Oct 2019 Flashcards
Q1. As shown in Figure 1, there is a box that generates a single output for two inputs. The
input in this box is either “Agree” or “Disagree,” and the output of “Agree” is generated
only when both inputs are “Agree,” while in other cases the output of “Disagree” is
generated. When three inputs are entered into two boxes as shown in Figure 2, which
of the following is the correct description concerning the output?
When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded
data. When the same sound source is sampled at the same sampling frequency and then
encoded as a series of 16-bit data in lieu of 8-bit data, which of the following is an
appropriate explanation concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher.
a
Q3. A sound signal is digitized. Sampling is performed at Time 1 through Time 5 in the
figure below, and four-level quantization is performed; in other words, the levels closest
to the sampling point are selected. After that, two-bit encoding is performed. The
result is “11 01 00 10 11”. When digitization is performed in the same way, which of
the following figures represents the sound signal that results in “01 00 10 11 01”?
Q4. Which of the following is the appropriate combination of compression technology
standards for still images, moving images, and audio?
Which of the following is a term for commands to a computer that are written in a
programming language?
a) PIN code
b) Source code
c) Binary code
d) Character code
b
In the data structure called a queue that is suitable for performing first-in first-out (FIFO) processing, values are stored in the order of “8”, “1”, “6”, and “3”, and then a value is
removed twice continuously. Which of the following is the value that is obtained by the
second removal?
a) 1
b) 3
c) 6
d) 8
a
Q7. As shown in Figure 1, there is a processing unit which reads two positive integer input
values A1 and A2, and then writes two integer output values B1 and B2. B1 is equal
to A2, and B2 is the remainder of A1 divided by A2. In Figure 2, two processing units
with the same function as the above are connected in series. When A1=15 and A2=6
are given to the left-hand unit in Figure 2, what is the output value of B1 for the righthand unit?
A markup language specifies the character color according to the “Syntax and meaning
of the markup language definition section” below. When an element (parent) contains
another element (child), the child inherits the parent’s specifications, but priority is given to the child-specific specifications if the child and the parent have different values
specified for the same attribute. When the text in the “Example” below is displayed
according to this rule, which of the following is the appropriate display attribute for the
underlined character string? Here, “<strong>character string</strong>” specifies the
character string to be emphasized, for example by using bold font.
[Syntax and meaning of the markup language definition section]
(1) Syntax of the definition section
. name{color specification}
(2) Meaning
Assigns a color attribute to “name” to display the character string (element) between
<name> and </name>
in the specified color.
[Example]
Definition: . color1{blue}
. color2{red}
Body text: <strong>The role of the system administrator is <color1>to promote the use
of computers and other information technology to end-user departments.</color1></strong>
<color2>Increased use of information technology improves the work
efficiency of each user,</color2>
and can also lead to operational
improvements across the entire organization.</color1></strong>
a) Blue characters, emphasized
b) Red characters, emphasized
c) Blue characters, not emphasized
d) Red characters, not emphasized
b
Which of the following is usually created using HTML?
a) Web browser
b) Web page
c) Cookie
d) SQL program
b
Which of the following is an appropriate description concerning the primary and
secondary cache memory that a CPU is equipped with?
a) The primary cache memory has larger capacity than the secondary cache memory.
b) The secondary cache memory is slower than the main memory in writing and reading.
c) When the CPU reads data, it first accesses the primary cache memory, and then it accesses the secondary cache memory if no data is available.
d) All of the data that is required for a process needs to be present on the primary or
secondary cache memory when a program starts.
c
Q11. In the description below concerning the connection between a PC and a peripheral device,
which of the following is an appropriate combination of words to be inserted into blanks
A and B?
The connection of a new peripheral device to a PC requires , but if a
peripheral devices that supports function is connected, the is
installed automatically and the device can be used.
