JFE_E

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the logical expression whose resulting value is zero (0) only when the binary values of "x1, x2, ..., xn" are all zeros (0s) or all ones (1s)? Here, "·"

( 1) ( 2) gach tren 12 va gach tren 2

The class diagram below shows part of an ordering system used for mail order and teleshopping. Which of the following is the most appropriate combination of

(Aggregation)(Navigability)(Generalization)(Composition)

When the table below is used to design a relational database for managing a video-rental shop, which of the following can be a potential candidate key? Here, (X,

(CID, VID, RDate)

Time Division Multiplexing (TDM) is a type of digital multiplexing where two or more 4 Kbytes of data over one channel of a 512 Kbps

0.5

When the MTBF and MTTR values for devices A and B are as shown in the table below, what is the availability of a system where A and B are connected in series?

0.72

When four jobs A through D shown in the table below are executed on a first-come first-served basis, which of the following is the average waiting time (in minutes) in the

0:00 & 4

The fast-tracking technique is used to shorten a project schedule. The original plan is shown in Figure 1 below. When activity E is divided into activities E1, E2, and E3 as

1

The figure below shows a logic circuit representing a full adder. When 1, 0, and 1 areentered into x, y, and z respectively, which of the following is the appropriat

1 0

In a logic circuit shown below, which of the following is an appropriate combination of input signals A through C that can generate the output signal "0"?

1 0 0

As shown in the class diagram below, there is a many-to-many association between the two classes Product and Warehouse. When there is a need to know how many of each

1 0..* 0..* 1

There is a series of project activities to be performed by two staff members, Mr. X and Mr. Y. When each of them works alone, it can be completed by Mr. X in 3 hours and

11:20 a.m.

In a certain processor, a timer interrupt is generated at a clock frequency of 60 Hz on a "per clock tick" basis. It takes 2 milliseconds (including process switching overhead)

12

When an application program has functions and characteristics shown in the table below, which of the following is the function point value of the program? Here the correction coefficient of complexity is 0.5.

12

The magnetic head of a hard disk drive is currently positioned at cylinder number 100, and the cylinder numbers 120, 90, 70, 80, 140, 110, and 60 are lined up in the I/O

120

Which of the following is the IP address range that is reserved for Class B in traditional IPv4 addresses?

128.0.0.0 through 191.255.255.255

"LOAD GR, B, AD" is an instruction whereby an effective address is calculated by which of the following is the data loaded into general register GR?

1300

A byte-code program written in Java can be executed in two methods: one method for

155

What is the function point value of a program that has the functions and characteristics shown in the table below? Here, the correction coefficient of complexity is 0.75.

18

When CPU processing and printing are performed for four jobs under the conditions below, how many minutes does it take to complete them from the start of the first CPU

180

In a TCP/IP network using IPv4 addresses, which of the following is an effective IP address that can be allocated to a network device?

203.164.15.9/28

How many binary numbers can be represented using a 6-bit number that does not have two contiguous 1s? For example, "101010" does not have two contiguous 1s.

21

How many multiplications at a minimum must be performed in order to calculate the polynomial expression "x4-2x3+5x2+x-6"?

3

Cache memory is usually organized at multiple levels, such as L1 for level 1 and L2 for level 2, with L1 having the smallest storage capacity but the fastest memory speed.

3.7

When a 60-minute monaural audio signal is digitalized using a PCM format with a sampling frequency of 44.1 kHz and a quantization bit rate of 16 bits, what is the

320

Which of the following is the result of calculating the arithmetic expression "B6 -7C"? Here, all numbers are represented in unsigned hexadecimal.

3A

When 50% of the undefined specifications are defined each time a prototype is created, how many prototypes should be created to define over 90% of the specifications that are

4

When the series of stack operations below is performed on an empty stack, which of the following is the data that is read out by the last READ operation? Here, "PUSH x" is the operation to put data x in the stack, "POP" is used PUSH 2 ? READ ? PUSH 3 ? PUSH 6 ? POP ? READ ? PUSH 4 ?READ ? PUSH 7 ? PUSH 5? POP ? POP ? READ

4

When production is planned based on the calculation formula and table shown below, what is the value for production plan C? Here, the carry-over inventory on April 1 is equal to 400 pieces of the actual inventory on March 31.

