JFE301

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In the Internet environment, a computer is able to send the ping command "ping 11.22.33.44" to the web server (e.g., www.xyz.com) of Company XYZ and then receive

Application layer

Which of the following is a tag-based very flexible image file format that can be lossless or lossy, and is widely used for the interchange of digital image data among graphic artists, photographers, and the publishing industry?

TIFF

Which of the following is the purpose of SCM?

To reduce costs and shorten delivery periods through integrated management of information across multiple companies or organizations from procurement to sales

As shown in the table below, there are a total of 86 coins that are composed of five types

13.4

Which of the following is an appropriate description concerning the implementation structure of a system audit?

In order to enable the person requesting the audit to issue improvement instructions

Which of the following is an appropriate explanation of the spooling function?

The overall processing power of a system is enhanced by performing data transfer

Which of the following is the most appropriate characteristic of the "big bang" migration method that is one of the system migration methods?

The problems that occur during migration to the new system have a big impact.

Let A be an array of size n, whose elements, A(1), A(2), ... A(n), are in ascending order. For a value k, a procedure for finding the index m which satisfies A(m) = k is described

(x + y) / 2 ? m

The logic circuit below shows a JK flip-flop.

0 0 No change 0 1 0 1

There exist the same two devices, each with an MTBF of 45 hours and an MTTR of 5 hours.

0.81

As shown the figure and table below, there are two types of CPUs X and Y that have the

0.90

Which of the following is the appropriate binary fraction that is equivalent to the decimal value 5.525?

101.100(0011)

Which of the following is the appropriate combination that represents the decimal number "-19" in 8-bit one's complement binary and 8-bit two's complement binary?

11101100 11101101

In the IPv4 addressing scheme, when the subnet mask "255.255.255.224" is used for

30

As shown in the table below, a factory manufactures the three types of products: X, Y, and Z.

33,000

When three apples are removed at random from a box that contains four green apples and eight red apples, what is the probability that the first two apples are green and the third

4/55

Consider a disk drive that has a capacity of 8 GB. The drive has 5 platters with two

400

When the relationship between the list price of a product and the demand for the product is defined as a linear expression, which of the following is an appropriate numerical value to be inserted into blank A below?

45,000

In a paged virtual memory, the LRU method is adopted for the page replacement algorithm. When the page frame allocated to the main memory is 4,

5

In order to sort the sequence "98, 12, 4, 56, 34, 23" in ascending order by Bubble Sort algorithm, how many exchange operations are required?

9

When the function M(n) is defined as shown below, what is the value of M(97)?

91

Which of the following is the critical path of the project activities shown in the arrow diagram below?

A ? C ? G ? J ? L

Which of the following is the function of a human interface that is used for reducing the number of operations of a user who frequently performs routine work?

A macro function by which a series of commands is grouped together

Which of the following is an explanation of a "known error" in IT service management?

A problem whose root cause is already identified or for which a workaround exists

Which of the following is the logical expression equivalent to A + B.C + B?

ABC

Which of the following is an appropriate explanation of a capacitive touch panel?

An electric field is formed on the surface, and the touched position is detected on the

Which of the following is an explanation of BYOD (Bring Your Own Device)?

An employee brings his or her own personal terminal to the office to use for work,

As shown in the table below, there are five items A through E.

B,E

Among the descriptions concerning process scheduling, which of the following is an appropriate explanation of the round robin method?

CPU resources are allocated to the first executable process in the queue when an

Each letter (i.e., P, D, C, and A) of the "PDCA" cycle used for progress management of system development and quality management of software is the first letter of the

Check

In the UML diagram shown below, which of the following is described in the blank

Class name

Which of the following statement is true for DMA Controller?

DMA controller enables data transfer directly between input/output devices and the memory while the CPU can perform some other operations

In a relational database table, which of the following is a column or a combination of columns whose values are defined by the primary key of another table in order to maintain referential integrity in the database?

Foreign key

For the "Product" table shown below, a transaction that executes the SQL statement B020

Full

Which of the following is an appropriate explanation of optimization in a compiler?

Generating an object code with improved run-time processing efficiency by analyzing

Which of the following is an appropriate description concerning "HTTP cookie"?

HTTP cookies are used to contain data sent from a web server as plain text only.

Which of the following is the most appropriate action to be taken in order to eliminate the "digital divide"?

Increasing learning opportunities for information literacy, and preparing an environment

Which of the following is the addressing method that references data in main memory as shown in the figure below?

