Q2 2021 Fundamental IT Engineer Examination (Morning)
Q2 2021 Fundamental IT Engineer Examination (Morning)
Q2 2021 Fundamental IT Engineer Examination (Morning)
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the sample question below.
[Sample Question]
Q1. Which of the following should be used for marking your answer on the answer
sheet?
Since the correct answer is “d) Pencil”, mark the answer as below:
[Sample Answer]
Q1 ウ
– 1 –
Symbols commonly used in questions
Unless otherwise noted in each question, the following notational conventions are applied as
shown in the table.
Logic Circuit
AND gate
NAND gate
OR gate
NOR gate
Buffer
NOT gate
Company names or product names mentioned in the examination questions are the trademarks or registered
trademarks of their respective companies or organizations. The symbol ® or ™ is not used within.
– 2 –
Q1. Which of the following is equivalent to the logic expression below?
Here, the letters are logic variables; , ∙ , and ̅ are OR, AND, and NOT
operations on the corresponding variables, respectively.
a) ∙ b) ∙
c) ∙ ∙ d) ̅ ∙
Q2. Which of the following is a decimal that is represented as a finite digit octal fraction?
Q3. The GCD (Greatest Common Divisor) of two positive integers, x0 and x1 (x0 > x1), is
computed by the procedure below. When x0 = 175 and x1 = 77, how many times should step
(2) of this procedure be executed before it stops? Here, “A ← B” indicates that B is substituted
for A.
[Procedure]
(1) i ← 2
(2) xi ← remainder of xi−2 divided by xi−1
(3) if xi = 0, stop with xi−1 as the GCD
(4) i ← i + 1
(5) return to step (2)
a) 3 b) 4 c) 6 d) 7
– 3 –
Q4. To compare the entrance exams of the current and previous years, a company required
many of its employees to take those exams. The correlation coefficient and the regression line
were obtained by assigning the scores of the previous year to the x-axis and the scores of the
current year to the y-axis. Which of the following can be derived from the results below?
[Results]
The correlation coefficient is 0.8.
The slope of the regression line is 1.1.
The y-intercept of the regression line is 10.
a) From the slope and the y-intercept of the regression line, the tendency is to obtain a
higher score for the current year than the previous year
b) From the slope of the regression line and the correlation coefficient, the exam of the
current year is of high quality.
c) From the slope of the regression line, the average score for the current year is 1.1 times
that of the previous year.
d) From the y-intercept of regression line, those who get zero for the current year can get a
score as high as 10 for the previous year.
Q5. The table below is a state transition table used for character string validation. In this table,
“A ” represents the initial state, and “E ” represents the failure state. Which of the following is
a character string that fails this validation? Here, each character of a string is parsed from the
leftmost side, and the symbol “” represents a blank character.
Character
Blank Number Sign Radix point Other
A A B C D E
Current B A B E D E
state C E B E D E
D A E E E E
– 4 –
Q6. Which of the following is an appropriate description of parity check (vertical parity) that
handles transmission errors on a communication line?
Q7. When a sequence of data, A, B, C, D, arrives in this order, which of the following is a
possible sequence that can be produced using a single stack?
a) A, D, B, C b) B, D, A, C c) C, B, D, A d) D, C, A, B
Q8. The in-order traversal of a binary tree is a procedure that visits all nodes of the tree. For a
non-empty binary tree T, it performs the following operations in order.
Which of the following is the ordered sequence of nodes when the in-order traversal is
performed on the binary tree below?
a) 1, 2, 4, 7, 8, 5, 3, 6, 9 b) 6, 9, 3, 1, 5, 2, 8, 4, 7
c) 7, 4, 8, 2, 5, 1, 3, 9, 6 d) 7, 8, 4, 5, 2, 9, 6, 3, 1
– 5 –
Q9. Which of the following explains the objective of a recursive call?
Q10. Which of the following is a technology that provides a dynamic user interface without
page transition using an asynchronous communication in JavaScript?
