JFE_B

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

# Which of the following is equivalent to the logical expression shown below? Here, "•" is used for the logical product, and "+" is for the logical sum. ((X + Y) • (X + Z)) + ((X •Y) + (X • Z))

(X + (Y • Z)) + (X • (Y + Z))

A "negative AND" operation "X NAND Y" of X and Y is defined as "NOT (X AND Y)". Which of the following is the logical expression that represents "X OR Y" by using NAND only?

(X NAND X) NAND (Y NAND Y)

# There are n locks and n keys; the keys are mixed and need to specify which key belongs to which lock. Which of the following is the maximum number of trials to find the correct key for each lock? Here, one key can open only one lock.

(n2-n)/2

# The flowchart below shows a binary search algorithm to find the index m of the array element A(m), such that the equation "A(m) = k" holds, from the array elements A(1), A(2), ..., A(n) already sorted in ascending order. In case of "m = 0" at the end, there is no element such that the equation "A(m) = k" holds. Which of the following is inserted in the process box X in the flowchart? Here, the slash ( / ) indicates division that truncates all digits after the decimal point.

(x + y) / 2 ? m

# Which of the following is the appropriate description concerning the functions of "driver" or "stub" used in the module test?

"Driver" calls the module to be tested while passing arguments to it.

# In a certain examination, the minimum and maximum scores are 31 and 95 respectively. A one-dimensional array shown below is used to display the distribution of scores for all examinees, and each array element indicates the number of examinees whose scores are in the specified ranges. Which of the following is the most appropriate expression to calculate an array index for each score? Here, any digits after the decimal point of the resulting value are truncated to generate an integer as an index.

(Score-30)/10+1

# How many magnetic tapes are required to create and manage backup copies of server files under the following conditions?

14

# In a production process of 1,000 units of product X, "material cost" incurred is $10,000, and "direct labor cost" is $20,000. "Production overhead" is 100% of direct labor cost. "Selling and distribution cost" is $10,000. How much in dollars is the unit cost of product X?

50

# There is a CPU with an internal clock frequency of 700 MHz. The number of clock cycles for executing instructions and their appearance rates are shown in the table below. What is the approximate performance (measured in MIPS) of this CPU?

50

# Last year, a company providing web application services needed an Internet line to service clients' demand at that time. However, in order to increase availability, the company actually made use of two Internet lines from different vendors. This year, the demand is doubled and both lines are fully busy, so the company will install one more Internet line. Each of the Internet lines has availability of 80%. What percentage of availability will be cut down after the installation?

7.8

When the bubble sort algorithm is used for sorting the dataset (23, 43, 56, 12, 87, 14, 87, 15, 90, 23, 10) in descending order, how many data exchanges occur during the first pass?

8

# Which of the following is the correct table that is created by the "natural join" operation of two tables T 1 and T 2 ?

A B C D /a 1 b 1 c 1 d 1 /a 2 b 1 c 1 d 1

# Which of the following should be done in the internal design phase of software development processes?

Designing physical data structure

# Which of the following helps improve availability?

Doubling MTBF and reducing MTTR to half

# Which of the following appropriately explains the pipeline processing method of processors?

Method whereby one processor simultaneously executes multiple instructions with slight delays in time

# Which of the following is the appropriate combination of processing modes in banking activities?

Online Batch Online Batch

# Which of the following is an appropriate explanation of "projection" in relational operations?

Only specified attributes are extracted from tables, and a new table is created.

# Which of the following is the sorting algorithm that divides the data elements into two groups, in which all those elements less than a particular element (called a pivot value) and all those elements greater than or equal to it are separately included, and then repeats the same operation until all elements are sorted in ascending or descending order?

Quick sort

# Which of the following is a characteristic of the QR code?

Using three symbols for detection, the code makes it possible to recognize the rotation angle and the direction of reading.

# A singly linked list is implemented using two arrays VALUE and LINK, in which LINK(I) points to the successor of VALUE(I). When a new element that does not exist initially in the list is assigned to VALUE(J), the program fragment shown below is executed. Which of the following appropriately describes the function of this program?

VALUE(J) is inserted after VALUE(I) in the list

# Which of the following is the general-purpose markup language that allows its users to define their own tags and to facilitate the sharing of data across different information systems, particularly via the Internet?

XML

# In the GUI design of visual panels, how to input the data of "Number of copies" is under review. If there are both keyboard and mouse available as input devices, which of the following options is the best choice that can be acceptable to a wide range of users? Here, the value of "Number of copies" can range from 1 up to the maximum number of copies.

[Spin box]

# A certain program contains the complex decision shown below: "Condition 1" OR ("Condition 2" AND "Condition 3") When testing based on decision-condition coverage (branch coverage), which of the following is appropriate for an additional test item?

false false true

# In some circumstances, a program may be still running when it is called again by another program. Which of the following is the appropriate characteristic that should be implemented to execute this program correctly?

Reentrant

# Which of the following is the appropriate description of a lock that is the exclusive control of a database?

Locks come in two types: shared locks, used while reading, and exclusive locks, used during a change.

# Which of the following characteristics can be found in well-designed modules with a high degree of independence?

Low coupling and high cohesion

# Which of the following is a protocol for e-mail on the Internet that supports not only text but other data such as audio and images through message header extension?

