JFE301
In the Internet environment, a computer is able to send the ping command "ping 11.22.33.44" to the web server (e.g., www.xyz.com) of Company XYZ and then receive
Application layer
Which of the following is a tag-based very flexible image file format that can be lossless or lossy, and is widely used for the interchange of digital image data among graphic artists, photographers, and the publishing industry?
TIFF
Which of the following is the purpose of SCM?
To reduce costs and shorten delivery periods through integrated management of information across multiple companies or organizations from procurement to sales
As shown in the table below, there are a total of 86 coins that are composed of five types
13.4
Which of the following is an appropriate description concerning the implementation structure of a system audit?
In order to enable the person requesting the audit to issue improvement instructions
Which of the following is an appropriate explanation of the spooling function?
The overall processing power of a system is enhanced by performing data transfer
Which of the following is the most appropriate characteristic of the "big bang" migration method that is one of the system migration methods?
The problems that occur during migration to the new system have a big impact.
Let A be an array of size n, whose elements, A(1), A(2), ... A(n), are in ascending order. For a value k, a procedure for finding the index m which satisfies A(m) = k is described
(x + y) / 2 ? m
The logic circuit below shows a JK flip-flop.
0 0 No change 0 1 0 1
There exist the same two devices, each with an MTBF of 45 hours and an MTTR of 5 hours.
0.81
As shown the figure and table below, there are two types of CPUs X and Y that have the
0.90
Which of the following is the appropriate binary fraction that is equivalent to the decimal value 5.525?
101.100(0011)
Which of the following is the appropriate combination that represents the decimal number "-19" in 8-bit one's complement binary and 8-bit two's complement binary?
11101100 11101101
In the IPv4 addressing scheme, when the subnet mask "255.255.255.224" is used for
30
As shown in the table below, a factory manufactures the three types of products: X, Y, and Z.
33,000
When three apples are removed at random from a box that contains four green apples and eight red apples, what is the probability that the first two apples are green and the third
4/55
Consider a disk drive that has a capacity of 8 GB. The drive has 5 platters with two
400
When the relationship between the list price of a product and the demand for the product is defined as a linear expression, which of the following is an appropriate numerical value to be inserted into blank A below?
45,000
In a paged virtual memory, the LRU method is adopted for the page replacement algorithm. When the page frame allocated to the main memory is 4,
5
In order to sort the sequence "98, 12, 4, 56, 34, 23" in ascending order by Bubble Sort algorithm, how many exchange operations are required?
9
When the function M(n) is defined as shown below, what is the value of M(97)?
91
Which of the following is the critical path of the project activities shown in the arrow diagram below?
A ? C ? G ? J ? L
Which of the following is the function of a human interface that is used for reducing the number of operations of a user who frequently performs routine work?
A macro function by which a series of commands is grouped together
Which of the following is an explanation of a "known error" in IT service management?
A problem whose root cause is already identified or for which a workaround exists
Which of the following is the logical expression equivalent to A + B.C + B?
ABC
Which of the following is an appropriate explanation of a capacitive touch panel?
An electric field is formed on the surface, and the touched position is detected on the
Which of the following is an explanation of BYOD (Bring Your Own Device)?
An employee brings his or her own personal terminal to the office to use for work,
As shown in the table below, there are five items A through E.
B,E
Among the descriptions concerning process scheduling, which of the following is an appropriate explanation of the round robin method?
CPU resources are allocated to the first executable process in the queue when an
Each letter (i.e., P, D, C, and A) of the "PDCA" cycle used for progress management of system development and quality management of software is the first letter of the
Check
In the UML diagram shown below, which of the following is described in the blank
Class name
Which of the following statement is true for DMA Controller?
DMA controller enables data transfer directly between input/output devices and the memory while the CPU can perform some other operations
In a relational database table, which of the following is a column or a combination of columns whose values are defined by the primary key of another table in order to maintain referential integrity in the database?
Foreign key
For the "Product" table shown below, a transaction that executes the SQL statement B020
Full
Which of the following is an appropriate explanation of optimization in a compiler?
Generating an object code with improved run-time processing efficiency by analyzing
Which of the following is an appropriate description concerning "HTTP cookie"?
HTTP cookies are used to contain data sent from a web server as plain text only.
Which of the following is the most appropriate action to be taken in order to eliminate the "digital divide"?
