Itpec Ip 2020 Q2
Itpec Ip 2020 Q2
T College
2020 Q2
1. Which of the following is the binary number that is obtained by adding the
binary
numbers 01011010 and 01101011? Here, the binary numbers are expressed as
positive 8-bit values.
a) 00110001
b) 01111011
c) 10000100
d) 11000101
2. Which of the following is the binary result of the multiplication of binary 1011
and binary 101?
a) 1111
b) 10000
c) 101111
d) 110111
3. Which of the following is the logical operation that is equivalent to the truth
table below?
a) AND
b) NOT
c) OR
d) XOR
1|Page
ITPEC IP M.S.T College
4. Which of the following is the result from the bit-wise logical product of an 8-bit
binary data X and 00001111? Here, the left side of the data is the high-order,
and the right side is the low-order.
a) All of the low-order four (4) bits are 0, and the high-order four (4) bits
are
the same as those of X.
b) All of the low-order four (4) bits are 1, and the high-order four (4) bits
are
the same as those of X.
c) All of the high-order four (4) bits are 0, and the low-order four (4) bits
are
the same as those of X.
d) All of the high-order four (4) bits are 1, and the low-order four (4) bits
are
the same as those of X.
5. As shown in Figure 1, there is a box that generates two (2) numerical values B1
and B2 when two (2) positive integers A1 and A2 are entered. B1 has the same
value as A2, and B2 is the remainder of A1 divided by A2. As shown in Figure
2, when two (2) boxes are connected, and 49 is entered as A1 and 11 is entered
as A2 in the left box, what is the value of B2 generated from the right box?
a) 1
b) 2
c) 4
d) 5
2|Page
ITPEC IP M.S.T College
8. There is a series of numbered boxes stacked as shown in the figure below. The
operations described in the table below are performed in the sequence of
operations 1 through 4. When the operation 4 is completed, which of the
following shows the statusof the stacked boxes?
3|Page
ITPEC IP M.S.T College
a)
b)
c)
d)
4|Page
ITPEC IP M.S.T College
10.Which of the following storage units has the shortest access time?
a) HDD
b) SSD
c) Cache memory
d) Main memory
11.Which of the following lists all and only the appropriate descriptions about a
32-bit CPU and a 64-bit CPU?
I When a 32-bit CPU and a 64-bit CPU are compared, a 64-bit CPU has a larger
theoretical maximum memory space.
III In terms of the read and write speed of a USB memory, the speed of a PC
with a 64-
bit CPU is twice as fast as that of a PC with a 32-bit CPU.
a) I
b) I, II
c) II, III
d) III
a) Two (2) types of OS are installed on a single PC, and the PC is configured so
that either OS can be booted.
b) Two (2) displays are connected to a single PC in order to have a single
continuous wide display area across the two (2) displays.
c) Two (2) strips of memory with the same standard and capacity are combined,
and the effective speed of data transfer is increased by accessing each strip
concurrently.
d) The integrated circuits of two (2) processors are implemented on a single LSI
package, and the two (2) processors can execute separate instructions
concurrently.
5|Page
ITPEC IP M.S.T College
a) Compiler
b) Device driver
c) Plug and play
d) Hot plug
14.Among the methods I through III for logically handling multiple hard disks as
one (1),which of the following lists all and only those methods that can recover
data even if one of the constituent hard disks fails?
I RAID5
II Striping
III Mirroring
a) I, II
b) I, II, III
c) I, III
d) II, III
15.There is a system where two units of the same device with availability of 0.9 are
connected in series. When one (1) more unit of the same device is added so that
three (3) units of the device are connected in series in the system, which of the
following is the appropriate description of the availability of the entire system,
when the system with two units of the device in series is a reference point?
a) It increases by 10%.
b) It remains unchanged.
c) It decreases by 10%.
d) It decreases by 30%
16.Which of the following is the most appropriate explanation of TCO (Total Cost
of Ownership) that is a major factor when any purchasing decision is made for a
system?
a) It is the sum of the operation and management costs incurred after the
installation of the system.
6|Page
ITPEC IP M.S.T College
17.When directories d1 and d2 are placed on a web server as shown in the figure,
which of the following descriptions specifies the referencing of the webpage file
f2.html on directory d2 from the webpage file f1.html on directory d1 (current
directory)? Here, the reference method of files is as follows.
[Reference method]
(1) A file is referenced as “directory name /.../ directory name / file name”,
where the directory names on the path are listed and separated with “ / ” in
sequence, followed by a “ / ” and the file name.
