Question 1 Which is the most appropriate practice for user ID management? Choose one answer. a. All the users involved in the same project should use the same user ID. b. When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified. c. When privileges are set for a user ID, they should be minimized. d. A user having multiple user IDs should set the same password for all the IDs. Question 2 Which of the following is the appropriate explanation for the term “Articulation” in the interaction framework? Choose one answer. a. Is the interaction between User and Input b. Is the interaction between Core and Output c. Is the interaction between User and Output d. Is the interaction between Core and Input Question 3 Which of the following is the diagram that is used in structured programming and expresses the entire structure of a program in the form of a hierarchical structure? Choose one answer. a. State transition diagram b. NS chart c. PERT diagram d. Bubble chart Question 4 Which of these are attributes of usability? Choose one answer. a. Generalisability b. Usefulness c. Learnability d. Easy to use Question 5 Which of the following is the most appropriate as the description of prototyping, a system development technique? Choose one answer. a. Work is performed in the order of basic planning, external design, internal design, program design, programming and test. Therefore, with the technique, a perspective of the work as a whole is gained, making the determination of schedules and allocation of resources easier. b. The software is classified into software whose specifications are fixed and do not require modification, and software whose specifications require modification. Then, for the software whose specifications require modification, the process of development, reconsideration and modification is repeated. c. An experimental product is produced in an early phase of system development, enabling the removing of ambiguities and differences in recognition between the user and development organizations. d. A large-scale application is broken down into sub-units, each of which is highly independent. Then, for each sub-unit, the process of design, programming and test is repeated, gradually expanding the development area. Question 6 Which of the following are recognized kinds of prototypes: Choose one answer. a. Interactive sketches b. Conceptual models c. Paper d. Beta versions Question 7 Regarding relational database manipulation, which of the following statements ly explains projection? Choose one answer. a. Extract the specific columns from the table b. Create a table by combining inquiry results from one table and the ones of the other table c. Extract the rows satisfying specific conditions from the table d. Create a new table by combining tuples satisfying conditions from tuples in more than two tables Question 8 Which is in an inappropriate way of handling passwords and a password file in the system management department? Choose one answer. a. Even if a password file records encrypted passwords, the department should make it inaccessible to general users. b. It it is possible to set the term of validity of passwords, the term should be used for checking password validation. c. The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring about their passwords. d. The security managers should regularly check whether or not passwords can be easily guessed, and recommend that problem passwords be changed. Question 9 What is the means that is used in a WWW server to pass data that is input from a browser to an application program? Choose one answer. a. HTTP b. CGI c. URL d. MIME Question 10 Which of the following descriptions related to computer system reliability is ? Choose one answer. a. System remote maintenance improves the operating ratio, by improving the MTBF b. The system preventive maintenance is performed in order to extend the MTBF c. The system operating ratio is improved by extending the MTTR and MTBF d. The more complicated the system configuration is, the longer the MTBF becomes Question 11 If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes which of the following algorithms? Choose one answer. a. Uniformed-cost search b. Depth-limited search c. Iterative deepening search d. Depth-first search Question 12 Which is the most appropriate description of the ARP of the TCP/IP protocol? Choose one answer. a. A protocol that controls the path by the number of hops between the gateways. b. A protocol for getting the IP address from a server at the time of system startup in the case of system having no disc drive. c. A protocol that controls the path by the network delay information based on a time stamp. d. A protocol for getting the MAC address from the IP address. Question 13 In biometrics, a good measure of performance of a system is the: Choose one answer. a. Crossover Error Rate (CER). b. Positive acceptance rate. c. Sensitivity. d. False detection. Question 14 Which of the following is the most appropriate as the explanation of reverse software engineering? Choose one answer. a. Functions having been implemented with software are achieved with hardware. b. A development language and development tools are