4,850

There is a digital video recording system installed with four security cameras. In this system, the video data from each camera is captured at 30 frames per second with a

4.5 GB

When a two-dimensional array A(5,5) is mapped onto computer memory (i.e. one-dimensional array) in row-major (row-directional) order or column-major (column-directional) order, how many elements occupy the same memory addresses in both cases? Here, the first element A(1,1) is mapped onto the same starting memory address in either case.

5

When the average instruction execution time of a computer is 20 nanoseconds, what is the performance of this computer in MIPS?

50

The function f (n) is recursively defined as an operation on the set of natural numbers (including 0) as shown below. What is the value of f (100)?

5050

The workload required to develop a system is estimated at 80 person-months if it is carried out by one person. When four staff members with the same productivity work

528

When an optical fiber cable is used for data communication, which of the following is the approximate bandwidth (in units of THz) of the light within the range of

57

CPU utilization of a computer system can be improved by using multiprogramming. If there is one process in memory, the CPU utilization is (1-p). Here, "p" is the completion during 50% of the execution time

6.25

The table below shows the income statement for a certain company. Which of the following is the amount of sales (in million dollars) at the break-even point?

625

When "11" is inserted in the min-heap shown below, which of the following min-heaps is created? Here, a new node is first placed at the bottom (or last) of the tree, and then

8,11,30,25,22,40,59,53,33,44

Among the descriptions of the reliability design of a system, which of the following is an appropriate example that uses a foolproof approach rather than a fail-safe approach?

A design that checks to ensure proper operation in order to prevent an operator from making a mistake because of improper use

Which of the following is an appropriate explanation of a franchise chain in the retail industry?

A form of organization in which a head office provides to its members usage rights of its trademarks and signs, and also provides managerial training and assistance in exchange for a fixed rate of compensation

Which of the following is an appropriate explanation of demographic segment that is one of the market segments?

A group of a population segmented by factors such as age, gender, family size, income, occupation, education, religion, race, generation, and nationality

Which of the following is an appropriate explanation of EDI?

A method for electronically exchange of business data between computers over a network, based on standard formats and protocols

Which of the following is an appropriate explanation concerning a milestone in project management?

A milestone is a major event in a project schedule that is easily identifiable by such things as the completion of a significant deliverable and the occurrence of an event.

Which of the following is a security measure where it is effective to confirm the destination address with the sender when an e-mail is sent?

A preventive measure against wrong transmission of e-mail

Which of the following is an appropriate explanation of the RFI that is created when a new information system is procured?

A request is made to the vendor for helpful information by showing the details of business operations and the purpose of the computerization.

Which of the following is provided by an ASP (Application Service Provider)?

A service in which the functions of a general-purpose application system are provided to several customers via a network

When the data model conforms to the notation described below, which of the following is an appropriate description concerning the interpretation of the E-R diagram shown

A signle order is not made from multiple suppliers.

Which of the following is an appropriate description concerning a hot site prepared as a backup system?

A site is put into operation as a standby site, and its data and programs are constantly updated via the network so as to resume business operations quickly in the event of a failure.

Among various types of license agreements for a software package, which of the following is the most appropriate explanation of a site license?

A software package can be installed on any and all computers, such as PCs, workstations, and servers, at a given location in a company or an organization.

Which of the following is an appropriate explanation of data mining?

A technique for analyzing a large amount of data statistically and mathematically to discover patterns or rules

Which of the following is an appropriate description concerning cache memory

A write instruction rewrites cache in two ways: one is to rewrite both cache and main memory, and the other is to rewrite only cache until the cache data is removed

In the network shown below, the STP (Spanning Tree Protocol) is used on both S1 and S2 switches. When the link between two PCs A and C is established via L1, which of

Always L1

Which of the following is an appropriate description of a capacitive touch panel?

An electric field is formed on the surface of the touch panel, and the touched position is detected by capturing the change in the surface charge.

When IT control is classified into preventive control and detective control, which of the following is applicable to detective control?

An output list resulting from data entry is cross-checked with the input form.