(2) The current directory is represented by “.”.
(3) The directory one (1) level above is represented by “..”.
(4) When a reference begins with a “ / ”, it is assumed that the root directory is
omitted from the beginning of the reference.
a) ./d2/f2.html
b) ./f2.html
c) ../d2/f2.html
d) d2/../f2.html
7|Page
ITPEC IP M.S.T College
18.Sales data by month for each branch is evaluated. In the “Evaluation” field for
each branch by month, if the amount of sales at the branch is below the average
sales amount of branches A through C for the month, the symbol “X” is to be
displayed, and if the amount is above or equal to the average, the symbol “O” is
to be displayed. Which of the following is an appropriate expression to be
entered in cell C3? Here, the expression that is entered in cell C3 is copied and
used in cell D3, cell E3, cells C5 through E5, and cells C7 through E7.
a) Virtual reality
b) Dual core
c) Dual system
d) Multitasking
8|Page
ITPEC IP M.S.T College
21.Which of the following is a term that means the validation of a software license
by using the product ID and the user’s hardware information, in order to prevent
unauthorized use of the software?
a) Activation
b) Cloud computing
c) Streaming
d) Fragmentation
a) Android
b) Firefox
c) MySQL
d) Thunderbird
24.Which of the following is the appropriate reason for using a style sheet in the
creation of a website?
a) The data between the web server and the web browser can be exchanged in a
safe manner.
b) The users can be notified of update to the website.
9|Page
ITPEC IP M.S.T College
25.Which of the following is a technique that can be used to compress both video
and audio data?
a) BMP
b) GIF
c) JPEG
d) MPEG
a) 1
b) 2
c) 3
d) 4
10 | P a g e
ITPEC IP M.S.T College
efficiency
d) Losslessly compressing data in order to improve access efficiency
28.Which of the following is a language used for the operation of a relational
database?
a) FAQ
b) SQL
c) SSL
d) UML
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating
process
d) Canceling the updating process to permit the new user to view the last record
11 | P a g e
ITPEC IP M.S.T College
a) Router
b) Firewall
c) DHCP server
d) Proxy server
33.Which of the following mobile communication systems not only offers higher
communication speed than LTE, but also allows more devices to connect and
has less communication delay?
a) Block chain
b) MVNO
c) 8K
12 | P a g e
ITPEC IP M.S.T College
d) 5G
34.A DHCP server has been installed in a LAN. When a PC that automatically
acquires information from the DHCP server is to be connected to the LAN,
which of the following will be set in the PC?
a) IP address
b) Latest virus definition file
c) Address list of spam mail
d) Mail addresses assigned by the Internet service provider
13 | P a g e
ITPEC IP M.S.T College
37.When the evaluation values of asset value, threat, and vulnerability of assets A
through D are as shown in the table, which of the following assets will be
evaluated as the asset where risk measures should be taken at the highest
priority? Here, the risk value is calculated by multiplying each three evaluation
values together in the table without weighting.
38.It is reported that WEP suffers from the problem that ciphers are decoded in a
short time. Which of the following is a wireless LAN encryption method for
increasing the strength of encryption?
a) ESSID
b) HTTPS
c) S/MIME
d) WPA2
39.Mr. A sent an e-mail to Mr. B that was encrypted with Mr. B’s key by using the
public key cryptosystem, and this e-mail contains details that Mr. A wants to
send only to Mr. B. Which of the following keys is needed to decrypt this e-
mail?
40.Among the descriptions from A through C, which of the following is the list that
contains all appropriate features of VPN?
A Devices can communicate with each other by using a VPN wirelessly without
passing through any access point.
14 | P a g e
ITPEC IP M.S.T College
B A VPN uses a public network, etc., but it can be used like a private network
of one’s own company.
a) A
b) A, C
c) B
d) C
42.When information security measures are classified into three (3) measures,
namely, technology measures, personnel measures, and physical measures,
which of the following is the appropriate example of physical measures?
a) Infection may affect not only the OS and applications, but also the firmware
embedded in a device.
b) If only an external storage medium is used for exchanging data with other
computers without connecting a computer to the network, the computer will
not be infected.
c) The computer where infection is detected should be kept connected to the
network, and the OS and the security software should be immediately
updated.
d) If e-mail attachments are not opened, the computer will not be infected.
a) Using a 64-bit OS
b) Maintaining the latest version of the virus definition file at all times
c) Defragmenting the hard disk periodically
d) Saving files after compressing them
16 | P a g e
ITPEC IP M.S.T College
a) Joint review
b) Integration test
c) Simulation
d) Progress meeting
c) Conducting an acceptance test for a new system for which development was
outsourced to a vendor
d) Modifying the program of a system that is in operation in order to make the
system conform to law revisions
51.In an arrow diagram that shows system development, if processes A and D are
delayed for three (3) days in total, what is the delay in the entire project?
