Oct 2017 Flashcards
Japanese restaurants in London and Japanese restaurants in Paris are to be searched for
together. Which of the following is the logical expression that represents the search
condition?
a) (“London” AND “Paris”) AND “Japanese restaurant”
b) (“London” AND “Paris”) OR “Japanese restaurant”
c) (“London” OR “Paris”) AND “Japanese restaurant”
d) (“London” OR “Paris”) OR “Japanese restaurant”
c
When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded
data. When the same sound source is sampled at the same sampling frequency and then
encoded as a series of 16-bit data in lieu of 8-bit data, which of the following is an
appropriate explanation concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher
a
Which of the following is the binary result of the multiplication of binary 1011 and binary 101?
a) 1111
b) 10000
c) 101111
d) 110111
d
There are five (5) lamps arranged in line. Each of them can be turned on and off
independently. How many patterns are there where two (2) or more lamps are turned on? Here, the pattern where all lamps are turned on is counted as one (1) and the pattern where any one (1) of them is turned on is counted as five (5).
a) 4
b) 10
c) 26
d) 32
c
There is a standard that can represent data in a hierarchical structure by enclosing data that
corresponds to attribute N with the tags <N>, which means the start, and </N>, which
means the end, and then linking and nesting these tags. Company A decides to comply
with this standard and create a paper by using the structural rules (1) through (3) below.
Which of the following is the appropriate header of a paper named “New Document
Management” that is created by Jack Smith of the Information Systems Department (IS
Department) in accordance with this standard and the structural rules?
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.
a) <header>
<author>
<title>New Document Management
<name>Jack Smith</name><dept>IS Department</dept>
</title>
</author info>
</header>
b) <header>
<title>New Document Management</title>
<author><name>Jack Smith</name></author info>
<dept>IS Department</dept>
</header>
c) <header>
<title>New Document Management</title>
<author>
<name>Jack Smith</name><dept>IS Department</dept>
</author info>
</header>
d) <header>
<title>New Document Management</title>
<name>Jack Smith
<author><dept>IS Department</dept></author info>
</name>
</header>
</author></name></header></author></header></author></header></author>
c
Which of the following is an appropriate description concerning the usage of HTML
(Hyper Text Markup Language) tags?
a) <label> is used to define the title of a web page.</label>
b) <BODY> is used to describe the text of a web page.
c) <big> is used to specify the size and style applied to each character in a web page.</big>
d) <FORM> is used to divide a web page into multiple frames.
b
Q7. When a relation between objects is abstracted, the relation from X to Y (called an order
relation) is represented as (X, Y) and illustrated as . Which of the following
is the diagram that illustrates three sets of order relations “(A, B), (A, C), (B, D)”?
Which of the following graphically represents a processing procedure of a program in a visual way?
a) Gantt chart
b) Data flow diagram
c) Flowchart
d) Radar chart
c
Q9. There is a data structure where data that is entered last is retrieved first (hereinafter, stack).
By using this, a device that changes the order of data that is entered from the right side and
sends its output to the left side as shown in the Figure is considered. There are three (3)
cases of operations for this device.
(1) Data that is entered from the right side is sent to the left side as is.
(2) Data that is entered from the right side is added onto the top of the stack.
(3) Data on the top of the stack is retrieved and sent to the left side.
If the data A, B, C, and D is entered sequentially from the right side of the device, which
of the following cannot be an order of the output to the left side with any combination
of the operations (1) through (3)
Which of the following is an appropriate explanation of HDMI?
a) It is an interface for an audio-visual device that handles the input and output of video,
audio, and control signals through a single cable.
b) It is an interface that makes use of the infrared rays used for the exchange of information
between cell phones.
c) It is a serial interface that connects a peripheral device, such as an external hard disk, through a cable.
d) It is a wireless interface that makes use of radio waves and can communicate even when
there is a slight shielding.
a
Which of the following is an appropriate explanation of GPU?
a) It is an index that shows the throughput of a CPU in terms of how many billions of
instructions it can execute per second.
b) It is a frequency signal that synchronizes the arithmetic processing of CPUs.
c) It is a storage unit that is placed between a CPU and a main memory, and has a higher
reading and writing speed than the main storage unit.
d) It is an arithmetic logical unit that is used instead of a CPU to accelerate processing
such as image processing for 3D graphics.
d
Which of the following is a port on a PC’s motherboard for the installation of a memory
module?
a) PC card slot
b) Flash memory
c) Memory interleave
d) Memory slot
d
Q13. In the description below concerning the connection between a PC and a peripheral device, which of the following is an appropriate combination of words to be inserted into blanks A and B?
