2018S FE AM Question
2018S FE AM Question
(1)
Fundamental IT Engineer Examination (Morning)
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely
and neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. In which month is the spring Fundamental IT Engineer Examination conducted
in 2018?
Since the correct answer is “b)” (March), mark your answer sheet as follows:
[Sample Answer]
Q1
– 1 –
Symbols commonly used in questions
Unless otherwise noted in each question, the following notational conventions are applied as
shown in the tables.
Logic Circuit
AND gate
NAND gate
OR gate
NOR gate
Buffer
NOT gate
Company names or product names mentioned in the examination questions are the trademarks or
registered trademarks of their respective companies or organizations. The symbol ® or ™ is not used
within.
– 2 –
Q1. There is a register where an integer value is stored in binary. Let x be a positive integer
which is stored into the register, then perform the operations below.
How many times larger than the integer x is the content of the register?
a) 3 b) 4 c) 5 d) 6
Q2. When three sets A, B and C are given, which of the following equalities holds? Here,
and are union and intersection symbols, respectively.
a) (A B ) (A C ) = B (A C)
b) ( A B ) C = (A C ) ( B C )
c) (A C ) (B A) = (A B) (B C)
d) (A C ) (B C) = (A B) C
Q3. For two logical variables X and Y, a logical operation X NAND Y is defined as a composite
operation NOT (X AND Y) . Which of the following is equivalent to the logical operation
X OR Y ?
Q4. Which of the following bit strings is accepted by the automaton described in the state
transition diagram below? Here, each string is processed one bit at a time in sequence from
the left.
0 1 0, 1
1 0
– 3 –
Q5. Which of the following is a binary search tree whose keys are numbers assigned to nodes in
natural order?
a) 16 b) 17
15 19 14 19
10 14 10 16 18
c) 18 d) 20
16 19 18 19
15 14 20 10 14 15 16
Q6. There is a two-dimensional integer array A whose (i, j)-th element A[i, j] is 2 × i + j. What
is the value of the element A[A[1, 1] × 2, A[2, 2] + 1]?
a) 12 b) 13 c) 18 d) 19
Q7. Function F(n) is a recursively defined integer function that calculates the factorial of n for
any non-negative integer n. Which of the following is an appropriate expression for the
blank A?
F(0) = 1
F(n) = A (if n > 0)
a) n + F(n - 1) b) n - 1 + F(n)
c) n × F(n - 1) d) (n - 1) × F(n)
– 4 –
Q8. What is the result of the procedure in the flowchart below, when x and y are positive
integers?
Start
s←0
t ←x
Yes
t< y
No
t←t–y End
s←s+1
Value of s Value of t
a) Remainder of x ÷ y Quotient of x ÷ y
b) Quotient of x ÷ y Remainder of x ÷ y
c) Remainder of y ÷ x Quotient of y ÷ x
d) Quotient of y ÷ x Remainder of y ÷ x
Q9. Which of the following addressing modes determines the effective address by adding the
value of the instruction address register (program counter) to the value recorded in the
address part of the instruction?
Q10. A computer has two levels of memories, cache memory and main memory, with an
access time of 0.01 µs and 0.1 µs respectively. If the hit ratio of the cache memory is 90%,
which of the following is the appropriate average memory access time for this system? In this
scenario, if the data is in the cache memory, the processor accesses the data directly with an
access time of 0.01 µs. However, if a cache miss occurs, the data is required to be transferred
from the main memory to the cache memory first, and then subsequently accessed from the
cache memory. Thus, the access time becomes 0.11 µs.
– 5 –
Q11. Which of the following is an output device for the computer?
