Oct 2021 Flashcards
When three balls are picked out consecutively from a box containing three white balls
and four black balls, which of the following is the lowest probability?
a) Probability of picking out the balls in order of black, black, black
b) Probability of picking out the balls in order of black, black, white
c) Probability of picking out the balls in order of black, white, black
d) Probability of picking out the balls in order of white, black, black
a
Which of the following is an appropriate description concerning the characteristics of EUC (End User Computing)?
a) EUC enables users to directly access, reference, and manipulate data that they need
for business operations.
b) EUC gives priority to system operation and maintenance, so it causes backlogs to
increase in the information systems department.
c) EUC requires more development staff members in the information systems
department, so it often leads to an increase in the operating costs of the department.
d) EUC allows the information systems department to take a leadership role in
application development, so it can reduce the workload of users.
a
Q3. As shown in Figure 1, there is a box that generates a single output for two inputs. The
input in this box is either “Agree” or “Disagree,” and the output of “Agree” is generated
only when both inputs are “Agree,” while in other cases the output of “Disagree” is
generated. When three inputs are entered into two boxes as shown in Figure 2, which
of the following is the correct description concerning the output?
Which of the following represents the decimal number 155 in binary?
a) 10011011
b) 10110011
c) 11001101
d) 11011001
a
On a desk that is only large enough to place 4 files at the same time, 6 files, A through
F, are used to perform a task. When 4 files are already placed on the desk, the least
recently used file must be placed back into the drawer before the fifth file can be placed on the desk. When the files are used in the sequence A, B, C, D, B, A, E, A, B, F, which
of the following is the last file placed back into the drawer?
a) A
b) B
c) D
d) E
c
Which of the following is a term for a list of instructions to a computer that are written
in a human-readable programming language?
a) PIN code
b) Source code
c) Binary code
d) Character code
b
In the data structure called a queue that is suitable for performing first-in first-out (FIFO) processing, values are stored in the order of “8”, “1”, “6”, and “3”, and then two (2)
values are removed consecutively. Which of the following is the last value that is
removed?
a) 1
b) 3
c) 6
d) 8
a
Q8. The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” represents that the data of “x” is replaced with the data of “y”.
In a markup language, with the purpose of displaying on a screen and printing, it is
possible to directly embed not only the document content, but also the document
structure and layout information, and the character font and size information. Which of the following is classified into such a markup language?
a) C
b) HTML
c) SQL
d) URL
b
Which of the following is designed to virtually reduce the time for the CPU to access
the main memory, in order to improve the processing efficiency of a PC?
a) SSD
b) Virtual memory
c) Cache memory
d) Defragmentation
c
Which of the following is the most appropriate description concerning a compatible
CPU?
a) It can run the OS or the application software that can be run on the original CPU.
b) It must not be developed nor manufactured as long as the patents of the original CPU
are valid.
c) A compatible CPU for single-core CPU has been developed, while one for multi-core
CPU does not exist.
d) It is a CPU that is intended to improve the performance of an outdated PC, and is not
adopted for a new model of PC.
a
Which of the following is an appropriate description about a device driver?
a) Software for controlling and operating peripherals that are connected to a PC
b) Software that is started immediately after a PC is turned on, and enables basic
input/output to the hard disk and the keyboard before the OS starts
c) Software to be embedded in a web browser for displaying pages that contain video
d) Software that combines files into one (1) file and restores the original files from the
file
a
Volatile memory loses its content when the power supply is lost. Among (i) through (iv)
below, which of the following is the list of all volatile memory?
(i) DRAM
(ii) ROM
(iii) SRAM
(iv) SSD
a) (i), (ii)
b) (i), (iii)
c) (ii), (iv)
d) (iii), (iv)
b
Two (2) HDDs are connected to a server for storing data. When at least one (1) of the
HDDs is working, stored data needs to be available. Which of the following is an appropriate configuration that should be used for the HDDs?
a) Striping
b) Data mining
c) Tethering
d) Mirroring
d
Q15. Among the system configurations shown below, which of the following has the lowest
probability of causing the entire system to stop at the occurrence of a failure? Here,
represents an identical device. When the devices are connected in parallel, only
one device must be running, and when the devices are connected in serial, all devices
must be running.
Among the descriptions A through D concerning measures for reducing the response
time in a client/server system, which of the following is the list that contains all and only
the appropriate items?
A: Establishing a high-speed line between the client and the server, and reducing the
time taken to transmit data
B: Increasing the number of clients, and reducing the waiting time for users before
using clients
C: Reducing the time taken for data entry by users on the client’s input screen
D: Making the server high-performance, and reducing the server’s processing time
a) A, B, C
b) A, D
c) B, C
d) C, D
b
Which of the following is an appropriate explanation of plug-in software?
a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.
b) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a web browser, to enhance their functions.
c) Plug-in software is often included in applications such as a spreadsheet, and allows
the users to record and replay the series of operations performed.
d) Plug-in software is provided to replace part of a program for the purpose of modifying
functions or fixing bugs.
b
Q18. The diagram below shows the directory structure for a part of a certain file system.
Which of the following is the reference from the current directory D3 (indicated with an
asterisk “*”) to the file “a” under the directory D4 (indicated with an arrow)? Here,
files are specified as follows
Which of the following is an appropriate description concerning Open Source Software (OSS)?
a) Source code can be edited and then redistributed.
b) Source code is free of charge, but maintenance and support are charged.
c) Copyrights are waived, so it can be used without permission.
d) If the copyright is not waived, the operability must be warranted.
a
Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary
storage device, to application programs.
c) Since an OS has the function of automatically converting character set of a file,
application programs can access the file without regard to the character set.
d) The source code of an OS is required to be disclosed so that application programs can
be free to use the various functions of the OS.
b
Which of the following is an appropriate description about the function keys of a PC?
a) They are the keys where specific functions are assigned for each application and OS.
b) They display a keyboard shape on a screen and enable input processing with software.
c) They have a security role and are keys for performing encryption and decryption.
d) They are information to identify specific lines uniquely in a database.
a
Q22. Spreadsheet software is to be used to perform a calculation with the monthly sales data
for each product shown in the worksheet below. When the expression
“COUNTIF(B2:D2,>15000)” is entered in cell E2 and then copied to cell E3 and cell
E4, which of the following is the value that is displayed in cell E4?