MIME

# There are seven activities, a through g shown in the table below. At least how many days does it take to complete these seven activities? Here, activities a and b can be performed concurrently, but the others cannot be done until their preceding activities are completed. For example, c cannot begin until a is completed. The optimistic time estimate is x in days, the most likely or normal time estimate is y, and the pessimistic time estimate is z. The expected time Te is computed using the formula (x + 4y + z)/6. Unit: day

19.51

# Which of the following is the appropriate sequence for drawing up a DFD model that is used to develop a new system based on the current system? 1. Current logical model 2. Current physical model 3. New logical model 4. New physical model

2 ? 1 ? 3 ? 4

The student scores in a certain examination are shown in the table below. What is the standard deviation of these student scores? Here, the standard deviation d can be defined as follows:

20

# Which of the following is UML standardized by OMG?

Modeling language used in software development using object orientation

When a microprocessor works at a clock speed of 200 MHz and the average CPI ("cycles per instruction" or "clocks per instruction") is 4, how long does it take to execute one instruction on average?

20 nanoseconds

# When a network device is connected to the LAN with the network address of 201.12.1.64 and the subnet mask of 255.255.255.192, which of the following IP addresses should NOT be assigned to the device on the network?

201.12.1.127

# Which of the following IP addresses can be used to connect a computer directly to the Internet?

203.162.1.160

# How many memory cells (or latches for holding 1 bit each) are implemented in SRAM with 24 address lines and 16 data lines?

224 x 16

# Which of the following is equal to the hexadecimal fraction 2A.4C?

25+23+21+2-2+2-5+2-6

# There are five different sizes of white balls and five different sizes of green balls. When these ten balls are laid out in a line so that adjacent balls can have different colors, how many arrangements of the balls can be made?

28,800

# In order to make a multiplexing system with an availability of at least 0.999 by using devices with an availability of 0.9, how many of these devices need linking together in parallel?

3

# The formula shown below is represented in postfix (or reverse Polish) notation. Which of following is the resulting value of this formula? 5 1 - 3 * 3 1 - 2 * /

3

# There are three stacks A, B, and C where stack A contains the values 1, 2, and 3; 3 is on the top of the stack, and stacks B and C are empty. The stack command format is as follows:

3, 2, 1

# A certain manufacturer plans to produce products in the two periods 1 and 2 as shown in the table below. How much is the fixed cost (in dollars) to produce the planned products during a single period? Here, the fixed cost remains unchanged for each period. Period Number of products to be produced Manufacturing cost ($) 1 1,000 5,000 2 1,500 6,000

3,000

# There are 3 white balls and 3 red balls in a box. What is the probability that the two balls taken out at random from the box are one white ball and one red ball?

3/5

# A certain company has installed an online computer for the purpose of improving its inventory control system. When the company anticipates sales of 15,000 units per year, ordering cost of $60 per order, and annual holding cost of $20 per unit, what is the optimal order quantity (in units) per order? Here, the fixed order quantity model can be applied.

300

# A system manages files by allocating file storage on a block-by-block basis, where each block consists of eight 500-byte sectors. How many sectors in total are required to store two files: one with 2,000 bytes and the other with 9,000 bytes? Here, sectors for management information such as directories can be ignored.

32

Which of the following represents the hexadecimal fraction 3A.5C as a decimal fraction?

3735. 64

At least how many bits are required for the register identification field of a machine instruction code in order to specify one of 16 general purpose registers in the machine?

4

When an image is read with a scanner at a resolution of 600 dpi and printed with a printer at a resolution of 300 dpi, how many times as large as the area of the original image is the area of the printed image?

4

# A server runs a regional web application. It services the requests coming in from all regional offices. Each request is completed in 80 milliseconds on average. A total of 10 requests per second arrive at the server on average. If the M/M/1 queuing model can be applied, how many requests are waiting for the service on average?

4.00

# A register stores a numerical value representing a binary number. After a positive integer x is entered in the register, the following operation is performed: "shift the register value two bits to the left and add x." How many times as large as x is the new value of the register? Here, the shift does not cause an overflow.

5

# Company A and Company B can expect profits as shown in the table below when each of them implements two different strategies. Which of the following is the profit of Company A when both companies carry out the maximin strategy? In each cell of the table, the left value indicates the profit of A, and the right value indicates the profit of B.

5

# The FIFO method is used as the page-replacing algorithm in virtual memory. There are 3 page frames available for a program in main memory, and the page numbers referred to by a program are 4 ? 3 ? 2 ?1 ? 3 ? 5 ? 2 in this order. How many times does page-in occur during execution of the program? Here, nothing is loaded into main memory in the initial state.

5

# How much is the approximate expected value in dollars, for the first-year correction cost of an application program under the following conditions?

64,000

# In what radix does the following equation hold? 131-45 = 53

7

# Which of the following is the system configuration with the highest availability? Here, each unit shown by a box has the same availability (less than 1), and multiple units connected in parallel are considered operating if at least one unit is operating.

A

# There are seven activities A through G shown in the table below. Activities A and B can be performed concurrently, but the others cannot be done until their preceding activities are completed. For example, C cannot begin until A is completed. Which of the following is the critical path of these activities? Activity Preceding activity Used Time (days) A — 4 B — 5 C A 5 D A 6 E B, C 5 F D 4 G E 5

A ? C ? E ? G

# Which of the following is an appropriate description concerning registers in processors?

A complement register generates integer complements in order to perform operations in the adder circuit.

