SEJFE
# Which of the following is the correct value of the quadruple of hexadecimal fraction 0.FEDC?
3.FB70
# An integer m is stored in a register as a binary value. If this value is shifted to the left by three bits and m is added to the shifted value, how many times as large as m is the resulting number? Here, no overflow occurs.
9
# Computer font is an element in the user interface. Which of the following is the most appropriate explanation concerning the font?
A set of glyphs and associated information such as code points
# Which of the following is the appropriate combination of 4 color inks or toners for a full-color printer?
Cyan, Magenta, Yellow, and Black
# When a transaction fails, which of the following should be performed in order to abort it and to rebuild the previous state of the database?
Rollback
# There are two jugs; one is a 4-liter (4L) jug and the other is a 3-liter (3L) jug. Which of the following is the correct sequence to obtain exactly 2 liters of water in the 4L jug under the conditions shown below?
(0,0)->(0,3)->(3,0)->(3,3)->(4,2)->(0,2)->(2,0)
# What range of decimal numbers can be represented with an 11-bit two's-complement number
-1024 to 1023
# A message consists of 200 characters.If we can transmit 200 messages on average before a 1-bit error occurs, what is the bit error rate of the transmission line? Here, 1 character equals to 2 bytes while 1 byte equals to 8 bits.
1/640000
# There is a CPU whose clock cycle time is 0.01 microsecond. The table below shows a program's instruction mix executed on the CPU. What is the approximate MIPS value for the processor
18.02
# A computer is designed to enable pipeline control so that each instruction can be completed in five cycles. How many cycles are needed to execute 20 instructions? Here, all instructions can be executed without being stopped halfway
24
# Two players, X and Y play a dice game. A pair of dice is tossed. If the sum of the dice is 2, 4, or 6, X wins the game. Otherwise, Y wins. What is the probability that Y wins the game
3/4
# By definition of the IEEE754 standard, 32-bit floating point numbers are represented as follows, S (1 bit) E (8 bits) M (23 bits)
7F800000
# A company uses 1,000 PCs. The mean failure in 20 days is to be restricted to 2 PCs.How many hours of MTBF are at least required for these PCs? Here, the mean usage time of the PCs is assumed to be 8 hours per day.
80,000
# There is a four-digit number N 1 N 2 N 3 C that is used for Customer Account Number (CAN). The right most digit "C" can be calculated as follows:
9690
# A depth-first search (DFS) visits all the vertices in a graph. When an edge to be explored next is chosen, this algorithm always chooses to go "deeper" into the graph. That is, it will pick the next adjacent unvisited vertex until reaching a vertex that has no unvisited adjacent vertices.
ABCDEF
# Which of the following is equivalent to the logical expression A.B+B.C.(B+C) ? Here, "• " is the logical product, and " + " is the logical sum.
B.(A+C)
# There are various types of e-commerce, depending on the transaction: B2B, B2C, C2C, m-commerce, etc. Which of the following refers to the activities associated with the selling and buying of goods and services via the Internet such as an online auction website and an online flea market?
C2C (Consumer to Consumer)
# The figure shows the basic configuration of a computer. Which of the following is the correct combination of A, B, and C to be inserted in the figure?
Control unit Memory ALU
# Which of the following is a system where one computer is in standby mode when the other computer is functioning normally?
Duplex system
# Which of the following is a re-writable, erasable memory, using electrical signals, which is widely used for various devices such as digital cameras and digital music players and can maintain the data even after the power is turned off?
Flash memory
# Integers are stored in the 1st to N-th elements of an array A (N >1).The flowchart below shows the process to check which element of the array contains the same value as X. Which of the following correctly describes the execution result of this process?
If the same value as X exists in two places of the array, the 1st and N-th elements, k is set to 1.
# In a floating-point number format, which of the following is the correct operation for adjusting the radix point and the exponent so that the most significant digit of the mantissa can be a non-zero value?
Normalize
# Which of the following is the most appropriate index indicating the performance of a laser printer?
Number of dots per inch (2.54 cm) and number of pages that can be printed per minute
# Which of the following software test methods is performed to verify whether changes made for software maintenance are not affecting other portions of the software?
Regression test
# Which of the following is an appropriate statement concerning a radar chart?
The degree of attainment of the benchmarking goal is plotted on the radial axis which corresponds to each item. All such plotted points are connected by a line, thereby making a comparison of overall balance.
