Question 1 Which is the most appropriate practice for user ID

Question 1
Which is the most appropriate practice for user ID management?
Choose one answer.
a. All the users involved in the same project should use the same user ID.
b. When a user ID is to be deleted, an adequate time interval should be taken after the
termination of its use has been notified.
c. When privileges are set for a user ID, they should be minimized.
d. A user having multiple user IDs should set the same password for all the IDs.
Question 2
Which of the following is the appropriate explanation for the term “Articulation” in the
interaction framework?
Choose one answer.
a. Is the interaction between User and Input
b. Is the interaction between Core and Output
c. Is the interaction between User and Output
d. Is the interaction between Core and Input
Question 3
Which of the following is the diagram that is used in structured programming and expresses the
entire structure of a program in the form of a hierarchical structure?
Choose one answer.
a. State transition diagram
b. NS chart
c. PERT diagram
d. Bubble chart
Question 4
Which of these are attributes of usability?
Choose one answer.
a. Generalisability
b. Usefulness
c. Learnability
d. Easy to use
Question 5
Which of the following is the most appropriate as the description of prototyping, a system
development technique?
Choose one answer.
a. Work is performed in the order of basic planning, external design, internal design,
program design, programming and test. Therefore, with the technique, a perspective of the
work as a whole is gained, making the determination of schedules and allocation of
resources easier.
b. The software is classified into software whose specifications are fixed and do not require
modification, and software whose specifications require modification. Then, for the
software whose specifications require modification, the process of development,
reconsideration and modification is repeated.
c. An experimental product is produced in an early phase of system development, enabling
the removing of ambiguities and differences in recognition between the user and
development organizations.
d. A large-scale application is broken down into sub-units, each of which is highly
independent. Then, for each sub-unit, the process of design, programming and test is
repeated, gradually expanding the development area.
Question 6
Which of the following are recognized kinds of prototypes:
Choose one answer.
a. Interactive sketches
b. Conceptual models
c. Paper
d. Beta versions
Question 7
Regarding relational database manipulation, which of the following statements ly explains
projection?
Choose one answer.
a. Extract the specific columns from the table
b. Create a table by combining inquiry results from one table and the ones of the other table
c. Extract the rows satisfying specific conditions from the table
d. Create a new table by combining tuples satisfying conditions from tuples in more than
two tables
Question 8
Which is in an inappropriate way of handling passwords and a password file in the system
management department?
Choose one answer.
a. Even if a password file records encrypted passwords, the department should make it
inaccessible to general users.
b. It it is possible to set the term of validity of passwords, the term should be used for
checking password validation.
c. The depatment should recommend that users record their passwords in their notebooks in
order to minimize the frequency of inquiring about their passwords.
d. The security managers should regularly check whether or not passwords can be easily
guessed, and recommend that problem passwords be changed.
Question 9
What is the means that is used in a WWW server to pass data that is input from a browser to an
application program?
Choose one answer.
a. HTTP
b. CGI
c. URL
d. MIME
Question 10
Which of the following descriptions related to computer system reliability is ?
Choose one answer.
a. System remote maintenance improves the operating ratio, by improving the MTBF
b. The system preventive maintenance is performed in order to extend the MTBF
c. The system operating ratio is improved by extending the MTTR and MTBF
d. The more complicated the system configuration is, the longer the MTBF becomes
Question 11
If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes
which of the following algorithms?
Choose one answer.
a. Uniformed-cost search
b. Depth-limited search
c. Iterative deepening search
d. Depth-first search
Question 12
Which is the most appropriate description of the ARP of the TCP/IP protocol?
Choose one answer.
a. A protocol that controls the path by the number of hops between the gateways.
b. A protocol for getting the IP address from a server at the time of system startup in the
case of system having no disc drive.
c. A protocol that controls the path by the network delay information based on a time
stamp.
d. A protocol for getting the MAC address from the IP address.
Question 13
In biometrics, a good measure of performance of a system is the:
Choose one answer.
a. Crossover Error Rate (CER).
b. Positive acceptance rate.
c. Sensitivity.
d. False detection.
Question 14
Which of the following is the most appropriate as the explanation of reverse software
engineering?
Choose one answer.
a. Functions having been implemented with software are achieved with hardware.
b. A development language and development tools are selected depending on the
processing characteristics of the software
c. Software is designed in the order of output, processing and input.
d. Design specifications are produced from implemented software. Then, software is
developed based on specifications produced thus.