selected depending on the processing characteristics of the software c. Software is designed in the order of output, processing and input. d. Design specifications are produced from implemented software. Then, software is developed based on specifications produced thus. Question 15 A culture center examined three types of schemata (data structures) of A to C to manage the customers by using a database. Which of the following statements is ? [Explanation] A member can take multiple courses. One course accepts applications from multiple members. Some courses receive no application. One lecturer takes charge of one course. Choose one answer. a. In Schemata A and B, when you delete the row including the application date to cancel the application for the course, the information on the member related to the cancellation can be removed from the database b. In any of the three schemata, when you delete the row including the application date to cancel the application for the course, the information on the course related to the cancellation can be removed from the database c. In Schemata B and C, when there is any change in the member address, you only have to the member address recorded in the specific row on the database d. In any of the three schemata, when there is any change in the lecturer in charge, you only have to the lecturer in charge recorded in the specific row on the database Question 16 Which of the following representations is Conjunctive Normal Form? (symbol ^ represents AND, symbol – represent NOT) Choose one answer. a. P ^ Q b. – P V (Q ^ R) c. P ^ (Q => R) d. P => Q Question 17 Which is the statement about the recent increase in macro viruses? Choose one answer. a. Since it can be easily determined as to whether a macro function is infected by a virus, infection can be prevented at the time of opening a document file. b. Activating the system from an infected floppy disk loads the macro virus into the main meory, and then the virus infects the boot sectors of other floppy disks. c. The execution of an infected application loads in the macro virus into the main memory, and in this process, the virus infects program files of other applications. d. A macro virus infects document files opened or newly created after an infected document file is opened. Question 18 What is the maximum number of host address that can be set within the one and same subnet when the 255.255.255.0 subnet mask is used with the Class B IP address? Choose at least one answer. a. 65,534 b. 16,777,214 c. 254 d. 126 Question 19 How do you get to know the user in the usability engineering lifecycle? Choose one answer. a. Run a thinking aloud test b. Analyze user complaints c. Ask user in each phases d. Draw up a user profile Question 20 What is default port of DNS service? Choose one answer. a. 80 b. 110 c. 53 d. 25 Question 21 Which of the following SQL statements for the table "Shipment Record" produces the largest value as a result of its execution? Choose one answer. a. SELECT MAX (quantity) FROM shipment_record b. SELECT COUNT (*) FROM shipment_record c. SELECT AVG (quantity) FROM shipment_record d. SELECT SUM (quantity) FROM shipment_record WHERE date = '19991011' Question 22 Which of the following is the explanation of the “Network Layer” of the TCP/IP model? Choose one answer. a. Performs setting and release of routing and connections in order to create a transparent data transmission between end systems. b. Absorbs the differences in characteristics of physical communication media, and secures a transparent transmission channel for upper level layers. c. Provides transmission control procedures (error detection, retransmission control, etc.) between adjacent nodes. d. This is the layer closest to the user, and allows the use of file transfer, e-mail and many different applications. Question 23 In problem-solving agents, when a solution is found? Choose one answer. a. Whenever a percept is perceived b. After all actions are performed c. Before the first action is performed d. After the first action is performed Question 24 Which of the following corresponds to the computer interface technology that uses icon, etc? Choose one answer. a. CAI b. GUI c. CUI d. GDI Question 25 Which of the following protocols has become a worldwide de facto standard? The protocol is used by the ARPANET in the USA, and is built into the UNIX system. Choose at least one answer. a. TCP/IP b. ATM c. ISDN d. CSMA/CD Question 26 How many main categories of principles to support usability? Choose one answer. a. 6 b. 3 c. 5 d. 4 Question 27 RAID refers to the: Choose one answer. a. Redundant Arrays of Independent Disks. b. Rapid And Inexpensive Digital tape backup. c. Remote Administration of Internet Domains. d. Redundant And fault tolerant Internetworking Devices. Question 28 According to the content of the course, Genetic Algorithms can be used in which of the following problems? Choose one answer. a. Timetabling problem b. Vacuum-cleaner problem c. Tic-tac-toe problem d. Path-finding problem Question 29 Which of the following SQL statements can extract the average salary by department from tables A and B? Choose one answer. a. