0% found this document useful (0 votes)
57 views32 pages

B1S3 Monthly Test

1. The document appears to be a practice test containing multiple choice questions about various computing topics such as databases, markup languages, networking, and programming. 2. Question 1 asks about a logical search expression to find Japanese restaurants in both London and Paris. Question 2 asks about benefits of encoding sound as 16-bit data rather than 8-bit. 3. In general, the test seems to cover fundamental concepts in databases, web technologies, programming, and other core areas of information technology.

Uploaded by

hnin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views32 pages

B1S3 Monthly Test

1. The document appears to be a practice test containing multiple choice questions about various computing topics such as databases, markup languages, networking, and programming. 2. Question 1 asks about a logical search expression to find Japanese restaurants in both London and Paris. Question 2 asks about benefits of encoding sound as 16-bit data rather than 8-bit. 3. In general, the test seems to cover fundamental concepts in databases, web technologies, programming, and other core areas of information technology.

Uploaded by

hnin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Monthly Test 2 B1S3 (September 13 2023)

1. Japanese restaurants in London and Japanese restaurants in Paris are to be searched for
together. Which of the following is the logical expression that represents the search condition?
a) (“London” AND “Paris”) AND “Japanese restaurant”
b) (“London” AND “Paris”) OR “Japanese restaurant”
c) (“London” OR “Paris”) AND “Japanese restaurant”
d) (“London” OR “Paris”) OR “Japanese restaurant”
2. When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded data.
When the same sound source is sampled at the same sampling frequency and then encoded as
a series of 16-bit data in lieu of 8-bit data, which of the following is an appropriate explanation
concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher.
3. Which of the following is an appropriate way for extracting data from a stack that stores multiple
data?
a) Data is extracted from an arbitrary location that is specified, regardless of the sequence
that data is stored in.
b) Data that was stored last is extracted first.
c) Data that was stored first is extracted first.
d) Data has a key, and it is extracted according to the priority of the key.
4. There are five (5) lamps arranged in line. Each of them can be turned on and off independently.
How many patterns are there where two (2) or more lamps are turned on? Here, the pattern where
all lamps are turned on is counted as one (1) and the pattern where any one (1) of them is turned
on is counted as five (5).
a) 4 b) 10 c) 26 d) 32
5. There is a standard that can represent data in a hierarchical structure by enclosing data that
corresponds to attribute N with the tags <N> , which means the start, and</N> , which means the
end, and then linking and nesting these tags. Company A decides to comply with this standard
and create a paper by using the structural rules (1) through (3) below. Which of the following is
the appropriate header of a paper named “New Document Management” that is created by Jack
Smith of the Information Systems Department (IS Department) in accordance with this standard
and the structural rules?

1
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.

6. Which of the following is an appropriate description concerning the usage of HTML (Hyper Text
Markup Language) tags?
a) <LABEL>is used to define the title of a web page.
b) <BODY> is used to describe the text of a web page.
c) <BIG>is used to specify the size and style applied to each character in a web page.
d) <FORM>is used to divide a web page into multiple frames.

2
7.

8. Which of the following graphically represents a processing procedure of a program in a visual


way?
a) Gantt chart b) Data flow diagram c) Flowchart d) Radar chart
9. There is a data structure where data that is entered last is retrieved first (hereinafter, stack). By
using this, a device that changes the order of data that is entered from the right side and sends
its output to the left side as shown in the Figure is considered. There are three (3) cases of
operations for this device.
(1) Data that is entered from the right side is sent to the left side as is.
(2) Data that is entered from the right side is added onto the top of the stack.
(3) Data on the top of the stack is retrieved and sent to the left side.
If the data A, B, C, and D is entered sequentially from the right side of the device, which of the
following cannot be an order of the output to the left side with any combination of the operations
(1) through (3)?

3
a) B, A, D, C b) B, D, C, A c) C, B, D, A d) C, D, A, B
10. The response time of an inventory management system that uses a relational database has
recently become slow. An investigation reveals that when the system was initially created, there
was no problem with response time, and after that, insertion and deletion of product data was
repeatedly performed on the database. Which of the following is the most effective way to improve
the response time of the database?
a) Upgrading the CPU of the database server
b) Extending the index area of the database
c) Defragmenting the database
d) Increasing the number of hard disks that store the database
11. Which of the following is the appropriate combination of compression technology standards
for still images, moving images, and audio?

