Fundamental IT Engineer Examination (Morning) Apr 2016

Fundamental IT Engineer Examination (Morning) Apr 2016

情報処理技術者試験 / ITPEC アジア共通統一試験

http://itpec.org/pastexamqa/fe.html

 Q.41- Fundamental IT Engineer Examination (Morning) Apr 2016 Q.41-


Which of the following decimal values is equivalent to a hexadecimal

fraction 0.B1?

a) 2^0 + 2^-2 + 2^-3 + 2^-7

b) 2^0 + 2^-3 + 2^-4 + 2^-8

c) 2^-1 + 2^-3 + 2^-4 + 2^-7

d) 2^-1 + 2^-3 + 2^-4 + 2^-8

斎藤注:2^-1 は,2 の -1 乗を意味する。

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q1.

------------------------------------------------------------------------

Q2. Which of the following is a solution for the logical equation on variable X below? Here, A, B, and C are logical constants; the operators “+”, “·”, and “¯” denote logical OR, logical AND, and NEGATION, respectively. ∙++∙=∙+̅∙ a) ∙ b) ∙̅ c) + d) ̅∙

33

Alice and Mary take a math exam. The probability of passing this exam

for Alice and Mary is 2/3 and 3/5, respectively. What is the probability

that at least one of them will pass the exam?

a) 1/5

b) 7/15

c) 3/5

d) 13/15

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q3.


------------------------------------------------------------------------

What is the distribution of arrival rate in an M/M/1 queuing model?

a) Exponential distribution

b) Geometric distribution

c) Normal distribution

d) Poisson distribution

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q4.


------------------------------------------------------------------------

Q5. With a randomized version of the quicksort algorithm, where the pivot is selected randomly, which of the following shows the average-case and the worst-case time complexities? Here, O( ) is used to denote the order of growth rate.

Average-Case Time Complexity

Worst-Case Time Complexity a) O(nlog n) O(n) b) O(nlog n) O(n2) c) O(n2log n) O(n) d) O(n2log n) O(n2)

7320 2222 − −− + ++ 8 430 2 222 − −− + ++ 7431 2222 − −−− + ++ 8 431 2 222 − −−− + ++

– 5 –

There is a language defined by a context-free grammar with the production

rules below:

E → T + E | T

T → F * T | F

F → ( E ) | C

C → 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

In this grammar, non-terminals are E, T, F, and C; terminals are

parentheses, plus sign, asterisk, and numbers; E is the start symbol.

Which of the following shows that the expression 7 + 3 * (6 + 4) is a

sentence of this language?

a) E → 7 + 3 * (F + T)

b) E → 7 + 3 * E

c) E → 7 + 3 * (T)

d) E → 7 + T * (E)

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q6.

------------------------------------------------------------------------

Q7. Let A be an array of integers of size 10, whose ith entry is represented by A[i] for i = 0 to 9, and its initial value is 0. For a positive integer k, the rules below determine the entry in which the value k is stored. When the integers 16, 43, 73, 24, and 85 are processed in this order, in which entry is the last value 85 stored? Here, x mod y represents the remainder after the division of x by y.

[Rules] (1) If A[k mod 10] = 0, then store k in A[k mod 10]. (2) Otherwise, if A[(k + 1) mod 10] = 0, then store k in A[(k + 1) mod 10]. (3) Otherwise, if A[(k + 4) mod 10] = 0, then store k in A[(k + 4) mod 10]. (4) Otherwise, discard k.

a) A[3] b) A[5] c) A[6] d) A[9]

Typical list data type implementations are either array based or pointer

based. Which of the following describes a characteristic of array-based

implementations?

a) In addition to space for each element in a list, space for a pointer

to the next element is also required.

b) Moving to the middle of a list takes an amount of time proportional

to the number of elements, as it requires visiting all the entries

from the beginning to the middle.

c) Regardless of the actual number of elements in a list, insertion and

removal of an element can be performed in a fixed time.

d) Regardless of the actual number of elements in a list, some space may

remain unused as the space for storing the maximum number of elements

is pre-allocated.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q8.