18 | P a g e
ITPEC IP M.S.T College
a) Budget at planning
b) Return on investment
c) Delivery date
d) Number of identified bugs
54.Which of the following is a method to break down the required activities into a
hierarchy structure in software development?
a) CMM
b) ITIL
c) PERT
d) WBS
56.Which of the following is the most appropriate case where project management
methods are applied?
19 | P a g e
ITPEC IP M.S.T College
59.When a user enters a query in the input area on the web, which of the following
is the most appropriate mechanism for a system to efficiently and promptly
respond to the query in an interactive and automated manner?
a) Recommendation
b) Chatbot
c) Escalation
d) FAQs
60.When service desk, reliability, and data management are among the items of an
SLA of an application hosting and operation service, which of the following is
the appropriate combination of the specific indexes A through C of the service
level, and the items of the SLA?
20 | P a g e
ITPEC IP M.S.T College
61.In a certain IT service, four (4) priority levels are set for system changes:
urgent, high, medium, and low. Among the proposed changes, which of the
following is the change that should be classified as “urgent”? Here, system
changes are released regularly at the end of each month.
21 | P a g e
ITPEC IP M.S.T College
a) Service catalog
b) Service document
c) Service level agreement
d) Service level requirements
63.Which of the following is the most appropriate regulation for developing and
implementing an information systems strategy for improving the
competitiveness of a company?
a) IT governance
b) Compliance
c) Systems audit
d) Project management
22 | P a g e
ITPEC IP M.S.T College
A Complying with the laws concerning business activities, and promoting the
business activities conforming to social norms is one of the objectives of
internal
control.
B While complying with the laws concerning business activities is one of the
objectives of internal control, promotion of business activities conforming to
social norms is not required.
C The concept of internal control is effective in non-listed companies too, and it
is necessary to work on it.
D The concept of internal control is necessary only in listed companies.
65.The activities of a systems audit are divided into the processes of drafting of an
audit plan, acquisition and evaluation of audit evidence, implementation of audit
procedures, creation of an audit report, and follow up. Which of the following
processes gives guidance to auditee on the implementation of appropriate
actions for improvement?
66.If risk assessment is divided into three (3) processes, which of the following is
the third process besides risk identification and risk evaluation?
a) Risk transfer
b) Risk avoidance
c) Risk mitigation
d) Risk analysis
67.The table below is a part of the ingredients table of a steamed meat dumplings
lunch box. How many grams of meat is necessary to prepare 100 steamed meat
dumplings lunch boxes? Here, the steamed meat dumplings lunch boxes do not
23 | P a g e
ITPEC IP M.S.T College
contain any dish that uses meat other than the steamed meat dumplings, and
there is no loss of ingredients in the preparing process.
24 | P a g e
ITPEC IP M.S.T College
a) Providing customers with value that the competitors cannot provide on the
basis of the unique skills and technologies of the company
b) Bringing about competitive superiority by implicating the quality image of
products and services from the company name, etc.
c) Gaining stakeholders’ empathy by announcing the basic concept of universal
values of the company and corporate activities to the society by management
executives and companies
d) Selling unique brands of products with low-price that are developed and
produced in association with manufacturers on the basis of the leadership of
distributors
70.The operating profit when the sales quantity of a product is 700 units is as
shown in the table below. When the unit sales price is reduced by 20% to
expand sales, the sales quantity increases by 20%. How much, in yen, is the
operating profit at this time? Here, the variable cost per one (1) unit of the
product does not change.
a) Rules that define the management organization and ladder that are the
foundation of the company
b) Rules that define the work content, responsibilities, and authority of each
department and each employee
c) Rules that define employees' working conditions and other matters related to
employment
25 | P a g e
ITPEC IP M.S.T College
d) Rules that define proper conduct in terms of laws, regulations, and social
norms
72.Which of the following has a negative correlation between temperature and total
sales?
73.Mr. X stores the images taken by a digital camera in a storage medium, inserts
the
storage medium in a printer, and performs printing. It is possible to print the
images without taking into consideration the manufacturer of the digital camera.
