JFE301 All Part1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A project charter is developed at project launch in order to comprehensively manage and arrange project activities. Which of the following is an appropriate content to be included in the project charter? A. Organizational framework B. Schedule C. Project objectives D. Quality management plan

C (ko chắc)

9. Which of the following is the most appropriate position that is primarily responsible for centralized oversight of enterprise IT strategic planning?

CIO (Chief Information Officer)

Which of the following is a mechanism that is used for defining the style of a Web page

CSS

B

Cache memory is usually organized at multiple levels, such as L1 for level 1 and L2 for level 2, with L1 having the smallest storage capacity but the fastest memory speed. The data in L1, L2, and main memory can be accessed using 1, 10, and 100 clock cycles, respectively. When the cache miss rates in L1 and L2 are 5% and 50% respectively, what is the average memory access time in clock cycles? a) 2.8 b) 3.7 c) 37 d) 52.3

# The seven traditional, fundamental quality control tools consist of Check sheet, Pareto chart, Stratification, Scatter Diagram, Histogram, and Control Chart. What is the last (or 7th) one?

Cause and effect diagram

Which of the following provides a baseline of security requirements for the operations of CA (Certification Authority) and RA (Registration Authority)?

Certificate policy

When data in the "Product" table is as shown below, which of the following is an update process that reduces the number of rows in the "Profitable_product" view created using "View definition" below?

Changing the Sales_price of the product with a Product_code of S001 to 130,000

14. View the picture and choose right answer.

Choose B

43. Which of the following can be achieved by using SSL/TLS? a) Communication between clients and servers is encrypted. b) Processing time is shortened in communication between clients and servers. c) The SMTP connection from mail software to a Web server is enabled. d) The trails of communication between browsers and Web servers are secured.

Communication between clients and servers is encrypted.

Which of the following is an event that generates an external interrupt?

Completion of an I/O operation by peripheral I/O devices

# Which of the following flowcharts illustrates a "while repetition structure" in the control structure of programs?

Condition Process mui tên ngu?c lên

20. When the procedure below is performed in terms of security, which of the following can be done by recipient B, in addition to the detection of message falsification?

Confirming that the message is from sender A

Which of the following is a chart or a diagram that shows the quality of a product in order of time and is used for determining whether or not the production process is in a stable state within the control limits?

Control chart

Which of the following is a mechanism that issues digital certificates? It used digital certificate certifies the ownership of a public key by the named subject of the certificate A. EDI B. SSL C. XBRL D. CA

D

Which of the following is an explanation of ERP? A. It is the technique and concept to use IT for business activities to improve efficiency and quality for a significant increase in sales/profits and improved customer satisfaction. B. It is the technique and concept to perform commercial transactions for consumers and between companies by using electronic networks, such as the Internet. C. It is the technique and concept where wholesalers and manufacturers support the business activities of retail stores for increased turnover. D. It is the technique and concept for improvement in management efficiency by planning and controlling the company-wide management resources in an effective and integrated way

D

Which of the following is the appropriate combination of 4 color inks or toners for a full-color printer? A. Aqua, Orange, Brown, and Black B. Red, Green, Blue, and Gray C. Red, Green, Blue, and Black D. Cyan, Magenta, Yellow, and Black

D

# The selling price per unit of product Z is set to $250, and sales for the coming year are expected to be 500 units. If the company requires a return of 15% in the coming year on its investment of $250,000 in product Z, what is the target variable cost per unit for the coming year? Here, the fixed cost is $10,000 per annum

$155

Which of the following is the logical expression whose resulting value is zero (0) only when the binary values of "x1, x2, ..., xn" are all zeros (0s) or all ones (1s)? Here, "·"

( 1) ( 2) gach tren 12 va gach tren 2

https://drive.google.com/file/d/1k8PTTg1HfLz2OgVKTC042emMNqtbk3Nr/view?usp=sharing Which of the following is the logical expression whose resulting value is zero (0) only when the binary values of "x1, x2, ... xn" are all zeros (0s) or all ones (1s)? Here, "。" and "+" represent the logical product and logical sum operators respectively, and" A\" is the logical............................

( 1) ( 2) gach tren 12 va gach tren 2

View the picture and choose right answer. https://drive.google.com/file/d/1LkyNchLFcKXawrJpk6F7TUailM1h5xE1/view?usp=sharing When three subsets A, B, and C exist in the universal set S as shown in the diagram below, which of the following represents the shaded area? Here, each of A, B, and C indicates the area encompassed by the corresponding circle. X U Y stands for the union set of X and Y, X n Y for the intersection set of X and Y, X - Y for the relative complement set of Y in X, and X + Y for the mutually exclusive set of X and Y. A. Choose d B. Choose a C. Choose c D. Choose b

(A UB U C) -(A(+) B(+) C)

3. Which of the following prefix expressions is equivalent to the infix expression "(A + B) * C - (D - E)"? a) - * + A B C - D E b) - + A B * C - D E c) A B + C * - D E - d) A B + C * D E - -

- * + A B C - D E

6. When a set of values "5, 4, 3, 2, 8, 6, 0, 1, 9, and 7" is inserted in this order to create a binary search tree, which of the following represents the sequence of node values visited in the post-order traversal of the binary search tree? a) 0 1 2 3 4 5 6 7 8 9 b) 1 0 2 3 4 7 6 9 8 5 c) 5 4 3 2 0 1 8 6 7 9 d) 5 4 8 3 6 9 2 7 0 1

1 0 2 3 4 7 6 9 8 5

70. In a certain CPU, a floating point adder unit uses a total of 40 percent of the execution time. If the floating point adder unit is replaced with a new unit whose speed is ten times (10x) faster than the original unit, approximately how many times faster is the new CPU than the original one? Here, there is no modification in the instruction set of the new CPU.

1.56

When characters A through E are encoded, their bit patterns and probabilities of occurrence are shown in the table below. What is the average number of bits per character?

1.8

# When the operational model of a system is shown in the figure below, which of the following represents the correct combination of MTBF and MTTR of the system? Here, t i (i = 1, 2, ..., n) denotes the operating time of the system, and r i (i = 1, 2, ..., n) denotes the repair time of the system.

1/n S i=1 n t i - 1/n S i=1 n r i

When a 12-point character is displayed in bitmap on a 96-dpi display screen, how many

16

An IT service is provided under the conditions described below. In order to

2

13. When a color image is stored in video memory at a tonal resolution of 24 bits per pixel, approximately how many megabytes (MB) are required to display the image on the screen with a resolution of 1024 768 pixels? Here, 1 MB is 106 bytes. a) 0.8 b) 2.4 c) 6.3 d) 18.9

2.4

As shown in the table below, 100 out of 100,000 patients have a cancer

2.418

69. Which of the following IP addresses can be used to connect a computer directly to the Internet?

203.162.1.160

When a series of data shown below is searched using the binary search algorithm

3

Which of the following is the result of calculating the arithmetic expression "B6 -7C"? Here, all numbers are represented in unsigned hexadecimal.

3A

When production is planned based on the calculation formula and table shown below, what is the value for production plan C? Here, the carry-over inventory on April 1 is equal to 400 pieces of the actual inventory on March 31.

4,850

When "11" is inserted in the min-heap shown below, which of the following min-heaps is created? Here, a new node is first placed at the bottom (or last) of the tree, and then

8,11,30,25,22,40,59,53,33,44

The following statement is True or False? The waterfall model is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards through the phases of Conception, Initiation, Analysis, Design, Construction, Testing, Production/ Implementation, and Maintenance. A. True B. False

A

Which of the following is the appropriate element that is used to calculate slack time in the PERT (Program Evaluation and Review Technique)? A. The earliest of the latest start times of the successor activities B. The earliest of the earliest start times of the successor activities C. The latest of the earliest start times of the successor activities D. The latest of the latest start times of the successor activities

A

Which of the following is the appropriate sequence of DB application development activities? A. Database planning => Conceptual design => Physical design => Data conversion B. Database planning => Physical design => Conceptual design => Data conversion C. Conceptual design => Database planning => Data conversion => Physical design D. Conceptual design => Database planning => Physical design => Data conversion

A ( Database planning => Conceptual design => Physical design => Data conversion)

Which of the following is the most appropriate explanation of a digital

A document that verifiably associates a public key with a particular

28. Which of the following is an appropriate explanation of SoC (System on a Chip)? a) A semiconductor chip equipped with a set of circuits which manages the data exchanged between devices, such as CPU, memory, or peripherals b) A semiconductor chip in which all required functions (systems) are integrated in the same manufacturing process c) A semiconductor chip in which functions with different processes are manufactured in separately optimized processes and each chip is appropriately wired on a package d) An electronic circuit board used for computers composed of CPU, chipset, video chip, memory, etc.

A semiconductor chip in which all required functions (systems) are integrated in the same manufacturing process

Which of the following is a situation where the independence of a system

A system auditor is recruited from an auditing firm and placed as

D

A system manages files by allocating file storage on a block-by-block basis, where each block consists of eight 500-byte sectors. How many sectors in total are required to store two files: one with 2,000 bytes and the other with 9,000 bytes? Here, sectors for management information such as directories can be ignored. a) 22 b) 26 c) 28 d) 32

Which of the following is an appropriate explanation of direct telemarketing?

A type of direct marketing that involves not only selling products on the phone but also asking for donations or opinions

# A depth-first search (DFS) visits all the vertices in a graph. When an edge to be explored next is chosen, this algorithm always chooses to go "deeper" into the graph. That is, it will pick the next adjacent unvisited vertex until reaching a vertex that has no unvisited adjacent vertices.

ABCDEF

B

According to ISO/IEC 20000 (Information technology - Service management), which of the following is a process that has the objective to define and control the components of the service and infrastructure and to maintain accurate information on such components? a) Change management b) Configuration management c) Incident management d) Release management

# Which of the following occurs when computer A broadcasts an ARP request to find the MAC address of computer B on the same network?

All computers in network receive the request from A, and only B replies to A with its MAC address

Which of the following is a computer network attack that can be classified as a DDoS

All the computers infected by a virus send a large number

C

Among various types of license agreements for a software package, which of the following is the most appropriate explanation of a site license? a) A software package can be installed on a designated server in a company or an organization, and can also used by a definite number of users. b) A software package can be installed on a designated server in a company or an organization, and can also be used by any and all clients to access the server. c) A software package can be installed on any and all computers, such as PCs, workstations, and servers, at a given location in a company or an organization. d) A software package can be installed anywhere within a company or an organization, even if installation involves multiple locations.

Which of the following is an appropriate description of a capacitive touch panel?

An electric field is formed on the surface of the touch panel, and the touched position is detected by capturing the change in the surface charge.

16. Which of the following is an explanation of a CIO?

An executive who is positioned to plan and execute strategies including information management and information system control

35. Which of the following is an explanation of a CIO?

An executive who is positioned to plan and execute strategies including information management and information system control

68. Which of the following is an activity concerning a model of business operations developed during the overall planning of information systems? a) Associating business processes with data classes b) Associating functions with forms in an organization c) Defining the functions and necessary data items of mission-critical systems d) Defining the relationships between the existing information systems and databases

Associating business processes with data classes

In a UML class diagram, which of the following is a direct relationship

Association

When security attacks to a computer system are classified into three categories (i.e., reconnaissance attack, access attack, and DoS attack)

Attempting to discover and map out systems, services, or vulnerabilities

There are two methods of biometric authentication: one extracts physical characteristics and the other extracts behavioral characteristics. Which of the following uses

Authentication is performed by extracting characteristics from the writing speed and pen pressure used when a signature is produced

76. See the picture and choose the right answer.

B

A system has a main memory access time of 60 nanoseconds (ns) and a cache memory access time of 10 ns. When the effective access time for accessing the main memory via the cache memory is 15 ns, what is the hit ratio of the cache memory? A. 0.1 B. 0.9 C. 0.83 D. 0.17

B

When a color image is stored in video memory at a tonal resolution of 24 bits per pixel, approximately how many megabytes (MB) are required to display the image on the screen with a resolution of 1024 x 768 pixels? Here, 1 MB is 10^6 bytes. View the picture and choose right answer. a)0.8 b) 2.4 c) 6.3 d) 18.9

B

Which of the following is the appropriate explanation of throughput? A. It is the maximum number of concurrently executable jobs. It depends on the resources of the system that can be used. B. It is the number of jobs processed per unit time. Spooling helps to improve throughput. C. It is the operating rate of a job, which can be calculated by the expression "running time of the job / operations time" D. It is the elapsed time after a job is submitted to the system until the final result is returned. It is affected by the I/O speed, overhead time, etc.

B

Which of the following is the appropriate item to be checked when the ordered software is delivered? A. A quality management plan is provided. B. The functions described in the specifications are implemented. C. The activity report indicates that there is no delay in making progress on activities. D. The details of the cost estimation submitted by the supplier are reasonable.

B

The arrow diagram shown below is created for time management of a project. Which of the following is the critical path?

B ? E ? F

89. Given the following diagram describes the addressing method (see figure). What is the name of that method?

Base addressing method

The distribution of days that are required to complete a certain activity can be approximated by a standard normal distribution with a mean of 500 days and a

Between 476 and 524

There are several formats for representing an integer in a computer. When a set of unsigned binary integers that are arranged in ascending order is interpreted in different

Biased (i.e., offset binary) format

Which of the following is a type of integration test in which all

Big bang test

Which of the following is a DVD medium in which users can write data, but not rewrite data? A. DVD-RW B. DVD-RAM C. DVD-R D. DVD-ROM

C

Which of the following is a protocol for e-mail on the Internet that supports not only text but other data such as audio and images through message header extension? A. MHS B. SMTP C. MIME D. HTML

C

https://drive.google.com/file/d/1rjksbd-d_Z8Oe48RYtwrW2eX4vvAE5lE/view?usp=sharing There is a CPU with a clock frequency of 1 GHz. When the instructions consist of two types as shown in the table below, what is the performance in MIPS of the CPU? Instruction 1: Execution time (clocks) (10), Frequency of appearance (%) (60) Instruction 2: Execution time (clocks) (5), Frequency of appearance (%) (40) a) 34 b) 100 c) 125 d) 133

C

View the picture and choose right answer. https://drive.google.com/file/d/1kPqJhNd_As7-zdOIKdTmkoY7sK1FgI0X/view?usp=sharing #Which of the following is equivalent to the result of the arithmetic expression "753 (8) ?-A6 (16) "? Here, each number is written in radix notation; that is, the radix is represented by a subscript following the number a) 101001101 (2) b) 501 (8) c) 325 (10) d)135(16) A. Choose b B. Choose a C. Choose d D. Choose c

D 325 (10)

Which of the following is a method that is used to check if an image or other digital content has been illegally copied and resold?

Digital watermark

# Which of the following technologies is used to divide each data file into blocks at constant length and to store them across multiple hard disks that can be accessed in parallel, thereby speeding up file access?

Disk striping

Which of the following is a technique of dividing the data of each file into blocks of a fixed size

Disk striping

Which of the following is regarded as risk sharing or risk transfer?

Distributing risk to other parties by purchasing insurance

Which of the following is a method for preventing an SQL injection attack

Ensuring that the input characters are not interpreted as characters that have a special

Which of the following is an appropriate explanation of accessibility in the context of information technology?

Environment where even those who are handicapped or elderly have an easy access to information equipment and receive information services

# Which of the following is the appropriate description concerning black box testing?

Even if any redundant code exists in a tested program, it cannot be detected.

Which of the following is the most appropriate description concerning the exclusive control of a DBMS?

Exclusive control is necessary for data that might be updated simultaneously by several people.

D

From internal and external viewpoints concerning software product development and maintenance, which of the following is an appropriate quality characteristic that includes several sub-characteristics such as maturity, fault tolerance, recoverability, and availability? a) Functional suitability b) Maintainability c) Portability d) Reliability

# Which of the following operations is performed on the packet header while the data packet moves from the lower to upper layers according to the OSI basic reference model?

Header deletion

When a repeater hub (or simply referred to as a hub), a router, and an L2 switch (or simply referred to as a switch) are used as network devices in order to interconnect LANs based on the OSI basic reference model

Hub & Switch & Router

Which of the following is an appropriate example of the effective utilization of RFID?

Identification and control of humans or objects by using a small wireless chip

B

In UML, the state machine diagram (previously called statechart diagram) is used for describing the state machine model of a target system. Which of the following is an appropriate description of the state machine diagram? a) It shows how data flows in the system through a sequence of processes. b) It shows how the system responds to internal and external events. c) It shows relationships among objects in the system at a point in time. d) It shows the flow of events from one activity to another.

D

In a database system employing incremental log with immediate updates, information in the log is used in restoring the state of the system to a previous consistent state when a crash occurs. A log record is generated upon execution of a write operation. Each log record consists of the transaction name Ti, the data item name, the old value of the data item, and the new value of the data item. The log record shown below is the normal transaction sequence after the last checkpoint. Which of the following recovery actions should be performed after a restart of the system if a crash occurs just after < T2 , C, 3000, 3500> and before < T2 , commit>? [Log records] <T1 , start> <T1 , A, 1000, 900> <T1 , B, 2000, 2100> <T1 , commit> <T2 , start> <T2 , C, 3000, 3500> <T2 , commit> a) Roll back both T1 and T2 b) Roll back T1 and roll forward T2 c) Roll forward both T1 and T2 d) Roll forward T1 and roll back T2

C

In a microprocessor, there are two general registers: GRi and GRj (hereinafter referred to as GRx instead of GRi or GRj). PUSH GRx is used for adding the contents of GRx to the top of a stack. POP GRx is for removing the current top data of the stack and storing it to GRx. Which of the following operations can exchange the contents of GRi and GRj? a) PUSH GRi POP GRj PUSH GRj POP GRi b) PUSH GRj POP GRi PUSH GRi POP GRj c) PUSH GRi PUSH GRj POP GRi POP GRj d) PUSH GRi PUSH GRj POP GRj POP GRi

B

In a multiprogramming environment, there is a need to limit access to shared resources; that is, the current process has exclusive use of the assigned resources for some period of time. Which of the following appropriately describes the function to successfully implement this type of exclusive control? a) A dispatcher is used to determine which resource should be allocated to which process and to restrict access to a specific resource. b) A semaphore variable is used to indicate the status of common resource. c) An interrupt is generated to signal to all processes that the use of a specific resource is restricted for some period of time. d) Spooling is used to enable exclusive control of a process by means of a queue.

B

In object orientation, the term "open (white box) reuse" refers to the reusing of base-class data and functions by creating subclasses for the base class. Which of the following is the appropriate description concerning the reuse technology in object orientation of this method? a) Changes in the base class do not affect the subclasses. b) Only differences between the data and functions defined by the base class and those of subclasses can be stated in subclasses, so development is highly efficient. c) Since the data defined in the base class is protected, programs with a high degree of safety can be developed. d) The base class can be used to develop multiple applications, but its subclasses cannot be re-used.

Which of the following is an appropriate description of how to estimate person-months

In the function point method, the function points are defined and classified

65. Which of the following is an explanation of ERP? a) It is the technique and concept for improvement in management efficiency by planning and controlling the company-wide management resources in an effective and integrated way. b) It is the technique and concept to perform commercial transactions for consumers and between companies by using electronic networks, such as the Internet. c) It is the technique and concept to use IT for business activities to improve efficiency and quality for a significant increase in sales/profits and improved customer satisfaction. d) It is the technique and concept where wholesalers and manufacturers support the business activities of retail stores for increased turnover.

It is the technique and concept for improvement in management efficiency by planning and controlling the company-wide management resources in an effective and integrated way.

70. Which of the following is an explanation of digital divide? a) It refers to a single point of contact to provide all services for each segment of civic events or corporate activities. b) It refers to allowing citizens to directly participate in shaping central or local government policies by means such as the Internet. c) It refers to communication and broadcasting services which are equally available to all citizens without regional disparities at a reasonable price. d) It refers to economic or social disparities caused by differences in capabilities or opportunities to use PCs and telecommunications.

It refers to economic or social disparities caused by differences in capabilities or opportunities to use PCs and telecommunications.

Maintenance cost of information equipment such as servers

It refers to the social or economic gap that occurs depending on the level of

# Which of the following appropriately describes a cause-and-effect diagram?

It systematically arranges the relation between cause and effect in a fishbone format and clarifies which causes are related to particular effects.

21. There is an organization with the following characteristics: +All processes are continually improved based on a quantitative understanding of the common causes of variation inherent in processes.+They focuses on continually improving process performance through both incremental and innovative technological improvements.+ Quantitative process-improvement objectives for the organization are established, continually revised to reflect changing business objectives, and used as criteria in managing process improvement. Which CMMI level they are archived?

Level 5

Which of the following is an explanation of core competence management?

Management is centered on proprietary know-how and technology that are not easy for other companies to imitate.

When an information strategy is developed, which of the following is an item that must always be made consistent with the strategy?

Medium and long-term management plans

# Which of the following has the feature whereby only minimally limited OS functions, such as memory management and process management, are supported and other OS functions, such as the file system, are implemented as server processes?

Microkernel

When Mr. A sends Mr. B an e-mail with a digital signature created by using public key cryptography

Mr. A's private Key, Mr. A's public Key

Among the various types of e-commerce transactions, which of the following is an

Mr. B buys a book from an online shop owned by Company A.

# Which of the following is the appropriate method that supports both private key cryptography and public key cryptography, enables users to securely exchange e-mail messages, and to secure files, disk volumes, and network connections with both privacy and strong authentication?

PGP (Pretty Good Privacy)

# In a microprocessor, there are two general registers: GRi and GRj (hereinafter referred to as GRx instead of GRi or GRj). PUSH GRx is used for adding the contents of GRx to the top of a stack. POP GRx is for removing the current top data of the stack and storing it to GRx. Which of the following operations can exchange the contents of GRi and GRj?

PUSH GRi PUSH GRj POP GRi POP GRj

A chart or a diagram is created to resolve a quality problem

Pareto chart

31. The figure below shows the relationships among data items used in a certain parts management system. When the system is implemented as a relational database, which of the following is the most appropriate and effective table structure of the relational database? a) Parts table Part_name Color Cost Supplier_name Supplier_address Supplier_phone b) Parts table Part_name Color Cost Supplier table Supplier_name Supplier_address Supplier_phone c) Parts table Part_name Color Cost Supplier_name Supplier table Supplier_name Supplier_address Supplier_phone d) Parts table Part_name Color Cost Supplier table Part_name Supplier_name Supplier_address Supplier_phone Part_name Color Cost Supplier_name Supplier_ address Supplier_ phone

Parts table Part_name Color Cost Supplier_name Supplier table Supplier_name Supplier_address Supplier_phone

27. The project manager decides to reduce the time needed for tasks D and F by one day each. How effective will this reduction be in achieving his aim of maintaining the original finish time for the project?

Path A,B,C,E,I is now the longest at 13 days so it becomes the new critical path.

Which of the following is a technique where a system is actually attacked and an intrusion

Penetration test

Which ofthe following is the appropriate category of system maintenance that

Perfective maintenance

C

Port scanning is the process of sending packets to check every port on each target system to see which ports are open and which ports are locked. Which of the following information can be identified by port scanning? a) Computer viruses in activity b) Hardware configuration and compatibility c) Network and application services currently available d) Operating system in execution

63. Among the layers of the OSI basic reference model, which of the following is the appropriate layer that is primarily responsible for the translation, encryption, and compression of data?

Presentation layer

Among the layers of the OSI basic reference model, which of the following is the appropriate layer that is primarily responsible for the translation, encryption, and compression of data?

Presentation layer

60. Which of the following is an appropriate characteristic of the single-step (so-called "big bang") migration method? a) It requires an application that provides a connection between the new and old systems. b) Operational costs are additionally required for parallel operations. c) Problems during migration to the new system have serious impacts. d) The new and old systems are operated in parallel, and then migration to the new system is performed at a certain point in time.

Problems during migration to the new system have serious impacts.

When an information system is procured according to the procedure shown in the figure below, which of the following is to be inserted into blank B?

RFP

66. Which of the following is an explanation of BPR? a) Focusing the management resources on proprietary skills and techniques that are profitable and superior to those of the competitors b) Planning and managing effectively and comprehensively the allocation of management resources of the entire company to improve management efficiency c) Redesigning the business processes from a customer perspective, by making full use of information technology to radically change the characteristics and structure of the company d) Understanding qualitatively and quantitatively the products, services, and operations of the company by comparing them with those of the strongest competitor or of other advanced corporations

Redesigning the business processes from a customer perspective, by making full use of information technology to radically change the characteristics and structure of the company

# The state diagram shown below is a simple Mealy machine. Which of the following transitions is NOT possible in the diagram? Here, S0, S1, and S2 are states. Each edge is labeled with "j / k" where j is the input and k is the output.

S0 ? S1 ? S2 ? S1 ? S2 ? S0

# Which of the following is the appropriate protocol that is used to send e-mail messages from one server to another over the Internet?

SMTP

61. In Network context, which of the following protocol is using to send email?

SMTP

# Which of the following is the appropriate protocol that is widely used with TCP/IP networks to collect and manage information from network devices such as servers, routers, switches, and hubs?

SNMP

Which of the following is most suitable for cache memory?

SRAM

83. Which of the following is an appropriate description concerning the hardware maintenance of a system?

Scheduled maintenance is performed for the hardware device that has failed before.

29. Which of the following is an appropriate deliverable that must be approved when the external design of a system is completed?

Screen layout

Which of the following is an appropriate deliverable that must be approved when the

Screen layout

As shown in the table below, there are four tours provided by a tour company.

Scuba diving

Which of the following is the form of normalization into which the relational database

Second normal form

85. In reliability, we used RASIS to evaluate the stable of system.

Security (Prevention of invalid access)

Which of the following is an activity that is performed during the WBS creation process in

Segmenting project activities hierarchically into smaller parts or pieces

# Which of the following is a method of phishing?

Someone sends e-mails to entice the recipients and to have them access fake Web sites that appear to be sites of actually existing companies etc. and steals personal information.

Which of the following is a computer architecture that enables the processor to execute

Superscalar

# When large-scale websites are built, application servers are often used in addition to Web servers. Which of the following is an appropriate reason for this?

System modification or expansion is made easier in comparison with Web servers alone.

B

The distribution of days that are required to complete a certain activity can be approximated by a standard normal distribution with a mean of 500 days and a standard deviation of 12 days. What is the approximate 95% confidence interval in days for the activity? a) Between 464 and 536 b) Between 476 and 524 c) Between 488 and 512 d) Between 494 and 506

Which of the following is the most effective method for detecting

The hash value of each file containing the content of the Web server

B

The head of a hard disk drive is currently positioned at cylinder number 100, and the cylinder numbers 120, 90, 70, 80, 140, 110, and 60 are lined up in the I/O request queue. What is the total number of cylinders that the head moves under the following conditions? [Conditions] (1) The seek optimization method reorders the I/O requests so that the head can move as much as possible in a single direction, and the requests are processed in order of cylinder number. (2) The requests so far are in the direction where the cylinder numbers increase. (3) When there are no more requests in the current direction, the direction of head movement is reversed. (4) The results are unaffected by the processing order of the requests. (5) New requests do not occur during the process. a) 80 b) 120 c) 160 d) 220

Which of the following is a case example that is suitable for ABC analysis

The hot-selling products need to be analyzed on the basis of the sales value and gross

# Which of the following is the appropriate description of CPU clock frequencies for PCs?

The instruction execution timing in a CPU varies depending on the clock frequency. The higher the frequency, the faster the instruction execution speed gets

B

The magnetic head of a hard disk drive is currently positioned at cylinder number 100, and the cylinder numbers 120, 90, 70, 80, 140, 110, and 60 are lined up in the I/O request queue. What is the total number of cylinders that the head moves to satisfy the conditions below? [Conditions] (1) The seek optimization method is applied to I/O requests, which are sorted in order of increasing cylinder number so that the head can move in the same direction to the extent possible. (2) The head is currently moving in the direction where cylinder number increases. (3) When there are no more I/O requests in the current direction, the direction of movement is reversed. (4) The results are not affected by the processing order of I/O requests. (5) New I/O requests do not occur during the process. a) 80 b) 120 c) 160 d) 220

In memory pool management of a real time system using various sizes of memory resources, which of the following is an appropriate characteristic of the fixed-length

The memory efficiency is poor, and the processing speed for allocation and deallocation is fast and constant.

# In database recovery management, which of the following appropriately explains incremental logging with deferred update?

The new value of the updated item is stored in the log

24. Which of the following is an appropriate explanation of the spooling function? a) Execution of the programs is temporarily suspended, and control is transferred to the control program. b) If a CPU becomes idle because of the execution of input/output instructions while executing a certain task, the CPU is assigned to another task. c) The access time to auxiliary storage devices is reduced by providing a buffer pool consisting of multiple buffers and by increasing the probability of accessing buffers located in the main storage. d) The overall processing power of a system is enhanced by performing data transfer between the main storage and low-speed input/output devices via auxiliary storage devices.

The overall processing power of a system is enhanced by performing data transfer between the main storage and low-speed input/output devices via auxiliary storage devices.

Which of the following is an appropriate explanation of the LRU

The page that has not been used for the longest time is replaced.

1. As shown in the figure below, all the lines show signs of levelling-off in the control chart of a program test.Which of the following can be inferred from this condition?

The process is facing some bugs that are difficult to resolve, and subsequent tests are not proceeding.

Among the maintenance activities of a system, which of the following is an appropriate

The system is modified to cope with changes in the

77. Which of the following is an appropriate description concerning financial indicators? a) The current ratio is the ratio of current assets to current liabilities. As the value is smaller, safety and soundness are higher. b) The equity to total asset is the ratio of equity capital to fixed assets. As the value is larger, steadiness and soundness are higher. c) The fixed ratio is the ratio of fixed assets to fixed liabilities. As the value is smaller, safety and soundness are higher. d) The total capital profit ratio is the ratio of profit to gross capital. As the value is larger, profitability is higher.

The total capital profit ratio is the ratio of profit to gross capital. As the value is larger, profitability is higher.

C

The workload required to develop a system is estimated at 80 person-months if it is carried out by one person. When four staff members with the same productivity work together to develop the system, each member's productivity is expected to decrease by 20%. How many working days does it take for the four members to develop this system? Here, this development work can be equally divided into four parts, and the four members can perform each individual part in parallel. In addition, each member can work 22 working days per month. a) 352 b) 440 c) 528 d) 550

C

There are a total of 1,900 students in a school, 553 of whom are taking a course in computer science, 667 of whom are in mathematics, and 290 of whom are in both computer science and mathematics. How many students are not taking a course in either computer science or in mathematics? a) 680 b) 930 c) 970 d) 1260

C

There are five different sizes of white balls and five different sizes of green balls. When these ten balls are laid out in a line so that adjacent balls can have different colors, how many arrangements of the balls can be made? a) 7,200 b) 14,400 c) 28,800 d) 57,600

A

There are several formats for representing an integer in a computer. When a set of unsigned binary integers that are arranged in ascending order is interpreted in different formats and then sorted again in ascending order of their values, which of the following is the format that maintains the same order as the original unsigned binary integers? a) Biased (i.e., offset binary) format b) One's complement format c) Signed magnitude format d) Two's complement format

C

There is a four-digit number N1N2N3C that is used for Customer Account Number (CAN). The right most digit "C" can be calculated as follows: C = (N 1*3 + N2*5 + N3*7) mod 10 Which of the following is a correct CAN? Here, x mod y returns the remainder when x is divided by y. a) 7714 b) 7715 c) 9690 d) 9695

Which of the following is an appropriate reason for using a real-time OS in an embedded system

There is a mechanism available to respond within the limited time.

