Oct 2018 Flashcards
Q1. A survey into the amount of pocket money is conducted at three (3) schools. When the
consolidated results of the survey are used to calculate the average pocket money per
student for all the students of the three (3) schools, which of the following is the
expression that is entered into cell C5?
Which of the following is obtained by multiplying the binary value 10110 by three (3)?
a) 111010
b) 111110
c) 1000010
d) 10110000
c
Which of the following is an appropriate purpose of appending a check digit to a
customer code?
a) To check the customer code for input errors
b) To arrange customers in the order of acquisition when a list of customers is created
c) To enable customers to be inferred easily and quickly
d) To enable the grouping of customers by geographical area or other attributes
a
Which of the following is an appropriate description concerning the characteristics of EUC (End User Computing)?
a) EUC enables users to directly access, reference, and manipulate data that they need
for business operations.
b) EUC gives priority to system operation and maintenance, so it causes backlogs to
increase in the information systems department.
c) EUC requires more development staff members in the information systems
department, so it often leads to an increase in the operating costs of the department.
d) EUC allows the information systems department to take a leadership role in
application development, so it can reduce the workload of users.
a
At a desk that is only large enough to place 4 files at the same time, 6 files, A through F,
are used to perform a task. When 4 files are already placed on the desk, the least
recently used file must be placed back into the drawer before the fifth file can be placed on the desk. When the files are used in the sequence A, B, C, D, B, A, E, A, B, F, which
of the following is the last file placed back into the drawer?
a) A
b) B
c) D
d) E
c
Q6. There exist fourstates numbered 1 through 4. The four states are connected as shown
in the figure below, and the state transition occurs in a clockwise or counter-clockwise
direction
In a queue, three elements 33, 27, and 12 are stored (or enqueued) in this order. After
the element 45 is added to this queue, two elements are retrieved (or dequeued). Which
of the following is the second element that has been retrieved?
a) 12
b) 27
c) 33
d) 45
b
There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the program
display the underlined character string? Here, the first character of the original text is
displayed in 10 points.
[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.
[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>
<S>group-level</S>
computerization</B> from a user’s <S>standpoint</S>.</B>
a) 10
b) 11
c) 12
d) 13
b
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language used for describing web pages.
b) It is a language developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language developed for business-oriented calculations.
c
Which of the following is the correct comparison of the amount of data?
a) 1 KB < 1 MB < 1 GB < 1 TB
b) 1 KB < 1 MB < 1 TB < 1 GB
c) 1 KB < 1 TB < 1 MB < 1 GB
d) 1 TB < 1 KB < 1 MB < 1 GB
a
Which of the following is designed to virtually reduce the time for the CPU to access
the main memory, in order to improve the processing efficiency of a PC?
a) SSD
b) Virtual memory
c) Cache memory
d) Defragmentation
c
Which of the following is an appropriate description concerning CPU performance?
a) Compared with a 64-bit CPU, a 32-bit CPU is able to process a longer data at one
time.
b) The less the capacity of cache memory in the CPU, the faster the processing speed.
c) For a CPU of a given architecture, raising the clock frequency increases processing
speed.
d) A dual core CPU can perform a greater number of processes simultaneously than a
quad core CPU can.
c
Which of the following is the most appropriate description concerning a multi-core
processor?
a) Several microprocessors are installed in one PC with the purpose of improving the
reliability of the processing results by performing the same processing at the same
time in each processor.
b) If the structure and clock frequency of the arithmetic logical unit are the same, a quad core processor has four times as much processing power as a dual core processor.
c) The clock frequency is temporarily increased according to the load of the processing so as to achieve high-speed processing.
d) A single CPU has several processing circuits that perform operations, and each
processing circuit performs different processing at the same time with the purpose of
improving the processing power.
d
Q14. In reliability engineering, which of the following is the index represented by the y-axis
of a bathtub curve?
Q15. There are three devices, A, B, and C, with availabilities of 0.90, 0.95, and 0.95
respectively. Among the systems combining these devices shown below, which of the
following has the highest availability? Here, at least one of the parallel-connected
devices must be available, and all of the serially-connected devices must be available.
When the processing speed of the system overall is constrained because of slow
processing speed in one of the components, which of the following is a term for the
component of a system that is causing the problem?
a) Throughput
b) Defragmentation
c) Flowchart
d) Bottleneck
d
Q17. As shown in the spreadsheet below, three types of examinations were conducted.
Each type of examination has a different perfectscore. Each resulting score is converted
to a value assuming 100 points as the perfect score, and displayed in cells F3 through
H10. Which of the following is the expression to be entered in cell F3? Here, the
expression in cell F3 is copied to cells F3 through H10.