Which of the following is the technical premise concerning image data that
enables this?
a) Commoditization
b) Networking
c) Standardization
d) Ubiquity
26 | P a g e
ITPEC IP M.S.T College
a) Use of displays that reduce eye fatigue from blue LED light
b) Installation of air shower at the server room entrance and exit
c) Construction of backup systems in preparation for disasters
d) Setting a policy of viewing materials on PC screens, limiting their printing
on paper
27 | P a g e
ITPEC IP M.S.T College
a) Information is read in the horizontal direction only, in the same way as the
one dimensional bar code.
b) Scanning errors can be detected in both horizontal and vertical directions,
but cannot be corrected.
c) When the area is equivalent in size to the one-dimensional bar code, more
information can be recorded.
d) Since a matrix code has information in both horizontal and vertical
directions, its allowable reading angle is narrow.
81.Which of the following is a marketing technique that seeks to analyze the needs
of each individual person and provide products and services that fulfill those
needs?
28 | P a g e
ITPEC IP M.S.T College
a) Social marketing
b) Telemarketing
c) Mass marketing
d) One-to-one marketing
a) The source of profit is the choise of an area with little competition and the
entry
into the area before competitors.
b) The source of profit is the construction and maintenance of a good
relationship with the customer.
c) The source of profit is the reduction of the product life cycle time.
d) The source of profit is the obtaining of a large share in a specific market.
83.In Company X, the experience and know-how of employees who have managed
drainage treatment in the facility over a long period of time is documented and
accumulated, and the accumulated experience and know-how is utilized on
daily
drainage treatment activities and design of new processing equipment. Which of
the following is appropriate as a concept of this example?
a) ERP
b) SFA
c) Supply chain management
d) Knowledge management
a) Regression analysis
b) Cluster analysis
c) Access log analysis
d) Value chain analysis
29 | P a g e
ITPEC IP M.S.T College
85.Among the descriptions I through III shown below, which of the following lists
all and only the appropriate characteristics of a technology road map that is used
in technology development on the basis of a technological strategy?
a) VR
b) ER
c) EC
d) AI
88.Which of the following is the most appropriate example of sales strategy that is
based on long tail?
30 | P a g e
ITPEC IP M.S.T College
a) Selectively stocking only the strong selling products, and advertising about
such products on the website over a long duration
b) Advertising on the website that buyers queue up for the product in long lines
in several stores, and selling the product only for a limited period
c) Asking celebrities to post product advertisements on their blogs under the
condition of returning them a part of sales revenue, and receiving orders
from the blog subscribers over a long duration
d) Enhancing the lineup of products with less sales opportunities, and posting
about such products on the website for their sales
89.Which of the following is a general term for techniques or methods for trying to
make the homepage of one’s own company to be displayed at a higher rank in
the search results of a search engine on the Internet?
a) DNS
b) RSS
c) SEO
d) SNS
31 | P a g e
ITPEC IP M.S.T College
92.Which of the following is the system that is housed in home electric appliances,
such as rice cookers and air conditioners, and is used to implement the specific
functions of such appliances?
a) Expert system
b) Enterprise system
c) Embedded system
d) Simplex system
93.Which of the following is the most appropriate term for information in large
quantities and in diverse forms that has real-timeness and is expected to help
obtain knowledge useful for decision-making?
a) Big data
b) Diversity
c) Core competence
d) Crowdfunding
a) Gap analysis
b) Core competence analysis
c) Value chain analysis
d) Pareto analysis
goals
c) Collecting from users their evaluation information concerning new network
games
d) Analyzing large volume of data to detect useful facts and relationships
33 | P a g e
ITPEC IP M.S.T College
a) An ideal state of the system is depicted by the project members on the basis
of the policy on sales activities, and is submitted to the person in charge of
sales planning.
b) Business needs are heard from the sales manager and sales persons, are
organized and summarized by the project members, and are agreed by the
sales manager.
c) The current workflow of sales activities is documented by the project
members as an business requirement and is reported to the sales persons.
d) Business requirements are listed by the project members through
brainstorming and are approved by the project manager.
a) Only the fact and details of the error, rather than the way of handling the
error, should be displayed.
34 | P a g e
ITPEC IP M.S.T College
b) Only the information that system developers need to identify the cause of the
error
should be displayed.
c) The error message should be as short as possible, and the abbreviation and
error code should be displayed as they are.
d) The action to be taken by a user should be displayed briefly and precisely
with the error message
35 | P a g e