12. Which of the following is a term for commands to a computer that are written in a programming
language?
a) PIN code b) Source code c) Binary code d) Character code
13. A markup language specifies the character color according to the “Syntax and meaning of the
markup language definition section” below. When an element (parent) contains another element
(child), the child inherits the parent’s specifications, but priority is given to the child-specific
specifications if the child and the parent have different values specified for the same attribute.
When the text in the “Example” below is displayed according to this rule, which of the following is
the appropriate display attribute for the underlined character string? Here, “character string”
specifies the character string to be emphasized, for example by using bold font.
[Syntax and meaning of the markup language definition section]

4
(1) Syntax of the definition section . name{color specification}
(2) Meaning Assigns a color attribute to “name” to display the character string (element) between
and in the specified color.
[Example]
Definition:
. color1{blue}
. color2{red}
Body text: <strong>The role of the system administrator is<color1> to promote the use of
computers and other information technology to end-user departments.<color2> Increased use of
information technology improves the work efficiency of each user, <color2>and can also lead to
operational improvements across the entire organization.</color1></strong>
a) Blue characters, emphasized
b) Red characters, emphasized
c) Blue characters, not emphasized
d) Red characters, not emphasized
14. Which of the following is usually created using HTML?
a) Web browser b) Web page c) Cookie d) SQL program\
15.

16. Which of the following is an appropriate description of a rollback in transaction processing?

5
a) When a transaction attempts to update shared data, it prohibits another transaction
from updating that data.
b) When a transaction has been successfully processed, it commits an update to the
database.
c) When a transaction has not been successfully processed for some reason, it reverts
the database to the state that was present before the transaction was started.
d) It combines multiple tables into one (1) table by using mutually related columns as keys.
17. In a system environment where several users have access to a database simultaneously, a
new user tries to view a data record while another user is updating the same record. In order to
assure data integrity in such circumstances, which of the following is an appropriate control
method that should be used in the DBMS?
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating process
d) Canceling the updating process to permit the new user to view the last record
18. Which of the following is an appropriate description concerning the primary key of a relational
database?
a) NULL can be set only in one (1) record to a value of a field selected as a primary key.
b) Any values in a field selected as a primary key cannot be updated.
c) A field selected as a primary key cannot be referenced as the foreign key of another
table.
d) A combination of multiple fields can be selected as a primary key.
19. Sales data is to be managed with tables in a relational database. When the tables for sales
data are designed, which of the following activities analyzes the relationship between the fields of
the tables and decompose the tables so that there are no duplications or inconsistencies in the
data?
a) Join b) Projection c) Normalization d) Exclusive control
20. Which of the following is an appropriate description about association of records for a
relational database?
a) Records in multiple tables are associated at the same row position relative to the first
row in each of the tables.
b) Records in multiple tables are associated through the values of corresponding fields.
c) Records are associated with one another by a pointer that represents the parentage.
d) Records are associated with one another by a hash function.

6
21.

22. There are “Sales”, “Customer” and “Product” tables in a relational database. Among lists A
through C, which of the following contains all and only the lists that can be created from the data
in these tables? Here, a solid underlined part represents a primary key, and a dotted underlined
part represents a foreign key.

A The list of customers who bought more than a certain amount of money during a certain
period in the past
B The list of products that were out of stock in the previous month
C The ranking list for sales amount by product in the previous month
a) A, B b) A, B, C c) A, C d) B, C
23. Which of the following effect is obtained by normalizing the tables of a relational database?

7
a) The number of disk accesses for data update is reduced by compiling frequently used
data in the same table.
b) Data inconsistency due to data update is prevented by eliminating data duplication.
c) The usage efficiency of the main memory is improved by making the size of the tables
uniform.
d) Response time for queries is shortened by reducing the number of tables.
24. When an activity for building a relational database is divided into steps A through C below,
which of the following is an appropriate order of the steps?
A - Identifying the data items to be used in the business operation
B - Creating tables
C - Inserting records

25. Which of the following is a purpose of using a database management system?


a) To enable users to access data even when there is no OS available
b) To eliminate the need for backups created in preparation for disk failures
c) To encrypt data to be transmitted over a network
d) To enable multiple users to share information while maintaining data integrity
26. There is a system for entering and managing orders from customers. Sequential order number
is printed on each order form in the order of arrival unless the form has any mistakes such as
missing information. Before the order form shown below is entered into the system, which of the
following should be checked so as not to enter duplicated order data?