The connection of a new peripheral device to a PC requires , but if a
peripheral devices that supports function is connected, the is installed automatically and the device will be ready to use.
A | B a) Device drivers | Plug and play b) Device drivers | Plugin c) Malware | Plug and play d) Malware | Plugin
a
Which of the following is an appropriate description concerning the hardware maintenance of a system?
a) The hardware device that has not failed for a certain period of time is excluded from
scheduled maintenance.
b) It is safe to replace a failed hardware device with the latest model rather than the same
model, because compatibility is guaranteed.
c) Scheduled maintenance is performed only for the hardware device that has failed before.
d) In preventive maintenance, measures are taken before a failure occurs.
d
Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership) that represents the cost of a system?
a) The total cost of a company’s initial investment in an information system
b) The total cost incurred in system development
c) The total cost including system implementation, operation, maintenance, and education
d) The total cost of system implementation
c
Which of the following includes all the appropriate measures to enable the normal
execution of processing even in the event of a failure in part of a system?
(1) The configuration of HDDs with mirroring
(2) The minimization of the frequency of maintenance and inspections after stable operation of the system starts
(3) The grouping of multiple redundant network lines into a single high-speed line
(4) The redundancy of power supply with the use of UPS (Uninterrupted Power Supply) etc.
a) (1), (3)
b) (1), (4)
c) (2), (3)
d) (2), (4)
b
When the log file on a web server is analyzed in daily system administration, which of the following can be found?
a) Web pages accessed by website visitors
b) The model name of a computer used by each visitor
c) The speed of a web browser on each visitor’s computer
d) Personal information about individual website visitors
a
Which of the following is an appropriate explanation of plug-in software?
a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.
b) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a web browser, to enhance their functions.
c) Plug-in software is often included in applications such as a spreadsheet, and allows the
users to record and replay the series of operations performed.
d) Plug-in software is provided to replace part of a program for the purpose of modifying
functions or fixing bugs.
b
Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary storage device, to application programs.
c) Since an OS has the function of automatically converting character sets in a file,
application programs can access the file without regard to the type of character set.
d) The source code of an OS should be disclosed so that application programs can freely
use the various functions of the OS.
b
Which of the following is an appropriate explanation of multitasking?
a) Several computers connected via a network work together to achieve a high-performance
system.
b) Several processor cores composed of arithmetic circuits and other control circuits are
implemented in a single CPU.
c) The CPU processing time is allocated to several processes in turn so that the processes
can be executed simultaneously.
d) The same processing is performed for multiple data items by executing a single
instruction.
c
Q21. As shown in the directory structure below, when D3 marked by an asterisk (*) is the current
directory, which of the following the appropriate directory path that can designate file A
under directory D4 marked by an arrow? Here, a file is designated as follows:
[Method of file designation]
(1) A file is referenced as “directory name\···\directory name\file name”, where the
directory names on the path are listed and separated with “\” in sequence, followed
by the file name.
(2) The current directory is represented by a period “.”.
(3) A directory that is one level higher is represented by two periods “..”.
(4) When the path name string begins with a backslash “\”, the root directory is omitted
from the beginning of the string.
(5) When the path name string does not begin with “\”, “.”, or “..”, it is assumed that
“ .\” for the current directory is omitted from the beginning of the string
Which of the following is an appropriate description concerning OSS (Open Source
Software)?
a) Source code can be edited and then redistributed.
b) Source code is free of charge, but maintenance and support are charged.
c) Copyrights are waived, so it can be used without permission.
d) If the copyright is not waived, the operability must be warranted.
a
Which of the following is a computer that is used for activities such as global scale
environmental simulations and DNA analysis, and was developed with the objective of
processing large amount of calculations at ultra high speed?
a) Virtual computer
b) Super computer
c) General purpose computer
d) Microcomputer
b
Which of the following is an appropriate type of menu that enables users to make multiple
selections on common GUIs as seen in PC operating systems?
a) Check box
b) Text box
c) Pull-down menu
d) Radio button
a
Which of the following is an appropriate description concerning the characteristics of video streaming?
a) It is mandatory to have the data on the server beforehand, and videos of events and sports
cannot be distributed while they are being shot.
b) Deterioration in picture quality due to partial lack of reception data can be completely eliminated.
c) Preparation time is not required for starting playback of a video, and therefore, the
viewer can immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as soon
as some data has been read in.