Indirect addressing

In the context of information security defined by ISO/IEC 27001, which of the following is the property of safeguarding the accuracy and completeness of information assets?

Integrity

Which of the following is the salami technique that is used in computer crime?

It is a technique where theft is performed in small increments from many assets so that

Which of the following is an appropriate explanation of an audit working paper?

It is an implementation record of the auditing procedure performed by an auditor, which forms the basis of the audit opinion.

Which of the following is an appropriate characteristic of MAC (Message Authentication Code) that is used to authenticate a message and provide its integrity in cryptography?

It is constructed from cryptographic hash functions.

Which of the following is a characteristic of the hash function that is used for a digital signature?

It is difficult to restore an original message from the message digest.

Which of the following is an explanation of an absolute "path name" of a file system?

It is the path name from the root directory up to the target file.

In a real time system, which of the following is the data structure that is most suitable for the scheduling of multiple tasks with different priority levels?

Linked list

Which of the following is a mechanism by which a company or organization centrally manages the usage status of smartphones or such other devices that are lent to its staff

MDM (Mobile Device Management)

According to "competitive strategy" proposed by Philip Kotler, which of the following is

Market nicher

Mr. X sends an e-mail to Mr. Y by using the Internet.

Mr. Y's public key

The figure below shows the transaction model of an escrow service that is used on an Internet auction site or such other transaction. Which of the following is the action that

Notice of receipt of product

For a balanced binary search tree, which of the following is the asymptotic time

O(n)

A system administrator has a plan to monitor a network in order to evaluate which employees are using an excessive amount of bandwidth on peer-to-peer sharing services. Which of the following is the most appropriate technique for achieving such a purpose?

Packet sniffing

According to ITIL (IT Infrastructure Library), CSA (Configuration Status Accounting) is the recording and reporting of all current and historical data concerned with each CI

Performing integrated change control

Which of the following is the appropriate order of the country names that can create this binary search tree by inserting each country name in an empty tree?

Philippines, Vietnam, Mongolia, Thailand, Bangladesh, Myanmar, Malaysia

Which of the following is an appropriate description concerning the reliability of a computer system?

Preventive maintenance of systems is performed to increase MTBF.

Which of the following is not protected by "copyright" that is based on the WTO's Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)?

Programming language and its conventions

According to "A Guide to the Project Management Body of Knowledge" (PMBOK Guide), which of the following is the knowledge area that includes the processes and

Project integration management

Which of the following is an explanation of RFID?

RFID is a combination of an extremely small integrated circuit and an antenna, which is used for an electronic tag that enables an object to be identified and located by using the wireless automatic recognition technique.

In computerization investment planning, which of the following is an explanation of the ROI that is an evaluation index for investment value?

ROI is a measure that is calculated by dividing the profit generated through factors, such as sales increase and cost reduction, by the amount of investment.

When there are two relational database tables A and B as shown below, which of the following is the appropriate table that shows the result of the relational operation A ÷ B?

S1 S4

The relationship between the value "x" of a certain factor in the manufacture of a product and the value "y" of a quality characteristic

The correlation coefficient of x and y is negative.

Which of the following is an explanation of the long tail?

The long tail refers to the situation where the sales percentage for a group of poor-selling products cannot be ignored in terms of the total sales of Internet shopping.

In the system design stage, which of the following is the point to be checked during the audit of control for reducing the risk of non-fulfillment of user requirements?

The user department should participate in the review of system design.

Which of the following is an appropriate purpose of the parity check of a memory module?

To detect the occurrence of an error during reading

Condition: If it rains, then the street will be wet

Valid Not valid

In software development, which of the following is an appropriate explanation of a test that uses stubs?

When a top-down test is performed, a dummy lower-level module that is called by the upper-level module is prepared to stand in for an unfinished portion of the program.

There is a record that consists of eight attributes a through h as shown below.

ah bc ef abcdeg

Which of the following is an appropriate graph that shows the usage charge of a computer system in an IT service based on the declining metered rate method?

duoi len tren

Which of the following is a language processor that produces executable code for other platforms than the one on which the language processor itself is running?

Cross compiler

Which of the following is the forecasting technique that performs the procedure below in order to address problems that involve future prediction difficult to make by using other techniques?

Delphi method

Which of the following is classified as a function of a static test tool?

Detecting an error in a program by analyzing the source code

Which of the following is an appropriate description of the ACID (Atomicity, Consistency, Isolation, and Durability) properties that are considered to be the key transaction processing features of a database management system (DBMS)?

