2020A FE AM Question
2020A FE AM Question
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. In which month is the autumn Fundamental IT Engineer Examination usually
conducted?
Since the correct answer is “b)” (October), mark your answer sheet as follows:
[Sample Answer]
Q1 ウ
– 1 –
Symbols commonly used in questions
Unless otherwise noted in each question, the following notational conventions are applied as
shown in the table.
Logic Circuit
AND gate
NAND gate
OR gate
NOR gate
Buffer
NOT gate
Company names or product names mentioned in the examination questions are the trademarks or registered
trademarks of their respective companies or organizations. The symbol ® or ™ is not used within.
– 2 –
Q1. When the decimal arithmetic expression, 7 / 32, is evaluated, which of the following
represents the result in binary?
Q2. A contradiction is a Boolean expression that always evaluates as FALSE for any assignment
of truth values to its variables. Which of the following is a contradiction? Here, " ⋅ ", " ",
and " " represent the AND, OR, and NOT operators, respectively.
a) ⋅ ⋅ b) ⋅ ⋅
c) ⋅ d) ⋅
Q3. A factory manufactures the same products on two production lines, A and B. Line A
manufactures 60% of all products, and B manufactures the remaining 40%. Defect rates of
products manufactured in A and in B are 2% and 1%, respectively. When a product was
randomly chosen for inspection among the products manufactured in this factory, it was found
to be defective. What is the percentage of probability that the product was manufactured in
Line A?
a) 40 b) 50 c) 60 d) 75
Q4. For an 8-bit code with the most significant bit as its parity bit, which of the following is used
to obtain the lower seven (7) bits other than parity?
– 3 –
Q5. In machine learning, which of the following is an appropriate explanation of supervised
learning?
a) Clusterizing input data according to the statistical features or specific conditions of the
data without any explicit processing beforehand
b) Learning to achieve the highest score from rating good and bad aspects of individual
actions
c) Predicting a subsequent user action from the frequency of appearances of behavioral
data accumulated from computer users
d) Training by feeding input data and their correct output so that the response to unknown
data is improved
Q6. Which of the following is a binary search tree? Here, the number in each node represents its
value.
a) 1 b) 4
2 3 2 8
4 5 6 7 1 3 6 9
8 9 5 7
c) 7 d) 9
6 8 7 8
4 5 3 9 1 2 5 6
1 2 3 4
– 4 –
Q7. Which of the following is a description of quicksort algorithm?
a) It repeats the process of comparing and swapping each pair of adjacent elements so that
smaller elements are gradually moved towards the end.
b) It repeats the process of finding the minimum element of the data, followed by its
removal.
c) It repeats the process of inserting each element of data into the correct position of a
sorted sequence.
d) It repeats the process of selecting an element as a pivot and partitions the data so that
smaller elements appear before the pivot, and larger elements appear afterwards.
Q8. The flowchart below calculates the greatest common divisor of two (2) numbers, A and B,
using the Euclidean algorithm with repeated subtraction. When A is 876 and B is 204, how
many comparisons are required to obtain the result?
Start
L←A
S←B
L ← (L ‒ S) S ← (S ‒ L)
> L:S <
=
output
A, B, L
End
a) 4 b) 9 c) 10 d) 11
– 5 –
Q9. There are three stacks, A, B, and C, each having an initial state [1, 2, 3], respectively. When
the recursively defined function, f(), below, is called and terminates, what is the state of stack
B? Here, [a0, a1, …, an-1] represent the state of a stack. When an is pushed into this stack, the
state becomes [a0, a1, …, an-1, an].
f() {
if A is empty {
do nothing
} else {
pop a value from A, then push it into C
call f()
pop a value from C, then push it into B
}
}
a) [1, 2, 3, 1, 2, 3] b) [1, 2, 3, 3, 2, 1]
c) [3, 2, 1, 1, 2, 3] d) [3, 2, 1, 3, 2, 1]
Q10. When the CPU needs data, it first accesses the cache memory. When the data is not
available in the cache memory, the CPU accesses the main memory. If the miss ratio is 0.2
and the access times for cache memory and main memory are as shown below, what is the
approximate average memory access time in ns for the CPU? Here, there are only cache
memory and main memory for the CPU, the access time for main memory includes the time
to confirm whether the data is available in cache memory, and the overhead time for the cache
management can be ignored.
– 6 –
Q11. Which of the following causes an external interrupt?
