JFE

¡Supera tus tareas y exámenes ahora con Quizwiz!

# Which of the following is the appropriate description concerning the functions of "driver" or "stub" used in the module test?

"Driver" calls the module to be tested while passing arguments to it.

# The selling price per unit of product Z is set to $250, and sales for the coming year are expected to be 500 units. If the company requires a return of 15% in the coming year on its investment of $250,000 in product Z, what is the target variable cost per unit for the coming year? Here, the fixed cost is $10,000 per annum

$155

# When the results of the logical operation "x # y" are shown in the table below, which of the following expressions is equivalent to the operation "x # y"? Here, "AND" is used for the logical product, "OR" is for the logical sum, and "NOT" is for the logical negation. x y x # y True True False True False False False True False False False True

(NOT x) AND (NOT y)

# The flowchart below shows a binary search algorithm to find the index m of the array element A(m), such that the equation "A(m) = k" holds, from the array elements A(1), A(2), ..., A(n) already sorted in ascending order. In case of "m = 0" at the end, there is no element such that the equation "A(m) = k" holds. Which of the following is inserted in the process box X in the flowchart? Here, the slash ( / ) indicates division that truncates all digits after the decimal point.

(x + y) / 2 ? m

# In fixed-point representation that expresses negative numbers by two's complement, which range of integers can be expressed with n bits? Here, the position of the binary point is to the right of the least significant bit.

-2n-1 through 2n-1-1

# A coin is tossed three times. What is the probability that it lands on heads exactly one time?

0.375

# Which of the following numbers is a valid ISBN? Here, ISBN means the International Standard Book Number which is used to identify books, publishers, and bookstores. It consists of exactly 10 digits, and the rightmost digit is used for a check digit. The check digit is validated by using modulo 11 as follows

0071361286

# A CPU has four blocks of cache memory. Using the LRU (Least Recently Used) replacement algorithm, which memory blocks are stored in the cache memory after the execution of the following sequence of access to memory blocks: 1 2 3 4 5 2 5 4 1 5 2 3?

1 5 2 3

# When the moving average method is applied to the receipt/shipment ledger shown below, how much in dollars is the closing inventory value of August?

1,300

# When the operational model of a system is shown in the figure below, which of the following represents the correct combination of MTBF and MTTR of the system? Here, t i (i = 1, 2, ..., n) denotes the operating time of the system, and r i (i = 1, 2, ..., n) denotes the repair time of the system.

1/n S i=1 n t i - 1/n S i=1 n r i

# In a certain computer system, a simple hash function called the division method is used for page-based address translation. By using this method, a pair of new logical page number "101000" and its corresponding physical page number "0010" is stored into the page table shown below. Which of the following indexes is used to place them in the table?

110

# The head of a hard disk drive is currently positioned at cylinder number 100, and the cylinder numbers 120, 90, 70, 80, 140, 110, and 60 are lined up in the I/O request queue. What is the total number of cylinders that the head moves under the following conditions?

120

# How many tracks are required to store a sequentially organized data file including a total of 10,000 records on the hard disk drive under the following conditions? Here, each track can contain multiple blocks, but each block cannot be stored across multiple tracks.

125

# There is a processor with a clock frequency of 1 GHz. When the instruction set of this processor is composed of two types of commands as shown in the table below, what is the approximate processing performance in MIPS?

125

# How many magnetic tapes are required to create and manage backup copies of server files under the following conditions?

14

# The instruction pipeline is a technique used in order to improve the CPU performance. Instructions are divided into stages and moved through the processor. An RISC processor has five-stage pipeline (Instruction fetch, Instruction decode, Execute, Memory access, Register write back)

14

# The following table shows the duration for the optimistic, most likely, and pessimistic scenarios in a program development. How many hours are required to complete all the activities on a "three point estimate" basis?

15

# In the binary tree shown below, which of the following trees is created after conversion into a (max) heap? a) ?ng cu?

2 4 1

# Which of the following IP addresses can be used to connect a computer directly to the Internet?

203.162.1.160

# How many memory cells (or latches for holding 1 bit each) are implemented in SRAM with 24 address lines and 16 data lines?

224 x 16

# Which of the following is equal to the hexadecimal fraction 2A.4C?

25+23+21+2-2+2-5+2-6

# Which of the following subnet masks provides the minimum number of IP addresses available in the subnet to assign to devices that request a connection?

255.255.255.252

# There are five different sizes of white balls and five different sizes of green balls. When these ten balls are laid out in a line so that adjacent balls can have different colors, how many arrangements of the balls can be made?