Question 15
A culture center examined three types of schemata (data structures) of A to C to manage the
customers by using a database. Which of the following statements is ?
[Explanation]
A member can take multiple courses. One course accepts applications from multiple members.
Some courses receive no application. One lecturer takes charge of one course.
Choose one answer.
a. In Schemata A and B, when you delete the row including the application date to cancel
the application for the course, the information on the member related to the cancellation
can be removed from the database
b. In any of the three schemata, when you delete the row including the application date to
cancel the application for the course, the information on the course related to the
cancellation can be removed from the database
c. In Schemata B and C, when there is any change in the member address, you only have to
the member address recorded in the specific row on the database
d. In any of the three schemata, when there is any change in the lecturer in charge, you only
have to the lecturer in charge recorded in the specific row on the database
Question 16
Which of the following representations is Conjunctive Normal Form? (symbol ^ represents
AND, symbol – represent NOT)
Choose one answer.
a. P ^ Q
b. – P V (Q ^ R)
c. P ^ (Q => R)
d. P => Q
Question 17
Which is the statement about the recent increase in macro viruses?
Choose one answer.
a. Since it can be easily determined as to whether a macro function is infected by a virus,
infection can be prevented at the time of opening a document file.
b. Activating the system from an infected floppy disk loads the macro virus into the main
meory, and then the virus infects the boot sectors of other floppy disks.
c. The execution of an infected application loads in the macro virus into the main memory,
and in this process, the virus infects program files of other applications.
d. A macro virus infects document files opened or newly created after an infected
document file is opened.
Question 18
What is the maximum number of host address that can be set within the one and same subnet
when the 255.255.255.0 subnet mask is used with the Class B IP address?
Choose at least one answer.
a. 65,534
b. 16,777,214
c. 254
d. 126
Question 19
How do you get to know the user in the usability engineering lifecycle?
Choose one answer.
a. Run a thinking aloud test
b. Analyze user complaints
c. Ask user in each phases
d. Draw up a user profile
Question 20
What is default port of DNS service?
Choose one answer.
a. 80
b. 110
c. 53
d. 25
Question 21
Which of the following SQL statements for the table "Shipment Record" produces the largest
value as a result of its execution?
Choose one answer.
a. SELECT MAX (quantity) FROM shipment_record
b. SELECT COUNT (*) FROM shipment_record
c. SELECT AVG (quantity) FROM shipment_record
d. SELECT SUM (quantity) FROM shipment_record WHERE date = '19991011'
Question 22
Which of the following is the explanation of the “Network Layer” of the TCP/IP model?
Choose one answer.
a. Performs setting and release of routing and connections in order to create a transparent
data transmission between end systems.
b. Absorbs the differences in characteristics of physical communication media, and secures
a transparent transmission channel for upper level layers.
c. Provides transmission control procedures (error detection, retransmission control, etc.)
between adjacent nodes.
d. This is the layer closest to the user, and allows the use of file transfer, e-mail and many
different applications.
Question 23
In problem-solving agents, when a solution is found?
Choose one answer.
a. Whenever a percept is perceived
b. After all actions are performed
c. Before the first action is performed
d. After the first action is performed
Question 24
Which of the following corresponds to the computer interface technology that uses icon, etc?
Choose one answer.
a. CAI
b. GUI
c. CUI
d. GDI
Question 25
Which of the following protocols has become a worldwide de facto standard? The protocol is
used by the ARPANET in the USA, and is built into the UNIX system.
Choose at least one answer.
a. TCP/IP
b. ATM
c. ISDN
d. CSMA/CD
Question 26
How many main categories of principles to support usability?
Choose one answer.
a. 6
b. 3
c. 5
d. 4
Question 27
RAID refers to the:
Choose one answer.
a. Redundant Arrays of Independent Disks.
b. Rapid And Inexpensive Digital tape backup.
c. Remote Administration of Internet Domains.
d. Redundant And fault tolerant Internetworking Devices.
Question 28
According to the content of the course, Genetic Algorithms can be used in which of the
following problems?
Choose one answer.
a. Timetabling problem
b. Vacuum-cleaner problem
c. Tic-tac-toe problem
d. Path-finding problem
Question 29
Which of the following SQL statements can extract the average salary by department from tables
A and B?