C

There is a series of project activities to be performed by two staff members, Mr. X and Mr. Y. When each of them works alone, it can be completed by Mr. X in 3 hours and by Mr. Y in 6 hours. When Mr. X starts to work at 9:00 a.m. and then Mr. Y starts to work with Mr. X at 10:00 a.m., which of the following is the time at which all the activities are completed? Here, the activities can be divided and performed in parallel by the two members without any loss of productivity. a) 10:20 a.m. b) 10:40 a.m. c) 11:20 a.m. d) 11:40 a.m.

# Which of the following appropriately describes the purpose of the cache memory used by processors?

To compensate for the difference between the main memory access speed and the processor speed

Which of the following is an appropriate purpose of using a WBS (Work Breakdown

To decompose all development activities into smaller steps with a manageable size

# What is the purpose of attaching a digital signature to software disclosed on the Internet?

To guarantee that the software contents have not been tampered with

# A data warehouse was set up, but it is hardly used. The result of a hearing suggests that the users' skill level is lower than expected. Which of the following is an appropriate measure for improvement to promote usage?

To prepare, as standards, templates according to data extraction and analysis patterns

In the course of object oriented design, which of the following can be regarded as a subclass of the base class "automobile"?

Truck

44. Which of the following technologies is the most suitable to divide the whole company network into the networks by department?

VLAN

Which of the following is an explanation of the pattern matching technique for antivirus software?

Viruses are detected by comparing data with a collection of known virus signatures.

46. Which of the following explains the pattern matching method that is used by antivirus software? a) Viruses are detected by comparing files before infection with files after infection to investigate whether any change has been made to the files. b) Viruses are detected by comparison with the file checksum. c) Viruses are detected by comparison with the signature codes of known viruses. d) Viruses are detected by monitoring the system for abnormal phenomena caused by viruses.

Viruses are detected by comparison with the signature codes of known viruses.

D

When 50% of the undefined specifications are defined each time a prototype is created, how many prototypes should be created to define over 90% of the specifications that are undefined at the start of prototyping? a) 1 b) 2 c) 3 d) 4

A

When a department that outsources system development must undergo a system audit concerning "progress management" of the outsourcing partner, which of the following is an appropriate set of materials that should be submitted? a) Business reports received periodically from the outsourcing partner, and documents showing the verification result of the business reports b) Documents clearly specifying the method of acceptance inspection of deliverables c) Documents clearly specifying the method of collection and disposal of data and other materials d) Documents indicating that software is deposited with a third party (escrow agent)

D

When a list of 7 elements shown below is rearranged in ascending order, which of the following sorting algorithms is completed with the minimum number of element exchanges? 3 5 12 9 10 7 15 a) Bubble sort b) Insertion sort c) Merge sort d) Shell sort

D

When a processor performs multimedia or graphic-related application programs with the mixture of vector instructions and scalar instructions, 10% of the computation time is used for vector instructions. When a newly developed processor can execute vector instructions twice faster than the original processor, approximately how many times faster is the speed of the new processor than that of the original one in the same application environment? a) 1.0275 b) 1.0465 c) 1.0500 d) 1.0526

The diagram below shows the state transition of the tasks in a multitasking computer system. When does a task in the running state move to the ready state?

When a task with a higher priority is set to the ready state

4. From a viewpoint of reliability of systems, which of the following is the appropriate timing for measuring the availability of a system?

When the problems found immediately after the start of system operations have been resolved and the system is becoming stable

B

Which of the following appropriately describes "memory interleaving" that is one of the high-speed computer technologies? a) It is a method for bridging the gap between register and main memory access speeds by copying a part of the main memory data to the cache. b) It is a method for dividing the memory into multiple independently-operating groups and accessing each group in parallel. c) It is a method for transferring data directly between the main memory and an I/O device or between main memories without passing through the CPU. d) It is a method for writing data to the cache or writing data to the main memory if the cache overflows, when sending data to the main memory.

A

Which of the following functions is a part of OS task management? a) CPU allocation b) File protection c) I/O execution d) Spool control

A

Which of the following is an appropriate description concerning the characteristics of USB? a) It has three data transfer modes: high-speed mode for external hard disks, full-speed mode for printers and scanners, and low-speed mode for keyboards and mice. b) It is a high-speed interface suitable for data transfer that requires real-time processing, such as transfer of audio and visual data; it is also called FireWire. c) It is a parallel interface for connecting a small computer such as a PC to a peripheral device such as a hard disk or a laser printer. d) It is a serial interface that was originally the standard used for modem connections but is now used to connect PCs to peripheral devices as well.

B

Which of the following is an appropriate explanation of EDI? a) A communication service that provides value-added functions such as storage of data transmitted over the network and conversion of data formats b) A method for electronically exchange of business data between computers over a network, based on standard formats and protocols c) An international standard for e-mail services which provides the generation, transmission, and processing of messages, based on the OSI basic reference model d) An ordering system that enables orders to be placed by transmitting order information from a data entry terminal to the head office or a supplier

A

Which of the following is an appropriate technique that is used for implementing a queue as a data structure? a) FIFO b) LFU c) LIFO d) LRU

D

Which of the following is the appropriate protocol that is widely used with TCP/IP networks to collect and manage information from network devices such as servers, routers, switches, and hubs? a) HTTP b) HTTPS c) SMTP d) SNMP

B

Which of the following is the name of a phenomenon where multiple ON/OFF signals are generated during a few milliseconds after a push-button switch with a mechanical contact is pressed once? a) Buffering b) Chattering c) Filtering d) Switching

C

Which of the following subnet masks provides the minimum number of IP addresses available in the subnet to assign to devices that request a connection? a) 255.255.255.0 b) 255.255.255.248 c) 255.255.255.252 d) 255.255.255.254

D

Which of the following technologies is used to divide each data file into blocks at constant length and to store them across multiple hard disks that can be accessed in parallel, thereby speeding up file access? a) Disk at once b) Disk cache c) Disk mirroring d) Disk striping

# Which of the following is the general-purpose markup language that allows its users to define their own tags and to facilitate the sharing of data across different information systems, particularly via the Internet?

XML

https://drive.google.com/file/d/1LbtAdfOLsYKFCIy6_JZeFv3Wf8qq0-JH/view?usp=sharing In the RAID3 system shown below, three disks (Disks 0 through 2) for byte-striped data and one dedicated parity disk (Disk 3) are used as one volume. Parity byte Ap is generated by calculating the "exclusive OR" ..........

XOR (Exclusive OR)

Which of the following is the logic gate that is equivalent to the logic circuit shown below?

XOR(121)

# Which of the following is the appropriate diagram that explains pipeline control? Here, the meanings of the capital letters in the diagrams are as follows: F: Fetching instruction D: Decoding A: Address calculation R: Reading operand E: Executing

a d f thang hang

2. When a single-bit "half adder" circuit is used for simply adding two input signals x1 and x2, which of the following is the appropriate combination of logical expressions for two output signals s (sum) and c (carry)? Here, " " stands for the logical OR operation and " " for the logical AND operation. s c a) x1 x2 x1 x2 b) x1 x2 x1 x2 c) (x1 x2 ) .NOT(x1 x2 ) x1 x2 d) (x1 x2 ) (x1 x2 ) x1 x2

c,

Which of the following is an explanation of marketing mix?

company's products are effectively sold by combining product strategy, price strategy, channel strategy, promotion strategy, and others appropriately.

When a declining metered rate method is applied to the total charge for usage of a computer system, the charge per unit of usage decreases as the system usage increases. Which of the following is a graph that shows this method?

cong hinh chu C 3 net

5. As shown in the figure below, there is a binary tree which is created in accordance with a specific rule that the value of a parent node is greater than that of a child element. When a new element with the value 12 is inserted in the places marked by A, B, C, or D in the tree according to the steps defined below, where should it be inserted in order to maintain the specific rule and minimize the number of exchanges? [Steps] 1. Add the element to a leaf node of the tree. 2. Compare the added element with its parent; if the result is in the correct order, stop. If not, go to Step 3. 3. Exchange the element for its parent and return to Step 2. a) A b) B c) C d) D

d, D

# A binary search tree is created by inserting the values shown below. 7 9 11 2 8 10 5 3 After deletion of the root from the newly created tree, what does it look like?

dong dau 8 dong cuoi 3 10

C

https://goo.gl/4QDjmg

D

https://goo.gl/6J1c4r

D

https://goo.gl/7Z49uf

B

https://goo.gl/8b4g9D

A

https://goo.gl/9Grtsq

B

https://goo.gl/9yhiiQ

B

https://goo.gl/A457Br

B

https://goo.gl/BzNDyQ

B

https://goo.gl/jnboED

B

https://goo.gl/m4MqxD

B

https://goo.gl/xn73Su

B

https://goo.gl/yHGrfr

C

https://goo.gl/ykuBY9

Which of the following is the appropriate combination of characteristics of SRAM in

lower faster Cache memory Flip-flops

# A recursive definition of a factorial function f(n) that calculates "n!" can be represented as follows: f(n) = (n > 1) f(n) = (n = 0) Which of the following combinations should be inserted in the boxes A and B? Here, "n" is a non-negative integer.

n * f(n-1) , 1

# A binary tree is said to be perfect, if all its leaves are at the same depth and every internal node has two children. Which of the following is correct about the perfect binary tree? Here, n is the number of nodes, and h is the height of the perfect binary tree.

n = 2^(h + 1) - 1

Bubble sort is implemented using a technique that repeatedly compares adjacent pairs of elements from left to right and swaps them if they are in the wrong order.

n(n ?1)/2

In a URL (Uniform Resource Locator) specified to access a Web page through the Internet, which of the following is the appropriate sequence of four basic parts: the

protocol, host name, directory, page

# The figure shows an RS flip-flop using two NAND gates. Which of the following is the correct truth table for the flip-flop? Here, "unchanged" shown in the table means the outputs maintain a previous state, and "unstable" means the outputs are in an unstable state.

unstable.1 0.0 1. unchanged

# When a certain natural number x is expressed as a 2n-digit binary number "1010...10" consisting of 1 and 0 arranged alternately, which of the following equations can be formulated in terms of the number x?

x + x/2 = 2^2n - 1

# Which of the following equations holds well in the postfix notation (or Reverse Polish Notation)? Here, x, y, and z are variables.

x y - z + = x y z - -

Time Division Multiplexing (TDM) is a type of digital multiplexing where two or more 4 Kbytes of data over one channel of a 512 Kbps

0.5

The table below shows the number of failures per day and the average repair time (in minutes) per failure that are observed during the first 2

0.83

# A system has a main memory access time of 60 nanoseconds (ns) and a cache memory access time of 10 ns. When the effective access time for accessing the main memory via the cache memory is 15 ns, what is the hit ratio of the cache memory?

0.9

23. When a set of values "5, 4, 3, 2, 8, 6, 0, 1, 9, and 7" is inserted in this order to create a binary search tree, which of the following represents the sequence of node values visited in the post-order traversal of the binary search tree?

1 0 2 3 4 7 6 9 8 5

As shown in the class diagram below, there is a many-to-many association between the two classes Product and Warehouse. When there is a need to know how many of each

1 0..* 0..* 1

88. Given the following diagram describes the addressing method (see figure). What is the name of that method?

Indexed addressing method

Which of the following is an appropriate activity that is undertaken by a system auditor who

Verification of the management status of access control concerning data

The response speed of a database server is slowed down, even though no application is

Verification of the status of data storage

Which of the following is the purpose of defining a business model at the planning stage of total optimization in an information strategy

To organize the relationships between a company's entire business operations and their

77. A system has a main memory access time of 60 nanoseconds (ns) and a cache memory access time of 10 ns. When the effective access time for accessing the main memory via the cache memory is 15 ns, what is the hit ratio of the cache memory?

0.9

# Which of the following numbers is a valid ISBN? Here, ISBN means the International Standard Book Number which is used to identify books, publishers, and bookstores. It consists of exactly 10 digits, and the rightmost digit is used for a check digit. The check digit is validated by using modulo 11 as follows

0071361286

When four jobs A through D shown in the table below are executed on a first-come first-served basis, which of the following is the average waiting time (in minutes) in the

0:00 & 4

20. An integer m is stored in a register as a binary value. If this value is shifted to the left by three bits and m is added to the shifted value, how many times as large as m is the resulting number? Here, no overflow occurs.

9

Which of the following is an appropriate explanation of POP3 that is used in an e-mail system? A. It is a protocol used by the user to send an e-mail. B. It is a protocol used to retrieve e-mails from the mailbox of a mail server. C. It is a protocol used to exchange e-mail messages between mail servers. D. It is a protocol used to authenticate a user based on the user ID and password after the establishment of a PPP link.

B

Which of the following is a characteristic of the one-time (or big bang)

A problem during migration has a very large impact on the new

Which of the following is widely used as a computer port for transfering both image and sound signals in one connection? A. VGA port B. HDMI port C. Serial port D. DVI port

B

The figure below shows part of a so-called fishbone diagram. Which of the following is the

B is a cause of A.

# Which of the following is equivalent to the logical expression A.B+B.C.(B+C) ? Here, "• " is the logical product, and " + " is the logical sum.

B.(A+C)

Product Portfolio Management (PPM) is a method for analyzing the positioning of a product within the market and reviewing the resource allocation. As shown below,

C

Which of the following appropriately describes a domain (defined area), a term used for relational databases? A. It is the general term for data insertion, updating, deletion, and search in a database. B. It is a relationship derived by applying the relational operations to the basic relationship. C. It is a set of values that attributes can hold. D. It is a specification for copying the real world to a database.

C

Which of the following is an appropriate combination of restrictions that a project manager should consider in managing a project? A. Delivery date, budget, and risk B. Scope, budget, and risk C. Scope, delivery date, and budget D. Scope, delivery date, and risk

C

30. DNS is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The DNS is an essential component of the functionality of the Internet

Domain Name System

Which of the following is the language processor that translates and executes a source program written in high-level language, on a line-by-line basis? A. Assembler B. Compiler C. Interpreter D. Generator

C

# Which of the following functions is a part of OS task management?

CPU allocation

# Which of the following storage devices has the fastest access time?

CPU register

A

CPU utilization of a computer system can be improved by using multiprogramming. If there is one process in memory, the CPU utilization is (1-p). Here, "p" is the fraction of time (e.g., I/O time) that a process spends away from the CPU. If there are "n" processes in memory, the probability of "n" processes waiting for an I/O is p*p...*p (n times). The CPU utilization is equal to (1 - pn). When the system has enough main memory space to hold four processes and each process waits for I/O completion during 50% of the execution time, which of the following is the percentage of the CPU time wasted by waiting for I/O completion? a) 6.25 b) 12.5 c) 87.5 d) 93.75

15. The state diagram shown below is a simple Mealy machine. Which of the following transitions is NOT possible in the diagram?

Choose B

When a computerization plan is made, which of the following is an item to be considered

Clarifying the cost and investment effect of the development, maintenance, and

Which of the following is protected by "copyright" that is based on the WTO's Agreement

Compiler program

24. An expression tree is a binary tree that is used to represent a mathematical expression and generate any of the three representations (infix, prefix, and postfix notations) by using one of the three traversals (in-order, pre-order, and post-order traversals) of the binary tree. Which of the following is one of the possible expressions generated by the expression tree shown below?

(A+ B * C) / ((A + B) * C)

The class diagram below shows part of an ordering system used for mail order and teleshopping. Which of the following is the most appropriate combination of

(Aggregation)(Navigability)(Generalization)(Composition)

When the table below is used to design a relational database for managing a video-rental shop, which of the following can be a potential candidate key? Here, (X,

(CID, VID, RDate)

19. What range of decimal numbers can be represented with an 11-bit two&amp;apos;s-complement number?

-1024 to 1023

When the SQL statements shown below are executed for the "SMARK" table, which of the following is the

0014 0016 0057

74. When the relationship between the value "x" of a certain factor in manufacturing a product and the value "y" of a quality characteristic for the product is plotted in a chart,term-75 which of the following charts has the positive correlation coefficient between x and y?

1 đống chấm từ dưới trái lên góc phải trên

# When the moving average method is applied to the receipt/shipment ledger shown below, how much in dollars is the closing inventory value of August?

1,300

# The activities A to E shown below are planned in a system development project. What is the highest possible weekly cost (in dollars) of this project?

1,750

In a paged virtual storage system, when a TLB (Translation Lookaside Buffer) is used to

1.195

102. When a certain job is executed in a computer system, 35 percent of the total processing time of the job is used for CPU and the rest is spent waiting for I/O to complete. If a newer CPU whose speed is three times faster than the current one is installed, approximately how many times faster is the new system than the current system?

1.3

A chemical manufacturer has a plan to deliver 500 liters of a 24% acid solution.

100 400

In terms of the test coverage of a program module, which of the following is an appropriate explanation of the relationship between path coverage

100% path coverage implies both 100% branch coverage and statement coverage.

When the SQL statement below is executed under the given conditions, what is the maximum number of rows that are created

101,999

87. Convert the following decimal number into binary number.

1011.100(0011)

In a TCP/IP network, when an IP packet of 2000 bytes is sent to the link that has an MTU (Maximum Transmission Unit) of 200 bytes, how many fragments are generated? Here, each packet has a 20-byte IP header.

11

There is a water tank that is equipped with a faucet to fill the tank with water and two sensors

11,00

# In a certain computer system, a simple hash function called the division method is used for page-based address translation. By using this method, a pair of new logical page number "101000" and its corresponding physical page number "0010" is stored into the page table shown below. Which of the following indexes is used to place them in the table?

110

11. The table below shows records of purchase and withdrawal for a component. When the first-in first-out (FIFO) method is applied, which of the following is the unit price of the withdrawal on April 10?

110

78. The table below shows records of purchase and withdrawal for a component. When the first-in first-out method is applied, which of the following is the unit price of the withdrawal on April 10? Transaction date Transaction type Quantity Unit price (dollars) Amount (dollars) April 1 Carry-forward from the previous month 2,000 100 200,000 April 5 Purchase 3,000 130 390,000 April 10 Withdrawal 3,000 a) 100 b) 110 c) 115 d) 118

110

For the post-order traversal of a binary search tree where the left and right subtrees of the

1100

The figure below shows the state transition diagram of an automaton. Which of the following is a bit string for which the automaton stops in the accepting (or final) state

1101

21. Which of the following is the binary fraction that is equivalent to the decimal fraction 115.625?

1110011.101

When a total of 400 data records are stored in contiguous memory starting from the

1113

There is a series of project activities to be performed by two staff members, Mr. X and Mr. Y. When each of them works alone, it can be completed by Mr. X in 3 hours and

11:20 a.m.

In a certain processor, a timer interrupt is generated at a clock frequency of 60 Hz on a "per clock tick" basis. It takes 2 milliseconds (including process switching overhead)

12

When an application program has functions and characteristics shown in the table below, which of the following is the function point value of the program? Here the correction coefficient of complexity is 0.5.

12

The magnetic head of a hard disk drive is currently positioned at cylinder number 100, and the cylinder numbers 120, 90, 70, 80, 140, 110, and 60 are lined up in the I/O

120

# How many tracks are required to store a sequentially organized data file including a total of 10,000 records on the hard disk drive under the following conditions? Here, each track can contain multiple blocks, but each block cannot be stored across multiple tracks.

125

71. View the picture and choose right answer.

125

# How many magnetic tapes are required to create and manage backup copies of server files under the following conditions?

14

# When a CPU can perform a multiplication in 12 nanoseconds (ns), an addition in 1 ns, and a subtraction in 1.5 ns, which of the following is the minimum CPU time, in nanoseconds, for the calculation of "a×a-b×b"?

14.5

# The following table shows the duration for the optimistic, most likely, and pessimistic scenarios in a program development. How many hours are required to complete all the activities on a "three point estimate" basis?

15

38. What is the minimum number of communication cables that are needed to connect six network devices in a full mesh topology? Here, at least one communication cable is required to connect two network devices. a) 5 b) 6 c) 12 d) 15

15

When the binary search tree shown below is traversed in pre-order, in-order, and post-order,

15, 8, 2, 10, 18, 20 .... 2, 8, 10, 15, 18, 20

A byte-code program written in Java can be executed in two methods: one method for

155

86. Convert the following binary number into decimal number.

157.625

Each character in a text file is encoded as a double-byte character

1632

# Two processes A and B with the same priority are executed in a round-robin method with a time slice of 30 milliseconds on a single CPU, but they use respectively different I/O devices. When they are executed as a standalone process, their processing times and sequences are shown in the figure below. How long (in milliseconds) does it take to complete both processes? Here, the two processes are

170

Which of the following is the appropriate course of actions to be taken by a processor at

2 ? 1 ? 3 ? 4

https://drive.google.com/file/d/1P5FUVip6PK09ZaM5g0uatdyVNyMBdXrq/view?usp=sharing When ABC analysis is used to categorize product items in the table below, which of the following is the combination of the product numbers for the items that are categorized into the group "A"?

2 and 5

When a 200-byte message is sent at 100 Kbps by using a 10 km cable with a propagation speed of

2.05

# In order to make a multiplexing system with an availability of at least 0.999 by using devices with an availability of 0.9, how many of these devices need linking together in parallel?

3

Cache memory is usually organized at multiple levels, such as L1 for level 1 and L2 for level 2, with L1 having the smallest storage capacity but the fastest memory speed.

3.7

# Two players, X and Y play a dice game. A pair of dice is tossed. If the sum of the dice is 2, 4, or 6, X wins the game. Otherwise, Y wins. What is the probability that Y wins the game

3/4

# There are 3 white balls and 3 red balls in a box. What is the probability that the two balls taken out at random from the box are one white ball and one red ball?

3/5

# In the flowchart below, which of the following indicates the relationship between the initial values a and b that are given in m and n in the process (1) in order to carry out these processes in the order shown below? (1) ? (2) ? (3) ? (5) ? (2) ? (3) ? (4) ? (2) ? (6) Here, a and b are both positive integers.

3a = 2b

When 50% of the undefined specifications are defined each time a prototype is created, how many prototypes should be created to define over 90% of the specifications that are

4

When the selection sort algorithm is used for sorting the dataset

4

When the series of stack operations below is performed on an empty stack, which of the following is the data that is read out by the last READ operation? Here, "PUSH x" is the operation to put data x in the stack, "POP" is used PUSH 2 ? READ ? PUSH 3 ? PUSH 6 ? POP ? READ ? PUSH 4 ?READ ? PUSH 7 ? PUSH 5? POP ? POP ? READ

4

A certain computer system runs in a multi-programming environment using a non

4.0

# A register stores a numerical value representing a binary number. After a positive integer x is entered in the register, the following operation is performed: "shift the register value two bits to the left and add x." How many times as large as x is the new value of the register? Here, the shift does not cause an overflow.

5

# The FIFO method is used as the page-replacing algorithm in virtual memory. There are 3 page frames available for a program in main memory, and the page numbers referred to by a program are 4 ? 3 ? 2 ?1 ? 3 ? 5 ? 2 in this order. How many times does page-in occur during execution of the program? Here, nothing is loaded into main memory in the initial state.

5

106. The main memory can contain 5 pages.&lt;/b&gt; &lt;b&gt;If system using LRU algorithm, which page is swapped out when page 7 is accessed in following sequence of page access?

5

When the hash function "x mod 13" for a given key x is used to store five keys 367, 25, 82, 66, and 13

5 2

56. A painter has 20 houses and 4 shops to paint. In comparison with the shop, the house usually takes half the time to paint. The painter has finished painting 10 houses in 3 days. If the painter continues to work at the same pace, how many days does it take to complete the remaining work? a) 3.0 b) 3.6 c) 5.4 d) 8.4

5.4

CPU utilization of a computer system can be improved by using multiprogramming. If there is one process in memory, the CPU utilization is (1-p). Here, "p" is the completion during 50% of the execution time

6.25

# Last year, a company providing web application services needed an Internet line to service clients' demand at that time. However, in order to increase availability, the company actually made use of two Internet lines from different vendors. This year, the demand is doubled and both lines are fully busy, so the company will install one more Internet line. Each of the Internet lines has availability of 80%. What percentage of availability will be cut down after the installation?

7.8

Audio is sampled and recorded at a frequency of 11,000 times per second with a resolution

775

104. When the bubble sort algorithm is used for sorting the dataset (23, 43, 56, 12, 87, 14, 87, 15, 90, 23, 10) in descending order, how many data exchanges occur during the first pass?

8

Which of the following is the main task of a service desk? A. Responding to inquiries, such as system failures, for enhanced user convenience B. Investigating the cause of bugs to improve the quality of application software C. Investigating and analyzing system utilization to evaluate the IT service level D. Conducting interviews to collect computerization needs for future system planning

A

Which of the following is the method that uses information technology to collect and analyze customer information, so as to establish a favorable relationship with the customers, retain customer loyalty, and increase company profit from a long term perspective? A. CRM B. BSC C. PPM

A

Which of the following is the most appropriate explanation of cloud computing? A. It provides the resources of a computer via a network so that the user can easily receive services with high scalability and availability. B. It accumulates the computational capacity of several PCs so that a computational capacity of the same level as a supercomputer can be achieved. C. It connects all electric appliances to a network as intelligent products so that these devices can be monitored and operated at any time and from any place. D. It enables PCs on a network to communicate with each other based on an equal relationship, without the use of a specific server.

A

Which of the following network equipment must know the IP address? A. Router B. Bridge C. Repeater D. Hub/ switch

A

Which of the following prefix expressions is equivalent to the infix expression "(A+B)* C-(D-E)"? View the picture and choose right answer. a) - * + ABC -DE b) - + AB * C - DE c) AB + C * - DE d) AB + C * DE - - A. Choose a B. Choose b C. Choose c D. Choose d

A

https://drive.google.com/file/d/1q-moTsD5SA4PUnW9SqpU0yjETm-P2EN5/view?usp=sharing In the binary search tree shown below, which of the following is the appropriate sequence of nodes that are visited in an in order traversal? A. D => B => E => A => C => F B. A => B => C => D => E => F

A

Which of the following means product improvement, and product disposal | are planned according to each stage of introduction, growth, maturity, and decline? A. Product life cycle strategy B. Business continuity plan

A (ko chắc)

# Which of the following is the correct table that is created by the "natural join" operation of two tables T 1 and T 2 ?

A B C D /a 1 b 1 c 1 d 1 /a 2 b 1 c 1 d 1

C

A PKI involves two types of key pairs: signature key pairs, in which the private key is used for signing and the public key for checking; and exchange key pairs, in which the public key is used by an application to encrypt data, and the private key is used to decrypt the encrypted data. Which of the following is the key pair(s) that may be escrowed or backed up to prevent the loss of important data even when the corresponding key or keys are forgotten? a) Both exchange key pair and signature key pair b) Either exchange key pair or signature key pair depending on conditions c) Exchange key pair d) Signature key pair

Which of the following is an appropriate characteristic of a Web system that is

A business process is executed on the server side, and the client software displays the

A system auditor is recruited from an auditing firm and placed as

A capability to guide the development and implementation of an IT strategy in

D

A coin is tossed three times. What is the probability that it lands on heads exactly one time? a) 0.125 b) 0.25 c) 0.333 d) 0.375

17. Which of the following is an advantage of M&amp;amp;A?

A company can establish a new business in a short period of time by acquiring skills and know-how that it does not have.

When the source code based on OSS licensed under GPL is not released to the public

A company obtains, modifies, and sells OSS through the company's own operations or

# Which of the following is an appropriate description concerning registers in processors?

A complement register generates integer complements in order to perform operations in the adder circuit.

A

Which of the following is the language processing program that generates, on a certain computer, object programs that can be executed on another computer that has a different instruction set? a) Cross compiler b) Emulator c) Generator d) Optimizing compiler

D

Which of the following is the language processor that translates and executes a source program written in high-level language, on a line-by-line basis? a) Assembler b) Compiler c) Generator d) Interpreter

B

Which of the following is the major impact of a Denial of Service (DoS) attack? a) An increased volume of spam e-mails b) Degradation of service due to network traffic congestion c) Falsification of database and/or website d) Leakage of user ID and password

D

https://goo.gl/S9uRDJ

A

https://goo.gl/SqZVTn

C

https://goo.gl/UfGC9M

C

https://goo.gl/VRcCD8

B

https://goo.gl/VX5sYW

C

https://goo.gl/XTZmf4

C

https://goo.gl/aCjbfB

C

https://goo.gl/aqDGsg

A

https://goo.gl/cLdSWZ

D

https://goo.gl/csG7Yt

C

https://goo.gl/eRMuhB

C

https://goo.gl/mTC1dX

D

https://goo.gl/nbm56G

B

https://goo.gl/nfXbVt

C

https://goo.gl/nmNg1P

B

https://goo.gl/oxc6cP

C

https://goo.gl/pZn8Cn

C

https://goo.gl/pdcoAD

C

https://goo.gl/pq1VuR

B

https://goo.gl/q9d2GC

A

https://goo.gl/sDBm42

75. There are some methods of getting &lt;b&gt;backup files &lt;/b&gt;for the purpose of recovering files and managing generations. Which of the following is an appropriate description concerning those methods or procedures?

A differential backup contains all files changed after the last full backup, while an incremental backup saves all files changed after the last full, differential, or incremental backup.

Which of the following is an explanation concerning the accountability at an executive

A management executive has responsibility for explaining the content and performance

Among the situations that are checked during an audit of the methods of transmitting highly confidential information to a business partner by e-mail

A password is set for an attached file containing confidential information prior to being sent to the partner by e-mail

67. Which of the following is a security measure where it is effective to confirm the destination address with the sender when an e-mail is sent

A preventive measure against wrong transmission of e-mail

Which of the following is a characteristic of a project?

A project is both unique and temporary.

Which of the following is an appropriate function of a

A received packet is forwarded only to a LAN port corresponding

Which of the following is an appropriate explanation of the RFI that is created when a new information system is procured?

A request is made to the vendor for helpful information by showing the details of business operations and the purpose of the computerization.

Which of the following is an explanation of USB?

A serial interface to connect devices in a tree topology via hubs

Which of the following is an explanation of SCM?

A series of business operations including purchase, production

Which of the following is provided by an ASP (Application Service Provider)?

A service in which the functions of a general-purpose application system are provided to several customers via a network

When the data model conforms to the notation described below, which of the following is an appropriate description concerning the interpretation of the E-R diagram shown

A signle order is not made from multiple suppliers.

Which of the following is an appropriate explanation of data warehouse?

A subject-oriented, integrated, time-variant, and non-volatile collection of data in

# Which of the following is the appropriate description concerning the functions of "driver" or "stub" used in the module test?