27. Employee information is managed by creating two tables “Emp” for employees and “Dept” for
Departments in a relational database. Which of the following is an appropriate combination of the
primary key(s) and foreign key(s) that are set in the “Emp” table and the “Dept” table as needed?
Here, any employee always belongs to a department that exists in the “Dept” table, and when the
employee data is added or updated, the referential constraints are used to ensure consistency.

8
28. There are three tables “Supplier” table, “Purchase_details” table, and “Product” table that are
managed by using a relational database. When a new product is purchased from a new supplier,
which of the following is the appropriate sequence of inserting data into the tables? Here, an
underline indicates a primary key, and a dotted underline indicates a foreign key. An arrow (→) in
the answer group represents the sequence of the tables into which data is inserted.

a) “Product” table → “Supplier” table → “Purchase_details” table


b) “Purchase_details” table → “Product” table → “Supplier” table
c) “Supplier” table → “Product” table → “Purchase_details” table
d) “Supplier” table → “Purchase_details” table → “Product” table

9
29. Which of the following is the combination of conditions that can retrieve only three employees
including “Tom Cruise” from the “Employee” table managed in a relational database?

a) (1) AND (2) AND (3)


b) ((1) AND (2)) OR (3)
c) (1) OR ((2) AND (3))
d) (1) OR (2) OR (3)
30. Which of the following is an appropriate explanation and application example of an E-R
diagram?
a) It is a diagram describing the state transition and conditions; for example, it can be used
to describe the specifications of a communication protocol.
b) It is a diagram representing sequence, selection, and iteration structures by combining
them; for example, it can be used to describe the flow of a program.
c) It is a diagram representing the relationships between entities; for example, it can be
used to represent the relationships between the tables of a relational database.
d) It is a diagram showing the sequence of activities and the work period; for example, it
can be used to perform schedule management of system development.

10
Management (Section – 3)
31. Which of the following is not an appropriate explanation of PMBOK?
a) It is a guideline for a project manager to perform comprehensively.
b) It is a systematized knowledge required for project management,
c) It is an index to evaluate an improve system development and system maintenance
processes.
d) It subdivides management targets such as scope, time and cost as knowledge areas.

32. Which of the following is an appropriate explanation concerning the usage of a UPS
(Uninterrupted Power Supply)?
a) It is used as a spare battery for a cell phone in order to use the cell phone for a longer
time.
b) It is used to continue the supply of power when a long power failure occurs in a computer
center.
c) It is used to temporarily supply power to a computer when a power failure occurs, and
to safeguard the computer against a momentary drop in voltage.
d) It is used to enable the use of a computer for a long time in an outdoor area where no
other power source is available.
33. Which of the following is the appropriate use of a security cable (or security wire)?
a) Preventing critical equipment from being destroyed in a fire
b) Preventing notebook PCs in the office from being stolen
c) Preventing the screens of mobile PCs used outside the office from being peeped at
d) Supplying alternative power to the system in the event of a power failure
34. In an IT facility such as a data center, which of the following is used to improve the
maintainability and installation efficiency of several types of equipment?
a) Server rack b) Hub c) Firewall d)
Router
35. In project management, which of the following is an appropriate diagram or chart that can
be used for representing the time sequence and dependencies of activities and creating
the schedule of a project?
a) Arrow diagram b) Cause and effect diagram
c) Composite bar chart d) Control chart

