Itpec Ip 2021 Q2
Itpec Ip 2021 Q2
T College
2021 Q2
1. A search is performed by specifying a character string comprised of multiple
alphabetic characters and one delimiter character “.” (period). An “*” (asterisk)
represents anarbitrary character string with zero or more characters, and a “?”
(question mark) represents an arbitrary single character. Which of the following
character strings matches the character string represented below?
X*.Y??
a) XY.XYY
b) XXX.YY
c) XYX.YXY
d) YXYX.YXY
2. Which of the following is a search condition for the black area of the Venn diagram
shown below?
3. Which of the following is obtained by multiplying the binary value 10110 by three
(3)?
a) 111010 b) 111110
c) 1000010 d) 10110000
1|Page
ITPEC IP M.S.T College
5. There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the
program display the underlined character string? Here, the first character of the
original text is displayed in 10 points.
[Specifications]
The characters between <B> and </B> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <B> </B> and <S> </S> must be used as a pair, and both of them can be
nested with each other.
[Original text]
The system administrator promotes and implements <B>department-level<B>
or <S>group-level</S> computerization</B> from a user’s <S>standpoint</S>.</B>
a) 10 b) 11 c) 12 d) 13
7. A stack is a first-in last-out data structure. By using the stack, a device changes the
order of data received from the right side and sends it to the left side, as shown in the
2|Page
ITPEC IP M.S.T College
figure below. There are three types of operations available on the device, as described
below.
(1) Data received from the right side is sent to the left side without any alteration.
(2) Data received from the right side is pushed into the top of the stack.
(3) Data popped out of the top of the stack is sent to the left side.
When the device receives X, Y, and Z in this order from the right side, which of the
following is the order in which the device cannot send them to the left side even if the
operations (1) to (3) are combined?
a) X, Z, Y b) Y, Z, X
c) Z, X, Y d) Z, Y, X
8. Among the items A through C described below about programming languages, which
of the following is the list that contains all of the appropriate items?
a) A b) B c) D d) E
10. Which of the following is the most appropriate description concerning a multi-core
processor?
3|Page
ITPEC IP M.S.T College
a) Several microprocessors are installed in one PC with the purpose of improving the
reliability of the processing results by performing the same processing at the same
time in each processor.
b) If the structure and clock frequency of the arithmetic logical unit are the same, a
quad core processor has four times as much processing power as a dual core
processor.
c) The clock frequency is temporarily increased according to the load of the
processing so as to achieve high-speed processing.
d) A single CPU has several processing circuits that perform operations, and each
processing circuit performs different processing at the same time with the purpose
of improving the processing power.
a) It is an index that shows the throughput of a CPU in terms of how many billions of
instructions it can execute per second.
b) It is a frequency signal that synchronizes the arithmetic processing of CPUs.
c) It is a storage unit that is placed between a CPU and a main memory, and has a
higher reading and writing speed than the main storage unit.
d) It is an arithmetic logical unit that is used instead of a CPU to accelerate
processing such as image processing for 3D graphics.
a) Compared with a 64-bit CPU, a 32-bit CPU is able to process a longer data at one
time.
b) The less the capacity of cache memory in the CPU, the faster the processing speed.
c) For a CPU of a given architecture, raising the clock frequency increases processing
speed.
d) A dual core CPU can perform a greater number of processes simultaneously than a
quad core CPU can.