"Driver" calls the module to be tested while passing arguments to it.

The fast-tracking technique is used to shorten a project schedule. The original plan is shown in Figure 1 below. When activity E is divided into activities E1, E2, and E3 as

1

27. The figure below shows a logic circuit representing a full adder. When 1, 0, and 1 are entered into x, y, and z respectively, which of the following is the appropriate combination of the output values of c (carry) and s (sum)? c s a) 0 0 b) 0 1 c) 1 0 d) 1 1

1 0

When the creation status of design documents is as described in the table below

1100

There exist the same two devices, each with an MTBF of 45 hours and an MTTR of 5 hours. What is the availability of a system that connects these TWO devices in series? A. 0.81 B. 0.95 C. 0.76 D. 0.99

A

Which of the following is an appropriate technique that is used for implementing a queue as a data structure? A. FIFO B. LRU C. LFU D. LIFO

A

Which of the following is an appropriate form of transaction where one company (i.e., the bidder) gains a decisive share of the basic equity of another target business?

Acquisition

C

According to ISO 9241-11, usability is defined as the "extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction in a specified context of use." Which of the following is an appropriate method for evaluating the "level of user satisfaction" mentioned in this definition? a) Cluster analysis method b) Heuristic evaluation method c) Interview method d) Log data analysis method

Which of the following is a management approach or technique that can

BPR

When a packet filtering firewall controls packets in accordance with a list of rules as shown

Blocked by number 1

Which of the following is an explanation of knowledge management

Business is conducted to enhance the problem-solving ability of the entire workforce by

When a department that outsources system development must undergo a system audit concerning "progress management" of the outsourcing partner, which of the following

Business reports received periodically from the outsourcing partner, and documents showing the verification result of the business reports

When the new procurement of a system is undertaken on the basis of the decision tree shown

Buy

Among the structures and characteristics of a service desk organization, which of the

By locating the service desk near the users, it is possible to provide

Which of the following is an input device classified as a pointing device and can be used for graphical input in a CAD system? A. OCR B. OMR C. Tablet D. Image scanner

C

Which of the following is an invalid data flow in the DFD

C

73. Which of the following is the most appropriate position that is primarily responsible for centralized oversight of enterprise IT strategic planning? a) CEO (Chief Executive Officer) b) CFO (Chief Financial Officer) c) CIO (Chief Information Officer) d) COO (Chief Operating Officer)

CIO (Chief Information Officer)

In IT service management, which of the following is an activity that is performed as incident management?

Checking to see if a failure report from a user matches a known error

When a computerization plan is made, which of the following is an item to be considered?

Clarifying the cost and investment effect of development, maintenance, and operations

63. Which of the following is an effective measure to protect information systems from overvoltage caused by lightning? a) Connecting communication cables to computers via SPD (Surge Protection Device) b) Digitizing the control circuits of power supply facilities c) Preparing a private power generator d) Using two communication lines that pass through different routes

Connecting communication cables to computers via SPD (Surge Protection Device)

Which of the following is an effective means of protecting an information system from the

Connecting computers and cables through a surge protection device

79. Which of the following is a law that protects coded expressions of programs rather than ideas or algorithms in programs? a) Copyright law b) Industrial design law c) Patent law d) Trademark law

Copyright law

In the network shown below, the STP (Spanning Tree Protocol) is used on both S1 and S2 switches. When the link between two PCs A and C is established via L1, which of

Always L1

A

Among the descriptions concerning three-dimensional computer graphics, which of the following is an explanation of polygon? a) It is a basic element that is used for constituting a polyhedron taking the form of a closed solid or for approximating a quadric surface or a free-form surface. b) It is a basic element, such as a pattern or design, which is pasted on the surface of a modeled object. c) It is an image obtained by converting a model recorded inside a computer to a two-dimensional form so that it can be rendered on the screen. d) It is an image that transforms smoothly from an image a including an object A to an image b including a different object B having another shape.

C

Among the layers of the OSI basic reference model, which of the following is the appropriate layer that is primarily responsible for the translation, encryption, and compression of data? a) Data link layer b) Physical layer c) Presentation layer d) Session layer

Which of the following is a characteristic of an IC tag (i.e., RFID)?

An IC tag is resistant to dirt, and the recorded information is accessible from outside

# Which of the following is the appropriate statement concerning Newton's method that is known as an algorithm for obtaining the approximate value of the solution to the formula ƒ(x) = 0?

An approximate value of the solution is obtained geometrically using the tangent lines of y = ƒ(x)

Which of the following is an appropriate description concerning social engineering?

An attacker manipulates people into providing inappropriate access

39. Which of the following is the IP network addressing and routing scheme whereby data is routed to the "nearest" or "best" destination as viewed by the routing topology? a) Anycast b) Multicast c) Singlecast d) Unicast

Anycast

Which of the following is a service delivery process that is defined, agreed, recorded, and managed in IT service management? A. Quality management B. Schedule management C. Risk management D. Service level management

D

74. Which of the following is the most appropriate set of major functions supported by an OS?

Data management, job management, and task management

Which of the following is a technique by which useful information and relationships are discovered and extracted from large amounts of customer and market data retained by a company?

Data mining

The figure below shows an example of a DFD used in structured analysis. What does the symbol " " represent in the figure?

Data store

# Which of the following leads to the von Neumann bottleneck?

Data transfer speed between CPU and main memory

# Which of the following is the appropriate sequence of DB application development activities?

Database planning -> Conceptual design -> Physical design -> Data conversion

47. Which of the following is the appropriate sequence of DB application development activities?

Database planning,Conceptual design, Physical design,Data conversion

In the development process, which of the following is an activity that should be performed

Deciding how to implement the software requirements that are already defined

Which of the following is a pricing method that is based on the cost plus method?

Deciding the price by incorporating the desired margin in addition

# Which of the following is the major impact of a Denial of Service (DoS) attack?

Degradation of service due to network traffic congestion

According to the ISO/IEC 25010 standard, the quality properties of a software product or system are categorized into eight characteristics

Degree to which a product or system provides capabilities relative to the amount of resources used under stated conditions

# In the context diagram illustrated below, which of the following combinations appropriately describes data flows DF1, DF2, and DF3?

Delivery invoice Payment bill In-stock inventory

Which of the following is a qualitative and exploratory forecasting approach that is used for obtaining the most reliable consensus of opinions from a group of experts through a series of questionnaires?

Delphi method

42. The administrator captures network packets and discovers that hundreds of ICMP packets have been sent to the host. However, it is not a particularly busy time of the day. What type of attack is likely being executed against your network?

Denial of service

When the database design is divided into three phases (i.e., conceptual design, logical design, and physical design), which of the following is a part of the physical design?

Describing base relations, file organizations, and indexes used to improve query performance

# Which of the following should be done in the internal design phase of software development processes?

Designing physical data structure

In a TCP/IP network environment, which of the following is the most appropriate

Destination IP address

36. Which of the following information in IP header is used for routing the IP packets across networks? a) Destination address and source address fields b) Destination address field c) Destination address, source address, and protocol fields d) Source address field

Destination address field

Which of the following can be achieved by receiving an e-mail text and its hash value from the sender, and then comparing this hash value with another hash value calculated

Detecting the presence or absence of falsification in the e-mail text

15. See the figure and choose the correct answer.

Develop improvement plan

34. See the figure and choose the correct answer.

Develop improvement plan

Which of the following is an appropriate explanation concerning product innovation in the

Developing a new or differentiated product that is a key to success

Which of the following is an appropriate explanation of product innovation in the management of technology?

Developing new products or products differentiated from other companies

As shown below, there are three relational database tables Table_1, Table_2, and Table_3

Difference

# Which of the following helps improve availability?

Doubling MTBF and reducing MTTR to half

37. Which of the following is a mechanism used in electronic commerce to exchange data between companies?

EDI

72. Which of the following is a mechanism used in electronic commerce to exchange data between companies? a) CA b) EDI c) SSL d) XBRL

EDI

Which of the following is the technique and concept for improving management efficiency by planning and controlling the company-wide management resources in an effective and integrated way?

ERP

In a local area network using CSMA/CD as its access method, which of the following is

Each node checks if the transmission medium is in use, and can transmit data if not in

# Which of the following is the appropriate statement concerning how to illustrate data flows (arrows) in DFD?

Each process must have at least one data flow in and one data flow out.

Which of the following is an OSS tool that is provided as the IDE (Integrated Development Environment)

Eclipse

28. In E-Commerce context, what does EDI stand for?

Electronic Data Interchange

42. Which of the following is the function of S/MIME used for e-mails? a) Compressing e-mails b) Encrypting e-mails and attaching a signature c) Notifying senders that e-mails have been delivered and opened d) Resending e-mails

Encrypting e-mails and attaching a signature

12. Which of the following is a method for preventing an SQL injection attack?

Ensuring that the input characters are not interpreted as characters that have a special meaning in a inquiry or operation to the database

Which of the following is an appropriate inspection item that should be

Ensuring that the system satisfies the requirements from the user's viewpoint

# Which of the following is described graphically using an E-R diagram?

Entities and relationships between entities

A PKI involves two types of key pairs: signature key pairs, in which the private key is used for signing and the public key for checking; and exchange key pairs, in which the

Exchange key pair

18. In the RAID3 system shown below, three disks (Disks 0 through 2) for byte-striped data and one dedicated parity disk (Disk 3) are used as one volume. Parity byte Ap is generated by calculating the "exclusive OR" ( ) of three bytes in Disks 0 through 2. For example, Ap(1-3) is calculated as follows: A p(1-3) = A1 A2 A3 In the event of a disk failure, data recovery can be accomplished by using the information recorded on the remaining three error-free disks. Which of the following operations should be executed for this data recovery? a) AND b) Exclusive NOR c) Exclusive OR d) OR

Exclusive OR

Which of the following is a typical method that is contained in agile software development?

Extreme programming

There is a circular queue implemented with a one-dimensional array ofn elements. Insertion

F = (R+1) mod n, F = R

# A processor with a 256-Mbyte address space is using the address "35E3C03" to access a 16-Mbyte memory device. What are the highest and lowest addresses in the memory map of the 16-Mbyte

FFFFFFF 0000000

58. Which of the following is the method used for estimating the scales or person-months in system development where the five basic components—external input, external output, internal logical file, external interface file, and external inquiry—are defined and classified with their complexity weights? a) COCOMO b) Function point method c) LOC method d) Standard task method

Function point method

# Which of the following design tasks is performed from the standpoint of the system developer, based on the deliverables of external design and in consideration of the implementation method and processing efficiency?

Functional decomposition and structured design

The program can be rewritten after the microcomputer is shipped.

Functional organization

SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis is a technique that is used to identify and evaluate the internal and external factors that are helpful or

HH ISW EOT

# Which of the following is used in ECC memory to detect 2-bit errors and correct 1-bit errors?

Hamming code

When the word list of a dictionary is searched for an exact matching word, which of the following is the most appropriate data structure in terms of runtime computational

Hash table

D

How many memory cells (or latches for holding 1 bit each) are implemented in SRAM with 24 address lines and 16 data lines? a) 2^16 b) 2^24 c) 24 x 16 d) 2^24 x 16

Which of the following is the project management knowledge area that includes the processes of creating a staffing management plan, acquiring project team, developing

Human resource management

40. Which of the following protocols can be used to access e-mail messages that are stored on a remote, and possibly shared, mail server, and thereby are manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages back and forth between these computers? a) FTP b) IMAP c) POP3 d) SMTP

IMAP

# There is a table including the data items shown below. Which of the following SQL statements can insert a new row in the "student" table? Name Null? Type STUD_ID NOT NULL NUMBER(3) NAME NOT NULL VARCHAR2(25) ADDRESS VARCHAR2(50) GRADUATION DATE

INSERT INTO student (stud_id, address, name, graduation) VALUES (101, '100 Happy Lane', 'Dave', '2001-06-14');

# Which of the following refers to the concept of fail-safe design?

If the system determines that the sensor which detects someone entering the work area has failed, the robot arm is stopped by force.

Which of the following is the effect that is expected by duplexing a server configuration

Improvement in availability

51. See figure and choose the right answer:

In A, a teacher is responsible for one class only. In B, a teacher may be responsible for one.

A

In IT service management, which of the following is an activity that is performed as incident management? a) Checking to see if a failure report from a user matches a known error b) Evaluating if customer satisfaction with the service desk meets the request level c) Investigating the effect of changes made to a program d) Reviewing measures when the amount of free space on a disk is near the threshold

C

In a TCP/IP network using IPv4 addresses, which of the following is an effective IP address that can be allocated to a network device? a) 172.16.5.0/40 b) 192.168.251.256/25 c) 203.164.15.9/28 d) 252.169.15.40/30

C

In a URL (Uniform Resource Locator) specified to access a Web page through the Internet, which of the following is the appropriate sequence of four basic parts: the name of the Web page, directory and/or subdirectory which holds the Web page, access protocol, and host name? a) host name, protocol, directory, page b) host name, protocol, page, directory c) protocol, host name, directory, page d) protocol, page, directory, host name

B

In a certain processor, a timer interrupt is generated at a clock frequency of 60 Hz on a "per clock tick" basis. It takes 2 milliseconds (including process switching overhead) to handle the interrupt. What is the percentage of the interrupt handling time in the processor? a) 6 b) 12 c) 24 d) 60

D

In a certain program, in order to stay in a loop, variable X must be in the range from 1 through 10 (X >= 1 AND X <= 10). In this program, which of the following is the condition of exiting the loop? Here, "AND" and "OR" are the logical product and logical sum operations respectively. In addition, comparison operators <, <=, >, and >= are less than, less than or equal to, greater than, and greater than or equal to, respectively. a) X < 1 AND X > 10 b) X >= 1 OR X <= 10 c) X <= 1 OR X >= 10 d) X < 1 OR X > 10

C

In a production process of 1,000 units of product X, "material cost" incurred is $10,000, and "direct labor cost" is $20,000. "Production overhead" is 100% of direct labor cost. "Selling and distribution cost" is $10,000. How much in dollars is the unit cost of product X? a) 10 b) 30 c) 50 d) 60

In reliability design, which of the following is an appropriate example of fail-soft?

In a system with a cluster configuration, even when a server does not work, another server takes over applications and provides functions.

23. In business management, what is CORRECT about the break-even point?

In accounting, the break-even point refers to the revenues needed to cover a company&amp;apos;s total amount of fixed and variable expenses during a specified period of time. The revenues could be stated in dollars (or other currencies), in units, hours of services provided, etc.

Which of the following is the most appropriate description concerning a backup method for

In consideration of a possible response delay in business processing, a backup schedule

C

In database recovery management, which of the following appropriately explains incremental logging with deferred update? a) Both the old and new values of the updated item are stored in the log. b) Neither the old nor new value is stored in the log. c) The new value of the updated item is stored in the log. d) The old value of the updated item is stored in the log.

Which of the following is an appropriate description concerning cache memory

In machines with the large time gap between access to main memory and instruction

Which of the following is an explanation of BCP (Business Continuity Plan)?

In order to avoid risks of business interruptions or recover promptly from damages, a policy or an activity procedure is prepared in advance.

B

In some circumstances, a program may be still running when it is called again by another program. Which of the following is the appropriate characteristic that should be implemented to execute this program correctly? a) Recursive b) Reentrant c) Relocatable d) Reusable

In the term "ACID", which is the basic foundation that database transactions are built upon, what does the third character "I" stand for?

Isolation

# Which of the following is an appropriate description concerning the characteristics of USB?

It has three data transfer modes: high-speed mode for external hard disks, full-speed mode for printers and scanners, and low-speed mode for keyboards and mice.

Which of the following is an explanation of an affinity diagram?

It is a method by which the collected information is grouped according to the mutual

# Which of the following appropriately describes "memory interleaving" that is one of the high-speed computer technologies?

It is a method for dividing the memory into multiple independently-operating groups and accessing each group in parallel.

20. Which of the following is the appropriate explanation of throughput? a) It is the elapsed time after a job is submitted to the system until the final result is returned. It is affected by the I/O speed, overhead time, etc. b) It is the maximum number of concurrently executable jobs. It depends on the resources of the system that can be used. c) It is the number of jobs processed per unit time. Spooling helps to improve throughput. d) It is the operating rate of a job, which can be calculated by the expression "running time of the job operations time".

It is the number of jobs processed per unit time. Spooling helps to improve throughput.

Which of the following is an explanation of clipping in 3D graphics processing?

It is the process of defining a window within an image display area and removing

6. Which of the following is an explanation of ERP?

It is the technique and concept for improvement in management efficiency by planning and controlling the company-wide management resources in an effective and integrated way.

# Which of the following appropriately explains a tracer as one of the dynamic debugging tools?

It outputs the contents of the memory and registers in order to monitor the results of the program execution in chronological order.

Which of the following is the most appropriate explanation of a dual system

It provides a duplicate system for performing the same processing, and performs a cross

Which of the following is an explanation of social media?

It provides a mechanism that promotes the connection

Which of the following is the most appropriate explanation of cloud computing?

It provides the resources of a computer via a network so that the user can easily receive services with high scalability and availability.

Which of the following is an appropriate characteristic of an RFID tag that is a type of IC tag and is used for locating and tracking merchandise, inventory, or other assets?

It reads information without physical contact by using electromagnetic waves.

Which of the following is an explanation of core competence

It refers to a bundle of a company's unique skills and technologies that are the source of

# Which of the following is the appropriate program that supports dynamic processing in a Web environment and runs only on a Web server?

Java servlet

Which of the following is the specification for dividing frequently-used functions of a Java program into reusable components that can be deployed in a network on any major

JavaBeans

# Which of the following is an appropriate language that can be used to develop applications running mainly on Web browsers?

JavaScript

In computer networking, which of the following is the most appropriate technical term that means the variation in packet delay that causes the degradation of the QoS

Jitter

C

Last year, a company providing web application services needed an Internet line to service clients' demand at that time. However, in order to increase availability, the company actually made use of two Internet lines from different vendors. This year, the demand is doubled and both lines are fully busy, so the company will install one more Internet line. Each of the Internet lines has availability of 80%. What percentage of availability will be cut down after the installation? a) 0.8 b) 4.8 c) 7.8 d) 12.8

38. In network context, HDLC protocol is belong to which layer in OSI model?

Layer 2 - Datalink

Which of the following is an appropriate description concerning MTBF and MTTR?

MTBF increases through the preventive maintenance of a system.

Which of the following is an appropriate explanation of memory interleaving?

Main memory is divided into multiple banks, and each bank is concurrently accessed in

82. Among RASIS, which of the following is an explanation of availability?

Maintaining a computer system so that it is ready for use at any time

It is a service where the user can use the functions of application

Maintenance cost of information equipment such as servers

When a single-license software package is purchased in a company, which of the following is an activity that is usually

Making a backup copy of software for the limited purposes, such as the licensee's

13. When a single-license software package is purchased in a company, which of the following is an activity that is usually permitted in conformity with the concept of the WTO's Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)?

Making a backup copy of software for the limited purposes, such as the licensee's personal use or a temporary copy for maintenance

When a publisher's lead editor omits a section of an author's manuscript without obtaining the consent of the author, which of the following is infringed according to the international treaty called the Berne Convention for the Protection of Literary and Artistic Works?

Moral rights

# Which of the following is the key technology that enables to connect a computer using a private IP address to the Internet?

NAT

58. Pha´t biê?u na`o sau dây mô ta? du´ng vê` ti`nh tra?ng khoa´ chê´t (deadlock) trong hê? qua?n tri? CSDL?

No´ co´ nghi~a ra`ng hai giao di?ch cu`ng yêu câ`u mô?t ta`i nguyên, khóa lâ~n nhau, duo?c da?t va`o tra?ng tha´i cho`, dê? treo viê?c thu?c hiê?n tu`ng giao di?ch.

57. Pha´t biê?u na`o sau dây la` du´ng la` du´ng vê` phuong pha´p sao luu du~ liê?u?

Nê´u qui tri`nh nghiê?p vu? va` qui tri`nh sao luu duo?c thu?c hiê?n dô`ng tho`i, viê?c sao luu co´ thê? không duo?c thu?c hiê?n du´ng. Do vâ?y, sao luu pha?i duo?c lâ?p li?ch biê?u dê? không chô`ng che´o vo´i ca´c qui tri`nh nghiê?p vu?.

Which of the following is the average time complexity of a randomized quick sort algorithm where the pivot is selected randomly

O(n log2 n)

95. Which of the following contents is/ are characteristics of real-time control?

Once a processing request is made and the result is immediately reported to the requester. It is also applied in online transaction processing systems.

# Which of the following is the appropriate combination of processing modes in banking activities?

Online Batch Online Batch

22. In CMMI, what is the correct name of the highest level?

Optimizing

# Which of the following is the appropriate explanation of spooling?

Output data to a low speed device such as a printer is temporarily stored on a high speed hard disk and later sent as output to that target device.

Which of the following is the virtual storage technique that can resolve external

Paging

Which of the following is a chart or a diagram that is often used in quality control to rank issues or problems in descending order of frequency?

Pareto chart

Which of the following is an explanation of "contact management" that is a basic function of SFA (Sales Force Automation)?

Performing effective sales activities for existing and prospective customers by managing a set of records including customer visiting days and sales results

44. Which of the following refers to online scams where thieves attempt to entice e-mail recipients into clicking on a link that takes them to a bogus website, and the website may prompt the recipient to provide personal information such as social security number, bank account number, and credit card number, and/or it may download malicious software onto the recipient's computer? a) Cross site scripting b) DoS attack c) Phishing d) Trojan horse

Phishing

Which of the following is the security attack that is shown in the procedure below

Phishing

Which of the following is a computer architecture where each instruction is divided into multiple stages

Pipeline

# A store intends to use public key cryptography so that it may receive orders from customers through a network without exposing the contents of the orders to third parties. Which of the following is the appropriate combination of keys used by both the store and customer?

Private key Public key

24. Which of the following has the objective that aims to minimize disruption to the business by proactive identification and analysis of the cause of incidents and by managing problems to closure?

Problem management

According to the ISO/IEC 20000 series, which of the following has the objective that aims to minimize disruption to the business by proactive identification and analysis of

Problem management

A shop sells approximately 200 types of products. Among the input items for a new product

Product category

# Which of the following appropriately describes financial statements?

Profit and loss statement is also known as the income statement. This presents how revenues are converted to net income by reporting both revenues and expenses of the company for a given period of time.

Which of the following is the relational operation that corresponds to the manipulation of

Projection

Which of the following is an essential activity for achieving a fault tolerant system?

Providing redundancy for a system configuration to minimize the effect of a component failure so that the processing can be continued without any effect on the overall system

Which of the following is the server that can be used to intercept all messages entering and leaving the network and to effectively hide the true network addresses?

Proxy server

100. From a point of view of better performance, improved fault tolerance, and enhanced data integrity, which of the following RAID configurations is commonly suitable for enterprise systems?

RAID 5

Which of the following is the appropriate protocol that is used on top of UDP

RTP

Which of the following is an improvement index in supply chain management?

Ratio of reduction in dead stock

In a preemptive multitasking OS environment, when a process is preempted by another process with a higher priority, which of the following is the appropriate state where the

Ready

# In some circumstances, a program may be still running when it is called again by another program. Which of the following is the appropriate characteristic that should be implemented to execute this program correctly?

Reentrant

Which of the following is the addressing mode where the register specified is used to point

Register indirect addressing mode

From internal and external viewpoints concerning software product development and maintenance, which of the following is an appropriate quality characteristic that

Reliability

When the quality of a software product is evaluated using the ISO/IEC

Reliability

5. Which of the following is an appropriate responsibility of a system auditor for problems found during an audit?

Reporting the problems found to the audit requester

64. Which of the following is an appropriate responsibility of a system auditor for problems found during an audit? a) Correcting on his or her own the problems found b) Instructing the audited department to correct the problems found c) Reporting the problems found to the audit requester d) Reporting the problems found to the user departments of the system

Reporting the problems found to the audit requester

73. In an online transaction system environment, which of the following represents the interval of time from the time the system completes receipt of an input to the time the system begins to return its resulting output?

Response

21. In an online transaction system environment, which of the following represents the interval of time from the time the system completes receipt of an input to the time the system begins to return its resulting output? a) Access time b) Latency time c) Response time d) Turnaround time

Response time

Which of the following is the procurement process that enables suppliers

Reverse auction

# Which of the following is the method which analyzes the source or object code to retrieve information concerning program specifications and design?

Reverse engineering

# The figure below shows the state transition diagram of a certain process. Which of the following is the appropriate combination of States A, B, and C?

Running Ready Waiting

Which of the following is a method that is used for encrypting e-mail

S/MIME

# Which of the following is the standardized document description language that prescribes methods, as an international standard, for describing the logical structures and attributes of documents using tags and facilitates the management and exchange of electronic documents?

SGML

Which of the following corresponds to an example of "non-functional" requirements

Selecting development standards based on the language used in system development

# Which of the following data structures uses the LIFO (Last In First Out) method in order to manage data?

Stack

12. Which of the following data structures uses the LIFO (Last In First Out) method in order to manage data?

Stack

As shown below, when the SQL statement is executed on the relational database table "Staff", which of the following tables is created?

StaffID BranchID S03 B03 S04 B03 S05 B03 S07 B08

37. Which of the following network topologies is commonly used, especially in Fast or Gigabit Ethernet, for connecting network devices via a centralized unit such as a hub or a switch? a) Bus b) Mesh c) Ring d) Star

Star

Which of the following is the protocol that is expanded and standardized based on SSL (Secure Sockets Layer) v3 but cannot interoperate with SSL?

TLS (Transport layer security protocol)

26. The person working on task C tells the project manager he can&amp;apos;t start work until one day after the scheduled starting date. What impact would this have on the completion date of the project?

Task C finishing one day late would have no impact on the completion date of the project because it has one day of slack it could use

C

The FIFO method is used as the page-replacing algorithm in virtual memory. There are 3 page frames available for a program in main memory, and the page numbers referred to by a program are 4 → 3 → 2 →1 → 3 → 5 → 2 in this order. How many times does page-in occur during execution of the program? Here, nothing is loaded into main memory in the initial state. a) 2 b) 3 c) 5 d) 6

Which of the following is the most appropriate method of determining whether to enable

The MAC address of the PC is checked, and communication is permitted only when

Which of the following is an appropriate description concerning the implementation structure of a system audit?

The auditor reports the results of the audit to the requester so that the requester can give instructions for improvement based on the audit report.

Which of the following is an appropriate description concerning an interview or a hearing that is conducted during a system audit?

The auditor should make an effort to get documents and records that confirm the information obtained from the department under audit during the interview.

81. Which of the following is an appropriate characteristic of RAID

The availability of data is increased by simultaneously writing the same data into two or more hard disks.

# Which of the following is the appropriate way to check whether or not an 8-bit unsigned binary number x is a multiple of 16?

The bit-by-bit logical product between x and the binary number 00001111 is 0.

# Which of the following is an appropriate description concerning the spiral model?

The design and implementation of an application is performed for a unit of component, and then this process is repeated successively for every component.

From a viewpoint of corporate management, which of the following is an explanation

The management cycle of analysis, design, execution, and improvement is incorporated

# Which of the following is an appropriate description concerning countermeasures to online system failures?

The master file should be backed up not only at the completion of online service but at times corresponding to the characteristics of the system.

# Which of the following is the appropriate statement concerning how to use management science methodology?

The time-series analysis method is used to forecast product sales in the market.

48. Which of the following contents are CORRECT features of self-join?

The using of table aliases is not necessary.

The figure below shows each break-even point of Company A and Company B. Which of the following is an appropriate description concerning the benefit-risk

The variable cost ratio of Company A....Company B.

94. Which of the following is an appropriate reason for using a real-time OS in an embedded system?

There is a mechanism available to respond within the limited time.

# Which of the following is the appropriate statement according to the Pareto analysis (also known as the 80-20 rule)?

This is the idea that 80% of tasks can be completed in 20% of the disposable time. The remaining 20% of tasks will take up 80% of the time.

When a company's own product is analyzed by using a SWOT

Threats of new competitors

As a security measure on the Internet, a type of challenge-response test called a CAPTCHA can be used to determine whether the client is a human or a computer

To protect against automated spamming

For the purpose of monitoring the execution process of a program in order of time, which of the following is used as a dynamic debugging tool that records the contents of

Tracer

# Based on the concept of object orientation, which of the following can be commonly regarded as a subclass of the class "automobile"?

Truck

D

Which of the following is a method that is used to check if an image or other digital content has been illegally copied and resold? a) Digital certificate b) Digital preservation c) Digital signature d) Digital watermark

D

Which of the following is an appropriate description concerning countermeasures to online system failures? a) Backup files for journal files and master files should be stored at the same location as the original files so that they can be used quickly for system recovery. b) If a transaction could not be completed properly, roll-forward should be performed to return to the state immediately before the transaction began. c) Most up-to-date data immediately before the system failure occurred should be recovered using the master file as well as the transaction files prepared on a regular basis to update the master file. d) The master file should be backed up not only at the completion of online service but at times corresponding to the characteristics of the system.

A

Which of the following is an appropriate explanation concerning a milestone in project management? a) A milestone is a major event in a project schedule that is easily identifiable by such things as the completion of a significant deliverable and the occurrence of an event. b) A milestone is conducted at the mid-term or end of a project by an outside facilitator in order to provide the project stakeholders with the opportunity to be candid. c) The goal of a milestone is to identify and mitigate problems with large projects as early in the project as possible to minimize their impact. d) The purpose of a milestone is to visually and structurally provide the relationships among all the project deliverables and their various components.

D

Which of the following is an appropriate explanation of POP3 that is used in an e-mail system? a) It is a protocol used by the user to send an e-mail. b) It is a protocol used to authenticate a user based on the user ID and password after the establishment of a PPP link. c) It is a protocol used to exchange e-mail messages between mail servers. d) It is a protocol used to retrieve e-mails from the mailbox of a mail server.

C

Which of the following is an appropriate explanation of the RFI that is created when a new information system is procured? a) A request is made from the ordering party to the supplier in order to change the details agreed upon in the contract. b) A request is made to conclude the contract after the roles of the ordering party and the supplier are confirmed. c) A request is made to the vendor for helpful information by showing the details of business operations and the purpose of the computerization. d) A request is made to the vendor for the submission of a proposal by showing the system to be procured and the procurement conditions.

Which of the following is the most appropriate characteristic of XML?

XML can define any tag in order to make it easy to exchange data between

D

https://goo.gl/XV1hQU

C

https://goo.gl/ZtfrJH

48. Which of the following is an appropriate description concerning object-oriented design? a) "Aggregation" is the feature that allows values of different data types to be handled using a uniform interface. b) "Encapsulation" is the technique to integrate data and operational procedures as an object and hide implementation details from the outside. c) "Inheritance" is the property of an object where data or methods in the subclass can be used in the super class. d) "Method" sent to an object is the only means of performing its specific functions.

"Encapsulation" is the technique to integrate data and operational procedures as an object and hide implementation details from the outside.