Q18. An examination is conducted, and the results of the examination are grouped into four
grades “Excellent,” “Good,” “Passed,” and “Not passed,” based on the scores by using
spreadsheet software. To show the results of grouping in column C, an expression is
entered in cell C1 and then copied to cells C2 through C35. Which of the following
is the appropriate expression to be entered into cell C1? Here, the procedure for
grouping is as shown below.
[Spreadsheet creation procedure]
(1) Cells A1 through A35 contain scores.
(2) Cell A36 contains a function to calculate the average score.
(3) Cell B1 contains the expression below, and this expression is copied to cells B2
through B35.
A1 − $A$36
(4) Grades are defined as follows: if the score is above the average by 10 points or more,
it is marked as “Excellent”; if it is equal to or above the average by less than 10
points, it is marked as “Good”; if it is below the average by 10 points or less, it is
marked as “Passed”; all other scores are marked as “Not passed.”
a) IF(B1 > 10, ‘Passed’,
IF(B1 > 0, ‘Not passed’, IF(B1 < −10, ‘Excellent’, ‘Good’)))
b) IF(B1 > 10, ‘Excellent’,
IF(B1 > 0, ‘Good’, IF(B1 < −10, ‘Passed’, ‘Not passed’)))
c) IF (B1 ≥ 10, ‘Excellent’,
IF (B1 > 0, ‘Good’, IF (B1 < −10, ‘Not passed’, ‘Passed’)))
d) IF (B1 ≥ 10, ‘Excellent’,
IF (B1 ≥ 0, ‘Good’, IF (B1 < −10, ‘Not passed’, ‘Passed’)))
d
Which of the following is the image data that is pasted onto the documents and web
pages created by the word-processing software and presentation software so as to
improve the expressive power?
a) CSS
b) Capture
c) Clip art
d) Template
c
Q20. Which of the following is the expression to be entered into cell D4 in order to calculate
the after-tax prices of the products shown in cells A4 and A5 by using the two tentative
sales tax rates that are set in cells D2 and E2? Here, the expression to be entered into
cell D4 is copied to cells D5, E4, and E5.
Which of the following is an advantage of using OSS (Open Source Software)?
a) Technical support can be received free of charge from the developer at the time of
installation.
b) The software is not prone to infection of viruses, as the source code is not released.
c) Compensation can be received for damages caused by defects in the software.
d) The source code can be modified to fit the environment of the user in accordance
with the license terms.
d
Multiple files stored on a hard disk are used in work, from Monday to Friday. In order
to handle failure of the hard disk, the data is backed up to another hard disk after the
end of each day’s work. When the backup has following conditions, what is the total
time required (in minutes) to perform backups of data for Monday to Friday?
[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size
of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One file at
a time is backed up; backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday,
all files are backed up, whether or not they have been modified.
a) 25
b) 35
c) 50
d) 150
c
Which of the following is an appropriate explanation of a blade server?
a) It uses multiple board-type computers equipped with CPU and memory, housed in a
dedicated body.
b) It enables the use of office software, e-mail software, etc. as web services over the
Internet.
c) It is embedded in equipment such as home appliances or automobiles.
d) It supports handwriting input function by using a liquid crystal display with a touch
panel.
a
Which of the following is an appropriate concept of universal design?
a) Ensuring that, once a product is designed, the design remains usable without being
changed for a long period of time
b) Ensuring that products keep the same levels of performance and quality regardless of
where they are manufactured in the world
c) Making the design as simple and easy as possible in order to reduce the manufacturing
cost
d) Making products usable to many people regardless of differences in age, culture, and
ability as well as whether disability is present
d
Which of the following is the most appropriate explanation of virtual reality?
a) Improving the GUI not by displaying an image gradually from top to bottom, but by
first displaying a coarse mosaic-like image, and then by gradually increasing the
sharpness of the image
b) Enabling computer-simulated objects and spaces to be perceived like the real world
by using computer graphics or other techniques
c) Conducting computer simulations instead of, among others, the wind-tunnel test used for the design of cars and airplanes
d) Combining images of separately shot scenery and people to create an image that is different from the real world
b
A hard disk failure occurred on a mail server, and e-mails of many users were lost.