4|Page
ITPEC IP M.S.T College
14. When the processing speed of the system overall is constrained because of slow
processing speed in one of the components, which of the following is a term for the
component of a system that is causing the problem?
a) It provides two (2) sets of systems that perform the same processing and checks
the correctness of the processing by comparing the results. If one of the systems
fails, it isolates the failed system and continues the processing.
b) The same two (2) devices are used, so that the processing capability can be
increased to double that of a simplex system.
c) It provides a currently used system for performing online processing and also a
backup system that is made on standby while performing batch processing. In the
event of a failure in the currently used system, it switches to the backup system,
starts the online processing on it, and continues the service.
d) It connects multiple devices in series and configures them in such a way that the
load of each function is distributed among them, so that processing capability is
high. But if any one of the devices fails, it becomes unable to provide the service.
a) It is the division of a series of processing into processing units that can be executed
simultaneously, and the execution of these on multiple CPUs.
b) It is the execution of multiple related processes that are grouped together as a
single process.
c) It is the performing of business logic and database processes on the server side,
and the performing of user interface processes on the client side.
d) It is the division of processing time for a single CPU into short units, and the
sequential allocation of these to multiple applications for execution.
17. Which of the following is a purpose of the virtual memory system that is one of the
functions provided by an OS?
5|Page
ITPEC IP M.S.T College
d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory
19. Which of the following is an appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?
20. Which of the following is an appropriate description concerning the use of OSS (Open
Source Software)?
a) OSS users have an obligation to pay the developer the fee for the software.
b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.
c) OSS cannot be used in the field of genetic research.
d) Software derived from the published OSS can be made available as OSS.
6|Page
ITPEC IP M.S.T College
22. There is a system where a full backup is made after closing time every Sunday, and an
incremental backup is made after closing time on Monday through Saturday. On a
Wednesday, a failure happened during business hours, so a decision was made to
restore data to the state at the time of closing on Tuesday by using backup files.
Which of the following lists all the necessary backup files for restoring data? Here, an
incremental backup file means a backup file that contains only the data that has been
modified since the previous backup file (a full backup file or an incremental backup
file) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
23. If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of
the following can occur?
a) Viruses cannot be detected.
b) Data cannot be written correctly.
c) Data cannot be read correctly.
d) Stored data cannot be read quickly
24. Which of the following is an appropriate concept of universal design?
a) Ensuring that, once a product is designed, the design remains usable without being
changed for a long period of time
b) Ensuring that products keep the same levels of performance and quality regardless
of where they are manufactured in the world
c) Making the design as simple and easy as possible in order to reduce the
manufacturing cost
d) Making products usable to many people regardless of differences in age, culture,
and ability as well as whether disability is present
7|Page
ITPEC IP M.S.T College
a) The data to be distributed must be stored on the server beforehand, and videos of
events and sports cannot be distributed while they are being shot.
b) Deterioration in video quality due to partial loss of data in reception can be
completely eliminated.
c) Warm-up time is not required for starting playback of a video, and therefore, the
viewer can immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as
soon as some data has been received.
26. In DBMS, which of the following is a function for maintaining consistency of data by
preventing the occurrence of conflicts due to simultaneous access to the data?
8|Page
ITPEC IP M.S.T College
9|Page
ITPEC IP M.S.T College
30. Three PCs and an Internet-capable TV (television) set are to be connected to the
Internet by using a hub and a router that has a firewall function. Which of the
following is an appropriate connection that enables the firewall function of the router
to be used for all the traffic between the devices and the Internet? Here, “FW” in the
figure indicates the firewall function.
10 | P a g e
ITPEC IP M.S.T College
31. Which of the following is an appropriate effect of replacing IPv4 with IPv6?
a) Problems no longer occur when two or more devices that can be accessed directly
from the Internet have the same IP address.
b) The shortage of IP addresses that can be used on the Internet is resolved.
c) It becomes possible to use optical fibers for connecting to the Internet.
d) The communication speed on the Internet is increased.
33. Mr. A specifies the destinations for an e-mail as below and sends it. Mr. Y receives
this e-mail, and sends a reply to all the recipients and the sender listed in the received
e-mail. Among Mr. A, Mr. X, and Mr. Z, which of the following is the list that
includes all and only the destinations of the e-mail that Mr. Y sends?