d
The response time of an inventory management system that uses a relational database has recently become slow. An investigation reveals that when the system was initially created,
there was no problem with response time, and after that, insertion and deletion of product data was repeatedly performed on the database. Which of the following is the most effective way to improve the response time of the database?
a) Upgrading the CPU of the database server
b) Extending the index area of the database
c) Defragmenting the database
d) Increasing the number of hard disks that store the database
c
Which of the following is a service that provides disk space on a server connected to the
Internet for storing files and allows users to read and write data from anywhere inside or
outside their homes?
a) Archive
b) Authoring
c) Online storage
d) Flash memory
c
In a system environment where several users have access to a database simultaneously, a
new user tries to view a data record while another user is updating the same record. In
order to assure data integrity in such circumstances, which of the following is an appropriate control method that should be used in the DBMS?
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating process
d) Canceling the updating process to permit the new user to view the last record
c
Which of the following is an appropriate description concerning the primary key of a
relational database?
a) NULL can be set only in one (1) record to a value of a field selected as a primary key.
b) Any values in a field selected as a primary key cannot be updated.
c) A field selected as a primary key cannot be referenced as the foreign key of another
table.
d) A combination of multiple fields can be selected as a primary key.
d
Which of the following is an appropriate description concerning a cookie used in the web?
a) It is a standard that can be used for formatting the layout of an HTML document in detail.
b) It is a version of the HTTP protocol to which an encryption function is added for private
communications over the Internet.
c) It is a mechanism where a web server interacts with external programs to create web pages
dynamically.
d) It is a mechanism where information from a web server is temporarily saved in a browser
that accesses the web server.
d
Which of the following is a communication network built in a limited area, such as the
inside of a building?
a) IP-VPN
b) LAN
c) WAN
d) Wide-area Ethernet
b
Which of the following is an appropriate explanation of an intranet?
a) It is an organization’s internal network that is built with Internet technology.
b) It is a company’s internal network that anyone outside a company can freely connect
to.
c) It is a network that is built in order to perform commercial electronic transactions
between multiple companies.
d) It is a network that is built without using wireless network, but with using wired
network only.
a
When other networks such as the Internet are accessed from a network in an office or a
household, which of the following fulfills the role of an entrance or an exit to the other
networks?
a) Splitter
b) Default gateway
c) Hub
d) Repeater
b
Which of the following is the most appropriate explanation of a communication protocol?
a) It is a hub device for cables that are used to connect devices such as PCs and printers to a LAN.
b) It is a description of the location of information specified with a web browser and the method for accessing it.
c) It is a number that is used to identify a computer in Internet communication.
d) It is a set of conventions that are defined for communication over a network.
d
Which of the following is an appropriate explanation of spam mail?
a) E-mail that is indiscriminately sent to users without their consent
b) E-mail that is distributed to all participants registered previously for a specific purpose
c) E-mail that is sent or forwarded with the same content by its receivers to multiple destinations and causes the number of receivers to continue increasing
d) A message exchange system that provides a message posting function using e-mail or
web page to enable information exchange with the general public
a
Which of the following is an appropriate explanation of the keylogger that is a threat to
information security?
a) Stealing information by watching the keyboard input and the display screen from behind a PC user
b) Monitoring the keyboard input on a user’s PC by running a mechanism that can record
such input
c) Analyzing a password by using dictionary data of all the words that are likely to be used
as passwords
d) Searching for a free access point by moving around a town with a PC that can detect the
electromagnetic waves of a wireless LAN
b
Q37. The authentication technology is classified into three (3) types, namely authentication
based on one’s possession, authentication based on physical characteristics, and
authentication based on one’s memory. Which of the following is the appropriate
classifications of the implementation examples (1) through (3)?
Which of the following is a form of direct damage to a server which is caused by a DoS
attack?
a) The encrypted data is decrypted.
b) The administrator password is changed.
c) The server is infected by a virus.
d) The services of a server are interrupted.
d
Which of the following is the most appropriate explanation of the operation that spyware
is meant to perform?
a) To destabilize the operation of the OS and software
b) To delete files from the file system without user consent
c) To hijack the browser and forcefully execute a particular operation
d) To collect personal and other information without being noticed by users
d
Which of the following is an appropriate information security measure against harmful software in a PC?
a) Using a 64-bit OS
b) Maintaining the latest version of the virus definition file at all times
c) Defragmenting the hard disk periodically
d) Saving files after compressing them
b