April 2023 Flashcards
Q1. Which of the following histograms has the largest variance? Here, the scale of the vertical
axis is the same on each histogram and the scale of the horizontal axis is the same on each
histogram
Which of the following is the appropriate meaning of the units that are shown in the
specifications given in brochures or catalogs?
a) “2-Tbyte hard disk” refers to a capacity of 2× 1012 bytes.
b) “9600-dpi printer” refers to a printing precision of 9600 dots/cm2.
c) “CPU operates at a base clock of 3.3 GHz” refers to operation at a frequency of 3.3× 220Hz.
d) “Modem with a transmission speed of 56 kbps” refers to a minimum transmission speed of 5.6× 210 bits/second.
a
Q3. When the reward for an improvement proposal concerning business operations is
determined based on the decision table below, how much is the reward for an improvement
proposal for an improvement of $20,000 and a turnaround time reduction of three days? Here,
“Y” in the table means that the condition holds, and “N” means that the condition does not
hold. In addition, “√” indicates the reward that applies to a specific combination of these
conditions.
Q4. Which of the following is the combination of the mean and median of the data?
[Data]
10, 20, 20, 20, 40, 50, 100, 440, 2000
Mean | Median a) 20 | 40 b) 40 | 20 c) 300 | 20 d) 300 | 40
d
There is a program that displays text in accordance with the specifications below. When
the original text described below is displayed, in what point size does the program display the
underlined character string? Here, the first character of the original text is displayed in 10 points.
[Specifications]
The characters between <b> and </b> are displayed one point larger than the preceding character.
The characters between <S> and </S> are displayed one point smaller than the preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be nested with each other.
[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>
<S>group-level</S>
computerization</B> from a user’s <S>standpoint</S>.</B>
a) 10
b) 11
c) 12
d) 13
b
Q6. There is a series of numbered boxes stacked as shown in the figure below. The operations
described in the table below are performed in the sequence of operations 1 through 4. When
the operation 4 is completed, which of the following shows the status of the stacked boxes?
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language used for describing Web pages.
b) It is a language developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language developed for business-oriented calculations.
c
Algorithms are important when a computer is used. Which of the following is an appropriate explanation of an algorithm?
a) It refers to software for converting a program to a machine language that can be directly run by a computer.
b) It refers to a processing procedure for enabling a computer to accomplish a particular purpose.
c) It refers to a collective term for artificial languages used to give instructions for a series of operations to a computer.
d) It refers to the designing of buildings and industrial products by using computers.
b
Which of the following is a term for a list of instructions to a computer that are written in a human-readable programming language?
a) PIN code
b) Source code
c) Binary code
d) Character code
b
Which of the following is a standard for wireless communication between a PC and peripheral devices?
a) Bluetooth
b) IEEE 1394
c) PCI
d) USB 3.2
a
Which of the following is an appropriate description concerning a touch panel?
a) Operations are performed by using a pen-type or mouse-type device for specifying a position on the screen, and a flat-plate input device that detects the position.
b) Movement of a mouse pointer on the screen or other operations are performed by tracing a flat-panel input device with a finger.
c) The movement of a finger is detected by a sensor on the surface, and operations are performed by rotating a component called a wheel that is similar to a disc.
d) There are some types such as resistive or capacitive, and operations are performed on a
computer through direct contact with the screen by a finger.
d
Which of the following is an appropriate description of a multi-core processor?
a) An improvement in the throughput of the entire system is aimed at by simultaneously executing different processing in each core.
b) An improvement in the reliability of the processing result is aimed at by executing the same processing in several cores.
c) Several cores are controlled by hardware alone, and the OS is not required to have a special function.
d) The throughput of the processor depends only on the number of cores, and does not depend on the clock frequency.
a
Which of the following is a plug and play function?
a) The automatic playback that is performed when a DVD is inserted
b) The automatic installation of a device driver that supports a newly connected peripheral device to the PC
c) The automatic fault diagnosis for a connected peripheral device
d) The automatic periodic virus scan of a disk drive
b
Which of the following is an explanation of a dual system?