11 | P a g e
ITPEC IP M.S.T College
a) A b) A, X c) A, X, Z d) X, Z
a) Authentication by drawing a line connecting some of the nine (9) dots displayed
on a screen
b) Authentication by a password and a user ID that is unique for each individual
c) Authentication by recognizing the shape of a signature, the stroke order and pen
pressure used in signing, etc. using a reader device
d) Authentication by selecting, from among multiple illustrations, a combination of
illustrations that the user memorizes
36. The authentication technology is classified into three (3) types, namely authentication
based on one’s possession, authentication based on physical characteristics, and
authentication based on one’s memory. Which of the following is an appropriate
combination of the implementation examples (1) through (3) and their classifications?
(1) Authentication using an IC card
(2) Authentication based on an ID and password
(3) Authentication based on fingerprint
12 | P a g e
ITPEC IP M.S.T College
A The re-education of one who has committed an information security breach includes
preventive actions to avoid the same fault being repeated again.
B One way to conduct it is to incorporate it in a training program for new employees.
C It is restricted to employees in the information systems department.
D It is conducted after an incident or an accident concerning information security as
well as on a regular basis.
a) A, B, D b) A, C, D c) A, D d) B, C
39. When information security measures are grouped into three (3) categories of technical
security measures, human security measures, and physical security measures, which of
the following is an appropriate example of physical security measures?
13 | P a g e
ITPEC IP M.S.T College
40. Which of the following is an authentication method where a user uses information that
differs each time and is generated with a device called a token or other such device?
42. Which of the following is a term for software that encrypts files on a computer in
order to make them unusable, and demands money or other valuables in exchange for
the decryption key?
a) Keylogger b) Ransomware
c) Rootkit d) Worm
a) A password that is used for a business system should not be used for any private
Internet services.
b) The initial password should not be changed until a user becomes familiar with the
operation of login to the system.
c) Several passwords should be prepared and used in rotation.
d) A password should be stored in a plaintext file and saved on a PC
44. Which of the following is an appropriate description concerning a scheme for
authenticating a user of a system?
14 | P a g e
ITPEC IP M.S.T College
45. When information is classified and managed according to the protection level in
information security, which of the following lists all and only the appropriate methods
for the management?
46. A system migration plan was created for the migration from an existing system to a
new system. Which of the following is an appropriate item to be described in the
system migration plan?
47. Mr. A, a participant in system testing, has no access to the internal structure of the
system or software and prepares terminal input data and form output data for major
transactions in the department for purpose of verification. Which of the following is
the testing technique that Mr. A is going to implement?
a) Inspection b) Walk-through
15 | P a g e
ITPEC IP M.S.T College
48. The processes of system development include system requirements definition, systems
architecture design, system integration testing, and software acceptance. Which of the
following is an activity that is performed in system requirements definition?
a) The party to which development is outsourced uses the software under the same
conditions as the actual production environment in order to determine if it runs
correctly.
b) A system test plan is created, and a test environment is prepared.
c) The functions and performance required of the system are clarified.
d) A program is created and test results are reviewed according to the evaluation
criteria
a) A response time that was measured in a system test did not satisfy the requirement,
so tuning was performed on the software.
b) As a result of a software acceptance test, a fault was found, so the orderer
requested the developer to fix the software.
c) A function was found missing in a unit test of a program, so the function was
added to the program.
d) A defect was reported on software that is running on a production system, so the
software was modified.
a) Object-oriented approach
b) Spiral model
c) Data oriented approach
d) Prototyping
51. Among the following lists of descriptions A through D, which is the set that contains
all appropriate descriptions concerning quality management in information systems?
16 | P a g e
ITPEC IP M.S.T College
C: The cost of preventing defects is generally less than the cost of correcting them
when they are found.
D: Quality can be increased through appropriate design and implementation.
a) A, B, D b) A, C c) A, C, D d) C, D
52. After the start of a project, the scope is defined by collecting the requirements for the
project. Which of the following is the most appropriate purpose of defining the scope?
