Oct 2015 Flashcards
When three balls are picked out consecutively from a box containing three white balls
and four black balls, which of the following is the lowest probability?
a) Probability of picking out the balls in order of black, black, black
b) Probability of picking out the balls in order of black, black, white
c) Probability of picking out the balls in order of black, white, black
d) Probability of picking out the balls in order of white, black, black
a
When the six characters a, b, c, d, e, and f are arranged in a row in any arbitrary order,
in how many ways can a and b be placed side-by-side?
a) 120
b) 240
c) 720
d) 1,440
b
As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five squares, each of which is either black or white.
2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■
A white square indicates 0, and a black square indicates a different positive value that
is determined by the position of the square. When the sum of the values of the five
squares shows a decimal number, which of the following is the numeric value
represented by ■■□□□?
a) 12
b) 20
c) 24
d) 30
c
There is a standard that can represent data in a hierarchical structure by enclosing data
that corresponds to attribute N with the tags <N>, which means the start, and </N>,
which means the end, and then linking and nesting these tags. Company A decides to
comply with this standard and create a paper by using the structural rules (1) through (3)
below. Which of the following is the appropriate header of a paper named “New
Document Management” that is created by Jack Smith of the Information Systems
Department (I/S Department) in accordance with this standard and the structural rules?
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.
a) <header>
<author></author>
<title>New Document Management
<name>Jack Smith</name><dept>I/S Department</dept>
</title>
</author info>
</header>
b) <header>
<title>New Document Management</title>
<author><name>Jack Smith</name></author info>
<dept>I/S Department</dept>
</header>
c) <header>
<title>New Document Management</title>
<author>
<name>Jack Smith</name><dept>I/S Department</dept>
</author info>
</header>
d) <header>
<title>New Document Management</title>
<name>Jack Smith
<author><dept>I/S Department</dept></author info>
</name>
</header>
</author></name></header></author></header></author>
c
Which of the following is an appropriate description concerning EUC (End User
Computing)?
a) As EUC is widely spread, information systems departments in companies come to
have large backlogs in software development.
b) EUC is characterized with system construction and operations management by end
users without using software packages at all.
c) To support EUC, training in programming languages such as COBOL, C, and Java is
important, and it is a key role of information systems departments.
d) In order to achieve EUC, it is necessary to provide training to end users in PCs or
commercially available applications, and also to select easy-to-operate development
tools and provide training in those tools.
d
Which of the following is an appropriate characteristic of tree data structure?
a) Data elements can be retrieved by traversing a hierarchy of nodes from higher level
nodes to lower level nodes.
b) Data elements can be retrieved in the order in which they are stored.
c) Data elements can be retrieved in the reverse order to the order in which they are
stored.
d) Data elements can be retrieved by traversing cells composed of a data field and a
pointer field.
a
Which of the following is an appropriate explanation of Java?
a) It is an interpreter-type object-oriented language developed in the 1970s and
includes an integrated development environment with editor and debugger as well as
OS functions.
b) It incorporates object-oriented concepts, such as class and inheritance, into the
programming language C, and has upper compatibility with C.
c) It is a markup language used on the Web and describes the document structure by
using tags. It enables the creation of hypertext that links text, movies, etc.
d) It is an object-oriented language, and source code is compiled into a format called
bytecode that can be executed on a JVM (Java Virtual Machine).
d
Which of the following is an appropriate description concerning the usage of HTML
(Hyper Text Markup Language) tags?
a) <label> is used to define the title of a Web page.</label>
b) <BODY> is used to describe the text of a Web page.
c) <big> is used to specify the size and style applied to each character in a Web page.</big>
d) <FORM> is used to divide a Web page into multiple frames.
b
Which of the following is an appropriate description of a multi-core processor?
a) An improvement in the throughput of the entire system is aimed at by
simultaneously executing different processing in each core.
b) An improvement in the reliability of the processing result is aimed at by executing
the same processing in several cores.
c) Several cores are controlled by hardware alone, and the OS is not required to have a
special function.
d) The throughput of the processor depends only on the number of cores, and does not
depend on the clock frequency.
a
Which of the following is required for an application program to use the peripheral
equipment that is connected to a PC?
a) Compiler
b) Device driver
c) Plug and play
d) Hot plug
b
Which of the following is a standard for wireless communication between a PC and
peripheral devices?
a) Bluetooth
b) IEEE 1394
c) PCI
d) USB 3.0
a
Which of the following is an appropriate explanation concerning the cache memory of a PC?
a) It is placed between the CPU core and main memory, and is used to read and write
data at high speed.
b) It is used to store the same data in two locations at the same time in order to improve
reliability.
c) It is equipped with a mechanism that can run even a program whose size exceeds the main memory capacity.
d) It enables simultaneous access to main memory blocks by dividing main memory
into multiple blocks.
a
Q13. When information processing systems are classified by their processing methods as
shown in the figure below, which of the following is an explanation of a horizontal
load distribution system?
Q14. Among the system configurations shown below, which of the following has the lowest
probability of the entire system stopping on a failure? Here, represents an
identical device. For the entire system to work, at least one device must be running
when the devices are connected in parallel, and all devices must be running when the
devices are connected in serial.