Q12. What is the average rotational latency of a hard disk drive in milliseconds when its
rotation speed is 2000 rotations per minute?
a) 10 b) 15
c) 25 d) 30
Q13. Which of the following is a method that increases the speed of data input/output by
dividing logically sequential data and writing the divided data into multiple hard disks?
a) A server that has the same specifications is necessary as a secondary server, but since
processes are taken over by the secondary server in the event of the primary failure, the
throughput can be maintained even in the event of a failure.
b) Given that processes are distributed to other servers in operation in the event of a
failure, the load of servers in operation increases and the throughput decreases.
c) Given that processes can be distributed uniformly, server machines can be utilized
effectively and expandability is ensured even if the amount of processing increases in
the future.
d) Given that processes must be consistent among multiple servers in operation, it is
necessary to share a database.
– 6 –
Q15. Which of the following is an appropriate description concerning system availability?
a) Even if the MTBF is different, the system availability is equal if the MTTR is equal.
b) If the MTTR can be shortened without changing the MTBF, the system availability
improves.
c) If the MTTR does not change and the MTBF increases, the system availability
deteriorates.
d) If the sum of the MTBF and the MTTR is equal, the system availability is equal.
a) An access to a page that is mapped in the virtual memory, but not loaded in the
physical memory
b) A hardware error in the physical memory
c) A program attempting to insert more data than it can hold in the physical memory
d) A reference to a page that another program is currently using in the virtual memory
Q17. In a direct organization file that has a range of storage addresses one (1) through six (6),
the data is stored under the conditions below. Which of the following is the key value of the
data that is stored in address one (1)?
[Conditions]
(1) Data is stored in the order of key values three (3), four (4), eight (8), 13, 14, and 18.
(2) The storage address is the value that is the remainder obtained by dividing the key
value of data by five (5) and then adding one (1) to it.
(3) If the storage address is already occupied, the data is stored in the next address. This
process is repeated until the data is stored. The next address of the last address is the
first address.
(4) In the initial status, nothing is stored in the file.
a) 8 b) 13 c) 14 d) 18
– 7 –
Q18. Which of the following is classified as a function of a static test tool?
Q19. For a multiprogramming switching procedure of processes shown in the figure below,
which of the following is an appropriate combination of OS processing for A through C?
A
Ready
state
B
Ready
state C
Running
state
A B C
Restoration of the running Saving of the running
a) Selection of the process
state state
Restoration of the running
b) Saving of the running state Selection of the process
state
Restoration of the running
c) Saving of the running state Selection of the process
state
Restoration of the running Saving of the running
d) Selection of the process
state state
– 8 –
Q20. Which of the following is the appropriate function of a linker?
a) Creating a load module from multiple object modules, etc. by performing operations
such as cross-reference resolution
b) Loading a load module into main memory before execution
c) Monitoring program execution and logging the execution result for each step
d) Registering a created program to a library
Q21. A D/A converter with a resolution of 8 bits generates an output voltage of 0 volts for a
digital input value of 0, and an output voltage of 2.5 volts for a digital input value of 128.
When the lowest 1 bit of the digital input value is changed, which of the following is the
change (in volts) of the output voltage that is generated by the D/A converter?
a) 2.5/128 b) 2.5/255
c) 2.5/256 d) 2.5/512
Q22. The half adder in the diagram below adds two (2) single-digit binary numbers x and y,
and produces z (the first digit of the sum) and c (the carry bit) as output. Which of the
following is the appropriate combination of gate devices A and B?
B c (Carry bit)
A B
– 9 –
Q23. Which of the following is equivalent to the logic circuit shown below?
a) b)
c) d)
Q24. When ordering data in the format below is entered, which of the following is an
appropriate check to examine whether the value of the Order date field is on a business day
equal to or prior to the entering date?
Ordering data
Form number Order date Product code Quantity Customer code
(Characters) (Characters) (Characters) (Numbers) (Characters)
Q25. Which of the following is a process in PCM to capture analog values from audio
signals at a regular interval?
