2008oct FE AM Questions
2008oct FE AM Questions
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely
and neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark or
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. In which month is the autumn Fundamental IT Engineer Examination
conducted?
Since the correct answer is “b)” (October), mark your answer sheet as follows:
[Sample Answer]
Q1 A ウ C D
Q2. A register stores a numerical value representing a binary number. After a positive
integer x is entered in the register, the following operation is performed: “shift the
register value two bits to the left and add x.” How many times as large as x is the new
value of the register? Here, the shift does not cause an overflow.
a) 3 b) 4 c) 5 d) 6
Q3. Which of the following is the appropriate way to check whether or not an 8-bit
unsigned binary number x is a multiple of 16?
a) The bit-by-bit logical product between x and the binary number 00001111 is 0.
b) The bit-by-bit logical product between x and the binary number 11110000 is 0.
c) The bit-by-bit logical sum between x and the binary number 00001111 is 0.
d) The bit-by-bit logical sum between x and the binary number 11110000 is 0.
Q4. In the single precision of “IEEE Standard for Binary Floating-Point Arithmetic” (IEEE
754), the value “V” is represented as follows:
When the hexadecimal value C1E00000 is represented in IEEE 754, what is the correct
value converted to decimal?
a) – 59 b) – 44 c) – 28 d) 26
− 1 −
Q5. There are a total of N values observed. The sum S (S > 0) of these values is obtained,
and then the average value is calculated. Which of the following is the correct
expression when the average value is rounded off to the nearest integer value? Here,
“/ ” indicates division, and [X ] is the maximum integer equal to X or less.
Q7. There are 3 white balls and 3 red balls in a box. What is the probability that the two
balls taken out at random from the box are one white ball and one red ball?
− 2 −
Q8. There are n locks and n keys; the keys are mixed and need to specify which key
belongs to which lock. Which of the following is the maximum number of trials to
find the correct key for each lock? Here, one key can open only one lock.
a) n2 b) (n – 1) ! c) n ! d) (n2 – n) / 2
Q9. Which of the following is equivalent to the logical expression shown below? Here,
“•” is used for the logical product, and “+” is for the logical sum.
a) (X + (Y • Z)) + (X • (Y + Z))
b) (X + (Y • Z)) • (X • (Y + Z))
c) (X • (Y • Z)) + (X • (Y + Z))
d) ((X + Y) • Z) + (X • (Y + Z))
Q10. Which of the following Boolean expressions is equivalent to the sentence below?
“The output z is true if at least two of the three inputs x1, x2, and x3 are true.”
Here, “ xn ” is used for the logical negation of xn, “+” for the logical sum, “.” for the
logical product, and “ ⊕ ” for the exclusive disjunction (or exclusive OR).
a) z = x1 ⋅ x2 ⋅ x3 + x1 ⋅ x2 ⋅ x3 + x1 ⋅ x2 ⋅ x3
b) z = ( x1 + x 2 + x3 ) ⋅ ( x1 + x 2 + x3 ) ⋅ ( x1 + x 2 + x3 )
c) z = ( x1 ⊕ x2 ) ⋅ ( x2 ⊕ x3 ) ⋅ ( x1 ⊕ x3 )
d) z = x1 ⋅ x2 + x 2 ⋅ x3 + x1 ⋅ x3
− 3 −
Q11. There are three stacks A, B, and C where stack A contains the values 1, 2, and 3; 3 is on
the top of the stack, and stacks B and C are empty. The stack command format is as
follows:
What is the resulting content of stack A after executing the stack operations shown
below? Each rightmost element in the option list represents the value on the top of
the stack.
Pop (A, x) → Push (B, x) → Pop (A, x), → Push (C, x) → Pop (A, x) → Push (C, x)
→ Pop (B, x) → Push (A, x) → Pop (C, x) → Push (B, x) → Pop (C, x) → Push (A, x)
→ Pop (B, x) → Push (A, x)
a) 1, 2, 3 b) 2, 1, 3 c) 3, 1, 2 d) 3, 2, 1
Q12. In a certain examination, the minimum and maximum scores are 31 and 95 respectively.