# Which of the following is an appropriate explanation concerning functions of keywords in SQL?

"HAVING" specifies a search condition for an aggregate or a group.

In order to find all rows from the "Books" table that include "UNIX" in the title

%UNIX%

16. View the picture and choose right answer.

(NOT x) AND (NOT y)

96. The figure below shows daily changes in the weather for a given district, and each value represents the probability of changes in the following day's weather. When the weather is rainy on a given day, what is the probability that the weather is clear two days later? See figure

0.33

What is the function point value of a program that has the functions and characteristics shown in the table below? Here, the correction coefficient of complexity is 0.75.

18

When CPU processing and printing are performed for four jobs under the conditions below, how many minutes does it take to complete them from the start of the first CPU

180

3. A repairer has 60 cars and 30 bikes need to repair. In comparison with the car, the bike usually takes half the time to fix error. The repairer has finished repairing 20 bikes in 3 days. If the repairer continues to work at the same pace, how many days does it take to complete the remaining work?

19.5

# There are seven activities, a through g shown in the table below. At least how many days does it take to complete these seven activities? Here, activities a and b can be performed concurrently, but the others cannot be done until their preceding activities are completed. For example, c cannot begin until a is completed. The optimistic time estimate is x in days, the most likely or normal time estimate is y, and the pessimistic time estimate is z. The expected time Te is computed using the formula (x + 4y + z)/6. Unit: day

19.51

As shown in the table below, when a computer executes three types of instructions A, B

40

15. There is a hard disk drive that has the specifications shown in the table below. When a record of 10,000 bytes is read out from this disk, approximately how long (in milliseconds) does it take to access the disk and to complete the data transfer? Here, the data is stored contiguously from the beginning of one track, and the entire data on the track can be read and transferred per revolution. Capacity per track 12,000 bytes Rotation speed 3,000 rpm Average seek time 15 milliseconds a) 17 b) 27 c) 32 d) 42

42

76. When the relationship between the list price and expected demand of a product can be expressed by a linear expression, which of the following is the appropriate value to be inserted in the blank A? (1) When the list price is set to 30 dollars, the quantity demanded is 0. (2) When the list price is set to 10 dollars, the quantity demanded is 60,000. (3) When the list price is set to 15 dollars, the quantity demanded is A . a) 30,000 b) 35,000 c) 40,000 d) 45,000

45,000

The workload required to develop a system is estimated at 80 person-months if it is carried out by one person. When four staff members with the same productivity work

528

When an optical fiber cable is used for data communication, which of the following is the approximate bandwidth (in units of THz) of the light within the range of

57

# The following function f (n, k) exists: What is the value of f (4, 2)?

6

# When two input signals A and B are given in the logic circuit shown below, which of the following tables describes the correct combination of output signals W, X, Y, and Z? Here, is used for an AND gate, and for a NOT gate.

?ng cu?i 1 1 0 0 0 1

# Which of the following is the system configuration with the highest availability? Here, each unit shown by a box has the same availability (less than 1), and multiple units connected in parallel are considered operating if at least one unit is operating.

A

A government website accepts passport applications using HTTP forms to collect information. Users provide complete personal information in the forms to help expedite processing of face-to-face transactions, and payments are done offline. The information collected enters a secure server for processing and document releasing. In this system environment, which of the following is the most likely security attack? A. Sniffing traffic for identity theft B. Spoofing attack C. Password-guessing attack D. Spamming to attain denial of service

A

As shown in the tables below, the 5-year investment effects of IT investment plans

A

In the OSI basic reference model, which of the following is the appropriate

Application layer

54. Which of the following is an appropriate description concerning the maturity level in the staged representation of CMMI? a) At the "defined" level, processes are statistically measured and controlled. b) At the "initial" level, processes are characterized for projects and are often reactive. c) At the "managed" level, processes are documented and followed. d) At the "quantitatively managed" level, processes are continually improved.

At the "managed" level, processes are documented and followed.

10. When security attacks to a computer system are classified into three categories (i.e., reconnaissance attack, access attack, and DoS attack), which of the following is classified as a reconnaissance attack?

Attempting to discover and map out systems, services, or vulnerabilities

Which of the following is the appropriate sequence of steps used for normalizing a relational

C B A

All the computers infected by a virus send a large number

Authenticity and integrity

A publishing company produces textbooks for high school. Each book is written by an author who specializes in a subject. An editor is assigned to work with an author combination of relations that are applied to complete the E-R diagram? Here, 1 * indicates a one-to-many relation, * * is a many-to-many relation.

Auther1-1Book & Auther*-*Editor

According to the ISO/IEC 20000 series, which of the following has the objective that aims to minimize disruption to the business by proactive identification and analysis of the cause of incidents and by managing problems to closure? A. Incident management B. Problem management C. Change management D. Business relation management

B

For the purpose of monitoring the execution process of a program in order of time, which of the following is used as a dynamic debugging tool that records the contents of the memory and registers as well as the execution sequence of program instructions? A. Code auditor B. Tracer C. Inspector D. Assertion checker

B

B

How many multiplications at a minimum must be performed in order to calculate the polynomial expression "x4-2x3+5x2+x-6"? a) 2 b) 3 c) 5 d) 6

B

In what radix does the following equation hold? 131 − 45 = 53 a) 6 b) 7 c) 8 d) 9

Which of the following is an appropriate description concerning a use case diagram in UML?

It is used to show what system functions are performed for which actor, from the user's perspective.

59. Cho m?t co s? d? li?u v?i các b?ng sau. Câu l?nh SQL nào sau dây có th? du?c dùng d? bi?t sinh viên nào trong l?p 'Class 10A' có di?m v? ch? d? 'Mathematics' l?n h?n hay b?ng 8?

SELECT name_student FROM mark, student, subject, class WHERE mark.id_student = student.id_studentAND mark.id_subject = subject.id_subjectAND class.id_class = student.id_classAND name_class = 'Class 10A'AND name_subject = 'Mathematics'AND mark

# Which of the following is the salami technique used in computer crime?

Stealing from multiple assets little by little, to a degree that the illegal action does not come to the surface and become noticeable

72. In system performance context, what does TAT stand for?

Turn-Around Time

# Which of the following is a characteristic of the QR code?

Using three symbols for detection, the code makes it possible to recognize the rotation angle and the direction of reading.

C

Which of the following equations holds well in the postfix notation (or Reverse Polish Notation)? Here, x, y, and z are variables. a) xy+z- = xyz+- b) xy-z+ = xyz-+ c) xy-z+ = xyz-- d) xy-z- = xyz--

B

Which of the following is an appropriate purpose of installing a firewall in a computer network? a) To authenticate internal users b) To block and permit data traffic c) To protect a computer from computer viruses d) To verify company policies

C

Which of the following is equivalent to the logical expression ) A•B+B•C•(B+C) ? Here, "•" is the logical product, and "+" is the logical sum. a) A•B+A•C b) B•(A+C) c) A•C+B d) B+A•C

D

Which of the following is the reason why a large number of computers use "complement representation" to simplify arithmetic circuits? a) Addition can be processed by subtraction. b) Division can be processed by a combination of subtractions. c) Multiplication can be processed by a combination of additions. d) Subtraction can be processed by addition.

A

Which of the following provides a baseline of security requirements for the operations of CA (Certification Authority) and RA (Registration Authority)? a) Certificate policy b) Certificate practice statement c) Statement of applicability d) System security policy

B

Which of the following provides the function of mapping between domain names and IP addresses in a TCP/IP network? a) DHCP b) DNS c) SNMP d) Proxy

x AND (y OR z) OR y AND (x OR z) OR x AND y AND z

x AND y OR x AND z OR y AND z

What kind of memory requires refresh circuitry to prevent losing data. A. SRAM B. DRAM C. ROM

B

When the average instruction execution time of a computer is 20 nanoseconds, what is the performance of this computer in MIPS? A. 10 B. 50 C. 5 D. 20

B

Which of the following is a cash card that can be used for withdrawing the transaction amount directly from the card-holder's bank account and making settlement on a real-time basis? A. Smart card B. Debit card C. Prepaid card D. Point card

B

# Which of the following is the language processing program that generates, on a certain computer, object programs that can be executed on another computer that has a different instruction set?

Cross compiler

https://drive.google.com/file/d/1X9O03JhGS0BWH6hScZhdR5C7s-Mv7OBO/view?usp=sharing The figure shows the basic configuration of a computer. Which of the following is the correct combination of A, B, and C to be inserted in the figure? A. Choose d B. Choose b C. Choose a D. Choose c

D (Controlunit - Memory - ALU)

In the binary search tree shown below, which of the following is the appropriate sequence of nodes that are visited in an in-order traversal?

D ? B ? E ? A ? C ? F

Which of the following is a network segment that is isolated from

DMZ

Among the architectures included in the "four domains" of the enterprise architecture, which of the following is the architecture other than business architecture

Data architecture

The "four domains" of enterprise architecture include business architecture, technology architecture, application architecture, and one other. Which of the following is the

Data architecture

Which of the following is an appropriate explanation concerning the data structure in a relational database

Data is represented with one or more two-dimensional tables

# Which of the following is the appropriate set of major functions supported by an OS?

Data management, job management, and task management

22. Which of the following is the most appropriate set of major functions supported by an OS? a) Compiler management, I/O management, and network management b) Data management, job management, and task management c) Development tool management, job management, and memory management d) I/O management, multimedia management, and security management

Data management, job management, and task management

Which of the following is an appropriate description concerning the black box test?

Even if the program to be tested contains redundant code, such kind

The figure shown below represents a logic gate and its timing chart. Which of the following is an appropriate logical function of this gate? Here, both A and B are the

Exclusive-NOR

Which of the following is widely used as storage media for image data in digital cameras

Flash memory

Which of the following is a sequential circuit that is capable of exhibiting either of two

Flip-flop

There are cases where the unused storage space is divided into lots of small and isolated

Fragmentation

Which of the following is the unit of transmission that is handled in the data link layer of

Frame

Which of the following is an explanation concerning the morphing technique in computer animation

In order to represent the smooth transformation in appearance from an image to another

A serial interface to connect devices in a tree topology via hubs

It consists of many tiny cells between two glass panels containing a mixture of noble

# Which of the following is the appropriate statement concerning client/server architecture?

It divides a series of processes into two groups by means of an inter-process communication mechanism; one group includes processes that request services, and the other consists of processes that execute the requested services.

In an SQL statement, which of the following is an appropriate explanation of the percent symbol

It is a wildcard character that matches

69. Which of the following is an explanation of SOA? a) It is an architectural style or method to implement software functions corresponding to each activity in business operations as services, and to build the entire system by combining these services. b) It is an architectural style or method to provide IT services that satisfy customer requirements in accordance with a service level agreement, and to build a process required to continuously improve their quality. c) It is an architectural style or method to realize data communication between heterogeneous systems by dividing communication services into seven layers and defining standard protocols and specifications of communication services for each layer. d) It is an architectural style or method to store software on servers in the network to provide only services required by users via a network.

It is an architectural style or method to implement software functions corresponding to each activity in business operations as services, and to build the entire system by combining these services.

# Which of the following appropriately explains benchmarking used in business management?

It is to make comparisons with the strongest competitors or advanced companies in order to scope out best practices for setting business goals, and to gain an understanding of products, services, and practical methods qualitatively and quantitatively.

Which of the following is the most appropriate purpose of using DTD (Document Type Definition) with XML?

It is used to check if a well-formed XML document is valid.

Which of the following is an explanation concerning a Pareto chart

It is used to identify problems by sorting the classified items in descending order of

In UML, the state machine diagram (previously called statechart diagram) is used for describing the state machine model of a target system. Which of the following is an

It shows how the system responds to internal and external events.

R1: 1, 2, 3, 2, 4, 2, 5, 2, 3, 4 R2: 1, 2, 3, 4, 2, 5, 3, 1, 2, 5

LRU & FIFO

# Which of the following appropriately describes a method of recording data on CD-R?

Laser beams are radiated onto an organic dye layer in a disk. As a result, a series of burned spots called pits are created on that layer, thereby recording the data.

# There are goods whose unit purchase prices are gradually rising. There was an inventory of these goods at the end of the last accounting period, and the goods were carried into and out of the warehouse several times during the current period. Which of the following valuation methods produces the lowest valuation of the inventory at the end of the current period?

Last-in first-out method

# Which of the following is the appropriate description of a lock that is the exclusive control of a database?

Locks come in two types: shared locks, used while reading, and exclusive locks, used during a change.

Which of the following is the appropriate term applicable to the description below?

Long tail

# Port scanning is the process of sending packets to check every port on each target system to see which ports are open and which ports are locked. Which of the following information can be identified by port scanning?

Network and application services currently available

Which of the following is an appropriate explanation concerning a memory leak

Part of main memory occupied during application execution is not released because of a bug

When software components written in a low-level programming language are used to perform time-critical arithmetic operations on a very large amount of data, which of the following is expected to be improved among the eight software product quality characteristics defined in the ISO/IEC 25000 series of standards?

Performance efficiency

Which of the following is the most appropriate indicator that is directly helpful in managing software quality in a system development project?

Period of time required to adequately review each deliverable

Which of the following is the most appropriate term that refers

Privacy policy

Which of the following is the network device that enables LANs to be interconnected at the

Repeater

59. Which of the following is the risk response which accepts the cost of damages because risk impact is assumed to be small when the risk becomes exposed? a) Risk avoidance b) Risk reduction c) Risk retention d) Risk transfer

Risk retention

# In a database system employing incremental log with immediate updates, information in the log is used in restoring the state of the system to a previous consistent state when a crash occurs. < T 2 , C, 3000, 3500> and before < T 2 , commit>?

Roll forward T 1 and roll back T 2

54. Thao tác nào được dùng để phục hồi cơ sở dữ liệu bằng các tệp dự phòng và nhật ký khi phương tiện lưu trữ cơ sở dữ liệu bị hỏng (hỏng tập dữ liệu chính - master data file)?

Roll-forward.

49. Given the following RESULT table. Which of the following SQL statement is CORRECT to find out customers that are located in the same region?

SELECT DISTINCT c1.ContactName, c1.Address, c1.City, c1.Region FROM Customers AS c1, Customers AS c2 WHERE c1.Region = c2.Region AND c1.ContactName &amp;lt;&amp;gt; c2.ContactName ORDER BY c1.Region, c1.ContactName

# Which of the following is the appropriate SQL statement that is used to create Table A from Persons Table?

SELECT name FROM Persons WHERE country LIKE ' %Korea% ' AND gender = ' F ' OR age = 26

# There is a student score table shown below with basic and advanced subject codes which begin with letters B and A respectively. Which of the following SQL statements can be used to retrieve students, from the score table, whose basic subject score is 70 or more and examination date is 2007-05-04?

SELECT student_number FROM score_table WHERE score >=70 AND examination_date = '2007-05-04' AND subject_code LIKE 'B%'

67. Which of the following is the service provided by ASPs? a) Services in which external providers collectively undertake business operations, such as general affairs, personnel affairs, accounting, and payroll accounting, which are performed internally at customer organizations b) Services in which providers lend some of their servers to customers so that these customers can use the servers as their own servers c) Services to provide a variety of functions of a general-purpose application system to multiple customers over a network d) Services to provide facilities equipped with high-speed lines and earthquake-resistant features owned by providers in order to install customer servers or communication equipment

Services to provide a variety of functions of a general-purpose application system to multiple customers over a network

# In the OSI basic reference model, which of the following layers provides a set of rules for establishing and terminating the connection between applications on computer systems?

Session layer

7. In business management, which of the following is an appropriate policy for creating an SLA?

Setting a service level under the cost and needs of a service provider and its customers

Which of the following is an appropriate policy for creating an SLA?

Setting a service level under the cost and needs of a service provider and its customers

IT investment evaluation is performed as prior evaluation, interim evaluation, or post

Setting the performance objectives based on the purpose of investment, and providing the top

# When a list of 7 elements shown below is rearranged in ascending order, which of the following sorting algorithms is completed with the minimum number of element exchanges? 3 5 12 9 10 7 15

Shell

29. Which of the following is a user interface that enables frequently-used operations to be performed efficiently? a) Online help b) Progress bar c) Shortcut key d) Undo function

Shortcut key

Which of the following is an example of the strategic target and key performance

Since the target is to establish a close and continuing relationship

Which of the following is the most appropriate term that corresponds to the method of

Sniffing

53. Which of the following is the software development process model that incorporates the best features of both the classic lifecycle and the prototyping approaches, by beginning each repeated development cycle with extensive risk analysis throughout the entire software development life cycle for large-scale applications? a) Evolution model b) Growth model c) Spiral model d) Waterfall model

Spiral model

# Which of the following is an appropriate description concerning throughput?

Spooling in which the output to the printer is temporarily stored on a hard disk drive is helpful for increasing the throughput.

Which of the following is a diagram that is used for modeling the event-driven or discrete behavior of an object in UML 2.x (i.e., UML 2.0 or later)?

State machine diagram

62. There are two statements: Statement A: Router is network device works on Layer 3 of OSI model. Statement B: TCP/IP version 6 using 64 bits to addressing.

Statement A is TRUE, and Statement B is FALSE.

34. As shown in the table below, there are five transactions T1 through T5 that are performed simultaneously in parallel, in any order. Which of the following is the combination of transactions that has the possibility of a deadlock? Here, only one transaction can have an exclusive lock at a time. Shared locks can be used with multiple transactions. T1 T2 T3 T4 T5 X(A) R(A) W(A) Commit X(A) R(A) W(A) X(B) R(B) W(B) Commit X(B) R(B) W(B) S(C) R(C) W(C) Commit S(B) S(A) R(A) R(B) Commit X(C) X(A) R(A) R(C) W(C) W(A) Commit The notation used in the above table is shown below. Symbol Operation X(#) S(#) R(#) W(#) Commit # Exclusive lock Shared lock Read Write End transaction Resource name a) T1, T2, and T4 b) T1, T2, and T5 c) T2, T3, and T4 d) T2, T3, and T5

T2, T3, and T5

In a white box test, which of the following is used to evaluate the proportion of lines of code

Test coverage analysis

Which of the following is an appropriate description concerning test data for a white box

Test data is created on the basis of internal structures.

When a version control system for source code is installed, which of the

The access control of the version control system must be set appropriately.

Which of the following is an appropriate description of a directory traversal attack

The attacker specifies files on the server by using a path that is unexpected by an

62. When a company is notified of the necessity of upgrading the version for the server OS on which a database system and business application are running, which of the following is an appropriate decision on whether or not to upgrade the OS? a) The business application has been used for a long time, but the database system is relatively new. Therefore, the company upgrades the OS after checking the compatibility of the OS and the database. b) The company checks if the database system runs without problem in the new OS environment, and then checks the operation of the business application. If there is no problem, the company upgrades the OS. c) The database system uses the database management functions provided by the OS vendor, so there should be no problem. Therefore, the company upgrades the OS if there is no problem found by investigating the compatibility between the business application and the OS. d) The support services for the OS being in use are terminated soon after the new OS is released, so the company immediately upgrades the OS.

The company checks if the database system runs without problem in the new OS environment, and then checks the operation of the business application. If there is no problem, the company upgrades the OS.

57. Which of the following is the appropriate element that is used to calculate slack time in the PERT (Program Evaluation and Review Technique)? a) The earliest of the earliest start times of the successor activities b) The earliest of the latest start times of the successor activities c) The latest of the earliest start times of the successor activities d) The latest of the latest start times of the successor activities

The earliest of the latest start times of the successor activities

Which of the following is the appropriate description of the "selection sort" algorithm?

The element with the largest...same way.

Which of the following is an explanation concerning EDI?

The exchange of business transaction data between computers over the Internet or other

Which of the following is an explanation of reverse engineering of software

The existing software is analyzed, and its specification and internal

B

The formula shown below is represented in postfix (or reverse Polish) notation. Which of following is the resulting value of this formula? 5 1 - 3 * 3 1 - 2 * / a) 1 b) 3 c) 5 d) 7

C

The four perspectives of the BSC (Balanced Score Card) includes "financial," "learning and growth," "internal business process," and one other. Which of the following is the one remaining perspective that is sometimes extended to or replaced by "stakeholder" for modified or extended BSC models? a) Company's own strength b) Compliance c) Customer d) Governance

# A certain system is being developed separately as Subsystems A and B. Each subsystem test has just been completed. The test data up to this point is shown in the table below. Here, the number of standard test items for this system is 10 items/Ksteps.

The number of bugs detected by the test is reaching the saturation level in Subsystem A compared to Subsystem B, so Subsystem A can be considered superior in quality.

Company T sells three types of products A, B, and C. At present, products A, B, and C are sold to 10,000, 20,000, and 80,000

The number of new customers of product S is expected to be less than the number of

Which of the following is the most appropriate indicator used for the progress management of a program test?

The number of test items completed

93. Which of the following is an appropriate explanation of the LRU method that is used as a page replacement algorithm?

The page that has not been used for the longest time is replaced.

Among the explanations of task scheduling methods, which of the following has the highest possibility that a specific task continues to wait for the allocation of CPU time

The processing is executed from the task with the estimated shortest processing time.

Which of the following is an appropriate reason for using a flash memory device as a

The program can be rewritten after the microcomputer is shipped.

Which of the following is the characteristic of a dynamically relocatable program?

The program currently in the computer memory can be moved to other locations of the memory during execution time.

When an audit is performed on the reliability of programming, which of the following is the most appropriate item to be reported as a finding?

The programmer selects a subset of unit test items from all the program logic paths on a sampling basis.

Which of the following is an appropriate explanation of a benchmark test for computer

The relative processing power of each system is measured and evaluated by executing

65. Which of the following is an appropriate description concerning interconnection devices between LANs?

The repeater extends the transmission distance by amplifying signals between the same types of segments

Which of the following is an appropriate description concerning interconnection devices between LANs?

The repeater extends the transmission distance by amplifying signals between the same types of segments

Which of the following is an appropriate description concerning a max heap whose node values are 3, 6, 11, 17, 19, 22, and 32?

The root node value is always "32".

B

The selling price per unit of product Z is set to $250, and sales for the coming year are expected to be 500 units. If the company requires a return of 15% in the coming year on its investment of $250,000 in product Z, what is the target variable cost per unit for the coming year? Here, the fixed cost is $10,000 per annum. a) $145 b) $155 c) $165 d) $175

Among the system audit items concerning master file management

The server with dual-redundancy technology is used to store

B

There are three 7-bit character codes: 30, 3F, and 7A. When an even parity bit is added to the front of each character code, which of the following shows the correct result? Here, the character codes are expressed in hexadecimal. a) 30, 3F, 7A b) 30, 3F, FA c) B0, 3F, FA d) B0, BF, 7A

C

There is an RAID5 disk array system that is composed of 10 hard disk drives, and each disk capacity is 100Gbytes. What is the approximate maximum capacity (in Gbytes) that can be used to store user data and/or programs on this system? a) 450 b) 500 c) 900 d) 1,000

# In virtual memory systems, serious degradation of system performance may occur due to a large number of page faults. Which of the following terms most appropriately describes this situation?

Thrashing

When the number of concurrently running programs is increased in a virtual storage system with the small and insufficient capacity of main memory, which of the

Thrashing

Which of the following is a term that shows the amount of work that is processed per unit of time by a computer system

Throughput

# Which of the following interrupts can signal to OS that a program might have gone into an infinite loop?

Timer Interrupt

16. Which of the following is the appropriate purpose of defragmentation of hard disks? a) To access disk files faster and more efficiently b) To clean up temporary and junk files c) To delete IBG and increase capacity d) To protect disk drives from physical failures

To access disk files faster and more efficiently

From a viewpoint of security measures, which of the following is an appropriate purpose of confirming the destination address with the sender at the time of sending e-mail?

To prevent e-mail from being sent to a wrong recipient

In a relational database, which of the following is an appropriate purpose of defining a

To provide a constraint to maintain referential consistency between the records of

# Full backup and differential backup are two methods of backing up a database. Which of the following appropriately describes the differential backup method?

To recover a database, the full backup data is restored and then the differential backup data is added.

Which of the following is an appropriate purpose of using a locking mechanism in a relational database system?

To support concurrency control of the simultaneous execution of transactions

Which of the following is the primary purpose of the problem management process

To trace and eliminate the root cause of an incident, and to prevent the recurrence

17. Which of the following is an appropriate explanation of TCO? a) Total cost required for system development b) Total cost required for system installation c) Total cost required for the initial investment of a system d) Total cost required throughout the life cycle of a system

Total cost required throughout the life cycle of a system

Which of the following is an appropriate expression for calculating the server processing

Ts = Tr - Tl - Tp

# Which of the following is the appropriate specifications concerning 100Base-T?

Twisted pair cable Star 100

# Which of the following appropriately describes cache memory?

Two methods exist: one is to rewrite both the cache and main memory when a write instruction is executed; the other is to rewrite only the cache memory while the main memory is not rewritten until the data is removed from the cache memory.

D

Two players, X and Y play a dice game. A pair of dice is tossed. If the sum of the dice is 2, 4, or 6, X wins the game. Otherwise, Y wins. What is the probability that Y wins the game? a) 1/4 b) 1/3 c) 1/2 d) 3/4

# Which of the following appropriately describes a dual system?

Two systems perform the same processing, and the processed results are collated to confirm the correctness of the processing. If a fault occurs in either system, processing continues in degraded operation.

# Which of the following represents the sequence of nodes visited in a post-order traversal of the binary tree T shown below?

U X W Q Z Y V P

# Which of the following protocols is used on the transport layer of OSI basic reference model?

UDP

Which of the following provides a standard set of graphical notations or diagrams for specifying, visualizing, designing, and documenting object-oriented systems?

UML

# CASE tools can be classified on the basis of the applicable development processes and phases. Which of the following classifications includes support functions for requirements analysis?

Upstream

According to ISO 9241 -210: 2010, which of the following is defined as the "extent to

Usability

39. When a product or a system is developed, which of the following is the most appropriate test that is performed to check the extent to which it can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction in a specified context of use?

Usability test

47. The diagram shown below depicts who can use the system and in what ways the users (or external systems) expect to interact with the system. What is this type of diagram called? a) Activity diagram b) Data flow diagram c) Entity relationship diagram d) Use case diagram

Use case diagram

In a client/server system using a database server, the generation of a large number of SQL

Use of stored procedure

A

User A issues the command as follows: UPDATE cust_orders SET id = 200 WHERE id = 1 Then user B issues this command as follows: UPDATE cust_orders SET id = 300 WHERE id = 1 User B informs you that his/her UPDATE statement seems to be hung. Which of the following is a possible solution that you can find? a) Ask user A to commit the transaction. b) Ask user B to abort the statement. c) Ask user B to commit the transaction. d) No action is required.

# A singly linked list is implemented using two arrays VALUE and LINK, in which LINK(I) points to the successor of VALUE(I). When a new element that does not exist initially in the list is assigned to VALUE(J), the program fragment shown below is executed. Which of the following appropriately describes the function of this program?

VALUE(J) is inserted after VALUE(I) in the list

# Which of the following is the appropriate technology that is used to establish a private or secure network connection within a public IP network, such as the Internet, and to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one?

VPN

C

What range of decimal numbers can be represented with an 11-bit two's-complement number? a) -2048 to 2047 b) -2048 to 2048 c) -1024 to 1023 d) -1024 to 1024

D

When the expression (A - 2 x (B + C) - D x E) x F in conventional infix notation is converted to the prefix expression, which of the following represents the resulting expression? a) A2BC + x - DE x - F x b) A2BC + x - DE x F - x c) x - - A x 2 x B + CDEF d) x - - A x 2 + BC x DEF

C

When there are several business systems available in a company, which of the following is the most appropriate method for access control? a) Based on the name list of the new employees, the registration of all users is performed beforehand in all business systems. b) In order to promptly respond to the change in the person in charge of a business operation, a common user ID is used for each business group. c) Irrespective of the user's job title, the appropriate access rights are set in each business system on the basis of the user's job role. d) When staff reassignment occurs frequently, the access rights are changed all at once at the beginning of the year.

D

Which of the following IP addresses can be used to connect a computer directly to the Internet? a) 10.10.11.88 b) 127.0.0.1 c) 172.16.255.255 d) 203.162.1.160

D

Which of the following data structures uses the LIFO (Last In First Out) method in order to manage data? a) Array b) Linked list c) Queue d) Stack

D

Which of the following is most suitable for cache memory? a) DDR SDRAM b) Flash memory c) Nonvolatile DRAM d) SRAM

B

Which of the following is the appropriate description of a lock that is the exclusive control of a database? a) If a lock is used, deadlock cannot occur. b) Locks come in two types: shared locks, used while reading, and exclusive locks, used during a change. c) The coarser the level of granularity of locked data is, the more concurrent transactions can be executed. d) When deadlock occurs, the lock rolls back the transaction on both sides.

C

Which of the following is the appropriate program that supports dynamic processing in a Web environment and runs only on a Web server? a) Java applet b) JavaScript c) Java servlet d) VBScript

D

Which of the following is the binary fraction that is equivalent to the decimal fraction 115.625? a) 1100111.1001110001 b) 1100111.101 c) 1110011.1001110001 d) 1110011.101

D

Which of the following is the general-purpose markup language that allows its users to define their own tags and to facilitate the sharing of data across different information systems, particularly via the Internet? a) HTML b) SGML c) UML d) XML

C

Which of the following is the key technology that enables to connect a computer using a private IP address to the Internet? a) BOOTP b) DHCP c) NAT d) RARP

B

Which of the following is the most appropriate indicator that is directly helpful in managing software quality in a system development project? a) Number of completed work packages that compose a WBS b) Period of time required to adequately review each deliverable c) Productivity of individual programming d) Program version and modification level

B

Which of the following operations is performed on the packet header while the data packet moves from the lower to upper layers according to the OSI basic reference model? a) Header addition b) Header deletion c) Header modification d) Header rearrangement

# In the GUI design of visual panels, how to input the data of "Number of copies" is under review. If there are both keyboard and mouse available as input devices, which of the following options is the best choice that can be acceptable to a wide range of users? Here, the value of "Number of copies" can range from 1 up to the maximum number of copies.

[Spin box]

In postfix notation, also known as reverse Polish notation, which of the following is equivalent to the arithmetic expression " ? a + b × c ÷ d ? e "? Here, a, b, c, d, and e are all variables.

a ? bc × d ÷ +e ?

Which of the following is the graph that is represented by the adjacency matrix A shown

d) V

D

https://goo.gl/1SjJza

D

https://goo.gl/2NBCmZ

A

https://goo.gl/2UNBCn

# A k-ary tree is a tree in which every node has no more than k children. A binary tree is the special case where k=2. In a k-ary tree with n nodes and height h, which of the following is an upper bound for the number of leaves?

kh

In a TCP/IP network, which of the following is used to check if a computer or device is

ping

When F(v,w) is defined using standard predicate logic as shown below

v is an aunt of w.

# In object orientation, the term "open (white box) reuse" refers to the reusing of base-class data and functions by creating subclasses for the base class. Which of the following is the appropriate description concerning the reuse technology in object orientation of this method?

