Oct 2012 Flashcards
When three balls are picked out consecutively from a box containing three white balls
and four black balls, which of the following is the lowest probability?
a) Probability of picking out the balls in order of black, black, black
b) Probability of picking out the balls in order of black, black, white
c) Probability of picking out the balls in order of black, white, black
d) Probability of picking out the balls in order of white, black, black
a
- As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five squares that are black or white.
2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■
A white square indicates 0, and a black square indicates a different positive value that
is determined depending on the position of the square. When the sum total of the
values of the five squares shows a decimal number, which of the following is the
numeric value that is represented by ■■□□□?
a) 12
b) 20
c) 24
d) 30
c
3.) There exist fourstates numbered 1 through 4. The four states are connected as shown
in the figure below, and the state transition occurs in a clockwise or counter-clockwise
direction.
When HTML is used to describe a Web page, which of the following is an appropriate
point to be noted?
a) HTML and browser specifications are standardized for each PC manufacturer.
Therefore, in order to display a Web page correctly, it is necessary to describe it for
each type of PC.
b) Even if the HTML description is the same, a Web page may be displayed differently
depending on the browser used. Therefore, when a Web page is described, it is
necessary to confirm how it is displayed by each browser.
c) HTML is standardized for each browser used. Therefore, in order to display a Web
page correctly, it is necessary to describe it for each browser.
d) HTML descriptions including sound and video differ depending on the browser.
Therefore, in order to support all browsers, it is necessary to describe a Web page
using only characters and still images.
b
Which of the following is an appropriate explanation of Java?
a) It is an interpreter-type object-oriented language developed in the 1970s and
includes an integrated development environment with editor and debugger as well as
OS functions.
b) It incorporates object-oriented concepts, such as class and inheritance, into the
programming language C, and has upper compatibility with C.
c) It is a markup language used on the Web and describes the document structure by
using tags. It enables the creation of hypertext that links text, movies, etc.
d) It is an object-oriented language, and source code is compiled into a format called
bytecode that can be executed on a JVM (Java Virtual Machine).
d
Which of the following is the markup language that easily enables transaction data to
be issued as vouchers as-is or converted into in-house documents in
business-to-business transactions using the Internet?
a) HTML
b) SGML
c) UML
d) XML
d
- “CPU clock frequency: 1 GHz” is described in a PC catalog. This indicates that a
CPU runs with a signal of one billion (i.e., 109
) cycles per second. Which of the
following shows one cycle of a square wave?
When a streamer is used at a data transfer rate of 500 KB/sec, how many minutes are
needed to back up 1 GB of data?
a) 2
b) 3
c) 20
d) 33
d
Which of the following is a standard for the interface of a wireless connection such as a
wireless link between a PC and peripheral devices?
a) Bluetooth
b) IEEE 1394
c) PCI
d) USB 3.0
a
When a peripheral device is connected to a PC, which of the following is the function
that is used to automatically install and configure the corresponding device driver into
the system?
a) Auto-complete
b) Slot-in
c) Plug-and-play
d) Plug-in
c
Which of the following is an appropriate characteristic of RAID 1 (mirroring)?
a) The availability of data is increased by simultaneously writing the same data into
two or more hard disks.
b) Two or more hard disks are connected together as a single virtual hard disk drive
that has the total capacity of those disks.
c) By dividing data into multiple pieces and writing them into two or more hard disks
in parallel, the writing speed is increased.
d) By writing the divided data and the parity information for error corrections into three
or more hard disks, the availability of data and the writing speed are increased.
a
Among RASIS (Reliability, Availability, Serviceability, Integrity, and Security), which
of the following is an explanation of availability?
a) Effectively determining, diagnosing, and repairing problems in a computer system
b) Calculating the average repair time of a computer system
c) Maintaining a computer system so that it is ready for use at any time
d) Taking preventive measures so that a computer system is not damaged or data is not
stolen by unauthorized access
c
Which of the following is an appropriate description concerning the hardware
maintenance of a system?
a) The hardware device that has not failed for a certain period of time is excluded from
the coverage of scheduled maintenance.
b) It is safe to replace the failed hardware device with the latest model rather than the
same model, because compatibility is guaranteed.
c) Scheduled maintenance is performed for the hardware device that has failed before.
d) In preventive maintenance, measures are taken before a failure occurs.
d
Which of the following is a small application program that is automatically
downloaded along with a Web page in response to a client request and is executed on a
Web browser?
a) Applet
b) Servlet
c) Script
d) Thread
a
15.) There exists a system that controls access to personnel files by using the attributes of
each individual and the group to which the individual belongs. When the attributes
for the personnel department and its four members meet the conditions below, which of
the following is an appropriate combination that shows the number of members who
can read the files and the number of members who can update the files?
Which of the following is an appropriate description concerning the data format of
CSV?
a) It can record not only text and numerical data but also expressions and format
information. A tab is used as a delimiter between data.
b) It records text and numerical data as well as other information that consists of only
several types of control characters including a newline character. A space, a colon,
or a semicolon is used as a delimiter between data.
c) It uses a comma as a delimiter between text and/or numerical data, and a new line
character as a delimiter between records. Text data is often enclosed by quotation
marks.
d) It can record not only text data but also other data such as images and Java applets.
