April 2020 Flashcards
Which of the following is the binary number that is obtained by adding the binary
numbers 01011010 and 01101011? Here, the binary numbers are expressed as positive 8-bit values.
a) 00110001
b) 01111011
c) 10000100
d) 11000101
d
Which of the following is the binary result of the multiplication of binary 1011 and binary 101?
a) 1111
b) 10000
c) 101111
d) 110111
d
Q3. Which of the following is the logical operation that is equivalent to the truth table below?
Input A | Input B | Output
0 0 0
0 1 0
1 0 0
1 1 1
a) AND
b) NOT
c) OR
d) XOR
a
Which of the following is the result from the bit-wise logical product of an 8-bit binary
data X and 00001111? Here, the left side of the data is the high-order, and the right side
is the low-order.
a) All of the low-order four (4) bits are 0, and the high-order four (4) bits are the same as
those of X.
b) All of the low-order four (4) bits are 1, and the high-order four (4) bits are the same as
those of X.
c) All of the high-order four (4) bits are 0, and the low-order four (4) bits are the same as
those of X.
d) All of the high-order four (4) bits are 1, and the low-order four (4) bits are the same as
those of X.
c
Q5. As shown in Figure 1, there is a box that generates two (2) numerical values B1 and
B2 when two (2) positive integers A1 and A2 are entered. B1 has the same value as A2,
and B2 is the remainder of A1 divided by A2. As shown in Figure 2, when two (2) boxes
are connected, and 49 is entered as A1 and 11 is entered as A2 in the left box, what is
the value of B2 generated from the right box?
Which of the following is an appropriate description concerning machine language?
a) A program that is written in Fortran or C is converted into machine language and then
executed.
b) Machine language is a high-level language.
c) Machine language expresses a program with sequences of decimal numbers.
d) Most of application software is still programmed in machine language.
a
Algorithms are important when a computer is used. Which of the following is an appropriate explanation of an algorithm?
a) It refers to software for converting a program to a machine language that can be
directly run by a computer.
b) It refers to a processing procedure for enabling a computer to accomplish a particular purpose.
c) It refers to a collective term for artificial languages used to give instructions for a
series of operations to a computer.
d) It refers to the designing of buildings and industrial products by using computers.
b
Q8. There is a series of numbered boxes stacked as shown in the figure below. The
operations described in the table below are performed in the sequence of operations 1
through 4. When the operation 4 is completed, which of the following shows the status
of the stacked boxes?
Which of the following is an appropriate description concerning the usage of HTML
(Hyper Text Markup Language) tags?
a) <label> is used to define the title of a Web page.</label>
b) <BODY> is used to describe the text of a Web page.
c) <big> is used to specify the size and style applied to each character in a Web page.</big>
d) <FORM> is used to divide a Web page into multiple frames.
b
Which of the following storage units has the shortest access time?
a) HDD
b) SSD
c) Cache memory
d) Main memory
c
Which of the following lists all and only the appropriate descriptions about a 32-bit
CPU and a 64-bit CPU?
I When a 32-bit CPU and a 64-bit CPU are compared, a 64-bit CPU has a larger theoretical maximum memory space..
II There is no 32-bit OS that runs on a PC with a 64-bit CPU.
III In terms of the read and write speed of a USB memory, the speed of a PC with a 64-bit
CPU is twice as fast as that of a PC with a 32-bit CPU.
a) I
b) I, II
c) II, III
d) III
a
Which of the following is an appropriate description of a dual-core processor?
a) Two (2) types of OS are installed on a single PC, and the PC is configured so that
either OS can be booted.
b) Two (2) displays are connected to a single PC in order to have a single continuous wide display area across the two (2) displays.
c) Two (2) strips of memory with the same standard and capacity are combined, and the
effective speed of data transfer is increased by accessing each strip concurrently.
d) The integrated circuits of two (2) processors are implemented on a single LSI package, and the two (2) processors can execute separate instructions concurrently.
d
Which of the following is required for an application program to use the peripheral
equipment that is connected to a PC?
a) Compiler
b) Device driver
c) Plug and play
d) Hot plug
b
Among the methods I through III for logically handling multiple hard disks as one (1),
which of the following lists all and only those methods that can recover data even if one
of the constituent hard disks fails?
I RAID5
II Striping
III Mirroring
a) I, II
b) I, II, III
c) I, III
d) II, III
c
There is a system where two units of the same device with availability of 0.9 are
connected in series. When one (1) more unit of the same device is added so that three (3)
units of the device are connected in series in the system, which of the following is the appropriate description of the availability of the entire system, when the system with two units of the device in series is a reference point?
a) It increases by 10%.
b) It remains unchanged.
c) It decreases by 10%.
d) It decreases by 30%.
c
Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership) that is a major factor when any purchasing decision is made for a system?
a) It is the sum of the operation and management costs incurred after the installation of
the system.
b) It is the sum of the costs required to troubleshoot software and hardware faults that occur after the installation of the system.
c) It is the sum of the costs incurred during the installation of the system and the
operation and management costs incurred after the installation.
d) It is the sum of the costs incurred during the installation of the system and the planning
phase of the system.
c
Q17. When directories d1 and d2 are placed on a web server as shown in the figure, which
of the following descriptions specifies the referencing of the webpage file f2.html on
directory d2 from the webpage file f1.html on directory d1 (current directory)? Here, the
reference method of files is as follows.
Q18. Sales data by month for each branch is evaluated. In the “Evaluation” field for each
branch by month, if the amount of sales at the branch is below the average sales amount
of branches A through C for the month, the symbol “X” is to be displayed, and if the
amount is above or equal to the average, the symbol “O” is to be displayed. Which of
the following is an appropriate expression to be entered in cell C3? Here, the expression
that is entered in cell C3 is copied and used in cell D3, cell E3, cells C5 through E5, and
cells C7 through E7.