Q13. ECC is used for error detection and correction in memory. When n+2 redundant bits are
required for a data bus having a width of 2n bits, what is the number of redundant bits that are
required for a data bus having a width of 128 bits?
a) 3 b) 8 c) 9 d) 10
– 7 –
Q14. In a web system, which of the following is an appropriate benefit of a web server and an
application (AP) server being placed on different physical servers?
a) Because the business logic that accompanies an access to data is placed in a program on
the web server, the program on the AP server does not need to be changed in association
with a change in the business logic.
b) Because the difference between the character coding scheme of the web browser and
that of the AP server is absorbed by the web server, garbled (or unreadable) characters
do not appear.
c) Because the execution environment of the client is implemented on the web server, the
client and the AP server do not need to exchange screen data for each request, and only a
small amount of data communication is required.
d) Processing can be distributed according to the type of request from a client in such a way
that a request for static content having a light load is processed by the web server, and a
request for dynamic content having a heavy load is processed by the AP server.
Q17. Among the processes that are performed by a compiler for a procedural language, which
of the following is the process that is performed first?
– 8 –
Q18. The table below shows the priority of three tasks, A through C, and the operation
sequence and the processing time of the CPU and the I/O device when each task is executed
independently. Which of the following represents the scheduling condition during the time
period of 7 ms after 3 ms have elapsed since A through C became simultaneously ready for
execution? Here, there is no I/O contention, and the overhead of the OS is not considered.
And the numbers in parentheses indicate processing time, and “waiting” in the answer group
indicates that the task is ready and is waiting for the allocation of the CPU.
a) 3 4 5 6 7 8 9 10
(Milliseconds)
CPU I /O CPU Complete
Task A
I /O Waiting CPU
Task B
Waiting CPU I /O Waiting
Task C
b) 3 4 5 6 7 8 9 10
(Milliseconds)
Task A CPU I /O CPU Complete
Task B I /O CPU
Waiting CPU I /O Waiting
Task C
c) 3 4 5 6 7 8 9 10
(Milliseconds)
I /O CPU Complete
Task A
CPU Waiting CPU I /O
Task B
Waiting CPU I /O
Task C
d) 3 4 5 6 7 8 9 10
(Milliseconds)
I /O Waiting CPU Complete
Task A
CPU I /O
Task B
Waiting CPU I /O CPU
Task C
– 9 –
Q19. Which of the following represents appropriate handling for open source software
according to OSI’s definition?
a) For open- source software that is created for a specific industry, the scope of publishing
of the source code can be limited to that industry.
b) If open- source software is to be modified for uses such as internal use by a company
without being redistributed, the modified part of the source code does not have to be
published.
c) When open- source software is modified and redistributed, the same license as the
original software must be used for distribution so that the distribution conditions are
remain the same as the original software.
d) When open- source software is redistributed by a third party as a product, the developer
of the open- source software can charge a license fee to the third party.
a) It is memory that requires a refresh operation, and it is used as the main memory of a
PC.
b) It is non-volatile memory of a NAND type or a NOR type, and it is used as an SSD.
c) It is non-volatile memory that is capable of erasing and writing data in byte units, and it
is used when data need to be retained even when the power supply is turned off.
d) Its memory cells consist of flip-flops, and it is used for cache memory.
– 10 –
Q22. Which of the following is the correct gate that converts the 2-input OR gate shown below
into a NAND gate if the output of the added gate is respectively connected to input X and
input Y?
OR Gate
X Z=X +Y
Q23. Which of the following is an appropriate usage of radio buttons in GUI applications?
Q24. Which of the following is a method of improving the appearance of a jagged edge of a
slanted line to be smoothed on a screen, such as that of an LCD?
Q25. Which of the following is the key of the relation schema, R (A, B, C, P, Q, T), when R has
the functional dependencies shown below?
A→B
A→C
CP→Q
CP→T
a) A b) A, B c) A, P d) C, P
– 11 –
Q26. The employee’s ID, name, salary, manager ID, and working department are recorded in
the Employees table as follows:
Employees
Emp_ID Emp_name Salary Manager_ID DID
10 Amit 50000 18 3
11 Vikrom 75000 16 2
12 Nishi 40000 18 3
13 Niloy 60000 17 1
14 Pritom 80000 18 3
15 Mohitlal 45000 18 3
16 Rahman 90000 null 1
17 Roxy 55000 16 2
18 Santosh 65000 17 1
When a query is formulated in SQL to retrieve the manager ID and the average salary of the
employees under his/her direct report, and the output is obtained as below, which of the
following is the appropriate combination to be inserted in blanks E and F in the SQL
statement?
