VOL1 FE2009 TrialExam Morning
VOL1 FE2009 TrialExam Morning
Fundamental IT Engineer
Examination (Morning)
Trial
Q1. Which of the following is a decimal number that can be expressed in binary
floating-point without any possible rounding (round-off) error?
Q2. There is a non-zero integer whose number of digits is D in decimal and B in binary.
Which of the following expressions correctly describes the relationship between D and
B?
a) D 2 log10 B b) D 10 log2 B
c) D B log2 10 d) D B log10 2
Q3. Which of the following numeric values or expressions represents an n-digit binary
number consisting entirely of ones, “1111…111”? Here, a negative number is
expressed in two’s complement.
a) –(2n-1–1) b) –1 c) 0 d) 2n –1
a) A, D, F, G b) B, C, E, H c) B, E d) C, E, H
Q5. The calculation time for solving a system of linear equations on a computer is
proportional to the cube (third power) of the number of unknowns in the equations. If it
takes 2 seconds on a computer to solve a system of linear equations involving 100
unknowns, how many seconds does it take on a computer with four times the processing
speed to solve a system of linear equations involving 1,000 unknowns?
a) 5 b) 50 c) 500 d) 5,000
Q6. There is an 8-bit code whose most significant bit is a parity bit. Which of the following
bitwise operations can be used to obtain the lower 7 bits other than the parity bit?
Q7. As a result of inspecting 100 parts, 11 were found with defect A, 7 with defect B, and 4
with defect C. Moreover, 3 were detected with both A and B, 2 with both A and C, and
none were found with both B and C. How many parts were free of defects?
a) 78 b) 83 c) 85 d) 88
Q8. Which of the following truth tables represents the logical formula
Z = X • Y + X • Y ? Here, “ • ” is used for the logical product, “+” for the logical
sum and “ A ” for the logical negation of “ A .”
a) b)
X Y Z X Y Z
0 0 0 0 0 0
0 1 0 0 1 1
1 0 0 1 0 1
1 1 1 1 1 0
c) d)
X Y Z X Y Z
0 0 0 0 0 1
0 1 1 0 1 0
1 0 1 1 0 0
1 1 1 1 1 1
Q9. How many bits are at least required to uniquely represent the English capital letters (A
through Z) and the numeric characters (0 through 9) with the same number of bits?
a) 5 b) 6 c) 7 d) 8
Q10. Which of the following character strings is accepted by the finite automaton in the
diagram shown below? The symbol indicates the initial state and the symbol
indicates the accept state.
1
1
0
0 0,1
0 1
0
s
1
Q11. A particular syntax is described by using the syntax diagram shown below. The
numeric representations such as –100, 5.3, and +13.07 conform to this syntax.
+
Numeral Numeral
・
-
Based on this notation, which of the following numeric representations conforms to the
syntax specified in the figure shown below?
+ +
Numeral Numeral E Numeral
・
- -
Q12. In binary tree traversal, there are three different methods depending on the traversal
sequence.
(1) Pre-order: Scans in the order of node, left subtree, and right subtree
(2) In-order: Scans in the order of left subtree, node, and right subtree
(3) Post-order: Scans in the order of left subtree, right subtree, and node
When the tree illustrated below is traversed in pre-order, which of the following
indicates a sequence of the output node values?
b e
c d f g
h i j k
a) abchidefjgk b) abechidfjgk
c) hcibdajfegk d) hicdbjfkgea
a) b) c) d)
1 3 3 6
7 4 7 4
3 6 1 3
Q14. Which of the following appropriately describes a characteristic of the hash method used
in table searches?
Q15. Which of the following sort algorithms is illustrated in the flowchart below?
a) It does not require periodic refresh to retain stored information, and all or part of
information can be erased and rewritten electrically.
b) All stored information can be erased using ultraviolet light and rewritten.
c) Since it can read data at high speed, it is often used as cache memory.
d) It requires periodic refresh and is widely used as main memory.
Q17. Which of the following logical circuits with two inputs and one output can generate 0
for X only when inputs A and B are both 1s?
A
X
B
Q18. In a certain computer, one instruction is executed in the order of steps 1 through 6 in the
table shown below. How many nanoseconds are required to execute 6 instructions
using pipeline processing in the figure shown below? Here, it takes 10 nanoseconds to
execute each step, and there is no instruction, such as branch and jump, that stalls the
pipeline processing.
5 Fetch data
6 Execute operation
Fig. Pipeline Processing to Execute Instructions
a) 50 b) 60 c) 110 d) 300
Q19. Which of the following technologies is suited for a multimedia system that allows one
instruction to execute the same operation on two or more data concurrently?
Q20. A certain computer’s average instruction execution time is 0.2 µsec. What is this
computer’s performance in terms of MIPS?
Q22. There are two CPUs X and Y that are configured in the figure shown below. Both have
exactly the same conditions except the access time of the cache memory and main
memory in the table shown below. When a certain program runs on both CPUs,
processing time is the same for both. In this case, what is the hit ratio of the cache
memory? Here, no factors other than CPU processing have an impact on the hit ratio.
a) Data is written only into the cache memory when CPU performs the write operation.
b) Data is written simultaneously into both the cache and main memory.
c) Changes to data in the main memory take place when the data is pushed out of the
cache memory.
d) Because of a relatively low frequency of memory access, the bus occupancy ratio is
also low.
Q24. On a hard disk, a sequential organization file consists of unblocked fixed length
records. A program reads and processes all data in this file sequentially. When the
file organization or reading method is changed, which of the following is an
appropriate solution to achieve the shortest time in which the program needs to read
the data? Here, multiprocessing is not considered.
a) By dividing and storing the data into separate files and accessing these files
sequentially.
b) By creating an indexed organization file and reading the data by using a key of each
record.
c) By creating a direct organization file and reading only the necessary data.
d) By blocking records and increasing the number of records acquired in a single
physical read operation.