Q11. Which of the following is a special register that contains the address of the next instruction
to be fetched?
Q12. Which of the following is the performance of a CPU in MIPS when the instruction mix of
the CPU is as listed in the table below? Here, the CPU does not use a pipeline architecture.
a) 0.04 b) 0.25 c) 4 d) 25
– 6 –
Q13. Which of the following is a computer system or architecture where the CPU sequentially
reads and executes the programs that are stored in the main memory?
a) It is a serial interface that adopts isochronous transmission that is suitable for audio or
video, and has a broadcast transmission mode.
b) It is a serial interface that has a data transmission mode of 5 Gbit/s that is called super
speed.
c) It is a serialized ATA specification that connects a PC to a peripheral device.
d) It is an interface that uses four (4) pairs of signal lines transmitting two (2) bits of
information in one (1) clock and has a maximum throughput of 1 Gbit/s.
Q15. Which of the following is the RAID level where the entire stored data is lost when one of
the multi-disks is damaged?
Q16. Which of the following is the approximate availability of a system in percentage when the
MTBF is 30 days and the MTTR is 6 hours?
– 7 –
Q17. In the switching procedure of processes in the multiprogramming shown in the figure
below, which of the following is an appropriate combination of OS processing from A to C?
A
Ready
state
B
Ready
state C
Running
state
A B C
Restoration of the Saving of the running
a) Selection of the process
running state state
Saving of the running Restoration of the
b) Selection of the process
state running state
Saving of the running Restoration of the
c) Selection of the process
state running state
Selection of the Restoration of the Saving of the running
d)
process running state state
Q18. Among the page replacement methods in virtual memory management, which of the
following is the LRU control method?
a) Each page is managed by appending a reference flag and a change flag, and pages
without reference or change are replaced with higher priority.
b) One of the pages in main memory is randomly chosen with the same probability and
then replaced.
c) The page that has been stored in the main memory for the longest time is replaced.
d) The page that has not been referenced the longest time is replaced.
– 8 –
Q19. Which of the following is an appropriate function of a linker?
Q20. Which of the following is the appropriate explanation of sequence control for controlling
industrial devices?
Q21. The half adder in the diagram below adds two (2) single-digit binary numbers, x and y,
and produces z (the first digit of the sum) and c (the carry bit) as outputs. Which of the
following is the appropriate combination of gate devices A and B?
A B
a) Exclusive logical sum (XOR) Logical product (AND)
b) Logical product (AND) Logical sum (OR)
c) Negative logical product (NAND) Negative logical sum (NOR)
d) Negative logical sum (NOR) Exclusive logical sum (XOR)
– 9 –
Q22. Which of the following is not an implementation of the function F = A • B + C • D ? Here,
“•” represents the logic AND operation, and “+” represents the logic OR operation in the
expression.
a) b)
c) d)
a) It can create a picture on a screen using the mouse as a brush that can be saved to a
bitmap image file.
b) It can create a scenario-based content by editing and arranging several materials, such as
text, images, video, and sound.
c) It can create a simple movie from a series of still images by gradually changing the
differences among images.
d) It can create vector graphics composed of lines and curves defined mathematically with
geometric characteristics that can then be transformed or combined.
– 10 –
Q25. Which of the following is an appropriate explanation of a relational database?
a) Data is represented as a table, and the tables are linked to one another using the column
values of these tables.
b) Each attribute is represented as a pair of the attribute value and the storage location of
the record having that value and used as an index.
c) The relationship among records is represented by a data structure using links that can
represent both tree and network structures.
d) The relationship among records is represented by a data structure using pointers that are
limited to representing a tree structure.
Q26. Which of the following is performed periodically to prevent a decline in the access
efficiency of a database?
Q27. A student’s ID, name, and class ID are recorded in the Student table. Which of the
following SQL returns records of all students whose names start with A?
