April 2022 Flashcards
Japanese restaurants in Sapporo and Japanese restaurants in Hakodate are to be searched
for together. Which of the following is the logical expression that represents the search condition?
a) (“Sapporo” AND “Hakodate”) AND “Japanese restaurant”
b) (“Sapporo” AND “Hakodate”) OR “Japanese restaurant”
c) (“Sapporo” OR “Hakodate”) AND “Japanese restaurant”
d) (“Sapporo” OR “Hakodate”) OR “Japanese restaurant”
c
Which of the following is always true for two (2) sets A and B? Here, (X Y) represents the set that contains only the elements that are in both X and Y (intersection set), and (X Y) represents the set that contains all of the elements that are in at least one of X or Y (union set).
a) (A B) is a subset of the complement of (A B).
b) (A B) is a subset of A.
c) (A B) is a subset of (A B).
d) (A B) is a subset of the complement of A.
c
Which of the following is the binary result of the multiplication of binary 1011 and binary 101?
a) 1111
b) 10000
c) 101111
d) 110111
d
When a chairperson and a secretary are selected from three (3) candidates with a method that allows dual roles, there are three (3) ways for the selection of a single chairperson and three (3) ways for the selection of a secretary, so in total, there are nine (9)
combinations for the selection of a chairperson and a secretary. When a chairperson and a secretary are selected from five (5) candidates with a method that allows dual roles,
how many combinations for the selection are there?
a) 5
b) 10
c) 20
d) 25
d
In a queue, three (3) elements 33, 27, and 12 are enqueued in this order. After the element
45 is enqueued to this queue, two (2) elements are retrieved (or dequeued). Which of the
following is the second element to be retrieved?
a) 12
b) 27
c) 33
d) 45
b
Which of the following is an appropriate description concerning HTML?
a) It is a markup language that can specify the logical structure and layout of a web page by using tags.
b) It is a script language that can describe the program or processing steps executed on
a web browser.
c) It is a communication protocol that is used between a web browser and a web server.
d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.
a
Which of the following represents a processing procedure of a program graphically?
a) Gantt chart
b) Data flow diagram
c) Flowchart
d) Radar chart
c
Which of the following is an appropriate description concerning machine language?
a) A program that is written in Fortran or C is converted into machine language and
then executed.
b) Machine language is a high-level language.
c) Machine language expresses a program with sequences of decimal numbers.
d) Most of application software is still programmed in machine language.
a
Q9. As shown in Figure 1, there is a box that generates two (2) numerical values B1 and B2
when two (2) positive integers A1 and A2 are entered. B1 has the same value as A2, and
B2 is the remainder of A1 divided by A2. As shown in Figure 2, when two (2) boxes are
connected, and 49 is entered as A1 and 11 is entered as A2 in the left box, what is the
value of B2 generated from the right box?
Which of the following is an appropriate description of a dual-core processor?
a) Two (2) types of OS are installed on a single PC, and the PC is configured so that
either OS can be booted.
b) Two (2) displays are connected to a single PC in order to have a single continuous wide display area across the two (2) displays.
c) Two (2) strips of memory with the same standard and capacity are combined, and
the effective speed of data transfer is increased by accessing each strip concurrently.
d) The integrated circuits of two (2) processors are implemented on a single LSI
package, and the two (2) processors can execute separate instructions concurrently.
d
Which of the following is an appropriate description concerning the primary and
secondary cache memory that a CPU is equipped with?
a) The primary cache memory has larger capacity than the secondary cache memory.
b) The secondary cache memory is slower than the main memory in writing and
reading.
c) When the CPU reads data, it first accesses the primary cache memory, and then it
accesses the secondary cache memory if the data is not available.
d) All of the data that is required for a process needs to be present on the primary or
secondary cache memory when a program starts.
c
Which of the following is an appropriate description concerning a device driver that
enables the use of peripheral devices with a PC?
a) When a hard disk drive is initialized and the operating system is reinstalled, it is
necessary to reinstall device drivers that were installed separately to the operating
system.
b) When new application software is installed, it is necessary to reinstall all device
drivers that this software uses.
c) Even if a device driver is no longer required, a user cannot delete the device driver
once it is installed.
d) It is only necessary to install one (1) device driver for a printer to use all printers
regardless of manufacturer or model.
a
Which of the following is a chip that is used in image processing in devices such as PCs
and smartphones, and is also used for large amount of calculation processing in AI?
a) AR
b) DVI
c) GPU
d) MPEG
c
Q14. The system configurations A through C are made up by connecting multiple identical
devices. Which of the following is a list where A through C are sorted in descending
order of availability? Here, represents a device. The parallel connection requires
only one (1) of the devices to be functional, while the series connection requires all
devices to be functional.
