Oct 2016 Flashcards
Which of the following is obtained by multiplying the binary value 10110 by three?
a) 111010
b) 111110
c) 1000010
d) 10110000
c
2.)
Which of the following is a search condition for the black area of the Venn diagram
shown below?
Q3. In the sales campaign for a certain product, a full-page advertisement is run a total of
three times in three magazines A, B, and C. When the effects expected from running
a full-page advertisement zero to three times in each of the magazines are as shown in
the table below, how many times should the advertisement be run in magazine A to gain
the largest possible effect? Here, the effects of the advertisements placed in the
individual magazines are independent of one another, and the effects from multiple
magazines can be calculated by simply adding the individual effects
Which of the following is an appropriate explanation of an algorithm that is used on a
computer?
a) A generic term for artificial languages used to enable a computer to perform a series
of operations
b) A processing procedure for enabling a computer to accomplish a specific purpose
c) Designing of buildings or industrial products with the assistance of a computer
d) Software for translating a program into a machine language that can be directly
executed by a computer
b
Which of the following is an appropriate description concerning HTML?
a) It is a markup language that can specify the logical structure and layout of a Web page
by using tags.
b) It is a script language that can describe the program or processing steps executed on a
browser.
c) It is a communication protocol that is used between a browser and a Web server.
d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.
a
Which of the following is the method for describing the logical structure of a sentence
in XML?
a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)
b) Separating the sentence, clauses, and other elements by using commas
c) Enclosing the sentence, clauses, and other elements by using tags
d) Separating the sentence, clauses, and other elements by using tabs
c
Which of the following is an appropriate explanation of Java?
a) It is an interpreter-type object-oriented language developed in the 1970s and includes an integrated development environment with editor and debugger as well as OS functions.
b) It incorporates object-oriented concepts, such as class and inheritance, into the
programming language C, and has upper compatibility with C.
c) It is a markup language used on the Web and describes the document structure by
using tags. It enables the creation of hypertext that links text, movies, etc.
d) It is an object-oriented language, and source code is compiled into a format called
bytecode that can be executed on a JVM (Java Virtual Machine).
d
Q8. There is a series of numbered boxes stacked as shown in the figure below. The
operations described in the table below are performed in the sequence of operations 1
through 4. When the operation 4 is completed, which of the following shows the status
of the stacked boxes?
Which of the following is an explanation of a hot plug?
a) A function that enables attachment or detachment of a peripheral device while PC
power remains on
b) Software that is installed afterwards in order to enhance the functions of application
software
c) A mechanism of supplying power from a PC to a peripheral device via a cable
connected to the peripheral device
d) A technique of executing a specific program and evaluating system performance on
the basis of the time taken for the processing
a
Which of the following is an appropriate description concerning clock frequency of
CPU?
a) The CPUs which have the same clock frequency are equal in performance, regardless
of whether they are 32-bit or 64-bit.
b) The CPU with higher clock frequency gives higher heat generation than others in the
same type of CPU, so heat dissipation becomes important.
c) Clock frequency and network transfer rate are in direct proportion when the machine
is connected to the network.
d) For a multi-core processor, the throughput does not depend on the clock frequency
b
Which of the following is an appropriate description concerning flash memory?
a) It is used as read-only storage once data is written.
b) No power supply is required to retain stored data.
c) It is not used for digital cameras because of the difficulty of downsizing.
d) Data is read or written using laser light.
b
Which of the following is a DVD in which users can write data, but cannot rewrite data?
a) DVD-R
b) DVD-RAM
c) DVD-ROM
d) DVD-RW
a
Concerning configuration methods A through C for systems that are composed of two
(2) sets of devices, which of the following is the list in ascending order, from left to right,
of service downtime that is caused by a fault of one of the two (2) sets?
A Dual system
B Duplex system (cold standby method)
C Duplex system (hot standby method)
a) Fault of one (1) device in A, Fault of the primary device in C, Fault of the primary
device in B
b) Fault of the primary device in B, Fault of one (1) device in A, Fault of the primary
device in C
c) Fault of the primary device in C, Fault of one (1) device in A, Fault of the primary
device in B
d) Fault of the primary device in C, Fault of the primary device in B, Fault of one (1)
device in A
a
Which of the following is an appropriate explanation of the hot standby system?
a) It is a system where a collection of various types of hardware, software, and data on the Internet is provided to the user.
b) It is a system where a high level of reliability can be obtained by simultaneously
operating the two sets of equipment and performing the same processing while cross-checking the results.
c) It is a system where a backup machine is always kept on standby in an operable state
and is immediately switched into operation at the occurrence of a failure.
d) It is a system where a backup machine is arranged, and at the occurrence of a failure,
the operator in charge starts up the backup machine to switch the production machine
to the backup machine
c
Q15. When a computer system has operated for 1,200 hours, the status of the normal operation
time and the repair time is as shown in the table below. What is the value of MTTR
(Mean Time To Repair, in hours) of the system?
When a record in a file is modified, which of the following is an appropriate way of
identifying the modified contents?
a) Keeping a record of the size and the modified date of a file
b) Keeping a copy of a file and comparing it to the modified one later
c) Keeping a record of the number of records into the file
d) Keeping records sorted in ascending order of the key field
b
Q17. In a Web server, five (5) directories have a hierarchical structure as shown in the figure
below. In an HTML document stored in directory B, which of the following references
the file img.jpg stored in the directory E? Here, directories and files are referenced using
the method described below.
