Chapter 8 (2010-2020)
Chapter 8 (2010-2020)
Chapter 8 (2010-2020)
2010 April IP
Chapter (8)
Q61. Which of the following is an appropriate description concerning the cooling system in a PC?
a) Cooling efficiency is enhanced by installing air outlet and inlet fans next to each other on the back of the
enclosure.
b) Disk surface in a hard disk drive is cooled by circulating external air flow into the drive.
c) A heat sink with a higher volume-to-surface area ratio provides higher cooling efficiency.
d) A fanless PC uses cooling methods such as natural convection cooling and water cooling.
d) Although refresh cycles are required, it is used as main memory because of the capability of rewriting
data any number of times.
Q63. Which of the following is an appropriate explanation of primary cache memory and secondary cache
memory (hereinafter referred to as “primary” and “secondary” respectively) in a CPU?
a) Primary and secondary are categorized based on access speed; high-speed memory is referred to as
primary, and low-speed memory is referred to as secondary.
b) Primary is memory to speed up the data transfer between the hard disk and CPU, while secondary is
memory to speed up rendering on a video graphics board.
c) Primary is memory to speed up memory access, while secondary is memory to increase virtual capacity
of main memory.
d) Primary is memory which the CPU accesses first, while secondary is memory accessed next by the CPU
when required information is not found in primary.
Q64. Which of the following is a characteristic common to IEEE 1394 and USB that are connection interfaces
for computers and peripheral devices?
a) Peripheral devices can be connected and disconnected while the computer and/or devices are powered on.
b) A maximum transfer rate is 100 Mbits/second.
c) A unique ID needs to be assigned to each device connected to a PC.
d) Data can be transmitted in parallel over multiple data lines.
Chapter 8 Collection (Metro)
Q65. Which of the following is an appropriate description concerning a hot site in a backup system
configuration?
a) It is a shared site where, at the occurrence of a failure, backup data and programs are transported to recover
the system and resume operations.
b) It runs as a standby site where data and programs are constantly updated via network, and operations are
immediately resumed at the occurrence of a failure.
c) It is a backup site where hardware is installed, and data and programs are transported and stored on a
regular basis. At the occurrence of a failure, these are used to recover the system and resume operations.
d) It is a reserved backup site where, at the occurrence of a failure, necessary hardware, data, and programs
are transported and operations are resumed.
Q66. There is a system consisting of two processing units. What is the difference in availabilities between
when one of the units must be running for the system to function and when both units must be running? Here,
the availability for each processing unit is 0.90, and factors other than the processing unit are ignored.
a) 0.09 b) 0.10 c) 0.18 d) 0.19
Q67. Which of the following is the term used to describe the volume of work processed by a system during a
specific time period?
a) Access time b) Overhead c) Throughput d) Turnaround time
Q69. Which of the following explains the functions of an archiver that is one type of data management utility?
a) It prepares areas on hard disks for storing data and managing such stored data.
b) It packs multiple files into a single file or restores them for data backup or distribution.
c) It protects data through such functions as file protection to secure the data from unauthorized use or
destruction, and copy protection to prevent illegal data copying.
d) On a fragmented hard disk, it reorganizes files by placing them in as many consecutive blocks as possible.
Q70. In a system, four types of access rights (Read, Append, Modify, and Delete) are set on each record of
the file used there. For example, one file might be set to Read only, while another file might be set to three
access rights, Read, Append, and Modify at the same time.
What is the maximum number of combinations of these access rights that can be set on a file? Here, at least
one access right must be set. When Modify is set, Read and Append are also set automatically. When Delete
is set, all of the other three rights are also set automatically.
a) 4 b) 5 c) 8 d) 15
Chapter 8 Collection (Metro)
Q73. Which of the following is an appropriate description concerning “open source”?
a) Modification of the source code is permitted under certain conditions.
b) Redistribution is permitted for limited usage and users.
c) The copyright for the source code is disclaimed.
d) The source code must be distributed for free.
2010 August IP
Chapter (8)
Q61. Which of the following is a DVD medium in which users can write data, but not rewrite data?
Q62. Which of the following is an appropriate explanation of the characteristics and usage of an optical disk?
a) It provides relatively high-speed data access and transmission, and is capable of realizing virtual
memory, so it is used in a wide range of equipment from mainframes to PCs.
b) It requires refresh operation at regular intervals in order to retain memory contents.
c) It has three types—read-only, write-once, and rewritable—and is used for storing a large amount of
data such as image information.
d) It is not capable of random access but is used for the backup of hard disks because it provides very
large storage capacity.
Q63. Which of the following is an interface standard that connects a number of peripherals into a tree-like
structure using a hub?
a) SATA b) RS-232C c) SCSI d) USB
Q64. Which of the following is the software that is provided for each peripheral to work as an intermediary
between an OS and its peripherals so that the application software can use the peripherals connected to the
PC?
a) Installer b) Device driver c) Device manager d) Formatter
Q65. Which of the following is an appropriate characteristic of a distributed processing system in comparison
with a centralized processing system?
a) A failure of some part of the unit often causes the entire system to stop.
b) It is difficult to expand the system to support functional extension and business growth.
c) It is easy to ensure confidentiality and security.
d) Operations management for efficient operations of the entire system often becomes complicated.
Chapter 8 Collection (Metro)
Q66. When a certain system is operated for 5,000 hours, the number of failures is 20, and the total downtime
is 2,000 hours. Which of the following is the appropriate combination of the approximate values for MTBF,
MTTR, and availability of this system? (d)
Q67. According to the analysis of the turnaround time for a certain job, two-thirds of 1,350 seconds is CPU
time and the remainder is I/O time. The amount of data to be processed is expected to increase in the next year.
CPU time is expected to be shortened to 80% in comparison to this year because of performance improvement,
and I/O time is expected to increase to 120% in comparison to this year. What is the expected turnaround time
(in seconds) of the job for the next year under the above condition? Here, other conditions such as waiting
time and overhead can be ignored.
a) 1,095 b) 1,260 c) 1,500 d) 1,665
Q68. An increase in the response time is observed, and as a result of the cause analysis, it is found that an
increase in the I/O time of the hard disk is identified as the cause. In order to improve this situation, it is
planned to install a utility program that reduces seek operations and thereby enables efficient access. In this
case, which of the following is an appropriate action to be taken by the utility? Here, only one hard disk is
used.
a) Storing large files in the same directory (or folder)
b) Distributing each file across multiple areas of the hard disk
c) Storing frequently accessed files in continuous areas of the hard disk
d) Storing frequently accessed files in the same directory (or folder)
Q69. The diagram below shows the directory structure for a part of a certain file system. Which of the
following is the reference from the current directory D3 (indicated with an asterisk “*”) to the file “a” under
the directory D4 (indicated with an arrow)? Here, files are specified as follows:
[Methods to specify files]
(1) A file is referenced as “directory name\···\directory name\file name”, where the directory names on
the path are listed and separated with “\” (backslash) in sequence, followed by “\”and the file name.
(2) The current directory is represented by “.” (one period).
(3) The directory one level above is represented by “..” (two periods).
(4) When a reference begins with “\”, it is assumed that the root directory is omitted from the beginning
of the reference.
Chapter 8 Collection (Metro)
(5) When a reference does not start with “\”, “.”, or “..”, it is assumed that “.\”, which means that the
reference is under the current directory, is omitted from the beginning of the reference.
a) ..\..\D2\D4\a b) ..\D2\D4\a
c) D1\D2\D4\a d) D2\D4\ a
Q70. Which of the following is an appropriate description concerning the file system that can be represented
in a hierarchical tree structure, such as the Linux file system?
a) Two or more directories with an identical name can be created if each hierarchy level is different.
b) The current directory is always at the top level of the hierarchy.
c) A file cannot be created by specifying a relative path.
d) A directory containing no files cannot be created.
Q71. Which of the following is the most appropriate purpose of adopting a business application software
package instead of self-developed application software?
a) To enhance the development environment
b) To reduce the development cost
c) To acquire the knowledge of software development methods
d) To enhance software development skills
Q73. Which of the following is an appropriate description concerning open source software?
a) The user is free to use the software for a certain trial period, but must pay to continue using it.
b) The user is free to obtain and modify the source code released to the public.
c) The copyright for the software is waived.
d) Fee-based support services cannot be received.
Q74. When image data captured by a digital camera is stored on a removable media device, which of the
following is the appropriate semiconductor memory used for the media?
a) DRAM b) SDRAM
c) SRAM d) Flash memory
Chapter 8 Collection (Metro)
Q77. A program in operation detected that the sales data exceeded the upper limit. As a result of checking
the input form, it was found that sales quantity exceeded the upper limit by two digits. Which of the following
is the appropriate action for the operations department to take toward this data?
a) Correcting the data at the operations department upon the department head approval
b) Consulting the system development department
c) Discarding such data
d) Asking the department which issued the input form to check it
2011 April IP
Chapter (8)
Q10. Which of the following is the latest interface that is widely used to transfer a large amount of data, such
as 3D images or moving images, to graphics cards at higher speed?
Q11. Which of the following is the standard that is used to exchange data, such as address book data, between
cell phones by using infrared rays?
c) It enhances the performance and reliability of the entire system by using multiple hard disk drives all
together.
d) It increases data access time because it needs to access multiple hard disk drives.
Chapter 8 Collection (Metro)
Q14. Which of the following is an appropriate description of fail-safe?
a) Keeping the system harmless, even in the event of a failure or an operation error
b) Operating only the normal parts of the system, even in the event of a failure, so as not to make an
impact on the entire system
c) Preventing intrusion into the computer network of an organization from outside
Q15. There is a system consisting of two PCs, one file server, and one printer that are all connected to a LAN.
The availability of the printer and file server are both 0.9, while the availability of each PC is 0.8. Which of
the following is the appropriate expression to calculate the availability of the entire system? Here, the system
is considered to be operating when at least one PC is running. (b)
Q16. Which of the following is pertinent to the process of grouping multiple files into one, for the purpose of
making effective use of storage media or promoting the efficiency of backup or distribution?
a) Archive b) Allocate c) Patch d) Protect
Q17. Which of the following is the purpose of the virtual memory system that is one of the functions provided
by an OS?
a) To prevent an application program from accessing the area on the main memory used by the OS
b) To reduce electricity consumption while work is suspended, by turning off the power supply after data is
written from the main memory to the hard disk
c) To make it possible to execute a program even if the program requires more storage capacity than is
available in the main memory
d) To accelerate CPU processing through the intervention of a higher speed memory device than the main
memory
a) Plug-in software bridges differences between OSs, and provides more advanced and specific functions
than the OSs.
b) Plug-in software is provided to replace parts of a program for the purpose of modifying functions or
fixing bugs.
c) Plug-in software does not work as a standalone program, but can be integrated into applications, such as
a Web browser, to enhance their functions.
d) Plug-in software is often included in applications such as spreadsheets, and allows the users to record
and replay the series of operations performed.
