgreSQL
b) Internet Explorer, PostgreSQL, Windows
c) Firefox, Linux, Thunderbird
d) Firefox, Thunderbird, Windows
c
Which of the following is an appropriate description concerning the OS for PCs?
a) Only one type of OS can be installed and executed on one PC.
b) There is no OS for PCs that are equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, any software operating with the old version of the OS can no longer be used.
d) There exist some OSs for PCs that can be started up by using an external storage
device, such as a CD-ROM and USB memory, other than the hard disk.
d
Which of the following is the most appropriate purpose of installing a business
application software package instead of self-developed application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire knowledge of software development methods
d) To improve the skills of application developers
b
Which of the following is the most appropriate explanation of a “multimedia authoring
tool”?
a) It is a tool that is used to create multimedia content by combining materials, such as
image, sound, and text, on the screen.
b) It is a tool that is used to play back multimedia content, such as image, sound, and
text, in the PC environment.
c) It is a tool that is used to search for multimedia information, such as image, sound, and text.
d) It is a tool that is used to interactively define schema for multimedia database
containing information, such as image, sound, and text.
a
What is the minimum amount (in Mbytes) of virtual memory that is required under the
conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
- Memory required for applications: An amount of 50 Mbytes is required for each
application, and a total can be calculated by multiplying it by the number of applications that run concurrently. Eight applications run concurrently. - Memory required for controlling main memory or other related functions: 512
Mbytes of main memory and another 20 Mbytes is required. - Required virtual memory: The required amount is the sum of the above items 1
through 3.
a) 762
b) 782
c) 1,112
d) 1,132
d
On a standalone PC, sequential access to a database is taking longer to process than
before. When the number of records remains almost unchanged, which of the following can be considered to be the cause?
a) Unnecessary records, such as already deleted data, are read.
b) Data has been added and deleted many times, so the record area in the database file
is fragmented.
c) Access takes longer as free space in the database has increased.
d) Because of hardware deterioration, data
transmission between the hard disk and the
processor has become slower.
b
Which of the following is an appropriate description of AR (Augmented Reality)?
a) A technology that creates memory space beyond the amount of memory actually
installed and makes this available as main memory
b) A technology that overlays and displays computer-generated information on camera footage or other content that captures real environments
c) A technology that analyzes and digitizes the human voice by using a computer in
order to utilize it for commanding a computer, entering characters, and so on
d) A science or a technology for emulating human intellectual work such as inference,
learning, and ability to understand language, by using a computer
b
Which of the following is a technique that can be used to compress both video and audio
data?
a) BMP
b) GIF
c) JPEG
d) MPEG
d
Q26. The “Purchase_list” table in a relational database manages the purchases of products.
This table should be normalized and divided into a “Purchase” table and a “Product”
table. Which of the following is the most appropriate field that should be contained in
common in the two divided tables? Here, each purchase includes only one product, and
can be uniquely identified by Purchase_number. Also, each product can be uniquely
identified by Product_number.
When designing a database, which of the following is used for the purpose of organizing
and representing the relation of data?
a) E-R diagram
b) Arrow diagram
c) Gantt chart
d) Flowchart
a
When a relational database is constructed according to the processes (A through C)
below, which of the following is the appropriate execution sequence?
A: Identifying the data items to be managed
B: Analyzing the target business operations
C: Creating the relational database tables
a) A→ B→ C
b) B→ A→ C
c) B→ C → A
d) C→ A → B
b
Q29. Which of the following is the relational operation that extracts only the rows of a product
whose price is 10 dollars or more, from the “Product” table of the relational database
shown below?
In some web sites, information about the viewing of them by using a browser is stored
in a viewer’s PC through the browser. Later, when the web sites are accessed, the stored
information is used so as to enhance the convenience of viewing. Which of the following
is a mechanism that is used for this purpose?
a) Cookie
b) SQL
c) URL
d) XML
a
Which of the following is an appropriate role of a subnet mask?
a) Identifying a MAC address on an Ethernet from an IP address
b) Separating a network address included in an IP address and a host address of the individual computer that belongs to the network
c) Associating a private IP address with a global IP address that is used for relaying
between an internal network and the Internet
d) Associating a domain name of destination with an IP address
b
Q32. There is a TCP/IP network that is configured to enable PC1 through PC4 to communicate
with each other by using hubs and routers. When the IP addresses that are assigned to
each port of the routers are as shown in the figure below, which of the following is an
appropriate IP address of the default gateway to assign to PC1?
Among the cases of communication between PCs, servers, communication devices, printers, and other devices, which of the following needs to use a WAN?
a) Multiple PCs and a file server are connected to a LAN in Osaka branch office, and
files stored in the file server are made to be accessible from any PC connected to the LAN.
b) Inside a house, a PC and a printer are connected with Bluetooth, and documents
created on the PC are printed on the printer.
c) Inside a server room, a PC and a web server are connected to a hub, and the web
server is maintained from the PC.
d) A PC connected to the LAN in Kyoto-City sales office accesses the server in
Tokyo head office and uploads sales information.
d
A DHCP server has been installed in a LAN. When a PC that automatically acquires
information from the DHCP server is to be connected to the LAN, which of the following
will be set in the PC?
a) IP address
b) Latest virus definition file
c) Address list of spam mail
d) Mail addresses assigned by the provider
a
Which of the following contains all and only the authentication methods where the
information required for the authentication does not have to be changed nor updated
regularly?
A Iris recognition
B Authentication with a digital certificate
C Password authentication
a) A
b) B
c) C
d) A, B
a
Which of the following is an appropriate operation example of a server room where
security should be maintained?
a) In order to simplify management, an ID card for entry and exit is issued to each
department, not to individuals.
b) In order to make it possible for all employees and visitors to see where the server
room is, a room name sign is posted at the entrance.
c) In order to prevent leakage of entry and exit information, entry and exit records are
not collected.
d) In order to prevent unauthorized activities, working in a server room is not allowed
when a supervisor is absent.
d
Q37. In the description concerning transmitting confidential data by using public key
cryptography, which of the following is an appropriate combination of words to be
inserted into blanks A and B?
A data receiver X prepares its own key and key and delivers the
key to a data sender Y. The data sender Y uses the key that is
delivered from the receiver X to encrypt data, and sends the encrypted data to the receiver
X. The receiver X uses its own key to decrypt the encrypted data that is
received from the sender Y.
Concerning information security, which of the following is an event where availability
is compromised?
a) A USB memory that stores a copy of confidential information was stolen.
b) A customer information management system has been operated with incorrect
customer information.
c) An in-house server was hacked and confidential information was leaked.
d) An electronic payment system for business partners suffered a DoS attack and
became unable to perform processing.
d
When an authentication method is classified into three (3) categories of “authentication
by memory”, “authentication by possession”, and “authentication by personal physical and behavioral characteristics”, which of the following is categorized as “authentication by personal physical and behavioral characteristics”?
a) ID card authentication
b) Mnemonic authentication
c) Biometric authentication
d) Password authentication
c
Which of the following is the name given to a file that is provided to fix a software
problem?
a) Pattern file
b) Backup file
c) Batch file
d) Patch file
d