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B WHERE table_A.code = table_B. dept_code GROUP BY dept_code, dept_name b. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B WHERE table_A.code = table_B. dept_code ORDER BY dept_code c. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B ORDER BY dept_code d. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B WHERE table_A.code = table_B. dept_code Question 30 Which of the following SQL statements can extract employee_name has whose salary is 300,000 or higher from the table human_resource? Choose one answer. a. SELECT employee_name FROM human_resource WHERE salary>=300000 b. SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000 c. SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary d. SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name Question 31 The following elements comprise a portion of what services? - Digital certification - Certification authority - Timestamping - Lightweight Directory Access Protocol (LDAP) - Non-repudiation support Choose one answer. a. IPSec b. Public Key Infrastructure (PKI) c. Wireless Application Protocol (WAP) d. Transaction Layer Security (TLS) Question 32 Which of the following descriptions related to the term Sequential is ? Choose one answer. a. Control and displays are organized to how frequently they are used b. Control and displays are organized so that those that are functionally related are placed together c. Control and displays are organized to reflect the order of their use d. Control and displays are organized to how long they do their process Question 33 Which one of the following is NOT a characteristic of metadata? Choose one answer. a. Self-describing b. Describes a data dictionary c. Includes user data d. Data about data Question 34 Choose a answer from the following descriptions concerning characteristics of the CODASYL-type database? Choose one answer. a. The data structure is represented by a hierarchy b. The data structure is represented by a table format consisting of rows and columns c. SQL is used as its standard database language d. The data structure is represented as a network Question 35 Which of the following describes the storage method of databases in storage devices? Choose one answer. a. Subschema b. External schema c. Internal schema d. Conceptual schema Question 36 What can a mandatory one to one relationship indicate? Choose one answer. a. More attributes are needed b. More entities are needed c. The tables are not properly indexed d. The model should be denormalized Question 37 Assume that the following heuristic functions are admissible for a given problem, which function among them is best for search? Choose one answer. a. h( n) = 1 b. h( n) = 2 c. h( n) = (10 - n) ^ 2 d. h( n) = (10 - n)^2 + 2 Question 38 Which of the following is the most appropriate as the explanation of the waterfall model, a system development methodology? Choose one answer. a. Development time is shortened by participation by users, by development by a fewer number of engineers and by effective use of development tools. b. System development is made in the order of processes, without work being returned to a higher level process. c. An operational experimental product is generated, and checking requirement specifications and evaluation are made in an early phase. d. An application is broken down into sub-units. Then, each of them is designed and manufactured sequentially one after another. Question 39 To what does covert channel eavesdropping refer? Choose one answer. a. Nonbusiness or personal use of the Internet b. Using a hidden, unauthorized network connection to communicate unauthorized information c. Socially engineering passwords from an ISP d. The use of two-factor passwords Question 40 The input of an agent function is: Choose one answer. a. performance measure b. environment c. percepts d. actions Question 41 Which of the data models shows the relationship between nodes by tree structure? Choose one answer. a. E-R model b. Relational data model c. Hierarchical data model d. Network data model Question 42 Which of the following is an international standard for a video image compression coding system? Choose at least one answer. a. NTSC b. MPEG c. PCM d. JPEG Question 43 Netmask is used to determine: Choose one answer. a. An IP address is a gateway b. An IP address is a DNS c. An IP address is in the subnet d. An IP address is a server Question 44 Choose the effect that can be expected by installing database system? Choose one answer. a. Realization of dynamic access b. Increase in the data transfer rate c. Reduction of duplicate data d. Reduction of code design works Question 45 Which of the following is the most appropriate test to be used in boundary value analysis? Choose one answer. a. The minimum and maximum values b. The minimum value and that adding 1 to the value c. The maximum value and that adding 1 to the value d. The minimum and maximum values, and those adding 1 to each of the values Question 46 Which of the following data models is used for the conceptual design of a database, expressing the targeted world by two concepts of entities and relationships between entities? Choose one answer. a. Relational data model