28,800

# The formula shown below is represented in postfix (or reverse Polish) notation. Which of following is the resulting value of this formula? 5 1 - 3 * 3 1 - 2 * /

3

# Two players, X and Y play a dice game. A pair of dice is tossed. If the sum of the dice is 2, 4, or 6, X wins the game. Otherwise, Y wins. What is the probability that Y wins the game

3/4

# There are three 7-bit character codes: 30, 3F, and 7A. When an even parity bit is added to the front of each character code, which of the following shows the correct result? Here, the character codes are expressed in hexadecimal

30, 3F, FA

# A system manages files by allocating file storage on a block-by-block basis, where each block consists of eight 500-byte sectors. How many sectors in total are required to store two files: one with 2,000 bytes and the other with 9,000 bytes? Here, sectors for management information such as directories can be ignored.

32

# In a production process of 1,000 units of product X, "material cost" incurred is $10,000, and "direct labor cost" is $20,000. "Production overhead" is 100% of direct labor cost. "Selling and distribution cost" is $10,000. How much in dollars is the unit cost of product X?

50

# The following function f (n, k) exists: What is the value of f (4, 2)?

6

# In what radix does the following equation hold? 131-45 = 53

7

# An integer m is stored in a register as a binary value. If this value is shifted to the left by three bits and m is added to the shifted value, how many times as large as m is the resulting number? Here, no overflow occurs.

9

# There is an RAID5 disk array system that is composed of 10 hard disk drives, and each disk capacity is 100Gbytes. What is the approximate maximum capacity (in Gbytes) that can be used to store user data and/or programs on this system?

900

# There is a four-digit number N 1 N 2 N 3 C that is used for Customer Account Number (CAN). The right most digit "C" can be calculated as follows:

9690

# There are a total of 1,900 students in a school, 553 of whom are taking a course in computer science, 667 of whom are in mathematics, and 290 of whom are in both computer science and mathematics. How many students are not taking a course in either computer science or in mathematics?

970

# When two input signals A and B are given in the logic circuit shown below, which of the following tables describes the correct combination of output signals W, X, Y, and Z? Here, is used for an AND gate, and for a NOT gate.

?ng cu?i 1 1 0 0 0 1

# Which of the following is the correct table that is created by the "natural join" operation of two tables T 1 and T 2 ?

A B C D /a 1 b 1 c 1 d 1 /a 2 b 1 c 1 d 1

# A depth-first search (DFS) visits all the vertices in a graph. When an edge to be explored next is chosen, this algorithm always chooses to go "deeper" into the graph. That is, it will pick the next adjacent unvisited vertex until reaching a vertex that has no unvisited adjacent vertices.

ABCDEF

# Which of the following is the appropriate combination of basic concepts of object-oriented approach?

Abstraction, encapsulation, inheritance, and class

# Which of the following is the appropriate statement concerning Newton's method that is known as an algorithm for obtaining the approximate value of the solution to the formula ƒ(x) = 0?

An approximate value of the solution is obtained geometrically using the tangent lines of y = ƒ(x)

# Which of the following is classified as an external interrupt?

An interrupt which takes place when hardware detects malfunctions

# Which of the following is equivalent to the logical expression A.B+B.C.(B+C) ? Here, "• " is the logical product, and " + " is the logical sum.

B.(A+C)

# Which of the following functions is a part of OS task management?

CPU allocation

# Which of the following is the highest priority process just after execution of each instruction on CPU?

Check if there are any interrupts waiting

# Which of the following is the language processing program that generates, on a certain computer, object programs that can be executed on another computer that has a different instruction set?

Cross compiler

# Which of the following leads to the von Neumann bottleneck?

Data transfer speed between CPU and main memory

# Which of the following is the appropriate sequence of DB application development activities?

Database planning -> Conceptual design -> Physical design -> Data conversion

# Which of the following is the major impact of a Denial of Service (DoS) attack?

Degradation of service due to network traffic congestion

# Which of the following technologies is used to divide each data file into blocks at constant length and to store them across multiple hard disks that can be accessed in parallel, thereby speeding up file access?

Disk striping

# Which of the following is the appropriate statement concerning how to illustrate data flows (arrows) in DFD?

Each process must have at least one data flow in and one data flow out.

# Which of the following is the appropriate description concerning black box testing?

Even if any redundant code exists in a tested program, it cannot be detected.

# Which of the following design tasks is performed from the standpoint of the system developer, based on the deliverables of external design and in consideration of the implementation method and processing efficiency?

Functional decomposition and structured design

# In some systems, the system manually or automatically determines memory blocks which are no longer referenced by a program and reorganizes the memory space so that it can be available for subsequent allocation. What is this process called?