Q26. Which of the following appropriately describes the features of USB 1.1?
a) USB 1.1 adopts a high-speed transfer method that is suitable for data to be delivered
in real time, such as audio and video. USB 1.1 allows devices to be connected in a
daisy-chain or tree topology, and permits connection even in the absence of a PC
acting as host.
b) Peripheral devices are connected through a PC acting as host. USB 1.1 supports
multiple modes of data transfer; generally, a printer or a scanner uses full speed
mode, and a keyboard or a mouse uses low speed mode.
c) USB 1.1 is a serial interface that is originally designed for connecting modems, but is
also used for connecting peripheral devices to a PC.
d) USB 1.1 is a parallel interface that connects hard disks, laser printers and other
peripheral devices to small computers, including PCs.
Q28. About how many megabytes (or Mbytes) in memory are required to display a screen of
1,024 horizontal pixels and 768 vertical pixels when the video memory stores 24 bits of
color information per pixel? Here, 1 Mbyte is 106 bytes.
Q29. In basic computer architecture, which of the following is the method that both programs
and data are read into the storage device of a computer prior to execution?
Q30. When three tasks run standalone, their priority levels are shown in the table below, and
each operation sequence and processing time of the CPU and I/O devices are also
described in the table. How many milliseconds of the CPU idle time are there from
the instant all three tasks become executable at a time until the execution of all tasks is
completed? Here, no conflict occurs in I/O operations, and the overhead of the OS
itself can be ignored.
a) 2 b) 3 c) 4 d) 5
Q31. Which of the following appropriately describes an expression that represents the
relationship between turnaround time, CPU time, I/O time, and process waiting time?
Here, all other types of overhead time can be ignored.
Q34. Which of the following appropriately describes the API (Application Program
Interface) in an OS?
Q35. In the hierarchical file system shown below, when the current directory is B1, which of
the following is the relative path name of the file C2? Here, a symbol “..” in the path
name indicates a parent directory. A backslash “\” appearing at the head of a path name
means the root directory, whereas a backslash “\” in the middle indicates a delimiter of
the directories or file names. The boxes in the figure represent directories.
A1 A2
C1 C2
a) ..\A1\B2\C2 b) ..\B2\C2
c) A1\B2\C2 d) B1\..B2\C2
Q36. In the function layer of a 3-layer client/server system, which of the following
combinations of two functions is processed?
a) The input of search conditions and the assembling of the data processing conditions
b) The input of search conditions and data access
c) The assembling of the data processing conditions and data manipulation
d) Data access and data manipulation
a) The multiple processors share a hard disk, and each processor is controlled by its
own OS. Processing power is enhanced by distributing workload on a per-job
basis.
b) The multiple processors share the main memory and are controlled by a single OS.
In principle, a task in the system can be executed by any of the processors, so
processing power is enhanced by distributing workload in small pieces.
c) Normally, one of the processors is in the standby state. When a failure occurs in the
active system, processing is continued by switching over to the standby processor.
d) Two parallel connected processors concurrently perform the same processing and
compare their results with each other. If one of the processors fails, it is removed
and processing is continued.
a) In OLTP (Online Transaction Processing), MIPS values are used to evaluate system
performance.
b) Response time and turnaround time are performance evaluation indexes from the
viewpoint of a system operation administrator.
c) Generally, response time is improved as the utilization ratio of system resources
becomes higher.
d) The number of transactions or jobs that can be processed in a unit of time is important
for evaluating system performance.
Q39. In a parallel system shown below, at least how many subsystems are required to
increase the availability of the entire system to 99% or more? Here, the availability of
each subsystem is 70%. The entire system is running as long as one subsystem is
running.
Subsystem
Subsystem
…
Subsystem
a) 3 b) 4 c) 5 d) 6
Q40. In a hierarchical DFD, a part of DFD at a certain level is shown below. Which of the
following illustrates the appropriate method for describing the immediately lower level
of DFD? Here, the processes in the immediately lower level of Process n are
numbered as follows: Process n-1, Process n-2, etc.
a) b)
1–2
1–1
1–1
1–3
1–3 1–2
c) d)
1–2 1–3
1–1
1–1 2–1
2–2 1–2
a) A recursive program can call itself either directly or indirectly through another
program it has called.
b) A recursive program can be located and executed at any address in the main memory.
c) A recursive program can produce correct results even if it is simultaneously called by
multiple tasks.
d) A recursive program can be repeatedly executed without reloading.
a) The sequence of computation is specified by data flow, not by control flow. The
data used by an instruction is not used by this or the other instructions after that.
b) The control of computation is sequentially passed from instruction to instruction.
The transfer of data between instructions is done indirectly by referencing the
memory through “variables.” The instructions and the definition of data are
separated.
c) Data is hidden from the outside world and operated indirectly by a procedure called a
“method.” A program is a collection of encapsulations of data and methods.
d) A program is composed of data and instructions (symbols of operation) that represent
nest-structured operational expressions and functions. “Instruction execution”
means “calculation (evaluation) of that particular expression or function.”
a) COBOL is suited for business data processing and executed by using an interpreter.
b) C is a system description language, and a program written in C needs compiling
prior to its execution.
c) The language specifications of Java depend on the platform, and Java is executed by
using an interpreter.
d) Perl is suitable for writing programs that run on a client, and a program written in
Perl needs compiling prior to its execution.
Q45. Which of the following should be approved after completion of the external design of
the system?
Q48. Which of the following appropriately explains white box testing that is one of the
program testing methods?
a) The lowest-level modules in the program structure are first tested. Next, they are
integrated into the higher-level modules, and the integrated modules are tested. In
this way, this method repeats integration and testing at higher level in sequence.
b) The highest-level module in the program structure is first tested. Next, the
lower-level modules called by the highest module are integrated and tested. In this
way, this method repeats integration and testing at lower level in sequence.
c) This testing method focuses attention on the external specifications of a program,
and all possible combinations of the input values are tested. This method includes
techniques such as equivalence partitioning, boundary value analysis, and
cause-effect graph.
d) This testing method focuses attention on the internal structure of a program. The
program logic is examined and tested so that all paths can be executed. This
method includes techniques such as instruction coverage and condition coverage.
