April 2019 Flashcards
Q1. Which of the following is a search condition for the black area of the Venn diagram
shown below?
Japanese restaurants in Sapporo and Japanese restaurants in Hakodate are to be searched for together. Which of the following is the logical expression that represents the search
condition?
a) (“Sapporo” AND “Hakodate”) AND “Japanese restaurant”
b) (“Sapporo” AND “Hakodate”) OR “Japanese restaurant”
c) (“Sapporo” OR “Hakodate”) AND “Japanese restaurant”
d) (“Sapporo” OR “Hakodate”) OR “Japanese restaurant”
C
Q3. When a path goes from node A1 to node C2 in Fig. 1 and the passing nodes are counted as shown in Fig. 2, there are three shortest paths with the minimum number of passing nodes. How many shortest paths are there available to go from node A1 to node D4 via node C2?
As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five squares that are black or white.
2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■
A white square indicates 0, and a black square indicates a different positive value that
is determined depending on the position of the square. When the sum total of the
values of the five squares shows a decimal number, which of the following is the
decimal number that is represented by ■■□□□?
a) 12
b) 20
c) 24
d) 30
c
Q5. The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” indicates that the data of “x” is replaced with the data of “y”.
The procedure described below is sequentially performed for two variables x and y, starting with step (1). When the procedure is completed, what is the resulting value of x?
[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
In a markup language, with the purpose of displaying on a screen and printing, it is
possible to directly embed not only the document content, but also the document
structure and layout information, and the character font and size. Which of the
following is classified into such a markup language?
a) CASL
b) HTML
c) SQL
d) URL
b
Which of the following represents a processing procedure of a program graphically in a visual way?
a) Gantt chart
b) Data flow diagram
c) Flowchart
d) Radar chart
c
There is a desk that can hold at most four (4) files. On this desk, six (6) files A through
F are used for a job. When the fifth file needs to be put on the desk, the file with the
longest time since the last use among the four (4) will be put in a drawer. If the files
are put on the desk and referenced in order of A, B, C, D, E, C, B, D, F, B, which of
the following is the last file to be put in the drawer?
a) A
b) B
c) D
d) E
d
Which of the following is an appropriate description concerning a CPU?
a) The cache memory that is integrated into a CPU is used to virtually extend the
capacity of the main memory.
b) A CPU is equipped with the arithmetic and logical function that serves as part of
control functions.
c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data volume
processed at a time, but the width in bits is not related to the performance.
d) For CPUs that have the same architecture, the higher the clock frequency, the faster
the response time.
d
Which of the following is an appropriate description concerning flash memory?
a) It becomes read-only storage once data is written.
b) No power supply is required to retain stored data.
c) It is not used for digital cameras because of the difficulty of downsizing.
d) Data is read or written using laser light.
b
Among the interface standards (i) through (iv), which of the following contains all and
only the standards that do not need a physical connection with cables and the like?
(i) Bluetooth
(ii) IEEE 1394
(iii) IrDA
(iv) USB 3.0
a) (i), (ii)
b) (i), (iii)
c) (ii), (iii)
d) (iii), (iv)
b
Which of the following is an appropriate description about a device driver?
a) Software for controlling and operating peripherals that are connected to a PC
b) Software that is started immediately after a PC is turned on, and enables basic
input/output to the hard disk and the keyboard before the OS starts
c) Software to be embedded in a Web browser for displaying pages that contain video
d) Software that integrates multiple files into one (1) file and restores the original files
from the file
a
Q14. Among the system configurations shown below, which of the following has the lowest
probability of causing the entire system to stop at the occurrence of a failure? Here,
represents an identical device. When the devices are connected in parallel, only
one device must be running, and when the devices are connected in serial, all devices
must be running.