11
36. The private power generator is installed to protect a business server against electric power
failure, but it takes one minute to provide a stable power supply after the power failure is
detected. Which of the following devices is necessary to supply temporary power to the
server during that one-minute period?
a) A/D converter b) RAID c) UPS d) Firewall
37. When the operation of an information system is outsourced, which of the following is
created in order to agree on the quality level for the service to be provided between the
outsourcing party and the contractor?
a) ASP b) ISP c) RFP d) SLA
38. Which of the following activities aims at the maintenance and improvement of the service
level through monitoring and review of the service status in order to implement the terms
of agreement of an SLA?
a) CSR b) ERP c) SLM d) SWOT
39. Which of the following is a description concerning facility management for the
maintenance of information system equipment?
a) It manages schedules, budgets, personal resources, etc. for the success of information
system development projects.
b) It manages fault monitoring, creation of backups, etc. for information systems.
c) It manages data centers and other buildings where information systems are operated.
d) It manages user IDs and passwords for the use of information systems.
40. The table is a plan at the starting point when a group with six (6) members develops a
system. On the 19th day from the start, 50% of coding task is completed. Approximately
what % of the whole project does the remaining task constitute at the end of the 19th day?

Tasks Planned person-hours


Specification creation 4 days
Program design 7 days
Test plan creation 2 days
Coding 6 days
Compiling 4 days
Testing 5 days

a) 43% b) 57% c) 63% d) 68%

12
41. In release management of IT service management, the items which have been planned
and approved according to the change management are implemented in the production
environment. Which of the following is an appropriate description concerning release
management?
a) Information may be provided after the completion of release to users and operation
managers concerned with changes.
b) During release planning, cases when activities cannot be completed within the planned
time period are also taken into account.
c) Since there is no possibility of new failures after release, it is not necessary to make
preparations.
d) Regardless of the scale of release, the release is implemented simultaneously for all
users.
42. Which of the following items must be clarified in order to determine the appropriate
assignment of the project members?
a) Cost estimation method
b) Reporting method of activity progress
c) Acceptance standards of deliverables
d) Roles and responsibilities to be allocated
43. In order to provide an IT service, it is required to maintain and protect the resources such
as the building and the facilities in a data center so that the resources are kept in an
optimal status. Which of the following is an appropriate description of the maintenance
and protection of the building and the facilities?
a) An agreement is made between the IT vendor and the customer on the level of service
regarding the monitoring of unauthorized access.
b) An inspection is performed in order that a backup power generator can be used when
it is required.
c) The construction plan of a building is developed, and the construction is completed.
d) Response and primary resolution are performed for inquiries from users about the IT
service that is being provided in the data center.
44. In a project where 60 programs are created with a budget of 18 million yen, when the
status of the project was checked 20 days after the start of the project, it was found that
40 out of the 60 programs have been completed at a cost of 15 million yen. If the project
continues to proceed at the same pace, what is the excess of cost over budget? Here, the
scale of all programs and productivity are the same.

13
a) 3 million yen b) 4.5 million yen c) 6 million yen d) 7.5
million yen
45. Which of the following is the most appropriate explanation of what a service desk
implements?
a) It eliminates the root cause of an incident and prevents the recurrence of the incident.
b) It installs updated software in order to prevent the recurrence of an incident.
c) It performs centralized management of changes in a service.
d) It receives and records inquiries from users.
46. Which of the following is the most appropriate description of stakeholders in a system
development project?
a) They are individuals and organizations such as users of the developed system and
managers in the development division.
b) They are sponsors who bear the cost of system development.
c) They are events that may negatively affect the project and other events that may
positively affect the project.
d) They are project deliverables and tasks that are performed to create the deliverables.
47. In IT service management, which of the following is an appropriate process for resolving
the fundamental causes of incidents and preventing their recurrence?
a) Incident management b) Change management
c) Problem management d) Release and deployment management
48. Which of the following is an appropriate activity for project human resources management
in a system development project?
a) Determining the type of deliverables to be created in external design phase
b) Creating a schedule for the integration test
c) Estimating personnel costs for defining system requirements
d) Conducting training to improve programming skills
49. Which of the following is a framework that describes a collection of best practices of IT
service management?
a) ISO 14001 b) ISO/IEC 27001 c) ITIL d) PMBOK
50. When the system development activities are implemented, a plan is set up to complete
the activities in 20 days by six (6) members having the same productivity. However, the
plan is changed to have the activities finished in 15 days, and new members are added.
When the productivity of the new members is half of the initially planned members, what
is the minimum number of new members necessary for finishing the activities in 15 days?