b. E-R model c. Hierarchical data model d. Network data model Question 47 In the ERD diagram, the one-to-many relationship, "a company has multiple employees," is expressed as follows: Which of the following statements ly explains the above diagram? Choose one answer. a. There are multiple companies, and each company has a shareholder b. There are multiple companies, and each company has multiple shareholders c. One company has one shareholder d. One company has multiple shareholders Question 48 Which of the following is a description of a Hyper Text? Choose one answer. a. Detail animated images can be displayed using high definition displays b. Not only text, but also music, video and all type of information can be represented c. By designating words and symbols displayed on the screen, information can be accessed one another d. A text created with word processing software can be directly converted into an HTML document Question 49 Which is/are inappropriate item(s) to be considered in screen designs of external or internal designs? Choose one answer. a. Screen layouts should be designed so that items to be referred to can be arranged from left to right or top to bottom. b. In screen transitions, a direct selection method intended for experienced users should be used instead of step-by-step selection by use of menus. c. To complete a processing operation, designs should be made so that the suspension of data inputting and returning to a previous screen cannot be allowed. d. Input items on screens should be enclosed with or [ ] to make it clear that the spaces are for input fields. Question 50 In SQL, the SELECT statement is used to extract records from a two-dimensional table. If the following statement is executed for the leased apartments below, which data group is extracted? SELECT property FROM leased_apartment_table WHERE (District_area = 'Minami-cho' OR Time_to_work < 15 AND Code > 60 ) Choose one answer. a. B, D, E b. A c. A, C, D, E d. A,C Question 51 Which piece of hardware is capable of performing protocol conversion between LAN systems whose transport and higher layers are different? Choose one answer. a. Bridge b. Gateway c. Router d. Repeater Question 52 The ACID characteristic is required for application in the transaction processing. Which of the following features of ACID represents "the nature not producing contradiction by transaction processing"? Choose one answer. a. Isolation b. Consistency c. Atomicity d. Durability Question 53 Which choice below is the BEST description of a vulnerability? Choose one answer. a. The minimization of loss associated with an incident b. Acompany resource that could be lost due to an incident c. Apotential incident that could cause harm d. Aweakness in a system that could be exploited Question 54 Which of the following statements ly explains the 3-tier schema structure of a database? Choose one answer. a. The external schema expresses the data view required by users b. Physical schema expresses physical relationships of data c. The conceptual schema expresses physical relationships of data. d. The internal schema expresses logical relationships of data Question 55 The output of an agent function is: Choose one answer. a. environment b. actions c. performance measure d. percepts Question 56 What is the role of a searching algorithm in problem-solving agents? Choose one answer. a. Finding a initial state b. Finding the path cost c. Finding a goal state d. Finding a solution Question 57 To use E-mail on the Internet, the two protocols SMTP and POP3 are used on mail servers. Which is the appropriate explanation of this? Choose at least one answer. a. SMTP is the protocol for the Internet, and POP3 is the protocol for LAN. b. SMTP is a protocol for receiving, and POP3 is a protocol for sending. c. SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail from the mailbox when connected. d. The SMTP is a protocol used when one side is client, and POP3 is a protocol used when both sides to transmit are mail servers. Question 58 Which of the following concerns the transfer of control for execution of tasks between system and user? Choose one answer. a. Task migratability b. Substitutivity c. Customizability d. Flexibility Question 59 Each of the following sentences describes work for one of the system development processes. Which gives the order of the development processes? a. Present problems are investigated and analyzed, then the requirements for a targeted system are defined. b. Functions required for building a system are partitioned into programs to make process flow clearer. c. Detailed processing procedures are designed, coded, and ed. d. Tests are conducted. e. The structured design of each program is made based on internal design documents. f. Based on requirements for a system, functions necessary for the system are defined. Choose one answer. a. a−f−b−c−e−d b. a−f−e−b−c−d c. a−f−b−e−c−d d. a−f−e−c−b−d Question 60 There are mainly two files to be used for recovery of the database when a failure occurs in the media. One is a back-up file, and what is the other file? Choose one answer. a. Master file b. Log file c. Rollback file d. Transaction file
© Copyright 2026 Paperzz