March 2018 Flashcards
Which of the following is the binary number that is obtained by adding the binary
numbers 01011010 and 01101011? Here, the binary numbers are expressed as positive 8-bit values.
a) 00110001
b) 01111011
c) 10000100
d) 11000101
d
Q2. When the reward for an improvement proposal concerning business operations is
determined based on the decision table below, how much is the reward for an
improvement proposal that results in an improvement of $20,000 and a turnaround time
reduction of three days? Here, “Y” in the table means that each condition holds “true”,
and “N” means “not true”. In addition, “” indicates the reward that applies to each
specific combination of these conditions.
A PC plays back video data recorded at 500 400 pixels per frame, 30 frames per second,
and 3 bytes per pixel while reading it from a peripheral device. When the data transfer
rate between the peripheral device and the PC is 1 106
bytes per second, in order to play back the video without delay, the data must be compressed to one n-th (1/n) in advance.
Which of the following is the minimum value of n? Here, the time to expand the
compressed data and other impacts can be ignored.
a) 18
b) 54
c) 72
d) 144
a
Which of the following describes the relationship that is always true for two (2) sets A
and B? Here, (X Y) represents the part that belongs to both X and Y (intersection
set), and (X Y) represents the part that belongs to at least one of X or Y (union set).
a) (A B) is a subset of the complement of (A B).
b) (A B) is a subset of A.
c) (A B) is a subset of (A B).
d) (A B) is a subset of the complement of A
c
Q5. There is a series of numbered boxes stacked as shown in the figure below. The
operations described in the table below are performed in the sequence of operations 1
through 4. When the operation 4 is completed, which of the following shows the status
of the stacked boxes?
Which of the following is an appropriate description concerning HTML?
a) It is a markup language that can specify the logical structure and layout of a web page
by using tags.
b) It is a script language that can describe programs or processing steps executed on a
web browser.
c) It is a communication protocol that is used between a web browser and a web server.
d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.
a
Which of the following is an appropriate explanation of an algorithm that is used on a
computer?
a) A generic term for artificial languages used to enable a computer to perform a series
of operations
b) A processing procedure for enabling a computer to accomplish a specific purpose
c) Designing buildings or industrial products with the assistance of a computer
d) Software for translating a program into a machine language that can be directly
executed by a computer
b
Which of the following is an appropriate description concerning machine language?
a) A program that is written in Fortran or C is converted into machine language and
then executed.
b) Machine language is a high-level language.
c) Machine language expresses a program with sequences of decimal numbers.
d) Most of application software is still programmed in machine language.
a
Which of the following is the method for describing the logical structure of a sentence
in XML?
a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)
b) Separating the sentence, clauses, and other elements by using commas
c) Enclosing the sentence, clauses, and other elements by using tags
d) Separating the sentence, clauses, and other elements by using tabs
c
Which of the following is appropriate as a description concerning Plug and Play?
a) When a peripheral device is connected to a PC, the installation and settings of the
device driver are performed automatically.
b) Software for enhancing the functions of application software is installed at a later time.
c) Power is supplied from a PC to a peripheral device via a cable connecting them.
d) A specific program is executed, and the system performance is evaluated on the basis
of the time taken for the execution.
a
Which of the following is a characteristic common to IEEE 1394 and USB that are often
used for connection interfaces between PCs and peripheral devices?
a) Peripheral devices can be connected and disconnected while the PC and/or devices
are powered on.
b) A maximum transfer rate is 100 Mbits/second.
c) A unique ID must be assigned to each device connected to a PC.
d) Data can be transmitted in parallel over multiple data lines.
a
Q12. Which of the following is an appropriate combination of words that are inserted into
blanks A and B in the description below concerning the execution sequence of
instructions in a computer?
In a computer, the instructions are executed in the sequence shown below.
(1) Refer to the program counter.
(2) the instruction.
(3) Set the program counter to the main memory address of the next instruction.
(4) the instruction.
(5) Execute processing according to the instruction.
(6) Return to (1).
