April 2021 Flashcards
Q1. A search is performed by specifying a character string comprised of multiple alphabetic characters and one delimiter character “.” (period). An “*” (asterisk) represents an
arbitrary character string with zero or more characters, and a “?” (question mark)
represents an arbitrary single character.
Which of the following character strings matches the character string represented below?
X*.Y??
a) XY.XYY
b) XXX.YY
c) XYX.YXY
d) YXYX.YXY
c
Q2. Which of the following is a search condition for the black area of the Venn diagram
shown below?
Which of the following is obtained by multiplying the binary value 10110 by three (3)?
a) 111010
b) 111110
c) 1000010
d) 10110000
c
When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded
data. When the same sound source is sampled at the same sampling frequency and then
encoded as a series of 16-bit data in lieu of 8-bit data, which of the following is an
appropriate description concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher.
a
There is a program that displays text in accordance with the specifications below. When
the original text described below is displayed, in what point size does the program
display the underlined character string? Here, the first character of the original text is
displayed in 10 points.
[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.
[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>
<S>group-level</S>
computerization</B> from a user’s <S>standpoint</S>.</B>
a) 10
b) 11
c) 12
d) 13
b
Q6. Among the program control structures, which of the following is classified as a “whiletype” loop structure?
Q7. A stack is a first-in last-out data structure. By using the stack, a device changes the order
of data received from the right side and sends it to the left side, as shown in the figure
below. There are three types of operations available on the device, as described below.
Among the items A through C described below about programming languages, which of the following is the list that contains all of the appropriate items?
A: A program that is created using a machine language or an assembly language can
be executed without relying on a particular CPU.
B: A program that is converted using a compiler is finally translated into a machine
language and then executed.
C: A high-level programming language with rules similar to human languages makes
it possible to develop programs with complex calculations that cannot be executed
using a machine language.
a) A
b) A, C
c) B
d) B, C
c
There is a desk that can hold at most four (4) files. On this desk, six (6) files A through
F are used for a job. When the fifth file needs to be put on the desk, the file with the
longest time since the last use among the four (4) will be put in a drawer. If the files
are put on the desk and referenced in order of A, B, C, D, E, C, B, D, F, B, which of
the following is the last file to be put in the drawer?
a) A
b) B
c) D
d) E
d
Which of the following is the most appropriate description concerning a multi-core
processor?
a) Several microprocessors are installed in one PC with the purpose of improving the
reliability of the processing results by performing the same processing at the same
time in each processor.
b) If the structure and clock frequency of the arithmetic logical unit are the same, a quad core processor has four times as much processing power as a dual core processor.
c) The clock frequency is temporarily increased according to the load of the processing so as to achieve high-speed processing.
d) A single CPU has several processing circuits that perform operations, and each
processing circuit performs different processing at the same time with the purpose of
improving the processing power.
d
Which of the following is an appropriate explanation of a hot plug?
a) It is a function that enables attachment or detachment of a peripheral device while PC
power remains on.
b) It is software that is installed afterwards in order to enhance the functions of application software.
c) It is a mechanism of supplying power from a PC to a peripheral device via a cable
connected to the peripheral device.
d) It is a technique of executing a specific program and evaluating system performance
on the basis of the time taken for the processing.
a
Which of the following is an appropriate explanation of GPU?
a) It is an index that shows the throughput of a CPU in terms of how many billions of
instructions it can execute per second.
b) It is a frequency signal that synchronizes the arithmetic processing of CPUs.
c) It is a storage unit that is placed between a CPU and a main memory, and has a
higher reading and writing speed than the main storage unit.
d) It is an arithmetic logical unit that is used instead of a CPU to accelerate processing
such as image processing for 3D graphics.
d
Which of the following is an appropriate description concerning CPU performance?
a) Compared with a 64-bit CPU, a 32-bit CPU is able to process a longer data at one
time.
b) The less the capacity of cache memory in the CPU, the faster the processing speed.
c) For a CPU of a given architecture, raising the clock frequency increases processing
speed.
d) A dual core CPU can perform a greater number of processes simultaneously than a
quad core CPU can.
c
When the processing speed of the system overall is constrained because of slow
processing speed in one of the components, which of the following is a term for the
component of a system that is causing the problem?
a) Throughput
b) Defragmentation
c) Flowchart
d) Bottleneck
d
Which of the following is an appropriate characteristic of a dual system?