------------------------------------------------------------------------

Q9. To make the flowcharts below equivalent, which of the following combinations is appropriate for labels A and B? Here, represents the negation of P.

Q

Process

P

A

B

or Q

Process

No

Yes

P

A B a) No No b) No Yes c) Yes No d) Yes Yes

Q10. What is the value of the arithmetic expression resulting from an in-order traversal of the binary tree below?

a) 11 b) 20 c) 27 d) 45



In a CPU with a four (4)-stage pipeline composed of fetch, decode,

execute, and write back, each stage takes 10, 6, 8, and 8 ns, respectively.

Which of the following is an approximate average instruction execution

time in nanoseconds (ns) in the CPU? Here, the number of instructions to

be executed is sufficiently large. In addition, the overhead for the

pipelining process is negligible, and the latency impact from all hazards

is ignored.

a) 6

b) 8

c) 10

d) 32

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q11.


------------------------------------------------------------------------


Which of the following is the computer architecture where a processor

executes the same instruction on multiple data?

a) MIMD

b) MISD

c) SIMD

d) SISD

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q12.


------------------------------------------------------------------------

Which of the following is an addressing mode that provides an offset to

the program counter (PC) content to determine the address of the operand?

a) Immediate addressing mode

b) Indirect addressing mode

c) Register indirect addressing mode

d) Relative addressing mode

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q13.


------------------------------------------------------------------------


hich of the following is used to translate a logical address generated

by a CPU into a physical address?

a) Direct Memory Access Controller (DMAC)

b) Memory Address Register (MAR)

c) Memory Management Unit (MMU)

d) Translation Lookaside Buffer (TLB)

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q14.


------------------------------------------------------------------------

Which of the following is an appropriate description concerning cache

memory?

a) In a multi-tasking environment, a cache memory maintains data from

  each task to improve performance.

b) Multiprocessors where each has a cache memory need to synchronize

values within the cache to maintain coherency.

c) The operating system manages the data transfer between registers

and a cache memory.

d) The speed and size of a cache memory are the only consideration

when improving performance.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q15.

------------------------------------------------------------------------

Q16. Which of the following is a technique of segmenting and storing data on multiple hard disks as shown in the figure? Here, b0 through b15 show the sequence in which the data are stored to the data disks on a bit-by-bit basis.

b15 b11 b7 b3

b14 b10 b6 b2

b13 b9 b5 b1

b12 b8 b4 b0

Control unit

Data disk 1 Data disk 2 Data disk 3 Data disk 4

a) Blocking b) Disk cache c) Mirroring d) Striping



Which of the following is an appropriate description of throughput?

a) Even if some idle time resulting from operator intervention between

the end of a job and the start of the next job occurs in a system,

throughput is not affected.

b) Multi-programming contributes to reducing turnaround time, but is

not useful in improving throughput.

c) Spooling, which involves temporarily saving the output to a printer

in a hard disk, is useful in improving throughput.

d) Throughput is an index of CPU performance and is not affected by

the I/O speed, overhead time, and other such factors.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q17.

------------------------------------------------------------------------


Which of the following is the mean time between failures (MTBF) value

of the entire system where unit A and unit B are connected in series and

both units operate as one system? The MTBF value of unit A and unit B is

200 and 300 hours, respectively.

a) 200

b) 250

c) 300

d) 500

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q18.


------------------------------------------------------------------------

When the multiplicity of processing is increased in the virtual memory

of a computer system, page-in and page-out operations occur very frequently,

and the response speed of the system decreases suddenly. What is this

phenomenon called?

a) Memory compaction

b) Overlay

c) Roll-out

d) Thrashing

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q19.


------------------------------------------------------------------------


A company performs a full backup every Sunday night and differential

backups every night other than Sunday night. If the failure occurs on

Wednesday morning, which of the following backups is least needed to

restore the system?

a) The latest differential backups from Tuesday.

b) The latest full and the latest differential backups from both Monday

and Tuesday.

c) The latest full and the latest differential backups from Tuesday.

d) The latest full backups from Sunday.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q20.