14
a) 1 b) 2 c) 4 d) 6
51. The activities of a systems audit are divided into the processes of drafting of an audit plan,
acquisition and evaluation of audit evidence, implementation of audit procedures, creation
of an audit report, and follow-up. Which of the following processes gives guidance to
auditee on the implementation of appropriate actions for improvement?
a) Acquisition and evaluation of audit evidence
b) Implementation of audit procedures
c) Creation of an audit report
d) Follow-up
52. Which of the following persons are responsible for building and promoting IT governance
in a company?
a) Shareholders b) Directors
c) Employees d) Information system department members
53. Which of the following is an appropriate purpose of providing FAQ to users in IT service
management?
a) Providing a framework of IT service management
b) Defining a target value for the service level on the sides of both service provider and users
c) Establishing a single point of contact for users to accept all kinds of inquiries concerning
the service
d) Supporting users so that they can solve problems by themselves
54. After the start of a project, the scope is defined by collecting the requirements for the
project. Which of the following is the most appropriate purpose of defining the scope?
a) To clarify the activities to be implemented in the project
b) To create the action plan against the risk that has been realized in the project
c) To create an action plan for the delay of the project
d) To create the objectives of the project
55. In the arrow diagram below, what is the maximum number of days that can be allowed as
a delay of the activity “C→F” on condition that the total number of days required for
activities from A through G is not affected?

15
a) 1 b) 2 c) 3 d) 4

56. The table below shows the evaluated scores of the proposals of four (4) vendors from the
viewpoints of management, technology, and price. When each score of the management
viewpoint, technology viewpoint, and price viewpoint is weighted, and the vendor with the highest
total score is selected as the supplier, which of the following vendors is selected?

a) Vendor A b) Vendor B c) Vendor C d) Vendor D

57. A person wishes to start at point X, pass through all of points A, B, and C, and arrive at point
Y. When the routes and the required times between points are as shown in the figure and the
table, what is the shortest time in minutes from point X to point Y? Here, the points A, B, and C
may be passed through in any order.

16
a) 110 b) 130 c) 140 d) 150
58. A certain product’s sales plan and sales result are shown in the table below. What is the
ratio in percentage of the profit result to the profit plan? Here, the decimal fractions of the ratio
are truncated.

a) 77 b) 99 c) 110 d) 129

17
59. Company X summarized the results of positioning analysis of its marketing power in relation
to competitors into the table as shown below. In the table, “1” is the lowest score, and “5” is the
highest score. Where does Company X rank from the top?

a) 1 b) 2 c) 3 d) 4

60. The operating profit when the sales quantity of a product is 700 units is as shown in the table
below. When the unit sales price is reduced by 20% to expand sales, the sales quantity increases
by 20%. How much, in yen, is the operating profit at this time? Here, the variable cost per one (1)
unit of the product does not change.

a) 200,000 b) 204,000 c) 260,000 d) 320,000

61. Which of the following refers to a technique by which several persons come together and give
their ideas freely with prioritizing quantity over quality of ideas without criticizing each other so as
to solve a problem?
a) Brainstorming b) Benchmarking

18
c) Role playing d) Work design

62. Which of the following is the scope that the CFO, one of the positions involved in corporate
management, bears responsibility for?
a) Technology b) Finance c) Information d) Personnel
63. Among the phases of the PDCA cycle in corporate business operations, which of the following
measures and evaluates the status of execution of operations on the basis of KPI?
a) P b) D c) C d) A

64. Retail company A is teaching the general distribution process for food products in an easily
understandable manner at elementary schools near the company’s distribution center. Which of
the following is an idea behind these activities by company A?
a) CSR b) Alliance c) Core competence d) Corporate governance

65. Which of the following is an expression that calculates operating profit?


a) (Gross profit) − (Selling, general, and administrative expense)
b) (Sales) − (Cost of sales)
c) (Current profits) + (Extraordinary profit) − (Extraordinary loss)
d) (Current net profit before tax) − (Corporate tax, residential tax, and business tax)

66. Which of the following is an appropriate example of an initiative based on the Green IT
concept?
a) Use of displays that reduce eye fatigue from blue LED light
b) Installation of air shower at the server room entrance and exit
c) Construction of backup systems in preparation for disasters
d) Setting a policy of viewing materials on PC screens, limiting their printing on paper

