Oct 2013 Flashcards
- As shown in the figure below, there exists a process of converting each character of a
character string in accordance with the conversion table. When the result of
performing such a conversion is “0110001010”, which of the following is the character
string before conversion?
- As shown in Figure 1, there is a processing unit which reads two positive input values
A1 and A2, and then writes two output values B1 and B2. B1 is equal to A2, and B2 is
the remainder of A1 divided by A2. In Figure 2, two processing units with the same
function as the above are connected in series. When A1=15 and A2=6 are given to
the left-hand unit in Figure 2, what is the output value of B2 for the right-hand unit?
Among the items A through C described below about programming languages, which of
the following is the list that contains all of the appropriate items?
A: A program that is created using a machine language or an assembly language can
be executed without relying on a particular CPU.
B: A program that is converted using a compiler is finally translated into a machine
language and then executed.
C: A high-level programming language with rules similar to human languages makes
it possible to develop programs with complex calculations that cannot be executed
using a machine language.
a) A
b) A, C
c) B
d) B, C
c
Which of the following can be created using HTML?
a) Web browser
b) Web page
c) Cookie
d) SQL program
b
Which of the following is the method for describing the logical structure of a sentence in
XML?
a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)
b) Separating the sentence, clauses, and other elements by using commas
c) Enclosing the sentence, clauses, and other elements by using tags
d) Separating the sentence, clauses, and other elements by using tabs
c
Which of the following is an appropriate description of a characteristic of hypertext
written in HTML?
a) Text information is handled, so image files cannot be linked.
b) The user must return to the highest hierarchical level before jumping to another text.
c) Links have bidirectional information, so the user can be free to jump between texts.
d) The user can jump to another text, file, or website by clicking a link.
d
Which of the following is a method of writing the same data to multiple hard disks
simultaneously and improving reliability rather than performance?
a) Striping
b) Paging
c) Interleaving
d) Mirroring
d
Which of the following is a storage device or medium that is based on semiconductor
memory technology?
a) CD-ROM
b) DVD-RAM
c) BD
d) SSD
d
Which of the following is a type of software that is provided for each PC peripheral and
works as an intermediary between an OS and a specific peripheral so that application
programs can use such a peripheral?
a) Installer
b) Device driver
c) Device manager
d) Converter
b
Which of the following is an appropriate description concerning PnP used on a PC?
a) A feature to launch application programs from a remote site
b) A feature to set up peripherals automatically when connected
c) A feature to start up an OS automatically when powered on
d) A feature to run software developed for another OS
b
Which of the following is the most appropriate description concerning a characteristic
of RAID?
a) It increases the data transfer rate of each hard disk.
b) It provides a larger capacity than the total capacity of individual hard disks.
c) It provides better performance or reliability or both by using multiple hard disks.
d) It increases data access time because it needs to access multiple hard disks
c
Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership) that is a major factor when any purchasing decision is made for a system?
a) It is the sum of the operation and management costs incurred after the installation of
the system.
b) It is the sum of the costs required to troubleshoot software and hardware faults that
occur after the installation of the system.
c) It is the sum of the costs incurred during the installation of the system and the
operation and management costs incurred after the installation.
d) It is the sum of the costs incurred during the installation of the system in addition to
the planning phase of the system.
c
13.) When a computer system operates for 1,200 hours, the status of the normal operation
time and the repair time is shown in the table below. What is the value of MTTR
(Mean Time To Repair, in hours) of the system?
Which of the following is the most appropriate term that means the process of grouping
multiple files into one, for the purpose of making effective use of storage media or
promoting the efficiency of backup or distribution?
a) Archive
b) Aggregate
c) Bundle
d) Compile
a
Which of the following is the purpose of the virtual memory system that is known as
one of the functions provided by an OS?
a) To prevent an application program from accessing the protected area on main
memory used by the OS
b) To reduce electricity consumption during the idle state, by stopping the power
supply after data is written from main memory to external storage
c) To make it possible to execute a program even if the program requires more storage
capacity than main memory
d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory
c
Which of the following is the most appropriate explanation of a “multimedia authoring
tool”?
a) It is a tool that is used to create multimedia content by combining materials, such as
image, sound, and text, on the screen.
b) It is a tool that is used to play back multimedia content, such as image, sound, and
text, in the PC environment.
c) It is a tool that is used to search for multimedia information, such as image, sound,
and text.
d) It is a tool that is used to interactively define schema for multimedia database
containing information, such as image, sound, and text.
a
Which of the following is a unit that is used to represent “resolution”, one of the
performance indicators of a display or a printer?
a) bps
b) dpi
c) fps
d) psi
b
Which of the following is the concept representing a database that is built by extracting
and restructuring data from a mission-critical business system for the purpose of
supporting information analysis and decision making?
a) Data center
b) Data warehouse
c) Data mining
d) Data roaming
b
Which of the following is an appropriate purpose of normalizing data in a relational
database?
a) To guarantee data compatibility so that data can be shared between different types of
computers
b) To prevent the occurrence of redundancy or inconsistency of data when data is
updated
c) To identify characters that are not permitted to be sent when a database is used via a
network
d) To handle data storage areas distributed over multiple media as a single contiguous
storage area
b
- )When the order records shown below are entered in the system where each order
number must be uniquely defined, which of the following is the appropriate method for
searching the order master file containing all of the past order records, and for checking
the uniqueness of the order number?