E F
a) a.DID b.DID
b) a.Emp_ID b.Emp_ID
c) a.Manager_ID b.Manager_ID
d) b.Emp_ID a.Manager_ID
– 12 –
Q27. In the data model of the figure represented by UML, which of the following is a
multiplicity that should be inserted in blanks I and II?
[Conditions]
(1) One or more employees belong to a department.
(2) An employee belongs to any one department.
(3) The history of the departments to which an employee has belonged is recorded as
the assignment history.
I II
a) 0..* 0..*
b) 0..* 1..*
c) 1..* 0..*
d) 1..* 1..*
Q28. When a failure occurs in a storage unit that stores a database, which of the following is
an operation that can recover the database by using backup files and a log?
– 13 –
Q29. Which of the following is an appropriate explanation of the granularity of locks?
a) When a large number of transactions update the same data, and the granularity is set as
large, the number of transactions that can be simultaneously executed increases.
b) When all data in a table are referenced, and the granularity is set as large, data
referenced from other transactions can be undisturbed.
c) When data are updated, and the granularity is set as large, the waiting times of other
transactions increase, and the total throughput declines.
d) When the granularity is set as large, the number of included data increases, and the
number of locks that one transaction makes increases.
Q30. Approximately how many seconds is required to transmit a file of 106 bytes via a 64-
kbit/s communication line? Here, the transmission efficiency of the line is 80%.
Q31. Which of the following is a device that connects multiple LANs by relaying data through
the protocol information of the data link layer of the OSI basic reference model?
a) It assigns an unused IP address from the pool of addresses in response to a request from
a PC or a printer.
b) It associates domain or host names with IP addresses.
c) It converts private IP addresses used within a company into global IP addresses, and it
enables access to the Internet.
d) It enables a program in a server to be called by only specifying the program name
without being aware of the IP address of the server.
– 14 –
Q33. What is the broadcast address of a network to which the IP address 192.168.57.123/22
belongs?
a) 192.168.55.255 b) 192.168.57.255
c) 192.168.59.255 d) 192.168.63.255
Q34. Which of the following is an Internet standard that extends the format of email header
fields to handle not only text messages but also audio and image files?
a) False domain information is injected into the DNS server that is referenced by a PC, and
it leads the user to a fake server.
b) The version information of the DNS server software is obtained to identify a security
hole.
c) To interrupt the target service, the attacker uses the DNS server as a steppingstone to
send a large number of recursive queries.
d) To obtain internal information, the zone information stored in the DNS server is
compiled and transferred.
Q36. Which of the following is a type of public-key cryptography that utilizes the difficulty of
factorizing extremely large numbers into primes?
– 15 –
Q37. Which of the following is appropriate conduct for a white-hat hacker?
a) Breaking into a system and changing one of the files without permission and reporting
the weaknesses to the owner
b) Breaking into a system to analyze its vulnerabilities with the owner’s permission and
within the prescribed rules of engagement
c) Logging into a system to show fellow hackers real-life examples of deleting a file
without the owner’s permission
d) Looking at secret data on a system with the motivation of personal or financial
objectives, protest, or espionage
Q39. Which of the following is an appropriate use of a private key for a digital signature?
a) The recipient can use the private key to restore an encrypted message to its original
status.
b) The sender can use the private key to create a signature and attach it to a message, and
the recipient can confirm the sender.
c) The sender can use the private key to encrypt a message with an attached fixed string,
and the recipient can identify sections that are falsified.
d) The sender can use the private key to encrypt a message, and the content of the message
cannot be understood by unrelated parties.
– 16 –
Q40. Which of the following is a characteristic of a worm, as compared with a Trojan horse?
Q42. There is a network that is divided into three (3) segments (i.e., external segment, DMZ,
and internal segment) by one (1) firewall. In this network, a service for users is to be made
available over the Internet by using a system comprising a web server and a database server
containing important data. Which of the following is the most appropriate method of server
installation that can protect important data from unauthorized access from the Internet? Here,
only a specific protocol is allowed for communications between the external segment and the
DMZ, and between the DMZ and the internal segment by the firewall. Direct communication
between the external segment and the internal segment is not allowed.
a) Installation of the web server and database server in the internal segment
b) Installation of the web server and the database server in the DMZ
c) Installation of the web server in the DMZ and the database server in the internal segment
d) Installation of the web server in the external segment and the database server in the
DMZ
– 17 –
Q43. Which of the following is a purpose of using a port scanner during an inspection of a web
server?