Q21. Which of the following is an appropriate explanation for a non-preemptive scheduling method?

a) A task cannot move to a running state until another task in the running state either moves to the waiting state by itself or finishes. b) Each time a new task becomes the ready state, a comparison is made for all tasks in the ready state from the standpoint of the remaining execution time, and the tasks are executed in an order starting from the shortest execution time. c) When a task becomes the ready state, a comparison is made between the priority of the task and that of the one in the running state at that time, and the task with the higher priority moves to the running state. d) When a task in the running state does not move to the waiting state within a predetermined time period, the task is interrupted, and the next task in the waiting queue moves to the running state.

Q22. There is a system composed of two (2) CPUs, and the CPU that is not in use is assigned to a task for which there is an execution request. When two (2) tasks A and B are run on this system, these tasks exclusively use a common resource R. The figure below shows the usage periods of the CPUs and resource R for tasks A and B, and the order in which the tasks are run. When the execution of both the tasks is started simultaneously, how much time, in milliseconds, is required until the completion of processing of both the tasks? Here, both the CPU and resource R are available when tasks A and B are started.

CPU 10 milliseconds

Resource R 50 milliseconds

CPU 60 millisecondsTask A

CPU 40 milliseconds

Resource R 50 milliseconds

CPU 30 millisecondsTask B

a) 120 b) 140 c) 150 d) 200

Q23. According to the Open Source Definition by OSI (Open Source Initiative), which of the following is the appropriate description concerning open source licensing?

a) The license allows any party to freely use, modify, and distribute a program. A royalty fee is required only if the program is redistributed commercially. b) The license allows authors to put usage restrictions on a program to prevent such program from being used in business activities. c) The license requires that all derivative works must be kept secret if the derivative works are based on an original program. d) The license requires that the source code of a program must be made available either for free or at a reasonable reproduction cost.

– 11 –

Q24. Which of the following is a logical (or Boolean) expression that is equivalent to the logic circuit shown below? Here, “+” is the logical sum, “ ” is the logical product, and “ ” is the negation of X.

a) D CCBA ⋅ ⋅⋅⋅ b) () ) ( D CCBA + ⋅⋅+

c) D CBA + +⋅ d) D CBA ⋅ ⋅⋅

Which of the following is a sequential circuit that has two (2) stable

states?

a) Adder circuit

b) Flip-flop

c) NAND gate

d) NOR gate

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q25.


------------------------------------------------------------------------


Q26. Which of the following is an appropriate input for a common anode seven-segment display to display a character shown as output? Here, A represents the most significant bit (MSB) and G represents the least significant bit (LSB).

Figure: Display of character “E” in a seven-segment display

a) 0110000 b) 0000110 c) 1001111 d) 1111001

• X

Which of the following is more suitable for outline fonts than for

bitmap fonts?

a) To display single-byte and double-byte characters at the same time

b) To display characters as quickly as possible

c) To display characters in monospace

d) To enlarge characters by a given scale factor

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q27.

------------------------------------------------------------------------

Q28. Which of the following is an explanation of texture mapping?

a) It is a process by which surfaces that should not be visible to the user are prevented from being rendered. b) It renders a scene by calculating reflection, refraction, and transparency from the light source. c) It renders shadows based on light sources and shapes of objects when a scene is realized. d) It represents surface characteristics by pasting an image onto the surface of a three-dimensional object.

Q29. Which of the following is an appropriate purpose for adopting a three-layer schema architecture for DBMS?

a) To avoid making any impact on an application program even if the physical storage structure of data is changed b) To derive a new table from a source table through a relational operation as if the new table actually existed c) To restrict programming languages such that the application program and DBMS are linked closely d) To use an interactively used SQL statement from an application program as well

– 13 –

Car Customer

Mr. A Ms. B

Register

1456

Ms. C

4568 3246

Mr. D

Customer Car A..B C..D

Q30. Which is the most suitable multiplicity of the “Register” relationship betweenCustomer” entity and “Car” entity that matches the following diagram? Here, “A..B” and “C..D” respectively indicate the minimum and maximum possible participations to the relationship.