In a system environment where several users have access to a database simultaneously, a
new user tries to view a data record while another user is updating the same record. In
order to assure data integrity in such circumstances, which of the following is an
appropriate control method that should be used in the DBMS?
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating process
d) Canceling the updating process to permit the new user to view the last record
c
Which of the following is an appropriate explanation of DNS?
a) It is a system that is used to search for a wide variety of information through the
Internet.
b) It is a system that is used to map between host names and IP addresses of devices
connected to the Internet.
c) It is a personal authentication system that is used to provide a safe and secure online
shopping environment.
d) It is a system that is used to manage personal e-mail addresses for the delivery of
e-mail messages.
b
When the Internet is accessed from an intranet, which of the following is the most
appropriate mechanism that can be used to relay access to the Internet, to speed up
access to it by caching Web content, and also to ensure security?
a) DMZ
b) Firewall
c) Proxy
d) Router
c
Which of the following is the most appropriate term that is used to indicate the location
of information on the Internet, and has the standardized format, such as
“http://www.ipa.go.jp/” ?
a) Address tag
b) Domain name
c) Home page
d) URL
d
Which of the following is an appropriate explanation of MIME used on the Internet?
a) It is a language that is used to describe hypertext on the Internet.
b) It is a hypertext transmission protocol between client and server on the Internet.
c) It is a method of address notation for uniquely identifying a resource on the Internet.
d) It is a standard of exchanging multimedia data, such as audio or video, by e-mail.
d
When ten e-mail messages are sent successively from Company A to Company B, they
may arrive at Company B in a different order from the order they are sent. Which of
the following is the most possible reason for this phenomenon?
a) There is a problem with the setup of Company A’s mail server.
b) There is a problem with the setup of Company B’s firewall for e-mail.
c) There is a possibility that e-mail delivered late is falsified on the way.
d) There is a possibility that each e-mail is sent via different transfer routes.
d
Which of the following is an appropriate description concerning cryptography?
a) The process of transforming the encrypted text back into its original plain text is
called reset.
b) In common key cryptography, the encrypted text is transmitted together with the
common key.
c) Public key cryptography uses two types of keys: a key for encryption and a key for
recovering the plain text
d) Common key cryptography that is also known as secret key cryptography is used for
digital signature.
c
Which of the following is a characteristic of a Trojan horse that is a type of malicious
program?
a) It is designed to infect a specific type of data file by using the macro function of
application software.
b) It sends out fake virus information, such as a warning message about a new type of
virus, through chain e-mails.
c) It performs self-propagation by sending copies of itself to other computers
connected through a network.
d) It masquerades as a legitimate file or helpful program with the purpose of
performing harmful operations.
d
Which of the following can be made possible by using a digital signature in
e-commerce?
a) Preventing an unintended third party from accessing any confidential file
b) Checking that a file is not infected with a virus or other malicious software
c) Protecting the content of a transaction from being leaked through wiretapping
d) Confirming the identity of a partner and the correctness of the details of a transaction
d
Which of the following is an appropriate method of managing user IDs for a
company’s in-house system?
a) Shared common user IDs rather than individually assigned IDs are helpful for the
reduction of system resources.
b) User IDs for retired employees are kept intact until removal is directly requested by
each person in question.
c) Registered user IDs and authority levels are regularly inspected from the viewpoint
of whether or not they are still needed.
d) When users are transferred, new access privileges are granted in addition to the
previously assigned access authority levels.
c
- ) When a PC is connected to an online shopping site on the Internet, the Web browser
displays the SSL padlock icon on the screen. Also, it is confirmed that the server
certificate is that of the operator of the intended online shopping site. Among the
items A through C described below on such an occasion, which of the following is the
appropriate combination of decisions to be made? Here, “√” means what can be
decided, and “ −” means what cannot be decided?
- )When a Web server is invaded from an outside source and its content is tampered with,
which of the following is the appropriate course of actions to be taken?
A document was received via e-mail as an attachment while at work. When the
document was opened by using a word processing program, it was abnormally
terminated. When the received e-mail or attached document is possibly contaminated
with a computer virus, which of the following is the most appropriate action to be
taken?
a) Disconnecting the PC from the network, and then removing the virus safely by
reinstalling the OS
b) Disconnecting the PC from the network, and immediately reporting to the person in
charge of the system management department
c) Checking whether the problem is reproducible, if necessary, by reinstalling the word
processing program
d) Sending an e-mail to all employees as soon as possible in order to alert them to the
virus infection
b
Which of the following is the most appropriate description concerning operational
management for user IDs and passwords?
a) In order to simplify management work, currently unused user IDs and passwords are
allowed to be reused.
b) In order to respond to problems promptly, a table of user IDs and passwords are
created and stored by administrators.
c) In order to prevent someone from maliciously using another person’s ID and
password, users are free to change their own passwords at any time.
d) In order to improve convenience, personnel relocation information is used to register
temporary user IDs and passwords in advance.
c
Which of the following is the most appropriate design policy for an output form?
a) The numeric items and the character items are classified into different groups, and
each group is separately placed on the top and bottom or left and right of the form.
b) In order to ensure consistency between forms, rules regarding the form design, such
as the title position and the layout of data items, are predetermined.
c) All data items, including both numeric and character items, are printed with either
right or left justification.
d) The data items are arranged so that the program can be understood and maintained
as easily and simply as possible.
b