Which of the following includes all the appropriate measures to enable the normal execution of processing even in the event of a failure in part of a system?
(1) Configuring HDDs with mirroring
(2) Minimizing the frequency of maintenance and inspections after stable operation of
the system starts
(3) Grouping multiple redundant network lines into a single high-speed line
(4) Making power supply redundant with the use of UPS (Uninterrupted Power Supply)
etc.
a) (1), (3)
b) (1), (4)
c) (2), (3)
d) (2), (4)
b
Among the methods I through III for handling multiple hard disks as one (1) logical disk,
which of the following lists all and only the methods that can recover data even if one of
the constituent hard disks fails?
I RAID5
II Striping
III Mirroring
a) I, II
b) I, II, III
c) I, III
d) II, III
c
Q17. Spreadsheet software is used to predict sales according to the weather. The probability
for the weather type (sunny, cloudy, rainy) on the day to be predicted and the predicted
sales amount by weather type for each product is entered into the worksheet below. An
expression is entered in cell E4 to calculate the predicted sales amount on the day for
Product A, and this is copied to cells E5 through E6 and used. Under these conditions,
which of the following is an appropriate expression to be entered in cell E4? Here, to
obtain the predicted sales amount on the day for each product, the probability for each
weather type is multiplied by the predicted sales amount for each of weather type, and
then these values are added up.
Which of the following is an OS function that executes multiple application programs
concurrently on a single PC, such as when a file is downloaded from a web site while data is processed with spreadsheet software?
a) Virtual reality
b) Dual core
c) Dual system
d) Multitasking
d
Which of the following is an advantage of using OSS (Open Source Software)?
a) Technical support is provided free of charge from the developer at the time of
installation.
b) The software is not prone to infection of viruses, as the source code is not released.
c) Compensation can be received for damages caused by defects in the software.
d) The source code can be modified to fit the environment of the user in accordance
with the license conditions.
d
Multiple files stored on a hard disk are used in work, from Monday to Friday. In order
to handle failure of the hard disk, the data is backed up to another hard disk after the end
of each day’s work. When the backup has following conditions, what is the total time required (in minutes) to perform backups of data from Monday to Friday?
[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size
of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One (1) file
is backed up at a time; backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday,
all files are backed up, whether or not they have been modified.
a) 25
b) 35
c) 50
d) 150
c
Q21. The tax-inclusive prices of products A and B are calculated by using two (2) tax rates
that are set in cells D2 and E2 below. The correct expression that should be entered in
cell D4 is $B4(1.0+D$2), but a wrong expression $B4(1.0+$D$2) was entered. When
the expression that was entered in cell D4 is copied to cells D5, E4, and E5, which of the
following is the numeric value that is displayed in cell E5?
Q22. When directories d1 and d2 are placed on a web server as shown in the figure, which of
the following descriptions specifies the reference of the web page file f2.html on
directory d2 from the web page file f1.html on directory d1 (current directory)? Here,
the reference method of files is as follows.
Which of the following is an appropriate description of a blade server?
a) It uses multiple board-type computers equipped with CPU and memory, housed in
a dedicated body.
b) It enables the use of office software, e-mail software, etc. as web services over the
Internet.
c) It is embedded in equipment such as home appliances or automobiles.
d) It supports handwriting input function by using a liquid crystal display with a touch
panel.
a
With regard to the colors printed by a printer, theoretically, what color is formed when cyan, magenta, and yellow are mixed together by subtractive color mixing?
a) Blue
b) Red
c) Black
d) Green
c
Which of the following is an appropriate description of raster graphics, which is a
method of handling the graphics that is used as a collection of points called pixels in painting software?
a) It is widely used in CAD.
b) The color and brightness can be adjusted for each pixel.
c) The file size is constant regardless of the level of resolution.
d) No jaggies are visible at the edges of shapes even upon enlargement.
b
Which of the following is an appropriate description of a rollback in transaction
processing?
a) When a transaction attempts to update shared data, it prohibits another transaction
from updating that data.
b) When a transaction has been successfully processed, it commits an update to the
database.
c) When a transaction failed for some reason, it reverts the database to the state before
the transaction was started.
d) It combines multiple tables into one (1) table by using mutually related columns as
keys.
c
Q27. There is the “Employee” table and the “Department” table in a relational database. The “Employee” table and the “Department” table are joined, and employees who live in
prefectures different from the prefectures that their departments are located in are
extracted. How many employees are extracted?