a) It is a computer system in which exactly the same processing is performed in two
computers, and its reliability is assured by cross-checking the results.
b) It is a computer system that is composed of a primary system used usually and a secondary system kept on standby in preparation for a failure.
c) It is a distributed processing system with computers connected via a peer-to-peer network.
d) It is a distributed processing system that has a clear hierarchichy of computers connected via a network.
a
Q15. When information processing systems are classified by their processing methods as
shown in the figure below, which of the following is an explanation of a horizontal load
distribution system?
Which of the following is an appropriate description of batch processing?
a) A method of processing data all together by collecting the data of a certain duration or a certain quantity
b) A method of executing a process immediately when a request for processing of data is made, and returning the result of the process within a short time limit such as a few seconds
c) A method of distributing processes to multiple computers or processors, and reducing the time of execution
d) A method of processing where a computer responds to a request for processing from a user, executes processes and proceeds with activities as if it is having a conversation with the user
a
Which of the following is the most appropriate purpose of installing a business application software package instead of developing own application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire the knowledge of software development methods
d) To improve the skills of application developers
b
Which of the following is the most appropriate method for limiting the content of database to be displayed in accordance with its confidentiality and each user’s business needs?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data
a
Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary storage device, to application programs.
c) Since an OS has the function of automatically converting character set of a text in a file, application programs can display the text properly without regard to the character set.
d) The source code of an OS is required to be disclosed so that application programs can be free to use the various functions of the OS.
b
Q20. Which of the following is an appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?
Which of the following is an appropriate explanation of a deadlock?
a) It is a state in which the processes of a computer are prohibited from getting any access including accidental access to information that must not be accessed.
b) It is a state in which, if the login attempt of a user fails more than a predefined number of times, the user is prohibited from logging in to the computer for a predefined time period or until a system administrator resets the user account.
c) It is a state in which, when common resources are exclusively used, two or more processes are endlessly waiting for each other to release a common resource.
d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.
c
Among the descriptions A through C concerning OSS (Open Source Software), which of the following is the list that contains all appropriate descriptions?
A: Some software is distributed only in compiled binary format, not in source code format.
B: The license can restrict the field of use or users (individuals or groups).
C: The Linux OS and the PostgreSQL relational database management system are some examples.
a) A
b) A, B
c) B, C
d) C
d
If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of the following can most likely occur?
a) Viruses is not detected.
b) Data is not written correctly.
c) Data is not read correctly.
d) Stored data is not read quickly
d
Which of the following is an appropriate explanation of web accessibility?
a) It is a marketing technique that utilizes websites.
b) It is a mechanism that aims at unifying the design of web pages.
c) It is the extent to which anyone can receive and transmit information by using the web regardless of age or physical condition.
d) It is a mechanism where a web server starts a program and dynamically generates the web contents based on the information sent by the user to a website.
c
Which of the following is the most appropriate explanation of virtual reality?
a) Improving the GUI not by displaying an image gradually from top to bottom, but by first displaying a coarse mosaic-like image, and then by gradually increasing the sharpness of the image
b) Enabling computer-simulated objects and spaces to be perceived like the real world by using computer graphics or other techniques
c) Conducting computer simulations instead of, among others, the wind-tunnel test used for the design of cars and airplanes
d) Combining images of separately shot scenery and people to create an image that is different from the real world
b
Which of the following is a service that provides disk space on a server connected to the Internet for storing files and allows users to read and write data from anywhere inside or outside their homes?
a) Archive
b) Authoring
c) Online storage
d) Flash memory
c
Which of the following is an appropriate purpose of normalizing the data of a relational database?
a) To improve the compression ratio of data
b) To retain the consistency of data
c) To prevent the leakage of data
d) To enable the simultaneous access of data
b
Q28. Which of the following is a term for an operation that extracts only the rows (records)
with a price of 100 yen or more, from the “Product” table of a relational database?