A command called a tag is often inserted between data entries.
c
Which of the following is a system that provides an environment to promote working
partnerships and to support joint activities among the members of an organization?
a) Groupware
b) Group dynamics
c) Collaboration
d) Workflow
a
Which of the following is an appropriate description concerning the use of OSS (Open
Source Software)?
a) OSS users have an obligation to pay the developer the fee for the software.
b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.
c) OSS cannot be used in the field of genetic research.
d) Software derived from the published OSS can be made available as OSS.
d
If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of
the following is a phenomenon that can occur?
a) Viruses cannot be detected.
b) Data cannot be written correctly.
c) Data cannot be read correctly.
d) Stored data cannot be read quickly
d
Which of the following is a mechanism that allows a user to have access to several
permitted servers and applications once the user is authenticated?
a) Single sign-on
b) Smart card
c) Biometric authentication
d) One-time password
a
Which of the following is a purpose of using a database management system?
a) To enable users to access data even when there is no OS available
b) To eliminate the need for backups created in preparation for disk failures
c) To encrypt data to be transmitted over a network
d) To enable multiple users to share information while maintaining data integrity
d
The response time of an inventory management system that uses a relational database
has recently become slow. An investigation reveals that when the system was initially
created, there was no problem with response time, and after that, addition and deletion
of product data was repeatedly performed on the database. Which of the following is
the most effective way to improve the response time of the database?
a) Upgrading the CPU of the database server
b) Extending the index area of the database
c) Defragmenting the database
d) Increasing the number of hard disks that store the database
c
23.) There exist two tables Airport and Schedule as shown below. Which of the following
is the available flight that departs from Airport F and arrives at Airport K at the earliest
time?
24.) In the description below concerning the transaction processing of a database, which of
the following is an appropriate combination of terms to be inserted into blanks A and
B?
When multiple users attempt to update the same data simultaneously, a mechanism for
temporarily limiting access to the data in order to maintain its integrity is called
A . One method for implementing this mechanism is to place a B
on data before it is updated and to prevent other users from accessing the same data
until the process is completed.
Which of the following is the most appropriate description concerning a VPN that is
used to connect a PC to a network installed in the workplace from outside via the
Internet?
a) It provides several lines for connecting to the Internet and improves availability.
b) It guarantees the maximum delay time by controlling the timing of transmission.
c) It guarantees a minimum bandwidth by compressing the communication data.
d) It performs highly secure communications by using authentication and encryption of
the communication data.
d
Which of the following is the unit that represents the data transmission speed in a
network?
a) bps
b) fps
c) ppm
d) rpm
a
Which of the following is an appropriate description concerning protocols?
a) HTML is a protocol for sending and receiving Web data.
b) HTTP is a protocol for monitoring a network.
c) POP is a protocol for operating a computer located at a remote site.
d) SMTP is a protocol for sending e-mail.
d
In the Internet, IPv6 is coming into use in addition to IPv4 that has been used as a
communications protocol. Which of the following is an appropriate explanation of
IPv6?
a) An IPv6 network cannot coexist with the IPv4 network and therefore needs to be
constructed as an independent network.
b) The bit length of an IP address is four times as long as that of IPv4, and the risk of
IP address exhaustion can be avoided.
c) An IP address consists of character strings that are a host name and a domain name,
not numeric values.
d) A cryptography communications function is not supported, and encryption and
decryption are performed by a higher level protocol.
b
Which of the following is an appropriate measure to avoid a shortage of total mailbox
capacity in the mail server?
a) Setting an upper limit for each user’s mailbox capacity
b) Implementing mirrored disks on the mail server
c) Making a backup copy of the mail data
d) Sending large e-mails all at once during hours when they do not adversely affect the
transmission of other e-mails
a
Which of the following is an appropriate explanation of the keylogger that is a threat to
information security?
a) Stealing information by watching the keyboard input and the display screen from
behind a PC user
b) Monitoring the keyboard input on a user’s PC by running a mechanism that can
record such input
c) Analyzing a password by using dictionary data that contains words likely to be used
as a password
d) Searching for a free access point by moving around a town with a PC that can detect
the electromagnetic waves of a wireless LAN
b
Which of the following is an appropriate explanation of an information security policy?
a) Once an information security policy is established, it should not be changed even
when the business environment or technology makes any changes.
b) The approach to organizational activities concerning information security is shown
and published after the management approval of the organization.
c) Stockholders and the general public are widely informed of activities to be
emphasized for the expansion of a security business.
d) Specific security policies are described based on the security concepts of the
organization.
b
Which of the following is the most appropriate explanation of phishing?
a) A computer infected with a virus is operated illegally from an external location via a
network such as the Internet by using the functions of the virus.
b) A false e-mail is sent, in order to lead the recipient to a fictitious Web site or to a
fake of an existing Web site, and then to illegally obtain personal information.
c) When user’s data entered in a Web page is displayed as is, a malicious script is
embedded in the page in order to illegally obtain the information about another user
who accesses the page.
d) A resident program is placed on a PC without the knowledge of the users in order to
illegally obtain data in files or information about PC operations.
b
Which of the following is an appropriate explanation of “availability” in information
security?
a) The system operation and output results are as intended.
b) The information is accurate and is not falsified or destroyed.
c) A permitted user can access information when needed.
d) No information is disclosed to a process that is not permitted.
c
Which of the following is an appropriate concept concerning the information security
policy?
a) The cost of measures should preferably be the same for all types of information
assets.
b) The information security policy, which is the top-level component of the ISMS
(Information Security Management System) policy, should be disclosed only to top
management and other executives.
c) The information security policy should be applied to all employees including
part-time workers and full-time employees.
d) When an information security policy is created for the first time, it is desirable to
use a similar policy of another company in the same industry as a sample and adopt
as much of that policy as possible without change.
c
Which of the following is the most appropriate description concerning SSL?
a) It generates a one-time password to authenticate a user on a Web site.
b) It encrypts all communications between a Web server and a browser.
c) It prevents (or filters) access to an unauthorized Web site.
d) It detects a virus that infects a computer through a network.
b