a) Detecting the vulnerability of contents by logging in with a valid user ID and directly
checking the contents of the web server
b) Detecting unauthorized use by analyzing the access history of the web server
c) Ensuring that no unnecessary service is operating by enumerating services on the web
server
d) Ensuring that there is no deviation from the information-security policy by checking the
management status of the web-server user IDs with the operator
Source Destination
a) Source Destination
port number port number
PC Web server 80 1024 or higher
Web server PC 80 1024 or higher
Source Destination
b) Source Destination
port number port number
PC Web server 80 1024 or higher
Web server PC 1024 or higher 80
Source Destination
c) Source Destination
port number port number
PC Web server 1024 or higher 80
Web server PC 80 1024 or higher
Source Destination
d) Source Destination
port number port number
PC Web server 1024 or higher 80
Web server PC 1024 or higher 80
– 18 –
Q45. Which of the following UML diagrams shows the exchange of messages among objects,
message transmission, and object lifelines in a time series?
a) Activity diagram
b) Communication diagram
c) Sequence diagram
d) State-machine diagram
Q46. Which of the following is an appropriate relation between a class and an instance in
object-oriented programming?
Q47. Which of the following is the type of module coupling that has the weakest degree of
coupling in which the exchange of information between modules is performed only using
parameters?
Q48. In the development process, which of the following is an activity that should be
performed for software architectural design?
– 19 –
Q49. The figure below shows that the cumulative number of bugs reached the target value,
when the number of completed test items was X. Which of the following is an appropriate
explanation of the situation shown in this figure?
a) After the code is created, and it is confirmed that it can be integrated, test cases are
created.
b) Integration of the code and testing are continuously repeated.
c) The code that passed the tests is not refactored until the next iteration.
d) The customer is responsible for the specification of unit tests.
Q51. According to the 6th edition of the PMBOK Guide, which of the following is an activity
for the planning process group in project resource management?
– 20 –
Q52. The activities and milestones of a project are shown in the arrow diagram below. Which
of the following is an impact of reducing the duration of activity, D, by 3 days?
B
5 E
A
6 4
D
C 5 F
7 6
Legend:
Activity name
Number of
days required
Dummy activity
Q53. The functional size of a new system was estimated to be 500 function points (FP). Apart
from development, the project requires 10 person-months in total for installation of the system
and education of developers. Additionally, for project management, 10% of the total person-
months of development, installation, and education is required. How many person-months are
required in total for this project? Here, the productivity in development is 10 FPs per person-
month.
a) 51 b) 60 c) 65 d) 66
Q54. Which of the following is used in quality management to help determine whether a
process is stable by using plotted time-series data and limit lines?
– 21 –
Q55. Which of the following is an appropriate definition of the total cost of ownership (TCO)
in the context of system cost?
Q56. In IT service management, which of the following is an activity that is performed for
management of incidents and service requests?
a) Evaluating if customer satisfaction with the service desk meets the agreed service targets
and performing a review for identifying improvement opportunities
b) Examining measures wherein the amount of free space on a disk is near its threshold
c) Investigating the impact of changes made to a program
d) Receiving a failure report from a user and checking to see if it corresponds to a known
error
Q57. Which of the following is the most appropriate description about the backup of data on a
disk that is connected to a server?
a) All data are backed up on the day the system commences full operations, and only
frequently updated data are backed up thereafter to shorten the work time.
b) Data distributed and stored in multiple files are backed up when a series of update
processes to the files are completed.
c) Data whose frequency of use are low after a certain period of time are deleted from the
current disk, and the data that have been backed up are also deleted.
d) Important data are backed up by overwriting data on the same media, so that the backup
media are not mistaken.
– 22 –
Q58. Which of the following is the most appropriate description about a system auditor?
a) The entire interview must be conducted by one (1) system auditor, because discrepancies
may occur in the record if multiple auditors are involved.
b) The system auditor must instruct the department being audited to implement
improvement measures for deficiencies identified during the interview.
c) The system auditor must make an effort to obtain documents and records that support the
information obtained from the department being audited during the interview.
d) The system auditor must select interviewees from administrators who have been an
auditor within the department being audited.
Q59. Which of the following is the most appropriate measure that a management executive
must take to secure the appearance of independence for an internal system auditor?
Q60. When software asset management is audited, which of the following activities is the most
appropriate?
