Oct 2022 Flashcards
As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five (5) squares that are black or white.
2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■
A white square indicates 0, and a black square indicates a different positive value that
is determined depending on the position of the square. The sum total of the values of
the five (5) squares is a numeric value that is represented by the five (5) squares. Which
of the following is the decimal number that is represented by ■■□□□?
a) 12
b) 20
c) 24
d) 30
c
There are five (5) lamps arranged in line. Each of them can be turned on and off
independently. How many patterns are there where two (2) or more lamps are turned
on? Here, the pattern where all lamps are turned on is counted as one (1) and the pattern
where any one of them is turned on is counted as five (5).
a) 4
b) 10
c) 26
d) 32
c
Which of the following is the binary number that is obtained by adding the binary
numbers 01011010 and 01101011? Here, the binary numbers are expressed as positive 8-bit values.
a) 00110001
b) 01111011
c) 10000100
d) 11000101
d
Q4. Which of the following is the combination of terms or phrases to be inserted into blanks
A through C in the description below concerning a method for representing information?
Data that represents information by using a continuous, variable physical volume
(length, angle, voltage, etc.) is called data, and data that represents information
by using discrete numerical values is called data. A CD that is used for the
distribution of music and songs is an optical disc medium that stores information as
data.
The procedure described below is sequentially performed for two (2) variables x and y,
starting with step (1). When the procedure is completed, what is the resulting value of x?
[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).
a) 4
b) 5
c) 7
d) 8
b
Which of the following is the method for describing the logical structure of a sentence
in XML?
a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)
b) Separating the sentence, clauses, and other elements by using commas
c) Enclosing the sentence, clauses, and other elements by using tags
d) Separating the sentence, clauses, and other elements by using tab characters
c
Q7. A stack is a first-in last-out data structure. By using a stack, a device receives data from
the right side, changes their order and sends them to the left side, as shown in the figure
below. There are three (3) types of operations available on the device, as described
below.
Q8. There exist four (4) states numbered 1 through 4. The four (4) states are connected as
shown in the figure below, and the state transition occurs in a clockwise or counterclockwise direction.
There is a desk that can hold at most four (4) files. On this desk, six (6) files A through
F are used for a job. When the fifth file needs to be put on the desk, the file with the
longest time since the last use among the four (4) will be put in a drawer. If the files
are put on the desk and referenced in order of A, B, C, D, E, C, B, D, F, B, which of
the following is the last file to be put in the drawer?
a) A
b) B
c) D
d) E
d
Which of the following is an appropriate description concerning CPU performance?
a) Compared with a 64-bit CPU, a 32-bit CPU is able to process a longer data at one time.
b) The less the capacity of cache memory in the CPU, the faster the processing speed.
c) For a CPU of a given architecture, raising the clock frequency increases processing
speed.
d) A dual core CPU can perform a greater number of processes simultaneously than a
quad core CPU can
c
Which of the following is an appropriate description concerning the cache memory of a CPU?
a) The size of cache memory is greater than or equal to the size of main memory.
b) Cache memory is used to reduce the effective access time of main memory.
c) On computers with a large main memory, there is no effect of cache memory.
d) In order to increase the hit rate, the user specifies the frequently used programs to be
resident in cache memory
b
Which of the following is an appropriate description concerning NFC?
a) It provides communications across a short distance of approximately 10 cm, and is
used for reading and writing data on an IC card or IC tag.
b) It can provide communications across an area of tens of meters, and is used in wireless LANs
.
c) It provides communications by using infrared rays, and is used for data exchange on
mobile phones.
d) It can receive electromagnetic waves from multiple artificial satellites, and is used for positioning on a car navigation system.
a
Which of the following storage units has the shortest access time?
a) HDD
b) SSD
c) Cache memory
d) Main memory
c
Which of the following is an appropriate explanation of the hot standby system?
a) It is a system configuration where a collection of various types of hardware, software,
and data on the Internet is provided to the user.
