May 2015 Flashcards
Q1.) As shown in Figure 1, there is a box that generates a single output in response to two
inputs. The input to this box is either “Agree” or “Disagree.” The output “Agree” is
generated only when both inputs are “Agree,” and in other cases the output “Disagree”
is generated. When three inputs are entered into two boxes as shown in Figure 2,
which of the following is the correct description concerning the output? Here, each
box of Figure 2 has the same function as the box of Figure 1
A single-sided single-layer DVD-R has a storage capacity of about 4.7 Gbytes. When
a book has 700 double-byte characters that are printed per page, how many tens of
thousands of pages, at maximum, can be recorded on this DVD-R? Here, two bytes
are required to record one character, and only character information is stored. In
addition, 1 Gbyte is 1 billion (10^9) bytes.
a) 42
b) 71
c) 335
d) 671
c
Q3.)
An analog sound signal is digitized. Sampling is performed at Time 1 through Time 5
in the figure below, and four-level quantization is performed; in other words, the levels
closest to the sampling point are selected. After that, two-bit encoding is performed.
The result is “11 01 00 10 11”. When digitization is performed in the same way,
which of the following figures represents the sound signal that results in “01 00 10 11
01”?
The procedure described below is executed for two variables x and y, in order from
step (1) through step (4). When the procedure is completed, what is the resulting
value of x?
[Procedure]
(1) Assign 2 to x, and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, terminate the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language that is used for describing web pages.
b) It is a language that is developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language that is developed for business-oriented calculations.
c
Q6. )
The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” indicates that the content of “x” is replaced with the data of
“y”.
There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the
program display the underlined character string? Here, the first character of the
original text is displayed in 10 points.
[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.
[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>
<S>group-level</S>
computerization</B> from a user <S>standpoint</S>.</B>
a) 10
b) 11
c) 12
d) 13
b
Which of the following is an appropriate explanation of HDMI?
a) It is an interface for an audio-visual device that handles the input and output of video,
audio, and control signals through a single cable.
b) It is an interface that makes use of the infrared rays used for the exchange of information
between cell phones.
c) It is a serial interface that connects a peripheral device, such as an external hard disk,
through a cable.
d) It is a wireless interface that makes use of radio waves and can communicate even when
there is a slight shielding.
a
Which of the following is implemented in a computer system in order to perform the
role of transferring data between the CPU and memory, or between the CPU and I/O
devices?
a) Bus
b) Hub
c) Port
d) Router
a
Which of the following is an appropriate description concerning flash memory?
a) It is a type of rewritable memory that can erase all its content with ultraviolet light.
b) It can read out data at a high speed, and therefore, it is often used as cache memory.
c) It is a type of non-volatile memory that can erase and rewrite all or part of its content
electrically.
d) It is a type of memory that requires refresh operations and is widely used as main
memory.
c
Which of the following is an appropriate explanation of the hot standby system?
a) It is a system where a collection of various types of hardware, software, and data on
the Internet is provided to the user.
b) It is a system where a high level of reliability can be obtained by simultaneously
operating the two sets of equipment and performing the same processing while
cross-checking the results.
c) It is a system where a backup machine is always kept on standby in an operable state
and is immediately switched into operation at the occurrence of a failure.
d) It is a system where a backup machine is arranged, and at the occurrence of a failure,
the operator in charge starts up the backup machine to switch the production
machine to the backup machine.
c
Which of the following is an appropriate explanation of some functional units that
constitute a computer system?
a) The arithmetic and logical unit performs calculation processing at the direction of
the control unit.
b) The arithmetic and logical unit exchanges data with the control unit, the input unit,
and the output unit.
c) The memory unit requests the arithmetic and logical unit to perform calculation
processing and stores the results.
d) The memory unit requests the output unit to read out data from the memory unit.
a
When MTBF is 600 hours and MTTR is 12 hours, what is the approximate
availability?
a) 0.02
b) 0.20
c) 0.88
d) 0.98
d
Which of the following is a method or technique that is used to connect multiple
computers over a network such as a LAN or the Internet, and makes these computers
available as if they were a single high performance computer?
a) End user computing
b) Social computing
c) Grid computing
d) Pervasive computing
c
Which of the following is an appropriate description concerning the OS for PCs?
a) Only one type of OS can be installed and executed on one PC.
b) There is no OS for PCs that are equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, any software operating with the old
version of the OS can no longer be used.
d) There exist some OSs for PCs that can be started up by using an external storage
device, such as a CD-ROM and USB memory, other than the hard disk.
d
Q16. )
In the hierarchical structure shown in the figure below, when the current directory is
marked with an asterisk (*), which of the following is the absolute path of the same
directory as the directory specified by the relative path “....\B\B”?
Which of the following is the image data that is pasted onto the documents or Web
pages created by the word-processing software or presentation software in order to
improve the representational power?
a) CSS
b) CAPTCHA
c) Clip art
d) Template
c
Q18. In comparison with the program execution method where programs are started and
executed sequentially, which of the following is an appropriate description concerning
characteristics of the method where multiple programs are started and executed
concurrently while switching between them in response to events such as input/output
requests?