a) It provides two (2) sets of systems that perform the same processing and checks the
correctness of the processing by comparing the results. If one of the systems fails, it
isolates the failed system and continues the processing.
b) The same two (2) devices are used, so that the processing capability can be increased
to double that of a simplex system.
c) It provides a currently used system for performing online processing and also a
backup system that is made on standby while performing batch processing. In the event of a failure in the currently used system, it switches to the backup system, starts
the online processing on it, and continues the service.
d) It connects multiple devices in series and configures them in such a way that the load
of each function is distributed among them, so that processing capability is high. But if any one of the devices fails, it becomes unable to provide the service.
a
Which of the following is an appropriate explanation of parallel processing?
a) It is the division of a series of processing into processing units that can be executed
simultaneously, and the execution of these on multiple CPUs.
b) It is the execution of multiple related processes that are grouped together as a single
process.
c) It is the performing of business logic and database processes on the server side, and the performing of user interface processes on the client side.
d) It is the division of processing time for a single CPU into short units, and the sequential allocation of these to multiple applications for execution.
a
Which of the following is a purpose of the virtual memory system that is one of the
functions provided by an OS?
a) To prevent an application program from accessing the protected area on main memory used by the OS
b) To reduce electricity consumption during the idle state, by stopping the power supply after data is written from main memory to external storage
c) To make it possible to execute a program even if the program requires more storage
capacity than main memory
d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory
c
Which of the following is an appropriate explanation of the virtualization of a server?
a) It is a technique for virtually creating computer-generated worlds or immersive
environments that users can interact with.
b) It is a technique for virtually operating the GUI of a remote computer connected via a
network by using a local computer.
c) It is a technique for virtually implementing and operating two or more computers on
a single computer.
d) It is a technique for virtually allocating more memory space than the capacity of main
memory by using a particular part of auxiliary storage.
c
Q19. Which of the following is an appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?
Which of the following is an appropriate description concerning the use of OSS (Open Source Software)?
a) OSS users have an obligation to pay the developer the fee for the software.
b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.
c) OSS cannot be used in the field of genetic research.
d) Software derived from the published OSS can be made available as OSS.
d
Which of the following is an appropriate explanation concerning a deadlock?
a) It is a state in which the processes of a computer are prohibited from getting intentional or accidental access to information that usually must not be accessed.
b) It is a state in which, if the authentication of a user fails more than the limited number
of times, the user is prohibited from accessing the computer.
c) It is a state in which, when shared resources are exclusively used, two or more
processes are endlessly waiting for each other to release the lock of a shared resource.
d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.
c
There is a system where a full backup is made after closing time every Sunday, and an
incremental backup is made after closing time on Monday through Saturday. On a
Wednesday, a failure happened during business hours, so a decision was made to restore
data to the state at the time of closing on Tuesday by using backup files. Which of the
following lists all the necessary backup files for restoring data? Here, an incremental
backup file means a backup file that contains only the data that has been modified since
the previous backup file (a full backup file or an incremental backup file) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
a
If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of the following can occur?
a) Viruses cannot be detected.
b) Data cannot be written correctly.
c) Data cannot be read correctly.
d) Stored data cannot be read quickly.
d
Which of the following is an appropriate concept of universal design?
a) Ensuring that, once a product is designed, the design remains usable without being
changed for a long period of time
b) Ensuring that products keep the same levels of performance and quality regardless of
where they are manufactured in the world
c) Making the design as simple and easy as possible in order to reduce the manufacturing
cost
d) Making products usable to many people regardless of differences in age, culture, and
ability as well as whether disability is present
d
Which of the following is an appropriate description concerning the characteristics of video distribution using streaming?
a) The data to be distributed must be stored on the server beforehand, and videos of
events and sports cannot be distributed while they are being shot.
b) Deterioration in video quality due to partial loss of data in reception can be completely
eliminated.
c) Warm-up time is not required for starting playback of a video, and therefore, the
viewer can immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as
soon as some data has been received.
d
In DBMS, which of the following is a function for maintaining consistency of data by
preventing the occurrence of conflicts due to simultaneous access to the data?
a) Normalization
b) Deadlock
c) Exclusive control
d) Restore
c
Which of the following is an appropriate description concerning foreign keys in a
relational database?
a) A property held by the foreign key is called a unique constraint.
b) Duplicate values cannot be set in the fields that are set as foreign keys.
c) Multiple foreign keys can be defined in a single table.
d) Multiple fields cannot be collectively set as a single foreign key.
c
Q28. The result of the Information-Technology Engineers Examination by some of the
employees of a company is shown below. In order to manage this table with a relational
database, which of the following is an appropriate method to partition the table into two
(2) tables? Here, this company has employees with the same name.