Which of the following is the most appropriate description concerning a compatible
CPU?
a) It can run the OS or the application software that can be run on the original CPU.
b) It must not be developed nor manufactured as long as the patents of the original CPU
are valid.
c) A compatible CPU for single-core CPU has been developed, while one for multi-core
CPU does not exist.
d) It is a CPU that is intended to improve the performance of an outdated PC, and is not
adopted for a new model of PC.
a
Which of the following is an appropriate explanation of HDMI?
a) It is an interface for an AV device that handles the input and output of video, audio,
and control signals through a single cable.
b) It is an interface that makes use of the infrared rays used in the exchange of
information between cell phones.
c) It is a serial interface that connects an external hard disk or such other devices through
a cable.
d) It is a wireless interface that makes use of radio waves and can perform
communication even when there is a slight shielding.
a
Two (2) HDDs are connected to a server. If only one (1) of the HDDs fails, the operation
needs to be able to continue. Which of the following is an appropriate configuration that
should be used?
a) Striping
b) Data mining
c) Tethering
d) Mirroring
d
Which of the following includes all the appropriate measures to enable the normal execution of processing even in the event of a failure in part of a system?
(1) The configuration of HDDs with mirroring
(2) The minimization of the frequency of maintenance and inspections after stable
operation of the system starts
(3) The grouping of multiple redundant network lines into a single high-speed line
(4) The redundancy of power supply with the use of UPS (Uninterrupted Power
Supply) etc.
a) (1), (3)
b) (1), (4)
c) (2), (3)
d) (2), (4)
b
Which of the following is an appropriate explanation of the hot standby system?
a) It is a system configuration where a collection of various types of hardware, software,
and data on the Internet is provided to the user.
b) It is a system configuration where a high level of reliability can be obtained by
simultaneously operating the two sets of equipment and by always performing the
same processing while cross-checking the results.
c) It is a system configuration where a backup machine is always kept ready in an
operable state and is immediately switched into operation at the occurrence of a failure.
d) It is a system configuration where a backup machine is arranged, and at the occurrence of a failure, the operator in charge starts up the backup machine to switch the
production machine to the backup machine.
c
Q17. The tax-inclusive prices of products A and B are calculated by using two (2) tax rates
that are set in cells D2 and E2 below. The correct formula that should be entered in cell
D4 is $B4(1.0+D$2), but a wrong formula $B4(1.0+$D$2) was entered. When the
formula that was entered in cell D4 is copied to cells D5, E4, and E5, which of the
following is the numeric value that is displayed in cell E5?
Which of the following is an appropriate description concerning Open Source Software (OSS)?
a) Source code can be edited and then redistributed.
b) Source code is free of charge, but maintenance and support are charged.
c) Copyrights are waived, so it can be used without permission.
d) If the copyright is not waived, the operability must be warranted.
a
There is a system where a full backup is made after closing time every Sunday, and an
incremental backup is made after closing time on Monday through Saturday. On a
Wednesday, a failure happened during business hours, so a decision was made to restore
data to the state at the time of closing on Tuesday by using backup files. Which of the
following lists all the necessary backup files for restoring data? Here, an incremental
backup file means a backup file that contains only the data that has been modified since
the previous backup file (a full backup file or an incremental backup file) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
a
Which of the following is the most appropriate method for displaying the content of
database to a limited extent in accordance with each user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data
a
Q21. When a spreadsheet application to create a line graph based on actual sales in the table
below is used, the scale range of the vertical axis was automatically set between 0 and
1,500,000 yen. However, as the graph does not show clearly the change of sales over
time, the change of sales needs to be more clearly shown without changing the frame
size. Which of the following is the most appropriate chart editing operation?
Q22. As shown in the directory structure below, when D3 marked by an asterisk (*) is the
current directory, which of the following the appropriate directory path that can
designate file A under directory D4 marked by an arrow? Here, a file is designated as
follows:
Which of the following is a device that is used to recognize handwritten characters and
convert them into character codes?
a) BD-R
b) CD-R
c) OCR
d) OMR
c
With regard to the colors printed by a printer, what color is formed logically when cyan,
magenta, and yellow are mixed together by subtractive color mixing?
a) Blue
b) Red
c) Black
d) Green
c
Which of the following is an appropriate explanation of raster graphics, which is a
method of handling the graphics that is used as a collection of points called pixels in painting software?
a) It is widely used in CAD.
b) The type and brightness of a color can be adjusted for each pixel.
c) The file capacity is constant regardless of the level of resolution.
d) No jaggies are visible at the edges of shapes even upon enlargement.
b
Which of the following is an appropriate description of a rollback in transaction
processing?
a) When a transaction attempts to update shared data, it prohibits another transaction
from updating that data.
b) When a transaction has been successfully processed, it commits an update to the
database.
c) When a transaction has not been successfully processed for some reason, it reverts the
database to the state that was present before the transaction was started.
d) It combines multiple tables into one (1) table by using mutually related columns as
keys.
c
Q27. By joining tables “Employees in charge”, “Regions”, and “Customers” that are managed
in a relational database, the table A that is shown below is obtained. Which of the
following is the table “Customers” that is used for the joining? Here, a solid underline
indicates a primary key and a dotted underline indicates a foreign key.