A one-dimensional array shown below is used to display the distribution of scores for
all examinees, and each array element indicates the number of examinees whose scores
are in the specified ranges. Which of the following is the most appropriate expression
to calculate an array index for each score? Here, any digits after the decimal point of
the resulting value are truncated to generate an integer as an index.
− 4 −
Q13. A k-ary tree is a tree in which every node has no more than k children. A binary tree
is the special case where k =2. In a k-ary tree with n nodes and height h, which of the
following is an upper bound for the number of leaves?
a) h k b) k h c) log k n d) n / log k h
f (n) = A (n > 1)
f (n) = B (n = 0)
Which of the following combinations should be inserted in the boxes A and B? Here,
“ n” is a non-negative integer.
A B
a) n * f (n – 1) 0
b) n * f (n + 1) 0
c) n * f (n – 1) 1
d) n * f (n + 1) 1
− 5 −
Q15. A binary search tree is created by inserting the values shown below.
7 9 11 2 8 10 5 3
After deletion of the root from the newly created tree, what does it look like?
a) b)
7 10
2 9 2 9
5 8 11 5 8 11
3 10 3
c) d)
8 8
2 9 2 9
5 11 5 11
3 7 10 3 10
Q16. Which of the following is the sorting algorithm that divides the data elements into two
groups, in which all those elements less than a particular element (called a pivot value)
and all those elements greater than or equal to it are separately included, and then
repeats the same operation until all elements are sorted in ascending or descending
order?
− 6 −
Q17. The figure shown below represents a logic gate and its timing chart. Which of the
following is an appropriate logical function of this gate? Here, both A and B are the
input signals and F is the output signal.
a) AND b) Exclusive-NOR
c) Exclusive-OR d) NOR
Q19. When a CPU can perform a multiplication in 12 nanoseconds (ns), an addition in 1 ns,
and a subtraction in 1.5 ns, which of the following is the minimum CPU time, in
nanoseconds, for the calculation of “a × a – b × b ” ?
− 7 −
Q20. Which of the following is the appropriate diagram that explains pipeline control?
Here, the meanings of the capital letters in the diagrams are as follows:
F: Fetching instruction
D: Decoding
A: Address calculation
R: Reading operand
E: Executing
a)
b)
c)
d)
Q21. Which of the following is the appropriate description of CPU clock frequencies for
PCs?
a) LAN communication speed changes depending on the clock frequency. The higher
the frequency, the faster the communication speed on the LAN gets.
b) The instruction execution timing in a CPU varies depending on the clock frequency.
The higher the frequency, the faster the instruction execution speed gets.
c) The interrupt interval of real-time processes changes depending on the clock
frequency. The higher the clock frequency, the higher the frequency of interrupt
processing gets, increasing the processing speed of real-time processes.
d) The revolution speed of the hard disk varies depending on the clock frequency.
The higher the frequency, the faster the revolution speed gets, increasing the transfer
speed of the hard disk.
− 8 −
Q22. There is a CPU with an internal clock frequency of 700 MHz. The number of clock
cycles for executing instructions and their appearance rates are shown in the table
below. What is the approximate performance (measured in MIPS) of this CPU?
a) 10 b) 50 c) 70 d) 100
Q23. A processor with a 256-Mbyte address space is using the address “35E3C03” to access
a 16-Mbyte memory device. What are the highest and lowest addresses in the memory
map of the 16-Mbyte memory device? Here, the memory addresses are expressed in
hexadecimal.
Q24. Which of the following is used in ECC memory to detect 2-bit errors and correct 1-bit
errors?
− 9 −
Q25. A system has a main memory access time of 60 nanoseconds (ns) and a cache memory
access time of 10 ns. When the effective access time for accessing the main memory
via the cache memory is 15 ns, what is the hit ratio of the cache memory?
Q26. Which of the following storage devices has the fastest access time?
Q27. Which of the following is widely used as a computer port for a modem connection?
Unit: millisecond
Process Execution time
Name CPU I/O CPU
A 4 5 5
B 3 4 6
C 2 3 3
D 4 3 2
a) A b) B c) C d) D
− 10 −
Q29. The figure below shows the state transition diagram of a certain process. Which of
the following is the appropriate combination of States A, B, and C ?