Q29. In a relational database, when (A B) and (A B) are performed on table A and
table B shown below, which of the following is an appropriate combination of the
resulting two tables among the three tables P, Q, and R? Here, (A B) shows the
union of A and B, and (A B) shows the intersection of A and B.
Q30. Three PCs and an Internet-capable TV (television) set are to be connected to the Internet
by using a hub and a router that has a firewall function. Which of the following is an
appropriate connection that enables the firewall function of the router to be used for all
the traffic between the devices and the Internet? Here, “FW” in the figure indicates the
firewall function.
Which of the following is an appropriate effect of replacing IPv4 with IPv6?
a) Problems no longer occur when two or more devices that can be accessed directly
from the Internet have the same IP address.
b) The shortage of IP addresses that can be used on the Internet is resolved.
c) It becomes possible to use optical fibers for connecting to the Internet.
d) The communication speed on the Internet is increased.
b
Which of the following is a mechanism by which, if an e-mail is sent to a specific e-mail
address, the e-mail with the same content is distributed to multiple e-mail addresses that
have been registered to the specific address?
a) Web mail
b) Chain mail
c) Mailing list
d) Reply mail
c
Mr. A specifies the destinations for an e-mail as below and sends it. Mr. Y receives this
e-mail, and sends a reply to all the recipients and the sender listed in the received e-mail.
Among Mr. A, Mr. X, and Mr. Z, which of the following is the list that includes all and
only the destinations of the e-mail that Mr. Y sends?
[Destinations specified for Mr. A’s e-mail]
To: X
CC: Y
BCC: Z
a) A
b) A, X
c) A, X, Z
d) X, Z
b
Which of the following is the most appropriate explanation of a WAN?
a) It is a virtual private network that uses the Internet.
b) It is a network that connects countries, rather than a network that connects various
regions within a country.
c) It is a network that uses a network service from a network operator for connecting
geographically separated locations, for example, a head office and branch offices.
d) It is a brand name that is granted only to devices where interconnectivity has been
confirmed, by the industrial association that promotes products that support the IEEE
802.11 standard for wireless LANs.
c
Which of the following is an appropriate example of biometric authentication?
a) Authentication by drawing a line connecting some of the nine (9) dots displayed on a
screen
b) Authentication by a password and a user ID that is unique for each individual
c) Authentication by recognizing the shape of a signature, the stroke order and pen
pressure used in signing, etc. using a reader device
d) Authentication by selecting, from among multiple illustrations, a combination of
illustrations that the user memorizes
c
Q36. The authentication technology is classified into three (3) types, namely authentication
based on one’s possession, authentication based on physical characteristics, and
authentication based on one’s memory. Which of the following is an appropriate
combination of the implementation examples (1) through (3) and their classifications?
Which of the following is appropriate as the characteristic of single sign-on?
a) It is an effective countermeasure for information leakage because data is processed and stored on a server side, and data does not remain on devices.
b) It implements high availability because when the data is saved, it is automatically
distributed and stored on multiple disks.
c) It implements high confidentiality because it employs authentication that uses fingerprint and iris in addition to a password.
d) It implements high convenience because once a user is authenticated, he or she is allowed to use multiple services without any more authentication.
d
Among descriptions A through D concerning how to conduct information security
education to employees, which of the following contains all and only the appropriate
descriptions?
A The re-education of one who has committed an information security breach includes
preventive actions to avoid the same fault being repeated again.
B One way to conduct it is to incorporate it in a training program for new employees.
C It is restricted to employees in the information systems department.
D It is conducted after an incident or an accident concerning information security as well as on a regular basis.
a) A, B, D
b) A, C, D
c) A, D
d) B, C
a
When information security measures are grouped into three (3) categories of technical
security measures, human security measures, and physical security measures, which of
the following is an appropriate example of physical security measures?
a) Making a non-disclosure agreement with employees
b) Attaching a digital signature to an e-mail when it is sent
c) Storing a notebook PC in a place that can be locked
d) Recommending password change on a regular basis
c
Which of the following is an authentication method where a user uses information that
differs each time and is generated with a device called a token or other such device?
a) Digital signature
b) Password cracking
c) Password policy
d) One time password
d