# Which of the following is the correct combination of various addressing modes? Here, X 1 is an address which is stored in a program counter.X 2 is an address part of an instruction which is addressed by X 1
X 3 = X 2 X 3 = (X 2 ) X 3 = X 1 +X 2 X 3 = X 2 +X 4
# The figure shows an RS flip-flop using two NOR gates. Which of the following is the correct truth table for the flip-flop? Here, "unchanged" shown in the table means the outputs maintain a previous state, and "unstable" means the outputs are in an unstable state
0 0 unchanged/0 1 0 1
# Which of the following decimal fractions becomes a finite fraction in an octal representation?
0.5
# There are two systems A and B whose access times of cache and main memory are shown in the table. When a certain program runs on these systems, the cache hit ratio and the effective access time are the same on both systems. Cache memory 15 10 / Main memory 50 70
0.8
# In a certain computer, a bubble sort of an array of 200 data elements takes the same time as a quick sort of the array. In case of an array of 40,000 data elements, how many times faster is a quick sort than a bubble sort?
100
# The table below shows a state transition table that checks the input character string. This check starts from the initial state A, and it fails if the state changes to E during the input of the character string.
12.2
# In a search system, when search was first performed under condition A, there were 5,000 search results. When further narrowed down with condition B, 30% of these search results remained.If search first performed under condition B produces 10,000 search results, what percentage will remain when these are further narrowed down with condition A?
15
# If a program consisting of 100 lines of byte-code is executed using an interpreter, it takes 0.2 seconds. If the same program is executed after compiling, it takes 0.003 seconds.
155
# The "prime number division remainder" method is a well-known hashing algorithm. In this method, a key value is divided by a number N, and the remainder which is also called a hash value is used directly as an index into the hash table.
3
# There are three 7-bit character codes: 30, 3F, and 7A. When an even parity bit is added to the front of each character code, which of the following shows the correct result? Here, the character codes are expressed in hexadecimal
30, 3F, FA
# The sequence of virtual page numbers shown below is encountered in the course of execution of programs on a computer with virtual memory.
33
# There is a hard disk drive with specifications shown below. When a record of 15 Kbytes is processed, which of the following is the average access time in milliseconds? Here, the record is stored in one track
37.5
# The decimal value "-72" is stored in an 8-bit register using 2's complement. If the data in the register is logically shifted two bits to the right, which of the following is the correct result that is represented in decimal?
46
# A check digit for a 4-digit number X 1 X 2 X 3 X 4 can be calculated as follows: mod((X 1.4+X 2 .3+X 3 .2+X 4 .1), 10) When the check digit for the 4-digit number "7X 2 42" is equal to 6, which of the following is the correct number to be put in X 2 ? Here, mod (a,b) returns the remainder after "a" is divided by "b."
6
# The following function f (n, k) exists: What is the value of f (4, 2)?
6
# Which of the following is the correct decimal fraction equal to hexadecimal fraction 0.248?
73/512
# There are a total of 1,900 students in a school, 553 of whom are taking a course in computer science, 667 of whom are in mathematics, and 290 of whom are in both computer science and mathematics. How many students are not taking a course in either computer science or in mathematics?
970
# Which of the following is an appropriate description concerning object-oriented design?
A class can inherit attributes and methods from its base class.
# From multiple types of slips, data in items specified for each type is inputted. Which of the following is the appropriate initial process to be executed in the program to confirm that all the required data is inputted?
A comparison is made between the number of items specified for each slip type and the number of items inputted.
# Which of the following is an appropriate statement in regard to operation of a distributed system
A dedicated administrator is assigned in the same manner as in a centralized system to manage common resources such as databases.
# Which of the following is the appropriate statement concerning Newton's method that is known as an algorithm for obtaining the approximate value of the solution to the formula ƒ(x) = 0?
An approximate value of the solution is obtained geometrically using the tangent lines of y = ƒ(x)
# The figures show the break-even point for two companies A and B. Which of the following is an appropriate statement with regard to the profit/loss analysis of Companies A and B?
Company A has low variable costs per unit of product, so when sales exceed the break-even point, Company A's profits are larger than Company B.