67. Which of the following is an example of a Non-Disclosure Agreement (NDA)?


a) A contract specifying the service content to be provided, which is agreed between the service
provider and the customer before the provision of the IT service
b) A contract specifying that the vendor of computer equipment bears the responsibility of
transferring the property right, and that the buyer bears the responsibility of paying the charges.
c) A contract, specifying the obligation of the outsourcer and outsourcee to maintain confidentiality

19
of the secret information of a party that becomes known to the other party during system
development
d) A contract specifying that an outsourcee to whom the installation of a generalpurpose software
package has been outsourced performs the task at the outsourcee’s own discretion and
responsibility, and receives payment upon the completion of the task

68. Which of the following is appropriate as an expected advantage of the adoption of ISO 9001
by companies?
a) The companies' trade procedures will be standardized, leading to increased efficiency and the
avoidance of non-tariff barriers.
b) Technical specifications will be standardized in the industry, and increase in product quality and
expansion of markets will move forward.
c) Methods for handling information assets will be standardized and the quality of information
security will increase.
d) Business operations concerning quality management will be standardized, and the quality and
efficiency of management will increase.

69. In Company X, the experience and know-how of employees who have managed drainage
treatment in the facility over a long period of time is documented and accumulated, and the
accumulated experience and know-how is utilized on daily drainage treatment activities and
design of new processing equipment. Which of the following is appropriate as a concept of this
example?
a) ERP b) SFA c) Supply chain management d) Knowledge
management

70. Which of the following is a technique that analyzes the value of a product or service through
the relationship between functionality and cost, and enhances that value through reduction in cost
and increase in functionality and quality?
a) Supply chain management
b) Knowledge management
c) Value engineering
d) Reverse engineering

20
71. As a method for a company to utilize the business resources of another company, there is a
corporate acquisition and a corporate alliance. Which of the following lists all and only the general
demerits of a corporate alliance in comparison with a corporate acquisition? I It is required to
reform the other company’s organization or business process. II The participation in decision
making of the other company regarding the utilization of business resources is limited. III The
required investment is large and has an impact on the financial status.
a) I b) I, II, III c) I, III d) II

72. Which of the following is an appropriate explanation of 3C analysis that is used to analyze a
business environment?
a) The analysis is performed from the three (3) perspectives of the customers, the competitors,
and the company.
b) The analysis is performed from the three (3) perspectives of last purchase date, purchase
frequency, and purchase amount.
c) The analysis is performed by decomposition into the three (3) elements of era, age, and
generation.
d) The analysis is performed by categorization into three (3) groups in descending order of total
sales.

73. Which of the following often uses a chart with relative market share for the horizontal axis and
market growth rate for the vertical axis, and analyzes the strategic positioning of a company’s
products or business?
a) ABC analysis b) PPM c) SWOT analysis d) Value chain
analysis

74. Which of the following is an appropriate purpose of Management Of Technology (MOT)?


a) To improve the productivity by using mathematics and natural science in business
administration and production management
b) To grow a company by effectively connecting technical innovation with the business of the
company
c) To improve the quality of a company by ensuring that the employees put in efforts systematically
to improve the quality of products
d) To improve the business process efficiency by acquiring the necessary techniques and
knowledge from senior employees through actual business operations at the workplace

21
75. Which of the following is a business objective that becomes possible to achieve with “the
introduction of a POS system”?
a) Improvement in the work productivity of salespersons and organizational strength of the sales
department
b) Reduction in inventory volume of component parts and partly finished goods
c) Optimization of the series of processes from procurement to manufacturing, shipment, and
sales
d) Improvement in the product lineup at each store and streamlining of ordering and inventory
control

76. Which of the following is an appropriate combination of the protocols that are used for
transmitting and receiving e-mail as shown in the diagram below?

77. Which of the following is placed between an internal network and an external network in order
to prevent unauthorized access from the external network to the internal network?
a) DHCP server b) Search engine
c) Switching hub d) Firewall

78. Which of the following is an appropriate effect of replacing IPv4 with IPv6?

22
a) Problems no longer occur when two or more devices that can be accessed directly from the
Internet have the same IP address.
b) The shortage of IP addresses that can be used on the Internet is resolved.
c) It becomes possible to use optical fibers for connecting to the Internet.
d) The communication speed on the Internet is increased.