Q49. When a calculation method of check digit shown below is used for appending a check
digit to a given data value, which of the following is the correct result? Here, the data
value is 7394, the weight factor assigned to each position is “1, 2, 3, 4,” and the base 11
(modulus 11) is assumed.
[Method]
1) Multiply each digit of the data by the corresponding digit of the weight factor, and
then sum up the results.
2) Divide the sum of step 1 by the base to obtain the remainder.
3) Subtract the remainder of step 2 from the base, and append the resulting one’s place
value to the end of the data value as a check digit.
Q50. In a GUI screen, which of the following is the most significant point to remember, in
order to provide an efficient user interface both for users who are accustomed to
keyboard operations and for those who are not?
a) Minimizing direct input from the keyboard and enabling selection from lists using
the mouse
b) Placing important items, such as mandatory fields, at the top of the screen, regardless
of the format of the input form
c) Making both mouse and keyboard interfaces available for frequently performed
operations
d) Making it possible to execute frequently used functions by double-clicking the
mouse
Q52. Which of the following appropriately describes how to use stubs in the testing phase?
Q53. A sales company is developing an application that can provide data to sales personnel
at branch offices across the country from a server located in the head office, using the
company’s own intranet. When a system test is done in the LAN environment of the
head office, which of the following is a difficult item to verify? Here, the company’s
internal network consists of LAN in the head office, LANs in the branch offices, and
communication lines connecting these offices.
Q54. In the logic test shown below, which of the following test cases is needed to achieve
decision condition coverage (branch coverage)?
True
A OR B
False
Instruction
a) b) c) d)
A B A B A B A B
False True False True False False False True
True False True True True False
True True
Q55. In a system development project, PERT is used to create an implementation plan and
find a critical path. Which of the following can be figured out of the critical path?
a) The activities that require the most attention in terms of system quality
b) The activities whose implementation sequence can be changed
c) The activities that are directly connected to delay of the whole project
d) The most costly activities
Q56. Which of the following appropriately describes the function point method?
Q57. Which of the following appropriately describes the purpose of appending a check digit
to a customer code?
Q58. The charge for using a computer system is determined in consideration of various
criteria such as the usage of resources and the number of users. Which of the following
graphs shows a declining metered rate system (or a diminishing charge system)?
Here, the horizontal axis indicates the usage amount, and the vertical axis is the usage
charge?
a) b)
0 0
c) d)
0 0
Q59. Which of the following devices is installed so that a computer system will not shut down
due to a sudden failure of the external power supply?
a) CVCF b) UPS
c) Private electric power generator d) Backup power-receiving equipment
Q60. In software maintenance, which of the following tests is used to make sure that side
effects of corrections or changes are not happening?
Q61. Which of the following appropriately describes protocols that are used in the session
layer of the OSI basic reference model?
a) There are protocols for error detection and recovery process for the sequence and
loss of transmitted data, multiplexing of data, etc.
b) There are protocols for remote data access, file transfer, etc.
c) In order to do transparent, error-free data transfer between adjacent systems, there
are protocols for error control, recovery control procedures, send/receive timing, etc.
d) In order to establish a logical communication path and support orderly data
exchange, there are protocols for interoperation control, exception reporting, etc.
Q62. As shown in the figure below, the 16-bit data is arranged in a square of 4 by 4 blocks,
and parities are appended to rows and columns. Up to how many bits of error can be
corrected by means of this method? Here, the shaded areas in the figure indicate
parities.
1 0 0 0 1
0 1 1 0 0
0 0 1 0 1
1 1 0 1 1
0 0 0 1
a) 0 (uncorrectable) b) 1
c) 2 d) 3
Q63. When messages consisting of 90 characters each are transferred at a speed of 14,400
bps on the start/stop line, how many messages can be sent in 1 minute? Here, each
character consists of 8 bits without parity, and the 1-bit start and 1-bit stop signals are
used. The actual usage ratio of the line is 80%.
a) 12 b) 16 c) 768 d) 960
Q64. When a file with an average size of 1,000 bytes is transferred every two seconds
between terminals connected through a leased line with a communication speed of
64,000 bps, which of the following is closest to the line usage ratio (%)? Here, during
file transfer, control information equivalent to 20% of the transfer amount is appended.
Q65. When the collision lamp of the 10Base-T hub remains solidly lit, which of the following
appropriately describes the status of LAN?
a) The gateway is used for protocol conversion only at lower layers from the first layer
through the third layer in the OSI basic reference model.
b) The bridge relays frames based on the IP address.
c) The repeater amplifies signals between segments to extend the transmission distance.
d) The router relays frames based on the address at the MAC layer.
Q67. A certain record consists of items A through F. The combination of items A and B is
the primary key for this record. Moreover, item F can be identified by item B.
Which of the following is in the 3rd normal form of this record?
A B C D E F
a) A B C D E B F
b) A B C D E B F
c) A B F C D E B F
d) A C D E B C D E B F
a) Projection combines the query results of one table with those of another table to form
a single table.
b) Projection extracts from a table the rows that match a specific condition.
c) Projection extracts only the specific columns from a table.
d) Projection forms a new table by combining groups that match particular conditions
in two or more tables.
Q69. Based on the “Product” table shown below, a “Profitable Product” table is created by
using [View definition]. Which of the following update processes decreases the
number of rows appearing in the “Profitable Product” table?
Product
Product code Product name Model Sales price Purchase price
S001 PC T T2003 1,500 1,000
S003 PC S S2003 2,000 1,700
S005 PC R R2003 1,400 800
[View definition]
CREATE VIEW Profitable_Product
AS SELECT * FROM Product
WHERE Sales_price – Purchase_price >= 400
Q70. Which of the following appropriately describes the log file in DBMS?
a) A log file is created by periodically writing updated data in the main memory onto a
disk, so as to shorten database recovery processing time in the event the system goes
down.
b) A log file is created by constantly writing a copy of the same data into a database on
a separate disk or into a database at another site, so that the system can be
immediately restored in the event of a disk failure.
c) A log file is created by duplicating the content of the database on a per-disk basis, so
as to restore the database from disk failure.
d) A log file is obtained by writing the data values preceding and following data updates
in order to keep records of the database updates, for use in database recovery.