Which of the following is an OS function that executes multiple application programs
little by little in turn concurrently on a single PC, such as when a file is downloaded from a web site while data is processed with spreadsheet software?
a) Virtual reality
b) Dual core
c) Dual system
d) Multitasking
d
When a record in a file is modified, which of the following is an appropriate way of
identifying the modified contents?
a) Logging the size and the modified date of a file
b) Keeping a copy of a file and comparing it to the modified one later
c) Logging the number of records into the file
d) Keeping records sorted in ascending order of the key field
b
Which of the following is a term that means the validation of a software license by using the product ID and the user’s hardware information, in order to prevent unauthorized use of the software?
a) Activation
b) Cloud computing
c) Streaming
d) Fragmentation
a
Which of the following Open Source Software (OSS) is a DBMS?
a) Android
b) Firefox
c) MySQL
d) Thunderbird
c
Which of the following is the description of a 3D printer?
a) It prints an image with a 3D effect on a flat surface.
b) It uses three-dimensional data to form a stereoscopic (three-dimensional) object.
c) It prints an image on a curved surface of a stereoscopic (three-dimensional) object.
d) It uses a laser to display a stereoscopic image in space.
b
Which of the following is the appropriate reason for using a style sheet in the creation
of a website?
a) The data between the web server and the web browser can be exchanged in a safe
manner.
b) The users can be notified of update to the website.
c) The users of the website can be identified.
d) The appearance of multiple web pages can be easily unified.
d
Which of the following is a technique that can be used to compress both video and
audio data?
a) BMP
b) GIF
c) JPEG
d) MPEG
d
Q26. There is the “Employee” table and the “Department” table in a relational database. The “Employee” table and the “Department” table are linked, and employees who live in
different prefectures from the prefectures that their departments are located in are
extracted. How many employees are extracted?
Which of the following is the appropriate purpose of conducting data normalization
when a relational database is constructed?
a) Providing redundancy to data in order to detect data errors
b) Eliminating data inconsistencies and duplication in order to make it easy to maintain and manage the data
c) Unifying the character code of data in order to improve data reliability and storage
efficiency
d) Losslessly compressing data in order to improve access efficiency
b
Which of the following is a language used for the operation of a relational database?
a) FAQ
b) SQL
c) SSL
d) UML
b
In a system environment where several users have access to a database simultaneously, a new user tries to view a data record while another user is updating the same record. In order to assure data integrity in such circumstances, which of the following is an appropriate control method that should be used in the DBMS?
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating process
d) Canceling the updating process to permit the new user to view the last record
c
Which of the following is the appropriate description concerning the function of a
DNS?
a) It connects an IP address and a MAC address.
b) It connects an IP address and a domain name.
c) It uses the IP address and selects a packet transfer route.
d) It converts analog signals and digital signals to each other.
b
Q31. When setting up PC1 for connecting it to the Internet, an IP address is set in “default
gateway” that is one of the network settings of PC1. Which of the following devices has
this IP address?
Q32. Which of the following is the appropriate combination of terms or phrases to be
inserted into blanks A through C in the description below concerning networks?
A network of a relatively small area that is installed in the building, etc. is called
A , and a network connecting A that are installed at geographically
distant points is called B . Generally, for the IP addresses set in the devices that
are connected to A , C can be used freely if A is a closed
network within the organization, etc.
Which of the following mobile communication systems not only offers higher communication speed than LTE, but also allows more devices to connect and has less
communication delay?
a) Block chain
b) MVNO
c) 8K
d) 5G
d
A DHCP server has been installed in a LAN. When a PC that automatically acquires
information from the DHCP server is to be connected to the LAN, which of the following
will be set in the PC?
a) IP address
b) Latest virus definition file
c) Address list of spam mail
d) Mail addresses assigned by the Internet service provider
a
Q35. Which of the following is the most appropriate combination of the measures against
password theft and brute force attack respectively on websites having a login function?
Which of the following is the appropriate example of activities conducted in A (Act)
in the organizations that operate ISMS on the basis of the PDCA model?
a) Changing the server monitoring method as a corrective action that is based on the results of the audit of the business operations.
b) Objectively evaluating the server administrator’s work details by a third party.
c) Identifying the information assets in the server room.
d) Monitoring the operation of the server according to the defined operational procedure.
a
Q37. When the evaluation values of asset value, threat, and vulnerability of assets A through
D are as shown in the table, which of the following assets will be evaluated as the asset
where risk measures should be taken at the highest priority? Here, the risk value is
calculated by multiplying each three evaluation values together in the table without
weighting.
It is reported that WEP suffers from the problem that ciphers are decoded in a short time. Which of the following is a wireless LAN encryption method for increasing the
strength of encryption?
a) ESSID
b) HTTPS
c) S/MIME
d) WPA2
d
Mr. A sent an e-mail to Mr. B that was encrypted with Mr. B’s key by using the public key cryptosystem, and this e-mail contains details that Mr. A wants to send only to Mr.
B. Which of the following keys is needed to decrypt this e-mail?
a) Public key of Mr. A
b) Private key of Mr. A
c) Public key of Mr. B
d) Private key of Mr. B
d
Among the descriptions from A through C, which of the following is the list that
contains all appropriate features of VPN?
A Devices can communicate with each other by using a VPN wirelessly without
passing through any access point.
B A VPN uses a public network, etc., but it can be used like a private network of one’s
own company.
C The security status of computers can be checked by connecting them to a VPN.
a) A
b) A, C
c) B
d) C
c