A B C D a) 0 1 0 1 b) 1 1 0 1 c) 0 1 0 * d) 1 1 0 *

Which of the following is an appropriate method used to remove data

redundancy in relational database systems?

a) Entity-relationship

b) Functional dependency

c) Hierarchical

d) Normalization

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q31.


------------------------------------------------------------------------

In a relation schema R = (A, B, C, D, E), the following functional

dependencies are held:

A → BC

CD → E

B → D

E → A

Which of the following is a combination of two candidate keys for R?

a) A and E

b) B and C

c) B and D

d) C and D

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q32.

------------------------------------------------------------------------


Which of the following is the main purpose of transaction support in a

database management system?

a) To ensure that either all the updates corresponding to a given

transaction are made or none of them is made

b) To ensure that only authorized users can access the database

c) To help users update data by providing a graphical user interface

d) To provide an accessible catalog in which descriptions of data items

are stored

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Apr 2016 Q33.

------------------------------------------------------------------------

Which of the following is a data link layer function that enables

receivers to control the amount of data to be received from the senders?

a) Congestion control

b) Error control

c) Flow control

d) Media access control

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q34.

------------------------------------------------------------------------

TCP/IP is a layered set of communication protocols consisting of the

Network Interface layer, the Internet layer, the Transport layer, and the

Application layer. Which of the following is a combination of the Transport

layer protocols?

a) DHCP, TCP

b) HTTP, UDP

c) IP, TCP

d) TCP, UDP

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q35.

------------------------------------------------------------------------

Which of the following is responsible for converting a domain name to

a corresponding IP address?

a) DHCP server

b) DNS server

c) IMAP server

d) SMTP server

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q36.

------------------------------------------------------------------------

Q37. Which of the following is an appropriate description of Transmission Control Protocol (TCP)?

a) It ensures reliability by retransmission of data segments if any of them is lost. b) It is an end-to-end protocol but does not have any mechanism for congestion control. c) It is connectionless and uses a checksum to ensure the integrity of the data. d) It is connection oriented but cannot operate if packets are received out of order.

On the Internet, sometimes when one tries to load a Web page by specifying

a URL like http://www.jitec.ipa.go.jp/, the page does not show up and an

error page is shown instead. However, one can browse this page correctly

by specifying its IP address like this: http://118.151.146.137/. Which of

the following TCP/IP layer is responsible for this problem?

a) Application layer

b) Internet layer

c) Network Interface layer

d) Transport layer

キーワード

■解答■

  Fundamental IT Engineer Examination (Morning) Apr 2016 Q38.

------------------------------------------------------------------------



Q39. Which of the following is an appropriate method of authenticating users by using a password?

a) The hash value of the user ID corresponding to the password is registered, and the password entered during authentication is converted by the hash function and compared. b) The hash value of the user ID corresponding to the password is registered, and the user ID entered during authentication is converted by the hash function and compared. c) The password is converted to a hash value and registered, and the password entered during authentication is converted by the hash function and compared. d) The password is converted to a hash value and registered, and the user ID entered during authentication is converted by the hash function and compared.

– 16 –

Q40. When malware that has made a successful intrusion into a PC communicates with a command-and-control server on the Internet, which of the following is a reason for using the TCP port number 80 as the destination port in most cases?

a) As this port is used for browsing websites, there is a high probability that communication is allowed by the firewall. b) As this port is used for browsing websites through the HTTPS protocol, there is a low probability that this port is detected by an intrusion detection system. c) As this port is used for name resolution of a domain name, there is a low probability that this port is detected by an intrusion detection system. d) As this port is used in a DNS zone transfer, there is a high probability that communication is allowed by the firewall.


Fundamental IT Engineer Examination (Morning) Apr 2016 Q.41-