Q28. Among the search processes for the “Sales” table, which of the following is appropriate to
set a hash index rather than a B+ tree index? Here, the column in which the index is set is
shown inside <>.
Sales (form number, sales date, product name, user ID, store number, sales amount)
a) Searching for sales with a sales amount of 100 dollars or more. <sales amount>
b) Searching for sales with the product name beginning with ‘DB’. <product name>
c) Searching for sales with the sales date as the current month. <sales date>
d) Searching for sales with the user ID as ‘1001’. <user ID>
– 11 –
Q29. Which of the following is the appropriate explanation of the key value store that is used in
the processing of big data?
a) It is represented by a two-dimensional table with rows and columns based on the set
theory.
b) It represents the relationship among nodes with the three (3) elements, i.e., “node,”
“relationship,” and “property.”
c) It saves the desired data together with a value that enables this data to be uniquely
identified as a pair.
d) The data for one (1) case is called a “document,” and the data structure of each
document is unrestricted and can be changed whenever data is added.
Q30. Which of the following is the response time when a client and server at different locations
communicate under the conditions below? Here, the response time is in seconds and starts
from the moment the client sends a message until a response is received from the server. 1
MB is 106 bytes. The propagation delay between the client and server can be ignored.
[Conditions]
Line speed between client and server 8 Mbit/s
Transmission efficiency 60%
1 MB for upstreaming and 2 MB for
Message size
downstreaming
Processing time at client side Total of 0.4 s for sending and receiving
Processing time at server side Total of 0.4 s for sending and receiving
– 12 –
Q31. Which of the following is an appropriate transmission operation of a node connected to a
CSMA/CD LAN?
a) All nodes are connected in a ring topology, where a special frame is circulated around to
control transmission rights. Only the node that has the special frame can transmit data.
b) Each node is logically ordered, a transmission right is passed along in order, and only
the node that has received the right can transmit data.
c) Each node waits for the medium to be idle before transmitting data. When collision
occurs, it waits for a random backoff time before retransmission.
d) Only the node that has a time slot assigned can transmit data.
Q32. In a TCP/IP environment, which of the following is a protocol for synchronizing the clocks
of multiple computers with that of a time server?
– 13 –
Q35. When risk treatment is classified as risk avoidance, risk reduction, risk acceptance, and
risk sharing, which of the following risk treatments is risk avoidance?
Q36. Which of the following is installed into an in-house network or server by an intruder to
enter through an access path other than the normal path?
a) Backdoor b) Forensic
c) Strict routing d) Thin client agent
Q38. Which of the following is an encryption method that can be used for encrypting data
managed in a database using the same key for encryption and decryption?
– 14 –
Q39. A given application only has the functions of retrieving and displaying user information
from a database that stores such information. Considering information security management,
which of the following is the appropriate database access right assigned to an account that
the application uses when it accesses the database? The names and scopes of rights are listed
below.
Q40. A cybersecurity incident response plan is defined as a set of instructions to aid the
cybersecurity team to detect, respond to, and recover from cybersecurity incidents. The
cybersecurity incident response plan resolves issues, such as cybercrime, data loss, and
service outages that threaten daily work. Which of the following is part of the cybersecurity
incident response plan?
Q41. Between a client and web server, which of the following is used for inspecting the data
that is sent from the client to the web server and blocking attacks, such as SQL injections?
a) It cannot use public key pairs, and it uses a password for authentication.
b) It helps in securely loading web site pages over HTTPS.
c) It provides a secure channel for server maintenance over a public network.
d) Its use is required in the Intranet.
– 15 –
Q43. Which of the following is an appropriate description concerning Sender Policy Framework
(SPF) for email communication?
Q44. Which of the following is an appropriate explanation of OP25B for email communication?
