Oct 2020 Flashcards
Q1. When the reward for an improvement proposal concerning business operations is determined based on the decision table below, how much is the reward for an
improvement proposal for an improvement of $20,000 and a turnaround time reduction
of three days? Here, “Y” in the table means that each condition holds “true”, and “N”
means “not true”. In addition, “” indicates the reward that applies to a specific
combination of these conditions.
As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five (5) squares that are black or white.
2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■
A white square indicates 0, and a black square indicates a positive value that is different
depending on the position of the square. When the sum total of the values of the five
(5) squares shows a numeric value, which of the following decimal numbers is
represented by ■■□□□?
a) 12
b) 20
c) 24
d) 30
c
When a chairperson and a secretary are selected from three (3) candidates with a method
that allows dual roles, from the three (3) candidates, there are three (3) combinations for
the selection of a single chairperson and three (3) combinations for the selection of a secretary, so in total, there are nine (9) combinations for the selection of a chairperson
and a secretary. When a chairperson and a secretary are selected from five (5) candidates with a method that allows dual roles, how many combinations for the selection are there?
a) 5
b) 10
c) 20
d) 25
d
Which of the following is always true for two (2) sets A and B? Here, (X Y) represents
the part that belongs to both X and Y (intersection set), and (X Y) represents the part
that belongs to at least one of X or Y (union set).
a) (A B) is a subset of the complement of (A B).
b) (A B) is a subset of A.
c) (A B) is a subset of (A B).
d) (A B) is a subset of the complement of A.
c
In a queue, three elements 33, 27, and 12 are enqueued in this order. After the element
45 is enqueued to this queue, two (2) elements are retrieved (or dequeued). Which of
the following is the second element to be retrieved?
a) 12
b) 27
c) 33
d) 45
b
Q6. There exist four (4)states numbered 1 through 4. The four (4) states are connected as
shown in the figure below, and the state transition occurs in a clockwise or counterclockwise direction.
Which of the following is an appropriate description concerning HTML?
a) It is a markup language that can specify the logical structure and layout of a Web page
by using tags.
b) It is a script language that can describe the program or processing steps executed on a
browser.
c) It is a communication protocol that is used between a browser and a Web server.
d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.
a
Which of the following is an appropriate description concerning the Java language?
a) It is a markup language used for describing Web pages.
b) It is a language developed for scientific and engineering calculations.
c) It is an object-oriented language that provides platform-independent portability.
d) It is a language developed for business-oriented calculations.
c
Which of the following is an appropriate way for extracting data from a stack that stores
multiple data?
a) Data is extracted from an arbitrary location that is specified, regardless of the sequence that data is stored in.
b) Data that was stored last is extracted first.
c) Data that was stored first is extracted first.
d) Data has a key, and it is extracted according to the priority of the key.
b
Which of the following is the appropriate description concerning a device driver that
enables the use of peripheral equipment with a PC?
a) When a hard disk drive is initialized and the operating system is reinstalled, it is
necessary to reinstall device drivers that were installed separately to the operating
system.
b) When new application software is installed, it is necessary to reinstall all device
drivers that this software uses.
c) Even if a device driver is no longer required, a user cannot delete the device driver
once it is installed.
d) If only one (1) device driver for a printer is installed, all printers can be used
regardless of manufacturer or model.
a
Which of the following is an appropriate description of the cache memory of a CPU?
a) The size of cache memory is greater than or equal to the size of main memory.
b) Cache memory is used to reduce the effective access time of main memory.
c) On computers with a large main memory, there is no effect of cache memory.
d) In order to increase the hit rate, the user specifies the frequently used programs to
be resident in cache memory.
b
Q12. A list of PC hardware contains the items that are shown in the Table. Which of the
following is an appropriate description concerning these items?
Which of the following is appropriate as a description concerning Plug and Play?
a) When a peripheral device is connected to a PC, installation and settings of the device
driver are performed automatically.
b) Software for enhancing the functions of application software is installed separately.
c) Power is supplied from a PC to a peripheral device via a cable connected to the
peripheral device.
d) A specific program is executed, and the system performance is evaluated on the basis
of the time taken for the processing.
a
Q14. Which of the following is an explanation of the reliability index that is calculated by
the expression below?