Which of the following printers can take multiple copies simultaneously by using carbon
paper or non-carbon paper at the time of printing?
a) Inkjet printer
b) Impact printer
c) Thermal printer
d) Laser printer
b
In the new system environment of Company X, three systems including the customer
management system, the ordering management system, and the call center system run at separate locations and connected via a network and they can complement one another in the event of a failure. Also, the system operations are managed at their respective locations. Which of the following is the greatest merit of this new system environment?
a) The integration of operations helps reduce the number of operating staff.
b) Risks of disasters and other problems can be diversified.
c) The versions of software can be controlled easily.
d) Backup files can be managed in a consolidated manner.
b
Which of the following is an appropriate explanation of parallel processing?
a) It is the division of a series of processing into processing units that can be executed
simultaneously, and the execution of these on multiple CPUs.
b) It is the grouping and execution of multiple related processes in a single process.
c) It is the performing of business logic and database processes on the server side, and the performing of user interface processes on the client side.
d) It is the division of processing time for a single CPU into short units, and the
sequential allocation of these to multiple applications for execution.
a
Which of the following is the term for the form of using a PC by itself without connecting
it to any network?
a) Thin client
b) Single processor
c) Standalone
d) Peer to peer
c
17.) The diagram below shows the directory structure for a part of a certain file system.
Which of the following is the reference from the current directory D3 (indicated with an
asterisk “*”) to the file “a” under the directory D4 (indicated with an arrow)? Here,
files are specified as follows:
Which of the following is an OS function that executes several application programs
progressively in turn on a single PC, such as when a file is downloaded from a web site
while data is processed with spreadsheet software?
a) Virtual reality
b) Dual core
c) Dual system
d) Multitasking
d
Which of the following is an appropriate description concerning the use of OSS (Open Source Software)?
a) OSS users have an obligation to pay the developer the fee for the software.
b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.
c) OSS cannot be used in the field of genetic research.
d) Software derived from the published OSS can be made available as OSS.
d
Q20. A certain company holds briefing sessions six times a month to attract customers. To
manage the attendees in January by using spreadsheet software, a table is created as
shown in cells A1 through D8. Then, to manage the attendees in February, cells A2
through D8 are copied to cells F2 through I8, and cell I3 is corrected. Which of the
following is the appropriate expression to be entered into cell I3? Here, when the table
for February is copied to the table for March, cells should be filled so that the expressions
in cells do not have to be changed.
The types of programs that are executed at the startup time of a PC are generally classified into three categories: BIOS, OS, and startup services. Which of the following is the list that is arranged in the sequence of the execution of the programs?
a) BIOS -> OS -> Startup services
b) OS -> BIOS -> Startup services
c) OS -> Startup services -> BIOS
d) Startup services -> BIOS -> OS
a
Q22. Spreadsheet software is used to predict sales according to the weather. The table is a
worksheet into which the probability for the weather type (sunny, cloudy, rainy) on the
day to be predicted and the predicted sales amount by weather type for each product are entered. An expression is entered in cell E4 to calculate the predicted sales amount on
the day for Product A, and this is copied to cells E5 through E6 and used. Under these
conditions, which of the following is an appropriate expression to be entered in cell E4? Here, to obtain the predicted sales amount on the day for each product, the probability for each weather type is multiplied by the predicted sales amount for each of weather type, and then these values are added up
Which of the following is a typical example of a system operating on a super computer?
a) A Supply Chain Management system that is required for linkage between enterprises
b) A global climate change forecast system that requires large-scale scientific and
technical computing
c) A banking system that requires a high reliability
d) An engine control system of a vehicle that requires advanced real-time control
b
Which of the following is an input method where a touch panel is operated by touching
it in multiple locations simultaneously?
a) Touch typing
b) Double click
c) Multitasking
d) Multi-touch
d
Which of the following is an international standard for a compression method for still
(or static) images?
a) BMP
b) JPEG
c) MPEG
d) PCM
b
Q26. There are “Sales”, “Customer” and “Product” tables in a relational database. Among lists
A through C, which of the following contains all and only the lists that can be created
from the data in these tables? Here, a solid underlined part represents a primary key, and
a dotted underlined part represents a foreign key.
Which of the following effect is obtained by normalizing the tables of a relational
database?
a) The number of disk accesses for data update is reduced by compiling frequently used
data in the same table.
b) Data inconsistency due to data update is prevented by eliminating data duplication.
c) The usage efficiency of the main memory is improved by making the size of the tables
uniform.
d) Response time for queries is shortened by reducing the number of tables.
b
Q28. When the order records shown below are entered in the system where each order number
must be uniquely assigned, which of the following is the appropriate method for
searching the order master file containing all of the past order records, and for checking
the uniqueness of the order number?