Which of the following is an appropriate description concerning the hardware
maintenance of a system?
a) The hardware device that has not failed for a certain period of time is excluded from
scheduled maintenance.
b) It is safe to replace a failed hardware device with the latest model rather than the
same model, because
compatibility is guaranteed.
c) Scheduled maintenance is performed only for the hardware device that has failed
before.
d) In preventive maintenance, measures are taken before a failure occurs.
d
Which of the following is the most appropriate purpose of installing a business
application software package instead of self-developed application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire knowledge of software development methods
d) To improve the skills of application developers
b
When the log file on a Web server is analyzed in daily system administration, which of
the following can be found?
a) Web pages accessed by Web site visitors
b) The model name of a computer used by each visitor
c) The speed of a Web browser on each visitor’s computer
d) Personal information about individual Web site visitors
a
If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of
the following can occur?
a) Viruses cannot be detected.
b) Data cannot be written correctly.
c) Data cannot be read correctly.
d) Stored data cannot be read quickly
d
In theory, what color is printed by a printer, when cyan, magenta, and yellow are mixed
together by a subtractive color mixture?
a) Blue
b) Red
c) Black
d) Green
c
Which of the following is an appropriate explanation of MP3, which is used as a
multimedia file format?
a) File compression format for G4 facsimile communication data
b) File compression format for audio data
c) File compression format for color image data
d) File compression format for digital video data
b
Which of the following effect is obtained by normalizing the tables of a relational
database?
a) The number of disk accesses for data update is reduced by compiling frequently
used data in the same table.
b) Data inconsistency due to data update is prevented by eliminating data duplication.
c) The usage efficiency of the main memory is improved by making the size of the
tables uniform.
d) Response time for queries is shortened by reducing the number of tables
b
Which of the following is a purpose of using a database management system?
a) To enable users to access data even when there is no OS available
b) To eliminate the need for backups created in preparation for disk failures
c) To encrypt data to be transmitted over a network
d) To enable multiple users to share information while maintaining data integrity
d
Q23. There is a system for entering and managing orders from customers. Sequential order
number is printed on each order form in the order of arrival unless the form has any
mistakes such as missing information. Before the order form shown below is entered
into the system, which of the following should be checked so as not to enter duplicated
order data?
Order data
Order number | Order date | Product code | Quantity | Customer code
a) Customer code
b) Product code
c) Order number
d) Order date
c
Q24. )
In a company which has its offices dispersed in several buildings, it is decided to
construct a relational database to manage the locations where PCs are installed.
“Asset” table, “Room” table, and “Building” table are created, and these tables are
linked. When new data is entered, data in the table to be referenced should exist
beforehand. Which of the following is the appropriate sequence of entering data into
each table? Note that the underlined items in each table indicate the primary keys or
the foreign keys.
A DHCP server has been installed in a LAN. When a PC that automatically acquires
information from the DHCP server is to be connected to the LAN, which of the
following will be set in the PC?
a) IP address
b) Latest virus definition file
c) Address list of spam mail
d) Mail addresses assigned by the provider
a
Which of the following is the unit of the data transmission speed in a network?
a) bps
b) fps
c) ppm
d) rpm
a
Which of the following is an appropriate explanation concerning the function of a
router?
a) It optically reads pictures and texts and converts them into digital data.
b) It converts analog signals to digital signals and vice versa.
c) It controls the communication path of data and relays data across networks.
d) It archives and provides Web page data via networks
c
Which of the following is appropriate for the description of Bcc recipients of an
e-mail?
a) The e-mail is automatically encrypted before being sent to Bcc recipients.
b) The text is deleted from the e-mail and an e-mail containing only the subject is sent
to the Bcc recipients.
c) The Bcc addresses are not revealed to other recipients of the e-mail.
d) The destination specified in Bcc is the notification destination when a delivery error
occurs
c
Which of the following is an appropriate example of biometric authentication?
a) Authentication is performed by a password that is known only to the person
concerned.
b) Authentication is performed by an identification card that belongs only to the person
concerned.
c) Authentication is performed by using the fingerprints of the person concerned.
d) Authentication is performed by using a one-time password.
c
Among the handling of a smartphone, which of the following is inappropriate from the
viewpoint of security?
a) The smartphone data, which would cause a problem if it were deleted, is encrypted
and stored at a location separate from the smartphone.
b) Since a smartphone may also be infected by a virus, antivirus software is installed.
c) Since a smartphone is in its highest state of security when it is purchased, it is used
without updating the OS.
d) When a smartphone is lost, remote lock and remote wipe is performed.
c
Among information security measures A through D implemented in the workplace to
maintain the “confidentiality” and “integrity” of information, which of the following is
a list of only the appropriate measures?
A: PCs should remain unlocked to keep them ready for operation from the start to
the end of the business day.
B: Documents and electronic storage media, such as CD-R containing important
information, should be stored in locked cabinets except when they are used.
C: Documents sent or received by facsimile should be picked up immediately
without being left unattended on the tray.
D: Messages or information written on the whiteboard should be erased
immediately after use.
a) A, B
b) A, B, D
c) B, D
d) B, C, D
d
Which of the following is the term that is used for the drawbacks and defects that may exist in computer systems or networks and can be exploited for unauthorized
accesses?
a) Incidents
b) Security holes
c) Hacking
d) Forensics
b
A new system is required to operate 24 hours a day, 365 days a year. Which of the
following is the development phase that involves making such a decision?
a) Software acceptance
b) Testing
c) Programming
d) Requirements definition
d
A system migration plan was created for the switch from an existing system to a new
system. Which of the following is an appropriate item to be described in the system
migration plan?
a) System selection policy
b) Schedule for parallel operation of the old and new systems
c) Evaluation criteria for the quality of the deliverables
d) The work history of project members
b
Among the descriptions A through D below, which of the following is the list that
contains all items that are to be considered in the design of easy-to-use user interface
for system users?
A: The time to recover from a failure
B: The ease of learning methods of operation
C: The layout of pushbuttons
D: The size and color of text
a) A, B, C
b) A, B, D
c) A, C, D
d) B, C, D
d