Only differences between the data and functions defined by the base class and those of subclasses can be stated in subclasses, so development is highly efficient.

# Which of the following is widely used as a computer port for a modem connection?

Serial port

Which of the following is the function that can be implemented with HTTPS

Server authentication with an electronic certificate

45. A government website accepts passport applications using HTTP forms to collect information. Users provide complete personal information in the forms to help expedite processing of face-to-face transactions, and payments are done offline. The information collected enters a secure server for processing and document releasing. In this system environment, which of the following is the most likely security attack? a) Password-guessing attack b) Sniffing traffic for identity theft c) Spamming to attain denial of service d) Spoofing attack

Sniffing traffic for identity theft

98. When a list of seven elements shown below is rearranged in &lt;b&gt;ascending order&lt;/b&gt;, which of the following sorting algorithms is completed with the minimum number of element exchanges?

Selection sort

Among the diagrams used in UML 2.x, which of the following is the diagram

Sequence diagram

# In the RAID3 system shown below, three disks (Disks 0 through 2) for byte-striped data and one dedicated parity disk (Disk 3) are used as one volume. Parity byte Ap is generated by calculating the exclusive OR (XOR) of three bytes in Disks 0 through 2. For example, Ap (1-3) is calculated as follows:

XOR (Exclusive OR)

66. In a TCP/IP network using IPv4 addresses, which of the following is an effective IP address that can be allocated to a network device?

203.164.15.9

41. Which one of the following methods allowed for smart card authentication and more secure encryption technology?

AES

53. Given CUSTOMERS table. Which of the following statement is CORRECT to add new column named EMAIL into existing CUSTOMERS table?

ALTER TABLE CUSTOMERS ADD EMAIL varchar(100)

52. Which of the following is INCORRECT syntax for change the structure of a table?

ALTER TABLE table_name CHANGE COLUMN column_name.

Which of the following is an appropriate way of selecting systems that

Systems that have a high possibility of occurrence of a problem and are significantly

The figure below shows a logic circuit representing a full adder. When 1, 0, and 1 areentered into x, y, and z respectively, which of the following is the appropriat

1 0

The logic circuit shown below has four input signals (C1, C2, C3, and C4) and two selector signals (S1 and S2)

1 0

In a logic circuit shown below, which of the following is an appropriate combination of input signals A through C that can generate the output signal "0"?

1 0 0

https://drive.google.com/file/d/1Looco-VsQOPJUz8mhRTe2cK0mElUg4Zu/view?usp=sharing

1 0..* 0..* 1

# A CPU has four blocks of cache memory. Using the LRU (Least Recently Used) replacement algorithm, which memory blocks are stored in the cache memory after the execution of the following sequence of access to memory blocks: 1 2 3 4 5 2 5 4 1 5 2 3?

1 5 2 3

8. When the series of operations below is performed on an empty stack, which of the following is the data remaining on the stack? Here, "push x" is the operation to save data x to the stack, and "pop" is used to retrieve data from the stack. push 1 → push 2 → pop → push 3 → push 4 → pop → push 5 → pop a) 1 and 3 b) 2 and 4 c) 2 and 5 d) 4 and 5

1 and 3

41. When a message is sent to Person A from Person B using public key cryptography, which of the following keys should be used for encrypting the message? a) A's private key b) A's public key c) B's private key d) B's public key

A's public key

Which of the following is the list that arranges A through D in order of effective access time

A, D, B, C

# When the data model is represented to conform to the notational convention shown below, which of the following statements appropriately interprets the designated E-R diagram?

It does not occur that a single order placement is given to multiple suppliers.

https://drive.google.com/file/d/1zeU19Rowg8YV_XQOKXorrl12CdiOofXb/view?usp=sharing When the data model is represented to conform to the notational convention shown below, which of the following statements appropriately interprets the designated E-R diagram? See diagram

It does not occur that a single order placement is given to multiple suppliers.

Which of the following is an advantage of using mask ROM as program memory in an embedded system?

It enables the prevention of unauthorized rewriting of programs after shipment.

B

The "four domains" of enterprise architecture include business architecture, technology architecture, application architecture, and one other. Which of the following is the one remaining architecture? a) Bus architecture b) Data architecture c) Software architecture d) Systems architecture

Which of the following can be represented in an E-R diagram?

The relationship between entities

# Which of the following can be realized by using the packet filtering function of a firewall?

To allow only the packets with specific TCP port numbers to pass from the Internet through to the internal network

# Which of the following is an appropriate purpose of installing a firewall in a computer network?

To block and permit data traffic

Which of the following is the purpose of using a WAF (Web Application Firewall)?

To block attacks to a vulnerability arising from a Web server and an application

# Which of the following appropriately describes the purpose of using a check digit?

To detect an error of the inputted code value

# Which of the following appropriately describes the purpose of using WBS (Work Breakdown Structure) in software development?

To divide development work into small tasks in a top-down manner, thereby facilitating work management

# Which of the following can make MTBF longer in system maintenance?

To do preventive maintenance

In a relational database system, which of the following is an appropriate purpose of recording changes in a database file as a journal file?

To enable recovery to be undertaken effectively in the event of a failure

# Which of the following is the primary purpose to use RAID?

To ensure higher reliability and/or performance

The matrix shown below is used for PPM (Product Portfolio Management)

To evaluate the current position of a company as the basis for setting an objective and

Which of the following is the primary purpose of implementing an ERP system that is used

To integrate all departments and functions across a company into a single computer

Which of the following is the UPDATE statement that can correctly update the data of the "Product" table? Here, the "Product" table is defined by the CREATE statement

UPDATE Product SET Product_name = 'D' WHERE Product_number = 'S003'

In a system development project, EVM (Earned Value Management) is used for managing its performance. Which of the following is the most appropriate status that is indicated by the fact that the value "EV-AC" is positive?

Under budget

Among the combinations of the storage management and the multiplicity of programs in a multiprogramming environment

Virtual storage system, Large

Which of the following is a biometric recognition technique that is used

Voice recognition

Which of the following is the most appropriate tool that is used to emulate a real hacker by looking for security holes and other weaknesses from the outside of an organization's network?

Vulnerability scanner

Which of the following is a logical expression that is equivalent to the logic circuit shown below? Here, "+" is the logical sum, " • " is the logical product, and X is the negation of X.

X = A? B

The flowchart below shows an algorithm that can be used to sort all elements of one-dimensional array X in reverse order and store them in array Y.

X(i) ? Y(n-i+1) & i +1 ? i

43. An application user uses untrusted data in his application without validating or escaping the raw input data provided by the user. In his code block he has a code block like below

XSS Injection

# There are a total of N values observed. The sum S (S>0) of these values is obtained, and then the average value is calculated. Which of the following is the correct expression when the average value is rounded off to the nearest integer value? Here, "/" indicates division, and [X] is the maximum integer equal to X or less.

[S/N+0.5]

A k-string is defined as a string of length k. An m-substring is an ordered sequence of m consecutive elements of the original string. How many m-substrings are contained in a k-string? Here, when two or more m-substrings have the same sequence of elements, they are all counted separately as different substrings.

k ? m +1

# A k-string is a character string with a length of k characters. An m-substring is an ordered sequence with a length of m characters, which consists of consecutive elements of the original k-string. An n-subsequence is also an ordered sequence with a length of n characters, which consists of elements of the original k-string, but it does not need to be consecutive. How many m-substrings and n-subsequences are respectively included in the k-string?

k-m+1,k!/n!(k-n)!

When two logical variables "p" and "q" are given, which of the following

(p ? q) ? ¬(p ? q)

When the MTBF and MTTR values for devices A and B are as shown in the table below, what is the availability of a system where A and B are connected in series?

0.72

90. Give a system with 3 units A, B, C with their availabilities are 0.95, 0.9 and 0.8 (see figure). What is the availability of whole system?

0.796

# There is a processor with a clock frequency of 1 GHz. When the instruction set of this processor is composed of two types of commands as shown in the table below, what is the approximate processing performance in MIPS?

125

12. There is a CPU with a clock frequency of 1 GHz. When the instructions consist of two types as shown in the table below, what is the performance in MIPS of the CPU? Type Execution time (clocks) Frequency of appearance (%) Instruction 1 10 60 Instruction 2 5 40 a) 34 b) 100 c) 125 d) 133

125

10. The Fibonacci sequence (0, 1, 1, 2, 3, 5, 8, 13, 21, 34, ...) can be defined recursively as follows: 0 (x=0) f (x) = 1 (x=1) f (x-1) + f (x-2) (x >1) How many times is the function f (x) called to calculate the Fibonacci number f (5)? a) 1 b) 3 c) 5 d) 15

15

# When a network device is connected to the LAN with the network address of 201.12.1.64 and the subnet mask of 255.255.255.192, which of the following IP addresses should NOT be assigned to the device on the network?

201.12.1.127

# Which of the following IP addresses can be used to connect a computer directly to the Internet?

203.162.1.160

In a TCP/IP network using IPv4 addresses, which of the following is an effective IP address that can be allocated to a network device?

203.164.15.9/28

# Which of the following is equal to the hexadecimal fraction 2A.4C?

25+23+21+2-2+2-5+2-6

# There are five different sizes of white balls and five different sizes of green balls. When these ten balls are laid out in a line so that adjacent balls can have different colors, how many arrangements of the balls can be made?

28,800

14. How many memory cells (or latches for holding 1 bit each) are implemented in SRAM with 24 address lines and 16 data lines? a) 216 b) 2 24 c) 24 16 d) 2 24 16

2^24 x16

When a binary tree is a heap with a depth of "n", what is the minimum number of nodes (including leaf nodes) in the heap

2^n

The table below shows the priorities of three tasks together with the operation sequence and processing time of the CPU and I/O device

3

13. See the figure. What is the value of f (4, 2)?

6

A power supply unit has a rated output power of 500 watts and an efficiency of 80%

625

The table below shows the income statement for a certain company. Which of the following is the amount of sales (in million dollars) at the break-even point?

625

The development scale of a new system is estimated as 500 Function Points (FPs).

66

When the hexadecimal value 2A is stored in an 8-bit register and is logically

80

# An integer m is stored in a register as a binary value. If this value is shifted to the left by three bits and m is added to the shifted value, how many times as large as m is the resulting number? Here, no overflow occurs.

9

19. What does WBS chart stand for?

;Work Breakdown

https://drive.google.com/file/d/1wp2h82Jw8fTbY4vQNUQMQAwj9u9fr0Ii/view?usp=sharing Which parts of an XML document are case-sensitive? A. Only element type names are case-sensitive: you must follow whatever combination of upper- or lower-case you use to define them (either by first usage or in a DTD or Schema). So you can't say <BODY>?</body>: upper- and lower-case must match; thus <img/>, <IMG/>, and <img/> are three different element types; B. Attribute values are case-sensitive. CDATA values (eg Url="MyFile.SGML") always have been, but NAME types (ID and IDREF attributes, and token list attributes) are now case-sensitive as well;

A (ko chắc)

C

A binary tree is said to be perfect, if all its leaves are at the same depth and every internal node has two children. Which of the following is correct about the perfect binary tree? Here, n is the number of nodes, and h is the height of the perfect binary tree. a) h = log2(n+1) b) If every proper subtree of a binary tree is perfect, then the tree itself must also be perfect. c) n = 2h+1 -1 d) The number of internal nodes is 2h.

Which of the following is an appropriate explanation of demographic segment that is one of the market segments?

A group of a population segmented by factors such as age, gender, family size, income, occupation, education, religion, race, generation, and nationality

In a relational database, which of the following is an appropriate definition of a composite

A primary or foreign key that consists of two or

Among various types of license agreements for a software package, which of the following is the most appropriate explanation of a site license?

A software package can be installed on any and all computers, such as PCs, workstations, and servers, at a given location in a company or an organization.

D

According to the ISO/IEC 20000 series, which of the following has the objective that aims to minimize disruption to the business by proactive identification and analysis of the cause of incidents and by managing problems to closure? a) Business relation management b) Change management c) Incident management d) Problem management

# A certain computer system runs in a multi-programming environment using a nonpreemptive "shortest job first" algorithm. In this system, four processes A, B, C, and D arrive sequentially in the process queue every 1 millisecond. The table shown below includes estimated execution time for each process; for example, process A uses CPU, I/O, and then CPU sequentially for 4, 5, and 5 milliseconds respectively. When 14 milliseconds elapse after the arrival of the first process A, which of the following processes is executed in CPU? Here, the multi-processing overhead of OS can be ignored, and both CPU and I/O operations can be executed concurrently.

C

Which of the following is the globally recognized model that is used for measuring the maturity level of software and systems development processes and providing guidance

CMMI

Which of the following is the case where outline fonts rather than bitmap fonts are effective and suitable for use on an output device such

Characters are enlarged using a given scale factor.

Which of the following is the name of a phenomenon where multiple ON/OFF signals are generated during a few milliseconds after a push-button switch with a mechanical

Chattering

105. The flowchart below shows an algorithm in which two integers are temporarily entered into two variables x and y at the beginning, and then, after comparison of the two integers, the larger number is stored in the variable x and the smaller is in the variable y. In order to complete the algorithm, which of the following should be inserted in the process &lt;b&gt;box A&lt;/b&gt; in the flowchart?

Choose c

Which of the following is an appropriate example of VR (Virtual Reality)?

Computer games and simulations make use of multimodal devices, such as a wired glove, a headgear, and an omni-directional treadmill, in order to provide very enriching and life-like experience for the user.

When the procedure below is performed in terms of security, which of the following can be done by recipient B

Confirming that the message is from sender A

Assume you are in the situation where no other data structure like arrays, linked list is available to you. How many minimal of stack(s) are needed to implement a queue? A. 1 B. 4 C.3 D. 2

D

# Which of the following provides the function of mapping between domain names and IP addresses in a TCP/IP network?

DNS

A

During system development, a domain model is often created as part of the business modeling activities. Among the diagrams in UML, which of the following is the diagram that contains the implementation view of the entities in the domain model? a) Class diagram b) Communication diagram c) Object diagram d) Use case diagram

# In some systems, the system manually or automatically determines memory blocks which are no longer referenced by a program and reorganizes the memory space so that it can be available for subsequent allocation. What is this process called?

Garbage collection

Which of the following is an appropriate explanation of optimization in a compiler?

Generating object codes that enhance run-time performance through the analysis of program codes

50. In software development, it is a good practice to develop highly independent modules. When module independence depends primarily on two measures, module strength (or cohesion) and module coupling, which of the following is the appropriate combination of good programming practices? Module strength Module coupling a) High High b) High Low c) Low High d) Low Low

High Low

60. In Network context, what does HDLC stand for?

Hint: typing only result in upper-case first letter of each word. |High level data link control

Among the descriptions concerning three-dimensional computer graphics, which of the following is an explanation of polygon?

It is a basic element that is used for constituting a polyhedron taking the form of a closed solid or for approximating a quadric surface or a free-form surface.

14. Which of the following is an explanation of EA (Enterprise Architecture)?

It is a technique to review respective business operations and information systems from the perspective of overall optimization through analysis of four key architectures—business, data, application, and technology.

8. In business management, which of the following is an explanation of SOA?

It is an architectural style or method to implement software functions corresponding to each activity in business operations as services, and to build the entire system by combining these services.

Which of the following is an appropriate explanation of DRAM?

It is often used as main memory, and one bit is represented depending on whether or not its capacitor is charged.

When the order data shown below is entered into the order entry system, which of the following is a check that is performed to see if the order date is on or before the business day on which the data is entered?

Logical check(Order data)

Which of the following is an appropriate set of sorting algorithms that are based on the

Merge sort, quick sort

# Which of the following appropriately explains the pipeline processing method of processors?

Method whereby one processor simultaneously executes multiple instructions with slight delays in time

84. In a customer service system&lt;/b&gt;, which of the following is a theory that is used to analyze the number of windows and the service hours according to the arrival status of customers?

Queueing theory

# Which of the following is the sorting algorithm that divides the data elements into two groups, in which all those elements less than a particular element (called a pivot value) and all those elements greater than or equal to it are separately included, and then repeats the same operation until all elements are sorted in ascending or descending order?

Quick sort

Among the RAID systems, which of the following should be used in cases where maximum

RAID 0

Which of the following is a service delivery process that is defined, agreed, recorded, and managed in IT service management?

Service level management

When a system is developed by using object-oriented approach, which of the following is

When the internal data structure or the implementation

D

When the number of concurrently running programs is increased in a virtual storage system with the small and insufficient capacity of main memory, which of the following is the state in which the overhead of the system increases and the processor utilization of the applications decreases? a) Bottleneck b) Fragmentation c) Paging d) Thrashing

C

Which of the following decimal fractions becomes a finite fraction in an octal representation? a) 0.3 b) 0.4 c) 0.5 d) 0.8

B

https://goo.gl/yqm92c

B

https://goo.gl/zV2dMU

When the average instruction execution time of a computer is 20 nanoseconds, what is the performance of this computer in MIPS?

50

Which of the following is a technique that binds the modules constituting a program at

Dynamic linking

# When the results of the logical operation "x # y" are shown in the table below, which of the following expressions is equivalent to the operation "x # y"? Here, "AND" is used for the logical product, "OR" is for the logical sum, and "NOT" is for the logical negation. x y x # y True True False True False False False True False False False True

(NOT x) AND (NOT y)

# In a certain examination, the minimum and maximum scores are 31 and 95 respectively. A one-dimensional array shown below is used to display the distribution of scores for all examinees, and each array element indicates the number of examinees whose scores are in the specified ranges. Which of the following is the most appropriate expression to calculate an array index for each score? Here, any digits after the decimal point of the resulting value are truncated to generate an integer as an index.

(Score-30)/10+1

# Which of the following is equivalent to the logical expression shown below? Here, "•" is used for the logical product, and "+" is for the logical sum. ((X + Y) • (X + Z)) + ((X •Y) + (X • Z))

(X + (Y • Z)) + (X • (Y + Z))

(câu có hình) https://drive.google.com/file/d/1ejOLtlZDrg8LWE4zeKrGF2YSIZ1OH4m5/view?usp=sharing https://drive.google.com/file/d/1p1CXYAF9VyABvBWpY2S6gWhmyyB1FXzt/view?usp=sharing Multiple directories having the names "A" and "B" are managed in the structure shown below View the picture and choose right answer. A. Choose a B. Choose d C. Choose b D. Choose c

(chọn đáp án \B\A)

# There are n locks and n keys; the keys are mixed and need to specify which key belongs to which lock. Which of the following is the maximum number of trials to find the correct key for each lock? Here, one key can open only one lock.

(n2-n)/2

# The flowchart below shows a binary search algorithm to find the index m of the array element A(m), such that the equation "A(m) = k" holds, from the array elements A(1), A(2), ..., A(n) already sorted in ascending order. In case of "m = 0" at the end, there is no element such that the equation "A(m) = k" holds. Which of the following is inserted in the process box X in the flowchart? Here, the slash ( / ) indicates division that truncates all digits after the decimal point.

(x + y) / 2 ? m

# In the single precision of "IEEE Standard for Binary Floating-Point Arithmetic" (IEEE 754), the value "V" is represented as follows:

-28

# In fixed-point representation that expresses negative numbers by two's complement, which range of integers can be expressed with n bits? Here, the position of the binary point is to the right of the least significant bit.

-2n-1 through 2n-1-1

22. There is an 8-bit register where integers are represented in binary by using 2's complement for negative numbers. When the decimal integer "-24" is stored in the register and then arithmetically shifted 2 bits.what is the resulting value in decimal? Here, the leftmost bit of the register is used as a sign bit.

-6

Q1. There is an 8-bit register where integers are represented in binary by using 2's complement for negative numbers. When the decimal integer "-24" is stored in the register and then arithmetically shifted 2 bits right, what is the resulting value in decimal? Here, the leftmost bit of the register is used as a sign bit. a) -102 b) -96 c) -6 d) 58

-6

# A coin is tossed three times. What is the probability that it lands on heads exactly one time?

0.375

# Which of the following decimal fractions becomes a finite fraction when converted to an octal number?

0.5

As shown in the arrow diagram below, there exists a project consisting of nine activities

1

11. In a certain CPU, a floating point adder unit uses a total of 40 percent of the execution time. If the floating point adder unit is replaced with a new unit whose speed is ten times faster than the original unit, approximately how many times faster is the new CPU than the original one? Here, there is no modification in the instruction set of the new CPU. a) 1.25 b) 1.40 c) 1.56 d) 2.17

1.56

33. As shown below, there are four relational database tables Product, Supplier, Sale, and Employee that are used for a database system in a retail store. Here, the solid and dotted lines indicate the primary and foreign keys, respectively. Product (ProdNo, ProdName, Cost, Price, SupplierNo) Supplier (SupplierNo, SuppName, SuppAddress) Sale (ProdNo, EmpNo, DateTime, Quantity) Employee (EmpNo, EmpName, EmpAddress) The number of records for each table is as follows: Table name Number of records Remarks Product 200 Each of the groups of 10 records has the same supplier. Supplier 30 Sale 10,000 Each of the groups of 100 records is from the same product. Employee 10 How many records are returned after execution of the SQL statement below? SELECT * FROM Product A, Supplier B, Sale C WHERE A.ProdNo = C.ProdNo AND A.SupplierNo = B.SupplierNo a) 200 b) 10,000 c) 10,230 d) 60,000,000

10,000

# In the binary tree shown below, which of the following trees is created after conversion into a (max) heap? a) ?ng cu?

2 4 1

# The head of a hard disk drive is currently positioned at cylinder number 100, and the cylinder numbers 120, 90, 70, 80, 140, 110, and 60 are lined up in the I/O request queue. What is the total number of cylinders that the head moves under the following conditions?

120

# Which of the following is the appropriate sequence for drawing up a DFD model that is used to develop a new system based on the current system? 1. Current logical model 2. Current physical model 3. New logical model 4. New physical model

2 ? 1 ? 3 ? 4

In the traditional IPv4 addressing scheme, which of the following is the private IP address

172.16.0.0 through 172.31.255.255

31. The expression shown below is represented in postfix (or reverse Polish) notation. Which of following is the resulting value of this expression?

18

When the procedure shown below is executed in listed order, what is stored in variable y

2

# How many memory cells (or latches for holding 1 bit each) are implemented in SRAM with 24 address lines and 16 data lines?

224 x 16

# Which of the following subnet masks provides the minimum number of IP addresses available in the subnet to assign to devices that request a connection?

255.255.255.252

64. Which of the following subnet masks provides the minimum number of IP addresses available in the subnet to assign to devices that request a connection?

255.255.255.252

When the carry-over from the previous month and the quantity of inventory transactions for

26,450

78. In order to make a multiplexing system with an availability of at least 99.9% by using devices with an availability of 90%.How many minimum of these devices need linking together in parallel?

3

97. Which of the following is the minimum possible depth of a binary tree with 14 nodes?

3

A restaurant is to be opened for business under the conditions shown below.

3

How many multiplications at a minimum must be performed in order to calculate the polynomial expression "x4-2x3+5x2+x-6"?

3

# There are three stacks A, B, and C where stack A contains the values 1, 2, and 3; 3 is on the top of the stack, and stacks B and C are empty. The stack command format is as follows:

3, 2, 1

When a 60-minute monaural audio signal is digitalized using a PCM format with a sampling frequency of 44.1 kHz and a quantization bit rate of 16 bits, what is the

320

In the RAID0 and RAID1 systems using two disks, when one disk has a reliability rate of

3.97 0.03

17. Two players, X and Y play a dice game. A pair of dice is tossed. If the sum of the dice is 2, 4, or 6, X wins the game. Otherwise, Y wins. What is the probability that Y wins the game?

3/4

# There are three 7-bit character codes: 30, 3F, and 7A. When an even parity bit is added to the front of each character code, which of the following shows the correct result? Here, the character codes are expressed in hexadecimal

30, 3F, FA

# A system manages files by allocating file storage on a block-by-block basis, where each block consists of eight 500-byte sectors. How many sectors in total are required to store two files: one with 2,000 bytes and the other with 9,000 bytes? Here, sectors for management information such as directories can be ignored.

32

# A server runs a regional web application. It services the requests coming in from all regional offices. Each request is completed in 80 milliseconds on average. A total of 10 requests per second arrive at the server on average. If the M/M/1 queuing model can be applied, how many requests are waiting for the service on average?

4.00

There is a digital video recording system installed with four security cameras. In this system, the video data from each camera is captured at 30 frames per second with a

4.5 GB

18. How many elements are considered to build of cost of an I.T. project based-on Functional Point method?

5

32. N?u m?t m?ng công vi?c du?c th?c hi?n du?i các di?u ki?n sau, th?i gian ng?n nh?t, tính theo gi?, c?n d? hoàn thành vi?c x? lý là bao nhiêu?

5

7. There is a queue with eight cells and two pointers as shown below. 0 1 2 3 4 5 6 7 6 8 15 Start pointer: 2 End pointer: 4 At this point, three values 6, 8, and 15 are stored in the queue. The start and end pointers indicate the location of the first and last data values respectively. After the series of operations described below is performed, which of the following is the appropriate combination of the two pointers? Here, upon reaching the end of the queue area, the pointers wrap around to the beginning of the queue again. [Operations] 1. One value is enqueued. 2. Two values are dequeued. 3. Three values are enqueued. 4. One value is dequeued. Start pointer End pointer a) 0 5 b) 1 6 c) 5 0 d) 6 1

5 0

https://drive.google.com/file/d/1vxPXKxgezBkuOxum5xDHf81QkgkCf3qQ/view?usp=sharing There is a queue with eight cells and two pointers as shown below. At this point, three values 6, 8, and 15 are stored in the queue. The start and end pointers indicate the location of the first and last data values respectively. After the series of operations described below is performed, which of the following is the appropriate combination of the two pointers? Here, upon reaching the end of the queue area, the pointers wrap around to the beginning of the queue again. View the picture and choose right answer. A. Choose a B. Choose b C. Choose c D. Choose d

5/0

# In a production process of 1,000 units of product X, "material cost" incurred is $10,000, and "direct labor cost" is $20,000. "Production overhead" is 100% of direct labor cost. "Selling and distribution cost" is $10,000. How much in dollars is the unit cost of product X?

50

18. There are a total of 1,900 students in a school, 553 of whom are taking a course in computer science, 667 of whom are in mathematics, and 290 of whom are in both computer science and mathematics. How many students are not taking a course in either computer science or in mathematics?

970

What is the minimum number of bits required to uniquely encode upper-case alphabetic

6

There is a three-dimensional array A starting with A[1, 1, 1] and ending with A[3, 5, 7]

6816

# In what radix does the following equation hold? 131-45 = 53

7

# There is an RAID5 disk array system that is composed of 10 hard disk drives, and each disk capacity is 100Gbytes. What is the approximate maximum capacity (in Gbytes) that can be used to store user data and/or programs on this system?

900

The table below shows the transaction records for a certain fiscal period. When the average cost is calculated based on the periodic average method, how much is the "cost of sale

938

What is the approximate probability (in percentage) that at least 2 people in a group of 6

95.7

# There is a four-digit number N 1 N 2 N 3 C that is used for Customer Account Number (CAN). The right most digit "C" can be calculated as follows:

9690

4. The syntax rules of the field identifier "field ID" are represented in BNF notation as shown below. When each ID is defined as an arbitrary sequence of letters and/or digits, which of the following should be inserted into the blank A? <field ID> ::= <ID> | <field ID>.<ID> <ID> ::= A <letter> ::= a|b|с|d |e|f |g |h |i |j |k |l |m |n |o |p |q |r|s |t |u |v |w |x |y |z <digit> ::= 0|1|2|3|4|5|6|7|8|9 a) <ID> .<letter> |<ID>.<digit> b) <ID><letter> |<ID><digit> |<ID>.<ID> c) <letter> |<digit> |<ID><letter> |<ID><digit> d) <letter><ID> |<digit><ID>

<letter> |<digit> |<ID><letter> |<ID><digit>

There are some methods of getting backup files for the purpose of recovering files and managing generations. Which of the following is an appropriate description concerning those methods or procedures? A. +A differential backup contains all files changed after the last full backup, while an incremental backup saves all files changed after the last full, differential, or incremental backup. B. An incremental backup tends to take longer to get backup files than a differential backup, because more files are copied during each backup. C. A multinloved backun is liced as a mived combination of a full backun a differential....

A

When a set of values "5, 4, 3, 2, 8, 6, 0, 1, 9, and 7" is inserted in this order to create a binary search tree, which of the following represents the sequence of node values visited in the post-order traversal of the binary search tree? A. 1 0 2 3 4 7 6 9 8 5 B. 5 4 3 2 0 1 8 6 7 9 C. 5 4 8 3 6 9 2 7 0 1 D. 0 1 2 3 4 5 6 7 8 9

A

B

A CPU has four blocks of cache memory. Using the LRU (Least Recently Used) replacement algorithm, which memory blocks are stored in the cache memory after the execution of the following sequence of access to memory blocks: 1 2 3 4 5 2 5 4 1 5 2 3? Here, at the start of the memory access, the four cache blocks are empty and used in sequence until all the blocks are occupied. In other words, the cache blocks contain memory blocks "1 2 3 4" after access to the first four memory blocks. a) 1 2 3 5 b) 1 5 2 3 c) 3 2 5 1 d) 5 2 1 3

Which of the following is an appropriate explanation of a franchise chain in the retail industry?

A form of organization in which a head office provides to its members usage rights of its trademarks and signs, and also provides managerial training and assistance in exchange for a fixed rate of compensation

Which of the following is an explanation concerning a franchise chain in the retail industry

A form of organization where a head office allows its members to use the trademarks

Which of the following is an appropriate explanation of EDI?

A method for electronically exchange of business data between computers over a network, based on standard formats and protocols

Which of the following is an appropriate explanation concerning a milestone in project management?

A milestone is a major event in a project schedule that is easily identifiable by such things as the completion of a significant deliverable and the occurrence of an event.

Which of the following is an appropriate explanation of Agile software development

A model that encompasses a group of adaptive, iterative, and incremental

Which of the following is a security measure where it is effective to confirm the destination address with the sender when an e-mail is sent?

A preventive measure against wrong transmission of e-mail

# In a multiprogramming environment, there is a need to limit access to shared resources; that is, the current process has exclusive use of the assigned resources for some period of time. Which of the following appropriately describes the function to successfully implement this type of exclusive control?

A semaphore variable is used to indicate the status of common resource

50. When the data model conforms to the notation described below, which of the following is an appropriate description concerning the interpretation of the E-R diagram shown below?

A single order is not made from multiple suppliers.

B

A singly linked list is implemented using two arrays VALUE and LINK, in which LINK(I) points to the successor of VALUE(I). When a new element that does not exist initially in the list is assigned to VALUE(J), the program fragment shown below is executed. Which of the following appropriately describes the function of this program? LINK(J) <- LINK(I); LINK(I) <- J; a) VALUE(I) is replaced by VALUE(J) in the list. b) VALUE(J) is inserted after VALUE(I) in the list. c) VALUE(J) is inserted before VALUE(I) in the list. d) VALUE(J) is replaced by VALUE(I) in the list.