Which of the following is the image processing technique that is used for smoothing the jagged edges of curved or diagonal lines caused by poor resolution on a display screen?

Anti-aliasing

There are two methods of biometric authentication: one extracts physical characteristics and the other extracts behavioral characteristics. Which of the following uses

Authentication is performed by extracting characteristics from the writing speed and pen pressure used when a signature is produced

A publishing company produces textbooks for high school. Each book is written by an author who specializes in a subject. An editor is assigned to work with an author combination of relations that are applied to complete the E-R diagram? Here, 1 * indicates a one-to-many relation, * * is a many-to-many relation.

Auther1-1Book & Auther*-*Editor

The arrow diagram shown below is created for time management of a project. Which of the following is the critical path?

B ? E ? F

Which of the following is an appropriate description concerning data backup?

Backup processing should not overlap with ordinary business processing in order to guarantee the integrity of backed-up data.

Which of the following is a financial statement that represents the assets, liabilities, and net assets of a company at a certain point in time and indicates the financial condition of the company?

Balance sheet

The distribution of days that are required to complete a certain activity can be approximated by a standard normal distribution with a mean of 500 days and a

Between 476 and 524

There are several formats for representing an integer in a computer. When a set of unsigned binary integers that are arranged in ascending order is interpreted in different

Biased (i.e., offset binary) format

Which of the following is a type of integration test that has the characteristics listed below?

Big bang test

What is the tree below called?

Binary search tree(5,3,7..)

In software development, which of the following is the method that is used to test the functions of modules in accordance with specifications without respect to their internal structures?

Black box test

Which of the following is an appropriate example of VR (Virtual Reality)?

Computer games and simulations make use of multimodal devices, such as a wired glove, a headgear, and an omni-directional treadmill, in order to provide very enriching and life-like experience for the user.

A trucking company has two types of trucks, A-type and B-type, as shown in the table below, and the company has a contract to deliver 900 boxes at a time by using the

Conditions 90x + 70y ? 900 x + y ? 10 0 ? x ? 8, 0 ? y ? 6 Objective function 400x + 300y ? Minimize

According to ISO/IEC 20000 (Information technology - Service management), which of the following is a process that has the objective to define and control the

Configuration management

Which of the following is the purpose of BPM that is a management approach in a company or an organization?

Continuous improvement of a company's operational processes

Which of the following is a chart or a diagram that shows the quality of a product in order of time and is used for determining whether or not the production process is in a stable state within the control limits?

Control chart

Which of the following is the most appropriate mechanism that allows a Web server to temporarily store user information in a PC browser so that the Web server can check whether the PC

Cookie

When the database design is divided into three phases (i.e., conceptual design, logical design, and physical design), which of the following is a part of the physical design?

Describing base relations, file organizations, and indexes used to improve query performance

Which of the following can be achieved by receiving an e-mail text and its hash value from the sender, and then comparing this hash value with another hash value calculated

Detecting the presence or absence of falsification in the e-mail text

Which of the following is an appropriate explanation of product innovation in the management of technology?

Developing new products or products differentiated from other companies

Which of the following is a method that is used to check if an image or other digital content has been illegally copied and resold?

Digital watermark

Which of the following is a deliverable of data architecture that is one of the four architectures contained in Enterprise Architecture?

E-R diagram

Which of the following is the technique and concept for improving management efficiency by planning and controlling the company-wide management resources in an effective and integrated way?

ERP

Which of the following is an appropriate explanation of accessibility in the context of information technology?

Environment where even those who are handicapped or elderly have an easy access to information equipment and receive information services

A PKI involves two types of key pairs: signature key pairs, in which the private key is used for signing and the public key for checking; and exchange key pairs, in which the

Exchange key pair

Which of the following is the most appropriate description concerning the exclusive control of a DBMS?

Exclusive control is necessary for data that might be updated simultaneously by several people.

The figure shown below represents a logic gate and its timing chart. Which of the following is an appropriate logical function of this gate? Here, both A and B are the

Exclusive-NOR

In software development that uses the waterfall model, which of the following is an appropriate description concerning the cost of fixing errors detected during an operational test?

External design errors affect not only the program but also manuals and other documents, so those errors cost more to fix than coding errors.

Which of the following is a typical method that is contained in agile software development?