Chapter 8 Collection (Metro)
2011 October IP
Chapter (8)
Q9. Which of the following is an appropriate description concerning the clock frequency of the CPU in a PC?
a) The instruction execution timing of the CPU changes depending on the clock frequency. As the clock
frequency becomes higher, the instruction execution speed of the PC increases.
b) The communication speed of the LAN changes depending on the clock frequency. As the clock
frequency becomes higher, the communication speed of the LAN increases.
c) The rotation speed of the hard disk changes depending on the clock frequency. As the clock frequency
becomes higher, the rotation speed becomes faster and the data transfer rate of the hard disk increases.
d) The clock frequency serves as the reference for the internal clock of the PC. When the clock frequency
doubles, the interrupt interval becomes half and the speed of real-time processing increases.
Q10. Which of the following is an appropriate explanation concerning the cache memory of a PC?
a) It is placed between the CPU core and main memory, and is used to read and write data at high speed.
b) It is used to store the same data in two locations at the same time in order to improve reliability.
c) It is equipped with a mechanism that can run even a program whose size exceeds the main memory
capacity.
d) It enables simultaneous access to main memory blocks by dividing main memory into multiple blocks.
d) A specially-designed CD-R drive is necessary for reading data, because the data is recorded in a special
format.
Chapter 8 Collection (Metro)
Q13. Which of the following is the most appropriate explanation of TCO (Total Cost of Ownership) that
represents the cost of a system?
a) The total cost of a company’s initial investment in an information system
b) The total cost incurred in system development
c) The total cost including system installation, operation, maintenance, and education
Q14. In the new system environment of Company X, three systems including a customer management system,
an ordering management system, and a call center system are run individually at separate locations and
connected via a network so that they can complement one another in the event of a failure. Also, the system
operations are managed at their respective locations. Which of the following is the greatest merit of this new
system?
a) The integration of operations helps reduce the number of operating staff.
b) Risks of disasters and other problems can be diversified.
c) The versions of software can be controlled easily.
d) Backup files can be managed in a consolidated manner.
Q15. Which of the following is the technical term that represents the work volume processed by a computer
per unit time?
Q16. Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the application programs can
be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary storage device, to
application programs.
c) Since an OS has the function of automatically converting character sets in a file, application programs can
access the file without regard to the type of character set.
d) The source code of an OS should be disclosed so that application programs can be free to use the various
functions of the OS.
Q17. Which of the following is the most appropriate method for displaying the content of database to a limited
extent in accordance with the level of confidentiality for each user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data
Chapter 8 Collection (Metro)
Q18. When a newly installed application program is concurrently executed on a PC that is equipped with a
virtual memory function, the swapping of pages between main and secondary storage occurs frequently and
the processing efficiency of the running application programs drops sharply. Which of the following is the
most appropriate solution to this situation?
a) Installing more hard disks
b) Installing more main memory
c) Switching to a faster CPU
d) Switching to faster main memory
Q19. Which of the following is an appropriate description concerning file systems that manage files with
directories and that are used for a wide variety of OSs on PCs?
a) The current directory is created first as the top directory of a hierarchical structure.
b) The file system should be created on a hard disk for directory management.
c) The directory path is used to identify a specific file stored on an auxiliary storage.
d) Files and directories cannot be registered in the same directory.
a) It is a program that translates source programs written in assembler language to machine language
programs.
b) It is a program that reads high-level source programs line-by-line, alternately translating lines and
executing appropriate operations.
c) It is a program that translates source programs written in high-level language to machine language
programs, and then generates load modules.
Q21. Which of the following is software that can be used free of charge on a trial basis but requires a usage
fee if it continues to be used after the trial period?
a) Open source software b) Shareware c) Public domain software d) Freeware
c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data volume processed at a time,
but the width in bits is not related to the performance.
d) For CPUs that have the same architecture, the higher the clock frequency, the faster the response time.
d) The USB interface is suitable for a low speed peripheral device, such as a keyboard or a mouse, rather than
a high speed device like a hard disk.
Q9. Which of the following is used for image sensors in digital cameras?
a) CCD b) PDP c) STN d) TFT
Q10. Which of the following is the interface that enables a PC and its peripheral devices to be connected in
the configuration shown in the diagram below? Here, represents a hub.
Q11. Among the system configurations shown below, which of the following has the lowest probability of
causing the entire system to stop at the occurrence of a failure? Here, represents an identical device. When
the devices are connected in parallel, only one device must be running, and when the devices are connected
in serial, all devices must be running. (d)
Chapter 8 Collection (Metro)
Q12. When a computer is installed under the conditions below, which of the following is an appropriate graph
to represent the relationship between the number of years of use (horizontal axis) and the monthly costs
(vertical axis)? (b)
[Conditions]
Q13. The graph below shows the relationship between the failure rate “λ (t)” of the devices comprising the
system and the time “t” elapsed since the start of use. Which of the following is a device that is expected to
show the greatest increase in the failure rate during the wear-out failure period?
Q14. When a PC is powered on, which of the following is first activated to access a hard disk or other bootable
media before the OS is started?
a) BIOS b) POST c) MBR d) Disk driver
Chapter 8 Collection (Metro)
Q15. When print processing is executed using an application program such as word processing software or
spreadsheet software, there is a method that allows data for printing to be stored temporarily on the hard disk
without direct output to the printer, and allows actual printer output to be performed by a dedicated program.
Which of the following is the advantage of separating actual printer output from application execution in this
way?
a) The time from the start of application execution until the end of printing can be reduced.
b) The modification of a document that contains a large number of images becomes possible.
c) The processing volume per unit time increases.
Q16. In the description below concerning a file system, which of the following is an appropriate combination
of terms to be inserted into blanks A through C? When files and directories on a PC are managed
hierarchically, the directory at the highest level is called the directory, and the directory that a user is
now manipulating is called the directory. A notation format that uses the directory as its
starting point and shows the location of a file or a directory is called a(n) path. (d)
Q17. When the log file of a Web server is analyzed as a part of daily system administration, which of the
following can be found?
a) Web pages accessed by Web site visitors
b) The model name of a computer used by each visitor
c) The speed of a Web browser on each visitor’s computer
Q19. Which of the following is an appropriate description concerning the symptom and its measures to be
taken at the occurrence of file fragmentation?
a) Since more files are accessed simultaneously and the seek operation of the hard disk takes more time,
the efficiency of file access drops. The measure to be taken is to store the simultaneously accessed files
close together in the hard disk.
b) Since the recycle bin is full and an old file in the recycle bin is removed physically each time a file is
created or deleted, the efficiency of file access drops. The measure to be taken is to remove the files in
the recycle bin all together.
c) Since small separated areas, instead of a single contiguous area, are allocated when a file is created, the
efficiency of file access drops. The measure to be taken is to reallocate contiguous areas to files and
unused space.
Chapter 8 Collection (Metro)
d) The data area for files is large enough, but the control area for files is not sufficient and it takes time to
allocate the control area when a file is created. The measure to be taken is to combine multiple files
into one or to expand the control area
2012 October IP
Chapter (8)
Q9. Which of the following is a standard for the interface of a wireless connection such as a wireless link
between a PC and peripheral devices?
a) Bluetooth b) IEEE 1394 c) PCI d) USB 3.0
Q10. When a peripheral device is connected to a PC, which of the following is the function that is used to
automatically install and configure the corresponding device driver into the system?
b) Two or more hard disks are connected together as a single virtual hard disk drive that has the total capacity
of those disks.
c) By dividing data into multiple pieces and writing them into two or more hard disks in parallel, the writing
speed is increased.
d) By writing the divided data and the parity information for error corrections into three or more hard disks,
the availability of data and the writing speed are increased.
Q12. Among RASIS (Reliability, Availability, Serviceability, Integrity, and Security), which of the following
is an explanation of availability?
a) Effectively determining, diagnosing, and repairing problems in a computer system
b) Calculating the average repair time of a computer system
c) Maintaining a computer system so that it is ready for use at any time
d) Taking preventive measures so that a computer system is not damaged or data is not stolen by unauthorized
access
Q13. Which of the following is an appropriate description concerning the hardware maintenance of a system?
a) The hardware device that has not failed for a certain period of time is excluded from the coverage of
scheduled maintenance.
b) It is safe to replace the failed hardware device with the latest model rather than the same model, because
compatibility is guaranteed.
Chapter 8 Collection (Metro)
c) Scheduled maintenance is performed for the hardware device that has failed before.
d) In preventive maintenance, measures are taken before a failure occurs.
Q14. Which of the following is a small application program that is automatically downloaded along with a
Web page in response to a client request and is executed on a Web browser?
a) Applet b) Servlet c) Script d) Thread
Q15. There exists a system that controls access to personnel files by using the attributes of each individual
and the group to which the individual belongs. When the attributes for the personnel department and its four
members meet the conditions below, which of the following is an appropriate combination that shows the
number of members who can read the files and the number of members who can update the files? (d)
[Conditions]
(1) The attribute information is represented using 3 bits.
(2) Each bit represents “read”, “update”, and “insert/delete” permission, from left to right. “1” indicates that
permission is granted, and “0” indicates that permission is denied.
(3) The group attribute is applied to an individual only if the individual’s attribute is not registered.
(4) The group’s and individual’s attributes are registered as shown below. Personnel department group: 110
Mr. A: 100 Mr. B: 110 Mr. C: 001 Mr. D: not registered
Q16. Which of the following is an appropriate description concerning the data format of CSV?
a) It can record not only text and numerical data but also expressions and format information. A tab is used
as a delimiter between data.
b) It records text and numerical data as well as other information that consists of only several types of control
characters including a newline character. A space, a colon, or a semicolon is used as a delimiter between
data.
c) It uses a comma as a delimiter between text and/or numerical data, and a new line character as a delimiter
between records. Text data is often enclosed by quotation marks.
d) It can record not only text data but also other data such as images and Java applets. A command called a
tag is often inserted between data entries.
Chapter 8 Collection (Metro)
Q17. Which of the following is a system that provides an environment to promote working partnerships and
to support joint activities among the members of an organization?
a) Groupware b) Group dynamics c) Collaboration d) Workflow
Q18. Which of the following is an appropriate description concerning the use of OSS (Open Source Software)?
a) OSS users have an obligation to pay the developer the fee for the software.
b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.
c) OSS cannot be used in the field of genetic research.
d) Software derived from the published OSS can be made available as OSS.
Q19. If data is repeatedly added to and deleted from a hard disk on a PC, data may not be stored in consecutive
areas on the hard disk. When no measures are taken, which of the following is a phenomenon that can occur?
a) Viruses cannot be detected.
b) Data cannot be written correctly.
c) Data cannot be read correctly.
d) Stored data cannot be read quickly.
Q20. Which of the following is a mechanism that allows a user to have access to several permitted servers
and applications once the user is authenticated?
2013 April IP
Chapter (8)
Q7. Which of the following is a DVD disc in which users can write data, but cannot rewrite data?
a) DVD-R b) DVD-RAM c) DVD-ROM d) DVD-RW
Q11. Among the functions of client management tools, which of the following is the most effective function
for detecting whether or not software unrelated to the business operations is installed on client PCs?
a) Inventory collection b) Remote operation
c) Software distribution d) Lifecycle management
Q12. Which of the following is an appropriate characteristic of a distributed processing system, in comparison
with a centralized processing system?
a) The partial failure of a system often leads to a shutdown of the entire system.
b) It is difficult to expand the system in line with the expansion of functions or the increase in the volume
of work.
c) It is easy to protect data and ensure security.
d) From a viewpoint of operations management, it often becomes complex to operate the entire system
efficiently.