Garbage collection

# Which of the following is the appropriate description concerning the performance evaluation of a computer system?

In the case of a system in operation, a software monitor can be used to collect and analyze statistical data, thereby permitting performance-related problems to be grasped.

# Which of the following is the appropriate statement concerning client/server architecture?

It divides a series of processes into two groups by means of an inter-process communication mechanism; one group includes processes that request services, and the other consists of processes that execute the requested services.

# When the data model is represented to conform to the notational convention shown below, which of the following statements appropriately interprets the designated E-R diagram?

It does not occur that a single order placement is given to multiple suppliers.

# Which of the following appropriately describes "memory interleaving" that is one of the high-speed computer technologies?

It is a method for dividing the memory into multiple independently-operating groups and accessing each group in parallel.

# Which of the following appropriately explains the function point method, which is one of the estimation methods used in system development?

It is a method for estimating the system size by evaluating system functions quantitatively on the basis of the amount of input/output data, the number of files, etc. and by making proper adjustments based on the complexity and characteristics of the application.

# Which of the following is the appropriate characteristic of "data oriented design" as compared with "process oriented design?"

It is possible to consider data as shared resources and to manage it in a unified manner.

# Which of the following appropriately explains benchmarking used in business management?

It is to make comparisons with the strongest competitors or advanced companies in order to scope out best practices for setting business goals, and to gain an understanding of products, services, and practical methods qualitatively and quantitatively.

# Which of the following appropriately describes a cause-and-effect diagram?

It systematically arranges the relation between cause and effect in a fishbone format and clarifies which causes are related to particular effects.

# Which of the following is the appropriate program that supports dynamic processing in a Web environment and runs only on a Web server?

Java servlet

# Which of the following appropriately describes a method of recording data on CD-R?

Laser beams are radiated onto an organic dye layer in a disk. As a result, a series of burned spots called pits are created on that layer, thereby recording the data.

# Which of the following is the appropriate description of a lock that is the exclusive control of a database?

Locks come in two types: shared locks, used while reading, and exclusive locks, used during a change.

# Which of the following appropriately explains the pipeline processing method of processors?

Method whereby one processor simultaneously executes multiple instructions with slight delays in time

# Which of the following has the feature whereby only minimally limited OS functions, such as memory management and process management, are supported and other OS functions, such as the file system, are implemented as server processes?

Microkernel

# Port scanning is the process of sending packets to check every port on each target system to see which ports are open and which ports are locked. Which of the following information can be identified by port scanning?

Network and application services currently available

# Which of the following is the appropriate combination of processing modes in banking activities?

Online Batch Online Batch

# Which of the following is the appropriate method that supports both private key cryptography and public key cryptography, enables users to securely exchange e-mail messages, and to secure files, disk volumes, and network connections with both privacy and strong authentication?

PGP (Pretty Good Privacy)

# In a microprocessor, there are two general registers: GRi and GRj (hereinafter referred to as GRx instead of GRi or GRj). PUSH GRx is used for adding the contents of GRx to the top of a stack. POP GRx is for removing the current top data of the stack and storing it to GRx. Which of the following operations can exchange the contents of GRi and GRj?

PUSH GRi PUSH GRj POP GRi POP GRj

# In some circumstances, a program may be still running when it is called again by another program. Which of the following is the appropriate characteristic that should be implemented to execute this program correctly?

Reentrant

# In a database system employing incremental log with immediate updates, information in the log is used in restoring the state of the system to a previous consistent state when a crash occurs. < T 2 , C, 3000, 3500> and before < T 2 , commit>?

Roll forward T 1 and roll back T 2

# The state diagram shown below is a simple Mealy machine. Which of the following transitions is NOT possible in the diagram? Here, S0, S1, and S2 are states. Each edge is labeled with "j / k" where j is the input and k is the output.

S0 ? S1 ? S2 ? S1 ? S2 ? S0

# Which of the following is the appropriate SQL statement that is used to create Table A from Persons Table?

SELECT name FROM Persons WHERE country LIKE ' %Korea% ' AND gender = ' F ' OR age = 26

# Which of the following is the standardized document description language that prescribes methods, as an international standard, for describing the logical structures and attributes of documents using tags and facilitates the management and exchange of electronic documents?

SGML

# In the OSI basic reference model, which of the following layers provides a set of rules for establishing and terminating the connection between applications on computer systems?

Session layer

# When a list of 7 elements shown below is rearranged in ascending order, which of the following sorting algorithms is completed with the minimum number of element exchanges? 3 5 12 9 10 7 15

Shell

# Which of the following data structures uses the LIFO (Last In First Out) method in order to manage data?

Stack

# Which of the following is a method whereby the relevant program is read into main memory and the CPU reads out and executes it sequentially?