Q29. When an activity for building a relational database is divided into steps A through C below, which of the following is an appropriate order of the steps?
A Identifying the data items to be used in the business operation
B Creating tables
C Inserting records
a) A → B → C
b) A → C → B
c) B → A → C
d) B → C → A
a
Q30. Which of the following is an appropriate combination of the protocols that are used for
transmitting and receiving e-mail as shown in the diagram below?
Which of the following is placed between an internal network and an external network in order to prevent unauthorized access from the external network to the internal network?
a) DHCP server
b) Search engine
c) Switching hub
d) Firewall
d
Which of the following is an appropriate effect of replacing IPv4 with IPv6?
a) Problems no longer occur when two or more devices that can be accessed directly from the Internet have the same IP address.
b) The shortage of IP addresses that can be used on the Internet is resolved.
c) It becomes possible to use optical fibers for connecting to the Internet.
d) The communication speed on the Internet is increased.
b
Which of the following is a mechanism by which, if an e-mail is sent to a specific e-mail address, the e-mail with the same content is distributed to multiple e-mail addresses that have been registered to the specific address?
a) Web mail
b) Chain mail
c) Mailing list
d) Reply mail
c
Among the cases of communication between PCs, servers, communication devices, printers, and other devices, which of the following needs to use a WAN?
a) Multiple PCs and a file server are connected to a LAN in Osaka branch office, and files stored in the file server are made to be accessible from any PC connected to the LAN.
b) Inside a house, a PC and a printer are connected with Bluetooth, and documents created on the PC are printed on the printer.
c) Inside a server room, a PC and a web server are connected to a hub, and the web server is maintained from the PC.
d) A PC connected to the LAN in Kyoto-City sales office accesses the server in Tokyo
head office and uploads sales information.
d
Which of the following is an appropriate explanation of a keylogger that is a threat to information security?
a) Stealing information by watching the keyboard input and the display output from behind a PC user
b) Monitoring and recording the keyboard input on a user’s PC
c) Identifying a password by using a dictionary of the words that are likely to be used as passwords
d) Searching for a access point that allows unauthorized access by moving around a town with a PC that can detect the electromagnetic waves of a wireless LAN
b
Which of the following is the most appropriate explanation of phishing?
a) A computer infected with a virus is controlled without owner’s consent from an external location via a network such as the Internet by the functions of the virus.
b) A false e-mail is sent, in order to lead the recipient to a fake website or to an imitation of an existing website, and then to illegally obtain personal information.
c) When user’s data sent to a website is displayed as is, its vulnerabilitiy is exploited in order to embed in a page a malicious script that illegally obtains the information about user who displayes the page.
d) A resident program is placed on a PC without the knowledge of the users in order to illegally obtain data in files or information about PC operations.
b
Which of the following is a form of direct damage to a server that is caused by a DoS attack?
a) The encrypted data on the server is decrypted.
b) The administrator password of the server is changed.
c) The server is infected by a virus.
d) The services of a server are interrupted.
d
Among the countermeasures A through D concerning information security, which of the following is the list that contains all and only the appropriate countermeasures for virus
infections?
A: Installing antivirus software
B: Applying a security patch (i.e., update module)
C: Setting a password for the hard disk
D: Encrypting files
a) A, B
b) A, B, C
c) A, D
d) B, C
a
Among the descriptions A through C concerning PKI, which of the following is the list that contains all and only the appropriate descriptions concerning a digital signature in email?
A The recipient can check whether the sender is the intended person.
B It is possible to prevent e-mail from being read before it reaches the recipient.
C The recipient can confirm that the e-mail has not been tampered with.
a) A, B
b) A, C
c) B, C
d) A, B, C
b
Which of the following is the general name for evil-minded software such as a key logger or worm?
a) Shareware
b) Firmware
c) Malware
d) Middleware
c