53. When the system development activities are implemented, a plan is set up to complete
the activities in 20 days by six (6) members having the same productivity. However,
the plan is changed to have the activities finished in 15 days, and new members are
added. When the productivity of the new members is half of the initially planned
members, what is the minimum number of new members necessary for finishing the
activities in 15 days?
a) 1 b) 2
c) 4 d) 6
54. The response measure for risks in a project can be classified as avoidance, mitigation,
acceptance, and transfer. In a system development project, the design and
development process is to be subcontracted to Company A. In a previous system
development, Company A suffered a delay for delivery, so it is also possible that a
delay will occur in this project. Which of the following is a response measure that
corresponds to mitigation of the risk of a delay?
55. In a project where 60 programs are created with a budget of 18 million yen, when the
status of the project was checked 20 days after the start of the project, it was found
that 40 out of the 60 programs have been completed at a cost of 15 million yen. If the
project continues to proceed at the same pace, what is the excess of cost over budget?
Here, the scale of all programs and productivity are the same.
17 | P a g e
ITPEC IP M.S.T College
56. When the management of a project is divided into progress management, quality
management, and cost management, which of the following is most appropriate to be
confirmed in progress management?
57. In an activity that is performed in the planning phase of a project, which of the
following is a method that identifies all of the activities that need to be performed in
the project and organizes them in a hierarchical structure, as well as clarifying the
work units to be managed in the project?
a) CRM
b) ERP
c) PPM
d) WBS
59. In release management of IT service management, the items which have been planned
and approved according to the change management are implemented in the production
environment. Which of the following is an appropriate description concerning release
management?
18 | P a g e
ITPEC IP M.S.T College
a) Information may be provided after the completion of release to users and operation
managers concerned with changes.
b) During release planning, cases when activities cannot be completed within the
planned time period are also taken into account.
c) Since there is no possibility of new failures after release, it is not necessary to
make preparations.
d) Regardless of the scale of release, the release is implemented simultaneously for
all users.
60. Which of the following is the most appropriate explanation of what a service desk
implements?
a) It eliminates the root cause of an incident and prevents the recurrence of the
incident.
b) It installs updated software in order to prevent the recurrence of an incident.
c) It performs centralized management of changes in a service.
d) It receives and records inquiries from users.
61. In order to provide a service that meets customer needs, which of the following is an
appropriate approach in which an organization performs maintenance, management,
and continuous improvement for operation of an information system?
62. In service level management concerning the degree of customer satisfaction with a
service desk, which of the following is an action that falls under the “A” of the PDCA
cycle?
19 | P a g e
ITPEC IP M.S.T College
63. Which of the following is the term for the assignment of employees’ role that applies
mutual restraint among employees for the purpose of reducing the risk of misconduct
or errors in work from the standpoint of internal control?
64. During a systems audit, systems auditors who are independent of the audit target
inspect and evaluate the information systems comprehensively from an objective
viewpoint. As a result of the systems audit requested by the management of a
company, some problems are found in the effectiveness of the current information
systems. Who are the most appropriate persons to whom the systems auditor gives
advice and makes recommendations?
a) Avoiding creating a job description indicating the scope of work and roles
b) Avoiding creating a work handover document for a successor
c) Avoiding processing purchasing and payment by the same person
d) Avoiding separating team members for system development and system operation
66. A person wishes to start at point X, pass through all of points A, B, and C, and arrive at
point Y. When the routes and the required times between points are as shown in the
figure and the table, what is the shortest time in minutes from point X to point Y?
Here, the points A, B, and C may be passed through in any order.
20 | P a g e
ITPEC IP M.S.T College
67. Which of the following examples of capacity building and guidance for subordinates
is classified as OJT?
a) A company made subordinates set career goals and make plans for achieving them.
b) With subordinates' careers in mind, a company made subordinates attend a
manager development course hosted by the Personnel Department.
c) A company made subordinates take part in a new development project to improve
their design capabilities.
d) A company selected an externally hosted seminar matched to subordinates' fields
of expertise and careers, and made the subordinates attend it.
a) CIO
b) CTO
c) Head of the core business department
d) Person in charge of planning in the information systems department
69. Data of the defects and faults of products, complaints from customers, etc. are
prepared and categorized according to their cause and situation. Which of the
following represents the number of data in each category in descending order on a bar
graph and the cumulative total on a line graph?
