Oct 2023 Flashcards
When three balls are picked out consecutively from a box containing three white balls and four black balls, which of the following is the lowest probability?
a) Probability of the balls picked out in order of black, black, black
b) Probability of the balls picked out in order of black, black, white
c) Probability of the balls picked out in order of black, white, black
d) Probability of the balls picked out in order of white, black, black
a
A search is performed by specifying a character string comprised of multiple alphabetic characters and one delimiter character “.” (period). An “” (asterisk) represents an arbitrary
character string with zero or more characters, and a “?” (question mark) represents an arbitrary
single character. Which of the following is a character string that matches the character string represented below?
X.Y??
a) XY.XYY
b) XXX.YY
c) XYX.YXY
d) YXYX.YXY
c
When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded data. When the same sound source is sampled at the same sampling frequency and then encoded as a series of 16-bit data in lieu of 8-bit data, which of the following is an appropriate description concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher.
a
Q4. Which of the following is a search condition for the shaded portion of the Venn diagram
below?
Q5. As shown in Figure 1, there is a processing unit which reads two positive integer input
values A1 and A2, and then writes two integer output values B1 and B2. B1 is equal to A2,
and B2 is the remainder of A1 divided by A2. In Figure 2, two processing units with the same
function as the above are connected in series. When A1=15 and A2=6 are given to the lefthand unit in Figure 2, what is the output value of B1 for the right-hand unit?
Q6. The data is exchanged between variable A and variable B. When variable TMP is used to
temporarily store data, which of the following is the procedure for exchanging data correctly?
Here, “x ← y” represents that the data of “x” is replaced with the data of “y”.
Which of the following is an explanation of a characteristic of hypertext?
a) It has a function for the creation and editing of a range of expressions.
b) It has a function for the creation and editing of a range of shapes.
c) It provides a range of templates, and enables their use.
d) It has a mechanism that enables relevant information to be accessed by embedding a
link in any position in a text.
d
In the data structure called a queue that is suitable for performing first-in first-out (FIFO) processing, values are stored in the order of “8”, “1”, “6”, and “3”, and then two (2) values are removed consecutively. Which of the following is the last value that is removed?
a) 1
b) 3
c) 6
d) 8
a
Q9. When the process that is shown in the flowchart is ended, which of the following is the
value of x?
Q10. Which of the following is an appropriate combination of words that are inserted into
blanks A and B in the description below concerning the execution sequence of instructions in
a computer?
Which of the following is a method of writing the same data to multiple hard disks simultaneously and improving reliability rather than performance?
a) Striping
b) Paging
c) Interleaving
d) Mirroring
d
Which of the following is required for an application program to use the peripheral
equipment that is connected to a PC?
a) Compiler
b) Device driver
c) Plug and play
d) Hot plug
b
Q13. There is an IoT system that automatically opens and closes the sluice gate for a rice field
by measuring the water level in the rice field. Which of the following is the appropriate
combination of terms to be inserted into blanks A and B in the figure?
Which of the following is an appropriate description concerning a benchmark test?
a) It focuses on input and output instead of the processing structure in the system in order to test if the output are as per the specifications for various input.
b) It focuses on the internal processing structure of the system and sets test cases that cover conditions such as branching conditions and repetition conditions in order to test if the behavior of the processing is as intended by the design.
c) It predicts performance of a system to be created before it is designed, by
mathematically modeling the behavior of the system and simulating its behavior by
using a pseudo program.
d) It evaluates performance by performing a standard processing on an actual system and
comparing the performance such as the time taken for the processing with other systems.
d
Among the descriptions A through D concerning measures in a client/server system, which of the following is the list that contains all and only the appropriate items for reducing the response time?
