Review answers

 Prev
/ 20
Next 

Q. Which of the following is an appropriate purpose of Management Of Technology (MOT)?

Q. Japanese restaurants in Sapporo and Japanese restaurants in Hakodate are to be searched for together. Which of the following is the logical expression that represents the search condition? 

Q. Which of the following is used to confirm that there is no falsification of the content of an e-mail?

Q. A document file that is stored on a file server is directly edited on a PC and then an attempt is made to overwrite the file, but the message “You do not have permission, so the file cannot be saved” is displayed. Which of the following is the appropriate combination of permissions that were set for the document file and the folder that it is stored in?

File read permission File write permission Folder read permission
(a) No Yes No 
(b) Yes Yes No 
(c) Yes No Yes 
(d) No No Yes

Q. In a development project for a system, there is a plan to create 36 programs with the same size. It was first planned to assign only Mr. A who can create six (6) programs per week, but the plan was changed and it was decided to assign two (2) people: Mr. A, and Mr. B who has half the productivity of Mr. A. When the cost per week for Mr. A and Mr. B is 300 thousand yen and 200 thousand yen respectively, how much is the change in the cost as compared to the original plan? Here, Mr. A and Mr. B perform activities in parallel, and the efficiency of Mr. A and Mr. B are always fixed.

Q. Which of the following is the most appropriate term for information in large quantities and in diverse forms that has real-timeness and is expected to help obtain knowledge useful for decision-making?

Q. There is the “Employee” table and the “Department” table in a relational database. The “Employee” table and the “Department” table are joined, and employees who live in prefectures different from the prefectures that their departments are located in are extracted. How many employees are extracted? 



Q. When a user accessed the URL in the body of an e-mail message with a PC, the message shown in the figure appeared on the screen and the PC was locked. Which of the following is used in this attack? 


Q. Among confidentiality, integrity, and availability, which of the following is the list that contains all and only the properties that are lost in the information security incident below?

All of the files on a server in the workplace were encrypted and saved. However, the server was infected by a virus, and a number of the files were deleted. Elimination of the virus and recovery of the files required several hours. During the hours, work could not be performed, and users were inconvenienced. Some files were unable to be recovered.

Q. Which of the following is an appropriate effect of CAD?

Q. Which of the following is always true for two (2) sets A and B? Here, ( Y) represents the set that contains only the elements that are in both X and Y (intersection set), and (∪ Y) represents the set that contains all of the elements that are in at least one of X or Y (union set).

Q. When a chairperson and a secretary are selected from three (3) candidates with a method that allows dual roles, there are three (3) ways for the selection of a single chairperson and three (3) ways for the selection of a secretary, so in total, there are nine (9) combinations for the selection of a chairperson and a secretary. When a chairperson and a secretary are selected from five (5) candidates with a method that allows dual roles, how many combinations for the selection are there? 

Q. Multiple files stored on a hard disk are used in work, from Monday to Friday. In order to handle failure of the hard disk, the data is backed up to another hard disk after the end of each day’s work. When the backup has following conditions, what is the total time required (in minutes) to perform backups of data from Monday to Friday?

[Conditions for backups]

(1) There are 6,000 files used in work, each with a size of 3 Mbytes.

(2) In each day’s work, 1,000 files are modified. Modifications do not change the size of the files.

(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One (1) file is backed up at a time; backup continues without interruption.

(4) From Monday to Thursday, only files modified that day are backed up. On Friday, all files are backed up, whether or not they have been modified.

Q. Which of the following is an appropriate description concerning a balanced scorecard (BSC)?

Q. Which of the following is a protocol that is used for synchronization of the internal clock of a computer via a network with a server that holds a reference clock?

Q. Which of the following is an explanation of spyware?

Q. Among the methods I through III for handling multiple hard disks as one (1) logical disk, which of the following lists all and only the methods that can recover data even if one of the constituent hard disks fails? 

I RAID5

II Striping

III Mirroring

Q. Estimation methods for system development include the analogy-based method, the bottom-up method, and the FP (Function Point) method. Which of the following is an appropriate explanation of the FP method? 

Q. Which of the following is an appropriate description concerning biometric authentication? 

Q. A company orders information system to an overseas vendor under a contract for work. Which of the following is an appropriate activity that is performed as project procurement management by the company?

 Prev
Next 
Random Tips