Oct 2022 Flashcards
As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five (5) squares that are black or white.
2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■
A white square indicates 0, and a black square indicates a different positive value that
is determined depending on the position of the square. The sum total of the values of
the five (5) squares is a numeric value that is represented by the five (5) squares. Which
of the following is the decimal number that is represented by ■■□□□?
a) 12
b) 20
c) 24
d) 30
c
There are five (5) lamps arranged in line. Each of them can be turned on and off
independently. How many patterns are there where two (2) or more lamps are turned
on? Here, the pattern where all lamps are turned on is counted as one (1) and the pattern
where any one of them is turned on is counted as five (5).
a) 4
b) 10
c) 26
d) 32
c
Which of the following is the binary number that is obtained by adding the binary
numbers 01011010 and 01101011? Here, the binary numbers are expressed as positive 8-bit values.
a) 00110001
b) 01111011
c) 10000100
d) 11000101
d
Q4. Which of the following is the combination of terms or phrases to be inserted into blanks
A through C in the description below concerning a method for representing information?
Data that represents information by using a continuous, variable physical volume
(length, angle, voltage, etc.) is called data, and data that represents information
by using discrete numerical values is called data. A CD that is used for the
distribution of music and songs is an optical disc medium that stores information as
data.
The procedure described below is sequentially performed for two (2) variables x and y,
starting with step (1). When the procedure is completed, what is the resulting value of x?
[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
Which of the following is the method for describing the logical structure of a sentence
in XML?
a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)
b) Separating the sentence, clauses, and other elements by using commas
c) Enclosing the sentence, clauses, and other elements by using tags
d) Separating the sentence, clauses, and other elements by using tab characters
c
Q7. A stack is a first-in last-out data structure. By using a stack, a device receives data from
the right side, changes their order and sends them to the left side, as shown in the figure
below. There are three (3) types of operations available on the device, as described
below.
Q8. There exist four (4) states numbered 1 through 4. The four (4) states are connected as
shown in the figure below, and the state transition occurs in a clockwise or counterclockwise direction.
There is a desk that can hold at most four (4) files. On this desk, six (6) files A through
F are used for a job. When the fifth file needs to be put on the desk, the file with the
longest time since the last use among the four (4) will be put in a drawer. If the files
are put on the desk and referenced in order of A, B, C, D, E, C, B, D, F, B, which of
the following is the last file to be put in the drawer?
a) A
b) B
c) D
d) E
d
Which of the following is an appropriate description concerning CPU performance?
a) Compared with a 64-bit CPU, a 32-bit CPU is able to process a longer data at one time.
b) The less the capacity of cache memory in the CPU, the faster the processing speed.
c) For a CPU of a given architecture, raising the clock frequency increases processing
speed.
d) A dual core CPU can perform a greater number of processes simultaneously than a
quad core CPU can
c
Which of the following is an appropriate description concerning the cache memory of a CPU?
a) The size of cache memory is greater than or equal to the size of main memory.
b) Cache memory is used to reduce the effective access time of main memory.
c) On computers with a large main memory, there is no effect of cache memory.
d) In order to increase the hit rate, the user specifies the frequently used programs to be
resident in cache memory
b
Which of the following is an appropriate description concerning NFC?
a) It provides communications across a short distance of approximately 10 cm, and is
used for reading and writing data on an IC card or IC tag.
b) It can provide communications across an area of tens of meters, and is used in wireless LANs
.
c) It provides communications by using infrared rays, and is used for data exchange on
mobile phones.
d) It can receive electromagnetic waves from multiple artificial satellites, and is used for positioning on a car navigation system.
a
Which of the following storage units has the shortest access time?
a) HDD
b) SSD
c) Cache memory
d) Main memory
c
Which of the following is an appropriate explanation of the hot standby system?
a) It is a system configuration where a collection of various types of hardware, software,
and data on the Internet is provided to the user.
b) It is a system configuration where a high level of reliability can be obtained by
simultaneously operating the two (2) sets of equipment and by always performing the
same processing while cross-checking the results.