A: Establishing a high-speed line between the client and the server, and reducing the time taken to transmit data
B: Increasing the number of clients, and reducing the waiting time for users before using clients
C: Reducing the time taken for data entry by users on the client’s input screen
D: Making the server high-performance, and reducing the server’s processing time
a) A, B, C
b) A, D
c) B, C
d) C, D
b
In the specification of the capacity of a battery that is embedded in a device such as an IoT device or a smartphone, which of the following is the appropriate meaning of “100mAh”?
a) It can discharge a current of 100mA for one (1) hour.
b) After it is charged for 100 minutes, it can discharge a current for one (1) hour.
c) It can discharge a current of 1A for 100 minutes.
d) After it is charged for one (1) hour, it
can discharge a current for 100 minutes.
a
Which of the following is an appropriate explanation of the virtualization of a server?
a) It is a technique for virtually creating computer-generated worlds or immersive
environments that users can interact with.
b) It is a technique for virtually operating the GUI of a remote computer connected via a network by using a local computer.
c) It is a technique for virtually implementing and operating two or more computers on a single computer.
d) It is a technique for virtually allocating more memory space than the capacity of main memory by using a particular part of auxiliary storage.
c
Q18. In the description below concerning a file system, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
Which of the following is an appropriate description concerning the OS for PCs?
a) Each PC allows only one (1) type of OS to be installed and run on it.
b) There is no OS for PCs equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, all of the software operating with the old version of the OS cannot be used any more.
d) There exist some OSs for PCs that can be started up by using an external storage device, such as a CD-ROM and USB memory, other than the hard disk.
d
There is a system where a full backup is made after closing time every Sunday, and an incremental backup is made after closing time on Monday through Saturday. On a Wednesday, a failure happened during business hours, so a decision was made to restore data to the state
at the closing time on Tuesday by using backup files. Which of the following lists all and only the necessary backup files for restoring data? Here, an incremental backup file means a backup file that contains only the data that has been modified since the previous backup (a
full backup or an incremental backup) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
a
Q21. Spreadsheet software is to be used to perform a calculation with the monthly sales data
for each product shown in the worksheet below. When the expression
“COUNTIF(B2:D2,>15000)” is entered in cell E2 and then copied to cell E3 and cell E4,
which of the following is the value that is displayed in cell E4?
Which of the following is an Open Source Software (OSS) OS that is used in mobile
devices such as smartphones and tablets?
a) Android
b) iOS
c) Safari
d) Windows
a
Which of the following is a device that is used to recognize handwritten characters and convert them into character codes?
a) BD-R
b) CD-R
c) OCR
d) OMR
c
Which of the following is an appropriate example of benefits of cookies?
a) When a person is registered beforehand as a reader, only e-mails whose content matches
the registered genre and preference are delivered automatically.
b) When a search is performed by an Internet search engine, in addition to the search results, articles and advertisements with related content are displayed.
c) When a link to another person’s blog is pasted in one’s own blog, a notification is sent automatically to the person.
d) When a user accesses a website that he/she has accessed before, the Web page is
displayed according to the settings tailored to him/her.
d
Which of the following is an appropriate description concerning the characteristics of video distribution using streaming?
a) The data to be distributed must be stored on the server beforehand, and videos of events
and sports cannot be distributed while they are being shot.
b) Deterioration in video quality due to partial loss of data in reception can be completely eliminated.
c) Warm-up time is not required for starting playback of a video, and therefore, the viewer
can immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as soon as some data has been received.
d
Q26. When the “Department,” “Location,” and “Employee” tables are joined to create Table
A, which of the following is the “Employee” table that is to be joined? Here, an underline
indicates a primary key, and a dotted underline indicates a foreign key.
Q27. From the “Product” table below, products whose supplier is “Company A” and the price
is 1.40 dollars or more, and products whose supplier is “Company B” and the price is 1.70
dollars or less are extracted. Which of the following is a list of all of the obtained product
names?