Q71. The figure shown below is a conceptual diagram of a public key cryptography. Which
of the following is the appropriate combination to be inserted in A and B?
Sender Receiver
Encrypted Encrypted
Plain Text Encryption Text Text Decryption Plain Text
A B
A B
a) Receiver’s public key Receiver’s private key
b) Receiver’s private key Receiver’s public key
c) Sender’s public key Receiver’s private key
d) Sender’s private key Receiver’s public key
Q72. Which of the following appropriately describes security in use of the Internet?
Q73. Which of the following standards has the objective of achieving customer satisfaction
through effective use of a quality management system that includes preventive
processes for nonconforming products?
Q74. When the relationship between the preset price and expected demand of a given product
is approximated by a linear expression, which of the following is the appropriate value
A
that should be put in the box below?
Q76. Some items calculated from a profit and loss statement are included in the table shown
below. In this case, how much is the break-even point in dollars?
Unit: $
Item Amount
Total sales 10,000
Variable cost 8,000
Fixed cost 1,000
Profit 1,000
Q77. Which of the following is appropriate as a case to which the Delphi method is
applicable?
a) A network diagram is created with arrows connecting the individual activities and
indicating their order relationships. This is useful for identifying process
bottlenecks and preparing schedules.
b) A center line and a pair of upper and lower limit lines are drawn, and the
characteristic values of products are plotted. This is useful for detecting quality
problems and abnormal situations in process, eliminating the causes of problems,
and preventing problem recurrences.
c) The number of product defects and the amount of loss are categorized on a
cause-by-cause basis, accumulated and sorted in descending order. This makes it
possible to identify items whose improvement is highly effective.
d) Factors considered possible causes of a problem are arranged in a shape such as a fish
skeleton. This makes it possible to identify the root causes of the problem, and is
useful in solving it.
Q79. In order to compare last year's hiring examination with this year's, the company had a
large number of employees to take both examinations. Then, the correlation coefficient
and regression line were obtained by plotting their scores from last year's examination
on the x-axis and their scores from this year's examinations on the y-axis. Which of the
following is the appropriate statement that can be concluded from the results below?
[Results]
The correlation coefficient was 0.8.
The slope of the regression line was 1.1.
The value of the y-intercept of the regression line was 10.
a) Based on the value of the y-intercept of the regression line, it is understood that a
person whose score on this year’s exam was 0 could score about 10 on last year’s
exam.
b) Based on the slope of the regression line, it is understood that the average score on
this year's examination is about 1.1 times that of last year's examination.
c) Based on the slope and the y-intercept of the regression line, it is understood that
scores on this year's examination tend to be higher than those on last year's
examination.
d) Based on the slope of the regression line and the value of the correlation coefficient,
it is understood that this year's examination is of high quality.
Q80. In a certain factory, three products A, B, and C are manufactured using the same
material M. Table 1 shows the time required to manufacture 1 kg of each of products
A, B, and C, the necessary amount of material M, and the profit. Table 2 shows the
amounts of resources that can be allocated every month. At this factory, they want to
know the quantities of products A, B, and C that will yield the highest profit. Which of
the following is the most appropriate method to solve this issue?
Table 1 Manufacturing conditions Table 2 Allocatable amounts of
Product A B C resources
Time required to Manufacturing time
2 3 1 240
manufacture (hours/kg) (hours/month)
Necessary amount of Amount of material M
2 1 2 150
material M (liters/kg) (liters/month)
Profit ($/kg)
8 5 5
Now, take the n-bit binary number with all ones (1’s) and convert it into two’s complement.
111…11
↓ reversing each bit
000…00
+) 1 1 is added
000…01 = (1)10
Since the result of converting it into two’s complement is (1)10, the number whose bits are all ones
(1’s) is –1.
Here, since we are solving a system of linear equations with 1,000 variables, we substitute x = 1,000 =
103 in the equation (2):
Y = 0.5 × 10-6 × (103)3
= 0.5 × 10-6 × 109
= 0.5 × 103
= 500 (seconds).
Therefore, the answer is to simply perform the logical AND operation with (01111111)2 = (7F)16.
In the following explanations, “x” means either one(1) or zero (0).
A) x x x x x x x x ← 8-bit code
AND) 0 0 0 0 1 1 1 1 = (0F)16
0 0 0 0 x x x x
Here, only the lower four (4) bits are produced.
B) x x x x x x x x ← 8-bit code
OR) 0 0 0 0 1 1 1 1 = (0F)16
x x x x 1 1 1 1
Here, only the higher four (4) bits are produced, and the lower four (4) bits are all 1s.
C) x x x x x x x x ← 8-bit code
AND) 0 1 1 1 1 1 1 1 = (0F)16
0 x x x x x x x
Here, the most significant bit (parity bit) is zero (0), and the lower seven (7) bits stay the same.
( A U B U C ) is the set of parts with defect A, defect B, or defect C. Hence, the set of defect-free parts
is the complement of this set, and so the answer can be calculated by subtracting the number of parts
included in ( A U B U C ) from the total number 100.
Let us denote the number of elements in the set ( A U B U C ) as n( A U B U C ) . We then have the
following expression:
n( A U B U C ) = n( A) + n( B) + n(C ) − n( A I B ) − n( A I C ) − n( B I C ) + n( A I B I C ) (1)
Now, we substitute the numbers given in the question.
n(A) = 11 (parts with defect A; may also have defects B and/or C)
n(B) = 7 (parts with defect B; may also have defects A and/or C)
n(C) = 4 (parts with defect C; may also have defects A and/or B)
n( A I B) = 3 (parts with defects A and B; may also have defect C)
n( A I C ) = 2 (parts with defects A and C; may also have defect B)
n( B I C ) = 0 (parts with defects B and C; may also have defect A)
Substitute these values in the equation (1), and we get
( A U B U C ) = 11 + 7 + 4 − 3 − 2 − 0 + n( A I B I C )
= 17 + n( A I B I C ) .
