Oct 2011 Flashcards
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language used for describing Web pages.
b) It is a language developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language developed for business-oriented calculations.
c
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language used for describing Web pages.
b) It is a language developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language developed for business-oriented calculations.
b
Which of the following is an appropriate description concerning XML (eXtensible
Markup Language)?
a) It is an object-oriented language based on C++, but simplified to eliminate language
features that cause common programming errors.
b) It is an interpreter language for text processing and also a standard language for CGI
(Common Gateway Interface) programs that run on a Web server.
c) It is a page description language used in the electronic and desktop publishing areas
for defining the contents and layout of a printed page.
d) It is a language that enables users to create their own tags in order to describe the
structure and content of a document.
d
- ) When a relation between objects is abstracted, the relation from X to Y (called an order
relation) is represented as (X, Y) and illustrated as . Which of the
following is the diagram that illustrates three sets of order relations “(A, B), (A, C), (B,
D)”?
- ) The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” indicates that the content of “x” is replaced with the data of
“y”.
- ) When the reward for an improvement proposal concerning business operations is
determined based on the decision table below, how much is the reward for an
improvement proposal that results in an improvement of $20,000 and a turnaround time
reduction of three days? Here, “Y” in the table means that each condition holds
“true”, and “N” means “not true”. In addition, “” indicates the reward that applies
to a specific combination of these conditions.
When a sound is recorded in a computer file, it is to be stored as a series of 8-bit
encoded data. When the same sound source is sampled at the same sampling
frequency and then encoded as a series of 16-bit data in lieu of 8-bit data, which of the
following is an appropriate explanation concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher.
a
8.) A sound signal is digitized. Sampling is performed at Time 1 through Time 5 in the
figure below, and four-level quantization is performed; in other words, the levels
closest to the sampling point are selected. After that, two-bit encoding is performed.
The result is “11 01 00 10 11”. When digitization is performed in the same way,
which of the following figures represents the sound signal that results in “01 00 10 11
01”?
Which of the following is an appropriate description concerning the clock frequency of
the CPU in a PC?
a) The instruction execution timing of the CPU changes depending on the clock
frequency. As the clock frequency becomes higher, the instruction execution speed
of the PC increases.
b) The communication speed of the LAN changes depending on the clock frequency.
As the clock frequency becomes higher, the communication speed of the LAN
increases.
c) The rotation speed of the hard disk changes depending on the clock frequency. As
the clock frequency becomes higher, the rotation speed becomes faster and the data
transfer rate of the hard disk increases.
d) The clock frequency serves as the reference for the internal clock of the PC. When
the clock frequency doubles, the interrupt interval becomes half and the speed of
real-time processing increases.
a
Which of the following is an appropriate explanation concerning the cache memory of
a PC?
a) It is placed between the CPU core and main memory, and is used to read and write
data at high speed.
b) It is used to store the same data in two locations at the same time in order to improve
reliability.
c) It is equipped with a mechanism that can run even a program whose size exceeds the
main memory capacity.
d) It enables simultaneous access to main memory blocks by dividing main memory
into multiple blocks.
a
Which of the following is an appropriate description concerning flash memory?
a) It is used as read-only storage once data is written.
b) No power supply is required to retain stored data.
c) It is not used for digital cameras because of the difficulty of downsizing.
d) Data is read or written using laser light.
b
Which of the following is an appropriate description concerning CD-R?
a) It is suitable for making a backup copy of data, because the saved data cannot be
erased or overwritten.
b) It is suitable as storage for frequently updated large master files, because it has a
large storage capacity.
c) It is capable of high-speed writing by shrinking the recording area of the disc
surface.
d) A specially-designed CD-R drive is necessary for reading data, because the data is
recorded in a special format.
a
Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership) that represents the cost of a system?