– 10 –
Q26. Which of the following properties of database transactions refers to the ability of the
system to recover a committed transaction when either the system or the storage media
fails?
a) Atomicity b) Consistency
c) Durability d) Isolation
Q27. There is a “Delivery” table that has six (6) records. Which of the following is the
functional dependency that is satisfied by this table? Here, “X → Y” indicates that X
functionally determines Y.
Delivery
Delivery_ Department_ Department_ Delivery_ Component_ Quantity
date ID name destination ID
2016-08-21 300 Production Chicago 1342 300
department 2 office
2016-08-21 300 Production Chicago 1342 300
department 2 office
2016-08-25 400 Production Boston 2346 300
department 1 factory
2016-08-25 400 Production Boston 2346 1,000
department 1 factory
2016-08-30 500 Research and Boston 2346 30
development factory
department
2016-08-30 500 Research and New York 1342 30
development office
department
a) Delivery_date → Component_ID
b) Delivery_destination → Component_ID
c) Department_ID → Component_ID
d) Department_name → Delivery_destination
– 11 –
Q28. Which of the following methods to join two (2) tables in an RDBMS is a description of
the sort-merge join method?
a) All rows in the tables are re-ordered according to the values in the column to be joined,
and they are joined in order from the top.
b) If a column to be joined in one of the tables is included in the index, the column to be
joined in the other table and the index value are used to join the tables.
c) The values in a column to be joined in one of the tables are extracted in order, and they
are joined with the column to be joined from the other table.
d) The values in a column to be joined in one of the tables are used to create a hash table,
and this is joined with the column to be joined from the other table.
Q29. When the SQL statement shown below is executed on the “Employee” table and the
“Department” table, which of the following is the result?
Employee Department
Employee_number Department Department_name Floor
11001 Administration Planning 1
11002 Accounting Administration 1
11003 Sales Information systems 2
11004 Sales Sales 3
11005 Information systems Accounting 2
11006 Sales Legal affairs 2
11007 Planning Procurement 2
12001 Sales
12002 Information systems
a) 1 b) 2 c) 3 d) 4
– 12 –
Q30. In a distributed database system, which of the following is a method for the finalization
of update processing when an inquiry is made to multiple sites that perform a series of
transaction processes as to whether finalization is possible or not and whether finalization
is possible at all sites?
Q31. Which of the following TCP/IP protocols is used to assign IP addresses dynamically?
Q32. In a TCP/IP network hierarchical model, what is the name for Equipment A that
connects two LAN segments at the Internet Layer?
Node 1 Node 2
Application Layer Application Layer
Transport Layer Equipment A Transport Layer
Internet Layer Internet Layer Internet Layer
Link Layer Link Layer Link Layer
Q33. Which of the following is a pair of IP addresses belonging to the same subnet, when the
subnet mask is 255.255.255.240?
– 13 –
Q34. Which of the following delivery models does an ARP response use?
a) Anycast b) Broadcast
c) Multicast d) Unicast
Q35. A PC and a web server are communicating via HTTP. When a request packet is sent
from the PC to the web server, which of the following combinations of port numbers does
the response packet have? Here, the source and the destination port numbers of the request
packet are 50001 and 80 respectively.
Destination (PC)
Source (web server) port number
port number
a) 80 50001
b) 50001 80
A number allocated on the web server, other than 80 and
c) 80
50001
A number chosen by the web server other than 80 or
d) 50001
50001
Q36. Which of the following is a technology that prevents automated input by a program by
requiring input of characters from a warped image or an image some parts of which are
hidden? The technology is based on the differences of recognition of those images between
humans and programs.
a) CAPTCHA b) QR code
c) Short URL d) Trackback ping
Q37. Which of the following is an attack that threatens the “integrity” of information?