When MTBF is 600 hours and MTTR is 12 hours, what is the approximate availability?
a) 0.02
b) 0.20
c) 0.88
d) 0.98
d
Which of the following is an explanation of characteristics of a dual system?
a) It provides two (2) sets of systems that perform the same processing and checks the
correctness of the processing by comparing the results. If one of the systems fails, it
isolates the failed system and continues the processing.
b) The same two (2) devices are used, so that the processing capability can be increased
to double that of a simplex system.
c) It provides a currently used system for performing online processing and also a
backup system that is made on standby while performing batch processing. In the
event of a failure in the currently used system, it switches to the backup system, starts the online processing on it, and continues the service.
d) It connects multiple devices in series and configures them in such a way that the load
of each function is distributed among them, so that processing capability is high. But
if any one of the devices fails, it becomes unable to provide the service.
a
What is the minimum amount (in Mbytes) of virtual memory that is required under the
conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
- Memory required for applications: An amount of 50 Mbytes is required for each
application, and a total is calculated by multiplying it by the number of applications
that run concurrently. Eight (8) applications run concurrently. - Memory required for controlling main memory or other related functions: In
addition to 512 Mbytes of main memory, a minimum amount of 20 Mbytes is required. - Required virtual memory: The required amount is the sum of the above 1 through
a) 762
b) 782
c) 1,112
d) 1,132
d
Which of the following explains the functions of an archiver, which is one (1) type of
data management utility?
a) It creates areas on hard disks for storing data and managing such stored data.
b) It packs multiple files into a single file or restores them for data backup or distribution.
c) It protects data through such functions as file protection to secure the data from
unauthorized use or destruction, and copy protection to prevent illegal data copying.
d) On a fragmented hard disk, it reorganizes files by placing them in consecutive blocks
as much as possible.
b
Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary
storage device, to application programs.
c) Since an OS has the function of automatically converting character set of a file,
application programs can access the file without regard to the character set.
d) The source code of an OS is required to be disclosed so that application programs can
be free to use the various functions of the OS.
b
Q20. A spreadsheet program is used to create a quick reference chart for the compound
interest per a principal of 1,000 dollars. Which of the following is the expression that
should be entered in cell B4? Here, the expression in cell B4 is copied to each of cells
B4 through F13.
Which of the following is the most appropriate purpose of installing a business
application software package instead of developing own application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire the knowledge of software development methods
d) To improve the skills of application developers
b
Which of the following is an appropriate description about the function keys of a PC?
a) They are the keys where specific functions are assigned for each application and OS.
b) They display a keyboard shape on a screen and enable input processing with software.
c) They have a security role and are keys for performing encryption and decryption.
d) They are information to identify specific lines uniquely in a database.
a
Which of the following is a computer that is used for tasks such as global scale
environmental simulations and DNA analysis, and was developed with the objective of
processing large amount of calculations at ultra high speed?
a) Virtual computer
b) Super computer
c) General purpose computer
d) Microcomputer
b
Which of the following is the copyright protection technology that is used for a DVDR and an SD card, and allows digital content to be duplicated to recording media only
once?
a) AR
b) CPRM
c) HDMI
d) MIDI
b
Which of the following is an appropriate description concerning the characteristics of video distribution using streaming?
a) The data to be distributed must be stored on the server beforehand, and videos of
events and sports cannot be distributed while they are being shot.
b) Deterioration in video quality due to partial loss of data in reception can be completely
eliminated.
c) Warm-up time is not required for starting playback of a video, and therefore, the
viewer can immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as
soon as some data has been received.
d
Among the processes where multiple users simultaneously access the same database,
which of the following is a process that does not need a countermeasure for securing
transaction consistency?
a) A bidding process for an auction
b) An ordering process for online sales
c) A search process for library information
d) A reservation process for train tickets
c
Q27. Which of the following is a term for an operation that extracts only the rows (records)
with a price of 100 yen or more, from the “Product” table of a relational database?