Q31. Which of the following is the appropriate set of major functions supported by an OS?
− 11 −
Q32. Which of the following is the appropriate explanation of RPC in a client/server system?
Q33. In order to make a multiplexing system with an availability of at least 0.999 by using
devices with an availability of 0.9, how many of these devices need linking together in
parallel?
a) 2 b) 3 c) 4 d) 5
a) If a failure occurs in a leased line, the system immediately switches to a public line
and continues processing even if the processing capacity of the system goes down.
b) If a system failure occurs with a data transfer process in a data collection system,
only the data input process is performed, and the data is transferred all at once after
recovery of its failure.
c) If something other than a number is entered into a number input field, the system
displays a warning message, requesting correct entry.
d) If the system determines that the sensor which detects someone entering the work
area has failed, the robot arm is stopped by force.
− 12 −
Q36. Which of the following is the term that refers to collecting a large volume of data
through a variety of corporate activities, organizing, integrating, and saving the data
for specific purposes, and using it for decision-making support, for example?
Q37. When large-scale websites are built, application servers are often used in addition to
Web servers. Which of the following is an appropriate reason for this?
Q38. CASE tools can be classified on the basis of the applicable development processes and
phases. Which of the following classifications includes support functions for
requirements analysis?
a) Downstream b) Maintenance
c) Testing d) Upstream
Q39. Which of the following is the method which analyzes the source or object code to
retrieve information concerning program specifications and design?
a) Reengineering b) Refactoring
c) Restructuring d) Reverse engineering
Q40. Based on the concept of object orientation, which of the following can be commonly
regarded as a subclass of the class “automobile”?
− 13 −
Q41. Which of the following should be done in the internal design phase of software
development processes?
Q42. In the flowchart below, which of the following indicates the relationship between the
initial values a and b that are given in m and n in the process (1) in order to carry out
these processes in the order shown below?
(1) → (2) → (3) → (5) → (2) → (3) → (4) → (2) → (6)
Here, a and b are both positive integers.
a) a = 2b b) 2a = b c) 2a = 3b d) 3a = 2b
− 14 −
Q43. Which of the following is the appropriate sequence for drawing up a DFD model that is
used to develop a new system based on the current system?
a) 1→2→3→4
b) 1→2→4→3
c) 2→1→3→4
d) 2→1→4→3
Q44. In DFD illustrated below, DFi is used for data flow i, Pj for process j, Ek for source or
destination of data k, and DSl for data storage l. There are three errors (rule
violations) in this DFD. One is in P2; that is, P2 must have at least one output data
flow. The other two are in data flows. Which of the following combinations
includes two rule violations, one for each data flow?
DF3
E1 DF5 P2
DS1
DF1 DF7
DF4 DF6
E2 DF2 P1
− 15 −
Q45. Which of the following is the appropriate characteristic of object-oriented models?
Q46. Which of the following is the test to verify interfaces both between modules and
between subsystems?
− 16 −
Q48. Which of the following is the appropriate interpretation of the testing-process quality
control graph shown below and follow-on actions to be taken?
Estimated cumulative
number of errors detected
Cumulative
number of errors Estimated number of
detected test items not fulfilled
a) Detection of errors is ahead of the pace of fulfilling the test items. The test is thus
efficiently conducted. At this time there is no concern, but progress management is
necessary to cope with errors in order not to leave them unresolved over a protracted
period of time.
b) Fulfillment of test items is fast, and detection of errors is also more advanced than
expected. The test is still in the first half, so it is advisable to continue testing and
see what happens.
c) Fulfillment of test items is slow, so some measures should be discussed concerning
the insufficiency of the testing environment and the lack of development staff
members before it is too late. There is no problem with the quality, as errors are
detected more often than expected.
d) The resulting quality is generally rather poor, so it is necessary to take strong
measures against places in which errors occur frequently; the quality status of the
preceding process should be reviewed and do it over again if necessary.
− 17 −
Q49. How much is the approximate expected value in dollars, for the first-year correction
cost of an application program under the following conditions?