a) The total cost of a company’s initial investment in an information system
b) The total cost incurred in system development
c) The total cost including system installation, operation, maintenance, and education
d) The total cost of system installation
c
In the new system environment of Company X, three systems including a customer
management system, an ordering management system, and a call center system are run
individually at separate locations and connected via a network so that they can
complement one another in the event of a failure. Also, the system operations are
managed at their respective locations. Which of the following is the greatest merit of
this new system?
a) The integration of operations helps reduce the number of operating staff.
b) Risks of disasters and other problems can be diversified.
c) The versions of software can be controlled easily.
d) Backup files can be managed in a consolidated manner.
b
Which of the following is the technical term that represents the work volume processed
by a computer per unit time?
a) Throughput
b) Turnaround time
c) Time slice
d) Response time
a
Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary
storage device, to application programs.
c) Since an OS has the function of automatically converting character sets in a file,
application programs can access the file without regard to the type of character set.
d) The source code of an OS should be disclosed so that application programs can be
free to use the various functions of the OS.
b
Which of the following is the most appropriate method for displaying the content of
database to a limited extent in accordance with the level of confidentiality for each
user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data
a
When a newly installed application program is concurrently executed on a PC that is
equipped with a virtual memory function, the swapping of pages between main and
secondary storage occurs frequently and the processing efficiency of the running
application programs drops sharply. Which of the following is the most appropriate
solution to this situation?
a) Installing more hard disks
b) Installing more main memory
c) Switching to a faster CPU
d) Switching to faster main memory
b
Which of the following is an appropriate description concerning file systems that
manage files with directories and that are used for a wide variety of OSs on PCs?
a) The current directory is created first as the top directory of a hierarchical structure.
b) The file system should be created on a hard disk for directory management.
c) The directory path is used to identify a specific file stored on an auxiliary storage.
d) Files and directories cannot be registered in the same directory.
c
Which of the following is an appropriate explanation of an interpreter?
a) It is a program that translates source programs written in assembler language to
machine language programs.
b) It is a program that reads high-level source programs line-by-line, alternately
translating lines and executing appropriate operations.
c) It is a program that translates source programs written in high-level language to
machine language programs, and then generates load modules.
d) It is a program that automatically generates purpose-specific programs based on the
specified parameters.
b
Which of the following is software that can be used free of charge on a trial basis but
requires a usage fee if it continues to be used after the trial period?
a) Open source software
b) Shareware
c) Public domain software
d) Freeware
b
Which of the following is an explanation of defragmentation?
a) It reassigns defective clusters to other clusters.
b) It relocates free or unused clusters.
c) It removes failed or defective clusters.
d) It relocates physically distributed files into continuous areas.
d
Which of the following is an appropriate concept of universal design?
a) Ensuring that, once a product is designed, the design remains usable without being
changed for a long period of time
b) Ensuring that products keep the same levels of performance and quality regardless of
where they are manufactured in the world
c) Making the design as simple and easy as possible in order to reduce the
manufacturing cost
d) Making products available to many people regardless of differences in age, culture,
and ability as well as whether disability is present
d
Which of the following is an appropriate explanation of MP3 that is used as a
multimedia file format?
a) File compression format for G4 facsimile communication data
b) File compression format for audio data
c) File compression format for color image data
d) File compression format for digital video data
b
Which of the following is an appropriate explanation of a commercial database service?
a) Publishing information collected only from the commercial field free of charge in
the form of a database
b) Providing professional advice on various issues that occur when a database is being
designed and built
c) Providing information for profit by creating a database of information collected in
specific fields
d) Managing user-built databases on behalf of users, in order to release information to
the public
c
There is an order entry system that is used to enter and manage orders from customers.
A numbering printer is used to print sequential order numbers on order forms in order
of arrival unless the forms have mistakes such as missing information. When the
order data shown below is entered in this order entry system, which of the following is
the item that should be checked so as not to enter the duplicate order data?