Q28. The result of the Information-Technology Engineers Examination by some of the
employees of a company is shown below. In order to manage this table with a relational
database, which of the following is an appropriate method to partition the table into two
(2) tables? Here, this company has employees with the same family name and first name.
Q29. In the description below concerning a relational database, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
Analyze the target business operations, identify the data which is used there, and create
, consisting of entities and . On the basis of the created,
design .
Which of the following is an appropriate description of online storage?
a) A virtual private network that is established via the Internet
b) A service that lends disk space for storing data via the Internet
c) Software that is distributed or sold via the Internet
d) A computer game that multiple users can simultaneously play via the Internet
b
Which of the following is an appropriate description of a SIM card?
a) A card-type device that is used for the purpose of ensuring security in Internet banking and generates a password that can be used only once when a password is required
b) An IC card that is inserted into a mobile phone for its use and that the phone number
and subscriber ID are recorded on
c) A large-capacity memory card that is used in digital music players or digital cameras
for storing contents
d) A card that is provided with a receiver for digital broadcasting and is used for decoding
scrambled digital broadcasting
b
Which of the following is a protocol that is used for synchronization of the internal clock of a computer via a network with a server that holds a reference clock?
a) FTP
b) NTP
c) POP
d) SMTP
b
Which of the following is the most appropriate description of a WAN?
a) A virtual private network that uses the Internet
b) A network that connects countries, rather than a network that connects various regions within a country
c) A network that uses a network service from a network operator for connecting
geographically separated locations, for example, a head office and its branch
d) A brand name that is granted only to devices where interconnectivity has been
confirmed, by the industrial association that promotes products that support the IEEE
802.11 standard that is used in wireless LANs
c
Which of the following is an appropriate description of LTE in wireless communications?
a) A wireless LAN communication method that enables devices to communicate directly with each other without using any access point
b) A small-scale network that connects PCs and peripheral devices within a range of
several meters
c) A wireless communication standard for mobile phones to enable faster data
communication than 3G
d) A small base station system for mobile phones to be installed in households and offices where it is difficult for radio waves to penetrate
c
A private key and a public key were generated as a key pair when a digital certificate
was issued. Which of the following is an appropriate action that should be taken when the private key is leaked?
a) Reissuing the digital certificate with the key pair that was used
b) Requesting to the certification authority for invalidation of the digital certificate
c) Using a key pair that is newly created at the time of reissuing due to the expiration of
the validity period
d) Using the digital certificate as it is, because it is only the private key that was leaked
b
Risks on information assets are assessed on the basis of threats and vulnerabilities. Which of the following falls under a threat?
a) Unencrypted communication
b) An inconsistency in procedures for handling confidential documents
c) A door that cannot be locked
d) An unexpected power failure due to a disaster such as a thunderbolt
d
Which of the following is an appropriate description of risk assessment in information
security?
a) Quarantining a virus that has intruded into a PC or a server, as well as minimizing the
risk of a spread of the infection
b) Analyzing and assessing risks on identified assets, and determining whether any
action is necessary according to a criteria
c) Confirming that the user of a system is authentic by using information that has been
registered in advance
d) Calculating the cost effectiveness of installing an information system
b
Which of the following is an appropriate description concerning a scheme for
authenticating the user of a system?
a) A scheme where authentication is accomplished by utilizing a password that can be used only once is called a single sign-on.
b) A scheme where the use of multiple servers or applications is authorized by accomplishing an authentication once is called a one time password.
c) A scheme where numbers or characters that are placed on positions that the user
remembers within a table on the screen are entered as a password is called a matrix
authentication.
d) A scheme where authentication of the user is accomplished by using fingerprints,
voiceprint, or other physical characteristics is called a challenge-response
authentication.
c
Which of the following is a protocol that is used for encrypted communication between a web server and a browser that are connected through HTTPS?
a) SEO
b) SPEC
c) SQL
d) SSL/TLS
d
Q40. Which of the following is an appropriate combination of the descriptions (i) through (iii)
about threats in information security and the terms below?