– 14 –
Q38. Which of the following is the name of an attack where manipulation is made to place a
malicious website near the top of the results of a search website?
a) An attack in which a large volume of packets is sent to a website via another website in
order to make the provision of services impossible due to the abnormally high network
traffic
b) An attack in which a program is forced to end abnormally, malicious code that is
inserted into the data area is executed, or other such actions are performed by reading
and writing data beyond the upper or lower limit of an area of memory that is secured
for the buffer
c) An attack in which if there is a defect in the way database is called from a web
application, an attacker can perform unauthorized retrieval, modification, and deletion
of data in a database by entering a malicious character string in the data manipulation
language for the call
d) An attack in which when a user views a website on which an attacker has placed a trap
and clicks a link to another website that has a vulnerability, a character string that
contains a malicious script is sent to the linked website, and when the malicious script
that is embedded in the response is executed in the user’s browser, information leakage
occurs
Q40. In an e-commerce transaction that uses public key cryptography, which of the following
is the role of a certificate agency (CA)?
a) To encode plain text with the public keys that are shared between the parties involved
in the transaction
b) To issue digital certificates for the public keys of the parties involved in the transaction
c) To manage the passwords of the parties involved in the transaction
d) To manage the private key that is shared between the parties involved in the transaction
– 15 –
Q41. Which of the following is an appropriate purpose of using a hash value in digital
forensics?
a) To convert a password with a one-way function so that recovery is not possible, then
store it
b) To prove the identicalness between the original and the duplicate copy of the data that
can be used as evidence
c) To restore altered data to its original form so that it can be used as evidence
d) To verify whether password tapping occurred or not
Q42. Which of the following is an appropriate operation for user authentication that uses an
IC card and a PIN?
a) Given that each user can be identified by an IC card, a common PIN is set for all users
in order to reduce the management workload.
b) If an IC card is lost, a new IC card is issued, and after the PIN is reset, the lost IC card
is deactivated.
c) The PIN is set by combining the numeric information imprinted on the surface of the
IC card.
d) When an IC card is delivered, the PIN is not enclosed, but is notified to the user
through another channel.
Q43. When malware that has made a successful intrusion into a PC communicates with a
command-and-control server on the Internet, which of the following is a reason for using
the TCP port number 80 as the destination port in most cases?
a) Given that this port is used for browsing websites, there is a high probability that
communication is allowed by the firewall.
b) Given that this port is used for browsing websites through HTTPS communication,
there is a low probability that this port is detected by an intrusion detection system.
c) Given that this port is used for the name resolution of a domain name, there is a low
probability that this port is detected by an intrusion detection system.
d) Given that this port is used in a DNS zone transfer, there is a high probability that
communication is allowed by the firewall.
– 16 –
Q44. When a normally functioning hard disk of a PC on which confidential files are stored is
handed over to an industrial waste disposal vendor, which of the following is an
appropriate countermeasure against information leakage?
a) Changing the filename of each confidential file to a random character string multiple
times
b) Compressing the confidential files multiple times with different compression
techniques
c) Erasing the master boot record of the hard disk multiple times with a specialized
erasing tool
d) Overwriting all areas of the hard disk with a random bit string multiple times
Q45. Which of the following is an appropriate reason why VLANs are used?
Q46. Which of the following must be approved by the customer when the external design of a
system is completed?
Q47. Which of the following is the appropriate combination of the basic concept of object
orientation?
– 17 –
Q48. In order to increase module independence, the level of module coupling must be low.
Which of the following methods of exchanging information between modules has the
lowest level of module coupling?
a) Control parameters are passed as arguments in order to control the execution order of
modules.
b) Only data items that are required for input and output are passed as arguments between
modules.
c) Relevant module reference data that is defined in a common area.
d) Required data is declared externally and shared.
Q49. The integration test for software composed of modules arranged in a hierarchical
structure is performed from a high-level module. In such a case, which of the following is a
test module that is used as a substitute for a low-level module?
a) Driver b) Emulator
c) Simulator d) Stub
Q50. Which of the following is the method that uses a modeling tool to create a design
document described with E-R diagrams or other representations from the definition
information in an active database?