# Which of the following appropriately describes a group function of SQL?

A group function returns a single result row per group for a set of queried rows.

# In a multiprogramming environment, there is a need to limit access to shared resources; that is, the current process has exclusive use of the assigned resources for some period of time. Which of the following appropriately describes the function to successfully implement this type of exclusive control?

A semaphore variable is used to indicate the status of common resource

As shown in the truth table below, when anoutput signal is generated using three input signals A, B, and C, which of the following Boolean expressions can be applied to the output signal? Here, "?" stands for the logical product, "?" for the logical sum, and "X" for the logical negation of "X".

A-^(BvC)

Which of the following is included as an element of a set of character strings represented by a regular expression "[A - Z] + [0 - 9]*"? Here, the regular expression follows the rules described below.

ABCDEF

Which of the following terms is applicable to the binary tree shown below?

AVL tree

# Which of the following is the appropriate combination of basic concepts of object-oriented approach?

Abstraction, encapsulation, inheritance, and class

# Which of the following occurs when computer A broadcasts an ARP request to find the MAC address of computer B on the same network?

All computers in network receive the request from A, and only B replies to A with its MAC address

# User A issues the command as follows: UPDATE cust_orders SET id = 200 WHERE id = 1 Then user B issues this command as follows: UPDATE cust_orders SET id = 300 WHERE id = 1

Ask user A to commit the transaction.

# Which of the following appropriately describes a typical feature of ADSL?

By separating the frequency bands used by analog telephones and data communications, it allows both of these connections to be used simultaneously

# There are goods whose unit purchase prices are gradually rising. There was an inventory of these goods at the end of the last accounting period, and the goods were carried into and out of the warehouse several times during the current period. Which of the following valuation methods produces the lowest valuation of the inventory at the end of the current period?

Last-in first-out method

# Which is the method of solving a problem of the following type: "How can we distribute a resource subject to constraints that can be expressed by first-degree equations so as to obtain a maximum effect?"

Linear programming

# Which of the following is an appropriate explanation concerning functions of keywords in SQL?

"HAVING" specifies a search condition for an aggregate or a group.

# Which of the following appropriately explains the SQL statements shown below? CREATE TABLE STAFF ( Name CHAR(256), Birthdate DATE, DeptID NUMBER ) CREATE TABLE MANAGER UNDER STAFF AS ( ManagedDept NUMBER )

"SELECT * FROM STAFF" extracts all records in the table MANAGER.

# The selling price per unit of product Z is set to $250, and sales for the coming year are expected to be 500 units. If the company requires a return of 15% in the coming year on its investment of $250,000 in product Z, what is the target variable cost per unit for the coming year? Here, the fixed cost is $10,000 per annum

$155

Which of the following expressions results in a loss of trailing digits when calculated by a computer whose floating-point representation has a 23-bit mantissa? Here, the numbers in "( )2" are represented in binary.

(1.01)2×2 18 +(1.01)2×2 -5

# When the results of the logical operation "x # y" are shown in the table below, which of the following expressions is equivalent to the operation "x # y"? Here, "AND" is used for the logical product, "OR" is for the logical sum, and "NOT" is for the logical negation. x y x # y True True False True False False False True False False False True

(NOT x) AND (NOT y)

# A certain company is producing and selling its product X. The variable cost of the product X is 60% of its selling price, and the fixed cost of the company is $50,000 per month. When the company's target profit for the forthcoming month is $20,000, how much sales volume (in dollars) is required to meet it?

175,000

# Which of the following subnet masks provides the minimum number of IP addresses available in the subnet to assign to devices that request a connection?

255.255.255.252

# In the flowchart below, which of the following indicates the relationship between the initial values a and b that are given in m and n in the process (1) in order to carry out these processes in the order shown below? (1) ? (2) ? (3) ? (5) ? (2) ? (3) ? (4) ? (2) ? (6) Here, a and b are both positive integers.

3a = 2b

# Which of the following is an advantageous effect of encrypting e-mails?

It is possible to prevent the contents of e-mails from leaking out.

# Which of the following terms can be applicable to an explanation below? "The sender sends a single datagram; the routers are responsible for making copies and sending them to a group of interested receivers."

Multicast

# Which of the following is the key technology that enables to connect a computer using a private IP address to the Internet?

NAT

# Which of the following protocols is used for synchronizing the clocks in multiple nodes on the Internet?

NTP

# Port scanning is the process of sending packets to check every port on each target system to see which ports are open and which ports are locked. Which of the following information can be identified by port scanning?

Network and application services currently available

# In object orientation, the term "open (white box) reuse" refers to the reusing of base-class data and functions by creating subclasses for the base class. Which of the following is the appropriate description concerning the reuse technology in object orientation of this method?

Only differences between the data and functions defined by the base class and those of subclasses can be stated in subclasses, so development is highly efficient.

# Which of the following is the appropriate explanation of spooling?

Output data to a low speed device such as a printer is temporarily stored on a high speed hard disk and later sent as output to that target device.

# Which of the following is the appropriate method that supports both private key cryptography and public key cryptography, enables users to securely exchange e-mail messages, and to secure files, disk volumes, and network connections with both privacy and strong authentication?

PGP (Pretty Good Privacy)

# Which of the following appropriately describes financial statements?

Profit and loss statement is also known as the income statement. This presents how revenues are converted to net income by reporting both revenues and expenses of the company for a given period of time.