Increasing learning opportunities for information literacy, and preparing an environment
Which of the following is the addressing method that references data in main memory as shown in the figure below?
Indirect addressing
In the context of information security defined by ISO/IEC 27001, which of the following is the property of safeguarding the accuracy and completeness of information assets?
Integrity
Which of the following is the salami technique that is used in computer crime?
It is a technique where theft is performed in small increments from many assets so that
Which of the following is an appropriate explanation of an audit working paper?
It is an implementation record of the auditing procedure performed by an auditor, which forms the basis of the audit opinion.
Which of the following is an appropriate characteristic of MAC (Message Authentication Code) that is used to authenticate a message and provide its integrity in cryptography?
It is constructed from cryptographic hash functions.
Which of the following is a characteristic of the hash function that is used for a digital signature?
It is difficult to restore an original message from the message digest.
Which of the following is an explanation of an absolute "path name" of a file system?
It is the path name from the root directory up to the target file.
In a real time system, which of the following is the data structure that is most suitable for the scheduling of multiple tasks with different priority levels?
Linked list
Which of the following is a mechanism by which a company or organization centrally manages the usage status of smartphones or such other devices that are lent to its staff
MDM (Mobile Device Management)
According to "competitive strategy" proposed by Philip Kotler, which of the following is
Market nicher
Mr. X sends an e-mail to Mr. Y by using the Internet.
Mr. Y's public key
The figure below shows the transaction model of an escrow service that is used on an Internet auction site or such other transaction. Which of the following is the action that
Notice of receipt of product
For a balanced binary search tree, which of the following is the asymptotic time
O(n)
A system administrator has a plan to monitor a network in order to evaluate which employees are using an excessive amount of bandwidth on peer-to-peer sharing services. Which of the following is the most appropriate technique for achieving such a purpose?
Packet sniffing
According to ITIL (IT Infrastructure Library), CSA (Configuration Status Accounting) is the recording and reporting of all current and historical data concerned with each CI
Performing integrated change control
Which of the following is the appropriate order of the country names that can create this binary search tree by inserting each country name in an empty tree?
Philippines, Vietnam, Mongolia, Thailand, Bangladesh, Myanmar, Malaysia
Which of the following is an appropriate description concerning the reliability of a computer system?
Preventive maintenance of systems is performed to increase MTBF.
Which of the following is not protected by "copyright" that is based on the WTO's Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)?
Programming language and its conventions
According to "A Guide to the Project Management Body of Knowledge" (PMBOK Guide), which of the following is the knowledge area that includes the processes and
Project integration management
Which of the following is an explanation of RFID?
RFID is a combination of an extremely small integrated circuit and an antenna, which is used for an electronic tag that enables an object to be identified and located by using the wireless automatic recognition technique.
In computerization investment planning, which of the following is an explanation of the ROI that is an evaluation index for investment value?
ROI is a measure that is calculated by dividing the profit generated through factors, such as sales increase and cost reduction, by the amount of investment.
When there are two relational database tables A and B as shown below, which of the following is the appropriate table that shows the result of the relational operation A ÷ B?
S1 S4
The relationship between the value "x" of a certain factor in the manufacture of a product and the value "y" of a quality characteristic
The correlation coefficient of x and y is negative.
Which of the following is an explanation of the long tail?
The long tail refers to the situation where the sales percentage for a group of poor-selling products cannot be ignored in terms of the total sales of Internet shopping.
In the system design stage, which of the following is the point to be checked during the audit of control for reducing the risk of non-fulfillment of user requirements?
The user department should participate in the review of system design.
Which of the following is an appropriate purpose of the parity check of a memory module?
To detect the occurrence of an error during reading
Condition: If it rains, then the street will be wet
Valid Not valid
In software development, which of the following is an appropriate explanation of a test that uses stubs?
When a top-down test is performed, a dummy lower-level module that is called by the upper-level module is prepared to stand in for an unfinished portion of the program.
There is a record that consists of eight attributes a through h as shown below.
ah bc ef abcdeg
Which of the following is an appropriate graph that shows the usage charge of a computer system in an IT service based on the declining metered rate method?
duoi len tren
Which of the following is a language processor that produces executable code for other platforms than the one on which the language processor itself is running?
Cross compiler
Which of the following is the forecasting technique that performs the procedure below in order to address problems that involve future prediction difficult to make by using other techniques?