c) It is a system configuration where a backup machine is always kept ready in an
operable state and is immediately switched into operation at the occurrence of a failure.
d) It is a system configuration where a backup machine is arranged, and at the occurrence of a failure, the operator in charge starts up the backup machine and switches it into operation.
c
When the processing speed of the system overall is constrained because of slow
processing speed in one of the components, which of the following is a term for the
component that is causing the problem?
a) Throughput
b) Defragmentation
c) Flowchart
d) Bottleneck
d
The life cycle of a device is divided in terms of failures into three (3) periods, namely,
the initial failure period, the random failure period, and the wear-out failure period, as
time goes by. In the first initial failure period, the failure rate decreases as time goes by.
Then, the device reaches a stable state, and the failure rate is effectively constant in the
subsequent random failure period while time goes by. In the final wear-out failure period, the failure rate increases as time goes by, and the life of the device eventually ends. Which of the following is a representation of the relation between the failure rate and
time?
a) Gantt chart
b) Reliability growth curve
c) Bathtub curve
d) Radar chart
c
Which of the following is an appropriate explanation of multitasking?
a) Several computers connected via a network work together to achieve a highperformance system.
b) Several processor cores composed of arithmetic circuits and other control circuits are
implemented in a single CPU.
c) The CPU processing time is allocated to several processes in turn so that the processes
can be executed simultaneously.
d) The same processing is performed for multiple data items by executing a single
instruction.
c
The types of programs that are running when a PC is started are broadly classified into
three (3) categories, namely BIOS (Basic Input Output System), OS, and resident
application programs. Which of the following is the order of execution of the programs?
a) BIOS, OS, resident application programs
b) OS, BIOS, resident application programs
c) OS, resident application programs, BIOS
d) Resident application programs, BIOS, OS
a
When a record in a file is modified, which of the following is an appropriate way of
identifying the modified contents?
a) Keeping a record of the size and the modified date of a file
b) Keeping a copy of a file and comparing it to the modified one later
c) Keeping a record of the number of records into the file
d) Keeping records sorted in ascending order of the key field
b
Which of the following is an appropriate combination of software that includes only
OSS (Open Source Software)?
a) Microsoft Word, Linux, PostgreSQL
b) Microsoft Word, PostgreSQL, Windows
c) Firefox, Linux, Thunderbird
d) Firefox, Thunderbird, Windows
c
Which of the following is a term that means the validation of a software license by using
the product ID and the user’s hardware information, in order to prevent unauthorized
use of the software?
a) Activation
b) Cloud computing
c) Streaming
d) Fragmentation
a
Q22. Sales data by month for each branch is evaluated. In the “Evaluation” field for each
branch by month, if the amount of sales at the branch is below the average sales amount
of branches A through C for the month, the symbol “X” is to be displayed, and if the
amount is above or equal to the average, the symbol “O” is to be displayed. Which of
the following is an appropriate expression to be entered in cell C3? Here, the expression
that is entered in cell C3 is copied and used in cell D3, cell E3, cells C5 through E5, and
cells C7 through E7
Which of the following is an appropriate typical example of a system operating on a
super computer?
a) An SCM system that is required for linkage between enterprises
b) A global climate change prediction system that requires large-scale scientific and
technical computing
c) A banking system that requires a high reliability
d) An engine control system of a vehicle that requires advanced real-time control
b
Which of the following is an appropriate description of AR (Augmented Reality)?
a) A technology that creates memory space beyond the amount of memory actually
installed and makes this available as main memory
b) A technology that overlays and displays computer-generated information on live video or other content that captures real environments
c) A technology that analyzes and digitizes the human voice by using a computer in order
to utilize it for commanding a computer, entering characters, and so on
d) A science or a technology for emulating human intellectual activity such as inference,
learning, and ability to understand language, by using a computer
b
Which of the following is a technique that can be used to compress both video and audio
data?
a) BMP
b) GIF
c) JPEG
d) MPEG
d
In DBMS, which of the following is a function for maintaining consistency of data by preventing the occurrence of conflicts due to simultaneous access to the data ?
a) Normalization
b) Deadlock
c) Exclusive control
d) Restore
c
Q27. By joining tables “Employees in charge”, “Regions”, and “Customers” that are managed
in a relational database, the table A that is shown below is obtained. Which of the
following is the table “Customers” that is used for the joining? Here, a solid underline
indicates a primary key and a dotted underline indicates a foreign key.