Choose one answer.
a. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B
WHERE table_A.code = table_B. dept_code GROUP BY dept_code, dept_name
b. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B
WHERE table_A.code = table_B. dept_code ORDER BY dept_code
c. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B
ORDER BY dept_code
d. SELECT dept_code, dept_name, AVG (salary) FROM table_A, table_B
WHERE table_A.code = table_B. dept_code
Question 30
Which of the following SQL statements can extract employee_name has whose salary is 300,000
or higher from the table human_resource?
Choose one answer.
a. SELECT employee_name FROM human_resource
WHERE salary>=300000
b. SELECT employee_name, salary FROM human_resource
GROUPBY salary HAVING COUNT(*)>300000
c. SELECT salary FROM human_resource
WHERE employee_name>=300000 GROUPBY salary
d. SELECT employee_name COUNT(*) FROM human_resource
WHERE salary>=300000 GROUPBY employee_name
Question 31
The following elements comprise a portion of what services?
- Digital certification
- Certification authority
- Timestamping
- Lightweight Directory Access Protocol (LDAP)
- Non-repudiation support
Choose one answer.
a. IPSec
b. Public Key Infrastructure (PKI)
c. Wireless Application Protocol (WAP)
d. Transaction Layer Security (TLS)
Question 32
Which of the following descriptions related to the term Sequential is ?
Choose one answer.
a. Control and displays are organized to how frequently they are used
b. Control and displays are organized so that those that are functionally related are placed
together
c. Control and displays are organized to reflect the order of their use
d. Control and displays are organized to how long they do their process
Question 33
Which one of the following is NOT a characteristic of metadata?
Choose one answer.
a. Self-describing
b. Describes a data dictionary
c. Includes user data
d. Data about data
Question 34
Choose a answer from the following descriptions concerning characteristics of the
CODASYL-type database?
Choose one answer.
a. The data structure is represented by a hierarchy
b. The data structure is represented by a table format consisting of rows and columns
c. SQL is used as its standard database language
d. The data structure is represented as a network
Question 35
Which of the following describes the storage method of databases in storage
devices?
Choose one answer.
a. Subschema
b. External schema
c. Internal schema
d. Conceptual schema
Question 36
What can a mandatory one to one relationship indicate?
Choose one answer.
a. More attributes are needed
b. More entities are needed
c. The tables are not properly indexed
d. The model should be denormalized
Question 37
Assume that the following heuristic functions are admissible for a given problem, which function
among them is best for search?
Choose one answer.
a. h( n) = 1
b. h( n) = 2
c. h( n) = (10 - n) ^ 2
d. h( n) = (10 - n)^2 + 2
Question 38
Which of the following is the most appropriate as the explanation of the waterfall model, a
system development methodology?
Choose one answer.
a. Development time is shortened by participation by users, by development by a fewer
number of engineers and by effective use of development tools.
b. System development is made in the order of processes, without work being returned to a
higher level process.
c. An operational experimental product is generated, and checking requirement
specifications and evaluation are made in an early phase.
d. An application is broken down into sub-units. Then, each of them is designed and
manufactured sequentially one after another.
Question 39
To what does covert channel eavesdropping refer?
Choose one answer.
a. Nonbusiness or personal use of the Internet
b. Using a hidden, unauthorized network connection to communicate
unauthorized information
c. Socially engineering passwords from an ISP
d. The use of two-factor passwords
Question 40
The input of an agent function is:
Choose one answer.
a. performance measure
b. environment
c. percepts
d. actions
Question 41
Which of the data models shows the relationship between nodes by tree structure?
Choose one answer.
a. E-R model
b. Relational data model
c. Hierarchical data model
d. Network data model
Question 42
Which of the following is an international standard for a video image compression coding
system?
Choose at least one answer.
a. NTSC
b. MPEG
c. PCM
d. JPEG
Question 43
Netmask is used to determine:
Choose one answer.
a. An IP address is a gateway
b. An IP address is a DNS
c. An IP address is in the subnet
d. An IP address is a server
Question 44
Choose the effect that can be expected by installing database system?
Choose one answer.
a. Realization of dynamic access
b. Increase in the data transfer rate
c. Reduction of duplicate data
d. Reduction of code design works
Question 45
Which of the following is the most appropriate test to be used in boundary value analysis?
Choose one answer.
a. The minimum and maximum values
b. The minimum value and that adding 1 to the value
c. The maximum value and that adding 1 to the value
d. The minimum and maximum values, and those adding 1 to each of the values
Question 46
Which of the following data models is used for the conceptual design of a database, expressing
the targeted world by two concepts of entities and relationships between entities?