Which of the following is used to hold the address of the instruction being executed or the address of the next instruction to be executed, and is automatically incremented after fetching an instruction?

Program counter

# The sales volume of the next month is predicted by the data in the past. The sales volume is changed greatly from month to month, but the annual fluctuation pattern is almost the same every year. Which of the following is the most appropriate formula that can be used for calculating the sales volume of the next month? Here, Pt+1 is the sales volume predicted for the next month, St is the sales volume of the current month t, and the data is retained for three years.

Pt+1 = (St-11 + St-23 + St-35) / 3

Which of the following is an appropriate description concerning RAID?

RAID 0 increases performance by using disk striping. However, the reliability is rather low because damages on even one disk cause whole data to be lost.

# In software maintenance, which of the following tests is performed to ensure that fixes or modifications do not affect other, unchanged parts of the software?

Regression test

# Which of the following is the method which analyzes the source or object code to retrieve information concerning program specifications and design?

Reverse engineering

# In a database system employing incremental log with immediate updates, information in the log is used in restoring the state of the system to a previous consistent state when a crash occurs. < T 2 , C, 3000, 3500> and before < T 2 , commit>?

Roll forward T 1 and roll back T 2

# The figure below shows the state transition diagram of a certain process. Which of the following is the appropriate combination of States A, B, and C?

Running Ready Waiting

# The state diagram shown below is a simple Mealy machine. Which of the following transitions is NOT possible in the diagram? Here, S0, S1, and S2 are states. Each edge is labeled with "j / k" where j is the input and k is the output.

S0 ? S1 ? S2 ? S1 ? S2 ? S0

# Which of the following is the appropriate SQL statement that is used to create Table A from Persons Table?

SELECT name FROM Persons WHERE country LIKE ' %Korea% ' AND gender = ' F ' OR age = 26

# There is a student score table shown below with basic and advanced subject codes which begin with letters B and A respectively. Which of the following SQL statements can be used to retrieve students, from the score table, whose basic subject score is 70 or more and examination date is 2007-05-04?

SELECT student_number FROM score_table WHERE score >=70 AND examination_date = '2007-05-04' AND subject_code LIKE 'B%'

# Which of the following is the standardized document description language that prescribes methods, as an international standard, for describing the logical structures and attributes of documents using tags and facilitates the management and exchange of electronic documents?

SGML

# Which of the following is the appropriate protocol that is used to send e-mail messages from one server to another over the Internet?

SMTP

# Which of the following is the appropriate protocol that is widely used with TCP/IP networks to collect and manage information from network devices such as servers, routers, switches, and hubs?

SNMP

# Which of the following appropriately describes the purpose of using WBS (Work Breakdown Structure) in software development?

To divide development work into small tasks in a top-down manner, thereby facilitating work management

# Which of the following can make MTBF longer in system maintenance?

To do preventive maintenance

# What is the purpose of attaching a digital signature to software disclosed on the Internet?

To guarantee that the software contents have not been tampered with

# A data warehouse was set up, but it is hardly used. The result of a hearing suggests that the users' skill level is lower than expected. Which of the following is an appropriate measure for improvement to promote usage?

To prepare, as standards, templates according to data extraction and analysis patterns

# Full backup and differential backup are two methods of backing up a database. Which of the following appropriately describes the differential backup method?

To recover a database, the full backup data is restored and then the differential backup data is added.

# Which of the following is an appropriate description concerning financial indexes?

Total capital profit ratio denotes the ratio of profits to gross capital. The larger the value of this ratio, the higher the profitability.

# A certain retailer purchases watches from a wholesaler and sells them to customers. As shown in the transaction record table below, the retailer purchased a total of 150 watches and sold 120 watches in January. In addition, the retailer had a stock of 30 watches at the beginning of January. What is the total purchase cost (in dollars) of watches that were sold on an FIFO (First In First Out) basis in January? [Transaction record] Date (yyyy-mm-d

Transaction Quantity Unit cost ($) 2008-01-01 Beginning inventory 30 20 2008-01-10 Purchased 60 21 2008-01-16 Purchased 40 22 2008-01-25 Purchased 50 23 2008-01 Sold 120 | 2,520

# Based on the concept of object orientation, which of the following can be commonly regarded as a subclass of the class "automobile"?

Truck

# Which of the following is the appropriate specifications concerning 100Base-T?

Twisted pair cable Star 100

# Which of the following appropriately describes cache memory?

Two methods exist: one is to rewrite both the cache and main memory when a write instruction is executed; the other is to rewrite only the cache memory while the main memory is not rewritten until the data is removed from the cache memory.

# Which of the following appropriately describes a dual system?

Two systems perform the same processing, and the processed results are collated to confirm the correctness of the processing. If a fault occurs in either system, processing continues in degraded operation.

# Which of the following represents the sequence of nodes visited in a post-order traversal of the binary tree T shown below?

U X W Q Z Y V P

# Which of the following protocols is used on the transport layer of OSI basic reference model?

UDP

# CASE tools can be classified on the basis of the applicable development processes and phases. Which of the following classifications includes support functions for requirements analysis?

Upstream

# Which of the following is the appropriate technology that is used to establish a private or secure network connection within a public IP network, such as the Internet, and to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one?

VPN

# Which of the following is the method in which the designer and a group of involved personnel review the design documents at the completion of each design for the purpose of early detection of design errors?