79. Which of the following is a mechanism by which, if an e-mail is sent to a specific e-mail
address, the e-mail with the same content is distributed to multiple e-mail addresses that have
been registered to the specific address?
a) Web mail b) Chain mail c) Mailing list d) Reply mail

80. Among the cases of communication between PCs, servers, communication devices, printers,
and other devices, which of the following needs to use a WAN?
a) Multiple PCs and a file server are connected to a LAN in Osaka branch office, and files stored
in the file server are made to be accessible from any PC connected to the LAN.
b) Inside a house, a PC and a printer are connected with Bluetooth, and documents created on
the PC are printed on the printer.
c) Inside a server room, a PC and a web server are connected to a hub, and the web server is
maintained from the PC.
d) A PC connected to the LAN in Kyoto-City sales office accesses the server in Tokyo head office
and uploads sales information.

81. Which of the following is an appropriate explanation of a keylogger that is a threat to


information security?
a) Stealing information by watching the keyboard input and the display output from behind a PC
user
b) Monitoring and recording the keyboard input on a user’s PC
c) Identifying a password by using a dictionary of the words that are likely to be used as passwords
d) Searching for a access point that allows unauthorized access by moving around a town with a
PC that can detect the electromagnetic waves of a wireless LAN

82. Which of the following is the most appropriate explanation of phishing?


a) A computer infected with a virus is controlled without owner’s consent from an external location
via a network such as the Internet by the functions of the virus.

23
b) A false e-mail is sent, in order to lead the recipient to a fake website or to an imitation of an
existing website, and then to illegally obtain personal information.
c) When user’s data sent to a website is displayed as is, its vulnerabilitiy is exploited in order to
embed in a page a malicious script that illegally obtains the information about user who displayes
the page.
d) A resident program is placed on a PC without the knowledge of the users in order to illegally
obtain data in files or information about PC operations.

83. Which of the following is a form of direct damage to a server that is caused by a DoS attack?
a) The encrypted data on the server is decrypted.
b) The administrator password of the server is changed.
c) The server is infected by a virus.
d) The services of a server are interrupted.

84. Among the countermeasures A through D concerning information security, which of the
following is the list that contains all and only the appropriate countermeasures for virus infections?
A: Installing antivirus software
B: Applying a security patch (i.e., update module)
C: Setting a password for the hard disk
D: Encrypting files
a) A, B b) A, B, C c) A, D d) B, C

85. Among the descriptions A through C concerning PKI, which of the following is the list that
contains all and only the appropriate descriptions concerning a digital signature in email? A The
recipient can check whether the sender is the intended person. B It is possible to prevent e-mail
from being read before it reaches the recipient. C The recipient can confirm that the e-mail has
not been tampered with.
a) A, B b) A, C c) B, C d) A, B, C
86. Which of the following is the general name for evil-minded software such as a key logger or
worm?
a) Shareware b) Firmware c) Malware d) Middleware

24
87. In the description below concerning risk management in information security, which of the
following is an appropriate combination of words or phrases to be inserted into the blanks A
through C?

88. IDs and passwords are leaked from the first website, and the users of this website suffer from
a password list attack on the second website. In this case, which of the following is the problem
concerning the IDs and passwords for the second website?
a) The ID and password are sent via unencrypted communication.
b) The same IDs and passwords as the first website are set.
c) Password are set with a combination of a small variety of characters.
d) Short passwords are set.

89. Among the types of authentication I through IV, which of the following is a list that contains all
and only biometrics authentication?
I PIN (Personal Identification Number)
II Iris
III Fingerprint
IV Vein
a) I, II, III b) II, III c) II, III, IV d) IV

90. When information security management is based on the PDCA cycle, which of the following
corresponds to C?

25
a) The objectives, processes, and procedures for information security are established.
b) Improvement is made through corrective and preventive actions on the basis of an evaluation.
c) Processes and procedures are introduced and operated.
d) Effectiveness of the processes are measured and evaluated.

