Oct 2014 Flashcards
Which of the following is an appropriate description concerning the relationship that
always holds for two sets A and B? Here, “X Y” represents the intersection (i.e.,
product set) of X and Y, and “X Y ” represents the union set of X and Y.
a) “A B” is a subset of the set other than A.
b) “A B” is a subset of A.
c) “A B” is a subset of “A B”.
d) “A B” is a subset of A
b
Q2.)
As shown in the table below, columns A and B contain all possible combinations of
numbers 0 through 9, and the table has 100 rows in total. When all the rows where the
value in column A is equal to or less than the value in column B are removed from the
table, how many rows remain in the table?
When the decimal to binary conversion is performed, which of the following is a decimal
number that can be represented in the finite number of bits?
a) 0.1
b) 0.2
c) 0.4
d) 0.5
d
When an analog audio signal is digitized and converted back to analog again, which of
the following is the combination that can generate a signal waveform most closely
approximating the original wave?
Sampling cycle | Number of quantization levels
a) Long | Many
b) Long | Small
c) Short | Many
d) Short | Small
c
Q5.)
A stack is a first-in last-out data structure. By using the stack, a device changes the
order of data received from the right side and sends it to the left side, as shown in the
figure below. There are three types of operations available on the device, as described
below.
(1) Data received from the right side is sent to the left side without any alteration.
(2) Data received from the right side is pushed into the top of the stack.
(3) Data popped out of the top of the stack is sent to the left side.
When the device receives X, Y, and Z in this order from the right side, which of the
following is the order in which the device cannot send them to the left side even if the
operations (1) to (3) are combined?
CGI (Common Gateway Interface) is an interface to the Web server from a particular
program that is executed in response to a request from a client. Which of the following
is a script language that can be used to write such a program executed via CGI?
a) Perl
b) Postscript
c) SGML
d) SQL
a
Which of the following is the language that enables the user to define and use tags
enclosed by angle brackets (“<” and “>”) specifying the structure and other aspects of a
document, in order to accomplish the intended purpose?
a) COBOL
b) HTML
c) Java
d) XML
d
Which of the following is a file that is used to store information before and after database
updates and also used to recover from a database failure?
a) Backup file
b) Index file
c) Journal file
d) Snapshot file
c
Which of the following is an appropriate characteristic of an HDD (Hard Disk Drive) that
is used as an auxiliary storage device?
a) The read/write speed of an HDD is slower than that of a CD-ROM drive.
b) An HDD can be used as main memory as well as auxiliary storage.
c) Electric power must always be supplied to an HDD in order to retain data.
d) Data can be read and written to and from an HDD in a direct (or random) access
manner.
d
Which of the following is a dedicated memory module that is used to retain data, such as
characters and graphics, to be displayed on a computer screen?
a) Cache memory
b) Flash memory
c) Video memory
d) Virtual memory
c
Which of the following is the most appropriate description concerning a multi-core
processor?
a) Several microprocessors are installed in a single PC in order to improve the reliability
of the PC by performing the same processing simultaneously in each processor.
b) A quad core processor has four times as much processing power as a dual core
processor, if each core is equipped with the same arithmetic and logic unit.
c) The clock frequency of a processor is temporarily increased according to the load of
processing, and as a result, high-speed processing can be achieved.
d) A single processor has multiple processing circuits that can perform different
arithmetic operations in parallel in order to enhance the performance of the processor.
d
Which of the following is the unique value that is sequentially assigned to a memory
location in order to identify the location of instructions or data stored in the main memory
of a computer?
a) Address
b) Counter
c) Index
d) Pointer
a
Which of the following is a technical term that refers to a dedicated file server that can be
connected directly to a LAN and shared among several client computers?
a) NAS
b) RAID
c) SAN
d) SSD
a
Q14. Which of the following is an explanation concerning the reliability index that is
calculated by the expression below?
MTBF
_______
MTBF+MTTR
a) Average amount of time between system failures
b) Average amount of time necessary to recover from a system failure
c) Proportion of the time available for system operations to the total time
d) Proportion of the downtime of a system to the total time
c
Which of the following is the most appropriate description concerning the benchmark test
that is used as a method for the evaluation of a system?
a) The availability of a system is evaluated as a proportion of the time that the system is
normally operable.
b) The processing power of a system is evaluated by means of a set of standard programs
and data.
c) The reliability of a system is evaluated with the average time between inherent failures
of a system.
d) The maintainability of a system is evaluated with the average time to fix and restore
the system.
c
Which of the following is an appropriate explanation concerning a deadlock?
a) It is a state in which the processes of a computer are prohibited from getting
intentional or accidental access to information that usually must not be accessed.
b) It is a state in which, if the authentication of a user fails more than the limited number
of times, the user is prohibited from accessing the computer.
c) It is a state in which, when shared resources are exclusively used, two processes are
endlessly waiting for each other to release the lock of a shared resource.
d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.
c
Which of the following is an appropriate description concerning the virtualization of a
server?
a) A technique for virtually creating computer-generated worlds or immersive
environments that users can interact with
b) A technique for virtually operating the GUI of a remote computer connected via a
network by using a local computer
c) A technique for virtually implementing and operating two or more computers on a
single computer
d) A technique for virtually allocating more memory space than the capacity of main
memory by using a particular part of auxiliary storage
c
Which of the following is an appropriate description concerning file management under
UNIX?
a) No removable storage media, such as CD-ROM, can be allocated to a directory, so it is
directly accessed by specifying the drive name.