Which of the following is an appropriate search expression for searching for information concerning “men who are younger than 20 years and men who are older than 65 years”?
a) Men AND (less than 20 years AND more than 65 years)
b) Men AND (less than 20 years OR more than 65 years)
c) Men OR (less than 20 years AND more than 65 years)
d) Men OR (less than 20 years OR more than 65 years)
b
Which of the following is a database model that represents data in a table that is composed of rows and columns?
a) Object model
b) Hierarchical model
c) Relational model
d) Network model
c
Which of the following is the most appropriate description concerning a VPN that is used, for example, to connect a PC to a workplace network from outside via the Internet?
a) It provides several lines for connecting to the Internet and improves availability.
b) It guarantees the maximum delay time by controlling the timing of transmission.
c) It guarantees a minimum bandwidth by compressing the communication data.
d) It performs highly secure communications by using authentication and encryption of the
communication data
d
Which of the following is an appropriate description concerning a virus check for an e-mail?
a) A virus check is not required for the encrypted e-mail.
b) A virus check is not required for the received e-mail if the virus check is performed by the sender.
c) A virus check is performed even if the attached file has a file extension of “jpg”.
d) A virus check is performed only for the e-mail sent by an unknown sender.
c
Which of the following is the mechanism that determines the correspondence between domain names and IP addresses on the Internet?
a) DNS
b) FTP
c) SMTP
d) Web
a
Which of the following is the term that describes a network device copying a packet and sending it to multiple destinations?
a) DNS
b) URL
c) Multicast
d) Multilink
c
Which of the following is a wireless network that is used for IoT systems, and has power saving properties that enable operation for more than several years with a general battery and wide area properties that enable communication over a maximum distance of tens of
kilometers?
a) LPWA
b) MDM
c) SDN
d) WPA2
a
All employees are registered in an entry control system with biometric authentication, and the employees who are allowed to enter each room within the company are specified. The
exit from a room is not controlled. Among the following lists of the descriptions A through D, which is the list that contains all and only the items that can be achieved by the entry control system?
A: Only authorized employees are allowed to enter a room.
B: The time duration for which each person stayed in the room is recorded.
C: Any attempts to enter a room but were denied the entry are recorded.
D: The number of persons in a room is identified.
a) A, B, C
b) A, C
c) A, D
d) B, C, D
b
Which of the following is the most appropriate description concerning an information security policy for an organization?
a) It is a management’s role to implement not only the top-level information security
policy, but also the rules and procedures for information security.
b) It is necessary to publish outside of the company not only the top-level information security policy, but also the rules and procedures for information security.
c) While the rules and procedures for information security should be tailored to the organization, the top-level information security policy must be adopted from the industry standard model.
d) Even when different information security measures are implemented in different departments of an organization, the top-level information security policy is
recommended to be unified across the organization.
d
Which of the following is an explanation of DRM (Digital Rights Management), which
is used for digital content?
a) It is data compression technology for audio and video, and there are multiple standards for the technology according to playback quality.
b) It is a collective term for technologies for protecting the copyright of content and restricting its use and duplication.
c) It is an XML-based description language for controlling data broadcasting on digital
television.
d) It is a standard for reproducing realistic sound.
b
Which of the following is the most appropriate explanation of the operation that spyware is meant to perform?
a) To destabilize the operation of the OS and software
b) To delete files from the file system without user consent
c) To hijack the web browser and forcefully execute a particular operation
d) To collect personal and other information without being noticed by users
d
Which of the following is an appropriate description of S/MIME that is used for e-mails?
a) A service that a user can use from his or her web browser by sending or receiving e-mails on the website
b) A standard for securely sending and receiving e-mails between e-mail software by using a digital certificate
c) A protocol for transferring e-mails between e-mail servers
d) A protocol for e-mail software to receive e-mails
b
The communication protocol between a web browser and a web server was changed from HTTP to HTTPS. Which of the following does this achieve?
a) Improvement of transfer rate between a client PC and a web server
b) Prevention of computer virus infection
c) Protection of confidentiality in communication
d) Improvement of web browser display speed
c