Which of the following is an appropriate purpose of conducting data normalization when a relational database is constructed?
a) Providing redundancy to data in order to detect data errors
b) Eliminating data inconsistencies and duplications in order to make it easy to maintain and manage the data
c) Unifying the character code of data in order to improve data reliability and storage
efficiency
d) Losslessly compressing data in order to improve access efficiency
b
In a relational database, which of the following is the reason for a primary key being
specified?
a) To clearly indicate that something is not subject to an arithmetic operation
b) To enable the search of the column that is specified as the primary key
c) To prevent another table from referencing the table
d) To enable any record in the table to be uniquely identified
d
Which of the following is a protocol that is used for synchronization of the internal clock of a computer via a network with a server that holds a reference clock?
a) FTP
b) NTP
c) POP
d) SMTP
b
Which of the following is an appropriate description of online storage?
a) A virtual private network that is established via the Internet
b) A service that lends disk space for saving data via the Internet
c) Software that is distributed or sold via the Internet
d) A computer game that multiple users can simultaneously play via the Internet
b
Which of the following mobile communication systems not only offers higher communication speed than LTE, but also allows more devices to connect and has less
lag time?
a) Block chain
b) MVNO
c) 8K
d) 5G
d
Q33. Which of the following is the appropriate combination of terms or phrases to be inserted
into blanks A and B in the description below concerning NAT?
Which of the following is an appropriate characteristic of LPWA?
a) It is a technology concerning AI, and it enables a computer to acquire new
knowledge, rules, and other such things from entered data without any explicit
programming of rules nor other such things.
b) It is a wireless network that covers a broad area while consuming only small
electrical power, and although its communication speed is lower than a cellphone
system, its low electricity consumption enables it to run on common batteries for
several years and its broad area coverage enables communication of up to several
kilometers.
c) It is a distributed ledger technology that creates a sequence of data item containing transaction records and embeds in each data item the hash value of the previous data item in order to associate data items with each other and make it difficult to tamper
with them without causing any inconsistencies, and therefore increases the reliability of data.
d) It is an encryption method for wireless LANs, and is recommended for use instead
of WEP because WEP is known to have vulnerabilities.
b
Which of the following is an appropriate description concerning biometric
authentication?
a) If margin for error in matching with the authentication data is made larger, both the
possibility of rejecting an authorized person and the possibility of accepting an
unauthorized person become smaller.
b) It eliminates the need to remember IDs and passwords for authentication, and the
need to carry keys or cards.
c) It cannot be used with other authentication methods such as passwords or tokens.
d) The effective period in which retina pattern and finger vein pattern can be used for
authentication is short because they change greatly over years.
b
Which of the following is an explanation of spyware?
a) It is a scam where money is demanded just by viewing a web site or clicking an
image on it.
b) It is a mechanism where an attacker packages attack tools such as log removal or a
back door and hides them in a PC so that the attacker can use them after intrusion.
c) It is a program that infects a large number of PCs and performs actions such as
simultaneous attacks by illegitimately operating the PCs as instructed over a
network.
d) It is a program that is installed without the user knowing and collects information
such as the user’s personal information and access history.
d
Which of the following is an appropriate disposal method for media that stores
confidential information to ensure that information leakage does not occur?
a) CDs and DVDs are destroyed and then are disposed of.
b) A PC is disposed of with its CPU being destroyed.
c) USB memory is disposed of with its files and folders being deleted.
d) Paper documentation is not reused as memo paper and is sealed in a confidential
envelope and then is disposed of together with general trash.
a
Among confidentiality, integrity, and availability, which of the following is the list that
contains all and only the properties that are lost in the information security incident
below?
All of the files on a server in the workplace were encrypted and saved. However, the
server was infected by a virus, and a number of the files were deleted. Elimination of
the virus and recovery of the files required several hours. During the hours, work could
not be performed, and users were inconvenienced. Some files were unable to be
recovered.
a) Confidentiality
b) Confidentiality, integrity
c) Integrity, availability
d) Availability
c
Q39. When a user accessed the URL in the body of an e-mail message with a PC, the message
shown in the figure appeared on the screen and the PC was locked. Which of the
following is used in this attack?
Which of the following is an appropriate example of activities conducted in A (Act) in
the organizations that operate ISMS on the basis of the PDCA model?
a) Changing the server monitoring method as a corrective action for the results of the business operations audit
b) Objectively evaluating the server administrator’s work details by a third party
c) Identifying the information assets in the server room
d) Monitoring the operation of the server according to the defined operational
procedure
a