b) Files are managed in a directory tree for each drive, and at first, the drive where the
target file is located is determined when the file is searched for.
c) The entire file system is managed in a single directory tree, and remote files via a
network are also allocated and accessed in the directory.
d) A home directory can be referenced by its owner only, and cannot be used when a file
is shared by multiple users.
c
Which of the following is the most appropriate description concerning Java applet?
a) It is integrated into a client as add-in software and executed on the client.
b) It is downloaded from a server to a client and executed on the client.
c) It is executed in cooperation with an HTML document on a server.
d) It is executed without compiling the source code.
b
When a digital color image with a color depth of 24 bits per pixel is stored in graphics
memory, approximately how many megabytes of memory are required at a minimum to
display the image on a screen of 1,024 horizontal pixels by 768 vertical pixels? Here,
one megabyte is 106 bytes.
a) 0.8
b) 2.4
c) 6.3
d) 18.9
b
Which of the following is a technique that can be used to compress both video and audio
data?
a) BMP
b) GIF
c) JPEG
d) MPEG
d
Which of the following is represented by an E-R diagram that is used for the design of a
relational database?
a) The state transition of a system that changes according to some factors, such as time
and events
b) The relationship between the input data, output data, and functions (i.e., processes) of
a system
c) The relationship between entities, such as humans, objects, places, and events, which
constitute the target world
d) The movement of business processes illustrated with the attention focused on the flow
of data
c
Q23. ) In the description below concerning a relational database, which of the following is an
appropriate combination of technical terms to be inserted into blanks A and B?
In a relational database, information for uniquely identifying each individual record
(i.e., row) is called A , and tables are related to each other with a particular
B .
A B
a) an entity field
b) an entity record
c) a primary key field
d) a primary key record
Among the primary key, foreign key, and index that are set in the tables of a relational
database, which of the following is the list that contains all the items where multiple units
of each item can be set for a single table?
a) Index
b) Foreign key, index
c) Primary key
d) Primary key, foreign key, index
b
Q25. Which of the following is the relational operation that extracts only the rows of a product
whose price is 10 dollars or more, from the “Product” table of the relational database
shown below?
Product
Product number Product name Price (dollars)
S001 Scissors 20
S002 Pencil 5
S003 Notebook 12
S004 Eraser 8
S005 Ruler 15
a) Join
b) Projection
c) Selection
d) Union
Which of the following is an appropriate description concerning IPv6?
a) A larger number of addresses than IPv4 can be assigned because of a 128-bit address.
b) IPv6 and IPv4 cannot co-exist in the same single LAN.
c) IPv6 is a dedicated protocol for a wired LAN, and cannot be used for a wireless LAN.
d) An optical fiber cable rather than a regular twisted pair cable is required to use IPv6.
a
Which of the following is an appropriate role of the NTP (Network Time Protocol) that is
used in a TCP/IP network?
a) Delivering synchronized video and audio data via network in real time
b) Synchronizing the time between devices connected to a network
c) Providing proof that a file existed at or before a certain time
d) Changing the encryption key after a fixed period of time in a wireless LAN
b
Which of the following is the most appropriate description concerning WAN?
a) High-speed communication is enabled with the help of a wide frequency bandwidth
available for data communications using ADSL, optical fiber, etc.
b) All information terminals and devices are connected via diverse wired or wireless
networks, and various services can be used at any time and from any location.
c) Electric waves are used in place of metal cables or optical fiber cables to construct a
WAN infrastructure.
d) The network service of a telecommunications carrier is used to connect geographically
separated LANs, such as those for the headquarters and branch offices.
d
In the environment of a wireless LAN, which of the following is an appropriate
description concerning ESSID that is set in the access point and terminal?
a) It is a character string used as a key for encrypted communication.
b) It is a type of algorithm used for encryption and decryption.
c) It is a channel number for electromagnetic waves used in the wireless LAN.
d) It is a character string used to identify the network of a wireless LAN.
d
Which of the following is an appropriate explanation concerning a router that is used as a
network device?
a) It is used to interconnect a LAN and a telephone line, and perform data modulation
and demodulation.
b) It is used to interconnect the terminals of LAN, and analyze the MAC address of the
received data in order to transfer it to the destination terminal.
c) It is used to interconnect the terminals of LAN, and transfer the received data to all
terminals.
b) It is used to interconnect LANs and/or WANs, and analyze the IP address of the
received data in order to transfer it to the appropriate network.
d
In an organization under the operation of an ISMS, the fact that the retired persons’ IDs
are deleted in a batch at the end of the month is reported during an audit. Among the
four steps of the PDCA cycle in the ISMS, which of the following is the step where the
corrective action plan is implemented so that such a deletion is performed each time a
person retires?
a) P
b) D
c) C
d) A
d
In terms of information security, which of the following is an incident where availability
is compromised?
a) A system stops because of the occurrence of a power failure.
b) A file is accessed by an unauthorized user because of some wrong privilege settings.
c) Data of a transaction with a customer is leaked because of unauthorized access.
d) Data is updated erroneously because of a bug in a program.
a
Q33. )
The right of access to the file aaa is set as shown in the table below. When it is
necessary for user B to create another file bbb by copying the file aaa, which of the
following is the most appropriate description concerning the right of access to the file
aaa?
Which of the following is the name of a malicious program that infects multiple
computers and simultaneously makes an attack, such as a DDoS attack, when a command
is received from an attacker who is in a remote location?
a) Bot
b) Honey pot
c) Macro virus
d) Worm
a