– 16 –
Q45. Which of the following is the UML class diagram that shows a generalization relation?
a) Automobile b) Automobile
1
1
Automobile Driver
inspection
certificate
c) Automobile d) Automobile
1 1
* *
Sports car Tire Engine
Q46. The figure below shows an example of a DFD that uses one of the DFD notations and
represents a flow of data in a system. Texts in the figure are not shown. Which of the
following is represented by the circle “” in the DFD notation used in the example?
– 17 –
Q47. Which of the following is an appropriate relationship between classes and instances in
object orientation?
Q49. Which of the following tests verifies the interfaces between two (2) modules or
subsystems?
– 18 –
Q51. Based on the definition of project management process groups in ISO 21500, which of
the following is an activity that is to be implemented in the planning process group among
the project management processes?
Q52. In project time management, which of the following descriptions is appropriate for “slack
time”?
a) It is the amount of time between the earliest start time and earliest finish time of an
activity or between the latest start time and latest finish time of an activity.
b) It is the amount of time for which a non-critical path activity can be deferred without
delaying the project.
c) It is the amount of time that an activity can be deferred without delaying the earliest start
time of any succeeding activity or violating a schedule constraint.
d) It is the amount of time that an activity can be delayed past its latest start time or latest
finish time.
Q53. When the duration for painting a house is estimated, which of the following is an
appropriate technique that estimates the duration on the basis of the actual duration of a
similar painting job in the past of the same house or other historical data from similar work?
Q54. In system development, when the relationship between person-months and the duration
(months) is represented in the approximate expression shown below, and the total person-
month is 4096, how many months does it take?
a) 16 b) 40 c) 64 d) 160
– 19 –
Q55. An IT service is provided under the conditions that are described below. What is the
maximum downtime in hours that can satisfy the SLA during a service time period of one (1)
month? Here, the number of business days in one (1) month is 30, and no maintenance or
other scheduled downtime of the service is performed during the service time period.
Q56. Which of the following is the main purpose of a migration test for a system?
– 20 –
Q58. When the PDCA methodology is applied to a service management system, which of the
following corresponds to Act?
Q59. In the system design stage, which of the following is the point to be checked during the
audit of control for reducing the risk of non-fulfillment of user requirements?
a) All programming should be performed in accordance with the specified standards and
conventions.
b) The program specifications should be created on the basis of the system design
documents.
c) The test plan should be created on the basis of the system test requirements and must
also be approved by the responsible person of the system operations department.
d) The user department should participate in the review of system design.
Q60. When IT controls are classified into preventive controls and detective controls, which of
the following is to be classified as a detective control?
a) A data entry manual is created, and the persons in charge of data entry are trained.
b) A data entry screen is designed so that operation errors are unlikely to occur.
c) Access rights are assigned only to the person in charge of data entry.
d) An output list resulting from data entry is cross-checked with the input form.
– 21 –
Q61. Which of the following is an explanation of CRM?
a) It is a business approach for significantly improving the efficiency of the entire supply
chain through the real time exchange of information regarding production, inventory,
procurement, sales, distribution, etc.
b) It is a concept to optimize customer loyalty by sharing information throughout all
customer channels within a company and improving customer satisfaction by raising the
level of service.
c) It is a method for improving business efficiency by planning and managing business
resources throughout the company effectively and comprehensively.
d) It is a method for wholesale dealers or manufacturers to increase business transactions
with retail stores by supporting their business activities, and increasing their sales and
profits.
a) A software that uses image processing techniques and is employed for applications to
describe image details to a human
b) A software that uses natural language processing techniques and is employed for
applications to communicate with a human
c) A software that uses signal processing techniques and is employed for applications to
convert a human’s voice into texts
d) A software that uses speech processing techniques and is employed for applications to
generate subtitles automatically for a human to read while watching videos
– 22 –
Q64. Which of the following is a technique that performs the optimum resource allocation for
computerization investment in each category classified by the similarities of risks and
investment value?
a) 3C analysis b) Benchmarking
c) Enterprise architecture d) IT portfolio
Q65. In the verification of stakeholder requirements, which of the following indicates the ability
to keep track of the process until the implementation of a change request?