Q13. Which of the following is the system that receives a processing request from a terminal via a network
and sends back the result immediately?
a) Operating system b) Online real-time system
c) Database system d) Multimedia system
Q14. What is the minimum amount (in Mbytes) of virtual memory that is required under the conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
2. Memory required for applications: An amount of 50 Mbytes is required for each application, and a total
can be calculated by multiplying it by the number of applications that run concurrently. Eight applications
run concurrently.
3. Memory required for controlling main memory or other related functions: In addition to 512 Mbytes
of main memory, a minimum amount of 20 Mbytes is required.
4. Required virtual memory: The required amount is the sum of the above items 1 through 3.
a) 762 b) 782 c) 1,112 d) 1,132
Chapter 8 Collection (Metro)
Q15. When a new program was added and executed on a server that has the virtual memory function, a lot of
swapping occurred and the performance of existing programs in operation was decreased. In order to resolve
this problem, which of the following is the most appropriate method?
a) Installation of a high-speed CPU
b) Installation of a faster type of main memory
c) Installation of additional hard disk drives to expand the capacity of auxiliary storage
d) Installation of more main memory
Q16. Company A plans to make a backup copy of the data on a server, which is used for business operations,
in preparation of future hardware failures. Which of the following is an appropriate backup plan that satisfies
the backup requirements shown below? (c)
[Backup requirements]
• When a server failure occurs, the data is to be restored to the state of business operations that were completed
on the day before the failure.
• Although the amount of data updated daily during business operations is very small in comparison with all
data, the amount of retained data is large, which means that a lot of time is taken for a full backup. Therefore,
a full backup cannot be taken from Monday through Saturday.
Q17. As shown in the directory structure below, when D3 marked by an asterisk (*) is the current directory,
which of the following the appropriate directory path that can designate file A under directory D4 marked by
an arrow? Here, a file is designated as follows: (b)
[Method of file designation]
(1) A file is referenced as “directory name\···\directory name\file name”, where the directory names on the
path are listed and separated with “\” in sequence, followed by the file name.
(2) The current directory is represented by a period “.”.
Chapter 8 Collection (Metro)
(3) A directory that is one level higher is represented by two periods “..”.
(4) When the path name string begins with a backslash “\”, the root directory is omitted from the beginning
of the string.
(5) When the path name string does not begin with “\”, “.”, or “..”, it is assumed that “ .\” for the current
directory is omitted from the beginning of the string.
Q18. Which of the following is the most appropriate purpose of installing a business application software
package instead of self-developed application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire the knowledge of software development methods
d) To improve the skills of application developers
Q19. Which of the following is an appropriate description concerning OSS (Open Source Software)?
a) The program is free to use for a certain trial period, but a fee is required to continue using it.
b) Modifications and derived works are allowed to be distributed under the same terms as the license of
the original software.
c) The copyright is waived, so any modified program can be distributed without permission.
d) The program may be restricted from being used in a business, or from being used for a specific field.
Q20. Which of the following is the effect that is expected as a result of performing defragmentation of a hard
disk?
a) The cluster with an error is replaced with an alternate cluster.
b) The apparent volume of files is decreased.
c) The number of read errors is decreased when files are accessed.
d) The access time to continuously read files is shortened.
Chapter 8 Collection (Metro)
2013 October IP
Chapter (8)
Q7. Which of the following is a method of writing the same data to multiple hard disks simultaneously and
improving reliability rather than performance?
a) Striping b) Paging c) Interleaving d) Mirroring
Q8. Which of the following is a storage device or medium that is based on semiconductor memory technology?
a) CD-ROM b) DVD-RAM c) BD d) SSD
Q9. Which of the following is a type of software that is provided for each PC peripheral and works as an
intermediary between an OS and a specific peripheral so that application programs can use such a peripheral?
a) Installer b) Device driver c) Device manager d) Converter
Q10. Which of the following is an appropriate description concerning PnP used on a PC?
a) A feature to launch application programs from a remote site
b) A feature to set up peripherals automatically when connected
c) A feature to start up an OS automatically when powered on
Q11. Which of the following is the most appropriate description concerning a characteristic of RAID?
a) It increases the data transfer rate of each hard disk.
b) It provides a larger capacity than the total capacity of individual hard disks.
c) It provides better performance or reliability or both by using multiple hard disks.
d) It increases data access time because it needs to access multiple hard disks.
Q12. Which of the following is the most appropriate explanation of TCO (Total Cost of Ownership) that is a
major factor when any purchasing decision is made for a system?
a) It is the sum of the operation and management costs incurred after the installation of the system.
b) It is the sum of the costs required to troubleshoot software and hardware faults that occur after the
installation of the system.
c) It is the sum of the costs incurred during the installation of the system and the operation and management
costs incurred after the installation.
d) It is the sum of the costs incurred during the installation of the system in addition to the planning phase of
the system.
Chapter 8 Collection (Metro)
Q13. When a computer system operates for 1,200 hours, the status of the normal operation time and the repair
time is shown in the table below. What is the value of MTTR (Mean Time To Repair, in hours) of the system?
a) 10 b) 15 c) 20 d) 45
Q14. Which of the following is the most appropriate term that means the process of grouping multiple files
into one, for the purpose of making effective use of storage media or promoting the efficiency of backup or
distribution?
a) Archive b) Aggregate c) Bundle d) Compile
Q15. Which of the following is the purpose of the virtual memory system that is known as one of the functions
provided by an OS?
a) To prevent an application program from accessing the protected area on main memory used by the OS
b) To reduce electricity consumption during the idle state, by stopping the power supply after data is written
from main memory to external storage
c) To make it possible to execute a program even if the program requires more storage capacity than main
memory
d) To accelerate CPU processing with the assistance of a higher speed storage device than main memory
Q16. Which of the following is the most appropriate explanation of a “multimedia authoring tool”?
a) It is a tool that is used to create multimedia content by combining materials, such as image, sound, and
text, on the screen.
b) It is a tool that is used to play back multimedia content, such as image, sound, and text, in the PC
environment.
c) It is a tool that is used to search for multimedia information, such as image, sound, and text.
d) It is a tool that is used to interactively define schema for multimedia database containing information,
such as image, sound, and text.
Q17. Which of the following is a unit that is used to represent “resolution”, one of the performance indicators
of a display or a printer?
a) bps b) dpi c) fps d) psi
Chapter 8 Collection (Metro)
Q18. Which of the following is the concept representing a database that is built by extracting and restructuring
data from a mission-critical business system for the purpose of supporting information analysis and decision
making?
a) Data center b) Data warehouse c) Data mining d) Data roaming
2014 April IP
Chapter (8)
Q11. Which of the following is the most appropriate explanation of a DVD drive that is used as an auxiliary
storage device for a PC?
a) A laser beam is used for reading data, and magnetism is used for writing data.
b) It cannot be installed in a notebook PC because of its heat release and physical size.
c) It cannot read a CD-ROM disc because of the nature of the recording method.
d) Several types of media, such as DVD-R, DVD-RW, and DVD-RAM, can be used.
a) Operations are performed by using a pen-type or mouse-type device for specifying a position on the
screen, and a flat-plate input device for detecting the position.
b) Operations of a mouse pointer on the screen or other functions are performed by tracing a flat-panel input
device with a finger.
c) The movement of a finger is detected by a sensor on the surface, and operations are performed by rotating
a component called a wheel that is similar to a disc.
d) There are some methods such as electronic or electrostatic techniques, and operations are performed
through direct contact with the screen by using a finger.
Q13. In a client/server system, which of the following is the most appropriate system that manages both
application software and data on the server side in a centralized manner and has only the minimum required
functions on the client side?
a) Distributed processing system
b) Interactive processing system
c) Rich client system
d) Thin client system
b) It is a computer system that is composed of a primary system used usually and a secondary system kept on
standby in preparation for a failure.
Chapter 8 Collection (Metro)
c) It is a distributed processing system in which the computers in a group connected via a network have an
equivalent relationship.
d) It is a distributed processing system that provides a clear hierarchical relation to the computers in a group
connected via a network.
Q15. The types of programs that are executed at the startup time of a PC are generally classified into three
categories: BIOS, OS, and resident applications. Which of the following is the list that is arranged in the
sequence of the execution of the programs?
a) BIOS → OS → Resident applications
b) OS → BIOS → Resident applications
c) OS → Resident applications → BIOS
d) Resident applications → BIOS → OS
a) Plug-in software bridges differences between OSs, and provides more advanced and specific functions
than the OSs.
b) Plug-in software does not work as a standalone program, but can be integrated into applications, such
as a Web browser, to enhance their functions.
c) Plug-in software is often included in applications such as a spreadsheet, and allows the users to record
and replay the series of operations performed.
d) Plug-in software is provided to replace part of a program for the purpose of modifying functions or
fixing bugs.
a) Several computers connected via a network build a system that works together to achieve a high-
performance system.
b) Several processor cores composed of arithmetic circuits and other control circuits are implemented in
a single CPU.
c) The CPU processing time is allocated to several processes in a sequence so that the processes can be
executed concurrently.
d) The same processing is performed for multiple data items by executing a single instruction.
Chapter 8 Collection (Metro)
Q18. Which of the following is the appropriate combination of the terms and explanations A through D
concerning the file system of a hierarchical directory structure? (c)
A: It is the directory at the topmost level of the hierarchy.
B: It shows all paths starting from the topmost directory of the hierarchy down to the target file or directory
according to the directory structure.
C: It is the directory that is currently being manipulated.
D: It shows all paths starting from the directory that is currently manipulated through the target file or
directory according to the directory structure.
Q19. Which of the following is an appropriate description concerning the characteristics of an interpreter-
based program?
a) It can be used for batch processing, but cannot be used for interactive processing or real-time processing.
b) It generally runs faster than a compiled program, and is suitable for a large-scale program.
c) It takes a long runtime because the program is translated and executed on a line-by-line basis.
d) The generated object program has a tendency to be larger than a program generated by a compiler.
Q20. Which of the following is the reason why it is better to store a file in contiguous area on a hard disk?
a) Because of less movement of the magnetic head, it takes less time to read data continuously.
b) Since fewer areas are needed to store the management information of files, the user can use more
areas.
c) Since no area where data is not stored is required in the hard disk, all the areas can be used.
d) The number of read errors can be decreased in comparison with a file that is stored in fragmented
areas.
Q21. Which of the following is an appropriate description concerning a pull-down menu that is used as a user
interface on a PC?
a) A list of the options is displayed when a title is clicked, and then an item from the list can be selected.
b) All the necessary items can be selected from among the several options displayed on the screen.
c) During keyboard input, subsequent input is anticipated and displayed on the basis of the past input history.
d) It can be used for displaying error messages or entering the small amount of data on the screen.