21 | P a g e
ITPEC IP M.S.T College
71. There are activities A, B, and C that use machines X and Y, and it is required in all
activities that the machines are used in the sequence of machine X, machine Y. When
the use times of machines X and Y in each activity are as shown in the table below,
which of the following is the sequence of the activities where the total time required to
complete the three (3) activities becomes minimum? Here, machines X and Y can be
used in parallel as shown in the figure below, but two (2) or more tasks cannot be
performed simultaneously with any machine.
a) A → B → C
b) A → C → B
c) C → A → B
d) C → B → A
72. A certain product’s sales plan and sales result are shown in the table below. What is
the ratio in percentage of the profit result to the profit plan? Here, the decimal
fractions of the ratio are truncated.
22 | P a g e
ITPEC IP M.S.T College
a) 77 b) 99 c) 110 d) 129
73. Which of the following is the right to protect the content of user guides attached to
software packages?
74. Which of the following is an appropriate combination of the standards and their
applicable fields?
75. According to the ISO 9000 family, quality is defined as the “degree to which a set of
inherent characteristics fulfills requirements.” When products are evaluated on the
basis of this definition, which of the following is most appropriate as a product with
good quality?
23 | P a g e
ITPEC IP M.S.T College
a) The code can contain only single-byte alphanumeric characters and symbols.
b) The amount of information that can be stored is equivalent to that of a barcode.
c) The code can be read from any direction including the top, bottom, left, and right.
d) The code has a two-dimensional structure in which three barcode layers are
stacked.
77. Among the lists of corporate activities A through D, which of the following is the list
that contains all activities concerning the establishment of compliance?
a) A, B
b) A, C
c) B, D
d) C, D
78. From the viewpoint of corporate governance, which of the following is the most
appropriate method of strengthening the functions of monitoring and supervising the
decision-making process of the management?
a) Installing a camera for monitoring the entry and exit of the president’s office
b) Periodically requesting a private detective to investigate the conduct of the
management
c) Appointing some outside directors
d) Employing law school graduates as members of the internal audit department
79. Which of the following is an appropriate description concerning the Balanced
Scorecard (BSC)?
a) It analyzes what activities generate the value of products and services that are
provided to customers.
b) It creates strategy and evaluates performance from four (4) viewpoints: financial,
customer, internal business processes, and learning and growth.
c) It records entries in a ledger in order to ensure that the amounts of credits and
debits are always in balance.
d) It scores and evaluates the creditworthiness of business partners through such
means as financial indicators.
24 | P a g e
ITPEC IP M.S.T College
80. Among the business management systems, which of the following has an objective of
maximizing customer lifetime value? Here, customer lifetime value is the amount of
profit expected to be brought into a company by a customer throughout his/her
lifetime.
81. As segmentation in marketing, consumers are classified on the basis of the attitude
toward product purchase. Which of the following is an appropriate attitude toward
product purchase of a consumer called an opinion leader?
[Management themes]
A: A company wishes to develop efficient business processes that span from
procurement of components to sales.
C: A company wishes to know the product name, quantity, and other sales-
25 | P a g e
ITPEC IP M.S.T College
related information at the time of sale in order to restock appropriately and analyze
strong selling products.
84. A middle-sized electrical manufacturer company A divides the products into groups in
accordance with their potential and competitive strength in order to determine the
priority of investing funds among their lineup. Which of the following is the most
appropriate method of analysis for this purpose?
a) Cluster analysis regarding the prices and the customer bases of the company’s
products
b) RFM analysis regarding the customers that purchase the company’s products
c) PPM analysis regarding the shares and the market growth rates of the company’s
products
d) Principle component analysis regarding the cause of faults in the company’s
products
85. Which of the following is the most appropriate explanation of a patent strategy of
cross licensing?