– 23 –
Q61. Which of the following is an explanation of an application architecture that constitutes
enterprise architecture?
a) It systematically describes the business processes or the information flows necessary for
the business strategy.
b) It systematically describes the contents of the data necessary for business operations, the
relations or structures between the data, etc.
c) It systematically describes the functions or system configurations that support business
processes.
d) It systematically describes the technical components necessary for the developments and
operations of the information systems.
Q63. Which of the following is the appropriate example of utilizing Business Intelligence (BI)?
– 24 –
Q64. When examples of utilizing big data are classified according to the feedback destination
of the analysis and the reflection timing, which of the following utilization examples
corresponds to D in the table below?
All customers A B
Feedback destination
of analysis Individual
C D
customer
a) Based on the location data acquired from the smartphone of a customer registered as a
member and the purchase history data of the customer, recommended products from
nearby retailers are displayed on the smartphone.
b) From the large volume of purchase data collected and accumulated by using member
cards, the preferences of each customer are analyzed, and coupons for the next month
are issued according to the purchase volume of the previous month.
c) The current traffic status of each road is published on the website by collecting and
analyzing data of the position, speed, and other parameters of moving cars.
d) The ranking of the largest-selling products of each month is extracted from the POS data
of the last few years from sister stores, and images of the products corresponding to the
current month are displayed on monitors inside the store.
a) Clarifying what roles are assigned to the business and information-system departments
when the organizational structure of system development construction is planned and
clarifying the basis of cost calculation for development, operation, and maintenance
when considering the costs
b) Determining interfaces, such as screens or forms, based on the requirements definition
document and describing them in the design document
c) Performing maintenance and management of the system so that it conforms to the
business and the environment and analyzing details and clarifying the potential impacts
of modification requests
d) Performing system startup and shutdown, monitoring, and file maintenance in a planned
manner and verifying that business is being carried out smoothly
– 25 –
Q66. According to the “competitive strategy” proposed by Philip Kotler, which of the
following describes a company that has no high market share but utilizes quantitatively large
management resources?
a) Direct marketing that includes calling people at home and asking for donations,
opinions, or purchases.
b) Direct marketing that sells products and services and builds customer relationships over
the internet.
c) Direct marketing that sends offers, announcements, reminders, or other items to a person
at a particular address.
d) Direct marketing that sends sales alerts, links to website updates, appointments, or
delivery reminders to large groups of people.
a) It mainly provides online tools for sales, customer service, and marketing.
b) It mainly provides partner relationship management.
c) It only supports direct-marketing campaigns.
d) It provides information and tools to make call center, help desk, and customer support
staff more efficient mainly by phone.
– 26 –
Q70. In a process that aims to produce ideal technology, technology follows an evolutionary
process that progresses from the introduction stage, growth stage, maturity stage, decline
stage. Then it transitions to the next technological phase. Which of the following is used to
represent this technological evolution process?
a) It handles a large amount of information. Thus it uses an external storage device for
storing information.
b) It is stain-resistant, and recorded information can be read from the outside of a package.
c) It is used by inserting the tag into a dedicated magnetic reader.
d) It uses GPS to display location information or attribute information about the current
location.
– 27 –
Q73. Which of the following is an example of Consumer Generated Media (CGM)?
a) A company website through which the company publishes information for individual
investors about its management status, financial status, and performance trends
b) A company website through which the company transmits information to general
consumers about the characteristics and usage method of its products
c) A website of a governmental organization through which the agency publishes
information for general citizens about its policies and administrative services
d) A website, such as a blog or SNS, on which an individual sends information to unspecified
large number of people about the evaluation of products used by the individual
Q74. Which of the following is an appropriate computing concept that describes the idea of
physical objects, such as devices, vehicles, and buildings, that are connected to the internet
and are able to identify themselves to other devices?
Q75. In a company, which of the following is the main role of the manufacturing department?
a) Attracting, developing, and sustaining the labor force and maintaining employee records
b) Managing financial assets and maintaining financial records
c) Producing products and services
d) Selling products and services
Q76. Which of the following is an officer whose primary responsibility is the security of a
company’s information and data?
Q77. Which of the following is a method of education and training in which trainees engage
in simulated business activities, interact with other people to develop experiences, and try out
different strategies?
– 28 –
Q78. Which of the following is a method of inventory asset valuation to calculate the inventory
unit price by the expression as shown below each time that a new inventory asset is received?
Q79. Which of the following is the profit obtained by the expression shown below in the
income statement, when the regulation of corporate accounting in Japan is applied?
– 29 –