Q28. A customer name and his or her address, a product name and its unit price, the number
of products ordered by the customer, and the date of order are to be managed by using
a relational database. Which of the following is an appropriate table after
normalization? Here, the underline represents primary keys, and there are same
customer names and product names.
When character strings are searched by using wildcard characters with expression
“A.te??”, which of the following lists all and only the character strings that match
the search condition among the character strings I through IV? Here, the wildcard
character “?” represents any one (1) character and “*” represents a character string that consists of zero (0) or more of any characters.
I A.text
II AA.tex
III B.Atex
IV BA.Btext
a) I
b) I, II
c) II, III, IV
d) III, IV
a
Which of the following is an appropriate description concerning communications
protocols?
a) There are no communications protocols that are used in analog communication.
b) They are developed only by international organizations, and those developed
independently by manufacturers are not called communications protocols.
c) In communications protocols, only the procedure of actions in normal cases are defined.
d) Devices that are provided by different manufacturers or have different OS can
communicate with each other if they use the same communications protocol.
d
When another network such as the Internet is accessed from a network in an office or a
household, which of the following fulfills the role of an entrance or an exit to the other
network?
a) Splitter
b) Default gateway
c) Hub
d) Repeater
b
Which of the following is used to identify a wireless network?
a) Bluetooth
b) SSID
c) LTE
d) WPA2
b
Which of the following network is a WAN?
a) It is a network that uses a company’s own communication lines, and connects
buildings within the same premises.
b) It is a network that connects the floors in a company’s building.
c) It is a network that uses a communications service provider’s communication lines,
and connects a head office with branch offices.
d) It is a network that connects the PCs on one floor.
c
Mr. A sent an e-mail message to the recipients below. Which of the following is an
appropriate explanation of the information that the recipients of the message can
determine?
[Destinations]
To: Mr. B, Mr. C
Cc: Mr. D
Bcc: Mr. E, Mr. F
a) Mr. B can see that the same message was also sent to Mr. E.
b) Mr. C can see that the same message was also sent to Mr. B and Mr. D.
c) Mr. D can see that the same message was also sent to Mr. E.
d) Mr. E can see that the same message was also sent to Mr. C and Mr. F.
b
Which of the following is a term for software that encrypts files on a PC in order to
make them unusable, and demands money or other valuables in exchange for the
decryption key?
a) Keylogger
b) Ransomware
c) Rootkit
d) Worm
b
When treatments against information security risks are categorized into risk transfer,
risk avoidance, risk acceptance, and risk reduction, which of the following is the description that corresponds to risk acceptance?
a) Taking security measures, and reducing the likelihood that problems will occur
b) Without taking any special action, estimating the impact when damage occurs
c) Shifting risk to a third party through insurance
d) Removing the causes of a problem, and eliminating the likelihood that the risk will
materialize
b
Which of the following is an appropriate description about password management?
a) A password that is used for a business system should not be used for any private
Internet services.
b) The initial password should not be changed until a user becomes familiar with the
operation of login to the system.
c) Several passwords should be prepared and used in rotation.
d) A password should be stored in a plaintext file and saved on a PC.
a
Q38. When a user accessed the URL in the body of an e-mail message with a PC, the message
shown in the figure appeared on the screen and the PC was locked. What is used in this
attack?
Which of the following is not an example of a cyber attack?
a) With a purpose of obtaining confidential information, looking for recorded media that
were disposed of from an office
b) By exploiting a vulnerability of a server, breaking into its Web site, and making
unauthorized modification to its data
c) By sending a large amount of requests at once, disrupting a service
d) By using a back door, remotely controlling another person’s PC
a
In a corporate network, which of the following is a server that should be installed in a
corporate LAN rather than in the demilitarized zone (DMZ)?
a) An e-mail server that receives e-mails from outside the company
b) A DNS server where IP addresses of servers that are open to the public are registered
c) A file server that stores confidential information of the company
d) A Web server that publishes information to the outside of the company
c