Walk-through - 22

Which of the following expressions shows the output Z of the combinational circuit using NAND gates as shown below? Here, "·" stands for the logical product, "+" for the logical sum, and X for the logical negation of X.

X + Y

# In a certain program, in order to stay in a loop, variable X must be in the range from 1 through 10 (X >= 1 AND X <= 10). In this program, which of the following is the condition of exiting the loop? Here, "AND" and "OR" are the logical product and logical sum operations respectively. In addition, comparison operators <, <=, >, and >= are less than, less than or equal to, greater than, and greater than or equal to, respectively.

X < 1 OR X > 10

# In the RAID3 system shown below, three disks (Disks 0 through 2) for byte-striped data and one dedicated parity disk (Disk 3) are used as one volume. Parity byte Ap is generated by calculating the exclusive OR (XOR) of three bytes in Disks 0 through 2. For example, Ap (1-3) is calculated as follows:

XOR (Exclusive OR)

# Which of the following authentications can be realized with the information exchange between two communication actors X and Y according to the procedure below?

Y authenticates X.

# There are a total of N values observed. The sum S (S>0) of these values is obtained, and then the average value is calculated. Which of the following is the correct expression when the average value is rounded off to the nearest integer value? Here, "/" indicates division, and [X] is the maximum integer equal to X or less.

[S/N+0.5]

# Which of the following is the appropriate diagram that explains pipeline control? Here, the meanings of the capital letters in the diagrams are as follows: F: Fetching instruction D: Decoding A: Address calculation R: Reading operand E: Executing

a d f thang hang

# A binary search tree is created by inserting the values shown below. 7 9 11 2 8 10 5 3 After deletion of the root from the newly created tree, what does it look like?

dong dau 8 dong cuoi 3 10

# When two input signals A and B are given in the logic circuit shown below, which of the following tables describes the correct combination of output signals W, X, Y, and Z? Here, is used for an AND gate, and for a NOT gate.

dòng cu?i 1 1 0 0 0 1

The function f(x) has a real-type argument and a real-type return value. The procedure using this function is shown in the steps 1 through 5. When this procedure is executed repeatedly a sufficient number of times and the value of y stops changing in the step 3, which of the following expressions holds?

f(y) = y

# A k-string is a character string with a length of k characters. An m-substring is an ordered sequence with a length of m characters, which consists of consecutive elements of the original k-string. An n-subsequence is also an ordered sequence with a length of n characters, which consists of elements of the original k-string, but it does not need to be consecutive. How many m-substrings and n-subsequences are respectively included in the k-string?

k-m+1,k!/n!(k-n)!

# A k-ary tree is a tree in which every node has no more than k children. A binary tree is the special case where k=2. In a k-ary tree with n nodes and height h, which of the following is an upper bound for the number of leaves?

kh

# There are two tables "movie" and "movietype" as shown below. Which of the following tables is created as the result of executing the SQL statement specified below?

mName mTypeCode mCompany Beowulf AC Paramount Pictures Hitman AC 20th Century Fox

# A recursive definition of a factorial function f(n) that calculates "n!" can be represented as follows: f(n) = (n > 1) f(n) = (n = 0) Which of the following combinations should be inserted in the boxes A and B? Here, "n" is a non-negative integer.

n * f(n-1) , 1

# The figure shows an RS flip-flop using two NAND gates. Which of the following is the correct truth table for the flip-flop? Here, "unchanged" shown in the table means the outputs maintain a previous state, and "unstable" means the outputs are in an unstable state.

unstable.1 0.0 1. unchanged

The flowchart below shows an algorithm in which two integers are temporarily entered into two variables x and y at the beginning, and then, after comparison of the two integers, the larger number is stored in the variable x and the smaller is in the variable y. In order to complete the algorithm, which of the following should be inserted in the process box A in the flowchart?

x + y ? x, x - y ? y, x - y ? x

# Which of the following Boolean expressions is equivalent to the sentence below? "The output z is true if at least two of the three inputs x1, x2, and x3 are true." Here, " n x " is used for the logical negation of xn, "+" for the logical sum, "." for the logical product, and "?" for the exclusive disjunction (or exclusive OR).

x1.x2+x2.x3+x1.x3

# Which of the following is the appropriate characteristic of object-oriented models?

Data is hidden from the outside and indirectly handled by procedures called methods. A program is a collection of data and methods.

# Which of the following is an appropriate explanation of a relational database?

Data is represented by two-dimensional tables.

# Which of the following is the appropriate set of major functions supported by an OS?

Data management, job management, and task management

# In a certain computer system, a simple hash function called the division method is used for page-based address translation. By using this method, a pair of new logical page number "101000" and its corresponding physical page number "0010" is stored into the page table shown below. Which of the following indexes is used to place them in the table?

110

There is a device consisting of Unit A, Unit B, and Unit C. Each unit can execute the "exclusive OR" operation in units of 4 bits. When an input bit string 1101 is given, an output bit string 0100 is obtained. In this device, if the internal key for Unit B is changed and the output bit string 1111 is generated, which of the following is the newly changed internal key for Unit B?

1110

# When a CPU can perform a multiplication in 12 nanoseconds (ns), an addition in 1 ns, and a subtraction in 1.5 ns, which of the following is the minimum CPU time, in nanoseconds, for the calculation of "a×a-b×b"?