Which of the following is an appropriate explanation concerning a fault tolerant system?

A system that is designed so that the functions

25. Given a PERT chart (see figure) drawn to show the development of a system. Which tasks are on the critical path of the PERT chart above?

A,B,D,F,I

Which of the following is an appropriate combination of Boolean expressions that are

A?B A · B

# Which of the following is the appropriate combination of basic concepts of object-oriented approach?

Abstraction, encapsulation, inheritance, and class

49. Which of the following is an appropriate combination of the fundamental object-oriented concepts? a) Abstraction, encapsulation, inheritance, class b) Materialization, structuring, continuity, class c) Normalization, encapsulation, division, class d) Virtualization, structuring, projection, class Borrow books Return books Library user Catalogue books Shelve books Librarian Library system

Abstraction, encapsulation, inheritance, class

When OSS released under GPL is changed and distributed, which of the following is an

All the source code of the derivative work including the modified parts must be

Which of the following is an explanation of a CIO?

An executive who is positioned to plan and execute strategies including information management and information system control

The figure below shows the state transition diagram of an automaton. If the automaton stops in the accepting state when an input string is terminated

An input string must contain at least one 1 and any even number of 0s following

D

An integer m is stored in a register as a binary value. If this value is shifted to the left by three bits and m is added to the shifted value, how many times as large as m is the resulting number? Here, no overflow occurs. a) 4 b) 7 c) 8 d) 9

92. Which of the following is classified as an external interrupt?

An interrupt that is caused by an interval timer when the specified time elapses

Which of the following is classified as an external interrupt

An interrupt that is caused by an interval timer when the specified time elapses

# Which of the following is classified as an external interrupt?

An interrupt which takes place when hardware detects malfunctions

In a UML class diagram, which of the following is a relationship in which objects from the "whole" class control the lifetime of objects from the "part" class and which is graphically represented as a solid line with a filled diamond next to the class playing the "whole" role?

Composition

A trucking company has two types of trucks, A-type and B-type, as shown in the table below, and the company has a contract to deliver 900 boxes at a time by using the

Conditions 90x + 70y ? 900 x + y ? 10 0 ? x ? 8, 0 ? y ? 6 Objective function 400x + 300y ? Minimize

According to ISO/IEC 20000 (Information technology - Service management), which of the following is a process that has the objective to define and control the

Configuration management

Which of the following is a mechanism that enables a variety of information, such as still

MIME

Which of the following is the purpose of BPM that is a management approach in a company or an organization?

Continuous improvement of a company's operational processes

Which of the following is used for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message on the Internet?

MIME

C

As a security measure on the Internet, a type of challenge-response test called a CAPTCHA can be used to determine whether the client is a human or a computer program. Which of the following is an appropriate purpose of using such a measure? a) To protect against a relay attack b) To protect against a virus or a worm c) To protect against automated spamming d) To protect against spyware or adware

# User A issues the command as follows: UPDATE cust_orders SET id = 200 WHERE id = 1 Then user B issues this command as follows: UPDATE cust_orders SET id = 300 WHERE id = 1

Ask user A to commit the transaction.

In UML, the state machine diagram is used for describing the state machine model of a target system. Which of the following is an appropriate description of the state machine diagram? A. It shows how data flows in the system through a sequence of processes. B. It shows how the system responds to internal and external events. C. It shows the flow of events from one activity to another. D. It shows relationships among objects in the system at a point in time.

B

Which of the following is an explanation of SOA? A. It is an architectural style or method to provide IT services that satisfy customer requirements in accordance with a service level agreement, and to build a process required to continuously improve their quality. B. It is an architectural style or method to implement software functions corresponding to each activity in business operations as services, and to build the entire system by combining these services. C. It is an architectural style or method to store software on servers in the network to provide only services required by users via a network. D. It is an architectural style or method to realize data communication between heterogeneous systems by dividing communication services into seven layers and defining

B

Which of the following is the appropriate description of the "selection sort" algorithm? A. Two adjacent elements are repeatedly compared and swapped if the first element is larger than the second. This operation is repeated until all elements are arranged in an orderly fashion. B. The element with the largest value is determined and swapped for the last element, and then the largest value of the unsorted elements is determined and swapped for the second-to-the-last element. This operation is repeated in the same way. C. An intermediate reference value is determined, and then the elements are divided into two groups of "larger" values and "smaller" values. This operation is recursively repeated. D. Each set of the elements extracted at regular intervals is sorted, and then the interval is further decreased. The operation is repeatedly performed until the interval becomes 1.

B

D

When the average instruction execution time of a computer is 20 nanoseconds, what is the performance of this computer in MIPS? a) 5 b) 10 c) 20 d) 50

Which of the following is equivalent to the calculation result of the arithmetic expression shown below

B6

Which of the following is an appropriate description concerning data backup?

Backup processing should not overlap with ordinary business processing in order to guarantee the integrity of backed-up data.

An acceptance inspection is to be conducted on a purchased component that has a non-defective ratio of 0.9 and a defective ratio of 0.1. Four plans A though D are

C

The syntax rules of the field identifier "field ID" are represented in BNF notation as shown below. When each ID is defined as an arbitrary sequence of letters and/or digits, which of the following should be inserted into the blank A? View the picture and choose right answer. <field ID> ::= <ID> | <field ID>,<ID> <ID>::= [ A ] <letter> ::= a | b | c | d | e | f | g | h | i | j | k | 1 | m | n | o | p | q | r | s | t | u | v w | x | y | z <digit> ::= 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 a) <ID>.<letter> | <ID>.<digit> b) <ID><letter> | <ID><digit> | <ID>.<ID> c) <letter> | <digit> | <ID><letter> | <ID><digit> d) <letter><ID> | <digit><ID>

C

Which of the following is the appropriate description of the "selection sort" algorithm? A. Two adjacent elements are repeatedly compared and swapped if the first element is larger than the second. This operation is repeated until all elements are arranged in an orderly fashion. B. Each set of the elements extracted at regular intervals is sorted, and then the interval is further decreased. The operation is repeatedly performed until the interval becomes 1. C. The element with the largest value is determined and swapped for the last element, and then the largest value of the unsorted elements is determined and swapped for the....

C

# Which of the following is the highest priority process just after execution of each instruction on CPU?

Check if there are any interrupts waiting

# Which classes are in the relationship of aggregation in the UML class diagram shown below?

Class A and Class C

During system development, a domain model is often created as part of the business modeling activities. Among the diagrams in UML, which of the following is the

Class diagram

The diagrams used in UML 2.x (including 2.0 and later versions) are categorized into two types of diagrams: structure diagrams and behavior diagrams

Class diagram Component diagram Use case diagram

Which of the following is an appropriate explanation concerning the NAT function of a

Conversion between private IP addresses and global IP addresses can be performed.

55. M?t tr?c tr?c h? th?ng xu?t hi?n trong khi x? lý m?t giao d?ch cho m?t co s? d? li?u dang du?c c?p nh?t. Thao tác nào khôi ph?c l?i co s? d? li?u v? tr?ng thái ngay tru?c khi xu?t hi?n tr?c tr?c này? Hãy ch?n câu tr? l?i dúng t? nhóm câu tr? l?i du?i dây.

Cu?n ngu?c (roll-back)

The four perspectives of the BSC (Balanced Score Card) includes "financial," "learning and growth," "internal business process," and one other. Which of the following is the

Customer

Among the four stages, introduction, growth, maturity, and decline in the product life

Customers are aware of product, and as a result, sales increase. However, profits

A GUI screen contains a candidate list from which a user can select an item. Which of the following is an appropriate case to adopt this data entry method? A. Data, like a sentence, that does not have a constant value needs to be entered. B. Candidates consist of many different values. C. Input data needs to be edited. D. Candidates consist of only a few predetermined values.

D

Assertion: Implementing EDI involves high costs. Reason: EDI is built on fixed transaction set. Which of the following hold true for this Assertion-Reason? A. The assertion is TRUE and the reason is FALSE. B. The assertion is FALSE and hence the reason DOES NOT apply. C. BOTH the assertion and the reason are TRUE, but the reason IS NOT a correct explanation of the assertion. D. BOTH the assertion and the reason are TRUE, and the reason is a correct explanation of the assertion.

D

56. Gi? s? m?i quan h? có tính ch?t sau:(1) M?i thu?c tính c?a quan h? là atomic (t?c là, m?i c?t ch? ch?a giá tr? don và m?i dòng ch?a cùng các c?t dó). (2) M?i thu?c tính không khóa trong quan h? là hoàn toàn ph? thu?c hàm theo khóa chính. V?y quan h? thu?c d?ng chu?n (NF) nào sau dây?

D?ng chu?n 2 (2NF)

View the picture and choose right answer. https://drive.google.com/file/d/18hgyOP1EdsHpILgkq8hu7Ut70jU3UL5C/view?usp=sharing In DFD illustrated below, DFi is used for data flow i, Pj for proc destination of data k, and DSi for data storage 1. There : violations) in this DFD. One is in P2; that is, P2 must have at flow. The other two are in data flows. Which of the fo includes two rule violations, one for each data flow? A. Choose d B. Choose b C. Choose c D. Choose a

DF1 and DF5

40. Which of the following application protocols must support UDP as its transport layer protocol?

DNS

91. Which of the following is a characteristic of DRAM, in comparison with SRAM?

DRAM is suitable for a higher level of integration.

Which of the following is a characteristic of DRAM, in comparison with SRAM?

DRAM is suitable for a higher level of integration.

79. Which of the following helps improve availability of whole computer system?

Doubling MTBF and reducing MTTR to half .

Which of the following is a deliverable of data architecture that is one of the four architectures contained in Enterprise Architecture?

E-R diagram

30. Which of the following is the data model that was originally introduced for the purpose of conceptual modeling and is often used for logical modeling and physical modeling as well as conceptual modeling? a) E-R model b) Hierarchical model c) Network model d) Relational model

E-R model

D

In virtual memory systems, serious degradation of system performance may occur due to a large number of page faults. Which of the following terms most appropriately describes this situation? a) Caching b) Paging c) Swapping d) Thrashing

Among the management functions for service support, which of the following has the objective that aims to restore agreed service

Incident management

Which of the following is an appropriate explanation concerning the security attack that is classified as DNS cache poisoning

Incorrect domain information is injected into the DNS server referenced by a PC, which

Which of the following is the addressing mode where the operand of an instruction is used

Indirect addressing

Which of the following is the addressing scheme where data in main memory is referenced as shown in the figure below?

Indirect addressing(20.25)

Which of the following is applicable to "A" in the comparison table below that shows the

Individual production

# Which of the following is the appropriate characteristic of "data oriented design" as compared with "process oriented design?"

It is possible to consider data as shared resources and to manage it in a unified manner.

# Which of the following is the appropriate explanation of RPC in a client/server system?

It is a method of communication between programs, where parts of the process are assigned to another computer

Which of the following is an appropriate explanation of POP3 that is used in an e-mail system?

It is a protocol used to retrieve e-mails from the mailbox of a mail server

Which of the following is an explanation of SaaS?

It is a service where the user can use the functions of application

When a company's business is divided into four categories A through D as shown in the figure below, which of the following is the characteristic of the business that is classified as category B?

It is currently generating a large inflow of cash, but it also needs continuous investment into the future.

Which of the following is the most appropriate description concerning maintenance management that is to be planned for the development environment of an embedded

It is necessary to maintain the development environment such as through periodic operational checks regardless of usage frequency.

In a system audit, which of the following acts as audit evidence?

System operation records obtained by the audit team from the audited department

# Which of the following characteristics can be found in well-designed modules with a high degree of independence?

Low coupling and high cohesion

Which of the following is the methodology that performs both production scheduling and

MRP

55. Which of the following is the project management tool whereby the project activities and their relationships can be graphically represented, and the project manager can understand how the various activities flow towards completion in order of time? a) Gantt chart b) Network diagram c) Sequence diagram d) WBS

Network diagram

# The sales volume of the next month is predicted by the data in the past. The sales volume is changed greatly from month to month, but the annual fluctuation pattern is almost the same every year. Which of the following is the most appropriate formula that can be used for calculating the sales volume of the next month? Here, Pt+1 is the sales volume predicted for the next month, St is the sales volume of the current month t, and the data is retained for three years.

Pt+1 = (St-11 + St-23 + St-35) / 3

# A computer consists of units that execute five functions: input, storage, processing, control, and output. From which unit is an instruction fetched and by which unit is the instruction decoded?

Storage Control

# Which of the following is a method whereby the relevant program is read into main memory and the CPU reads out and executes it sequentially?

Stored program method

The integration test for software that is composed of a set of modules arranged in a hierarchical structure is performed from a high-level module. In such a case, which

Stub

When an integration test is performed by using the top-down approach, which of the following is particularly necessary

Stub

# Which of the following is the reason why a large number of computers use "complement representation" to simplify arithmetic circuits?

Subtraction can be processed by addition.

# Which of the following is the appropriate statement concerning data sorting methods?

The "heap sort" method builds an ordered tree from the unsorted portion of the elements, extracts the maximum or minimum value from this ordered tree, and moves it to the sorted portion. This operational sequence is then repeated to gradually shrink the unsorted portion.

35. Which of the following explains the database rollback process? a) The "redo journal" is used to restore the data to the status immediately before the failure after the start of the transaction. b) The "redo journal" is used to restore the data to the status immediately before the start of the transaction. c) The "undo journal" is used to restore the data to the status immediately before the failure after the start of the transaction. d) The "undo journal" is used to restore the data to the status immediately before the start of the transaction.

The "undo journal" is used to restore the data to the status immediately before the start of the transaction.

B

The instruction pipeline is a technique used in order to improve the CPU performance. Instructions are divided into stages and moved through the processor. An RISC processor has five-stage pipeline (Instruction fetch, Instruction decode, Execute, Memory access, Register write back) and can accept a new instruction at every clock cycle. How many clock cycles does this processor take for completion of the execution of 10 instructions? Here, there are no pipeline stalls, such as branch stall, load stall, and so on. a) 13 b) 14 c) 15 d) 16

D

The integration test for software that is composed of a set of modules arranged in a hierarchical structure is performed from a high-level module. In such a case, which of the following is a test module that is used as a substitute for the low-level module? a) Driver b) Emulator c) Simulator d) Stub

The figure below shows the structure of a singly-linked list. In order to insert Philadelphia between New York and Washington DC, which of the following is an

The pointers for New York and Philadelphia are set to 110 and 90 respectively.

In a relational database, there are two conditions that must be met as a primary key constraint. One condition is that there are no duplicate key values.

The primary key value must not be null.

51. As shown in the figure below, all the lines show signs of leveling off in the control chart of a program test. Which of the following can be inferred from this condition? Number of test items Time Number of bugs Number of detected bugs Number of unfinished test items Number of unresolved bugs a) Numerous bugs have occurred, and the number of completed test items has stopped rising. b) The bug occurrence and test item completion rates match, and there are no more unresolved bugs. c) The number of completed test items has risen, and bugs have stopped occurring. d) The process is facing some bugs that are difficult to resolve, and subsequent tests are not proceeding.

The process is facing some bugs that are difficult to resolve, and subsequent tests are not proceeding.

https://drive.google.com/file/d/1-70Q5tEA6lnYDPUJ0PYlBv8fFVB8lZpO/view?usp=sharing As shown in the figure below, all the lines show signs of leveling off in the control chart of a program test. Which of the following can be inferred from this condition? View the picture and choose right answer. A. Choose a B. Choose b C. Choose c D. Choose d

The process is facing some bugs that are difficult to resolve, and subsequent tests are not proceeding

Which of the following is an appropriate description concerning a digital envelope?

The sender encrypts the message by using symmetric key cryptography and then encrypts the symmetric key by using public key cryptography

Which of the following is an appropriate characteristic of Bluetooth

The short range (up to about 100 m) of wireless voice/data communication is defined.

103. In the graph shown below, which of the following is an appropriate description concerning the shortest path from the node "A" to another node? Here, the number shown beside the line indicates the distance between the two adjacent nodes.

The shortest distance from A to F is 9.

# Which of the following most appropriately describes the handling of control information in system operation management?

The system should be managed by a small group of managers. Each manager should be given an exclusive and separate account. Control information should be disclosed to the general user after its security level and other factors are considered.

101. With which of the following task scheduling methods is it highly possible for a specific task to continue to wait for the allocation of CPU resources?

The task with the shortest estimated processing time is executed first. The next task is initiated when the currently executed task is completed or suspended for some reason.

Which of the following is the purpose of CRM?

To acquire customer loyalty and maximize customer li

68. Which of the following is the appropriate technology that is used to establish a private or secure network connection within a public IP network, such as the Internet, and to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one?

VPN

According to Michael Porter, who is the author of "Competitive Strategy"

Value chain analysis

C

When CPU processing and printing are performed for four jobs under the conditions below, how many minutes does it take to complete them from the start of the first CPU processing until the end of the last printing? [Conditions] (1) The multiplicity of jobs is 1 during execution. (2) The CPU processing time of each job is 20 minutes. (3) 400 Mbytes of printing data are spooled for each job when the CPU processing ends. The printing function of the OS operates after spooling is completed, and printing is performed by the printer. (4) One printer is available, and the printing speed is 10 minutes per 100 Mbytes. (5) The functions of CPU processing and printing can operate in parallel, and do not affect each other. (6) The time period that is not mentioned in the conditions, such as the time required for spooling, can be ignored. a) 120 b) 160 c) 180 d) 240

C

When a 60-minute monaural audio signal is digitalized using a PCM format with a sampling frequency of 44.1 kHz and a quantization bit rate of 16 bits, what is the approximate data volume in Mbytes? Here, the data is not compressed. a) 80 b) 160 c) 320 d) 640

B

When a certain natural number x is expressed as a 2n-digit binary number "1010...10" consisting of 1 and 0 arranged alternately, which of the following equations can be formulated in terms of the number x? a) x + x/2 = 2^(2n) b) x + x/2 = 2^(2n-1) c) x + x/2 = 2^(2n+1) d) x + x/2 = 2^(2n+1)-1

D

When the database design is divided into three phases (i.e., conceptual design, logical design, and physical design), which of the following is a part of the physical design? a) Building a model of the data by using the information in user requirements specifications b) Checking relational database tables for data redundancy by using normalization procedures c) Constructing a model of the data used in an enterprise based on a specific data model (e.g., relational) d) Describing base relations, file organizations, and indexes used to improve query performance

B

Which of the following is the purpose of BPM that is a management approach in a company or an organization? a) Analysis and effective use of a company's information resources b) Continuous improvement of a company's operational processes c) Effective use of a company's management resources d) Management and analysis of a company's customer information

B

Which of the following is the result of calculating the arithmetic expression "B6-7C"? Here, all numbers are represented in unsigned hexadecimal. a) 32 b) 3A c) B2 d) BA

D

Which of the following is the server that can be used to intercept all messages entering and leaving the network and to effectively hide the true network addresses? a) DHCP server b) DNS server c) E-mail server d) Proxy server

C

Which of the following is the software development process model that aims to achieve a high degree of completion of a system by dividing the system into some subsystems and repeating the development cycle for each subsystem in consideration of minimizing the risk in each cycle? a) Evolutional model b) Incremental model c) Spiral model d) Waterfall model

23. Multiple directories having the names "A" and "B" are managed in the structure shown below. When the current directory is changed in order of "\A\B → .. → ..\B → .\A", which of the following is the resulting current directory? Here, directories are specified as follows: [Methods to specify directories] (1) A directory is referenced as "directory name\···\directory name", where the directories on the path are listed and separated with "\" (backslash) in sequence, followed by "\"and the directory name. (2) The current directory is represented by "." (one period). (3) The directory one level above is represented by ".." (two periods). (4) When a reference begins with "\", it is assumed that the root directory is omitted from the beginning of the reference. (5) When a reference does not start with "\", ".", or "..", it is assumed that ".\", which means that the reference is under the current directory, is omitted from the beginning of the reference. a) \A b) \A\A c) \A\B\A d) \B\A

\B\A

# When variables shared among tasks are updated, an unexpected result may occur if synchronous control among tasks is not performed. When the initial value of the variable x shared among tasks is 3, the final value of x is expected to be 12 if task A executes the assignment statement "x = x + x" and if task B executes the assignment statement "x = x × x."

a1 -> b1 -> b2 -> b3 -> b4 -> a2 -> a3 -> a4

The flowchart below shows the algorithm that generates and prints a 4-digit decimal

i < 5, d[k] = i

11. View the picture and choose right answer

choose D

B

https://goo.gl/46zwyw

# Which of the following Boolean expressions is equivalent to the sentence below? "The output z is true if at least two of the three inputs x1, x2, and x3 are true." Here, " n x " is used for the logical negation of xn, "+" for the logical sum, "." for the logical product, and "?" for the exclusive disjunction (or exclusive OR).

x1.x2+x2.x3+x1.x3

In a TCP/IP network using IPv4 addresses, which of the following is a valid network

210.11.190.192/26

80. When a streamer is used at a data transfer rate of 500 KB/sec, how many minutes are needed to back up 1 GB of data?

33

Which of the following is an appropriate statement in regard to program testing? A. The number of errors remaining in a program is unrelated to the number of errors already found. B. In the program testing, it is necessary to check not only whether the program works as intended but also whether there are any unintended operations. C. The objective of program testing is to verify its completeness, and the test should be planned under the assumption that all errors can be detected. D. The black box method is used for the test of internal structure, and the white box method is....

B

What is the tree below called?

Binary search tree(5,3,7..)

# You are building a new database for a company with 10 departments. Each department contains multiple employees. In addition, each employee might work for several departments. How should you logically model the relationship between the department entity and the employee entity?

Create a new entry, create a one-to-many relationship from the employee to the new entry, and create a one-to-many relationship from the department entry to the new entry.

Which of the following is an appropriate method to manage user IDs for a company's in-house system? A. IDs for retired employees should be kept until removal is requested by them. B. Shared IDs are recommended rather than personal IDs in order to reduce consumption of system resources. C. When users are transferred, new access privileges should be granted in addition to the previously vested access privileges. D. Registered IDs and user privileges should be regularly inspected.

D

Which of the following is the most appropriate indicator that is directly helpful in managing software quality in a system development project? A. Number of completed work packages that compose a WBS B. Program version and modification level C. Productivity of individual programming D. Period of time required to adequately review each deliverable

D

C

How many binary numbers can be represented using a 6-bit number that does not have two contiguous 1s? For example, "101010" does not have two contiguous 1s. a) 8 b) 13 c) 21 d) 34

In the X -R control chart that is used to determine whether a process is in control or out

When at least seven consecutive plots are above or below the center line

C

Which of the following is an appropriate description concerning a max heap whose node values are 3, 6, 11, 17, 19, 22, and 32? a) All node values at the deepest level are smaller than those at the upper level. b) Only one unique heap can be represented graphically. c) The root node value is always "32". d) There is a possibility that "3" is a child of the root node.

D

Which of the following is an appropriate description concerning a use case diagram in UML? a) It is used to describe the sequence of states that an object goes through in response to external events. b) It is used to model the functional, informational, behavioral, and organizational workflow perspectives. c) It is used to represent mutual actions by means of messages sent and received between objects. d) It is used to show what system functions are performed for which actor, from the user's perspective.

A

Which of the following is an appropriate example of the effective utilization of RFID? a) Identification and control of humans or objects by using a small wireless chip b) Information entry by scanning a digital code printed on paper through a reader c) Short-range data communication using infrared rays d) Voice data communications between a cell phone and headphones

A

Which of the following is an appropriate form of transaction where one company (i.e., the bidder) gains a decisive share of the basic equity of another target business? a) Acquisition b) Business alliance c) Capital participation d) Merger

C

Which of the following is an improvement index in supply chain management? a) Ratio of increase in number of loyal customers b) Ratio of prevention of drop in unit sales price c) Ratio of reduction in dead stock d) Ratio of reduction in overtime

C

Which of the following is the appropriate method that supports both private key cryptography and public key cryptography, enables users to securely exchange e-mail messages, and to secure files, disk volumes, and network connections with both privacy and strong authentication? a) DES (Data Encryption Standard) b) DSA(Digital Signature Algorithm) c) PGP (Pretty Good Privacy) d) RSA (Rivest, Shamir, and Adleman)

C

Which of the following is the most appropriate description concerning maintenance management that is to be planned for the development environment of an embedded system used during the development of a product? a) It is necessary that the development environment leased from a rental company be always maintained under the responsibility of the rental company. b) It is necessary to maintain the development environment by updating it to reflect the latest status, even if it is not frequently used. c) It is necessary to maintain the development environment such as through periodic operational checks regardless of usage frequency. d) It is not necessary to maintain the development environment after the commercialization of the product because the environment is not used again.

A

Which of the following is the most appropriate purpose of using DTD (Document Type Definition) with XML? a) It is used to check if a well-formed XML document is valid. b) It is used to check if XML syntax rules are met. c) It is used to describe constraints imposed on XML data types. d) It is used to perform XML syntax analysis.

B

Which of the following is the primary purpose to use RAID? a) To achieve a lower hardware cost b) To ensure higher reliability and/or performance c) To improve data security d) To simplify the hardware configuration for a quick and easy installation

C

https://goo.gl/H14uW5

D

https://goo.gl/HJKvV1

# The instruction pipeline is a technique used in order to improve the CPU performance. Instructions are divided into stages and moved through the processor. An RISC processor has five-stage pipeline (Instruction fetch, Instruction decode, Execute, Memory access, Register write back)

14

75. When ABC analysis is used to categorize product items in the table below, which of the following is the combination of the product numbers for the items that are categorized into the group "A"? Product number Annual sales quantity Unit price Annual sales amount 1 110 2 220 2 60 40 2,400 3 10 4 40 4 130 1 130 5 50 12 600 6 1 25 25 7 10 2 20 8 150 2 300 9 20 2 40 10 50 1 50 Total 591 3,825 a) 1 and 2 b) 2 and 5 c) 2 and 6 d) 4 and 8

2 and 5

# The formula shown below is represented in postfix (or reverse Polish) notation. Which of following is the resulting value of this formula? 5 1 - 3 * 3 1 - 2 * /

3

# There is a CPU with an internal clock frequency of 700 MHz. The number of clock cycles for executing instructions and their appearance rates are shown in the table below. What is the approximate performance (measured in MIPS) of this CPU?

50

# There are a total of 1,900 students in a school, 553 of whom are taking a course in computer science, 667 of whom are in mathematics, and 290 of whom are in both computer science and mathematics. How many students are not taking a course in either computer science or in mathematics?

970

A systems design is represented using several diagrams. When a system analyst wants to confirm the design information such as the relationships among functions and the interface among modules in a hierarchical manner, which of the following is the most appropriate diagram that should be inspected by the analyst? A. WBS diagram B. State transition diagram C. Entity-relationship diagram D. Data flow diagram

A

Cache memory is usually organized at multiple levels, such as L1 for level 1 and L2 for level 2, with L1 having the smallest storage capacity but the fastest memory speed. The data in L1, L2, and main memory can be accessed using 1, 10, and 100 clock cycles, respectively. When the cache miss rates in L1 and L2 are 5% and 50% respectively, what is the average memory access time in clock cycles? A. 3.7 B. 52.3 C. 2.8 D. 37

A

How many binary numbers can be represented using a 6-bit number that does not have two contiguous 1s? For example, "101010" does not have two contiguous 1s. A. 21 B. 8 C. 13 D. 34

A

In a TCP/IP network using IPv4 addresses, which of the following is an effective IP address that can be allocated to a network device? A. 203.164.15.9/28 B. 252.169.15.40/30 C. 172.16.5.0/40 D. 192.168.251.256/25

A

In a certain project, each of the 6 employee members needs to communicate on a one-to-one basis. What is the minimum number of paths needed to communicate in such a way? A. 15 B. 30 C. 6 D. 9

A

In memory pool management of a real time system using various sizes of memory resources, which of the following is an appropriate characteristic of the fixed-length method in comparison with the variable-length method? A. The memory efficiency is poor, and the processing speed for allocation and deallocation is fast and constant. B. The memory efficiency is good, and the processing speed for allocation and deallocation is slow and constant. C. The memory efficiency is poor, and the processing speed for allocation and deallocation is fast and variable. D. The memory efficiency is good, and the processing speed for allocation and deallocation is slow and variable.

A

25. There are some methods of getting backup files for the purpose of recovering files and managing generations. Which of the following is an appropriate description concerning those methods or procedures? a) A differential backup contains all files changed after the last full backup, while an incremental backup saves all files changed after the last full, differential, or incremental backup. b) A differential backup may take longer to restore files than an incremental backup, because the most recent versions of files are spread across a larger number of backup sets. c) A multiplexed backup is used as a mixed combination of a full backup, a differential backup, and an incremental backup. d) An incremental backup tends to take longer to get backup files than a differential backup, because more files are copied during each backup.

A differential backup contains all files changed after the last full backup, while an incremental backup saves all files changed after the last full, differential, or incremental backup.

A model that encompasses a group of adaptive, iterative, and incremental

A, F, B, E, C, D

There is a series of project activities to be performed by two employes members, Mr. K and Mr. L. When each of them works alone, it can be completed by Mr. Kin 3 hours and by Mr. L in 6 hours. When Mr. K starts to work at 9:00 a.m. and then Mr. L starts to work with Mr. Kat 10:00 a.m., which of the following is the time at which all the activities are completed? Here, the activities can be divided and performed in parallel by the two members without any loss of productivity. A. 11:40 a.m. B. 11:20 a.m. c 10:10 am

B

View the picture and choose right answer. https://drive.google.com/file/d/1veEDEzluKd0NnZgzVclx86-aGeAliid_/view?usp=sharing When the series of operations below is performed on an empty stack, which of the following is the data remaining on the stack? Here, "push x" is the operation to save data x to the stack, and "pop" is used to retrieve data from the stack. push 3 -> push 9 -> pop -> push 3 -> push 9 -> pop -> push 5 -> pop A. 9 and 3 B. 3 and 3 C. 3 and 9 D. 3 and 5

B

Which of the following is a UML diagram that can be used to describe interactions among a number of objects in terms of an exchange of messages? A. Use case diagram B. Sequence diagram C. Class diagram D. Activity diagram

B

Which of the following is an appropriate description concerning interconnection devices between LANS? A. The gateway converts the protocols of only the first through third layers of the OSI basic reference model. B. The repeater extends the transmission distance by amplifying signals between the same types of segments. C. The bridge relays frames based on the IP address. D. The router relays frames based on the MAC address.

B

Which of the following is an appropriate description in comparison of how to safeguard IC cards and magnetic cards against forgery? A. A magnetic card is more robust against forgery than an IC card because the magnetic card stores information on a magnetic stripe and has a more complicated data protection mechanism. B. An IC card is more robust against forgery than a magnetic card because the IC card provides the features of storing and encrypting information in the IC chip. C. An IC card is more robust against forgery than a magnetic card because the IC card uses a two-dimensional code for information recording. D. A magnetic card is more robust against forgery than an IC card because the magnetic card uses a bar code for information recording.