MTBF MTBF+MTTR
a) Average time until a system failure occurs
b) Average time taken to recover a system after a failure
c) Proportion of the operation time of a system to the total time
d) Proportion of the downtime of a system to the total time
c
Q15. When a computer system operates for 1,200 hours, the status of the normal operation
time and the repair time is shown in the table below. What is the value of MTTR of
the system?
Q16. The system configurations A through C are made up by connecting multiple identical
devices. Which of the following is a list where A through C are sorted in descending
order of availability? Here, represents a device. The parallel connection requires
only one (1) of the devices to be functional, while the series connection requires all
devices to be functional.
When the types of programs that are executed when a PC is started are broadly classified
into three categories, namely BIOS (Basic Input Output System), OS, and resident
application program, which of the following is the order of execution of the programs?
a) BIOS, OS, resident application program
b) OS, BIOS, resident application program
c) OS, resident application program, BIOS
d) Resident application program, BIOS, OS
a
Q18. Spreadsheet software is used to predict sales according to the weather. The table is a
worksheet into which the probability for the weather type (sunny, cloudy, rainy) on the
day to be predicted and the predicted sales amount by weather type for each product is entered. An expression is entered in cell E4 to calculate the predicted sales amount on
the day for Product A, and this is copied to cells E5 through E6 and used. Under these
conditions, which of the following is an appropriate expression to be entered in cell E4? Here, to obtain the predicted sales amount on the day for each product, the probability for each weather type is multiplied by the predicted sales amount for each of weather type, and then these values are added up.
Which of the following is an advantage of using OSS (Open Source Software)?
a) Technical support is provided free of charge from the developer at the time of
installation.
b) The software is not prone to infection of viruses, as the source code is not released.
c) Compensation can be received for damages caused by defects in the software.
d) The source code can be modified to fit the environment of the user in accordance
with the license conditions.
d
Multiple files stored on a hard disk are used in work, from Monday to Friday. In order
to handle failure of the hard disk, the data is backed up to another hard disk after the
end of each day’s work. When the backup has following conditions, what is the total
time required (in minutes) to perform backups of data from Monday to Friday?
[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size
of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One (1) file
is backed up at a time; backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday,
all files are backed up, whether or not they have been modified.
a) 25
b) 35
c) 50
d) 150
c
Which of the following is an appropriate combination of software that includes only
OSS (Open Source Software)?
a) Internet Explorer, Linux, PostgreSQL
b) Internet Explorer, PostgreSQL, Windows
c) Firefox, Linux, Thunderbird
d) Firefox, Thunderbird, Windows
c
Which of the following is an appropriate description concerning the OS for PCs?
a) Each PC allows only one (1) type of OS to be installed and run on it.
b) There is no OS for PCs equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, all of the software operating with the old version of the OS cannot be used any more.
d) There exist some OSs for PCs that can be started up by using an external storage device, such as a CD-ROM and USB memory, other than the hard disk.
d
Which of the following is the appropriate merit of server virtualization?
a) It enables a single computer to be run like it was multiple servers, so it enables the
flexible distribution of physical resources in response to demand.
b) A server is built by plugging the required number of blades that have a computer
function into a chassis, so the number of machines can be flexibly increased and
decreased.
c) The computers that constitute a server are used without being connected to other servers, so security can be improved.
d) Multiple computers that constitute a server perform the same processing and the
results of the processing are cross-checked against each other, so reliability can be
improved.
a
Which of the following is an input method where a touch panel is operated by
touching it in two or more locations simultaneously?
a) Touch type
b) Double click
d) Multitask
d) Multi-touch
d
On a display screen, various colors are created through additive color mixing with three
colors, namely red, green, and blue. When the red, green, and blue are mixed evenly,
which of the following colors is formed?
a) Red-violet
b) Yellow
c) White
d) Green rust
c
In a relational database, which of the following is the reason for a primary key being
specified?
a) To clearly indicate that something is not subject to an arithmetic operation
b) To enable the search of the column that is specified as the primary key
c) To prevent reference from another table
d) To enable any record in the table to be uniquely identified
d
Sales data is to be managed with tables in a relational database. When the tables for sales data are designed, which of the following activities analyzes the relationship between the fields of the tables and decompose the tables so that there are no duplications or inconsistencies in the data?
a) Join
b) Projection
c) Normalization
d) Exclusive control
c
Which of the following is an appropriate description about association of records for a
relational database?
a) Records in multiple tables are associated at the same row position relative to the first
row in each of the tables.
b) Records in multiple tables are associated through the values of corresponding fields.
c) Records are associated with one another by a pointer that represents the parentage.
d) Records are associated with one another by a hash function.
b
Q29. A “Sales Details” table and a “Products” table are managed in a relational database. What
is the total number of notebooks sold?