# The table shows the priorities of five tasks A to E.When each task is independently executed, the processing sequences and times associated with CPU and I/O devices are also shown in the table. Which of the tasks B to E should be combined together with task A assigned a "high" priority so that there may be no idle time of CPU from starting of execution of the combined tasks to endin of both tasks?
D Low CPU (3) -> I/O (2) ->CPU (3)-> I/O (1)-> CPU (4)
# When constructing a network with a TCP/IP environment, IP address management becomes cumbersome and complicated as the number of clients becomes larger. Which of the following protocols is able to increase the efficiency of IP address management by assigning IP addresses dynamically according to requests from clients?
DHCP
# Which of the following leads to the von Neumann bottleneck?
Data transfer speed between CPU and main memory
# Which of the following is an appropriate statement in regard to the transmission operation of nodes connected to a LAN in the CSMA/CD method?
Each node checks whether the carrier is busy and can transmit only if the carrier is not busy. When collision is detected, transmission is tried again after a random time has elapsed.
# The entity-relationship diagrams A and B shows the relationships between three entities in a school: teacher, class, and classroom.Which of the following is an appropriate interpretation concerning the diagrams
In A, a teacher is responsible for one class only. In B, a teacher may be responsible for one or more classes.
# Which of the following is an appropriate description concerning cache memory?
In one method, when executing a write instruction, data is written to both cache memory and main memory. In the other method, data is written only to a block in cache, and the modified block is written back into main memory only when it is replaced.
# Which of the following is an appropriate statement in regard to program testing?
In the program testing, it is necessary to check not only whether the program works as intended but also whether there are any unintended operations.
# Which of the following is an appropriate statement regarding elements of information security defined in ISO/IEC 17799:2005?
Integrity is safe-guarding the accuracy and completeness of information and processing methods.
# Which of the following statements concerning programming languages appropriately describes Java?
It enables the creation of applets and other programs that run in web browsers.The applets can be run on any environment where virtual machines are implemented.
# Which of the following is an appropriate description concerning the role of a shell in an OS?
It interprets the commands entered by the user and instructs the OS to execute the corresponding functions.
# Which of the following is an appropriate description of the virus pattern file that is used in virus protection measures for computers?
It is a file that records the signature code of known viruses and is used to detect viruses by the virus protection software.
# Which of the following appropriately describes a schema in a relational database management system?
It is a set of data definitions such as the data properties, format, relationship with other data, etc.
# Which of the following appropriately describes a domain (defined area), a term used for relational databases?
It is a set of values that attributes can hold.
# Which of the following is an appropriate description concerning CRM (Customer Relationship Management)?
It is an approach for increasing customer satisfaction and ultimately revenues by sharing information and raising the service levels, not only in the sales division but in all customer related channels within a company.
# Which of the following is an appropriate description concerning a tracer that is used as a debugging tool?
It outputs history information such as execution sequences and execution results of program instructions.
# Three products A, B, and C are produced from raw materials at plant X. The production time per unit volume of each product, the required quantity of raw materials, and the profit amounts are shown in the table below. The maximum production hours per month at this plant total 240 hours, and the amount of raw materials that can be fed for production is 150 kg per month.
Linear programming method
# In the module design of software, which of the following is the appropriate technique for improving reliability and maintainability?
Module cohesion is increased, and module coupling is weakened.
# Which of the following is a display, with low-voltage operation and low-power consumption, which does not need backlighting because it emits light when voltage is applied?
OLED
# In a microprocessor, there are two general registers: GRi and GRj (hereinafter referred to as GRx instead of GRi or GRj). PUSH GRx is used for adding the contents of GRx to the top of a stack. POP GRx is for removing the current top data of the stack and storing it to GRx. Which of the following operations can exchange the contents of GRi and GRj?
PUSH GRi PUSH GRj POP GRi POP GRj
# Which of the following operations extracts specific columns from tables in a relational database?
Projection
# Which of the following terms refers to the function that adjusts all address dependent locations within a program to correspond to the load position when the program is loaded into main memory prior to its execution?
Relocation
# Which of the following is a UML diagram that can be used to describe interactions among a number of objects in terms of an exchange of messages?