Order data
Order number | Order date Product code | Quantity | Customer code
a) Customer code
b) Product code
c) Order number
d) Order date
c
27.) As shown in the figure below, a LAN system comprises two PCs, one server, and one
printer. When PC A cannot print any output data on the printer, which of the
following should be applied to blank P in the problem determination flowchart? Here,
both PCs can send output data directly to the printer without using the server.
Which of the following is an appropriate explanation of a router that allows messages
to be sent between two or more networks?
a) It performs connection at the data link layer, and provides the traffic isolation
function.
b) It converts protocols including protocols above the transport layer, and interconnects
networks with different types of network architecture.
c) It performs connection at the network layer, and is used for connecting LANs via
wide-area networks.
d) It performs connection at the physical layer, and is used for extending the connection
distance.
c
In order to implement communication between applications via a network, a number of
protocols are used in a hierarchical structure. Which of the following is the
appropriate combination of the protocol names to be inserted into blanks A and B in the
description below?
When a Web page is viewed via the Internet, the browser and the Web server use a
protocol called A . Communication over this A uses a protocol
of a lower layer called B and a protocol of a further lower layer called IP
(Internet Protocol).
A | B
a) FTP (File Transfer Protocol) | Ethernet
b) HTTP (Hyper Text Transfer Protocol) | TCP (Transmission Control Protocol)
c) SMTP (Simple Mail Transfer Protocol) | POP3 (Post Office Protocol version 3)
d) WWW (World Wide Web) | HTML (Hyper Text Markup Language)
b
Which of the following is an appropriate explanation concerning URL?
a) It is a communications protocol between a Web page and a browser.
b) It is a message about the update history of a Web page.
c) It is grammar for describing the content (body) of a Web page.
d) It is a notation for representing the location of a Web page.
d
When an e-mail message titled “Returned mail: Host unknown” is returned in response
to an e-mail over the Internet, which of the following is a probable cause of this
message?
a) The recipient’s mail server remains stopped.
b) In the recipient’s address, the domain name after the @ symbol is incorrect.
c) The transmitted data is too large, so it exceeds the mail server’s storage capacity.
d) The encoder used for the attached file is incompatible with the recipient’s decoder
b
A cookie is a small data file that a web site can transfer to a browser to maintain
records of the visit to the web site. Among descriptions A through C concerning such
a cookie, which of the following is a list of only the appropriate descriptions?
A: Since the cookie always inherits the ID and password entered during the last visit
to a Web site, it is not necessary to enter them again when the Web site is viewed
using another PC.
B: After a Web site is viewed from a temporarily PC rented at an Internet cafe or
other places, the cookie should be deleted.
C: When personal information is stored in the cookie, such information may be
stolen using cross site scripting or some other means.
a) A,
B b) A, B, C
c) A, C
d) B, C
d
Which of the following is an appropriate guideline for users concerning protection
against computer viruses?
a) When software is installed, the “read-me” file or other instructions should be read
and followed prior to running a virus check.
b) The autostart function should be enabled as a preventive measure against virus
infection via removable disc media.
c) The auto preview function should be disabled as a preventive measure against virus
infection via e-mail.
d) File extension names should be hidden to prevent application software from being
started automatically by identifying the type of file.
c
Which of the following is an appropriate description concerning a method used for
phishing?
a) If data entered in a Web page is displayed as is, a malicious script embedded in the
page causes damage to users and servers.
b) Computers infected with a virus are controlled from outside via a network such as
the Internet.
c) Computer user’s personal information, such as IP address or Web browsing history,
is secretly collected and sent outside.
d) E-mails, which pretend to be from an existing business or organization, are sent to
lead recipients to a bogus Web site and to steal their personal information.
d
When portable computers are used for remote access to data on an office server, which
of the following is an effective security measure?
a) The login screen of portable computers should be set up so that the previously
entered user ID and password can be reused.
b) As much of the required data as possible should be copied onto the portable
computers in order to keep network use to a minimum.
c) User IDs should be shared among multiple users so that unauthorized access can be
detected easily.
d) One-time passwords should be used to allow access to the office server from a
remote location.
d