B

Which of the following is an appropriate purpose of introducing groupware? A. To shorten the period of system development and improve the efficiency of maintenance by installing a suite of packaged software B. To enhance the overall work efficiency of the organization by providing an environment for collaborative work C. To enhance the organization's Internet security by implementing a solution that combines both hardware and software into a single security product D. To integrato arounware into enuinment such as Pre and norinheral devices and......

B

Which of the following is the most appropriate description concerning maintenance management that is to be planned for the development environment of an embedded system used during the development of a product? A. It is necessary that the development environment leased from a rental company be always maintained under the responsibility of the rental company. B. It is necessary to maintain the development environment such as through periodic operational checks regardless of usage frequency. C. It is necessary to maintain the development environment by updating it to reflect the latest status even if it is not frequently used...

B

Which of the following is the most appropriate set of major functions supported by an OS? A. I/O management, multimedia management, and security management B. Data management, job management, and task management C. Development tool management, job management, and memory management D. Compiler management, I/O management, and network management

B

Which of the following is the test that is performed to ensure that the components and modules of a system can communicate with one another in accordance with the functional specifications and design? A. Unit test B. Integration test C. System test D. Operational test

B

Which of the following statements concerning programming languages appropriately describes Java? A. It is a markup language used on the Web and describes the document structure using tags. It enables the creation of hypertext that links text, movies, etc. B. It enables the creation of applets and other programs that run in web browsers. The applets can be run on any environment where virtual machines are implemented. C. It is an interpreter-type, object-oriented language developed in the 1970's and includes editor, debugger, and other integrated development environment as well as OS functions..... D. ....

B

Which of the following is a type of integration test that has the characteristics listed below?

Big bang test

In software development, which of the following is the method that is used to test the functions of modules in accordance with specifications without respect to their internal structures?

Black box test

# Which of the following appropriately describes a typical feature of ADSL?

By separating the frequency bands used by analog telephones and data communications, it allows both of these connections to be used simultaneously

The following items are these procedures of the KJ method but in un-order list. Please choose a CORRECT order list for them. 1. Information Collection 2. Grouping and Naming 3. Theme Identification 4. Card Making 5. Analysis and Evaluation A. 4, 3, 1, 2,5 B. 1, 3, 2, 4,5 C. 3,1,4,2,5

C

Which of the following is a mechanism used in electronic commerce to exchange data between companies? A. SSL B. CA C. EDI D. XBRL

C

Which of the following is an activity performed during the external design phase of system development? A. Finalizing the performance requirements B. Designing the programs C. Designing the screens and form layouts D. Designing the physical data

C

Which of the following is an essential activity for achieving a fault tolerant system? A. Taking a data backup periodically so that after the occurrence of a failure the state prior to the failure can be restored promptly in an alternate system environment B. Designing simple operations in which operational errors do not occur easily, or designing an operation in such a way that even if an operational error occurs, it does not result in a fatal error C. Providing redundancy for a system configuration to minimize the effect of a component failure so that the processing can be continued without any effect on the overall system D. ......

C

Which of the following is the method that uses information technology to collect and analyze customer information, so as to establish a favorable relationship with the customers, retain customer loyalty, and increase company profit from a long term perspective? A. PPM B. BSC C. CRM

C

Which of the following is the most appropriate index indicating the performance of a laser printer? A. Spacing of printed lines and number of lines that can be printed per second B. Types of characters printed and number of characters that can be printed per second C. Number of dots per inch and number of pages that can be printed per minute D. Number of horizontal dots and number of vertical dots used to print a character and number of characters that can be printed per second

C

Which of the following is widely used as a computer port for a printer connection? A. SCSI port B. Serial port C. USB port D. IEEE 1394 port

C

In the stage of system design, when an audit is performed on the control for reducing the risk that user requirements are not met, which of the following is a point to be checked?

Checking if the user department participates in the review of the system design documents

When software asset management is audited, which of the following is an appropriate point

Checking to see if evidence, such as a software license certificate, is properly filed and

In reliability design, which of the following is an appropriate example of fail-soft? A. In order not to stop a system because of partial functional failures, the system is composed only of hardware and software that are fully verified and highly reliable. B. On the input screen of a reception system that requires an e-mail reply, two input fields for the e-mail address are provided and checked to see if they are the same. C. In order not to lose data even when an application is shut down by mistake, the application regularly saves a copy of data on a storage device during editing. D. In a system with a cluster configuration, even when a server does not work, another server takes over applications and provides functions.

D

See the picture and choose right answer. How many multiplications at a minimum must be performed in order to calculate the polynomial expression "x^4-2x^3 +5x^2+x-6°"? A.2 B.6 C.5 D.3

D

The integration test for software that is composed of a set of modules arranged in a hierarchical structure is performed from a high-level module. In such a case, which of the following is a test module that is used as a substitute for the low-level module? A. Emulator B. Driver C. Simulator D. Stub

D

There is a series of project activities to be performed by two employes members, Mr. Kand Mr. L. When each of them works alone, it can be completed by Mr. K in 3 hours and by Mr. L in 6 hours. When Mr. K starts to work at 9:00 a.m. and then Mr. L starts to work with Mr. Kat 10:00 a.m., which of the following is the time at which all the activities are completed? Here, the activities can be divided and performed in parallel by the two members without any loss of productivity. A. 10:40 a.m. B. 10:20 a.m. C. 11:40 a.m. D. 11:20 a.m.

D

When there are several business systems available in a company, which of the following is the most appropriate method for access control? A. In order to promptly respond to the change in the person in charge of a business operation, a common user ID is used for each business group. B. Based on the name list of the new employees, the registration of all users is performed beforehand in all business systems. C. When staff reassignment occurs frequently, the access rights are changed all at once at the beginning of the year. D. Irrespective of the user's job title, the appropriate access rights are set in each business system on the basis of the user's job role.

D

Which of the following is a security measure where it is effective to confirm the destination address with the sender when an e-mail is sent? A. A preventive measure against unauthorized relay of e-mail B. Anti-spam measure using OP25B C. Anti-spam measure using SPF D. A preventive measure against wrong transmission of e-mail

D

Which of the following is an appropriate description concerning MTBF and MTTR? A. MTTR increases and MTBF decreases through the remote maintenance of a system. B. MTBF increases as the number of device types that constitute the system increases. C. MITR increases owing to functions such as an error log or an instruction trace. D. MTBF increases through the preventive maintenance of a system.

D

Which of the following is an appropriate description concerning an applet? A. A language that is used for creating a Web page B. when the Web browser accesses the Web site C. A document file that is transmitted from a Web site and saved onto the user's PC D. A program that is downloaded from a Web server and embedded into a client browser, and then executed in the browser

D

Which of the following is the appropriate item to be checked when the ordered software is delivered? A. The activity report indicates that there is no delay in making progress on activities. B. A quality management plan is provided. C. The details of the cost estimation submitted by the supplier are reasonable. D. The functions described in the specifications are implemented.

D

Which of the following network equipment must know the IP address? A. Repeater B. Hub/ switch C. Bridge D.Router

D

https://drive.google.com/file/d/1z-llPxQfR3hlvaJwLAlod2fu6MDim29_/view?usp=sharing https://drive.google.com/file/d/129VOpT6AJCCOfe-iIzSaALWXyUj_DYCS/view?usp=sharing The diagram below shows the state transition of the tasks in a multitasking computer system. When does a task in the running state move to the ready state? A. When an I/O request is issued B. When a task is generated C. When a process based on an I/O request is completed D. When a task with a higher priority is set to the ready state

D

# Which of the following is the term that refers to collecting a large volume of data through a variety of corporate activities, organizing, integrating, and saving the data for specific purposes, and using it for decision-making support, for example?

Data warehouse

Which of the following is the appropriate flow of execution of SQL statements?

Decomposition ? Optimization ? Code generation ? Execution

# The figure shown below represents a logic gate and its timing chart. Which of the following is an appropriate logical function of this gate? Here, both A and B are the input signals and F is the output signal.

Exclusive-NOR

Which of the following is an appropriate technique that is used for implementing a queue as a data structure?

FIFO

D

For the purpose of monitoring the execution process of a program in order of time, which of the following is used as a dynamic debugging tool that records the contents of the memory and registers as well as the execution sequence of program instructions? a) Assertion checker b) Code auditor c) Inspector d) Tracer

Which of the following is the data transmission technique that has features or characteristics shown below?

Frame relay

D

Full backup and differential backup are two methods of backing up a database. Which of the following appropriately describes the differential backup method? a) It requires a longer backup time than full backup. b) Only the differential data must be restored at error recovery time, so the recovery time is shorter than that of the full backup method. c) This method cannot be used in alternation with full backup. d) To recover a database, the full backup data is restored and then the differential backup data is added.

Which of the following is a business organization that is divided according to the type of work performed as shown in the chart below?

Functional organization

19. Backup sites, which are used during system downtime, are classified into three types: warm, cold, and hot sites. In general, which of the following is the list arranged in order from shortest to longest recovery time? a) Cold site, warm site, hot site b) Hot site, warm site, cold site c) Warm site, cold site, hot site d) Warm site, hot site, cold site

Hot site, warm site, cold site

C

How many magnetic tapes are required to create and manage backup copies of server files under the following conditions? [Processing conditions] (1) A full backup copy is made at the beginning (on the first day) of each month. One magnetic tape is required per full backup. (2) An incremental backup copy is made each day between the day following the day when a full backup copy is made and the day when the next full backup copy is made. An incremental backup copy is added to a separate magnetic tape dedicated to incremental backups. All the incremental backup copies made during a one-month period can be recorded on a single magnetic tape. (3) It is guaranteed that any file can always be restored to the state of any specified day with respect to any data for any day not earlier than this day six months ago. Here, if this day of the month did not exist six months ago, it is guaranteed that any file can be restored to the state of any specified day with respect to any data for any day not earlier than the last day six months ago. (For example, if the current day is October 31, it is guaranteed that any file can be restored to the state of any specified day with respect to any data for any day not earlier than April 30.) a) 12 b) 13 c) 14 d) 15

D

How many tracks are required to store a sequentially organized data file including a total of 10,000 records on the hard disk drive under the following conditions? Here, each track can contain multiple blocks, but each block cannot be stored across multiple tracks. [Conditions] Record length: 300 bytes/record Track capacity: 30,000 bytes/track Inter-block gap: 400 bytes Blocking factor: 20 records/block a) 100 b) 106 c) 107 d) 125

36. Which of the following sets of standards should be applied for the purpose of developing the new products that are expected to be employed by government agencies of countries who are members of the WTO?

ISO standards

80. Which of the following sets of standards should be applied for the purpose of developing the new products that are expected to be employed by government agencies of countries who are members of the WTO? a) ANSI standards b) FCC standards c) IEEE standards d) ISO standards

ISO standards

A

In a preemptive multitasking OS environment, when a process is preempted by another process with a higher priority, which of the following is the appropriate state where the former process is to be placed? a) Ready b) Running c) Terminated d) Waiting

B

In a relational database system, which of the following is an appropriate purpose of recording changes in a database file as a journal file? a) To determine whether to commit or roll back the database updates b) To enable recovery to be undertaken effectively in the event of a failure c) To move transaction log records to the database backup files d) To support concurrency control of the simultaneous execution of transactions

D

In a system audit, which of the following acts as audit evidence? a) Findings described in the audit report by the audit team b) Individual audit plans created by the audit team c) Minutes of the meeting held by the audit team to collect the audit opinions d) System operation records obtained by the audit team from the audited department

C

In memory pool management of a real time system using various sizes of memory resources, which of the following is an appropriate characteristic of the fixed-length method in comparison with the variable-length method? a) The memory efficiency is good, and the processing speed for allocation and deallocation is slow and constant. b) The memory efficiency is good, and the processing speed for allocation and deallocation is slow and variable. c) The memory efficiency is poor, and the processing speed for allocation and deallocation is fast and constant. d) The memory efficiency is poor, and the processing speed for allocation and deallocation is fast and variable.

Which of the following is a role of the program register (i.e., program counter) of the CPU?

In order to read out an instruction, it contains the address where the next instruction is stored.

A

In reliability design, which of the following is an appropriate example of fail-soft? a) In a system with a cluster configuration, even when a server does not work, another server takes over applications and provides functions. b) In order not to lose data even when an application is shut down by mistake, the application regularly saves a copy of data on a storage device during editing. c) In order not to stop a system because of partial functional failures, the system is composed only of hardware and software that are fully verified and highly reliable. d) On the input screen of a reception system that requires an e-mail reply, two input fields for the e-mail address are provided and checked to see if they are the same.

B

In some systems, the system manually or automatically determines memory blocks which are no longer referenced by a program and reorganizes the memory space so that it can be available for subsequent allocation. What is this process called? a) Fragmentation b) Garbage collection c) Swapping d) Thrashing

C

In the OSI basic reference model, which of the following layers provides a set of rules for establishing and terminating the connection between applications on computer systems? a) Data link layer b) Network layer c) Session layer d) Transport layer

# Which of the following is the appropriate description concerning the performance evaluation of a computer system?

In the case of a system in operation, a software monitor can be used to collect and analyze statistical data, thereby permitting performance-related problems to be grasped.

D

In the course of object oriented design, which of the following can be regarded as a subclass of the base class "automobile"? a) Engine b) Serial number c) Tire d) Truck

D

In the product life cycle, which of the following is the stage where the market begins to understand the value of the product, and both product lines and sales channels need to be expanded? a) Introduction stage b) Decline stage c) Growth stage d) Maturity stage

D

In the term "ACID", which is the basic foundation that database transactions are built upon, what does the third character "I" stand for? a) Independence b) Integrity c) Interactivity d) Isolation

Four types of processes including service delivery process, relationship process

Information security management

Which of the following provides a job management function in OS that selects a program with the highest execution priority in the job queue and allocates resources

Initiator

52. Which of the following is the test that is performed to ensure that the components and modules of a system can communicate with one another in accordance with the functional specifications and design? a) Integration test b) Operational test c) System test d) Unit test

Integration test

Which of the following is the language processor that translates and executes a source program written in high-level language, on a line-by-line basis?

Interpreter

99. In computer hardware, what does IRQ stand for?

Interrupt Request

According to ISO 9241-11, usability is defined as the "extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and

Interview method

When there are several business systems available in a company, which of the following is the most appropriate method for access control?

Irrespective of the user's job title, the appropriate access rights are set in each business system on the basis of the user's job role.

Which of the following is an appropriate description concerning flash memory

It can write data electrically and erase it electrically in units of blocks

Which of the following is an explanation concerning non-functional requirements definition

It clearly defines the quality requirements, technical requirements, and operational

Which of the following is an explanation of SOA (Service-Oriented Architecture)?

It is a concept that the functions of software are considered as components called

# Which of the following appropriately explains the function point method, which is one of the estimation methods used in system development?

It is a method for estimating the system size by evaluating system functions quantitatively on the basis of the amount of input/output data, the number of files, etc. and by making proper adjustments based on the complexity and characteristics of the application.

Which of the following is an organization structure where employees report to both their

Matrix organization

In the product life cycle, which of the following is the stage where the market begins to understand the value of the product, and both product lines and sales channels need to

Maturity stage

Among the descriptions concerning personal data, which of the following is not an appropriate description from the viewpoint of "OECD

Personal data should be allowed to be acquired without announcing the acquisition of

Which of the following is an appropriate measure that management takes to guarantee the apparent independence of internal system auditors?

Placing the department of auditors under the direct control of management

32. As shown below, there are two relational database tables Movie and Actor. Which of the following SQL statements should be used for retrieving a list of movie titles, released years, and directors, from all the movies that include "Action" or "Comedy" as a genre and "Cooper" as an actor's name? Here, there is no movie remade with different actors, so "Title" and "Movie_title" are both primary keys in each table. Movie (Released_year, Title, Director, Genre, Description) Actor (Name, Movie_title, Role) a) SELECT Movie_title, Released_year, Director FROM Movie, Actor WHERE Name = 'Cooper ' AND (Genre = 'Action ' OR Genre = 'Comedy ') AND Title = Movie_title b) SELECT Movie_title, Released_year, Director FROM Movie, Actor WHERE Name = 'Cooper ' AND Genre = 'Action ' AND Genre = 'Comedy ' AND Title = Movie_title c) SELECT Title, Released_year, Director FROM Movie, Actor WHERE Name = 'Cooper ' AND (Genre = 'Action ' OR Genre = 'Comedy ') d) SELECT Title, Released_year, Director FROM Movie, Actor WHERE Name = 'Cooper ' AND Genre = 'Action ' AND Genre = 'Comedy '

SELECT Movie_title, Released_year, Director FROM Movie, Actor WHERE Name = 'Cooper ' AND (Genre = 'Action ' OR Genre = 'Comedy ') AND Title = Movie_title

Which of the following is the attack where malicious input data is given to a Web

SQL injection

Which of the following enables users to connect to the system of a service provider via the Internet and make online use of the necessary functions

SaaS (Software as a Service)

45. Statement A: ACID stands for Atomicity, Consistency, Interprocess, Durability.Statement B: The C (consistency) property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules, including constraints, cascades, triggers, and any combination thereof. Which of the following choice is CORRECT?

Statement A is FALSE, and Statement B is TRUE.

71. Which of the following describes characteristics of the growth stage of the product life cycle? a) Demand decreases, and some companies withdraw from the market. In this stage, the company decides if it can maintain its competitive advantage and examines the possibility of entering alternative markets. b) Demand increases, and the differentiation of the product and the segmentation of the market become more apparent. Competition also increases, and the company needs to create a new variety of products and reduce costs. c) Demand is limited, and it is essential to create new demand. The company needs to sell the product to specific target customers with conviction. d) The market begins to understand the value of the product. The company needs to expand its product lines and distribution channels. During this stage, sales increase but more investment is required.

The market begins to understand the value of the product. The company needs to expand its product lines and distribution channels. During this stage, sales increase but more investment is required.

C

There are two methods of biometric authentication: one extracts physical characteristics and the other extracts behavioral characteristics. Which of the following uses behavioral characteristics? a) Authentication is performed by extracting characteristics from the branch angle of a branch point of a blood vessel and from the distance between branch points. b) Authentication is performed by extracting characteristics from the chaotic pattern of wrinkles spreading out from the pupil. c) Authentication is performed by extracting characteristics from the writing speed and pen pressure used when a signature is produced. d) Authentication is performed by extracting characteristic points called minutiae from the pattern formed by ridge lines.

D

There is a digital video recording system installed with four security cameras. In this system, the video data from each camera is captured at 30 frames per second with a resolution of 640×480 pixels and a color depth of 16 bits per pixel, and then it is stored in the hard disk drive. Which of the following is the approximate storage capacity that is required for recording all video data for one minute? Here, 1MB is 106 bytes, and 1GB is 109 bytes. a) 19 MB b) 74 MB c) 1.2 GB d) 4.5 GB

46. In a relational database system, which of the following is an appropriate purpose of recording changes in a database file as a journal file?

To enable recovery to be undertaken effectively in the event of a failure

Which of the following is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or

Virtualization

2. Which of the following diagram/ chart is corresponding to the following statement? It describes the overview to detail elements may be a product, data, service, or any combination thereof. It also provides the necessary framework for detailed cost estimating and control along with providing guidance for schedule development and control.

WBS

# Which of the following is the method in which the designer and a group of involved personnel review the design documents at the completion of each design for the purpose of early detection of design errors?

Walk-through - 22

Which of the following is the software development process model that aims to achieve a high degree of completion of a system by dividing the system into some subsystems and

Waterfall model

A

What is the purpose of attaching a digital signature to software disclosed on the Internet? a) To guarantee that the software contents have not been tampered with b) To limit the use of the software to certain specified users c) To make it clear that the copyright of the software belongs to the person whose signature appears there d) To notify that the software's author is the person in charge of maintenance

D

When a network device is connected to the LAN with the network address of 201.12.1.64 and the subnet mask of 255.255.255.192, which of the following IP addresses should NOT be assigned to the device on the network? a) 201.12.1.65 b) 201.12.1.96 c) 201.12.1.126 d) 201.12.1.127

C

When an audit is performed on the reliability of programming, which of the following is the most appropriate item to be reported as a finding? a) A third party other than the programmer who creates the program performs the integration test. b) The programmer performs programming based on the program design specifications. c) The programmer selects a subset of unit test items from all the program logic paths on a sampling basis. d) The programming team leader records and stores the execution results of the unit test.

A

When an information strategy is developed, which of the following is an item that must always be made consistent with the strategy? a) Medium and long-term management plans b) New emerging information technologies c) The annual plan of the information systems department d) The improvement plan of a mission-critical system

B

When an optical fiber cable is used for data communication, which of the following is the approximate bandwidth (in units of THz) of the light within the range of wavelength from 1000 to 1400 nanometers? Here, in consideration of data transmission efficiency and such other factors, the effective speed of the light on the optical fiber cable can be assumed to be 2×108 m/s. a) 50 b) 57 c) 75 d) 86

D

When analog audio signals are converted into digital audio signals using the PCM method at a sampling rate of 44.1 kHz, which of the following determines the amount of the encoded digital data. a) The maximum amplitude of the audio signals b) The maximum frequency of the audio signals c) The playback frequency of the audio data d) The quantization bit width of the audio data

61. From a viewpoint of reliability of systems, which of the following is the appropriate timing for measuring the availability of a system? a) When failures begin to increase because of the aging of the system through long-term operations b) When system operations are started c) When the decision is made on whether or not to release the system d) When the problems found immediately after the start of system operations have been resolved and the system is becoming stable

When the problems found immediately after the start of system operations have been resolved and the system is becoming stable

33. From a viewpoint of reliability of systems, which of the following is the appropriate timing for measuring the availability of a system?

When the problems found immediately after the start of system operations have been resolved and the system is becoming stable

D

Which of the following appropriately describes a cause-and-effect diagram? a) It classifies the collected data into a few categories, draws the number of data for each category as a bar graph, and captures variance in quality. b) It classifies the data into a few categories, sorts the categories from the largest to the smallest as a bar graph along the horizontal axis, draws the cumulative values as a line graph, and sorts out problems. c) It expresses variance of time series data as a line graph and achieves an objectively controlled state by using control limit lines. d) It systematically arranges the relation between cause and effect in a fishbone format and clarifies which causes are related to particular effects.

C

Which of the following appropriately describes a method of recording data on CD-R? a) A two-layer structure is provided in which two disks are bonded together. The recording layer is subjected to phase changes by means of laser beams, thereby recording the data. b) Laser beams are radiated on the magnetized disk recording film to heat the film and to change the magnetization direction by means of a magnetic head, thereby recording the data. c) Laser beams are radiated onto an organic dye layer in a disk. As a result, a series of burned spots called pits are created on that layer, thereby recording the data. d) The magnetization direction of the magnetic substance applied to a disk is changed by means of a magnetic head, thereby recording the data.

A

Which of the following appropriately describes a typical feature of ADSL? a) By separating the frequency bands used by analog telephones and data communications, it allows both of these connections to be used simultaneously. b) Compared to single use of a PC, the use of a splitter reduces the communication speed when both analog telephone and the PC are used at the same time. c) It achieves high-speed communication by using a bundle of multiple channels of 64Kbps. d) The communication speed varies between upstream (from the user to the telephone company) and downstream; it is suitable for communication applications where the amount of upstream data is large.

D

Which of the following appropriately describes cache memory? a) An interrupt occurs if a cache miss is detected when the main memory is accessed, and the program transfers data from the main memory to the cache memory. b) The cache memory is used to make up the difference of capacity between the real memory and the virtual memory. c) The demand for cache memory is decreasing due to the rapid increase in the access speed of semiconductor memory. d) Two methods exist: one is to rewrite both the cache and main memory when a write instruction is executed; the other is to rewrite only the cache memory while the main memory is not rewritten until the data is removed from the cache memory.

A

Which of the following appropriately describes the purpose of the cache memory used by processors? a) To compensate for the difference between the main memory access speed and the processor speed b) To manage frequently-used programs on a resident basis c) To perform virtual memory address conversion at high speed d) To perform virtual memory paging process at high speed

B

Which of the following appropriately describes the purpose of using WBS (Work Breakdown Structure) in software development? a) To divide development work into small tasks in a top-down manner, thereby facilitating work management b) To estimate development cost and place the full weight of cost management c) To find the critical path at an early stage and focus on such a path d) To make a work schedule in consideration of available resources

A

Which of the following appropriately describes the purpose of using a check digit? a) To detect an error of the inputted code value b) To detect an error of the number of inputted code digits c) To detect an error that alphabetic characters and/or symbols are mixed in data inputted into the numerical item d) To detect an error that the inputted data value is out of the predefined range

D

Which of the following appropriately explains a tracer as one of the dynamic debugging tools? a) At an abnormal end of the program, it outputs the contents of the memory and registers. b) Every time it executes code for debugging, which is embedded in the program, it outputs the contents of the memory and registers. c) It creates a pseudo-environment necessary for the execution of the program. d) It outputs the contents of the memory and registers in order to monitor the results of the program execution in chronological order.

A

Which of the following appropriately explains benchmarking used in business management? a) It is to make comparisons with the strongest competitors or advanced companies in order to scope out best practices for setting business goals, and to gain an understanding of products, services, and practical methods qualitatively and quantitatively. b) It is to pick out company's own skills and technologies that are profitable and superior to those of other companies. c) It is to promote quality control in all departments in an integrated manner for the purpose of quality improvement, to check up the degrees of improvement in the quality of in-house products, and to make comparisons with the quality of competitors' products. d) It is to redesign business processes, to make full use of information technologies, and to transform the existing constitution and structures fundamentally.

B

Which of the following appropriately explains the function point method, which is one of the estimation methods used in system development? a) It is a method for estimating the person-hours and time period for development on the assumption that the scale of development is figured out. This method can be applicable not only to business area but also to all areas. b) It is a method for estimating the system size by evaluating system functions quantitatively on the basis of the amount of input/output data, the number of files, etc. and by making proper adjustments based on the complexity and characteristics of the application. c) It is a method for looking into the differences among systems on the basis of the data of similar systems experienced in the past and estimating the size and person-hours by using the past data for the similar portions and the empirically predicted data for the different portions. d) It is a method for predetermining the reference values per unit of workload, dividing all the work items into the unit work items, and thereby estimating the total workload by making up all of them.

D

Which of the following appropriately explains the pipeline processing method of processors? a) Method whereby each of the multiple processors executes different instructions with its own data while communicating with each other b) Method whereby each of the multiple processors executes the same single instruction with its own data in a parallel way while synchronizing with the other processors c) Method whereby one processor reduces its execution time of a single instruction as much as possible d) Method whereby one processor simultaneously executes multiple instructions with slight delays in time

B

Which of the following can be achieved by receiving an e-mail text and its hash value from the sender, and then comparing this hash value with another hash value calculated by the recipient from the e-mail text? Here, the hash value that the recipient receives from the sender is correct. a) Checking the delivery of the e-mail b) Detecting the presence or absence of falsification in the e-mail text c) Preventing spoofing d) Preventing wiretapping of the e-mail text

A

Which of the following can be realized by using the packet filtering function of a firewall? a) To allow only the packets with specific TCP port numbers to pass from the Internet through to the internal network b) To change a packet with a dynamically assigned TCP port number to a TCP port number that is fixed at the receiving side and allow it to pass through to the internal network c) To check for tampering in the header and/or data of a packet received on the Internet and remove the packet if tampering has been found d) To repair a packet received on the Internet if it has been tampered with, or to record the packet in a log and prevent the packet from passing through to the internal network if the tampering cannot be repaired

B

Which of the following can make MTBF longer in system maintenance? a) To disperse a single-location maintenance center to various locations b) To do preventive maintenance c) To do provisional maintenance where a failure has occurred d) To do remote maintenance

C

Which of the following characteristics can be found in well-designed modules with a high degree of independence? a) High coupling and high cohesion b) High coupling and low cohesion c) Low coupling and high cohesion d) Low coupling and low cohesion

B

Which of the following design tasks is performed from the standpoint of the system developer, based on the deliverables of external design and in consideration of the implementation method and processing efficiency? a) Code design b) Functional decomposition and structured design c) Logical data design d) Screen flow design

A

Which of the following has the feature whereby only minimally limited OS functions, such as memory management and process management, are supported and other OS functions, such as the file system, are implemented as server processes? a) Microkernel b) Monolithic kernel c) Multithread d) Single user mode

D

Which of the following interrupts can signal to OS that a program might have gone into an infinite loop? a) Machine check interrupt b) Program Interrupt c) Supervisor call interrupt d) Timer Interrupt

C

Which of the following is a chart or a diagram that is often used in quality control to rank issues or problems in descending order of frequency? a) Cause-and-effect diagram b) Control chart c) Pareto chart d) Scatter diagram

D

Which of the following is a diagram that is used for modeling the event-driven or discrete behavior of an object in UML 2.x (i.e., UML 2.0 or later)? a) Activity diagram b) Object diagram c) Sequence diagram d) State machine diagram

D

Which of the following is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others? a) Clustering b) Distribution c) Load balancing d) Virtualization

C

Which of the following is a method whereby the relevant program is read into main memory and the CPU reads out and executes it sequentially? a) Addressing method b) Direct program control method c) Stored program method d) Virtual memory method

B

Which of the following is a qualitative and exploratory forecasting approach that is used for obtaining the most reliable consensus of opinions from a group of experts through a series of questionnaires? a) Brainstorming b) Delphi method c) Focus group d) Tree diagram method

D

Which of the following is a role of the program register (i.e., program counter) of the CPU? a) In order to decode an instruction, it contains the instruction that is read out from the memory. b) In order to execute a conditional branch instruction, it contains the state of operation results. c) In order to perform an arithmetic or logical operation, it contains data that is read out from the memory. d) In order to read out an instruction, it contains the address where the next instruction is stored.

B

Which of the following is a security measure where it is effective to confirm the destination address with the sender when an e-mail is sent? a) A preventive measure against unauthorized relay of e-mail b) A preventive measure against wrong transmission of e-mail c) Anti-spam measure using OP25B d) Anti-spam measure using SPF

D

Which of the following is a service delivery process that is defined, agreed, recorded, and managed in IT service management? a) Quality management b) Risk management c) Schedule management d) Service level management

C

Which of the following is a technique by which useful information and relationships are discovered and extracted from large amounts of customer and market data retained by a company? a) Data dictionary b) Data flow diagram c) Data mining d) Data warehouse

A

Which of the following is a type of integration test that has the characteristics listed below? [Characteristics] - All of the related program modules are combined and tested at once. - Neither drivers nor stubs are required. - It is useful for small programs, but not for commercial development projects. a) Big bang test b) Bottom-up test c) Sandwich test d) Top-down test

B

Which of the following is a typical method that is contained in agile software development? a) Dynamic programming b) Extreme programming c) Server-side programming d) Web programming

C

Which of the following is an appropriate characteristic of an RFID tag that is a type of IC tag and is used for locating and tracking merchandise, inventory, or other assets? a) It optically reads information encoded in a barcode. b) It reads information stored on magnetic material upon physical contact. c) It reads information without physical contact by using electromagnetic waves. d) It reads information without physical contact by using infrared rays.