Chapter 8 Collection (Metro)
2014 October IP
Chapter 8
Q8. Which of the following is a file that is used to store information before and after database updates and
also used to recover from a database failure?
a) Backup file b) Index file c) Journal file d) Snapshot file
Q9. Which of the following is an appropriate characteristic of an HDD (Hard Disk Drive) that is used as an
auxiliary storage device?
a) The read/write speed of an HDD is slower than that of a CD-ROM drive.
b) An HDD can be used as main memory as well as auxiliary storage.
c) Electric power must always be supplied to an HDD in order to retain data.
d) Data can be read and written to and from an HDD in a direct (or random) access manner.
Q10. Which of the following is a dedicated memory module that is used to retain data, such as characters and
graphics, to be displayed on a computer screen?
a) Cache memory b) Flash memory c) Video memory d) Virtual memory
Q11. Which of the following is the most appropriate description concerning a multi-core processor?
a) Several microprocessors are installed in a single PC in order to improve the reliability of the PC by
performing the same processing simultaneously in each processor.
b) A quad core processor has four times as much processing power as a dual core processor, if each core
is equipped with the same arithmetic and logic unit.
c) The clock frequency of a processor is temporarily increased according to the load of processing, and as
a result, high-speed processing can be achieved.
d) A single processor has multiple processing circuits that can perform different arithmetic operations in
parallel in order to enhance the performance of the processor.
Q12. Which of the following is the unique value that is sequentially assigned to a memory location in order
to identify the location of instructions or data stored in the main memory of a computer?
a) Address b) Counter c) Index d) Pointer
Q13. Which of the following is a technical term that refers to a dedicated file server that can be connected
directly to a LAN and shared among several client computers?
a) NAS b) RAID c) SAN d) SSD
Chapter 8 Collection (Metro)
Q14. Which of the following is an explanation concerning the reliability index that is calculated by the
expression below? MTBF MTBF+MTTR
Q15. Which of the following is the most appropriate description concerning the benchmark test that is used
as a method for the evaluation of a system?
a) The availability of a system is evaluated as a proportion of the time that the system is normally operable.
b) The processing power of a system is evaluated by means of a set of standard programs and data.
c) The reliability of a system is evaluated with the average time between inherent failures of a system.
d) The maintainability of a system is evaluated with the average time to fix and restore the system.
a) It is a state in which the processes of a computer are prohibited from getting intentional or accidental
access to information that usually must not be accessed.
b) It is a state in which, if the authentication of a user fails more than the limited number of times, the user
is prohibited from accessing the computer.
c) It is a state in which, when shared resources are exclusively used, two processes are endlessly waiting
for each other to release the lock of a shared resource.
d) It is a state in which processes in the ready state under a multi-programming environment have used up
the CPU time allocated by the OS.
Q17. Which of the following is an appropriate description concerning the virtualization of a server?
a) A technique for virtually creating computer-generated worlds or immersive environments that users
can interact with
b) A technique for virtually operating the GUI of a remote computer connected via a network by using a
local computer
c) A technique for virtually implementing and operating two or more computers on a single computer
d) A technique for virtually allocating more memory space than the capacity of main memory by using a
particular part of auxiliary storage
Chapter 8 Collection (Metro)
Q18. Which of the following is an appropriate description concerning file management under UNIX?
a) No removable storage media, such as CD-ROM, can be allocated to a directory, so it is directly accessed
by specifying the drive name.
b) Files are managed in a directory tree for each drive, and at first, the drive where the target file is located
is determined when the file is searched for.
c) The entire file system is managed in a single directory tree, and remote files via a network are also
allocated and accessed in the directory.
d) A home directory can be referenced by its owner only, and cannot be used when a file is shared by
multiple users.
Q19. Which of the following is the most appropriate description concerning Java applet?
a) It is integrated into a client as add-in software and executed on the client.
b) It is downloaded from a server to a client and executed on the client.
c) It is executed in cooperation with an HTML document on a server.
d) It is executed without compiling the source code.
Q20. When a digital color image with a color depth of 24 bits per pixel is stored in graphics memory,
approximately how many megabytes of memory are required at a minimum to display the image on a screen
of 1,024 horizontal pixels by 768 vertical pixels? Here, one megabyte is 106 bytes.
a) 0.8 b) 2.4 c) 6.3 d) 18.9
Q21. Which of the following is a technique that can be used to compress both video and audio data?
a) BMP b) GIF c) JPEG d) MPEG
2015 May IP
Chapter 8
Q8. Which of the following is an appropriate explanation of HDMI?
a) It is an interface for an audio-visual device that handles the input and output of video, audio, and control
signals through a single cable.
b) It is an interface that makes use of the infrared rays used for the exchange of information between cell
phones.
c) It is a serial interface that connects a peripheral device, such as an external hard disk, through a cable.
d) It is a wireless interface that makes use of radio waves and can communicate even when there is a slight
shielding.
Chapter 8 Collection (Metro)
Q9. Which of the following is implemented in a computer system in order to perform the role of transferring
data between the CPU and memory, or between the CPU and I/O devices?
a) Bus b) Hub c) Port d) Router
a) It is a type of rewritable memory that can erase all its content with ultraviolet light.
b) It can read out data at a high speed, and therefore, it is often used as cache memory.
c) It is a type of non-volatile memory that can erase and rewrite all or part of its content electrically.
d) It is a type of memory that requires refresh operations and is widely used as main memory.
Q11. Which of the following is an appropriate explanation of some functional units that constitute a computer
system?
a) The arithmetic and logical unit performs calculation processing at the direction of the control unit.
b) The arithmetic and logical unit exchanges data with the control unit, the input unit, and the output unit.
c) The memory unit requests the arithmetic and logical unit to perform calculation processing and stores the
results.
d) The memory unit requests the output unit to read out data from the memory unit.
Q12. Which of the following is an appropriate explanation of the hot standby system?
a) It is a system where a collection of various types of hardware, software, and data on the Internet is
provided to the user.
b) It is a system where a high level of reliability can be obtained by simultaneously operating the two sets
of equipment and performing the same processing while cross-checking the results.
c) It is a system where a backup machine is always kept on standby in an operable state and is immediately
switched into operation at the occurrence of a failure.
d) It is a system where a backup machine is arranged, and at the occurrence of a failure, the operator in
charge starts up the backup machine to switch the production machine to the backup machine.
Q13. When MTBF is 600 hours and MTTR is 12 hours, what is the approximate availability?
a) 0.02 b) 0.20 c) 0.88 d) 0.98
Q14. Which of the following is a method or technique that is used to connect multiple computers over a
network such as a LAN or the Internet, and makes these computers available as if they were a single high
performance computer?
a) End user computing b) Social computing
c) Grid computing d) Pervasive computing
Chapter 8 Collection (Metro)
Q15. Which of the following is an appropriate description concerning the OS for PCs?
a) Only one type of OS can be installed and executed on one PC.
b) There is no OS for PCs that are equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, any software operating with the old version of the OS can
no longer be used.
d) There exist some OSs for PCs that can be started up by using an external storage device, such as a CD-
ROM and USB memory, other than the hard disk.
Q16. In the hierarchical structure shown in the figure below, when the current directory is marked with an
asterisk (*), which of the following is the absolute path of the same directory as the directory specified by the
relative path “..\..\B\B”?
(1) A file is referenced as “directory name\ ··· \directory name\file name”, where the directory names on the
path are listed and separated with a backslash “\” in sequence, and after that, followed by a backslash “\”
and the file name.
(2) The current directory is represented by one period “.”.
(3) The directory one level above is represented by two periods “..”.
(4) When a path begins with a backslash “\”, it is assumed that the root directory has been omitted from the
beginning of the path.
(5) When a path does not start with “\”, “.”, or “..”, it is assumed that “.\” for the current directory is omitted
from the beginning of the path.
a) \A\B\B b) \B c) \B\B d) \B\B\B
Q17. Which of the following is the image data that is pasted onto the documents or Web pages created by the
word-processing software or presentation software in order to improve the representational power?
a) CSS b) CAPTCHA c) Clip art d) Template
Chapter 8 Collection (Metro)
Q18. In comparison with the program execution method where programs are started and executed
sequentially, which of the following is an appropriate description concerning characteristics of the method
where multiple programs are started and executed concurrently while switching between them in response to
events such as input/output requests? (a)
Q19. In comparison with the complier-based language processing, which of the following is an appropriate
description concerning the interpreter-based language processing?
a) Programs are executed at a slower speed.
b) Recursive function calls are not allowed.
c) Source programs are translated into machine language prior to execution.
d) It is not suited to an interactive operation environment.
Q20. Which of the following is software that can be used free of charge on a trial basis but requires a usage
fee if it continues to be used after the trial period?
a) Groupware b) Shareware c) Adware d) Freeware
Q21. Which of the following is an appropriate explanation of a general purpose computer that is also known
as a mainframe?
a) It is an ultra-small computer in which the CPU, main memory, and interface circuits are embedded in a
single chip.
b) It is a large computer that is used for a wide range of applications from office processing to technical
calculations, including mission-critical business as the main target.
c) It is a client-dedicated computer that is equipped only with the minimum functions, such as data entry and
display, in the configuration of a system where resources, such as the application programs and files, are
managed at the server side.
d) It is a portable information terminal where functions, such as schedule management, address book, and e-
mail, are made available in a device that is small enough to fit into the palm of one’s hand.
Q22. Which of the following is the unit that represents the resolution when a photograph or a picture is read
by a scanner?
a) dpi b) fps c) pixel d) ppm
Chapter 8 Collection (Metro)
2015 October IP
Chapter 8
Q9. Which of the following is an appropriate description of a multi-core processor?
b) An improvement in the reliability of the processing result is aimed at by executing the same processing
in several cores.
c) Several cores are controlled by hardware alone, and the OS is not required to have a special function.
d) The throughput of the processor depends only on the number of cores, and does not depend on the
clock frequency.
Q10. Which of the following is required for an application program to use the peripheral equipment that is
connected to a PC?
a) Compiler b) Device driver c) Plug and play d) Hot plug
Q11. Which of the following is a standard for wireless communication between a PC and peripheral devices?
a) Bluetooth b) IEEE 1394 c) PCI d) USB 3.0
Q12. Which of the following is an appropriate explanation concerning the cache memory of a PC?
a) It is placed between the CPU core and main memory, and is used to read and write data at high speed.
b) It is used to store the same data in two locations at the same time in order to improve reliability.
c) It is equipped with a mechanism that can run even a program whose size exceeds the main memory
capacity.
d) It enables simultaneous access to main memory blocks by dividing main memory into multiple blocks.
Q13. When information processing systems are classified by their processing methods as shown in the figure
below, which of the following is an explanation of a horizontal load distribution system?
a) Data is entered and the processing requests and results are displayed at client PCs. The data is processed
at the server side and the results are returned as the responses.
b) A dedicated computer such as a print server or a mail server is provided, in addition to a computer that
runs applications for processing business data.