Now, since n( B I C ) = 0, ( B I C ) is the empty set. Hence, ( A I B I C ) is also the empty set,
and we conclude that n( A I B I C ) = 0.
∴ n( A U B U C ) = 17.
Therefore, the number of defect-free parts is obtained as follows:
n( A U B U C ) = 100 − 17
= 83 (parts).
Since the number of defect-free parts is 83, the correct answer is (b).
Below, we explain why the equation (1) holds.
Consider the Venn diagram shown below. n(A), n(B), and n(C) can be expressed as follows:
n(A) = ○
1 + ○
4 + ○
6 + ○
7
n(B) = ○
2 + ○
4 + ○
5 + ○
7
n(C) = ○
3 + ○
5 + ○
6 + ○
7
Thus, n(A) + n(B) + n(C) can be expressed as follows:
n(A) + n(B) + n(C) = ○ 1 + ○ 4 + ○ 6 + ○ 7 + ○ 2 + ○4 + ○5 + ○7 + ○
3 + ○
5 + ○
6 + ○
7
= (○1 + ○ 2 + ○ 3 + ○ 4 + ○ 5 + ○6 + ○
7 ) +○
4 + ○
5 + ○
6 + ○
7 + ○
7
On the other hand, n( A U B U C ) is the sum of ○
1 through ○ 7 , so we get n(A) + n(B) + n(C) as
below:
n(A) + n(B) + n(C) = (○ 1 + ○ 2 + ○ 3 + ○4 + ○5 + ○ 6 + ○ 7 ) : n(A∪B∪C)
+ (○
4 + ○ 7) : n(A∩B)
+ (○
5+ ○ 7) : n(B∩C)
+ (○
6+ ○ 7) : n(A∩C)
− ○7 : n(A∩B∩C)
This gives us the formula:
n(A) + n(B) + n(C) = n( A U B U C ) + n( A I B) + n( A I C ) + n( B I C ) − n( A I B I C )
∴ n( A U B U C ) = n(A) + n(B) +n (C)
− n( A I B ) − n( A I C ) − n( B I C ) + n( A I B I C )
The logical formula Z = X • Y + X • Y is the exclusive logical sum (also called exclusive OR). The
result of its logical operation is 0 if the logical variables X and Y have the same value and 1 if X and Y
are different.
Hence, the truth table for the logical expression Z = X • Y + X • Y is as follows:
X Y Z
0 0 0
0 1 1
1 0 1
1 1 0
If you cannot recognize the formula soon as the exclusive logical sum, you can also actually do the
operation Z = X • Y + X • Y and verify the answer.
X Y X Y X •Y X •Y Z = X •Y + X •Y
0 0 1 1 0 0 0
0 1 1 0 0 1 1
1 0 0 1 1 0 1
1 1 0 0 0 1 0
In general, using n-bit binary numbers, we can express values ranging from 0 through 2n − 1 if we do
not take negative numbers into consideration. In this question, we need 36 characters, so we can do the
following calculations.
2n − 1 = 36
2n = 37
It is a bit complicated to calculate this exponentiation exactly, so here is an easier way as follows:
25 = 32 < 37 < 26 = 64
Based on the above result, 6 bits are sufficient to express 36 different patterns.
A character string is accepted if it begins at the initial state ( ) and ends at the accept state
The diagram is followed from left to right; for example, the first syntax diagram in the question
indicates that the character string does not have to begin with + or − and that a numeral can be
repeated after that. The radix point “.” is never located at the beginning.
Numerals repeated
Numeral Numeral
For these reasons, −100, 5.3, and +13.07 do conform to the syntax shown in the example.
In the second syntax diagram given in the question, since the order “(+, −, or nothing) → numeral(s)
→ radix point” is specified, there must be a numeral before the radix point. Further, another part
shows the order “E → (+, −, or nothing) → numeral(s),” so “E” must be followed by +, −, or a
numeral. Taking this fact into consideration, you can check up each expression listed in the answer
group.
a) The radix point “.” must be preceded by a numeral, but “–” exist instead of a numeral.
b) Since 5.2 conforms to the order “numeral(s) →radix point → numeral(s)” and + or – is omitted at
the beginning, it conforms to the syntax. Further, E−07 is of the order “E → − → numeral(s),” so
it conforms to the syntax also. Hence, 5.2E−07 conforms to the syntax.
c) “E” must be followed by +, −, or a numeral.
d) “E” cannot be immediately preceded by a radix point.
the left subtree, follows the path a → b → c, and reaches “h.” After “h,” it scans node “c” and
proceeds to its right subtree “i.” Hence, the scan runs “h → c → i →…(hcibdajfegk),” which is the
answer option (c).
Post-order traversal goes in the order of “left subtree, right subtree, and node,” so it runs “h → i → c
→…(hicdbjfkgea),” which is the answer option (d).
Pre-order, in-order, and post-order traversal methods are called depth-first traversal; when scanning a
binary tree under these methods, the following patterns hold:
In a binary tree as shown below, if the values are output as you pass on the left side of the nodes, it is
pre-order traversal. If they are output when you pass under the nodes, it is in-order traversal. If they
are output when you pass on the right side of the nodes, it is post-order traverse.
4
6 6
5 7 7 7
1 1 1 1 1 1
6 3 (final result)
7 7 7
1 1 1
a) Hashing is a method for determining the storage location; it is unrelated to what is used as the data
structure.
b) There are occasions in which hashing gives the same address for different key values. This is
called a collision. In hashing, collisions cannot be prevented. If a collision happens, the data
already stored there is called home, and the data that caused the collision is called a synonym.
d) The data is converted to the address using a hash function, so the conversion can be done in the
same amount of time. In other words, it does not depend on the size of the table (the number of
elements in the table). If a collision occurs, re-hashing takes place, and the method of re-hashing
does impact the time required for search.
Next, we follow the flowchart of the question. The initial value of “i” is 1 (i Æ 1), and “i” is
increased by 1 each time (by “i + 1 Æ i” in the loop) until “i = n,” at which point the process escapes
the loop. Further, understand “A(i): A(i + 1)” to mean that both sides of this array are compared to
each other. For example, if “i = 1,” A(1) and A(2) are compared. If “i = 2,” then A(2) and A(3) are
compared. Comparing the neighboring elements and swapping them if they are out of sequence are
characteristics of the bubble sort algorithm.