14.5

# When the moving average method is applied to the receipt/shipment ledger shown below, how much in dollars is the closing inventory value of August?

1,300

# The activities A to E shown below are planned in a system development project. What is the highest possible weekly cost (in dollars) of this project?

1,750

# Which of the following is the term that refers to collecting a large volume of data through a variety of corporate activities, organizing, integrating, and saving the data for specific purposes, and using it for decision-making support, for example?

Data warehouse

# Which of the following is the appropriate sequence of DB application development activities?

Database planning -> Conceptual design -> Physical design -> Data conversion

# Which of the following is the major impact of a Denial of Service (DoS) attack?

Degradation of service due to network traffic congestion

# Which of the following is an appropriate action to be taken when a computer virus is found?

First, the infected computer is disconnected from the relevant network, because other computers may be infected via the network.

# Which of the following is an appropriate operations management method for user IDs and passwords?

For the purpose of preventing passwords from being abused by other people, it is so arranged that users become free to change their passwords at any time.

# Which of the following appropriately describes a cause-and-effect diagram?

It systematically arranges the relation between cause and effect in a fishbone format and clarifies which causes are related to particular effects.

# Which of the following is the appropriate program that supports dynamic processing in a Web environment and runs only on a Web server?

Java servlet

# Which of the following is an appropriate language that can be used to develop applications running mainly on Web browsers?

JavaScript

# A coin is tossed three times. What is the probability that it lands on heads exactly one time?

0.375

# Which of the following is the appropriate way to check whether or not an 8-bit unsigned binary number x is a multiple of 16?

The bit-by-bit logical product between x and the binary number 00001111 is 0.

# Which of the following is an appropriate description concerning the spiral model?

The design and implementation of an application is performed for a unit of component, and then this process is repeated successively for every component.

# Which of the following is the appropriate description of CPU clock frequencies for PCs?

The instruction execution timing in a CPU varies depending on the clock frequency. The higher the frequency, the faster the instruction execution speed gets

# Which of the following is an appropriate description concerning countermeasures to online system failures?

The master file should be backed up not only at the completion of online service but at times corresponding to the characteristics of the system.

Which of the following is the appropriate reason why the mantissa is normalized in the floating point representation?

The maximum number of significant digits can be maintained.

# In database recovery management, which of the following appropriately explains incremental logging with deferred update?

The new value of the updated item is stored in the log

# A certain system is being developed separately as Subsystems A and B. Each subsystem test has just been completed. The test data up to this point is shown in the table below. Here, the number of standard test items for this system is 10 items/Ksteps.

The number of bugs detected by the test is reaching the saturation level in Subsystem A compared to Subsystem B, so Subsystem A can be considered superior in quality.

# In the single precision of "IEEE Standard for Binary Floating-Point Arithmetic" (IEEE 754), the value "V" is represented as follows:

-28

# In fixed-point representation that expresses negative numbers by two's complement, which range of integers can be expressed with n bits? Here, the position of the binary point is to the right of the least significant bit.

-2n-1 through 2n-1-1

# Which of the following decimal fractions becomes a finite fraction when converted to an octal number?

0.5

# A system has a main memory access time of 60 nanoseconds (ns) and a cache memory access time of 10 ns. When the effective access time for accessing the main memory via the cache memory is 15 ns, what is the hit ratio of the cache memory?

0.9

# Which of the following numbers is a valid ISBN? Here, ISBN means the International Standard Book Number which is used to identify books, publishers, and bookstores. It consists of exactly 10 digits, and the rightmost digit is used for a check digit. The check digit is validated by using modulo 11 as follows

0071361286

# When the operational model of a system is shown in the figure below, which of the following represents the correct combination of MTBF and MTTR of the system? Here, t i (i = 1, 2, ..., n) denotes the operating time of the system, and r i (i = 1, 2, ..., n) denotes the repair time of the system.

1/n S i=1 n t i - 1/n S i=1 n r i

There are three different sizes of white balls and three different sizes of green balls. When these six balls are laid out in a line sothat the three white balls can be placed in adjacent positions, how many arrangements of all the balls can be made?

144

# The following table shows the duration for the optimistic, most likely, and pessimistic scenarios in a program development. How many hours are required to complete all the activities on a "three point estimate" basis?

15

When a certain RISC processor has a 5-stage instruction pipeline, how long (in nanoseconds) does it take to continuously execute 7 instructions excluding branch/jump instructions? Here, it takes 1.5 nanoseconds to complete each stage. In addition, any delay, such as pipeline stall and bubble, does not occur during the execution of those instructions.

16.5

# Two processes A and B with the same priority are executed in a round-robin method with a time slice of 30 milliseconds on a single CPU, but they use respectively different I/O devices. When they are executed as a standalone process, their processing times and sequences are shown in the figure below. How long (in milliseconds) does it take to complete both processes? Here, the two processes are

170

# A certain computer system runs in a multi-programming environment using a nonpreemptive "shortest job first" algorithm. In this system, four processes A, B, C, and D arrive sequentially in the process queue every 1 millisecond. The table shown below includes estimated execution time for each process; for example, process A uses CPU, I/O, and then CPU sequentially for 4, 5, and 5 milliseconds respectively. When 14 milliseconds elapse after the arrival of the first process A, which of the following processes is executed in CPU? Here, the multi-processing overhead of OS can be ignored, and both CPU and I/O operations can be executed concurrently.