Choose one answer.
a. Relational data model
b. E-R model
c. Hierarchical data model
d. Network data model
Question 47
In the ERD diagram, the one-to-many relationship, "a company has multiple employees," is
expressed as follows:
Which of the following statements ly explains the above diagram?
Choose one answer.
a. There are multiple companies, and each company has a shareholder
b. There are multiple companies, and each company has multiple shareholders
c. One company has one shareholder
d. One company has multiple shareholders
Question 48
Which of the following is a description of a Hyper Text?
Choose one answer.
a. Detail animated images can be displayed using high definition displays
b. Not only text, but also music, video and all type of information can be represented
c. By designating words and symbols displayed on the screen, information can be accessed
one another
d. A text created with word processing software can be directly converted into an HTML
document
Question 49
Which is/are inappropriate item(s) to be considered in screen designs of external or internal
designs?
Choose one answer.
a. Screen layouts should be designed so that items to be referred to can be arranged from
left to right or top to bottom.
b. In screen transitions, a direct selection method intended for experienced users should be
used instead of step-by-step selection by use of menus.
c. To complete a processing operation, designs should be made so that the suspension of
data inputting and returning to a previous screen cannot be allowed.
d. Input items on screens should be enclosed with or [ ] to make it clear that the spaces are
for input fields.
Question 50
In SQL, the SELECT statement is used to extract records from a two-dimensional table. If the
following statement is executed for the leased apartments below, which data group is extracted?
SELECT property FROM leased_apartment_table
WHERE (District_area = 'Minami-cho' OR Time_to_work < 15 AND Code > 60 )
Choose one answer.
a. B, D, E
b. A
c. A, C, D, E
d. A,C
Question 51
Which piece of hardware is capable of performing protocol conversion between LAN systems
whose transport and higher layers are different?
Choose one answer.
a. Bridge
b. Gateway
c. Router
d. Repeater
Question 52
The ACID characteristic is required for application in the transaction processing. Which of the
following features of ACID represents "the nature not producing contradiction by transaction
processing"?
Choose one answer.
a. Isolation
b. Consistency
c. Atomicity
d. Durability
Question 53
Which choice below is the BEST description of a vulnerability?
Choose one answer.
a. The minimization of loss associated with an incident
b. Acompany resource that could be lost due to an incident
c. Apotential incident that could cause harm
d. Aweakness in a system that could be exploited
Question 54
Which of the following statements ly explains the 3-tier schema structure of a database?
Choose one answer.
a. The external schema expresses the data view required by users
b. Physical schema expresses physical relationships of data
c. The conceptual schema expresses physical relationships of data.
d. The internal schema expresses logical relationships of data
Question 55
The output of an agent function is:
Choose one answer.
a. environment
b. actions
c. performance measure
d. percepts
Question 56
What is the role of a searching algorithm in problem-solving agents?
Choose one answer.
a. Finding a initial state
b. Finding the path cost
c. Finding a goal state
d. Finding a solution
Question 57
To use E-mail on the Internet, the two protocols SMTP and POP3 are used on mail servers.
Which is the appropriate explanation of this?
Choose at least one answer.
a. SMTP is the protocol for the Internet, and POP3 is the protocol for LAN.
b. SMTP is a protocol for receiving, and POP3 is a protocol for sending.
c. SMTP is the protocol used under normal circumstances when reception is possible, and
POP3 is the protocol for fetching mail from the mailbox when connected.
d. The SMTP is a protocol used when one side is client, and POP3 is a protocol used when
both sides to transmit are mail servers.
Question 58
Which of the following concerns the transfer of control for execution of tasks between system
and user?
Choose one answer.
a. Task migratability
b. Substitutivity
c. Customizability
d. Flexibility
Question 59
Each of the following sentences describes work for one of the system development processes.
Which gives the order of the development processes?
a. Present problems are investigated and analyzed, then the requirements for a targeted system
are defined.
b. Functions required for building a system are partitioned into programs to make process flow
clearer.
c. Detailed processing procedures are designed, coded, and ed.
d. Tests are conducted.
e. The structured design of each program is made based on internal design documents.
f. Based on requirements for a system, functions necessary for the system are defined.
Choose one answer.
a. a−f−b−c−e−d
b. a−f−e−b−c−d
c. a−f−b−e−c−d
d. a−f−e−c−b−d
Question 60
There are mainly two files to be used for recovery of the database when a failure occurs in the
media. One is a back-up file, and what is the other file?
Choose one answer.
a. Master file
b. Log file
c. Rollback file
d. Transaction file