0 0 0 1
0 1 0 1
1 0 0 1
1 1 1 0
If you do not recognize the logical product, you may carry out the logical operations of the answer
group and check the results.
a) b) c) d)
A B A XOR B
A AND B A AND B(NAND) A OR B (Exclusive OR)
0 0 0 1 0 0
0 1 0 1 1 1
1 0 0 1 1 1
1 1 1 0 1 0
As shown in the diagram in the question, the first instruction requires an execution time of 6 steps, but
each of the other instructions is delayed by one step, so you can consider an execution time of only
one step. Here, since six instructions are executed, the first instruction takes duration of 6 steps while
each of the other five instructions takes only duration of one step, a total of 5 steps. Hence, it takes a
total execution time of 11 steps to complete the process.
Execution time for 6 instructions = 11 (steps) × 10 (nanoseconds/step)
= 110 (nanoseconds)
You can verify the result by using the figure illustrated below.
First instruction 1 2 3 4 5 6
Second instruction 1 2 3 4 5 6
Third instruction 1 2 3 4 5 6
Fourth instruction 1 2 3 4 5 6
Fifth instruction 1 2 3 4 5 6
Sixth instruction 1 2 3 4 5 6
Number of steps
1 2 3 4 5 6 7 8 9 10 11
executed
1
Number of instructions per second =
Average instruction execution time
1
= −6
0.2× 10 (seconds/instruction)
1
= × 10 6 ( seconds/in struction)
0.2
= 5.0 × 106 (instructions/sec.)
→5.0 MIPS
If the CPU detects an interrupt, the OS stores the status of the program being executed prior to the
interrupt into PSW (Program Status Word). Then, it investigates the cause of the interrupt and
transfers control to the processing routine. Another interrupt may also occur during an interrupt
processing, so multiple interrupts are controlled by assigning each processing priority, depending on
the type of interrupt.
Clock mechanism Expiration of specific time (Interval timer), specific time stamp
interrupt
(Timer interrupt)
I/O interrupt I/O completed, I/O unit status change (printer out of paper,
etc.)
External signal interrupt Due to instructions from the system console or external
signals
Internal Program interrupt Overflow, invalid instruction code (undefined instruction
interrupt (exceptional interrupt) code), divide-by-zero (operation exception), memory
protection exception
Interruption for calling I/O operation request, task switching, page fault, calling the
control program control program function (supervisor call: SVC)
(instruction interrupt)
The answers a), c), and d) in the answer group are classified as internal interrupts.
Type Characteristics
CD-ROM CD-Read Only Memory
CD-R CD-Recordable: writing only
CD-RW CD-Rewritable: after complete erasure, re-writing is allowed
a) Disc at once (DAO) is a way of writing on CD-R and CD-RW. It can write data on the entire disc
all at once. No additional writing is allowed.
b) Track at once (TAO) is a way of writing on CD-R. It can write data in track units. After data is
written, additional writing is allowed.
c) Packet writing is a way of writing on CD-R. Whereas the writing unit for normal CD-R and
CD-RW is a track, this method divides data into smaller blocks for writing. Since writing is done
in smaller units, CD-R can be used in the same manner as a floppy disk or MO.
d) Multi-session is a way of writing on CD-R and CD-RW. It can write data in multiple sessions. To
write using multi-session, the CD-R drive must support writing by the TAO method. A session is
an area in which multiple tracks are joined together.
The reasons that the other options in the answer group are not correct are as follows:
a) Audio and video require high-speed transfer, but USB 1.1 connects relatively low speed devices.
Daisy chain is applied to SCSI. Connection in a tree topology without a host PC and corresponds to
10BASE-T.
c) This is an explanation of RS-232C.
d) This is an explanation of SCSI.
The TFT (Thin Film Transistor) method is one in which the screen dots are controlled by thin film
transistor (TFT). It has superior contrast, grayscale, and response speed. The STN (Super Twisted
Nematic) method has a simple structure, so the manufacturing costs are low; however, its display
quality is inferior to the quality of TFT. The DSTN (Dual-scan Super Twisted Nematic) method is an
upgrade of STN with a higher response speed.
The following table shows a relative comparison between LCDs and OLEDs. A circle means the
superior one.
Power Manufacturing
Thinness Large panel Field of view Life
consumption costs
LCD ○ ○
About the same
OLED ○ ○ ○
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
High I/O 5 5
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
High I/O 5 5
Mid I/O 6 5
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
CPU High-3 Mid-2 Low-1 High-2 Mid-2 Low-2 High-2 Mid-2 Low-1
High I/O 5 5
Mid I/O 6 5
Low I/O 5 4
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
High I/O 5 5
Mid I/O 6 5
Low I/O 5 4
Hence, in the time scale shown in the chart, the CPU idle time is 2 milliseconds between 6 and 8, 1
millisecond between 10 and 11, and 1 millisecond between 17 and 18; that is, a total of 4 milliseconds
is the idle time.
CPU waiting time I/O unit waiting time CPU waiting time Ending process
↓ ↓ ↓ ↓
a) “..” indicates the parent directory, which is Directory A1. The next part “\A1” points to Directory
A1 under Directory A1, but there is no such directory in this figure.
c) “A1” points to Directory A1 under the current directory B1, but there is no such directory in this
figure.
d) “B1” points to Directory B1 under the current directory B1, but there is no such directory figure in
this figure.
In the function layer, search conditions sent from the presentation layer are assembled as the
processing conditions to access the database and sent to the data layer. Then, the response from the
data layer is manipulated to meet the request of the presentation layer and then sent to the presentation
layer.
a) Search conditions are sent to the presentation layer, and the data manipulation conditions are
assembled in the function layer.
b) Search conditions are sent to the presentation layer, and data access takes place in the data layer.
d) Data access takes place in the data layer, and data is manipulated in the function layer.