– 18 –
Q52. Which of the following is the structure that illustrates the relationship between project
activity and the units of project that will perform those activities?
Q53. According to the PMBOK Guide – Fifth Edition, which of the following is an
appropriate definition of a project stakeholder?
a) A person or group who provides resources and support for the project, program, or
portfolio and is accountable for enabling success.
b) An individual, group, or organization, who may affect, be affected by, or perceive itself
to be affected by a decision, activity, or outcome of a project.
c) An organizational structure that standardizes the project-related governance processes
and facilitates the sharing of resources, methodologies, tools, and techniques.
d) The person assigned by the performing organization to lead the team that is responsible
for achieving the project objectives.
Q54. Which of the following is an appropriate explanation of the Function Point method that
is used for system development estimation?
a) It is a method for estimating the overall workload where the development work is
broken down into units of work items and then the workload for each item is
accumulated on the basis of a predefined standard value for the unit of workload.
b) It is a method for estimating the person-hours and period of time required to complete
development, on the assumption that the development scale is known. It can be applied
to all fields, not just to the business field.
c) It is a method for estimating the scale and person-hours of development on the basis of
the past experience of a similar system, where past data is used for the same areas and
past experience for different areas.
d) It is a method for estimating the scale of a system where the functions of the system are
quantitatively measured by using elements such as the number of I/O data items and the
number of files, and an adjustment is performed on the basis of the complexity and
characteristics of the application.
– 19 –
Q55. According to the ITIL 2011 edition, which of the following is an appropriate stage of
the service life cycle where a service provider builds and deploys new or modified
services?
Q57. According to the ISO/IEC 20000-1:2011, which of the following is a control process that
includes the identification, control, recording, tracking, reporting and verification of CI and
the management of CI information in the CMDB?
– 20 –
Q58. Which of the following is the most appropriate purpose for which a system auditor
exchanges opinions with an audited department with respect to the draft version of an audit
report?
a) In order to confirm that there are no factual errors in the findings and recommendations
to be described in the audit report.
b) In order to issue the audit report to the audited department before the audit report is
submitted to the person who is requesting the audit.
c) In order to receive the approval of the responsible person of the audited department
with respect to the recommendations described in the audit report.
d) In order to substitute with an additional investigation concerning the audit report for
which the investigation is insufficient, by orally confirming with the audited
department.
Q59. Which of the following is a checkpoint for auditing the control of the risk of
information leakage, falsification, and unauthorized use of documents concerning a
system?
a) For an audit of the development status of an information systems department, the audit
team consists of members of the information systems department who are familiar with
the details of the development.
b) In order to enable the person requesting the audit to issue improvement instructions on
the basis of the audit report, the system auditor reports the audit results to the person
requesting the audit.
c) When a system audit is performed as part of an operations audit, the audit team consists
of members of the user department.
d) When a system auditor accepts the help of other experts, the experts become
responsible for decisions concerning the scope and methods of support, as well as the
audit result.
– 21 –
Q61. Which of the following is a technique that is used to perform the optimum resource
allocation for a computerization investment in each category classified on the basis of the
similarities of risks and the investment value?
a) 3C analysis b) Benchmarking
c) Enterprise architecture d) IT portfolio
Q62. Which of the following represents a part of the total cost of ownership (TCO) for SaaS
(Software as a service)?
Q63. Which of the following is a measure for the risk of a decline in the system maintenance
and operation quality during the outsourcing of an IT service?
a) Human resources with assessment capabilities with respect to the service cost of system
maintenance and operations are secured in the company.
b) In order to validate the service cost, the detailed fee structure by service is clearly
stated in the contract or other documents.
c) The proposal for the human resource development plan of the company after
outsourcing is requested during the stage of subcontractor selection, and is also clearly
stated in the contract or other documents.
d) The service quality improvement activities are proceeded by agreeing to the desired
level of quality with the subcontractor by using indexes that demonstrate the service
quality.