Extreme programming

Which of the following is an appropriate technique that is used for implementing a queue as a data structure?

FIFO

Each time a student is absent from school, the date is recorded in the relational database table A as shown below. DateDiff ('2012-04-11','2012-04-10') returns "1".

FROM A, A AS A1 WHERE A.StudentID = A1.StudentID AND

Which of the following is the language processor that translates and executes a source program written in high-level language, on a line-by-line basis?

Interpreter

According to ISO 9241-11, usability is defined as the "extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and

Interview method

When there are several business systems available in a company, which of the following is the most appropriate method for access control?

Irrespective of the user's job title, the appropriate access rights are set in each business system on the basis of the user's job role.

In the term "ACID", which is the basic foundation that database transactions are built upon, what does the third character "I" stand for?

Isolation

Which of the following is an explanation of memory interleaving?

It accelerates main memory access by dividing the main memory into multiple independent groups which are accessed concurrently.

Which of the following is categorized as a function of a static testing tool?

It analyzes source code and detects errors in the program.

Which of the following is an appropriate characteristic of a thin client system?

It can reduce the risk of exposure to threats, such as viruses, by protecting the server in a system where the client has no external storage device.

Which of the following is an advantage of using mask ROM as program memory in an embedded system?

It enables the prevention of unauthorized rewriting of programs after shipment.

Among the descriptions concerning three-dimensional computer graphics, which of the following is an explanation of polygon?

It is a basic element that is used for constituting a polyhedron taking the form of a closed solid or for approximating a quadric surface or a free-form surface.

Which of the following is an appropriate explanation of POP3 that is used in an e-mail system?

It is a protocol used to retrieve e-mails from the mailbox of a mail server

When a company's business is divided into four categories A through D as shown in the figure below, which of the following is the characteristic of the business that is classified as category B?

It is currently generating a large inflow of cash, but it also needs continuous investment into the future.

Which of the following is the most appropriate description concerning maintenance management that is to be planned for the development environment of an embedded

It is necessary to maintain the development environment such as through periodic operational checks regardless of usage frequency.

Which of the following is an appropriate explanation of DRAM?

It is often used as main memory, and one bit is represented depending on whether or not its capacitor is charged.

Which of the following is the most appropriate purpose of using DTD (Document Type Definition) with XML?

It is used to check if a well-formed XML document is valid.

Which of the following is an appropriate description concerning a use case diagram in UML?

It is used to show what system functions are performed for which actor, from the user's perspective.

Which of the following is the most appropriate explanation of cloud computing?

It provides the resources of a computer via a network so that the user can easily receive services with high scalability and availability.

Which of the following is an appropriate characteristic of an RFID tag that is a type of IC tag and is used for locating and tracking merchandise, inventory, or other assets?

It reads information without physical contact by using electromagnetic waves.

In UML, the state machine diagram (previously called statechart diagram) is used for describing the state machine model of a target system. Which of the following is an

It shows how the system responds to internal and external events.

Which of the following is the most appropriate description concerning the usage of NTP (Network Time Protocol)?

It works with clients connecting to a time server in order to synchronize the time of every client that is distributed on the network.

Which of the following is the specification for dividing frequently-used functions of a Java program into reusable components that can be deployed in a network on any major

JavaBeans

R1: 1, 2, 3, 2, 4, 2, 5, 2, 3, 4 R2: 1, 2, 3, 4, 2, 5, 3, 1, 2, 5

LRU & FIFO

When the figure below shows the process flow of a compiler that is used for procedural languages, which of the following is the appropriate combination that should be inserted into blanks A though C?

Lexical analysis Syntax analysis Semantic analysis (A-B-C-O-O)

When the order data shown below is entered into the order entry system, which of the following is a check that is performed to see if the order date is on or before the business day on which the data is entered?

Logical check(Order data)

Which of the following is used for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message on the Internet?

MIME

Which of the following is an appropriate description concerning MTBF and MTTR?

MTBF increases through the preventive maintenance of a system.

Which of the following is an explanation of core competence management?

Management is centered on proprietary know-how and technology that are not easy for other companies to imitate.