Chapter 8 Collection (Metro)
c) Sales data of a branch office is processed by a computer in each branch office and the results are collected
and processed by a computer at the headquarters.
d) The same application runs on several computers so that processing is not concentrated in one (1)
computer.
Q14. Among the system configurations shown below, which of the following has the lowest probability of the
entire system stopping on a failure? Here, represents an identical device. For the entire system to work, at
least one device must be running when the devices are connected in parallel, and all devices must be running
when the devices are connected in serial. (d)
Q15. Which of the following is an appropriate description concerning the hardware maintenance of a system?
a) The hardware device that has not failed for a certain period of time is excluded from scheduled
maintenance.
b) It is safe to replace a failed hardware device with the latest model rather than the same model, because
compatibility is guaranteed.
c) Scheduled maintenance is performed only for the hardware device that has failed before.
d) In preventive maintenance, measures are taken before a failure occurs.
Q16. Which of the following is the most appropriate purpose of installing a business application software
package instead of self-developed application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire knowledge of software development methods
d) To improve the skills of application developers
Q17. When the log file on a Web server is analyzed in daily system administration, which of the following
can be found?
a) Web pages accessed by Web site visitors
b) The model name of a computer used by each visitor
c) The speed of a Web browser on each visitor’s computer
d) Personal information about individual Web site visitors
Chapter 8 Collection (Metro)
Q18. If data is repeatedly added to and deleted from a hard disk on a PC, data may not be stored in consecutive
areas on the hard disk. When no measures are taken, which of the following can occur?
a) Viruses cannot be detected. b) Data cannot be written correctly.
c) Data cannot be read correctly. d) Stored data cannot be read quickly.
Q19. In theory, what color is printed by a printer, when cyan, magenta, and yellow are mixed together by a
subtractive color mixture?
a) Blue b) Red c) Black d) Green
Q20. Which of the following is an appropriate explanation of MP3, which is used as a multimedia file format?
a) File compression format for G4 facsimile communication data
b) File compression format for audio data
c) File compression format for color image data
d) File compression format for digital video data
2016 April IP
Chapter 8
Q10. Which of the following is the most appropriate description concerning a compatible CPU?
a) It can run the OS or the application software that can be run on the original CPU.
b) It must not be developed nor manufactured as long as the patent of the original CPU is valid.
c) A compatible CPU for single-core CPU has been developed, while one for multi-core CPU does not
exist.
d) It is a CPU that is intended to improve the performance of an outdated PC, and is not adopted for a
new model of PC.
Q11. Which of the following is designed to improve the processing efficiency of a PC by effectively reducing
the time for the CPU to access the main memory?
a) SSD b) Virtual memory c) Cache memory d) Defragmentation
Q12. Which of the following is appropriate as a description concerning Plug and Play?
a) When a peripheral device is connected to a PC, installation and settings of the device driver are
performed automatically.
b) Software for enhancing the functions of application software is installed at a later stage.
c) Power is supplied from a PC to a peripheral device via a cable connecting them.
d) A specific program is executed, and the system performance is evaluated on the basis of the time
taken for the processing.
Chapter 8 Collection (Metro)
Q13. Which of the following is the most appropriate explanation of TCO (Total Cost of Ownership), which
is a major factor when any purchasing decision is made for a system?
a) It is the sum of the operation and management costs incurred after the installation of the system.
b) It is the sum of the costs required to troubleshoot software and hardware faults that occur after the
installation of the system.
c) It is the sum of the costs incurred during the installation of the system and the operation and
management costs incurred after the installation.
d) It is the sum of the costs incurred during the installation of the system in addition to the planning
phase of the system.
Q14. A total of 60,000 hours have passed since a computer system was put into operation. During this
operation period, a total of 100 failures occurred, and the system was repaired each time. The last repair was
completed at the 60,000th hours. If the MTTR is 60 hours, how many hours is the MTBF of the system during
this period?
a) 480 b) 540 c) 599.4 d) 600
a) Several computers connected via a network build a system that work together to achieve a high-
performance system.
b) Several processor cores composed of arithmetic circuits and other control circuits are implemented in
a single CPU.
c) The CPU processing time is allocated to several processes in turn so that the processes can be executed
simultaneously.
d) The same processing is performed for multiple data items by executing a single instruction.
Q16. The diagram below shows the directory structure for a part of a certain file system. Which of the
following is the reference from the current directory D3 (indicated with an asterisk “*”) to the file “a” under
the directory D4 (indicated with an arrow)? Here, files are specified as follows:
[Methods to specify files] (b)
(1) A file is referenced as “directory name\···\directory name\file name”, where the directory names on the
path are listed and separated with “\” (backslash) in sequence, followed by “\” and the file name.
(2) The current directory is represented by “.” (one period).
(3) The directory one level above is represented by “..” (two periods).
(4) When a reference begins with “\”, it is assumed that the root directory is omitted from the beginning of
the reference.
(5) When a reference does not start with “\”, “.”, or “..”, it is assumed that “.\”, which means that the
reference is under the current directory, is omitted from the beginning of the reference.
Chapter 8 Collection (Metro)
Q17. Which of the following is the most appropriate method for restricting the content of database to display
in accordance with the needs of each user’s business operations?
a) Setting up access rights based on the combination of data and user
b) Distributing a copy of the database limited to each user
c) Setting up a set of data items (columns) dedicated to each user
d) Setting up a password for each record in order to protect data
Q18. Which of the following is the term for the form of using a PC by itself without connecting it to any
network?
a) Thin client b) Single processor c) Standalone d) Peer to peer
a) Plug-in software bridges differences between OSs, and provides more advanced and specific
functions than the OSs.
b) Plug-in software does not work as a standalone program, but can be integrated into applications, such
as a Web browser, to enhance their functions.
c) Plug-in software is often included in applications such as a spreadsheet, and allows the users to record
and replay the series of operations performed.
d) Plug-in software is provided to replace part of a program for the purpose of modifying functions or
fixing bugs.
Q20. Which of the following is a unit that is used to represent “resolution”, one of the performance indicators
of a display or a printer?
a) bps b) dpi c) fps d) psi
Q21. Which of the following is an e-mail software that is an OSS (Open Source Software)?
a) Android b) Firefox c) MySQL d) Thunderbird
Chapter 8 Collection (Metro)
Q22. Which of the following is a typical example of a system operating on a super computer?
a) A Supply Chain Management system that is required for linkage between enterprises
b) A global weather change forecast system that requires large-scale scientific and technical computing
c) A banking system that requires a high reliability
d) An engine control system of a vehicle that requires advanced real-time control
Q24. Which of the following is an appropriate description concerning the characteristics of video streaming?
a) It is mandatory to have the data on the server beforehand, and videos of events and sports cannot be
distributed while they are being shot.
b) Deterioration in picture quality due to partial lack of reception data can be completely eliminated.
c) Preparation time is not required for starting playback of a video, and therefore, the viewer can
immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as soon as some data
has been read.
Q25. From the “Product” table below, products whose supplier is “Company A” and the price is 1.4 dollars
or more, and products whose supplier is “Company B” and the price is 1.7 dollars or less are extracted. Which
of the following is a list of all of the obtained product names?
a) The website provides data in RSS or Atom format, which outlines information of updates or a
summary of the page.
b) The currently displayed web page is a diary-like website operated by a person or a group.
c) The currently displayed web page is bookmarked in the browser on the PC in use.
d) In a blog, when a link has been set up to another blog, the setup of the link has been notified to the
link destination.
2016 October IP
Chapter 8
Q9. Which of the following is an explanation of a hot plug?
a) A function that enables attachment or detachment of a peripheral device while PC power remains on
b) Software that is installed afterwards in order to enhance the functions of application software
c) A mechanism of supplying power from a PC to a peripheral device via a cable connected to the peripheral
device
d) A technique of executing a specific program and evaluating system performance on the basis of the time
taken for the processing
Q10. Which of the following is an appropriate description concerning clock frequency of CPU?
a) The CPUs which have the same clock frequency are equal in performance, regardless of whether they
are 32-bit or 64-bit.
b) The CPU with higher clock frequency gives higher heat generation than others in the same type of
CPU, so heat dissipation becomes important.
c) Clock frequency and network transfer rate are in direct proportion when the machine is connected to
the network.
d) For a multi-core processor, the throughput does not depend on the clock frequency.
Q13. Concerning configuration methods A through C for systems that are composed of two (2) sets of devices,
which of the following is the list in ascending order, from left to right, of service downtime that is caused by
a fault of one of the two (2) sets?
A Dual system
B Duplex system (cold standby method)
C Duplex system (hot standby method)
a) Fault of one (1) device in A, Fault of the primary device in C, Fault of the primary device in B
b) Fault of the primary device in B, Fault of one (1) device in A, Fault of the primary device in C
c) Fault of the primary device in C, Fault of one (1) device in A, Fault of the primary device in B
d) Fault of the primary device in C, Fault of the primary device in B, Fault of one (1) device in A
Q14. Which of the following is an appropriate explanation of the hot standby system?
a) It is a system where a collection of various types of hardware, software, and data on the Internet is provided
to the user.
b) It is a system where a high level of reliability can be obtained by simultaneously operating the two sets of
equipment and performing the same processing while crosschecking the results.
c) It is a system where a backup machine is always kept on standby in an operable state and is immediately
switched into operation at the occurrence of a failure.
d) It is a system where a backup machine is arranged, and at the occurrence of a failure, the operator in charge
starts up the backup machine to switch the production machine to the backup machine.
Q15. When a computer system has operated for 1,200 hours, the status of the normal operation time and the
repair time is as shown in the table below. What is the value of MTTR (Mean Time To Repair, in hours) of
the system?
a) 10 b) 15 c) 20 d) 45
Chapter 8 Collection (Metro)
Q16. When a record in a file is modified, which of the following is an appropriate way of identifying the
modified contents?
a) Keeping a record of the size and the modified date of a file
b) Keeping a copy of a file and comparing it to the modified one later
c) Keeping a record of the number of records into the file
d) Keeping records sorted in ascending order of the key field
Q17. In a Web server, five (5) directories have a hierarchical structure as shown in the figure below. In an
HTML document stored in directory B, which of the following references the file img.jpg stored in the
directory E? Here, directories and files are referenced using the method described below. (b)
[Method of referencing directories and files]
(1) A file is referenced as “directory name/ ··· /directory name/file name”, where the directory names on
the path are listed and separated with “/” in sequence, followed by the file name.
(2) The current directory is represented by “.” (a period).
(3) The directory one level above is represented by “..” (two (2) periods).
(4) When a reference begins with a “/”, it is assumed that the root directory has been omitted from the
beginning of the reference.
(5) When a reference does not start with “/”, “.” (a period), or “..” (two (2) periods), it is assumed that “./”
for the current directory has been omitted from the beginning of the reference.
a) It is a state in which the processes of a computer are prohibited from getting intentional or accidental
access to information that usually must not be accessed.
b) It is a state in which, if the authentication of a user fails more than the limited number of times, the
user is prohibited from accessing the computer.
c) It is a state in which, when shared resources are exclusively used, two processes are endlessly waiting
for each other to release the lock of a shared resource.
d) It is a state in which processes in the ready state under a multi-programming environment have used
up the CPU time allocated by the OS.