CPU
Main
memory Auxiliary memory
CPU
In this formula, the probability that every subsystem is unavailable is subtracted from the whole
(probability 1).
We substitute p = 0.7 (70%) into the equation for availability and calculate the availability of this
n-subsystem parallel configuration (call it A).
A = 1 − (1 − 0.7)n
= 1 − 0.3n
We want the availability A to be at least 99% (0.99), so the following inequality holds.
1 − 0.3n > 0.99
1 − 0.99 > 0.3n
0.01 > 0.3n
∴ 0.3n < 0.01
This inequality involves an exponential function, so it takes a long time to calculate it by hand.
Therefore, plug in integers, starting at n = 2, and see if the condition is satisfied.
n = 2: 0.32 = 0.09 > 0.01
n = 3: 0.33 = 0.027 > 0.01
n = 4: 0.34 = 0.0081 < 0.01
Hence, when n = 4, the inequality 0.3n < 0.01 holds. As a result, at least 4 subsystems are required.
External design
Internal design
Program design
Programming
Testing
Installation, operation
→ → → → → →
The external design is the system design without regard to a computer. It involves the definition and
deployment of subsystems, designs of the screen and reports, code design, and logical data design.
Then, an external design documents are prepared.
b) This is a design technology focusing on the data structure. The Jackson method and the Warnier
method take this approach.
c) This explains emulation.
d) This is generally done in systems development and is not an explanation of reverse engineering.
In addition, white box testing has various techniques such as instruction coverage, decision condition
coverage (branch coverage), condition coverage (branch condition coverage), decision
condition/condition coverage, and multiple condition coverage. Thus, the answer is (d).
(a) is an explanation of bottom up testing, (b) is top down testing, and (c) is black- box testing.
Data : 7 3 9 4
× × × ×
Weight : 1 2 3 4
=
Sum : 7 + 6 + 27 + 16 = 56
[Step 2] Divide the sum by the base (11) and find the remainder as follows:
56 ÷ 11 = 5 remainder 1
[Step 3] Subtract the remainder from the base (11). The digit in the resulting one's place is the check
digit as follows:
11 − 1 = 10
Check digit
Hence, the result of appending the check digit to the given data is 73940.
b) Both of these test cases turn out to be “true,” so we do not have two different results: true and
false.
A B A OR B
F T T
0 1 1
T F T
1 0 1
c) Two sets of test data are prepared: a true case and a false case. These can be used for branch
coverage.
A B A OR B
F F F
0 0 0
T T T
1 1 1
d) All three sets of data give true cases, so we do not have two different results: true and false.
A B A OR B
F T T
0 1 1
T F T
1 0 1
T T T
1 1 1
Function Explanation
The number of points determined by means of the type and complexity
External input
degree of the external input
The number of points determined by means of the type and complexity
External output
degree of the external output
The number of points determined by means of the type and complexity
External inquiry
degree of the external inquiry
The number of points determined by means of the type and complexity
Internal logic file
degree of the file accompanying access
The number of points determined by means of the type and complexity
External interface file
degree of interface linked to another system
Unit processed
XXXXXX ○
Check digit
Original data
The check digit is obtained by performing a certain operation to the original data. When the data is
entered, the entire unit including the check digit is entered. The computer then uses the same operation
used to create the check digit to verify the check digit entered. If the calculated check digit matches
the check digit entered, the input is determined to be valid.
Check digits are generally used to check codes. If the original code has 5 digits, a check digit is
appended, and the data is processed as 6-digit code.
b) This is an explanation of the array function for codes. If customer codes are assigned in
consecutive numbers, the customers can be listed in the order in which they were entered.
c) This is an explanation of the identification function for codes. For example, if customer codes
are given like “MINATO-011,” then it is immediately obvious that the customer is in
“MINATO.” Another example may be a product code “TV-001,” which immediately identifies
the product as a television.
d) This is an explanation of the classification function for codes. For example, if customer codes are
of the form “1-100,” where the leading digit is a region code, the data can be geographically
classified.
Graphs (a) and (d) are the opposite of a diminishing charge system since the rate of increase of the
usage charge increases as well.
Graph (b) cannot be right because the rate of increase goes down in a diminishing charge system; the
charge does not become constant.
As a result, this parity check can detect and correct up to 1 bit error.
Hence, the number of messages that can be sent per second is as follows:
The number of messages that can be sent per 1
second = Transmission time for one message
144
= (messages)
9
The number of messages that can be sent per minute is as follows:
The number of messages that can be sent per minute
= The number of messages that can be sent per second × 60
144
= × 60 = 960 (messages)
9
However, the usage ratio of the line is 80%, so the effective number of messages that can be sent per
minute is: 960×0.8=768 (messages).
= 1,200
2
= 600(bytes/sec)
Each byte is 8 bits, so the number of bits transferred per second is as follows:
The number of bits transferred per second = 600 × 8
= 4,800 (bits/sec)
(2) Calculation of the line usage ratio
The communication speed is 64,000 bits/sec and the amount of data transferred is 4,800 bits/sec, the
line utilization rate is calculated as follows:
Line utilization rate = 4,800 (bits/sec) × 100
64,000 (bits/sec)
48
= 640 × 100
= 0.075 × 100
→ 7.5 (%)
A B C D E F
A B C D E B F
This SQL statement calculates the difference (sales price – purchase price) for each of the products in
the Product table and extracts the rows where the value is 400 or more. When this SQL is executed,
two rows are extracted as shown in the following table.