C

# Which of the following is the mechanism for interfacing a Web server with an external program in order to implement an interactive page where an application program on the server executes a request from a client and returns the resulting output to the browser?

CGI

# Which of the following storage devices has the fastest access time?

CPU register

# The seven traditional, fundamental quality control tools consist of Check sheet, Pareto chart, Stratification, Scatter Diagram, Histogram, and Control Chart. What is the last (or 7th) one?

Cause and effect diagram

# Which classes are in the relationship of aggregation in the UML class diagram shown below?

Class A and Class C

# Which of the following flowcharts illustrates a "while repetition structure" in the control structure of programs?

Condition Process mui tên ngu?c lên

# Which of the following is a mechanism that allows a Web server to store its own information about a user on the user's own computer so that the Web server can identify users and possibly prepare customized Web pages for them?

Cookie

# You are building a new database for a company with 10 departments. Each department contains multiple employees. In addition, each employee might work for several departments. How should you logically model the relationship between the department entity and the employee entity?

Create a new entry, create a one-to-many relationship from the employee to the new entry, and create a one-to-many relationship from the department entry to the new entry.

# Which of the following is the language processing program that generates, on a certain computer, object programs that can be executed on another computer that has a different instruction set?

Cross compiler

# In DFD illustrated below, DFi is used for data flow i, Pj for process j, Ek for source or destination of data k, and DSl for data storage l. There are three errors (rule violations) in this DFD. One is in P2; that is, P2 must have at least one output data flow. The other two are in data flows. Which of the following combinations includes two rule violations, one for each data flow?

DF1 and DF5

Which of the following hexadecimal numbers, representing signed 16-bit binary numbers, results in overflow when multiplied by 4? Here, a negative number is represented in 2's complement.

DFFF

# Which of the following provides the function of mapping between domain names and IP addresses in a TCP/IP network?

DNS

Which of the following is a method that serves to enhance the reliability of memory access and makes it possible to automatically correct some of data errors?

ECC

# Which of the following is the appropriate statement concerning how to illustrate data flows (arrows) in DFD?

Each process must have at least one data flow in and one data flow out.

# Which of the following is described graphically using an E-R diagram?

Entities and relationships between entities

# Which of the following is the appropriate description concerning black box testing?

Even if any redundant code exists in a tested program, it cannot be detected.

# The figure shown below represents a logic gate and its timing chart. Which of the following is an appropriate logical function of this gate? Here, both A and B are the input signals and F is the output signal.

Exclusive-NOR

# A processor with a 256-Mbyte address space is using the address "35E3C03" to access a 16-Mbyte memory device. What are the highest and lowest addresses in the memory map of the 16-Mbyte

FFFFFFF 0000000

# Which of the following design tasks is performed from the standpoint of the system developer, based on the deliverables of external design and in consideration of the implementation method and processing efficiency?

Functional decomposition and structured design

# In some systems, the system manually or automatically determines memory blocks which are no longer referenced by a program and reorganizes the memory space so that it can be available for subsequent allocation. What is this process called?

Garbage collection

# Which of the following is used in ECC memory to detect 2-bit errors and correct 1-bit errors?

Hamming code

# Which of the following operations is performed on the packet header while the data packet moves from the lower to upper layers according to the OSI basic reference model?

Header deletion

# Which of the following data models represents data relationships in a tree structure?

Hierarchical model

# There is a table including the data items shown below. Which of the following SQL statements can insert a new row in the "student" table? Name Null? Type STUD_ID NOT NULL NUMBER(3) NAME NOT NULL VARCHAR2(25) ADDRESS VARCHAR2(50) GRADUATION DATE

INSERT INTO student (stud_id, address, name, graduation) VALUES (101, '100 Happy Lane', 'Dave', '2001-06-14');

# Which of the following refers to the concept of fail-safe design?

If the system determines that the sensor which detects someone entering the work area has failed, the robot arm is stopped by force.

# Which of the following is an appropriate description concerning a characteristic of job scheduling in a computer system?

In a system on which interactive processing and batch processing are mixed, it is expected that the response performance of interactive processing is improved by giving a higher priority to interactive processing

# An IP address in IPv4 consists of two parts: the network address part and the host address part. Which of the following is the appropriate description concerning the network address and the host address? Here, n is the number of bits in the network address part, and h is the number of bits in the host address part. In addition, the special-purpose and ineffective addresses should not be counted as an effective address.

In classes A, B, and C, the maximum number of effective host addresses available to one network is defined as 2h - 2.

# Which of the following appropriately explains a tracer as one of the dynamic debugging tools?

It outputs the contents of the memory and registers in order to monitor the results of the program execution in chronological order.

# Which of the following is the appropriate description concerning the performance evaluation of a computer system?

In the case of a system in operation, a software monitor can be used to collect and analyze statistical data, thereby permitting performance-related problems to be grasped.

# Which of the following is the situation that is expected to be improved by the introduction of an MRP (Material Requirements Planning) system?

Information concerning materials necessary for manufacturing and their required quantities is complex, so errors can occur repeatedly in the estimated quantity of order and thereby bring about problems to production

# Which of the following is the test to verify interfaces both between modules and between subsystems?

Integration test

Which of the following USB transfer modes is mainly used for a mouse, joystick, etc.?