Q30. Which of the following is the appropriate combination of terms or phrases to be inserted
into blanks A and B in the description below concerning NAT?
NAT is often used in order to connect an office or a household LAN to the Internet, and
it converts between A and B .
Mr. A sent an e-mail to the three (3) people Mr. P, Mr. Q, and Mr. R. He entered Mr. P’s
e-mail address in the To field, Mr. Q’s e-mail address in the CC field, and Mr. R’s email address in the BCC field. Among the recipients of the e-mail Mr. P, Mr. Q, and Mr.
R, which of the following lists contains all and only the people who can know that the e-mail with the same content is sent to all three (3) people?
a) Mr. P, Mr. Q, Mr. R
b) Mr. P, Mr. R
c) Mr. Q, Mr. R
d) Mr. R
d
Q32. In phone numbers that have the format below, eight billion numbers are to be created.
What is the minimum number of digits required for the phone numbers? Here, “020” is
included in the digits.
Which of the following is not an appropriate description of online storage?
a) It can be used not only from a computer, but also from a smartphone or a tablet, if
the device is connected to the Internet.
b) There is a free service that can be used with limited capacity and functionalities.
c) There is a service that allows multiple registered users to share and edit the same
file.
d) If the capacity of the auxiliary storage unit built into the user’s computer or tablet is increased, the capacity of online storage will also increase automatically.
d
Which of the following is an appropriate explanation of tethering?
a) A type of virus that replicates itself and spreads infection throughout a network
b) A function of connecting a PC to the Internet by using a communication terminal such
as a smartphone like a mobile router
c) A method of detecting a tamper by using a hash function and public key cryptography for electronic data
d) An attack that attempts to illegally manipulate the information in a database by
deliberately entering an SQL command in an input field on a web page
b
Which of the following lists contains all appropriate descriptions concerning an e-mail sent as a chain letter?
A: It is used for the purposes of communication and information sharing within a group.
B: It places a wasteful load on network and servers.
C: The same e-mail is repeatedly replied to.
D: The text of the e-mail encourages forwarding of the e-mail to many people.
a) A, C
b) A, D
c) B, C
d) B, D
d
There is a room that stores important information. Which of the following is the most
appropriate countermeasure for unauthorized entry to this room and unauthorized access
to the important information in the room?
a) The monitoring of entry and exit of the room and work that is performed in the
room with security staff and monitoring cameras
b) The wearing of an entry pass in a place where other people cannot see it when in
the room
c) The use of only electronic methods such as card authentication with no staffed desk for entrance and exit control
d) The informing of all employees of the existence of the room and the information
that it stores
a
Which of the following is the appropriate description concerning a wireless LAN?
a) Countermeasures against unauthorized use of an access point are required.
b) The standard for encryption is limited to WPA2.
c) Communication between a terminal and an access point is possible over any distance.
d) There are multiple standards for wireless LANs, and communication is possible
among them all.
a
There is an electronic file that needs to be made confidential. Which of the following is
the appropriate security technology to use in order to ensure the confidentiality of this file?
a) Access control
b) Timestamp
c) Digital signature
d) Hot standby
a
One of the methods of cracking a password is a brute force attack that attempts all
character combinations. When the number of characters of a password that is composed
of 26 letters from A through Z is increased from four (4) to six (6) characters, by what
factor is the maximum number of attempts to successfully crack the password with the
brute force attack increased?
a) 2
b) 24
c) 52
d) 676
d
Which of the following is used to confirm that there is no falsification of the content of
an e-mail?
a) IMAP
b) SMTP
c) Information security policy
d) Digital signature
d