Sales price –
Product code Product name Sales price Purchase price Extraction result
Purchase price
S001 T2003 1500 1000 500 Extracted
S003 S2003 2000 1700 300
S005 R2003 1400 800 600 Extracted
a) When the sales price of model R2003 is updated to 1300, (sales price – purchase price) becomes as
follows:
(sales price – purchase price) = 1300 – 800 = 500 >= 400
This was already extracted before the change and will be extracted after the change, so the number
of rows extracted will not change.
b) When the purchase price of model R2003 is updated to 900, (sales price – purchase price) becomes
as follows:
(sales price – purchase price) = 1400 – 900 = 500 >= 400
This was already extracted before the change and will be extracted after the change, so the number
of rows extracted will not change.
c) When the purchase price of model S2003 is updated to 1500, (sales price – purchase price)
becomes as follows:
(sales price – purchase price) = 2000 – 1500 = 500 >= 400
This was not extracted before the change and will be extracted after the change, so the number of
rows extracted will increase.
d) When the sales price of model T2003 is updated to 1300, (sales price – purchase price) becomes as
follows:
(sales price – purchase price) = 1300 – 1000 = 300 < 400
This was extracted before the change but will not be extracted after the change, so the number of
rows extracted will decrease.
ISO 9001 was revised in December 2000; requirements that had been distributed before were
organized into four categories as follows:
Management responsibility
Resource management
Product realization
Measurement, analysis, and improvement
It is characterized by items such as the concept of quality management systems and its continuous
improvement.
d) ISO 14001 is the international standard established by ISO so that corporations and organizations
can carry on business activities while taking the global environment into consideration. It certifies
the results of the organization's environment management, such as human resource development
and system establishment, to reduce the burden on the environment
ISO 14001 is a standard for certification; third-party organizations (certification bodies) registered
with the government are performing the assessment.
(2) Since x = 1000 and y = 60000, substitute these into the equation [2], and we get the following:
60000 = 1000 × a − 3000a
=1000a − 3000a
= −2000a
60000
∴ a = − = −30
2000
Hence, we can now find b as follows:
b = −3000a
= −3000 × (−30)
= 90000
Thus, the equation [1] is changed as follows:
y = −30x + 90000 ……[3]
(3) Substitute x = 1500 into the equation [3] to find the expected demand.
y = −30 × 1500 + 90000
= −45000 + 90000
= 45000 (units)
9000
8000
7000
6000
5000
Break-even point→
4000
3000
2000
1000
Fixed costs line
0
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 11000 12000
(1) Draw the fixed costs line.
The fixed costs are constant ($1,000), so this is a line parallel to the x-axis.
Fixed cost line: y = 1,000
(2) Calculate the variable costs.
Variable costs are costs that are directly proportional to the quantity sold. If the variable costs are
y and the total sales are x, we have the following equation:
Variable costs: y = α x (α is the constant of proportionality.) ……(A)
From the table given in the question, we see that when x (total sales) is $10,000, y (variable costs)
is $8,000. Substituting these values into the equation (A), we can get the result as follows:
8,000 = α × 10,000. ∴ α = 8,000 ÷ 10,000 = 0.8
(3) Draw the total costs line.
The total costs are the sum of the variable costs and fixed costs. The total costs line is then
obtained by adding the expressions of (1) and (2) above.
Variable costs line (total costs line): y = 0.8x + 1,000 ……(B)
(4) Draw the total sales line.
Draw the total sales line so that the line can make a 45-degree angle with the x-axis.
Total sales line: y = x ……(C)
The Delphi method takes advantage of the feedback characteristic. In this method, opinions of a large
sample of people are collected and analyzed through questionnaires, and the results of the survey are
summarized, shown to the respondents, and then the survey process is repeated. This method has many
advantages. First, as it employs an intuitive method, it is effective when applied to discontinuous
changes of technology. It can also help avoid being influenced by the group dynamics that tend to
come from regular face-to-face meeting, etc. In addition, when a comment collected from the survey is
different from the majority’s opinion, invaluable new ideas can be obtained from reasons added by the
respondent. Hence, the setting for questions to ask is an important key to success of this method.
a) Cause analysis is to pick out and analyze the root causes of problems found in operations and
systems. There is no particular set method for this, but at least in this case, it does not repeat the
same survey as in the Delphi method.
b) A segment is a unit that has been minutely partitioned. A segment of cell phone service users may
be defined by classification according to gender or age group. In segment analysis, the frequency
of service use is studied for each of the finely segmented classes. For example, the analysis may
survey all cell phone service users based on their age as shown below:
c) Analysis of population dynamics is the study of population change from various perspectives. For
instance, it may study the number of childbirths and number of deaths. In this case, it will be
time-series analysis, so the survey is not repeated to the same subjects as in the Delphi method.
Center (average)
Abnormal value
a) A network diagram with arrows connecting individual activities and indicating their order
relationships is also known as an arrow diagram. Process bottlenecks are identified by analyzing
the activities along a critical path.
b) ABC analysis is suitable here.
d) Cause and effect diagram (or fishbone diagram) can be used.
a) This year's score being 0 means y = 0. Then, the value of x (last year's score) is as follows:
0 = 1.1x+10
1.1x = −10
∴ x = −9.090…
≅ -9.1 (rounded to the nearest tenth).
Hence, the last year's score is -9.1, not 10
b) The average score needs to be calculated by adding individual scores. For instance, if the last
year's average is 50, i.e., x = 50, then we can see the relationship between x and y as follows:
y = 1.1 × 50 + 10
= 65
y 65
∴ = = 1.3
x 50
Regardless of the individual scores, the average score is not 1.1 times the score last year.
c) As seen under (b) above, the person who scored 50 last year would have scored 65 this year.
Hence, we can conclude that points were easier to earn on this year's exam than on last year's.
d) The analysis is only about the scores, and we cannot evaluate the contents of the examinations.
Further, the statement that “this year's exam scores were good” does not necessarily mean that
points were easier to earn.
b) The least squares method is used to estimate the relation correlation between two quantities. For
instance, if there is a fact that those who score high in mathematics also score high in science,
then science and mathematics test scores are plotted in a scatter diagram, with many sample
points. From the scatter diagram, one can obtain a relational expression between the scores of
mathematics and science. Once the equation is found, when you know the score of one test,
either mathematics or science, you can predict the other score.
d) The fixed order quantity system is a method of ordering in which the quantity to be ordered
remains constant but the time of ordering varies depending on the fluctuation of the demand. It
is the idea of letting the fluctuation of the demand be absorbed in the fluctuation of ordering
intervals. An order is placed when the inventory goes down below a certain level, so it is also
called the order point method.