– 22 –
Q64. Which of the following is a characteristic of hosting service?
Q65. Which of the following is an explanation of BYOD (Bring Your Own Device)?
a) Carrying information devices provided by the company at any time for work use
b) Configuring a usage environment for the personal use of personally-owned information
devices
c) Using employees’ personally-owned information devices for work
d) Using laptop computers or other information devices provided by the company for
personal use outside of the company
Q66. Which of the following is the work that is performed when non-functional requirements
are defined?
a) Clarifying the flow of information (i.e., data) between the functions constituting
business operations
b) Clarifying the interface for exchanging information with other systems
c) Creating the technical requirements for the development criteria and standards
according to the programming language used in system development
d) Defining the scope to be implemented as system functions
– 23 –
Q67. Which of the following is an explanation of the digital divide?
Q68. Which of the following is the purpose of analyzing business plans and competitive
advantages through portfolio management that uses the matrix shown in the figure?
Strength of business
(market share)
Attractiveness of business
High
(market growth rate)
Low
Strong Weak
– 24 –
Q69. Which of the following is an explanation of core competence?
a) Corporate activities that follow laws, various regulations, and social norms for
performance management
b) Overall system and operation optimization techniques to achieve the purposes of
organizational activities
c) Predominant abilities that cannot be imitated by competitors in a company’s area of
activity
d) The development region of a business that is decided upon based on the viewpoint of
the market, technology, and products (or services)
Q70. Which of the following is the basic strategy of a niche in a competitive position?
Q71. The figure below is the work procedure of MRP (Material Requirements Planning), a
technique of a production management system. Which of the following information to be
inserted into A in the figure below is necessary for calculating the net requirements?
Calculation of
Master Calculation net requirements Calculation Arrange Arrangement
schedule of gross (Calculation of of the order
requirements quantity ment plan instructions
the shortage)
– 25 –
Q72. Which of the following describes an RFID system?
a) Multiple RF Tags within range communicate with each other, and create a mesh
network.
b) RF Readers/Writers generate an electromagnetic field that charges the RF Tags within
range to allow transmission of information.
c) RF Tags process unique positioning information by using multiple satellites which
allow for the tracking of the item using longitude and latitude coordinates.
d) RF Tag transmission does not provide error correcting codes and still acquires high
reliability through a wired connection.
a) To act as the chairperson and control the discussions so as to work out a conclusion that
matches the intentions of the management
b) To encourage the participants of the meeting to put forth their remarks and organize the
flow of discussions from a neutral and impartial position
c) To give advice only in discussions related to specific areas in which the facilitator
specializes, such as technical or legal fields
d) To offer specialized support for the administration of a meeting, such as adjusting the
schedule, preparing materials, or creating minutes.
– 26 –
Q75. Which of the following is an explanation of an affinity diagram?
a) It is a method by which along with the progress in a situation, measures are examined
for problems that might have several outcomes, and the process leading to the desired
result is decided.
b) It is a method by which a causal relationship is clarified for events intertwined with
complex factors.
c) It is a method by which the collected information is categorized on the basis of a
mutual relationship, and the problems to be resolved are clarified.
d) It is a method by which the means and measures for achieving the purpose and
objectives are developed sequentially, and the most appropriate means or measures are
sought.
Q77. A factory has recorded the number of occurrences of defective products according to
the cause of the defect. Based on this record, which of the following is a Pareto chart that
shows the top causes of defective product occurrences and the cumulative total of
percentages?
a) b)
c) d)
– 27 –
Q78. Company A sets a goal to make a profit of $36,000 under the conditions shown in the
table below. What is the minimum sales revenue for the company to achieve its goal?
Q79. When the inventory unit price is determined by dividing the total purchase amount by
the total quantity of items purchased, which of the following is an appropriate inventory
method to be used?
Q80. Which of the following is an appropriate description of the scope of software protection
under WTO’s Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS)?
– 28 –