91. Which of the following is a protocol that is used for encrypted HTTPS communication between
a web server and a web browser?
a) SEO b) SPEC c) SQL d) TLS

92. Which of the following sets conditions for character type, length, etc. used for passwords
that are set for accounts on a computer, etc?
a) Single sign-on b) Password crack c) Password policy
d) One-time password
93. Which of the following is a technique for taking advantage of psychological weaknesses
or carelessness in order to improperly obtain confidential information?
a) DoS attack
b) SQL injection
c) Social engineering
d) Buffer overflow

94. When another network such as the Internet is accessed from a network in an office or a
household, which of the following fulfills the role of an entrance or an exit to the other
network?
a) Splitter
b) Default gateway
c) Hub
d) Repeater

95. Which of the following is a business operator that provides access to the Internet?
a) ASP b) ISP c) SaaS d) SNS

96. Which of the following is the expression to be entered into cell D4 in order to calculate the
after-tax prices of the products shown in cells A4 and A5 by using the two tentative sales tax rates

26
that are set in cells D2 and E2? Here, the expression to be entered into cell D4 is copied to cells
D5, E4, and E5.

a) $B4 * (1.0 +D$2) b) B$4 * (1.0 +D$2) c) B4 * (1.0 +D2) d) $B$4 * (1.0 +$D2)

97. A survey into the amount of pocket money is conducted at three (3) schools. When the
consolidated results of the survey are used to calculate the average pocket money per student
for all the students of the three (3) schools, which of the following is the expression that is entered
into cell C5?

a) (B2*B3*B4)/(C2*C3*C4) b) AVERAGE(C2:C4)
c) SUM(C2:C4)/SUM(B2:B4) d) (B2*C2+B3*C3+B4*C4)/SUM(B2:B4)

98. In order to calculate the ratio of the gross profit for each item to the total gross profit
(hereinafter, the gross profit ratio), the expression is entered in cell G2 of the worksheet shown
below, and then copied to cells G3 through G5. Which of the following is the expression that is
entered in cell G2? Here, the cells used to calculate the gross profit ratio are displayed in
percentage.

27
a) F2/E2 b) F2/F$6 c) F2/F6 d) F2/SUM(E$2:E$5)

99. A spreadsheet program is used to create a quick reference chart for the compound interest
per a principal of 1,000 dollars. Which of the following is the expression that should be entered in
cell B4? Here, the expression in cell B4 is copied to each of cells B4 through F13.

a) $B$1* ((1 +$B2) ^ $A4 − 1) b) $B$1*((1 +$B2) ^ A$4 − 1)


c) $B$1*((1+B$2) ^ A$4 − 1) d) $B$1*((1+B$2) ^ $A4 − 1)

100.

28
In order to aggregate and analyze the questionnaires that are filled in by 200 respondents,
spreadsheet software is used to create the worksheet in Figure 1. Here, the response table is a
list where each line is the evaluation of a customer, and cells B204 through F204 calculate and
display correlation coefficients that show the relationship between the evaluation for the category
in each column and the overall evaluation. The evaluation aggregation table displays the
occurrence for each level of satisfaction (1 through 5) in each category.
In cell B208 of the evaluation aggregation table in Figure 1, an expression that displays the
relevant occurrence is entered. Which of the following is the expression that is entered in cell
B208? Here, the expression in cell B208 is copied into cells B208 through G212.

29
a) COUNTIF(B$3:B$202, = $A208) b) COUNTIF($B3:$G3, = $A3)
c) COUNTIF($B3:$B202, = A$208) d) COUNTIF(B$3:G$3, = A$3)

30
S1B3 C++ Only

1.Create Employee Class.


Member data int empid
string name
float salary
long phnum
Member function getemployee()
showemployee()
Create Employee array objects. (25 marks)

2.Create Student Class.


Member data int rollnum
string name
int mark1
int mark2
Member function getstudent()
showstudent()
testresult()
showresult()
for testresult pass,fail,distinctions
for showresult no of pass students,no of fail students and no of distinction students
Create Students array objects. (25 marks)

31
a) COUNTIF(B$3:B$202, = $A208) b) COUNTIF($B3:$G3, = $A3)
c) COUNTIF($B3:$B202, = A$208) d) COUNTIF(B$3:G$3, = A$3)

32

You might also like