Chapter 8 Collection (Metro)
Q19. The types of programs that are executed at the startup time of a PC are generally classified into three
categories: BIOS, OS, and resident applications. Which of the following is the list that is arranged in the
sequence of the execution of the programs?
a) BIOS OS Resident applications
b) OS BIOS Resident applications
c) OS Resident applications BIOS
d) Resident applications BIOS OS
Q20. Which of the following is the purpose of the virtual memory system that is known as one of the functions
provided by an OS?
a) To prevent an application program from accessing the protected area on main memory used by the OS
b) To reduce electricity consumption during the idle state, by stopping the power supply after data is
written from main memory to external storage
c) To make it possible to execute a program even if the program requires more storage capacity than main
memory
d) To accelerate CPU processing with the assistance of a higher speed storage device than main memory
Q21. Which of the following is a device that is used to recognize handwritten characters and convert them
into character codes?
2017 April IP
Chapter 8
Q10. Among the interface standards (i) through (iv), which of the following contains all and only the standards
that do not need a physical connection with cables and the like?
(i) Bluetooth (ii) IEEE 1394 (iii) IrDA (iv) USB 3.0
a) (i), (ii) b) (i), (iii) c) (ii), (iii) d) (iii), (iv)
Q11. Which of the following is software that mediates between a device connected to a PC and an OS or an
application software, and that controls and operates the device?
a) Archiver b) Installer c) Device driver d) Middleware
Q12. Which of the following is a storage device or medium that is based on semiconductor memory
technology?
a) CD-ROM b) DVD-RAM c) BD d) SSD
Chapter 8 Collection (Metro)
Q13. Which of the following is a method of writing the same data to multiple hard disks simultaneously and
improving reliability rather than performance?
a) Striping b) Paging c) Interleaving d) Mirroring
Q14. The system configurations A through C are made up by connecting multiple identical devices. Which of
the following is a list where A through C are sorted in descending order of availability? Here, represents a
device. The parallel connection requires only one (1) of the devices to be functional, while the series
connection requires all devices to be functional.
a) A, B, C b) B, A, C c) C, A, B d) C, B, A
a) It provides two (2) sets of systems that perform the same processing and checks the correctness of the
processing by comparing the results. If one of the systems fails, it isolates the failed system and
continues the processing.
b) The same two (2) devices are used, so that the processing capability can be increased to double that of
a simplex system.
c) It provides a currently used system for performing online processing and also a backup system that is
made on standby while performing batch processing. In the event of a failure in the currently used
system, it switches to the backup system, starts the online processing, and continues the service.
d) It connects multiple devices in series and configures them in such a way that the load of each function
is assigned to one of them, so that processing capability is high. But if any one of the devices in charge
of any function fails, it becomes unable to provide the service.
Q16. When a computer system operates for 1,200 hours, the status of the normal operation time and the repair
time is shown in the table below. What is the value of MTTR (Mean Time To Repair, in hours) of the system?
a) 10 b) 15 c) 20 d) 45
Chapter 8 Collection (Metro)
Q17. There is a system where a full backup is made after closing time every Sunday, and an incremental
backup is made after closing time on Monday through Saturday. On a Wednesday, a failure happened during
business hours, so a decision was made to restore data to the state at the time of closing on Tuesday by using
backup files. Which of the following contains all the necessary backup files for restoring data? Here, an
incremental backup file means a backup file that contains only the data that has been modified since the
previous backup file (a full backup file or an incremental backup file) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
Q18. Which of the following is an appropriate combination of software that includes only OSS (Open Source
Software)?
a) Internet Explorer, Linux, PostgreSQL
b) Internet Explorer, PostgreSQL, Windows
c) Firefox, Linux, Thunderbird
d) Firefox, Thunderbird, Windows
Q19. Which of the following is an appropriate description concerning the OS for PCs?
a) Only one type of OS can be installed and executed on one PC.
b) There is no OS for PCs that are equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, any software operating with the old version of the OS can
no longer be used.
d) There exist some OSs for PCs that can be started up by using an external storage device, such as a
CD-ROM and USB memory, other than the hard disk.
Q20. Which of the following is the most appropriate purpose of installing a business application software
package instead of self-developed application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire knowledge of software development methods
d) To improve the skills of application developers
Chapter 8 Collection (Metro)
Q21. Which of the following is the most appropriate explanation of a “multimedia authoring tool”?
a) It is a tool that is used to create multimedia content by combining materials, such as image, sound,
and text, on the screen.
b) It is a tool that is used to play back multimedia content, such as image, sound, and text, in the PC
environment.
c) It is a tool that is used to search for multimedia information, such as image, sound, and text.
d) It is a tool that is used to interactively define schema for multimedia database containing information,
such as image, sound, and text.
Q22. What is the minimum amount (in Mbytes) of virtual memory that is required under the conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
2. Memory required for applications: An amount of 50 Mbytes is required for each application, and a total
can be calculated by multiplying it by the number of applications that run concurrently. Eight applications
run concurrently.
3. Memory required for controlling main memory or other related functions: 512 Mbytes of main memory
and another 20 Mbytes is required.
4. Required virtual memory: The required amount is the sum of the above items 1 through 3.
a) 762 b) 782 c) 1,112 d) 1,132
2017 October IP
Chapter 8
Q10. Which of the following is an appropriate explanation of HDMI?
a) It is an interface for an audio-visual device that handles the input and output of video, audio, and control
signals through a single cable.
b) It is an interface that makes use of the infrared rays used for the exchange of information between cell
phones.
c) It is a serial interface that connects a peripheral device, such as an external hard disk, through a cable.
d) It is a wireless interface that makes use of radio waves and can communicate even when there is a slight
shielding.
Chapter 8 Collection (Metro)
Q11. Which of the following is an appropriate explanation of GPU?
a) It is an index that shows the throughput of a CPU in terms of how many billions of instructions it can
execute per second.
b) It is a frequency signal that synchronizes the arithmetic processing of CPUs.
c) It is a storage unit that is placed between a CPU and a main memory, and has a higher reading and writing
speed than the main storage unit.
d) It is an arithmetic logical unit that is used instead of a CPU to accelerate processing such as image
processing for 3D graphics.
Q12. Which of the following is a port on a PC’s motherboard for the installation of a memory module?
a) PC card slot b) Flash memory c) Memory interleave d) Memory slot
Q13. In the description below concerning the connection between a PC and a peripheral device, which of the
following is an appropriate combination of words to be inserted into blanks A and B?
The connection of a new peripheral device to a PC requires A, but if a peripheral device that supports B
function is connected, the A is installed automatically and the device will be ready to use. (a)
Q14. Which of the following is an appropriate description concerning the hardware maintenance of a system?
a) The hardware device that has not failed for a certain period of time is excluded from scheduled
maintenance.
b) It is safe to replace a failed hardware device with the latest model rather than the same model, because
compatibility is guaranteed.
c) Scheduled maintenance is performed only for the hardware device that has failed before.
d) In preventive maintenance, measures are taken before a failure occurs.
Q15. Which of the following is the most appropriate explanation of TCO (Total Cost of Ownership) that
represents the cost of a system?
a) The total cost of a company’s initial investment in an information system
b) The total cost incurred in system development
c) The total cost including system implementation, operation, maintenance, and education
(2) The minimization of the frequency of maintenance and inspections after stable operation of the system
starts
(3) The grouping of multiple redundant network lines into a single high-speed line
(4) The redundancy of power supply with the use of UPS (Uninterrupted Power Supply) etc.
a) (1), (3) b) (1), (4) c) (2), (3) d) (2), (4)
Q17. When the log file on a web server is analyzed in daily system administration, which of the following can
be found?
a) Web pages accessed by website visitors
b) The model name of a computer used by each visitor
c) The speed of a web browser on each visitor’s computer
d) Personal information about individual website visitors
Q19. Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the application programs
can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary storage device, to
application programs.
c) Since an OS has the function of automatically converting character sets in a file, application programs
can access the file without regard to the type of character set.
d) The source code of an OS should be disclosed so that application programs can freely use the various
functions of the OS.
Chapter 8 Collection (Metro)
Q20. Which of the following is an appropriate explanation of multitasking?
a) Several computers connected via a network work together to achieve a high-performance system.
b) Several processor cores composed of arithmetic circuits and other control circuits are implemented in
a single CPU.
c) The CPU processing time is allocated to several processes in turn so that the processes can be executed
simultaneously.
d) The same processing is performed for multiple data items by executing a single instruction.
Q21. As shown in the directory structure below, when D3 marked by an asterisk (*) is the current directory,
which of the following the appropriate directory path that can designate file A under directory D4 marked by
an arrow? Here, a file is designated as follows: (b)
Q22. Which of the following is an appropriate description concerning OSS (Open Source Software)?
a) Source code can be edited and then redistributed.
b) Source code is free of charge, but maintenance and support are charged.
c) Copyrights are waived, so it can be used without permission.
d) If the copyright is not waived, the operability must be warranted.
Q23. Which of the following is a computer that is used for activities such as global scale environmental
simulations and DNA analysis, and was developed with the objective of processing large amount of
calculations at ultra-high speed?
a) Virtual computer b) Super computer
c) General purpose computer d) Microcomputer
Chapter 8 Collection (Metro)
2018 March IP
Chapter 8
Q10. Which of the following is appropriate as a description concerning Plug and Play?
a) When a peripheral device is connected to a PC, the installation and settings of the device driver are
performed automatically.
b) Software for enhancing the functions of application software is installed at a later time.
c) Power is supplied from a PC to a peripheral device via a cable connecting them.
d) A specific program is executed, and the system performance is evaluated on the basis of the time
taken for the execution.
Q11. Which of the following is a characteristic common to IEEE 1394 and USB that are often used for
connection interfaces between PCs and peripheral devices?
a) Peripheral devices can be connected and disconnected while the PC and/or devices are powered on.
b) A maximum transfer rate is 100 Mbits/second.
c) A unique ID must be assigned to each device connected to a PC.
d) Data can be transmitted in parallel over multiple data lines.
Q12. Which of the following is an appropriate combination of words that are inserted into blanks A and B in
the description below concerning the execution sequence of instructions in a computer?
In a computer, the instructions are executed in the sequence shown below. (b)
(1) Refer to the program counter.
(2) the instruction.
(3) Set the program counter to the main memory address of the next instruction.
(4) the instruction.
(5) Execute processing according to the instruction.
(6) Return to (1).
Q13. Which of the following printers can take multiple copies simultaneously by using carbon paper or non-
carbon paper at the time of printing?
a) Inkjet printer b) Impact printer c) Thermal printer d) Laser printer
Chapter 8 Collection (Metro)
Q14. In the new system environment of Company X, three systems including the customer management
system, the ordering management system, and the call center system run at separate locations and connected
via a network and they can complement one another in the event of a failure. Also, the system operations are
managed at their respective locations. Which of the following is the greatest merit of this new system
environment?
a) The integration of operations helps reduce the number of operating staff.
b) Risks of disasters and other problems can be diversified.
c) The versions of software can be controlled easily.
d) Backup files can be managed in a consolidated manner.