Order record
When an activity for building a relational database is divided into steps A through C
below, which of the following is an appropriate order of the steps?
A Identifying the data items to be used in the business operation
B Creating tables
C Inserting records
a) A → B → C
b) A → C → B
c) B → A → C
d) B → C → A
a
Which of the following is an appropriate description concerning a virus check for an e-mail?
a) A virus check does not need to be performed if the e-mail is encrypted.
b) A virus check is not required for the received e-mail if it is inspected by the sender.
c) A virus check is performed even if the attached file has a file extension of “jpg”.
d) A virus check is performed only for the e-mail sent by an unknown sender.
c
Which of the following is an appropriate explanation of tethering?
a) A type of virus that replicates itself and spreads infection throughout a network
b) A function of connecting a PC to the Internet by using a communication terminal such
as a smartphone as a mobile router
c) A method of detecting a tampering by using a hash function and public key
cryptography for electronic data
d) An attack that attempts to illegally manipulate the information in a database by
deliberately entering an SQL command in an input field on a web page
b
Which of the following is an appropriate effect of replacing IPv4 with IPv6?
a) Problems no longer occur when an IP address that can be accessed directly from the
Internet is duplicated.
b) The shortage of IP addresses that can be accessed directly from the Internet is resolved.
c) It becomes possible to use optical fibers for connecting to the Internet.
d) The communication speed at the time of using the Internet improves.
b
Which of the following is an appropriate description concerning encryption of
communication when a website with the URL beginning with “https://” is browsed
through a PC browser?
a) Only the communication from the PC to the web server is encrypted.
b) Only the communication from the web server to the PC is encrypted.
c) The bi-directional communication between the web server and PC is encrypted.
d) The direction in which communication will be encrypted depends on the settings of
the web server.
c
Which of the following is an appropriate explanation of SSID that is used in wireless
LANs?
a) The MAC address of an access point
b) The channel number of radio waves in use
c) The IP address of an access point that is used as the default gateway
d) A character string used to identify the wireless network
d
When information security measures are grouped into three (3) categories of technical
security measures, human security measures, and physical security measures, which of
the following is an appropriate example of physical security measures?
a) Making a non-disclosure agreement with employees
b) Attaching a digital signature to an e-mail when it is sent
c) Storing a notebook PC in a
place that can be locked
d) Recommending password change on a regular basis
c
Among information security measures A through D implemented in the workplace to
maintain the “confidentiality” and “integrity” of information, which of the following is
a list of only the appropriate measures?
A: PCs should remain unlocked to keep them ready for operation from the start to the
end of the business day.
B: Documents and electronic storage media, such as CD-R containing important information, should be stored in locked cabinets except when they are used.
C: Documents sent or received by facsimile should be picked up immediately without
being left unattended on the tray.
D: Messages or information written on the whiteboard should be erased immediately
after use.
a) A, B
b) A, B, D
c) B, D
d) B, C, D
d
Among the descriptions A through C below concerning information security measures,
which of the following is the list that contains all and only the goals that can be achieved
by encrypting communication content?
A: Recovering the data that is tampered with during communication
B: Ensuring that the communication content is not disclosed to a third party
C: Identifying the person involved in tapping if tapping has occurred
a) A
b) A, B
c) A, C
d) B
d
Which of the following is an authentication method where a user uses information that
differs each time and is generated with a device called a token or other such device?
a) Digital signature
b) Password cracking
c) Password policy
d) One time password
d
Q39. In the description below concerning the ISMS conformity assessment scheme, which of
the following is an appropriate combination of words to be inserted into blanks A and B?
It is a scheme for assessment and certification of a company or organization for its
proper establishment and operation of the management system and its
conformity to the requirements of the ISMS certification standards. The assessment and
certification are conducted by .
In order to promote risk management, the execution plan for introducing the risk
management system was developed as the first step. When the subsequent actions are divided into steps A through C below, which of the following is the order of the steps in
accordance with the PDCA cycle?
A Implementing the measures against risks according to the execution plan
B Measuring the effect of the implementation and evaluating the effectiveness of the
risk management system
C Taking corrective actions and improving the risk management system
a) A → B → C
b) A → C → B
c) C → A → B
d) C → B → A
a