In the product life cycle, which of the following is the stage where the market begins to understand the value of the product, and both product lines and sales channels need to

Maturity stage

When an information strategy is developed, which of the following is an item that must always be made consistent with the strategy?

Medium and long-term management plans

When a publisher's lead editor omits a section of an author's manuscript without obtaining the consent of the author, which of the following is infringed according to the international treaty called the Berne Convention for the Protection of Literary and Artistic Works?

Moral rights

Which of the following is a method which can be used to calculate a predicted value based on actual values of the previous time period and in which each of the actual values is equally weighted?

Moving average method

Among the descriptions of computer system architecture, which of the following is an explanation of a tightly coupled multiprocessor system?

Multiple processors share the same main memory and are controlled by a single OS. In principle, a task in the system can be executed on any of the processors, so the throughput is increased by distributing the load in small pieces.

Which of the following is the logic gate that is equivalent to the logic circuit shown below?

NOR(211)

Which of the following provides a standard set of graphical notations or diagrams for specifying, visualizing, designing, and documenting object-oriented systems?

UML

Which of the following is the UPDATE statement that can correctly update the data of the "Product" table? Here, the "Product" table is defined by the CREATE statement

UPDATE Product SET Product_name = 'D' WHERE Product_number = 'S003'

Which of the following is a logical expression that is equivalent to the logic circuit shown below? Here, "+" is the logical sum, " • " is the logical product, and X is the negation of X.

X = A? B

The flowchart below shows an algorithm that can be used to sort all elements of one-dimensional array X in reverse order and store them in array Y.

X(i) ? Y(n-i+1) & i +1 ? i

Which of the following is the logic gate that is equivalent to the logic circuit shown below?

XOR(121)

In postfix notation, also known as reverse Polish notation, which of the following is equivalent to the arithmetic expression " ? a + b × c ÷ d ? e "? Here, a, b, c, d, and e are all variables.

a ? bc × d ÷ +e ?

Which of the following is an explanation of marketing mix?

company's products are effectively sold by combining product strategy, price strategy, channel strategy, promotion strategy, and others appropriately.

When a declining metered rate method is applied to the total charge for usage of a computer system, the charge per unit of usage decreases as the system usage increases. Which of the following is a graph that shows this method?

cong hinh chu C 3 net

Which of the following is a chart or a diagram that is often used in quality control to rank issues or problems in descending order of frequency?

Pareto chart

Which of the following is a two-layered chart that is composed of a bar chart showing control items arranged in descending order of frequency and a line chart showing the cumulative percentage of each item?

Pareto chart

When software components written in a low-level programming language are used to perform time-critical arithmetic operations on a very large amount of data, which of the following is expected to be improved among the eight software product quality characteristics defined in the ISO/IEC 25000 series of standards?

Performance efficiency

Which of the following is an explanation of "contact management" that is a basic function of SFA (Sales Force Automation)?

Performing effective sales activities for existing and prospective customers by managing a set of records including customer visiting days and sales results

Which of the following is the most appropriate indicator that is directly helpful in managing software quality in a system development project?

Period of time required to adequately review each deliverable

Which of the following is an appropriate measure that management takes to guarantee the apparent independence of internal system auditors?

Placing the department of auditors under the direct control of management

Among the layers of the OSI basic reference model, which of the following is the appropriate layer that is primarily responsible for the translation, encryption, and compression of data?

Presentation layer

According to the ISO/IEC 20000 series, which of the following has the objective that aims to minimize disruption to the business by proactive identification and analysis of

Problem management

Which of the following is an organization that is formed for a certain limited period of time to solve a problem and is disbanded when the problem is solved?

Project organization

Which of the following is an essential activity for achieving a fault tolerant system?

Providing redundancy for a system configuration to minimize the effect of a component failure so that the processing can be continued without any effect on the overall system

Which of the following is the server that can be used to intercept all messages entering and leaving the network and to effectively hide the true network addresses?

Proxy server

Which of the following is the appropriate RAID configuration that provides byte-level

RAID3

When an information system is procured according to the procedure shown in the figure below, which of the following is to be inserted into blank B?

RFP

Which of the following is the public key cryptography algorithm that is named after the initials of its three researchers and is based on the difficulty of factorizing extremely large numbers into prime factors?

