Q.
Which of the following is an appropriate purpose of Management Of Technology
(MOT)?
Q.
Japanese restaurants in Sapporo and Japanese restaurants in Hakodate are to be searched
for together. Which of the following is the logical expression that represents the search
condition?
Q.
Which of the following is used to confirm that there is no falsification of the content of
an e-mail?
Q.
In a development project for a system, there is a plan to create 36 programs with the
same size. It was first planned to assign only Mr. A who can create six (6) programs per
week, but the plan was changed and it was decided to assign two (2) people: Mr. A, and
Mr. B who has half the productivity of Mr. A. When the cost per week for Mr. A and Mr.
B is 300 thousand yen and 200 thousand yen respectively, how much is the change in the
cost as compared to the original plan? Here, Mr. A and Mr. B perform activities in parallel,
and the efficiency of Mr. A and Mr. B are always fixed.
Q.
Which of the following is the most appropriate term for information in large quantities
and in diverse forms that has real-timeness and is expected to help obtain knowledge
useful for decision-making?
Q.
When a user accessed the URL in the body of an e-mail message with a PC, the message
shown in the figure appeared on the screen and the PC was locked. Which of the
following is used in this attack?
Q.
Among confidentiality, integrity, and availability, which of the following is the list that
contains all and only the properties that are lost in the information security incident
below?
All of the files on a server in the workplace were encrypted and saved. However, the
server was infected by a virus, and a number of the files were deleted. Elimination of
the virus and recovery of the files required several hours. During the hours, work could
not be performed, and users were inconvenienced. Some files were unable to be
recovered.
Q.
Which of the following is an appropriate effect of CAD?
Q.
Which of the following is always true for two (2) sets A and B? Here, (X ⋂ Y)
represents the set that contains only the elements that are in both X and Y (intersection
set), and (X ∪ Y) represents the set that contains all of the elements that are in at least
one of X or Y (union set).
Q.
When a chairperson and a secretary are selected from three (3) candidates with a method
that allows dual roles, there are three (3) ways for the selection of a single chairperson
and three (3) ways for the selection of a secretary, so in total, there are nine (9)
combinations for the selection of a chairperson and a secretary. When a chairperson and
a secretary are selected from five (5) candidates with a method that allows dual roles,
how many combinations for the selection are there?
Q.
Multiple files stored on a hard disk are used in work, from Monday to Friday. In order
to handle failure of the hard disk, the data is backed up to another hard disk after the end
of each day’s work. When the backup has following conditions, what is the total time
required (in minutes) to perform backups of data from Monday to Friday?
[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size
of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One (1) file
is backed up at a time; backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday,
all files are backed up, whether or not they have been modified.
Q.
Which of the following is an appropriate description concerning a balanced scorecard
(BSC)?
Q.
Which of the following is a protocol that is used for synchronization of the internal clock
of a computer via a network with a server that holds a reference clock?
Q.
Which of the following is an explanation of spyware?
Q.
Among the methods I through III for handling multiple hard disks as one (1) logical disk,
which of the following lists all and only the methods that can recover data even if one of
the constituent hard disks fails?
I RAID5
II Striping
III Mirroring
Q.
Estimation methods for system development include the analogy-based method, the
bottom-up method, and the FP (Function Point) method. Which of the following is an
appropriate explanation of the FP method?
Q.
Which of the following is an appropriate description concerning biometric
authentication?
Q.
A company orders information system to an overseas vendor under a contract for work.
Which of the following is an appropriate activity that is performed as project
procurement management by the company?