[Conditions]
(1) Program size: 2,000 Ksteps
(2) Potential program error rate: 0.04 errors / Ksteps
(3) Annual discovery rate of potential errors: 20 % / year
(4) Classification of errors
Error with major impact: 20 %
Error with minor impact: 80 %
(5) Correction cost per error
Error with major impact: 20,000 dollars
Error with minor impact: 5,000 dollars
(6) Only errors with major impact are corrected.
Q50. Which of the following is the most appropriate description concerning a “watch list” of
system failures?
− 18 −
Q51. Which of the following is an appropriate description concerning a characteristic of job
scheduling in a computer system?
Q52. In software maintenance, which of the following tests is performed to ensure that fixes
or modifications do not affect other, unchanged parts of the software?
Q53. An IP address in IPv4 consists of two parts: the network address part and the host
address part. Which of the following is the appropriate description concerning the
network address and the host address? Here, n is the number of bits in the network
address part, and h is the number of bits in the host address part. In addition, the
special-purpose and ineffective addresses should not be counted as an effective address.
− 19 −
Q54. Which of the following terms can be applicable to an explanation below?
“The sender sends a single datagram; the routers are responsible for making copies and
sending them to a group of interested receivers.”
Q55. Which of the following is a protocol for e-mail on the Internet that supports not only
text but other data such as audio and images through message header extension?
Q56. Which of the following is the appropriate description concerning ATM exchange?
Q57. Which of the following protocols is used for synchronizing the clocks in multiple
nodes on the Internet?
− 20 −
Q58. Which of the following is a mechanism that allows a Web server to store its own
information about a user on the user’s own computer so that the Web server can
identify users and possibly prepare customized Web pages for them?
Q59. Which of the following is the mechanism for interfacing a Web server with an external
program in order to implement an interactive page where an application program on the
server executes a request from a client and returns the resulting output to the browser?
Q60. Which of the following data models represents data relationships in a tree structure?
a) Only specified attributes are extracted from tables, and a new table is created.
b) The tuples in two tables that meet the relevant conditions are combined, and a new
table is created.
c) Tuples that commonly exist in two tables are extracted, and a new table is created.
d) Tuples that meet given conditions are selected from tables, and a new table is created.
− 21 −
Q63. There are two tables “movie” and “movietype” as shown below. Which of the
following tables is created as the result of executing the SQL statement specified
below?
movie
mID mName mTypeID mDirector mCompany
M01 Beowulf 01 Robert Zemeckis Paramount Pictures
M02 Enchanted 02 Kevin Lima Walt Disney Pictures
M03 This Christmas 03 Preston A. Whitmore II Sony Pictures
M04 Hitman 01 Xavier Gens 20th Century Fox
movietype
mTypeID mTypeCode mTypeName
01 AC Action
02 AD Adventure
03 CO Comedy
− 22 −
Q64. Which of the following appropriately describes a group function of SQL?
Q65. Which of the following appropriately explains the SQL statements shown below?
− 23 −
Q66. Which of the following authentications can be realized with the information exchange
between two communication actors X and Y according to the procedure below?
[Procedure]
(1) Y transmits a character string (challenge) including optional information to X.
(2) X generates a new character string (response) from the received character string
based on predetermined rules between X and Y, and sends back this character string
(response) to Y.
(3) Y confirms that the returned character string (response) is correct.
a) X authenticates Y.
b) X authenticates Y, with the result that Y authenticates X.
c) Y authenticates X.
d) Y authenticates X, with the result that X authenticates Y.
Q68. Which of the following is an appropriate action to be taken when a computer virus is
found?
a) First, the computer is powered off, because the virus program may be resident in
memory.
b) First, the infected computer is disconnected from the relevant network, because
other computers may be infected via the network.
c) If a worm that infects a wide area in a short period of time is found while an on-line
business system is running, the virus countermeasure is taken without stopping the
system.
d) The reproducibility of virus activities is confirmed for the purpose of identifying the
virus name by special characteristics activated at the time of infection.