Delphi method
Which of the following is classified as a function of a static test tool?
Detecting an error in a program by analyzing the source code
Which of the following is an appropriate description of the ACID (Atomicity, Consistency, Isolation, and Durability) properties that are considered to be the key transaction processing features of a database management system (DBMS)?
Durability refers to the guarantee that once the user has been notified of success, the
In object-oriented development, it is possible to make settings such that the user is not affected even if the internal structure of an object is changed. Thus, it is possible to
Encapsulation
Which of the following is the form of organization that has the characteristics (1) through (4) described below?
Project organization
When the effect of improvement is quantitatively evaluated, a weighted overall
Proposal 2
Which of the following is the expression that indicates the availability of an entire multiplex system composed of five subsystems having an availability of P for each
P{1-(1-P^2)^2}
Which of the following is an explanation of SOA?
SOA facilitates response to business changes by constructing software from components called services.
Which of the following is a memory module that uses a flip-flop circuit in a memory cell?
SRAM
Which of the following is a chart or a diagram that is used to analyze possible relationships between two variables and is composed of a horizontal axis containing the measured values of one variable and a vertical axis representing the measurements of the other variable?
Scatter diagram
Which of the following is the security attack that is used for an illegal attempt to manipulate the people of an organization into divulging the password and confidential information under the pretext of an emergency?
Social engineering
What is the position of the number 54321 to be stored?
2
There exists a system that requires the execution of 800,000 instructions per transaction.
200
When SRT (Shortest Remaining Time), also known as SRTF (Shortest Remaining Time First),
15
A spam filter checks each incoming message to be classified as either spam or non-spam, and only messages classified as non-spam are to be delivered to each inbox. On average, however, one percent of messages are incorrectly classified.
16
What is the value of the following expression in Reverse Polish Notation? 9 2 1 + - 3 ×
18
What is the sum of two binary fractions 1.0101 and 1.0111 expressed in decimal?
2.75
Which of the following is an explanation of the function of an archiver that is one of the data management utilities?
Compiling several files into one file, or returning a file to its original condition in orde
Which of the following is an appropriate preventive measure against malware that is taken on a client PC?
In order that no virus exploits a vulnerability and infects a PC, revised software modules or patches are appropriately applied to the OS and applications.
Among the software development activities, which of the following is an explanation of refactoring?
In order to improve the maintainability of a program, its internal structure is modified without any change of the external specifications.
Which of the following is the most appropriate explanation of a benchmark test for a computer system?
The processing performance of a system is compared with other systems in terms of scores obtained by executing software for measurement.
Which of the following is the most appropriate method for the implementation of a fault tolerant system?
The system is multiplexed with two or more computers instead of using a single computer.
Which of the following is an appropriate explanation of the state transition diagram that is used for requirements analysis and design in system development?
The triggers that change the state, such as the passage of time and the change in control signal, and the operations performed as a result are described.
Which of the following is the role of an ICMP protocol that is used as a network layer protocol of the OSI basic reference model?
t is used for messages to be generated and sent back to the source machine in order to
A D/A (digital-to-analog) converter with a resolution of 8 bits generates the output voltage 0 volts for the digital input value 0, and the output voltage 2.5 volts for the digital input value 128. When the lowest one bit of the digital input value is changed, which of
2.5/128
For a pair of a queue and a stack, two operations "pop_enq" and "deq_push" are defined as follows:
3
Which of the following is an appropriate description of BPR (Business Process Reengineering)?
BPR is a management technique that is used to redesign and restructure the value-creating processes in an organization in order to gain significant benefits in
Which of the following is a feature that is incorporated by an attacker to enter the network or server of a company?
Back door
Which of the following is the business management technique that is used to develop specific targets and measures to implement a planned strategy, in consideration of the
Balanced score card
When data is read into a processor and there are no hits in the cache memory, which of the following is the action that the cache memory control unit performs?
The required data is read from main memory to cache memory by using the block transfer mechanism.
A real-time OS, which performs preemptive scheduling based on priority, schedules the tasks A and B.
When A is launched during the execution of B, B is put into a "ready" state and A is executed.
Which of the following is the concept of a fail-safe design?
When the system determines that there is a fault in the sensor for detecting if someone has entered the working envelope or work area, the robot arm is stopped forcibly.