Q28. A customer name and his or her address, a product name and its unit price, the products
and quantities ordered by the customer, and the date of order are managed by using a
relational database. Which of the following is an appropriate table after normalization?
Here, the underline represents primary keys, and there are same customer names and
product names.
Q29. When conditions (i) through (iv) are all fulfilled, which of the following is the E-R
diagram that indicates the relationship between publishing companies, authors, and
books? Here, the notation for the E-R diagram is as below.
Which of the following is an appropriate role of a subnet mask?
a) Identifying a MAC address on an Ethernet from an IP address
b) Separating a network address included in an IP address and a host address of the
individual computer that belongs to the network
c) Associating a private IP address with a global IP address when communication is
relayed between an internal network and the Internet
d) Associating a domain name of destination with an IP address
b
Which of the following is an appropriate explanation of the POP communications
protocol?
a) It is a protocol for the remote control of a computer from a terminal that is in a different location.
b) It is a protocol for file transfer.
c) It is a protocol for sending e-mails to a mail server.
d) It is a protocol that e-mail software uses in order to receive e-mails from a mail server.
d
Which of the following is a WAN?
a) A network that uses a company’s own communication lines, and connects buildings within the same premises
b) A network that connects the floors in a company’s building
c) A network that uses a communications service provider’s communication lines, and connects a head office with branch offices.
d) A network that connects the PCs on one floor
c
Q33. When setting up PC1 for connecting it to the Internet, an IP address is set in “default
gateway” that is one of the network settings of PC1. Which of the following devices has
this IP address?
Which of the following is used for communication in activities such as the gathering of data from IoT devices, and has long range and power saving characteristics that enable
wireless communication over a distance of tens of kilometers?
a) BLE
b) LPWA
c) MDM
d) MVNO
b
Among the following lists consisting of the information security terms availability,
integrity, confidentiality, and vulnerability, which is a complete list of properties of
information that information security is to preserve?
a) Availability, Integrity
b) Availability, Integrity, Confidentiality
c) Integrity, Confidentiality
d) Integrity, Confidentiality, Vulnerability
b
During the use of a PC in workplace, a message was displayed stating that antivirus software had detected a virus. Which of the following is an appropriate action that should be taken immediately?
a) Reboot of the PC
b) Notification to the workplace by e-mail from the PC
c) Disconnection of the PC from networks
d) Backup of files on the PC
c
Among the threats and vulnerabilities in information security, which of the following is a vulnerability?
a) Computer virus
b) Social engineering
c) Tapping of communications data
d) Inappropriate password management
d
Which of the following is an appropriate description concerning a scheme for
authenticating a user of a system?
a) A scheme where authentication is accomplished by utilizing a password that can be used only once is called a single sign-on.
b) A scheme where the use of multiple servers or applications is authorized by being authenticated once is called a one time password.
c) A scheme where a sequence of numbers or characters that are placed on positions that the user remembers within a table on the screen is entered as a password is called a matrix authentication.
d) A scheme where authentication of the user is accomplished by using fingerprints,
voiceprint, or other physical characteristics is called a challenge-response authentication.
c
Which of the following is the list that contains all appropriate features of chain mail?
A: It is used for the purposes of communication and information sharing within a group.
B: It places a wasteful load on network servers.
C: The same e-mail is repeatedly replied to.
D: The text of the e-mail encourages forwarding of the e-mail to many people.
a) A, C
b) A, D
c) B, C
d) B, D
d
One of the methods of cracking a password is a brute force attack that involves attempting all character combinations. When the number of characters of a password
that is composed of 26 types of characters from A through Z is increased from four (4) to six (6) characters, by what factor is the maximum number of attempts to decode the password with the brute force attack increased?
a) 2
b) 24
c) 52
d) 676
d