b) It is a system configuration where a high level of reliability can be obtained by
simultaneously operating the two (2) sets of equipment and by always performing the
same processing while cross-checking the results.
c) It is a system configuration where a backup machine is always kept ready in an
operable state and is immediately switched into operation at the occurrence of a failure.
d) It is a system configuration where a backup machine is arranged, and at the occurrence of a failure, the operator in charge starts up the backup machine and switches it into operation.
c
When the processing speed of the system overall is constrained because of slow
processing speed in one of the components, which of the following is a term for the
component that is causing the problem?
a) Throughput
b) Defragmentation
c) Flowchart
d) Bottleneck
d
The life cycle of a device is divided in terms of failures into three (3) periods, namely,
the initial failure period, the random failure period, and the wear-out failure period, as
time goes by. In the first initial failure period, the failure rate decreases as time goes by.
Then, the device reaches a stable state, and the failure rate is effectively constant in the
subsequent random failure period while time goes by. In the final wear-out failure period, the failure rate increases as time goes by, and the life of the device eventually ends. Which of the following is a representation of the relation between the failure rate and
time?
a) Gantt chart
b) Reliability growth curve
c) Bathtub curve
d) Radar chart
c
Which of the following is an appropriate explanation of multitasking?
a) Several computers connected via a network work together to achieve a highperformance system.
b) Several processor cores composed of arithmetic circuits and other control circuits are
implemented in a single CPU.
c) The CPU processing time is allocated to several processes in turn so that the processes
can be executed simultaneously.
d) The same processing is performed for multiple data items by executing a single
instruction.
c
The types of programs that are running when a PC is started are broadly classified into
three (3) categories, namely BIOS (Basic Input Output System), OS, and resident
application programs. Which of the following is the order of execution of the programs?
a) BIOS, OS, resident application programs
b) OS, BIOS, resident application programs
c) OS, resident application programs, BIOS
d) Resident application programs, BIOS, OS
a
When a record in a file is modified, which of the following is an appropriate way of
identifying the modified contents?
a) Keeping a record of the size and the modified date of a file
b) Keeping a copy of a file and comparing it to the modified one later
c) Keeping a record of the number of records into the file
d) Keeping records sorted in ascending order of the key field
b
Which of the following is an appropriate combination of software that includes only
OSS (Open Source Software)?
a) Microsoft Word, Linux, PostgreSQL
b) Microsoft Word, PostgreSQL, Windows
c) Firefox, Linux, Thunderbird
d) Firefox, Thunderbird, Windows
c
Which of the following is a term that means the validation of a software license by using
the product ID and the user’s hardware information, in order to prevent unauthorized
use of the software?
a) Activation
b) Cloud computing
c) Streaming
d) Fragmentation
a
Q22. Sales data by month for each branch is evaluated. In the “Evaluation” field for each
branch by month, if the amount of sales at the branch is below the average sales amount
of branches A through C for the month, the symbol “X” is to be displayed, and if the
amount is above or equal to the average, the symbol “O” is to be displayed. Which of
the following is an appropriate expression to be entered in cell C3? Here, the expression
that is entered in cell C3 is copied and used in cell D3, cell E3, cells C5 through E5, and
cells C7 through E7
Which of the following is an appropriate typical example of a system operating on a
super computer?
a) An SCM system that is required for linkage between enterprises
b) A global climate change prediction system that requires large-scale scientific and
technical computing
c) A banking system that requires a high reliability
d) An engine control system of a vehicle that requires advanced real-time control
b
Which of the following is an appropriate description of AR (Augmented Reality)?
a) A technology that creates memory space beyond the amount of memory actually
installed and makes this available as main memory
b) A technology that overlays and displays computer-generated information on live video or other content that captures real environments
c) A technology that analyzes and digitizes the human voice by using a computer in order
to utilize it for commanding a computer, entering characters, and so on
d) A science or a technology for emulating human intellectual activity such as inference,
learning, and ability to understand language, by using a computer
b