Which of the following is a computer that is used for tasks such as global scale
environmental simulations and DNA analysis, and was developed with the objective of
processing a large amount of calculations at ultra high speed?
a) Virtual computer
b) Super computer
c) General purpose computer
d) Microcomputer
b
Which of the following is the term for the design that is intended to provide comfortable usability to as many people as possible, regardless of their culture, language, age, gender,
presence or absence of disability, or capability?
a) Barrier-free design
b) Fail-safe
c) Foolproof
d) Universal design
d
Which of the following is the most appropriate explanation of virtual reality?
a) Improving the GUI not by displaying an image gradually from top to bottom, but by
first displaying a coarse mosaic-like image, and then by gradually increasing the
sharpness of the image
b) Enabling computer-simulated objects and spaces to be perceived like the real world
by using computer graphics or other techniques
c) Conducting computer simulations instead of, among others, the wind-tunnel test used for the design of cars and airplanes
d) Combining images of separately shot scenery and people to create an image that is different from the real world
b
Which of the following is a service that provides disk space on a server connected to the
Internet for storing files and allows users to read and write data from anywhere inside
or outside their homes?
a) Archive
b) Authoring
c) Online storage
d) Flash memory
c
Which of the following is an appropriate effect obtained through the normalization of
data in a relational database?
a) Securing of data compatibility between different types of computers
b) Improvement of storage efficiency through data compression
c) Elimination of redundancy and inconsistency of data
d) Elimination of the need for backups that are necessary in preparation for the failure
of devices storing data
c
Q28. In the description below concerning a relational database, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
When character strings are searched by using wildcard characters, which of the
following lists all and only the character strings that match the search expression
“A.te??” among the character strings I through IV? Here, the wildcard character “?”
represents any one (1) character and “*” represents a character string that consists of
zero (0) or more of any characters.
I A.text
II AA.tex
III B.Atex
IV BA.Btext
a) I
b) I, II
c) II, III, IV
d) III, IV
a
When another network such as the Internet is accessed from a network in an office or a
household, which of the following fulfills the role of an entrance or an exit to the other
network?
a) Splitter
b) Default gateway
c) Hub
d) Repeater
b
Among the cases of communication between PCs, servers, communication devices, printers, and other devices, which of the following needs a WAN?
a) Multiple PCs and a file server are connected to a LAN in Osaka branch office, and
files stored in the file server are made to be accessible from any PC connected to the LAN.
b) Inside a house, a PC and a printer are connected with Bluetooth, and documents
created on the PC are printed on the printer.
c) Inside a server room, a PC and a web server are connected to a hub, and the web server is maintained from the PC.
d) A PC connected to the LAN in Kyoto-City sales office accesses the server in Tokyo
head office and uploads sales information.
d
Which of the following is an appropriate explanation of SSID that is used in wireless
LANs?
a) The MAC address of an access point
b) The channel number of radio waves in use
c) The IP address of an access point that is used as the default gateway
d) A character string used to identify the wireless network
d
Which of the following is an appropriate description concerning communications
protocols?
a) There are no communications protocols that are used in analog communication.
b) They are developed only by international organizations, and those developed
independently by manufacturers are not called communications protocols.
c) In communications protocols, only the normal cases are defined.
d) Devices that are provided by different manufacturers or have different OS can
communicate with each other if they use the same communications protocol.
d
Q34. When Mr. A sent an e-mail to Mr. X, he decided to also send it to Mr. Y and Mr. Z for
reference. However, Mr. A did not want Mr. X nor Mr. Y to know that it was sent to Mr.
Z. In such a case, which of the following is the appropriate combination of recipients to
specify?
Which of the following is an appropriate explanation of the keylogger that is a threat to
information security?
a) Stealing information by watching the keyboard input and the display output from
behind a PC user
b) Monitoring and recording the keyboard input on a user’s PC
c) Analyzing a password by using dictionary of all the words that are likely to be used
as passwords
d) Searching for a free access point by moving around a town with a PC that can detect
the electromagnetic waves of a wireless LAN
b
Which of the following is a DoS attack?
a) Interrupting a network service by sending a large number of requests
b) Spying on the data of other people on a communication path
c) Trying various combinations of letters or numbers to unlock an account
d) Using a service on a network illegally by pretending to be another person
a
Q37. In a file system that uses the access control methods below, which of the following
settings for access rights to file A satisfies the requirements for access control?
Among the countermeasures A through D concerning information security, which of the following is the list that contains all and only the appropriate countermeasures for preventing a virus infection?
A: Installing antivirus software
B: Applying a security patch (i.e., update module)
C: Setting a password for the hard disk
D: Encrypting files
a) A, B
b) A, B, C
c) A, D
d) B, C
a
Which of the following is a protocol that is used for encrypted communication between a web server and a web browser that are connected through HTTPS?
a) SEO
b) SPEC
c) SQL
d) TLS
d
Among I through IV used for authentication, which of the following lists all and only
biometrics?
I PIN (Personal Identification Number)
II Iris
III Fingerprint
IV Vein
a) I, II, III
b) II, III
c) II, III, IV
d) IV
c