Recovery of data was attempted, but e-mails sent and received during the two-week
period after the last backup could not be restored because backups were only created
every two weeks. Taking a lesson from this incident, a measure is to be implemented
to allow restoration up to the state of the day before such a failure. Which of the
following is an appropriate measure?
a) Performing daily incremental backup in addition to biweekly (every two-week) full
backup
b) Accumulating e-mails on multiple different hard disks in a distributed manner
c) Implementing hard disk mirroring on the mail server for higher reliability, without
changing the existing backup schedule
d) Storing daily backup onto the same hard disk media, and a biweekly (every two-week)
copy of the backup to another storage media
a
Q27. The “Sales Details” table and the “Products” table are managed in a relational database.
What is the total number of notebooks sold?
Which of the following is an appropriate effect obtained through the normalization of
data in a relational database?
a) Securing of data compatibility between different types of computers
b) Improvement of storage efficiency through data compression
c) Elimination of redundancy and inconsistency of data
d) Omission of backups that are necessary in preparation for the failure of devices
storing data
c
Which of the following is an appropriate description concerning foreign keys in a
relational database?
a) A property held by the foreign key is called a unique constraint.
b) Duplicate values cannot be set in the fields that are set as foreign keys.
c) Multiple foreign keys can be defined in a single table.
d) Multiple fields cannot be collectively set as a single foreign key.
c
Which of the following is used to identify a wireless LAN network?
a) Bluetooth
b) ESSID
c) LTE
d) WPA2
b
Mr. A specifies the destinations for an e-mail as below and sends it. Mr. Y receives this
e-mail, and sends a reply to all the recipients and the sender listed in the e-mail. Among
Mr. A, Mr. X, and Mr. Z, which of the following is the list that includes all and only the
destinations of the e-mail that Mr. Y sends?
[Destinations specified for Mr. A’s e-mail]
To: X
CC: Y
BCC: Z
a) A
b) A, X
c) A, X, Z
d) X, Z
b
Which of the following is an appropriate explanation of the POP communications
protocol?
a) It is a protocol for the remote control of a computer from a terminal that is in a
different location.
b) It is a protocol for file transfer.
c) It is a protocol for sending e-mails to a mail server.
d) It is a protocol that e-mail software uses in order to receive e-mailsfrom a mail server.
d
Which of the following is an example of damage incurred by the theft of cookies by a
cross site scripting attack or other attack?
a) The PC becomes infected by a virus.
b) The files on the PC are sent to an outside destination.
c) Web service accounts are hijacked.
d) Intrusion into the network takes place over the wireless LAN.
c
Among the examples of conducting communication between a PC, a server, a
communication device, a printer, etc., which of the following is the list that contains
all and only the examples that require the use of a WAN?
A: In a server room, a PC and a web server are connected to the same network hub,
and a company overview web page is uploaded from the PC to the web server.
B: A notebook PC is connected to an access point in a LAN within a campus of a
university, and lecture materials are downloaded from a web server on the same
campus.
C: A file server connected to a LAN in the Tokyo headquarters is accessed from a PC
in the Osaka branch office, and files are downloaded.
a) A, B
b) A, C
c) B
d) C
d
Which of the following is an appropriate disposal method for media that stores
confidential information to ensure that information leakage does not occur?
a) CDs and DVDs are destroyed and then are disposed of.
b) A PC is disposed of with its CPU being destroyed.
c) USB memory is disposed of with its files and folders being deleted.
d) Paper documentation is not used as memo paper and is sealed in a confidential
envelope and then is disposed of together with general trash.
a
Which of the following sets conditions for character type, length, etc. used for
passwords that are set for accounts on a computer, etc.?
a) Single sign-on
b) Password crack
c) Password policy
d) One-time password
c
Which of the following is a technique for taking advantage of psychological weaknesses or carelessness in order to improperly obtain confidential information?
a) DoS attack
b) SQL injection
c) Social engineering
d) Buffer overflow
c
Which of the following is the threat that can be prevented by encrypting data?
a) Deletion of data because of an operational error
b) Social engineering
c) Tapping of communication content
d) DoS attack on the server in which data is stored
c
When an abnormality in power supply voltage caused by power failure, lightning strike,
etc. has been detected, a company wishes to inform its computers of this event,
continue supplying power for a certain period of time, and safely shut down systems.
Which of the following is an appropriate device that should be installed between
computers and the power supply for this purpose?
a) DMZ
b) GPU
c) UPS
d) VPN
c
Which of the following is an appropriate explanation of a VPN?
a) A wireless network over which devices engage in two-way communication without
going through an access point
b) A network that is set up within a relatively limited area, such as an office or a building
c) A virtual network that is set up by using a public network, etc., and is used in the manner of a dedicated network
d) A network to which a PC is connected to prior to be connected to an internal company network, etc. in order to test the PC’s security
c