− 24 −
Q69. Which of the following is an appropriate operations management method for user IDs
and passwords?
a) A list of user IDs and passwords is prepared for the purpose of expediting
troubleshooting, and the administrator in charge keeps the list.
b) For the purpose of preventing passwords from being abused by other people, it is so
arranged that users become free to change their passwords at any time.
c) User IDs and passwords that are not currently used are reused for the purpose of
simplifying management work.
d) With the aim of improving convenience, user IDs and temporary passwords for
newcomers are registered, prior to the arrival of user registration applications, by
referring to the advance announcements of personnel changes.
Q70. When LAN analyzers are used for finding out the causes of network failures, which of
the following is a point to keep in mind?
− 25 −
Q72. Which of the following is an appropriate description concerning financial indexes?
a) Capital ratio signifies the ratio of equity capital to fixed assets. The larger the value
of this ratio, the greater the financial soundness.
b) Current ratio means the ratio of current assets to current liabilities. The smaller the
value of this ratio, the higher the financial stability.
c) Fixed ratio means the ratio of fixed assets to fixed liabilities. The smaller the value
of this ratio, the higher the financial stability.
d) Total capital profit ratio denotes the ratio of profits to gross capital. The larger the
value of this ratio, the higher the profitability.
Q73. A certain company is producing and selling its product X. The variable cost of the
product X is 60% of its selling price, and the fixed cost of the company is $50,000 per
month. When the company’s target profit for the forthcoming month is $20,000, how
much sales volume (in dollars) is required to meet it?
Q74. A certain manufacturer plans to produce products in the two periods 1 and 2 as shown
in the table below. How much is the fixed cost (in dollars) to produce the planned
products during a single period? Here, the fixed cost remains unchanged for each
period.
− 26 −
Q75. A certain retailer purchases watches from a wholesaler and sells them to customers.
As shown in the transaction record table below, the retailer purchased a total of 150
watches and sold 120 watches in January. In addition, the retailer had a stock of 30
watches at the beginning of January. What is the total purchase cost (in dollars) of
watches that were sold on an FIFO (First In First Out) basis in January?
[Transaction record]
Date Quantity Unit cost
Transaction
(yyyy-mm-dd) ($)
2008-01-01 Beginning inventory 30 20
2008-01-10 Purchased 60 21
2008-01-16 Purchased 40 22
2008-01-25 Purchased 50 23
2008-01 Sold 120
Q76. Company A and Company B can expect profits as shown in the table below when each
of them implements two different strategies. Which of the following is the profit of
Company A when both companies carry out the maximin strategy? In each cell of the
table, the left value indicates the profit of A, and the right value indicates the profit of B.
Company B
Strategy b1 Strategy b2
Strategy a1 – 15, 15 20, – 20
Company A
Strategy a2 5, –5 0, 0
a) – 15 b) 0 c) 5 d) 20
Q77. Which is the method of solving a problem of the following type: “How can we
distribute a resource subject to constraints that can be expressed by first-degree
equations so as to obtain a maximum effect?”
− 27 −
Q78. A certain company has installed an online computer for the purpose of improving its
inventory control system. When the company anticipates sales of 15,000 units per
year, ordering cost of $60 per order, and annual holding cost of $20 per unit, what is
the optimal order quantity (in units) per order? Here, the fixed order quantity model
can be applied.
Q79. There are seven activities A through G shown in the table below. Activities A and B
can be performed concurrently, but the others cannot be done until their preceding
activities are completed. For example, C cannot begin until A is completed. Which
of the following is the critical path of these activities?
a) A→C→E→G
b) A→D→F
c) B→C→D→F
d) B→E→G
− 28 −
Q80. Which of the following is the situation that is expected to be improved by the
introduction of an MRP (Material Requirements Planning) system?
a) Design changes are so frequent that production efficiency does not improve.
b) Drawing information is managed both by electronic files and on paper, so the history
of design changes cannot be correctly understood.
c) Information concerning materials necessary for manufacturing and their required
quantities is complex, so errors can occur repeatedly in the estimated quantity of
order and thereby bring about problems to production.
d) Many types of products are produced in small quantities, so the introduction cost of
manufacturing facilities is increasing.
− 29 −