RSA

Which of the following is an improvement index in supply chain management?

Ratio of reduction in dead stock

In a preemptive multitasking OS environment, when a process is preempted by another process with a higher priority, which of the following is the appropriate state where the

Ready

Which of the following is a type of software test that is performed in order to ensure that changes made for software maintenance do not affect any other unintended parts of the software?

Regression test

From internal and external viewpoints concerning software product development and maintenance, which of the following is an appropriate quality characteristic that

Reliability

Which of the following is a program attribute of software that can be repeatedly called and executed without reloading after completion of the execution but cannot be called and executed by multiple programs at the same time?

Reusable

Which of the following is most suitable for cache memory?

SRAM

Which of the following enables users to connect to the system of a service provider via the Internet and make online use of the necessary functions

SaaS (Software as a Service)

Which of the following is a service delivery process that is defined, agreed, recorded, and managed in IT service management?

Service level management

As shown below, when the SQL statement is executed on the relational database table "Staff", which of the following tables is created?

StaffID BranchID S03 B03 S04 B03 S05 B03 S07 B08

Which of the following is a diagram that is used for modeling the event-driven or discrete behavior of an object in UML 2.x (i.e., UML 2.0 or later)?

State machine diagram

The integration test for software that is composed of a set of modules arranged in a hierarchical structure is performed from a high-level module. In such a case, which

Stub

In a system audit, which of the following acts as audit evidence?

System operation records obtained by the audit team from the audited department

A k-string is defined as a string of length k. An m-substring is an ordered sequence of m consecutive elements of the original string. How many m-substrings are contained in a k-string? Here, when two or more m-substrings have the same sequence of elements, they are all counted separately as different substrings.

k ? m +1

Bubble sort is implemented using a technique that repeatedly compares adjacent pairs of elements from left to right and swaps them if they are in the wrong order.

n(n ?1)/2

In a URL (Uniform Resource Locator) specified to access a Web page through the Internet, which of the following is the appropriate sequence of four basic parts: the

protocol, host name, directory, page

A system fails and recovers repeatedly over time, as shown in the figure below. Which of the following is the appropriate combination of the indicators or indexes that represent reliability and availability in RASIS?

T & T/(T + S )

Which of the following is the protocol that is expanded and standardized based on SSL (Secure Sockets Layer) v3 but cannot interoperate with SSL?

TLS (Transport layer security protocol)

Which of the following is an appropriate description concerning the implementation structure of a system audit?

The auditor reports the results of the audit to the requester so that the requester can give instructions for improvement based on the audit report.

Which of the following is an appropriate description concerning an interview or a hearing that is conducted during a system audit?

The auditor should make an effort to get documents and records that confirm the information obtained from the department under audit during the interview.

Which of the following is an appropriate description concerning application maintenance?

The completion of maintenance is recorded in order to prevent maintenance activities from being left unfinished.

Which of the following is the appropriate description of the "selection sort" algorithm?

The element with the largest...same way.

For the purpose of monitoring the execution process of a program in order of time, which of the following is used as a dynamic debugging tool that records the contents of

Tracer

In the course of object oriented design, which of the following can be regarded as a subclass of the base class "automobile"?

Truck

When a processor performs multimedia or graphic-related application programs with the mixture of vector instructions and scalar instructions, 10% of the computation time is used for vector instructions.

1.0526

When characters A through E are encoded, their bit patterns and probabilities of occurrence are shown in the table below. What is the average number of bits per character?

1.8

Which of the following can be accepted as <root> that is defined using the BNF notation below? Here, the symbol "?" represents an empty string.

1001001

In a TCP/IP network, when an IP packet of 2000 bytes is sent to the link that has an MTU (Maximum Transmission Unit) of 200 bytes, how many fragments are generated? Here, each packet has a 20-byte IP header.

11

The figure below shows the state transition diagram of an automaton. Which of the following is a bit string for which the automaton stops in the accepting (or final) state

1101

Which of the following is the binary fraction that is equivalent to the decimal fraction 115.625?

1110011.101

When a department that outsources system development must undergo a system audit concerning "progress management" of the outsourcing partner, which of the following

Business reports received periodically from the outsourcing partner, and documents showing the verification result of the business reports

Among the characteristics of the structure of a service desk organization, which of the following is a characteristic of the local service desk?