Sequence diagram
# Reverse Polish Notation (RPN) is used to represent arithmetic expressions without using brackets to define priorities for evaluation of operators.For example, 3.(a+b) becomes 3ab+x in RPN
Stack
# Which of the following data structures uses the LIFO (Last In First Out) method in order to manage data?
Stack
# Which of the following functions can reduce the network load by placing a frequently-used instruction set on the server in advance, when accessing a database in a client/server system
Stored procedure function
# A systems design is represented using several diagrams. When a system analyst wants to confirm the design information such as the relationships among functions and the interface among modules in a hierarchical manner, which of the following is the most appropriate diagram that should be inspected by the analyst?
Structured chart
# Which of the following is the reason why a large number of computers use "complement representation" to simplify arithmetic circuits?
Subtraction can be processed by addition.
# Which of the following is an appropriate description in regard to a waterfall model?
System development proceeds in the order of process flow, so going back upstream results in a significant loss of efficiency.
# Which of the following is the appropriate protocol that can deliver data from sender to receiver, correctly and in order?
TCP
# Which of the following protocols is used in a TCP/IP network to provide a virtual terminal function that enables remote login to a host for remote operation?
TELNET
# Which of the following is an input device classified as a pointing device and can be used for graphical input in a CAD system?
Tablet
# Against what kind of attacks does SSL (Secure Socket Layer) protect users on the Internet?
Tapping and exploitation of data
# An implementation plan for a system development project was drawn up, and the critical path was determined. Which of the following tasks can be identified by the critical path?
Tasks directly connected with the delay of the entire project
# Which of the following is the appropriate statement concerning data sorting methods?
The "heap sort" method builds an ordered tree from the unsorted portion of the elements, extracts the maximum or minimum value from this ordered tree, and moves it to the sorted portion. This operational sequence is then repeated to gradually shrink the unsorted portion.
# The figure below shows plots of the relationship between values of a certain factor x, in the product manufacturing process, and values of quality characteristics y. Which of the following is an appropriate description concerning this figure?
The coefficient of correlation between x and y is negative.
# Which of the following is an appropriate description concerning the list and/or array structures
The list structure allows any data to be inserted or deleted simply by modifying pointers.But, after the data was deleted, the cells that contained the data remain as garbage in memory.
# Which of the following is an appropriate statement in regard to a module unit test?
The module interface falls outside the scope of the unit test because the module interface cannot be tested using a single module.
# When the system development division and the operations division are separately organized, which of the following is an appropriate method for ensuring that the transition from development to operation proceeds smoothly and efficiently?
The operations division participates actively in system development to provide assistance from the viewpoint of operability.
# In order to shorten the cumulative duration of activities on the critical path by one day, which of the following is the appropriate action to be taken?
To shorten the activity I by one day
# In the OSI 7-layer model, which of the following layers converts data from the upper layer into many tiny pieces called segments for transmission across the network?
Transport Layer
# There is an OS that can set access privileges to read, update, and create subordinate files in a directory. These three types of access privileges can be set to "enabled" or "disabled" using 1 bit. If these three bits are set by an octal (base-8) number expressed by numerals 0 to 7, which of the following is an appropriate description, taking into account the trial results below?
When 4 is set, only create is enabled.
# Which of the following is the correct result produced by executing the program shown below? Here, the parameter "x" is called by value, and the parameter "y" is called by reference. Main Program
a = 7, b = 3
# A binary tree is said to be perfect, if all its leaves are at the same depth and every internal node has two children. Which of the following is correct about the perfect binary tree? Here, n is the number of nodes, and h is the height of the perfect binary tree.
n = 2^(h + 1) - 1
# When a certain natural number x is expressed as a 2n-digit binary number "1010...10" consisting of 1 and 0 arranged alternately, which of the following equations can be formulated in terms of the number x?
x + x/2 = 2^2n - 1
# There are two important operations on a stack: PUSH and POP. PUSH adds the new data to the top of the stack leaving previous data below, and POP removes and returns the current top data of the stack.
x =1 ; y = 7
# Which of the following equations holds well in the postfix notation (or Reverse Polish Notation)? Here, x, y, and z are variables.
x y - z + = x y z - -
# In the Venn Diagrams labeled 1 to 3, which of the following is the result of Boolean "OR" operations for all three to be combined? Here, "? " is used for "logical AND," "+" for "logical OR," and " A " for the "logical NOT" of A. Each set corresponding to x, y, or z is depicted by a circle
x.y-.z- + x-+y
# When you flip a coin four times, what is the probability that it will come up heads exactly twice?
0.375