B

Which of the following is an appropriate description concerning MTBF and MTTR? a) MTBF increases as the number of device types that constitute the system increases. b) MTBF increases through the preventive maintenance of a system. c) MTTR increases and MTBF decreases through the remote maintenance of a system. d) MTTR increases owing to functions such as an error log or an instruction trace.

C

Which of the following is an appropriate description concerning a digital envelope? a) The sender and recipient must securely share a single private key in advance, and the key is used for both encryption and decryption. b) The sender encrypts a hash of the data with the sender's private key. The recipient decrypts it by using the sender's public key, and checks if it matches a hash the recipient computes. c) The sender encrypts the message by using symmetric key cryptography and then encrypts the symmetric key by using public key cryptography. d) The sender encrypts the message by using the recipient's public key prior to sending it. The recipient decrypts the message with the recipient's private key.

B

Which of the following is an appropriate description concerning an interview or a hearing that is conducted during a system audit? a) The auditor should instruct the department under audit to take improvement measures for deficiencies identified during the interview. b) The auditor should make an effort to get documents and records that confirm the information obtained from the department under audit during the interview. c) The entire interview should be conducted by a single auditor, because discrepancies may occur in the record if multiple auditors are involved. d) The interviewee should be selected from managers of the department under audit who are knowledgeable about the business operations to be audited.

A

Which of the following is an appropriate description concerning cache memory? a) A write instruction rewrites cache in two ways: one is to rewrite both cache and main memory, and the other is to rewrite only cache until the cache data is removed. b) Cache memory is used to fill the gap in memory capacity between real memory and virtual memory. c) The substantial improvement in the access speed of semiconductor memory is making cache memory less necessary. d) When a cache miss occurs, an interrupt is generated so that the program can transfer data from main memory to cache memory.

D

Which of the following is an appropriate description concerning data backup? a) A backup should always be made to the same storage media in order to minimize the amount of time required to make a backup. b) A backup should be made to a magnetic tape in order to enable random access when data is restored from the backup. c) A differential backup method should be used to minimize the amount of time required to perform a full restore from backups. d) Backup processing should not overlap with ordinary business processing in order to guarantee the integrity of backed-up data.

C

Which of the following is an appropriate description concerning interconnection devices between LANs? a) The bridge relays frames based on the IP address. b) The gateway converts the protocols of only the first through third layers of the OSI basic reference model. c) The repeater extends the transmission distance by amplifying signals between the same types of segments. d) The router relays frames based on the MAC address.

C

Which of the following is an appropriate description concerning the implementation structure of a system audit? a) For an audit of development status in an information systems department, the audit team consists of department members familiar with the details of the development. b) When the auditor receives support from another expert, the expert is responsible for the scope of the support, the methods, and the judgment of the audit results. c) The auditor reports the results of the audit to the requester so that the requester can give instructions for improvement based on the audit report. d) When an information system audit is performed as part of a business operations audit, the audit team consists of staff members of the user department.

D

Which of the following is an appropriate description concerning the spiral model? a) A prototype is created for each phase of the waterfall model and the specifications are checked, in order to eliminate the difficulty of checking the specifications required by documents. b) System development proceeds in the order of process flow, so going back upstream results in a significant loss of efficiency. c) Systems are developed in a short time by involving users, performing development in small groups and utilizing development tools. d) The design and implementation of an application is performed for a unit of component, and then this process is repeated successively for every component.

A

Which of the following is an appropriate description concerning throughput? a) Spooling in which the output to the printer is temporarily stored on a hard disk drive is helpful for increasing the throughput. b) Throughput is an index of the CPU performance, and it is not affected by input/output speed, overhead time, and so on. c) Throughput is not affected even if an operator intervention between jobs causes idle time in the system. d) While multiple programming contributes to reduction in turn-around time, it does not help increase the throughput.

B

Which of the following is an appropriate example of VR (Virtual Reality)? a) A history teacher makes use of software to present a 3D image of ancient Rome that can be navigated by students to simulate walking through the entire city by using a mouse or a keyboard. b) Computer games and simulations make use of multimodal devices, such as a wired glove, a headgear, and an omni-directional treadmill, in order to provide very enriching and life-like experience for the user. c) GPS maps combined with layers of satellite images and GIS information provide accurate or close to accurate topographical information for researchers. d) Military aircraft equip pilots with headgear that provides heads-up display to combine maps, topographical information, battle ground feedback from various devices such as sensors and satellites.

A

Which of the following is an appropriate explanation concerning functions of keywords in SQL? a) "HAVING" specifies a search condition for an aggregate or a group. b) "INDEX" is a special way to join two or more tables. c) "LIKE" is used along with JOIN clause. d) "VALUES" is used to sort the data in ascending or descending order.

B

Which of the following is an appropriate explanation of DRAM? a) It is a memory chip on which data can be written using a specially-designed device and erased by exposure to ultraviolet light. b) It is often used as main memory, and one bit is represented depending on whether or not its capacitor is charged. c) It is used as memory to store microprograms that are written at the time of manufacturing. d) It is used as high-speed memory such as cache which is composed of flip-flops, and the manufacturing cost is high.

D

Which of the following is an appropriate explanation of IR (Investor Relations)? a) It is a business process of holding accountability to the investors and other stakeholders for the operational activities and business performance. b) It is a business process of implementing rules, manuals, and check systems based on the business ethics, and performing business activities in accordance with legal requirements and social norms. c) It is a business process of monitoring and checking whether the business management is adequate and appropriate so as to maintain the legitimacy of the business activities towards the investors. d) It is a business process of providing investors and analysts with accurate management information necessary for making investment decisions, on a timely and continuous basis.

C

Which of the following is an appropriate explanation of a franchise chain in the retail industry? a) A form of organization established by multiple retailers in which those retailers jointly perform their business activities such as procurement, inventory management, and product development b) A form of organization in which a group of outlets are opened in a commercial accumulation area that is planned and created through regional development activities c) A form of organization in which a head office provides to its members usage rights of its trademarks and signs, and also provides managerial training and assistance in exchange for a fixed rate of compensation d) A form of organization lead by a wholesale distributor in which multiple retailers voluntarily participate to gain the benefit of cooperation while their independence is maintained

A

Which of the following is an appropriate explanation of direct telemarketing? a) A type of direct marketing that involves not only selling products on the phone but also asking for donations or opinions b) A type of direct marketing that uses electronic mail as a means of communicating commercial or fund-raising messages to potential or current customers c) A type of direct marketing that uses short message service to send customers sales alerts, links to website updates, appointment or delivery reminders, or personalized messages d) A type of direct marketing where a company makes efforts to market products and services and to build customer relationships over the Internet

C

Which of the following is an appropriate language that can be used to develop applications running mainly on Web browsers? a) Java Applet b) JavaBeans c) JavaScript d) Java Servlet

C

Which of the following is an appropriate measure that management takes to guarantee the apparent independence of internal system auditors? a) Establishing the leaning system of audit techniques for auditors b) Making it obligatory for auditors to learn about IT continuously c) Placing the department of auditors under the direct control of management d) Specifying and announcing the knowledge and experience that auditors need

C

Which of the following is an essential activity for achieving a fault tolerant system? a) Automatically recording the history, such as the change information of the database, during the system operation in order to perform cause analysis and recovery when a failure occurs in the system b) Designing simple operations in which operational errors do not occur easily, or designing an operation in such a way that even if an operational error occurs, it does not result in a fatal error c) Providing redundancy for a system configuration to minimize the effect of a component failure so that the processing can be continued without any effect on the overall system d) Taking a data backup periodically so that after the occurrence of a failure the state prior to the failure can be restored promptly in an alternate system environment

C

Which of the following is an example of a daisy chain connection? a) A keyboard, a mouse, and a printer are connected to a USB hub, and then the USB hub is connected to a PC. b) A PC is connected to a measuring device and a printer via RS-232C and USB respectively. c) Industrial cameras with each having two IEEE 1394 ports are serially connected, and then one end is connected to a PC. d) Several network cameras are connected to a PC through an Ethernet hub or an Ethernet switch.

D

Which of the following is an explanation of "contact management" that is a basic function of SFA (Sales Force Automation)? a) Enhancing sales efficiency and effectiveness by responding promptly to inquiries from salespersons b) Improving the performance level of the entire sales department by identifying and sharing sales techniques accumulated on an individual basis c) Increasing the rate of order acceptance by having the entire sales organization respond to a customer, rather than having only a single salesperson do so d) Performing effective sales activities for existing and prospective customers by managing a set of records including customer visiting days and sales results

B

Which of the following is an explanation of a CIO? a) An executive who is positioned to perform investment decision-making, funding, accounting, and financial reporting b) An executive who is positioned to plan and execute strategies including information management and information system control c) An organization that is positioned to approve or reject the change requests made to the system d) An organization that is positioned to manage multiple projects in a consolidated manner

D

Which of the following is an explanation of core competence management? a) A flat organization structure with minimal hierarchical layers is maintained to accelerate decision making. b) Comparative analysis with other successful companies is performed to drive management innovation. c) Knowledge scattered across the company is shared to improve the overall problem solving capability. d) Management is centered on proprietary know-how and technology that are not easy for other companies to imitate.

D

Which of the following is classified as an external interrupt? a) An interrupt which is caused by overflow in floating point operations b) An interrupt which is generated when a request for a service, such as a demand for input/output, is issued to OS c) An interrupt which occurs when a page not existing in the main memory is to be accessed d) An interrupt which takes place when hardware detects malfunctions

C

Which of the following is described graphically using an E-R diagram? a) Data flows between processes b) Data source and destination c) Entities and relationships between entities d) Hierarchical data structure

A

Which of the following is equivalent to the logical expression below? Here, "AND" has higher precedence than "OR", and "NOT" has the highest precedence. x AND (y OR z) OR y AND (x OR z) OR x AND y AND z a) x AND y OR x AND z OR y AND z b) x AND y OR x AND z OR y AND z OR x AND (NOT y) c) x AND y OR z OR y AND x OR z OR x AND y AND z d) x AND z OR y AND z OR x AND y AND z

D

Which of the following is provided by an ASP (Application Service Provider)? a) A service in which a facility equipped with high-speed lines and earthquake-resistant equipment owned by the provider is provided in order to install the server and communication equipment of the customer b) A service in which an external provider collectively undertakes business operations such as general affairs, personnel affairs, accounting, and payroll calculation that are performed within the customer's organization c) A service in which some of the servers owned by the provider are lent to a customer and used like the customer's own servers d) A service in which the functions of a general-purpose application system are provided to several customers via a network

C

Which of the following is the appropriate RAID configuration that provides byte-level striping in combination with parity information and stores the parity for each stripe in a dedicated disk? a) RAID1 b) RAID2 c) RAID3 d) RAID4

C

Which of the following is the appropriate characteristic of "data oriented design" as compared with "process oriented design?" a) Data modeling is performed prior to the modeling of business operations. b) Data oriented design is effective for building a specific business application system in a short period of time. c) It is possible to consider data as shared resources and to manage it in a unified manner. d) It is possible to create data structures combined with business processes.

A

Which of the following is the appropriate combination of basic concepts of object-oriented approach? a) Abstraction, encapsulation, inheritance, and class b) Instantiation, Structuralization, sequence, and class c) Normalization, encapsulation, division, and class d) Virtualization, Structuralization, projection, and class

B

Which of the following is the appropriate description concerning black box testing? a) Attention is focused on the internal structures of programs, and verification is made as to whether necessary portions are executed. b) Even if any redundant code exists in a tested program, it cannot be detected. c) If branch instructions and modules increase in number, the amount of test data also leaps upward. d) The test case coverage is used as criteria for preparing test data.

A

Which of the following is the appropriate description concerning the functions of "driver" or "stub" used in the module test? a) "Driver" calls the module to be tested while passing arguments to it. b) "Driver" is a module that is called from the module to be tested. c) "Stub" displays and prints the value returned by the module to be tested. d) "Stub" is a module that calls the module to be tested.

C

Which of the following is the appropriate description of the "selection sort" algorithm? a) An intermediate reference value is determined, and then the elements are divided into two groups of "larger" values and "smaller" values. This operation is recursively repeated. b) Each set of the elements extracted at regular intervals is sorted, and then the interval is further decreased. The operation is repeatedly performed until the interval becomes 1. c) The element with the largest value is determined and swapped for the last element, and then the largest value of the unsorted elements is determined and swapped for the second-to-the-last element. This operation is repeated in the same way. d) Two adjacent elements are repeatedly compared and swapped if the first element is larger than the second. This operation is repeated until all elements are arranged in an orderly fashion.

C

Which of the following is the appropriate flow of execution of SQL statements? a) Code generation - Optimization - Decomposition - Execution b) Decomposition - Code generation - Optimization - Execution c) Decomposition - Optimization - Code generation - Execution d) Optimization -Decomposition - Code generation - Execution

D

Which of the following is the appropriate protocol that is used to send e-mail messages from one server to another over the Internet? a) FTP b) HTTP c) POP3 d) SMTP

C

Which of the following is the appropriate sequence of DB application development activities? ➞ a) Conceptual design ➞ Database planning ➞ Data conversion ➞ Physical design b) Conceptual design ➞ Database planning ➞ Physical design ➞ Data conversion c) Database planning ➞ Conceptual design ➞ Physical design ➞ Data conversion d) Database planning ➞ Physical design ➞ Conceptual design ➞ Data conversion

B

Which of the following is the appropriate statement concerning Newton's method that is known as an algorithm for obtaining the approximate value of the solution to the formula ƒ(x) = 0? a) An approximate value of the solution can be obtained even if the function ƒ(x) is indifferentiable. b) An approximate value of the solution is obtained geometrically using the tangent lines of y = ƒ(x). c) No matter what initial values are provided, an approximate value of the solution can always be obtained. d) Two different initial values must be provided.

A

Which of the following is the appropriate statement concerning client/server architecture? a) It divides a series of processes into two groups by means of an inter-process communication mechanism; one group includes processes that request services, and the other consists of processes that execute the requested services. b) It is mainly aimed at achieving horizontal load sharing by connecting terminals to multiple workstations replacing the host computer. c) It is mainly aimed at achieving load sharing by distributing, among the terminals, part of functions and data files to be processed by the host computer. d) It is the generic term for a system configuration in which a PC is connected to a workstation via LAN. The PC and workstation are called a client and a server, respectively.

B

Which of the following is the appropriate statement concerning data sorting methods? a) The "bubble sort" method determines an intermediate reference value and divides the elements into two groups of "larger" values and "smaller" values. This operation is then repeated recursively on these two groups. b) The "heap sort" method builds an ordered tree from the unsorted portion of the elements, extracts the maximum or minimum value from this ordered tree, and moves it to the sorted portion. This operational sequence is then repeated to gradually shrink the unsorted portion. c) The "quick sort" method sorts each substring composed of elements extracted at regular intervals, and then the interval is further decreased and the same operation is performed again. This operation is repeated until the interval becomes 1. d) The "shell sort" method repeatedly compares two adjacent elements and swaps them if the first element is larger than the second.

D

Which of the following is the appropriate statement concerning how to illustrate data flows (arrows) in DFD? a) Each data store must be connected to another data store with at least one data flow. b) Each data store must have at least one data flow in and one data flow out. c) Each external entity must be connected to another external entity with at least one data flow. d) Each process must have at least one data flow in and one data flow out.

D

Which of the following is the appropriate statement concerning how to use management science methodology? a) PERT is used to perform machine reliability analysis. b) The queuing model is used to perform financial analysis. c) The simplex method is used for product quality control. d) The time-series analysis method is used to forecast product sales in the market.

D

Which of the following is the appropriate technology that is used to establish a private or secure network connection within a public IP network, such as the Internet, and to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one? a) Firewall b) PAT c) RPC d) VPN

C

Which of the following is the configuration of distributed system where hierarchical or dependency relations exist between processors as with relationships between clients and servers? a) Horizontal function distribution b) Horizontal load distribution c) Vertical function distribution d) Vertical load distribution

B

Which of the following is the data transmission technique that has features or characteristics shown below? - It is designed for cost-efficient data transmission for intermittent traffic between LANs and between end-points in a WAN. - Data is transmitted in a variable-size unit. - Error correction (i.e., retransmission of data) is left up to the end-points. - It is based on the X.25 protocol, but it is faster because of a simplified X.25 protocol with minimal services. - It provides a mid-range service between ISDN and ATM. a) Cell relay b) Frame relay c) Message Switching d) Packet Switching

A

Which of the following is the globally recognized model that is used for measuring the maturity level of software and systems development processes and providing guidance for quality processes across a project, a division, or an entire organization? a) CMMI b) MBNQA c) SLA d) SLCP

B

Which of the following is the highest priority process just after execution of each instruction on CPU? a) Check if there are any instructions waiting b) Check if there are any interrupts waiting c) Fetch the next instruction d) Transfer to an interrupt-handling program

D

Which of the following is the method in which the designer and a group of involved personnel review the design documents at the completion of each design for the purpose of early detection of design errors? a) Desktop debugging b) Parallel simulation c) Top-down testing d) Walk-through

A

Which of the following is the most appropriate description concerning the exclusive control of a DBMS? a) Exclusive control is necessary for data that might be updated simultaneously by several people. b) Exclusive control is necessary for improving the processing speed of data that is frequently accessed. c) Exclusive control is necessary for preventing the occurrence of a deadlock when data is accessed. d) In order to improve the processing speed, the range of the data on which exclusive control is performed must be made as wide as possible.

D

Which of the following is the most appropriate explanation of cloud computing? a) It accumulates the computational capacity of several PCs so that a computational capacity of the same level as a supercomputer can be achieved. b) It connects all electric appliances to a network as intelligent products so that these devices can be monitored and operated at any time and from any place. c) It enables PCs on a network to communicate with each other based on an equal relationship, without the use of a specific server. d) It provides the resources of a computer via a network so that the user can easily receive services with high scalability and availability.

B

Which of the following is the project management knowledge area that includes the processes of creating a staffing management plan, acquiring project team, developing project team, and managing project team? a) Communications management b) Human resource management c) Integration management d) Scope management

D

Which of the following is the protocol that is expanded and standardized based on SSL (Secure Sockets Layer) v3 but cannot interoperate with SSL? a) IPsec (Internet protocol security) b) RSH (Remote shell protocol) c) SSH (Secure shell protocol) d) TLS (Transport layer security protocol)

A

Which of the following is the purpose of using a WAF (Web Application Firewall)? a) To block attacks to a vulnerability arising from a Web server and an application b) To detect the intrusion of a worm in a Web server and remove the worm automatically c) To detect vulnerabilities and inconsistencies of applications in an integration test during content development for a Web server d) To find security holes of a Web server and apply OS security patches

C

Which of the following is the specification for dividing frequently-used functions of a Java program into reusable components that can be deployed in a network on any major operating system platform? a) Java applet b) Java application c) JavaBeans d) JavaScript

C

Which of the following is the standardized document description language that prescribes methods, as an international standard, for describing the logical structures and attributes of documents using tags and facilitates the management and exchange of electronic documents? a) DML b) HTML c) SGML d) STEP

B

Which of the following is the technique and concept for improving management efficiency by planning and controlling the company-wide management resources in an effective and integrated way? a) CRM b) ERP c) MRP d) SCM

Which of the following is the unit of atomicity that a DBMS must guarantee for the

Which of the following is the unit of atomicity that a DBMS must guarantee for the

B

Which of the following is used for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message on the Internet? a) IMAP b) MIME c) POP3 d) SMTP

D

Which of the following leads to the von Neumann bottleneck? a) Capacity of main memory b) CPU performance c) Data transfer speed between CPU and I/O devices d) Data transfer speed between CPU and main memory

D

Which of the following most appropriately describes the handling of control information in system operation management? a) The system should be managed by a single manager. Control information should be disclosed to the general user after its security level and other factors are considered. b) The system should be managed by a small group of managers. The management account should be exclusive to the group and should be shared. Control information should be disclosed to the general user after its security level and other factors are considered. c) The system should be managed by a small group of managers. The management account should be exclusive to the group and should be shared. Control information should be disclosed to the general user so that each user can check the information. d) The system should be managed by a small group of managers. Each manager should be given an exclusive and separate account. Control information should be disclosed to the general user after its security level and other factors are considered.

B

Which of the following occurs when computer A broadcasts an ARP request to find the MAC address of computer B on the same network? a) All computers in network receive the request from A, and all of them reply to A with the MAC address of B. b) All computers in network receive the request from A, and only B replies to A with its MAC address. c) DNS server replies to A with the MAC address of B. d) The nearest router that receives the request from A replies to A with the MAC address of B or forwards the request to another router.

D

Which of the following protocols is used on the transport layer of OSI basic reference model? a) FTP b) PPP c) SNMP d) UDP

A

Which of the following provides a job management function in OS that selects a program with the highest execution priority in the job queue and allocates resources required for the program? a) Initiator b) Master scheduler c) Reader d) Writer

# In a certain program, in order to stay in a loop, variable X must be in the range from 1 through 10 (X >= 1 AND X <= 10). In this program, which of the following is the condition of exiting the loop? Here, "AND" and "OR" are the logical product and logical sum operations respectively. In addition, comparison operators <, <=, >, and >= are less than, less than or equal to, greater than, and greater than or equal to, respectively.

X < 1 OR X > 10

Which of the following is the logical expression that indicates the output Z of the

X Y

9. The steps below are used to sort a dataset in descending order by using a max heap. [Steps] 1. Extract an element one by one from an unsorted dataset, and insert it into a max heap until all the elements are extracted and inserted. 2. Delete the root element from the max heap, and store it in a sorted dataset. Stop if all the elements are deleted. Otherwise, go to Step 3. 3. Move the rightmost element on the deepest level to the root. Go to Step 2 if the remaining elements are in the correct order as a max heap (that is, all the parent elements are greater than or equal to their corresponding child elements). Otherwise, go to Step 4. 4. Compare the replaced element with its children, and then exchange the element for its larger child. Go to Step 2 if all the elements are in the correct order as a max heap. Otherwise, continue Step 4 toward deeper levels. In the max heap shown below, how many element exchanges in Step 4 are executed to build the next max heap after deletion of the root "5" in Step 2? a) 0 b) 1 c) 2 d) 3

c) 2

D

https://goo.gl/AGWbm5

C

https://goo.gl/AkHHTC

C

https://goo.gl/B2xM7Z

A

https://goo.gl/BLZkKy

D

https://goo.gl/BR4gj3

C

https://goo.gl/BYxzJt

D

https://goo.gl/EGKhCM

D

https://goo.gl/Ecvm2X

C

https://goo.gl/G9X5mE

B

https://goo.gl/Hmgzex

D

https://goo.gl/JHtEXK

C

https://goo.gl/LSswKg

D

https://goo.gl/MFZS5r

B

https://goo.gl/MWjAga

B

https://goo.gl/MiH2jW

B

https://goo.gl/PT1w8E

D

https://goo.gl/PVb3qk

C

https://goo.gl/Pp8B5r

B

https://goo.gl/QXc2Ra

B

https://goo.gl/fS3hPQ

B

https://goo.gl/fnuoSa

A

https://goo.gl/g4Fx9Z

C

https://goo.gl/ghfnw9

B

https://goo.gl/hcLJj8

C

https://goo.gl/hvkExX

B

https://goo.gl/sGVTQX

B

https://goo.gl/tWsZdd

B

https://goo.gl/vSSp8o

B

https://goo.gl/veJQaY

C

https://goo.gl/wnH5MB

A

https://goo.gl/xHeSzq

26. Which of the following circuits can write out "1" to the output line Z only when the input lines X and Y have the same value? a) ZXY b) ZXY c) ZXY d) ZXY

x&y => Z

When a processor performs multimedia or graphic-related application programs with the mixture of vector instructions and scalar instructions, 10% of the computation time is used for vector instructions.

1.0526

Which of the following is an item to be performed in the requirements definition process of system development?

Clarifying the procedures and rules of new business operations together with the constraints, and obtaining agreement between stakeholders

In software development that uses the waterfall model, which of the following is an appropriate description concerning the cost of fixing errors detected during an operational test?

External design errors affect not only the program but also manuals and other documents, so those errors cost more to fix than coding errors.

Each time a student is absent from school, the date is recorded in the relational database table A as shown below. DateDiff ('2012-04-11','2012-04-10') returns "1".

FROM A, A AS A1 WHERE A.StudentID = A1.StudentID AND

Which of the following is the logic gate that is equivalent to the logic circuit shown below?

NOR(211)

When analog audio signals are converted into digital audio signals using the PCM method at a sampling rate of 44.1 kHz

The quantization bit width of the audio data

Computer A uses the single precision of "IEEE Standard for Binary Floating-Point Arithmetic" (IEEE 754) as shown below

The range of computer A is greater than that of computer B, but the precision is smaller

A university offers many disciplines. Many students graduate in these disciplines after clearing various courses assigned to each discipline.

The relationship between course and student is many-to-many.

Which of the following can be accepted as <root> that is defined using the BNF notation below? Here, the symbol "?" represents an empty string.

1001001

Which of the following is the binary fraction that is equivalent to the decimal fraction 115.625?

1110011.101

When the decimal integer "- 24" is represented in 8-bit binary by using one's complement and two's complement, which of the following is the correct combination?

11100111 & 11101000

Which of the following is the IP address range that is reserved for Class B in traditional IPv4 addresses?

128.0.0.0 through 191.255.255.255

"LOAD GR, B, AD" is an instruction whereby an effective address is calculated by which of the following is the data loaded into general register GR?

1300

How many binary numbers can be represented using a 6-bit number that does not have two contiguous 1s? For example, "101010" does not have two contiguous 1s.

21

When a two-dimensional array A(5,5) is mapped onto computer memory (i.e. one-dimensional array) in row-major (row-directional) order or column-major (column-directional) order, how many elements occupy the same memory addresses in both cases? Here, the first element A(1,1) is mapped onto the same starting memory address in either case.

5

The function f (n) is recursively defined as an operation on the set of natural numbers (including 0) as shown below. What is the value of f (100)?

5050

Among the descriptions of the reliability design of a system, which of the following is an appropriate example that uses a foolproof approach rather than a fail-safe approach?

A design that checks to ensure proper operation in order to prevent an operator from making a mistake because of improper use

Which of the following is an appropriate description concerning a hot site prepared as a backup system?

A site is put into operation as a standby site, and its data and programs are constantly updated via the network so as to resume business operations quickly in the event of a failure.

Which of the following is an appropriate explanation of data mining?

A technique for analyzing a large amount of data statistically and mathematically to discover patterns or rules

Which of the following is an appropriate description concerning cache memory

A write instruction rewrites cache in two ways: one is to rewrite both cache and main memory, and the other is to rewrite only cache until the cache data is removed

When IT control is classified into preventive control and detective control, which of the following is applicable to detective control?

An output list resulting from data entry is cross-checked with the input form.

Which of the following is the image processing technique that is used for smoothing the jagged edges of curved or diagonal lines caused by poor resolution on a display screen?

Anti-aliasing

Which of the following is a financial statement that represents the assets, liabilities, and net assets of a company at a certain point in time and indicates the financial condition of the company?

Balance sheet

Among the characteristics of the structure of a service desk organization, which of the following is a characteristic of the local service desk?

By placing the service desk close to users, intensive services are provided for users who have different languages and cultures or for VIPs by specialized service staff members.

Which of the following is the most appropriate mechanism that allows a Web server to temporarily store user information in a PC browser so that the Web server can check whether the PC

Cookie

Which of the following is an example of a daisy chain connection?

Industrial cameras with each having two IEEE 1394 ports are serially connected, and then one end is connected to a PC

Which of the following is the situation where an improvement can be expected by installing an MRP (Material Requirements Planning) system?

Information about materials and quantities necessary for production is complicated, so a miscalculation of order quantity or an interruption of production often occurs.

Which of the following is a characteristic of object orientation?

Inheritance can localize the changes necessary to expand or modify a model

Which of the following is an explanation of memory interleaving?

It accelerates main memory access by dividing the main memory into multiple independent groups which are accessed concurrently.

Which of the following is categorized as a function of a static testing tool?

It analyzes source code and detects errors in the program.

Which of the following is an appropriate characteristic of a thin client system?

It can reduce the risk of exposure to threats, such as viruses, by protecting the server in a system where the client has no external storage device.

Which of the following is the most appropriate description concerning the usage of NTP (Network Time Protocol)?

It works with clients connecting to a time server in order to synchronize the time of every client that is distributed on the network.

When the figure below shows the process flow of a compiler that is used for procedural languages, which of the following is the appropriate combination that should be inserted into blanks A though C?

Lexical analysis Syntax analysis Semantic analysis (A-B-C-O-O)

Which of the following is a method which can be used to calculate a predicted value based on actual values of the previous time period and in which each of the actual values is equally weighted?

Moving average method

Among the descriptions of computer system architecture, which of the following is an explanation of a tightly coupled multiprocessor system?

Multiple processors share the same main memory and are controlled by a single OS. In principle, a task in the system can be executed on any of the processors, so the throughput is increased by distributing the load in small pieces.

Which of the following is a two-layered chart that is composed of a bar chart showing control items arranged in descending order of frequency and a line chart showing the cumulative percentage of each item?

Pareto chart

Which of the following is an organization that is formed for a certain limited period of time to solve a problem and is disbanded when the problem is solved?

Project organization

Which of the following is the appropriate RAID configuration that provides byte-level

RAID3

Which of the following is the public key cryptography algorithm that is named after the initials of its three researchers and is based on the difficulty of factorizing extremely large numbers into prime factors?

RSA

Which of the following is a type of software test that is performed in order to ensure that changes made for software maintenance do not affect any other unintended parts of the software?

Regression test

Which of the following is a program attribute of software that can be repeatedly called and executed without reloading after completion of the execution but cannot be called and executed by multiple programs at the same time?

Reusable

A system fails and recovers repeatedly over time, as shown in the figure below. Which of the following is the appropriate combination of the indicators or indexes that represent reliability and availability in RASIS?

T & T/(T + S )

Which of the following is an appropriate description concerning application maintenance?

The completion of maintenance is recorded in order to prevent maintenance activities from being left unfinished.

Which of the following is an appropriate explanation of the benchmarking used for corporate management?

Understanding products, services, and operations of the company qualitatively and quantitatively in comparison with those of the strongest competitor or a leading company

Which of the following is the configuration of distributed system where hierarchical or dependency relations exist between processors as with relationships between clients

Vertical function distribution

When two 2-bit binary numbers "x1 x0" and "y1 y0" are added and the resulting bimary number "z2 z1 z0" is obtained, the two binary digits z0 and z2 can be represented as shown below

z = (( x ? y ) ? x ) ? y

When the expression (A ? 2 × (B + C) ? D × E) × F in conventional infix notation is converted to the prefix expression, which of the following represents the resulting expression?

× ? ? A × 2 + BC × DEF


Set pelajaran terkait

COM 505 - Exam 2 (Defamation, Libel & Privacy)

View Set

Health Issues: Chapter 3 - Managing Stress

View Set

Chapter 2 - Real estate interest and ownership

View Set