Q67. In a product life cycle, which of the following is a stage where the withdrawal of some
companies is observed when the demand peaks, and decision-making is necessary to
determine whether it is possible to gain a strong foothold?
– 23 –
Q68. When an IT vendor uses a “Balanced Scorecard” to promote a solution business, which of
the following is an example of the learning and growth KPI goal? Here, “solution” means “to
support a customer through information technology and professional services that are offered
by experts so that the customer can achieve its management objectives.”
a) To increase the number of customer proposals by a factor of 1.5 over that of the previous
year by preparing an environment for reusing proposals to augment the number of
registered solution cases
b) To increase the sales volume in the consulting business for information strategy planning
and system planning for it to account for 15% or more of the total sales of the company
c) To set an average satisfaction score of 3.5 out of five (5) or more in a satisfaction
survey of customers for whom a service is offered
d) To train 30 employees as IT professionals in order to focus on the consulting services in
the information strategy
a) Caring for patients by using computer technologies when the physician and patients are
physically together in a hospital
b) Caring for patients by using electronic communication technologies when the physician
and patients are not in the same location
c) Caring for patients by using electronic communication technologies when the physician
and patients are physically together at the patients’ house
d) Caring for patients without using computer technologies when the physician and patients
are physically together at the physician’s clinic
– 24 –
Q71. The figure below shows the relationships among the components of product A, and the
numbers in parentheses indicate the quantity of components necessary to produce one unit of
the upper-level product or component. When 10 units of product A are produced, how many
units of component C must be ordered? Here, there are presently five units of component C
in the inventory.
A
B(2) C(1)
a) 15 b) 20 c) 25 d) 30
Q72. The figure below shows the transaction model of an escrow service that is used in an
Internet auction site or other similar transactions. Which of the following is the action that
corresponds to (5) in this figure? Here, (1) through (6) indicate the sequence of transactions,
and each of the numbers from (3) to (6) corresponds to an action in a) through d).
– 25 –
Q73. Which of the following is an appropriate explanation of HEMS?
a) It is a system that connects multiple home appliances through a network to visualize the
power and perform optimum control of power consumption.
b) It is a system that converts the electricity produced by a solar power generation system
and a residential-use fuel cell for the electricity to be useable in households, etc.
c) It is a system that recycles the useful parts of home appliances discarded by general
households and offices to reduce the amount of waste materials and promote the
effective use of resources.
d) It is an electric hot water supply system that generates a considerable quantity of heat
with a relatively small amount of energy by using a heat pump.
Q74. When real-time systems are classified into hard real-time and soft real-time systems, which
of the following is in the category of a hard real-time system?
Q76. There are several quality control tools that have been used primarily for manufacturing
and inspection departments. Which of the following is a combined graph containing a bar
graph that shows the numeric values of individual items in descending order, and a line graph
that shows the cumulative total of the composition ratios of these numeric values?
– 26 –
Q77. In a sampling inspection, which of the following can be used to ascertain the probability
of acceptance of a lot with a certain defective ratio?
Q78. Which of following is an expression for calculating the cost of goods sold (or cost of sales)
of a manufacturing company?
a) Material cost in current period + Labor cost in current period + Expense in current
period
b) Product inventory at beginning of period + Product manufacturing cost in current period
− Product inventory at end of period
c) Product inventory at beginning of period + Product manufacturing cost in current period
− Work in process inventory at end of period
d) Work in process inventory at beginning of period + Product manufacturing cost in
current period − work in process inventory at end of period
Q79. The break-even point (BEP) is a level where total cost and total revenue are equal. The
table below lists the fixed cost, variable cost per unit, price per unit, and BEP in units.
Which of the following is a value of the price per unit?
a) 4 b) 8 c) 12 d) 16
Q80. Which of the following is the intellectual property right that does not require registration
for protection in the World Trade Organization (WTO) member states?
– 27 –