Stored program method

# Which of the following is the reason why a large number of computers use "complement representation" to simplify arithmetic circuits?

Subtraction can be processed by addition.

# Which of the following is the appropriate statement concerning data sorting methods?

The "heap sort" method builds an ordered tree from the unsorted portion of the elements, extracts the maximum or minimum value from this ordered tree, and moves it to the sorted portion. This operational sequence is then repeated to gradually shrink the unsorted portion.

# Which of the following is the appropriate statement concerning how to use management science methodology?

The time-series analysis method is used to forecast product sales in the market.

# Which of the following interrupts can signal to OS that a program might have gone into an infinite loop?

Timer Interrupt

# Which of the following appropriately describes the purpose of the cache memory used by processors?

To compensate for the difference between the main memory access speed and the processor speed

# Which of the following appropriately describes the purpose of using a check digit?

To detect an error of the inputted code value

# Which of the following appropriately describes the purpose of using WBS (Work Breakdown Structure) in software development?

To divide development work into small tasks in a top-down manner, thereby facilitating work management

# Which of the following is the primary purpose to use RAID?

To ensure higher reliability and/or performance

# Which of the following is the appropriate specifications concerning 100Base-T?

Twisted pair cable Star 100

# Which of the following appropriately describes cache memory?

Two methods exist: one is to rewrite both the cache and main memory when a write instruction is executed; the other is to rewrite only the cache memory while the main memory is not rewritten until the data is removed from the cache memory.

# Which of the following appropriately describes a dual system?

Two systems perform the same processing, and the processed results are collated to confirm the correctness of the processing. If a fault occurs in either system, processing continues in degraded operation.

# Which of the following represents the sequence of nodes visited in a post-order traversal of the binary tree T shown below?

U X W Q Z Y V P

# Which of the following protocols is used on the transport layer of OSI basic reference model?

UDP

# A singly linked list is implemented using two arrays VALUE and LINK, in which LINK(I) points to the successor of VALUE(I). When a new element that does not exist initially in the list is assigned to VALUE(J), the program fragment shown below is executed. Which of the following appropriately describes the function of this program?

VALUE(J) is inserted after VALUE(I) in the list

# Which of the following is the appropriate technology that is used to establish a private or secure network connection within a public IP network, such as the Internet, and to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one?

VPN

# In a certain program, in order to stay in a loop, variable X must be in the range from 1 through 10 (X >= 1 AND X <= 10). In this program, which of the following is the condition of exiting the loop? Here, "AND" and "OR" are the logical product and logical sum operations respectively. In addition, comparison operators <, <=, >, and >= are less than, less than or equal to, greater than, and greater than or equal to, respectively.

X < 1 OR X > 10

# In the RAID3 system shown below, three disks (Disks 0 through 2) for byte-striped data and one dedicated parity disk (Disk 3) are used as one volume. Parity byte Ap is generated by calculating the exclusive OR (XOR) of three bytes in Disks 0 through 2. For example, Ap (1-3) is calculated as follows:

XOR (Exclusive OR)

# When variables shared among tasks are updated, an unexpected result may occur if synchronous control among tasks is not performed. When the initial value of the variable x shared among tasks is 3, the final value of x is expected to be 12 if task A executes the assignment statement "x = x + x" and if task B executes the assignment statement "x = x × x."

a1 -> b1 -> b2 -> b3 -> b4 -> a2 -> a3 -> a4

# A binary tree is said to be perfect, if all its leaves are at the same depth and every internal node has two children. Which of the following is correct about the perfect binary tree? Here, n is the number of nodes, and h is the height of the perfect binary tree.

n = 2^(h + 1) - 1

# The figure shows an RS flip-flop using two NAND gates. Which of the following is the correct truth table for the flip-flop? Here, "unchanged" shown in the table means the outputs maintain a previous state, and "unstable" means the outputs are in an unstable state.

unstable.1 0.0 1. unchanged

# When a certain natural number x is expressed as a 2n-digit binary number "1010...10" consisting of 1 and 0 arranged alternately, which of the following equations can be formulated in terms of the number x?

x + x/2 = 2^2n - 1

# Which of the following equations holds well in the postfix notation (or Reverse Polish Notation)? Here, x, y, and z are variables.

x y - z + = x y z - -


Conjuntos de estudio relacionados

Natural Selection and Motivation - Psych 1 Final

View Set

Semester 1 Child Development Exam 2

View Set

EverFi: Budgeting for your Loans

View Set

Statistics Exam 1 Definitions (Ch 1, 2, 3)

View Set

Black Swans and Unpredictability

View Set

Automotive Brakes 2023-2024 55-2

View Set

CSS -Defines How HTML is Displayed

View Set