Interrupt transfer

# When the data model is represented to conform to the notational convention shown below, which of the following statements appropriately interprets the designated E-R diagram?

It does not occur that a single order placement is given to multiple suppliers.

# Which of the following is an appropriate description concerning the characteristics of USB?

It has three data transfer modes: high-speed mode for external hard disks, full-speed mode for printers and scanners, and low-speed mode for keyboards and mice.

# Which of the following appropriately explains the function point method, which is one of the estimation methods used in system development?

It is a method for estimating the system size by evaluating system functions quantitatively on the basis of the amount of input/output data, the number of files, etc. and by making proper adjustments based on the complexity and characteristics of the application.

# Which of the following is the appropriate explanation of RPC in a client/server system?

It is a method of communication between programs, where parts of the process are assigned to another computer

# Which of the following is the appropriate description concerning ATM exchange?

It is an exchange device that handles a variety of data in an integrated way by partitioning data into fixed-length blocks called cells and adding a header containing destination information to each cell.

# Which of the following is the appropriate characteristic of "data oriented design" as compared with "process oriented design?"

It is possible to consider data as shared resources and to manage it in a unified manner.

# Which of the following appropriately explains benchmarking used in business management?

It is to make comparisons with the strongest competitors or advanced companies in order to scope out best practices for setting business goals, and to gain an understanding of products, services, and practical methods qualitatively and quantitatively.

# Which of the following is widely used as a computer port for a modem connection?

Serial port

# In the OSI basic reference model, which of the following layers provides a set of rules for establishing and terminating the connection between applications on computer systems?

Session layer

In a unidirectional list shown below, Blue is the top of the list, and its pointer indicates the next data address 110. In addition, Yellow is the end of the list, and its pointer is 0. Which of the following operations can replace Green with Red in the list?

Set the pointers of Red and Blue to 100 and 140 respectively.

# When a list of 7 elements shown below is rearranged in ascending order, which of the following sorting algorithms is completed with the minimum number of element exchanges? 3 5 12 9 10 7 15

Shell

# When LAN analyzers are used for finding out the causes of network failures, which of the following is a point to keep in mind?

Some analyzers are capable of displaying packets that pass through networks. Therefore, it is necessary to be careful not to use them in different ways such as wiretapping.

# Which of the following is a method of phishing?

Someone sends e-mails to entice the recipients and to have them access fake Web sites that appear to be sites of actually existing companies etc. and steals personal information.

# Which of the following is an appropriate description concerning throughput?

Spooling in which the output to the printer is temporarily stored on a hard disk drive is helpful for increasing the throughput.

# Which of the following is the salami technique used in computer crime?

Stealing from multiple assets little by little, to a degree that the illegal action does not come to the surface and become noticeable

# A computer consists of units that execute five functions: input, storage, processing, control, and output. From which unit is an instruction fetched and by which unit is the instruction decoded?

Storage Control

Which of the following architectures in a uniprocessor requires multiple functional units that can execute two or more instructions in parallel during a clock cycle by simultaneously dispatching the instructions to the functional units?

Superscalar

# When large-scale websites are built, application servers are often used in addition to Web servers. Which of the following is an appropriate reason for this?

System modification or expansion is made easier in comparison with Web servers alone.

# Which of the following is the most appropriate description concerning a "watch list" of system failures?

System operators also monitor processing delays, because such delays can cause system failures.

Which of the following input devices is classified as a pointing device and used for graphics input in a CAD system?

Tablet

# Which of the following is the appropriate interpretation of the testing-process quality control graph shown below and follow-on actions to be taken?

The resulting quality is generally rather poor, so it is necessary to take strong measures against places in which errors occur frequently; the quality status of the preceding process should be reviewed and do it over again if necessary.

In the graph shown below, which of the following is an appropriate description concerning the shortest path from the node "A" to another node? Here, the number shown beside the line indicates the distance between the two adjacent nodes.

The shortest distance from A to F is 9.

# Which of the following most appropriately describes the handling of control information in system operation management?

The system should be managed by a small group of managers. Each manager should be given an exclusive and separate account. Control information should be disclosed to the general user after its security level and other factors are considered.

# Which of the following is the appropriate statement concerning how to use management science methodology?

The time-series analysis method is used to forecast product sales in the market.

# Which of the following is the appropriate statement according to the Pareto analysis (also known as the 80-20 rule)?

This is the idea that 80% of tasks can be completed in 20% of the disposable time. The remaining 20% of tasks will take up 80% of the time.

# In virtual memory systems, serious degradation of system performance may occur due to a large number of page faults. Which of the following terms most appropriately describes this situation?

Thrashing

# Which of the following interrupts can signal to OS that a program might have gone into an infinite loop?

Timer Interrupt

# Which of the following can be realized by using the packet filtering function of a firewall?

To allow only the packets with specific TCP port numbers to pass from the Internet through to the internal network

# Which of the following is an appropriate purpose of installing a firewall in a computer network?

To block and permit data traffic

# Which of the following appropriately describes the purpose of using a check digit?

To detect an error of the inputted code value


Kaugnay na mga set ng pag-aaral

Mental Health Chapter 11, 12, 13

View Set

Midterm Standards and Objectives

View Set

Back at it again with the Depression

View Set

when was the constitution written

View Set

Chapter 61: Caring for Clients Requiring Orthopedic Treatment

View Set

Lifespan Development - Final Exam Review

View Set