26 | P a g e
ITPEC IP M.S.T College
86. When the spreadsheet shown below is converted into CSV format, which of the
following is an appropriate list of data that is generated by spreadsheet software?
Here, records are separated by the carriage return code “CR”. The expression in a cell
is automatically recalculated, and the resulting value is written back into that cell.
Although the entered expressions are shown in row 3 and column C below, the
resulting values are actually displayed on the screen.
87. An ERP package is a suite of fully integrated software applications that are used to
perform administrative business processes, such as financial management,
procurement, personnel, and payroll administration. Which of the following is the
most appropriate description concerning such an ERP package?
a) An ERP package can be installed with relative ease because the business processes
of a company do not need to be analyzed.
b) An ERP package should be maintained by individual user departments after its
installation.
c) An ERP package should be installed after the business processes of a company are
verified and standardized.
d) An ERP package is an integrated type of system software that is designed
especially for the domestic business processes.
27 | P a g e
ITPEC IP M.S.T College
88. Which of the following is the system that is used to record sales information when a
sales transaction was made at the store, and also to collect, accumulate, and analyze
sales information for each item sold?
89. Among the characteristics required for an embedded system, which of the following is
the most appropriate terminology used when a certain process must be completed
within a given period of time?
a) Availability b) Reliability
c) Real-time ability d) Serviceability
a) It calculates the required quantity of materials for a product production plan and
orders materials.
b) It manages information about the components, semi-finished products, quantities,
etc. required for the manufacture of products.
c) It performs unified management of information such as product blueprints and
component tables, from design to manufacturing.
d) It uses computers in product design to improve the productivity and reliability of
design specifications.
91. Which of the following systems can be realized through the use of RFID?
a) Providing medical care by transmitting images and voice data of patients from a
remote site via a network
b) Depositing and withdrawing money from a bank ATM by using an ATM card
c) Reading product information from the barcodes on products, and performing sales
management and order processing at the time of sale in stores
d) Setting an electronic tag on a delivery parcel, and checking information related to
the shipping history of the parcel
28 | P a g e
ITPEC IP M.S.T College
a) Making the acceptance test simple when placing an order with a reliable outsource
b) Monitoring the progress of development in order to find and resolve problems
early
c) Entrusting all tasks, including the determination of the specifications of business
processes, to an outsource who is familiar with the business processes
d) Giving detailed instructions on outsourced tasks down to each staff member, even
if the outsource is reliable
94. Which of the following is the most appropriate description concerning DFD?
a) It represents transitions of the state of a system as time passes and the situation
changes.
b) It relates entities handled by a system, and represents the data structure.
c) It represents the attributes of, operations for and relations between the elements
that a system is composed of.
d) It focuses on the flow of data, and represents the relations between the flow and
the processing of business data.
95. Which of the following is the term that expresses the disparity in the quality and
quantity of information that can be obtained, or in income that can be earned between
people who can handle information devices such as computers and those who cannot?
29 | P a g e
ITPEC IP M.S.T College
96. Which of the following is a business operator that provides access to the Internet?
97. Which of the following is an appropriate approver for the optimization plan of the
overall information system of a company?
a) CIO
b) Head of RFP creation department
c) Head of the business operations department handling the mission-critical system
d) System development project manager
99. Which of the following is an appropriate procedure for selecting a contractor for
system development?
A: Issuance of RFP
30 | P a g e
ITPEC IP M.S.T College
a) A → C → D → B b) A → D → C → B
c) C → A → B → D d) C → B → A → D
100. When the software life cycle in the figure below is classified into the operation
process, development process, planning process, maintenance process, and
requirements definition process, which of the following corresponds to A? Here, each
of “Development,” “Planning,” “Maintenance,” and “Requirements definition” goes
into one of A and the shaded blocks.
a) Development b) Planning
c) Maintenance d) Requirements definition
31 | P a g e