Which of the following is software that can be used free of charge on a trial basis but
requires a usage fee if it continues to be used after the trial period?
a) Groupware
b) Shareware
c) Adware
d) Freeware
b
In comparison with the complier-based language processing, which of the following is
an appropriate description concerning the interpreter-based language processing?
a) Programs are executed at a slower speed.
b) Recursive function calls are not allowed.
c) Source programs are translated into machine language prior to execution.
d) It is not suited to an interactive operation environment.
a
Which of the following is an appropriate explanation of a general purpose computer that
is also known as a mainframe?
a) It is an ultra-small computer in which the CPU, main memory, and interface circuits
are embedded in a single chip.
b) It is a large computer that is used for a wide range of applications from office
processing to technical calculations, including mission-critical business as the main
target.
c) It is a client-dedicated computer that is equipped only with the minimum functions,
such as data entry and display, in the configuration of a system where resources,
such as the application programs and files, are managed at the server side.
d) It is a portable information terminal where functions, such as schedule management,
address book, and e-mail, are made available in a device that is small enough to fit
into the palm of one’s hand.
b
Which of the following is the unit that represents the resolution when a photograph or a picture is read by a scanner?
a) dpi
b) fps
c) pixel
d) ppm
a
When a relational database is constructed according to the processes (A through C)
below, which of the following is the appropriate execution sequence?
A: Identifying the data items to be managed
B: Analyzing the target business operations
C: Creating the relational database tables
a) A → B→ C
b) B → A→ C
c) B → C → A
d) C → A → B
b
Q24. )
When the “Department,” “Location,” and “Employee” tables are joined to create Table
A, which of the following is the “Employee” table that is to be joined? Here, an
underline indicates a primary key, and a dotted underline indicates a foreign key.
Which of the following is a service that provides disk space on a server connected to
the Internet for storing files and allows a user to read and write data from anywhere
inside or outside the home?
a) Archive
b) Authoring
c) Online storage
d) Flash memory
c
Which of the following is an appropriate description concerning a wireless LAN?
a) A wireless LAN cannot be used with hardware other than a PC.
b) A wireless LAN has an operation mode that allows a one-to-one connection without
any access point.
c) The encryption standards are unified into one type.
d) When there are no barriers, communication can be performed regardless of the
distance.
b
When a PC is connected to a network, which of the following is the protocol that is
used for automatically obtaining the IP address?
a) DHCP
b) HTTP
c) NTP
d) SMTP
a
Q28. Three PCs and an Internet-capable TV (television) set are to be connected to the
Internet by using a hub and a router that has a firewall function. Which of the
following is the appropriate connection that enables the firewall function of the router
to be used for all devices? Here, “FW” in the figure indicates the firewall function.
In IPv4 (IP version 4), about 4.3 billion IP addresses can be defined. In IPv6 (IP
version 6) that is intended to replace IPv4, how many bits are used as the length of an
IP address?
a) 32
b) 64
c) 128
d) 256
c
Q30. In order to implement communication between applications via a network, a certain
number of protocols are used in a hierarchical structure. Which of the following is
the appropriate combination of the protocol names to be inserted into blanks A and B in
the description below?
When a web page is viewed on the Internet, the browser and the web server use a
protocol called A .
Communication based on this A uses a
protocol of a lower layer called B and a protocol of a further lower layer
called IP (Internet Protocol).
A | B
a) FTP | Ethernet
b) HTTP | TCP
c) SMTP | POP3
d) WWW | HTML
b
Which of the following is a form of direct damage to a server which is caused by a
DoS attack?
a) The encrypted data is decrypted.
b) The administrator password is changed.
c) The server is infected by a virus.
d) The services of a server are interrupted.
d
Which of the following is one of critical factors of information security that can be
improved by setting the mirroring disks in a RAID system?
a) Availability
b) Confidentiality
c) Authenticity
d) Accountability
a
Which of the following is a network area that is logically isolated from both a
company’s internal network and an external network, and is set up to ensure that no
harm is caused to the internal network even if a server that is installed within the
network area is accessed from the outside in an unauthorized manner?
a) DMZ
b) DNS
c) NAT
d) SSL
a
Which of the following is an appropriate explanation of a zero-day attack?
a) In order to search for a vulnerable TCP/IP port that can be used as an entry point for
unauthorized intrusion, an attacker accesses a server while changing port numbers in
sequence.
b) An attacker obtains important security information, such as a password, from the
system administrator or user through skilled conversation or peeping, and then
accesses the system illegitimately by posing as the user.
c) When a vulnerability in software is identified, the identified vulnerability is
exploited to perform an attack before a patch for the software is provided by the
vendor.
d) In order to identify the password or crack the encrypted code, an attacker
successively attempts all character strings that are generated by mixing upper-case
characters and lower-case characters of a term from the dictionary, or adding
numeric characters to such a term.
c
Q35. With regard to malware, which of the following is an appropriate combination of
descriptions (A through C) and keywords?
A: An infected computer performs a fusillade to a specific site or transmits spam
e-mails at the direction of an outside source.
B: The information about users recorded by the key logger or such other method is
collected.
C: A penetration path is set up to perform an unauthorized login to a computer
system from outside.
A | B | C
a) Spyware | Trojan | horse Back door
b) Spyware | Back door | Trojan horse
c) Bot | Spyware | Back door
d) Bot | Trojan horse | Spyware
c