Durability refers to the guarantee that once the user has been notified of success, the

In object-oriented development, it is possible to make settings such that the user is not affected even if the internal structure of an object is changed. Thus, it is possible to

Encapsulation

Which of the following is the form of organization that has the characteristics (1) through (4) described below?

Project organization

When the effect of improvement is quantitatively evaluated, a weighted overall

Proposal 2

Which of the following is the expression that indicates the availability of an entire multiplex system composed of five subsystems having an availability of P for each

P{1-(1-P^2)^2}

Which of the following is an explanation of SOA?

SOA facilitates response to business changes by constructing software from components called services.

Which of the following is a memory module that uses a flip-flop circuit in a memory cell?

SRAM

Which of the following is a chart or a diagram that is used to analyze possible relationships between two variables and is composed of a horizontal axis containing the measured values of one variable and a vertical axis representing the measurements of the other variable?

Scatter diagram

Which of the following is the security attack that is used for an illegal attempt to manipulate the people of an organization into divulging the password and confidential information under the pretext of an emergency?

Social engineering

What is the position of the number 54321 to be stored?

2

There exists a system that requires the execution of 800,000 instructions per transaction.

200

When SRT (Shortest Remaining Time), also known as SRTF (Shortest Remaining Time First),

15

A spam filter checks each incoming message to be classified as either spam or non-spam, and only messages classified as non-spam are to be delivered to each inbox. On average, however, one percent of messages are incorrectly classified.

16

What is the value of the following expression in Reverse Polish Notation? 9 2 1 + - 3 ×

18

What is the sum of two binary fractions 1.0101 and 1.0111 expressed in decimal?

2.75

Which of the following is an explanation of the function of an archiver that is one of the data management utilities?

Compiling several files into one file, or returning a file to its original condition in orde

Which of the following is an appropriate preventive measure against malware that is taken on a client PC?

In order that no virus exploits a vulnerability and infects a PC, revised software modules or patches are appropriately applied to the OS and applications.

Among the software development activities, which of the following is an explanation of refactoring?

In order to improve the maintainability of a program, its internal structure is modified without any change of the external specifications.

Which of the following is the most appropriate explanation of a benchmark test for a computer system?

The processing performance of a system is compared with other systems in terms of scores obtained by executing software for measurement.

Which of the following is the most appropriate method for the implementation of a fault tolerant system?

The system is multiplexed with two or more computers instead of using a single computer.

Which of the following is an appropriate explanation of the state transition diagram that is used for requirements analysis and design in system development?

The triggers that change the state, such as the passage of time and the change in control signal, and the operations performed as a result are described.

Which of the following is the role of an ICMP protocol that is used as a network layer protocol of the OSI basic reference model?

t is used for messages to be generated and sent back to the source machine in order to

A D/A (digital-to-analog) converter with a resolution of 8 bits generates the output voltage 0 volts for the digital input value 0, and the output voltage 2.5 volts for the digital input value 128. When the lowest one bit of the digital input value is changed, which of

2.5/128

For a pair of a queue and a stack, two operations "pop_enq" and "deq_push" are defined as follows:

3

Which of the following is an appropriate description of BPR (Business Process Reengineering)?

BPR is a management technique that is used to redesign and restructure the value-creating processes in an organization in order to gain significant benefits in

Which of the following is a feature that is incorporated by an attacker to enter the network or server of a company?

Back door

Which of the following is the business management technique that is used to develop specific targets and measures to implement a planned strategy, in consideration of the

Balanced score card

When data is read into a processor and there are no hits in the cache memory, which of the following is the action that the cache memory control unit performs?

The required data is read from main memory to cache memory by using the block transfer mechanism.

A real-time OS, which performs preemptive scheduling based on priority, schedules the tasks A and B.

When A is launched during the execution of B, B is put into a "ready" state and A is executed.

Which of the following is the concept of a fail-safe design?

When the system determines that there is a fault in the sensor for detecting if someone has entered the working envelope or work area, the robot arm is stopped forcibly.


Set pelajaran terkait

CCNA Introduction to Networks Chapter 4

View Set

Statistics and Analytics - Chapter 01

View Set

The New Deal and Great Depression

View Set

Chapter 21: Emergency Medical Procedures

View Set

EC 202 Exam 3 Launchpad Graded Homework Questions

View Set

Cool Quotes About War and Warriors You May Want to Use in your Writing - Part 1

View Set

Salesforce Sharing and Visibility

View Set