Q16. Which of the following is the term for the form of using a PC by itself without connecting it to any
network?
a) Thin client b) Single processor c) Standalone d) Peer to peer
Q17. The diagram below shows the directory structure for a part of a certain file system. Which of the
following is the reference from the current directory D3 (indicated with an asterisk “*”) to the file “a” under
the directory D4 (indicated with an arrow)? (b)
Here, files are specified as follows: [Methods to specify files]
(1) A file is referenced as “directory name\···\directory name\file name”, where the directory names on
the path are listed and separated with “\” (backslash) in sequence, followed by “\” and the file name.
(2) The current directory is represented by “.” (one period).
(3) The directory one level above is represented by “..” (two periods).
(4) When a reference begins with “\”, it is assumed that the root directory is omitted from the beginning
of the reference.
(5) When a reference does not start with “\”, “.”, or “..”, it is assumed that “.\”, which means that the
reference is under the current directory, is omitted from the beginning of the reference.
Chapter 8 Collection (Metro)
Q18. Which of the following is an OS function that executes several application programs progressively in
turn on a single PC, such as when a file is downloaded from a web site while data is processed with spreadsheet
software?
a) Virtual reality b) Dual core c) Dual system d) Multitasking
Q19. Which of the following is an appropriate description concerning the use of OSS (Open Source Software)?
a) OSS users have an obligation to pay the developer the fee for the software.
b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.
c) OSS cannot be used in the field of genetic research.
d) Software derived from the published OSS can be made available as OSS.
Q21. The types of programs that are executed at the startup time of a PC are generally classified into three
categories: BIOS, OS, and startup services. Which of the following is the list that is arranged in the sequence
of the execution of the programs?
a) BIOS OS Startup services
b) OS BIOS Startup services
c) OS Startup services BIOS
d) Startup services BIOS OS
Q23. Which of the following is a typical example of a system operating on a super computer?
a) A Supply Chain Management system that is required for linkage between enterprises
b) A global climate change forecast system that requires large-scale scientific and technical computing
c) A banking system that requires a high reliability
d) An engine control system of a vehicle that requires advanced real-time control
Chapter 8 Collection (Metro)
Q24. Which of the following is an input method where a touch panel is operated by touching it in multiple
locations simultaneously?
a) Touch typing b) Double click c) Multitasking d) Multi-touch
2018 October IP
Chapter 8
Q11. Which of the following is designed to virtually reduce the time for the CPU to access the main memory,
in order to improve the processing efficiency of a PC?
a) SSD b) Virtual memory
c) Cache memory d) Defragmentation
Q13. Which of the following is the most appropriate description concerning a multi-core processor?
a) Several microprocessors are installed in one PC with the purpose of improving the reliability of the
processing results by performing the same processing at the same time in each processor.
b) If the structure and clock frequency of the arithmetic logical unit are the same, a quad core processor
has four times as much processing power as a dual core processor.
c) The clock frequency is temporarily increased according to the load of the processing so as to achieve
high-speed processing.
d) A single CPU has several processing circuits that perform operations, and each processing circuit
performs different processing at the same time with the purpose of improving the processing power.
Q14. In reliability engineering, which of the following is the index represented by the y-axis of a bathtub
curve?
Q16. When the processing speed of the system overall is constrained because of slow processing speed in one
of the components, which of the following is a term for the component of a system that is causing the problem?
a) Throughput b) Defragmentation
c) Flowchart d) Bottleneck
Q19. Which of the following is the image data that is pasted onto the documents and web pages created by
the word-processing software and presentation software so as to improve the expressive power?
a) CSS b) Capture
c) Clip art d) Template
Q21. Which of the following is an advantage of using OSS (Open Source Software)?
a) Technical support can be received free of charge from the developer at the time of installation.
b) The software is not prone to infection of viruses, as the source code is not released.
c) Compensation can be received for damages caused by defects in the software.
d) The source code can be modified to fit the environment of the user in accordance with the license terms.
Q22. Multiple files stored on a hard disk are used in work, from Monday to Friday. In order to handle failure
of the hard disk, the data is backed up to another hard disk after the end of each day’s work. When the backup
has following conditions, what is the total time required (in minutes) to perform backups of data for Monday
to Friday?
[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One file at a time is backed up;
backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday, all files are backed
up, whether or not they have been modified.
a) 25 b) 35 c) 50 d) 150
Chapter 8 Collection (Metro)
Q23. Which of the following is an appropriate explanation of a blade server?
a) It uses multiple board-type computers equipped with CPU and memory, housed in a dedicated body.
b) It enables the use of office software, e-mail software, etc. as web services over the Internet.
c) It is embedded in equipment such as home appliances or automobiles.
d) It supports handwriting input function by using a liquid crystal display with a touch panel.
2019 April IP
Chapter 8
Q10. Which of the following is an appropriate description concerning a CPU?
a) The cache memory that is integrated into a CPU is used to virtually extend the capacity of the main
memory.
b) A CPU is equipped with the arithmetic and logical function that serves as part of control functions.
c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data volume processed at a
time, but the width in bits is not related to the performance.
d) For CPUs that have the same architecture, the higher the clock frequency, the faster the response time.
Q12. Among the interface standards (i) through (iv), which of the following contains all and only the standards
that do not need a physical connection with cables and the like?
(i) Bluetooth
(ii) IEEE 1394
(iii) IrDA
(iv) USB 3.0
a) (i), (ii) b) (i), (iii) c) (ii), (iii) d) (iii), (iv)
b) Software that is started immediately after a PC is turned on, and enables basic input/output to the hard
disk and the keyboard before the OS starts
Chapter 8 Collection (Metro)
c) Software to be embedded in a Web browser for displaying pages that contain video
d) Software that integrates multiple files into one (1) file and restores the original files from the file
Q14. Among the system configurations shown below, which of the following has the lowest probability of
causing the entire system to stop at the occurrence of a failure? Here, represents an identical device.
When the devices are connected in parallel, only one device must be running, and when the devices are
connected in serial, all devices must be running. (d)
Q15. When MTBF is 600 hours and MTTR is 12 hours, what is the approximate availability?
a) 0.02 b) 0.20 c) 0.88 d) 0.98
a) It provides two (2) sets of systems that perform the same processing and checks the correctness of the
processing by comparing the results. If one of the systems fails, it isolates the failed system and
continues the processing.
b) The same two (2) devices are used, so that the processing capability can be increased to double that of a
simplex system.
c) It provides a currently used system for performing online processing and also a backup system that is
made on standby while performing batch processing. In the event of a failure in the currently used
system, it switches to the backup system, starts the online processing on it, and continues the service.
d) It connects multiple devices in series and configures them in such a way that the load of each function
is distributed among them, so that processing capability is high. But if any one of the devices fails, it
becomes unable to provide the service.
Q17. What is the minimum amount (in Mbytes) of virtual memory that is required under the conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
2. Memory required for applications: An amount of 50 Mbytes is required for each application, and a total
is calculated by multiplying it by the number of applications that run concurrently. Eight (8) applications
run concurrently.
3. Memory required for controlling main memory or other related functions: In addition to 512 Mbytes of
main memory, a minimum amount of 20 Mbytes is required.
4. Required virtual memory: The required amount is the sum of the above 1 through 3.
a) 762 b) 782 c) 1,112 d) 1,132
Chapter 8 Collection (Metro)
Q18. Which of the following explains the functions of an archiver, which is one (1) type of data management
utility?
a) It creates areas on hard disks for storing data and managing such stored data.
b) It packs multiple files into a single file or restores them for data backup or distribution.
c) It protects data through such functions as file protection to secure the data from unauthorized use or
destruction, and copy protection to prevent illegal data copying.
d) On a fragmented hard disk, it reorganizes files by placing them in consecutive blocks as much as
possible.
Q19. Which of the following is an appropriate description concerning OSs used for PCs?
a) Since the interface between an OS and application programs is standardized, the application programs
can be developed without regard to the type of OS.
b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary storage device, to
application programs.
c) Since an OS has the function of automatically converting character set of a file, application programs
can access the file without regard to the character set.
d) The source code of an OS is required to be disclosed so that application programs can be free to use the
various functions of the OS.
Q21. Which of the following is the most appropriate purpose of installing a business application software
package instead of developing own application software?
a) To enhance the environment of development
b) To reduce the cost of development
c) To acquire the knowledge of software development methods
d) To improve the skills of application developers
Q22. Which of the following is an appropriate description about the function keys of a PC?
a) They are the keys where specific functions are assigned for each application and OS.
b) They display a keyboard shape on a screen and enable input processing with software.
c) They have a security role and are keys for performing encryption and decryption.
d) They are information to identify specific lines uniquely in a database.
Q23. Which of the following is a computer that is used for tasks such as global scale environmental
simulations and DNA analysis, and was developed with the objective of processing large amount of
calculations at ultra-high speed?
a) Virtual computer b) Super computer
c) General purpose computer d) Microcomputer
Chapter 8 Collection (Metro)
Q24. Which of the following is the copyright protection technology that is used for a DVDR and an SD card,
and allows digital content to be duplicated to recording media only once?
a) AR b) CPRM c) HDMI d) MIDI
2019 October IP
Chapter 8
Q10. Which of the following is an appropriate description concerning the primary and secondary cache
memory that a CPU is equipped with?
a) The primary cache memory has larger capacity than the secondary cache memory.
b) The secondary cache memory is slower than the main memory in writing and reading.
c) When the CPU reads data, it first accesses the primary cache memory, and then it accesses the
secondary cache memory if no data is available.
d) All of the data that is required for a process needs to be present on the primary or secondary cache
memory when a program starts.
Q11. In the description below concerning the connection between a PC and a peripheral device, which of the
following is an appropriate combination of words to be inserted into blanks A and B?
The connection of a new peripheral device to a PC requires , but if a peripheral device that supports
function is connected, the is installed automatically and the device can be used. (a)
Q12. Which of the following is the most appropriate description concerning a compatible CPU?
a) It can run the OS or the application software that can be run on the original CPU.
b) It must not be developed nor manufactured as long as the patents of the original CPU are valid.
c) A compatible CPU for single-core CPU has been developed, while one for multi-core CPU does not
exist.
d) It is a CPU that is intended to improve the performance of an outdated PC, and is not adopted for a
new model of PC.
d) It is a wireless interface that makes use of radio waves and can perform communication even when
there is a slight shielding.
Q14. Two (2) HDDs are connected to a server. If only one (1) of the HDDs fails, the operation needs to be
able to continue. Which of the following is an appropriate configuration that should be used?
a) Striping b) Data mining c) Tethering d) Mirroring
Q15. Which of the following includes all the appropriate measures to enable the normal execution of
processing even in the event of a failure in part of a system?