By placing the service desk close to users, intensive services are provided for users who have different languages and cultures or for VIPs by specialized service staff members.

An acceptance inspection is to be conducted on a purchased component that has a non-defective ratio of 0.9 and a defective ratio of 0.1. Four plans A though D are

C

Which of the following is the globally recognized model that is used for measuring the maturity level of software and systems development processes and providing guidance

CMMI

Which of the following provides a baseline of security requirements for the operations of CA (Certification Authority) and RA (Registration Authority)?

Certificate policy

When data in the "Product" table is as shown below, which of the following is an update process that reduces the number of rows in the "Profitable_product" view created using "View definition" below?

Changing the Sales_price of the product with a Product_code of S001 to 130,000

Which of the following is the name of a phenomenon where multiple ON/OFF signals are generated during a few milliseconds after a push-button switch with a mechanical

Chattering

In the stage of system design, when an audit is performed on the control for reducing the risk that user requirements are not met, which of the following is a point to be checked?

Checking if the user department participates in the review of the system design documents

In IT service management, which of the following is an activity that is performed as incident management?

Checking to see if a failure report from a user matches a known error

When a computerization plan is made, which of the following is an item to be considered?

Clarifying the cost and investment effect of development, maintenance, and operations

Which of the following is an item to be performed in the requirements definition process of system development?

Clarifying the procedures and rules of new business operations together with the constraints, and obtaining agreement between stakeholders

During system development, a domain model is often created as part of the business modeling activities. Among the diagrams in UML, which of the following is the

Class diagram

Which of the following is an event that generates an external interrupt?

Completion of an I/O operation by peripheral I/O devices

In a UML class diagram, which of the following is a relationship in which objects from the "whole" class control the lifetime of objects from the "part" class and which is graphically represented as a solid line with a filled diamond next to the class playing the "whole" role?

Composition

The four perspectives of the BSC (Balanced Score Card) includes "financial," "learning and growth," "internal business process," and one other. Which of the following is the

Customer

In the binary search tree shown below, which of the following is the appropriate sequence of nodes that are visited in an in-order traversal?

D ? B ? E ? A ? C ? F

The "four domains" of enterprise architecture include business architecture, technology architecture, application architecture, and one other. Which of the following is the

Data architecture

The figure below shows an example of a DFD used in structured analysis. What does the symbol " " represent in the figure?

Data store

Which of the following is the appropriate flow of execution of SQL statements?

Decomposition ? Optimization ? Code generation ? Execution

Which of the following provides a job management function in OS that selects a program with the highest execution priority in the job queue and allocates resources

Initiator

Which of the following is the data transmission technique that has features or characteristics shown below?

Frame relay

Which of the following is a business organization that is divided according to the type of work performed as shown in the chart below?

Functional organization

Which of the following is an appropriate explanation of optimization in a compiler?

Generating object codes that enhance run-time performance through the analysis of program codes

When a repeater hub (or simply referred to as a hub), a router, and an L2 switch (or simply referred to as a switch) are used as network devices in order to interconnect LANs based on the OSI basic reference model

Hub & Switch & Router

Which of the following is the project management knowledge area that includes the processes of creating a staffing management plan, acquiring project team, developing

Human resource management

In reliability design, which of the following is an appropriate example of fail-soft?

In a system with a cluster configuration, even when a server does not work, another server takes over applications and provides functions.

Which of the following is an explanation of BCP (Business Continuity Plan)?

In order to avoid risks of business interruptions or recover promptly from damages, a policy or an activity procedure is prepared in advance.

Which of the following is a role of the program register (i.e., program counter) of the CPU?

In order to read out an instruction, it contains the address where the next instruction is stored.

Which of the following is the addressing scheme where data in main memory is referenced as shown in the figure below?

Indirect addressing(20.25)

Which of the following is an example of a daisy chain connection?

Industrial cameras with each having two IEEE 1394 ports are serially connected, and then one end is connected to a PC

Which of the following is the situation where an improvement can be expected by installing an MRP (Material Requirements Planning) system?