Which of the following is an appropriate explanation concerning a deadlock?
a) It is a state in which the processes of a computer are prohibited from getting intentional or accidental access to information that usually must not be accessed.
b) It is a state in which, if the authentication of a user fails more than the limited number
of times, the user is prohibited from accessing the computer.
c) It is a state in which, when shared resources are exclusively used, two processes are endlessly waiting for each other to release the lock of a shared resource.
d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.
c
The types of programs that are executed at the startup time of a PC are generally
classified into three categories: BIOS, OS, and resident applications. Which of the
following is the list that is arranged in the sequence of the execution of the programs?
a) BIOS -> OS -> Resident applications
b) OS -> BIOS -> Resident applications
c) OS -> Resident applications -> BIOS
d) Resident applications -> BIOS -> OS
a
Which of the following is the purpose of the virtual memory system that is known as one
of the functions provided by an OS?
a) To prevent an application program from accessing the protected area on main memory used by the OS
b) To reduce electricity consumption during the idle state, by stopping the power supply after data is written from main memory to external storage
c) To make it possible to execute a program even if the program requires more storage
capacity than main memory
d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory
c
Which of the following is a device that is used to recognize handwritten characters and
convert them into character codes?
a) BD-R
b) CD-R
c) OCR
d) OMR
c
Which of the following is the term for the design that is intended to provide comfortable usability to as many people as possible, regardless of differences in culture, language, age, gender, presence or absence of disability, or capability?
a) Barrier-free design
b) Fail-safe
c) Foolproof
d) Universal design
d
On a display screen, various colors are created through additive color mixing with three
colors, namely red, green, and blue. When the red color, green color, and blue color
are mixed uniformly, which of the following is the color that is formed?
a) Red-violet
b) Yellow
c) White
d) Blueish green
c
Q24. Transactions 1 (One) through 4 (Four) are processed in the order of the Process list below.
One of the transactions ended abnormally in the middle. As a result of canceling and
rolling back the transaction, data A and data B exist. Which of the following is the
transaction that ended abnormally? Here, if a transaction that ended normally, it will be
committed and the next transaction, if any, will be performed if it exists. If a transaction
ended abnormally, the subsequent transactions will not be performed.
Q25. There are “Sales”, “Customer” and “Product” tables in a relational database. Among lists
A through C, which of the following contains all and only the lists that can be created
from the data in these tables? Here, a solid underlined part represents a primary key, and
a dotted underlined part represents a foreign key.
Sales
SalesNumber CustomerNumber ProductNumber SalesDate SalesAmount
Customer
CustomerNumber CustomerName
Product
ProductNumber ProductCategoryName ProductName
A The list of customers who bought more than a certain amount of money during a
certain period in the past
B The list of products that were out of stock in the previous month
C The ranking list for sales amount by product in the previous month
a) A, B b) A, B, C c) A, C d) B, C
In the description below concerning a relational database, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
Analyze the target business operations, identify the data which is used there, and create
, consisting of entities and . On the basis of the created,
design .
In DBMS, which of the following is a function for maintaining consistency of data by
preventing the occurrence of conflicts due to simultaneous access to the data ?
a) Normalization
b) Deadlock
c) Exclusive control
d) Restore
c
Which of the following is an appropriate description concerning communications
protocols?
a) There are no
communications protocols that are used in analog communication.
b) They are developed only by international organizations, and those developed
independently by manufacturers are not called communications protocols.
c) In communications protocols, only the procedure of actions in a normal case is
defined.
d) Devices that are provided by different manufacturers or have different OS can
communicate with each other if they use the same communications protocol.
d
When an e-mail is sent to multiple destinations, there are cases that the receiver of the e-mail should not know the e-mail addresses of other destinations. In such cases, which of the following is an appropriate place where the e-mail addresses of the multiple
destinations to be sent are entered?
a) Bcc
b) Cc
c) To
d) Both To and Bcc
a
Which of the following is required to construct a LAN connecting several computers in a room?
a) Internet
b) Splitter
c) Hub
d) Modem
c
Which of the following is the mechanism that determines the correspondence between
domain names and IP addresses on the Internet?
a) DNS
b) FTP
c) SMTP
d) Web
a
Which of the following is an appropriate explanation concerning URL of a Web page?
a) It is a communications protocol between a Web page and a browser.
b) It is a message about the update history of a Web page.
c) It is a notation for representing the location of a Web page.
d) It is grammar for describing the content (i.e., body) of a Web page.
c
Which of the following is the technology that enables terminals connected to a shared network such as the Internet to be used as if they are connected to a leased line by ensuring security with encryption and authentication?
a) ADSL
b) ISDN
c) VPN
d) Wi-Fi
c
Which of the following is an explanation of DRM (Digital Rights Management), which
is used for digital content?
a) It is data compression technology for audio and video, and there are multiple standards for the technology according to playback quality.
b) It is a collective term for technologies for protecting the copyright of content and
restricting its use and duplication.
c) It is an XML-based description language for controlling data broadcasting on digital television.
d) It is a standard for reproducing realistic sound.
b
In order to promote risk management, the execution plan for introducing the risk
management system was developed as the first step. When the subsequent actions are
divided into steps A through C below, which of the following is the order of the steps in
accordance with the PDCA cycle?
A Implementing the measures against risks according to the execution plan
B Measuring the effect of the implementation and evaluating the effectiveness of the
risk management system
C Taking corrective actions and improving the risk management system
a) A → B → C
b) A → C → B
c) C → A → B
d) C → B → A
a