(1) The configuration of HDDs with mirroring
(2) The minimization of the frequency of maintenance and inspections after stable operation of the system
starts
(3) The grouping of multiple redundant network lines into a single high-speed line
(4) The redundancy of power supply with the use of UPS (Uninterrupted Power Supply) etc.
a) (1), (3) b) (1), (4) c) (2), (3) d) (2), (4)
Q16. Which of the following is an appropriate explanation of the hot standby system?
a) It is a system configuration where a collection of various types of hardware, software, and data on the
Internet is provided to the user.
b) It is a system configuration where a high level of reliability can be obtained by simultaneously operating
the two sets of equipment and by always performing the same processing while cross-checking the
results.
c) It is a system configuration where a backup machine is always kept ready in an operable state and is
immediately switched into operation at the occurrence of a failure.
d) It is a system configuration where a backup machine is arranged, and at the occurrence of a failure, the
operator in charge starts up the backup machine to switch the production machine to the backup
machine.
Q18. Which of the following is an appropriate description concerning Open Source Software (OSS)?
a) Source code can be edited and then redistributed.
b) Source code is free of charge, but maintenance and support are charged.
c) Copyrights are waived, so it can be used without permission.
d) If the copyright is not waived, the operability must be warranted.
Chapter 8 Collection (Metro)
Q19. There is a system where a full backup is made after closing time every Sunday, and an incremental
backup is made after closing time on Monday through Saturday. On a Wednesday, a failure happened during
business hours, so a decision was made to restore data to the state at the time of closing on Tuesday by using
backup files. Which of the following lists all the necessary backup files for restoring data? Here, an
incremental backup file means a backup file that contains only the data that has been modified since the
previous backup file (a full backup file or an incremental backup file) was made.
a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) A full backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday
Q22. As shown in the directory structure below, when D3 marked by an asterisk (*) is the current directory,
which of the following the appropriate directory path that can designate file A under directory D4 marked by
an arrow? Here, a file is designated as follows:
[Method of file designation]
(1) A file is referenced as “directory name\···\directory name\file name”, where the directory names on
the path are listed and separated with “\” in sequence, followed by the file name.
(2) The current directory is represented by a period “.”.
(3) A directory that is one level higher is represented by two periods “..”.
(4) When the path name string begins with a backslash “\”, it is assumed that the root directory is omitted
from the beginning of the string.
(5) When the path name string does not begin with “\”, “.”, or “..”, it is assumed that “ .\” for the current
directory is omitted from the beginning of the string.
a) ..\..\D2\D4\A
b) ..\D2\D4\A
c) D1\D2\D4\A
d) D2\D4\A
Q23. Which of the following is a device that is used to recognize handwritten characters and convert them
into character codes?
a) BD-R b) CD-R c) OCR d) OMR
Chapter 8 Collection (Metro)
2020 April IP
Chapter 8
Q10. Which of the following storage units has the shortest access time?
a) HDD b) SSD c) Cache memory d) Main memory
Q11. Which of the following lists all and only the appropriate descriptions about a 32-bit CPU and a 64-bit
CPU?
I When a 32-bit CPU and a 64-bit CPU are compared, a 64-bit CPU has a larger theoretical maximum
memory space.
II There is no 32-bit OS that runs on a PC with a 64-bit CPU.
III In terms of the read and write speed of a USB memory, the speed of a PC with a 64-bit CPU is twice
as fast as that of a PC with a 32-bit CPU.
a) I b) I, II c) II, III d) III
a) Two (2) types of OS are installed on a single PC, and the PC is configured so that either OS can be
booted.
b) Two (2) displays are connected to a single PC in order to have a single continuous wide display area
across the two (2) displays.
c) Two (2) strips of memory with the same standard and capacity are combined, and the effective speed
of data transfer is increased by accessing each strip concurrently.
d) The integrated circuits of two (2) processors are implemented on a single LSI package, and the two (2)
processors can execute separate instructions concurrently.
Q13. Which of the following is required for an application program to use the peripheral equipment that is
connected to a PC?
a) Compiler b) Device driver c) Plug and play d) Hot plug
Q14. Among the methods I through III for logically handling multiple hard disks as one (1), which of the
following lists all and only those methods that can recover data even if one of the constituent hard disks fails?
I RAID5
II Striping
III Mirroring
a) I, II b) I, II, III c) I, III d) II, III
Chapter 8 Collection (Metro)
Q15. There is a system where two units of the same device with availability of 0.9 are connected in series.
When one (1) more unit of the same device is added so that three (3) units of the device are connected in series
in the system, which of the following is the appropriate description of the availability of the entire system,
when the system with two units of the device in series is a reference point?
a) It increases by 10%. b) It remains unchanged.
c) It decreases by 10%. d) It decreases by 30%.
Q16. Which of the following is the most appropriate explanation of TCO (Total Cost of Ownership) that is a
major factor when any purchasing decision is made for a system?
a) It is the sum of the operation and management costs incurred after the installation of the system.
b) It is the sum of the costs required to troubleshoot software and hardware faults that occur after the
installation of the system.
c) It is the sum of the costs incurred during the installation of the system and the operation and
management costs incurred after the installation.
d) It is the sum of the costs incurred during the installation of the system and the planning phase of the
system.
Q17. When directories d1 and d2 are placed on a web server as shown in the figure, which of the following
descriptions specifies the referencing of the webpage file f2.html on directory d2 from the webpage file f1.html
on directory d1 (current directory)? Here, the reference method of files is as follows.
[Reference method]
(1) A file is referenced as “directory name /.../ directory name / file name”, where the directory names on
the path are listed and separated with “ / ” in sequence, followed by a “ / ” and the file name.
(2) The current directory is represented by “.”.
(3) The directory one (1) level above is represented by “..”.
(4) When a reference begins with a “ / ”, it is assumed that the root directory is omitted from the beginning
of the reference.
a) ./d2/f2.html b) ./f2.html
c) ../d2/f2.html d) d2/../f2.html
Q19. Which of the following is an OS function that executes multiple application programs little by little in
turn concurrently on a single PC, such as when a file is downloaded from a web site while data is processed
with spreadsheet software?
a) Virtual reality b) Dual core c) Dual system d) Multitasking
Chapter 8 Collection (Metro)
Q20. When a record in a file is modified, which of the following is an appropriate way of identifying the
modified contents?
a) Logging the size and the modified date of a file
b) Keeping a copy of a file and comparing it to the modified one later
c) Logging the number of records into the file
d) Keeping records sorted in ascending order of the key field
Q21. Which of the following is a term that means the validation of a software license by using the product ID
and the user’s hardware information, in order to prevent unauthorized use of the software?
a) Activation b) Cloud computing c) Streaming d) Fragmentation
2020 October IP
Chapter 8
Q10. Which of the following is the appropriate description concerning a device driver that enables the use of
peripheral equipment with a PC?
a) When a hard disk drive is initialized and the operating system is reinstalled, it is necessary to reinstall
device drivers that were installed separately to the operating system.
b) When new application software is installed, it is necessary to reinstall all device drivers that this
software uses.
c) Even if a device driver is no longer required, a user cannot delete the device driver once it is installed.
d) If only one (1) device driver for a printer is installed, all printers can be used regardless of manufacturer
or model.
Q11. Which of the following is an appropriate description of the cache memory of a CPU?
a) The size of cache memory is greater than or equal to the size of main memory.
b) Cache memory is used to reduce the effective access time of main memory.
Chapter 8 Collection (Metro)
c) On computers with a large main memory, there is no effect of cache memory.
d) In order to increase the hit rate, the user specifies the frequently used programs to be resident in cache
memory.
Q12. A list of PC hardware contains the items that are shown in the Table. Which of the following is an
appropriate description concerning these items?
a) The operating frequency shows the number of the signals generated per second that synchronize the
timing of arithmetic processing, and the internal processing speed of the CPU is inversely proportional
to the operating frequency.
b) The number of cores shows the number of core parts that are built into the CPU and are responsible for
arithmetic processing, and there are dual core CPUs and quad core CPUs, etc.
c) The number of threads shows the number of threads that can be executed simultaneously in applications,
and the smaller the number the higher the speed of processing can be.
d) Cache memory is a storage unit that is placed inside the CPU and can be written to and read from at high
speed, and secondary cache is closer to the CPU core than primary cache is.
Q13. Which of the following is appropriate as a description concerning Plug and Play?
a) When a peripheral device is connected to a PC, installation and settings of the device driver are performed
automatically.
b) Software for enhancing the functions of application software is installed separately.
c) Power is supplied from a PC to a peripheral device via a cable connected to the peripheral device.
d) A specific program is executed, and the system performance is evaluated on the basis of the time taken
for the processing.
Q14. Which of the following is an explanation of the reliability index that is calculated by the expression
below?
a) 10 b) 15 c) 20 d) 45
Q16. The system configurations A through C are made up by connecting multiple identical devices. Which of
the following is a list where A through C are sorted in descending order of availability? Here,
represents a device. The parallel connection requires only one (1) of the devices to be functional, while the
series connection requires all devices to be functional.
a) A, B, C b) B, A, C c) C, A, B d) C, B, A
Q17. When the types of programs that are executed when a PC is started are broadly classified into three
categories, namely BIOS (Basic Input Output System), OS, and resident application program, which of the
following is the order of execution of the programs?
a) BIOS, OS, resident application program b) OS, BIOS, resident application program
c) OS, resident application program, BIOS d) Resident application program, BIOS, OS
Q19. Which of the following is an advantage of using OSS (Open Source Software)?
a) Technical support is provided free of charge from the developer at the time of installation.
b) The software is not prone to infection of viruses, as the source code is not released.
c) Compensation can be received for damages caused by defects in the software.
d) The source code can be modified to fit the environment of the user in accordance with the license
conditions.
Q20. Multiple files stored on a hard disk are used in work, from Monday to Friday. In order to handle failure
of the hard disk, the data is backed up to another hard disk after the end of each day’s work. When the backup
has following conditions, what is the total time required (in minutes) to perform backups of data from Monday
to Friday?
Chapter 8 Collection (Metro)
[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One (1) file is backed up at a
time; backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday, all files are backed
up, whether or not they have been modified.
a) 25 b) 35 c) 50 d) 150
Q21. Which of the following is an appropriate combination of software that includes only OSS (Open Source
Software)?
a) Internet Explorer, Linux, PostgreSQL b) Internet Explorer, PostgreSQL, Windows
c) Firefox, Linux, Thunderbird d) Firefox, Thunderbird, Windows
Q22. Which of the following is an appropriate description concerning the OS for PCs?
a) Each PC allows only one (1) type of OS to be installed and run on it.
b) There is no OS for PCs equipped with a 64-bit CPU.
c) When an OS is upgraded to a new version, all of the software operating with the old version of the OS
cannot be used any more.
d) There exist some OSs for PCs that can be started up by using an external storage device, such as a CD-
ROM and USB memory, other than the hard disk.
b) A server is built by plugging the required number of blades that have a computer function into a chassis,
so the number of machines can be flexibly increased and decreased.
c) The computers that constitute a server are used without being connected to other servers, so security can
be improved.
d) Multiple computers that constitute a server perform the same processing and the results of the processing
are cross-checked against each other, so reliability can be improved.
Q24. Which of the following is an input method where a touch panel is operated by touching it in two or more
locations simultaneously?