Information about materials and quantities necessary for production is complicated, so a miscalculation of order quantity or an interruption of production often occurs.

Which of the following is a characteristic of object orientation?

Inheritance can localize the changes necessary to expand or modify a model

In memory pool management of a real time system using various sizes of memory resources, which of the following is an appropriate characteristic of the fixed-length

The memory efficiency is poor, and the processing speed for allocation and deallocation is fast and constant.

Which of the following is the most appropriate indicator used for the progress management of a program test?

The number of test items completed

The figure below shows the structure of a singly-linked list. In order to insert Philadelphia between New York and Washington DC, which of the following is an

The pointers for New York and Philadelphia are set to 110 and 90 respectively.

Which of the following is the characteristic of a dynamically relocatable program?

The program currently in the computer memory can be moved to other locations of the memory during execution time.

When an audit is performed on the reliability of programming, which of the following is the most appropriate item to be reported as a finding?

The programmer selects a subset of unit test items from all the program logic paths on a sampling basis.

When analog audio signals are converted into digital audio signals using the PCM method at a sampling rate of 44.1 kHz

The quantization bit width of the audio data

A university offers many disciplines. Many students graduate in these disciplines after clearing various courses assigned to each discipline.

The relationship between course and student is many-to-many.

Which of the following can be represented in an E-R diagram?

The relationship between entities

Which of the following is an appropriate description concerning interconnection devices between LANs?

The repeater extends the transmission distance by amplifying signals between the same types of segments

Which of the following is an appropriate description concerning a max heap whose node values are 3, 6, 11, 17, 19, 22, and 32?

The root node value is always "32".

Which of the following is an appropriate description concerning a digital envelope?

The sender encrypts the message by using symmetric key cryptography and then encrypts the symmetric key by using public key cryptography

When the number of concurrently running programs is increased in a virtual storage system with the small and insufficient capacity of main memory, which of the

Thrashing

Which of the following is the purpose of using a WAF (Web Application Firewall)?

To block attacks to a vulnerability arising from a Web server and an application

In a relational database system, which of the following is an appropriate purpose of recording changes in a database file as a journal file?

To enable recovery to be undertaken effectively in the event of a failure

From a viewpoint of security measures, which of the following is an appropriate purpose of confirming the destination address with the sender at the time of sending e-mail?

To prevent e-mail from being sent to a wrong recipient

As a security measure on the Internet, a type of challenge-response test called a CAPTCHA can be used to determine whether the client is a human or a computer

To protect against automated spamming

Which of the following is an appropriate purpose of using a locking mechanism in a relational database system?

To support concurrency control of the simultaneous execution of transactions

In a system development project, EVM (Earned Value Management) is used for managing its performance. Which of the following is the most appropriate status that is indicated by the fact that the value "EV-AC" is positive?

Under budget

Which of the following is an appropriate explanation of the benchmarking used for corporate management?

Understanding products, services, and operations of the company qualitatively and quantitatively in comparison with those of the strongest competitor or a leading company

Which of the following is the configuration of distributed system where hierarchical or dependency relations exist between processors as with relationships between clients

Vertical function distribution

Which of the following is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or

Virtualization

Which of the following is an explanation of the pattern matching technique for antivirus software?

Viruses are detected by comparing data with a collection of known virus signatures.

Which of the following is the most appropriate tool that is used to emulate a real hacker by looking for security holes and other weaknesses from the outside of an organization's network?

Vulnerability scanner

Which of the following is the software development process model that aims to achieve a high degree of completion of a system by dividing the system into some subsystems and

Waterfall model

The diagram below shows the state transition of the tasks in a multitasking computer system. When does a task in the running state move to the ready state?

When a task with a higher priority is set to the ready state

x AND (y OR z) OR y AND (x OR z) OR x AND y AND z

x AND y OR x AND z OR y AND z

When the expression (A ? 2 × (B + C) ? D × E) × F in conventional infix notation is converted to the prefix expression, which of the following represents the resulting expression?

× ? ? A × 2 + BC × DEF


Set pelajaran terkait

Chapter 27: Missouri Business Conduct & Practices

View Set

general principles TABAG + AMPONGAN

View Set

health assessment prep u midterm

View Set