You are on page 1of 5

College of Computer Studies

PhilNITS IP – Practice Exam No. 1


Topic: TECHNOLOGY

Name Date

Schedule Section

Instruction: Write your answer on the space provided.

1. When the six characters a, b, c, d, e, and f are arranged in a row in any arbitrary order,
in how many ways can a and b be placed side-by-side?

Answer: __________________________________________________________________________

2. When three balls are picked out consecutively from a box containing three white balls
and four black balls, what colors have the lowest probability?

Answer: Probability of picking out the balls in order of _________, __________, _________

3. As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five squares, each of which is either black or white.

2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■

A white square indicates 0, and a black square indicates a different positive value
that is determined by the position of the square. When the sum of the values of the
five squares shows a decimal number, what is the numeric value represented by
■■□□□?

Answer: __________________________________________________________________________

4. In theory, what color is printed by a printer, when cyan, magenta, and yellow are
mixed together by a subtractive color mixture?

Answer: __________________________________________________________________________

5. There is a system for entering and managing orders from customers. Sequential order
number is printed on each order form in the order of arrival unless the form has any
mistakes such as missing information. Before the order form shown below is entered
into the system, what field should be checked so as not to enter duplicated order
data?

Order data

Order number Order date Product code Quantity Customer code

Answer: __________________________________________________________________________

6. A DHCP server has been installed in a LAN. When a PC that automatically acquires
information from the DHCP server is to be connected to the LAN, what will be set in the
PC?

Answer: __________________________________________________________________________

7. What is the unit of the data transmission speed in a network?

Answer: __________________________________________________________________________

Practice Exam No. 1 – Page 1 of 5


8. Among information security measures A through D implemented in the workplace to
maintain the “confidentiality” and “integrity” of information, what is the list of only the
appropriate measures?

A: PCs should remain unlocked to keep them ready for operation from the start to
the end of the business day.
B: Documents and electronic storage media, such as CD-R containing important
information, should be stored in locked cabinets except when they are used.
C: Documents sent or received by facsimile should be picked up immediately
without being left unattended on the tray.
D: Messages or information written on the whiteboard should be erased immediately
after use.

Answer: __________________________________________________________________________

9. What is the term used for the drawbacks and defects that may exist in computer
systems or networks and can be exploited for unauthorized accesses?

Answer: __________________________________________________________________________

10. A single-sided single-layer DVD-R has a storage capacity of about 4.7 Gbytes. When a
book has 700 double-byte characters that are printed per page, how many tens of
thousands of pages, at maximum, can be recorded on this DVD-R? Here, two bytes
are required to record one character, and only character information is stored. In
addition, 1 Gbyte is 1 billion (109) bytes.

Answer: __________________________________________________________________________

11. The procedure described below is executed for two variables x and y, in order from
step (1) through step (4). When the procedure is completed, what is the resulting value
of x?

[Procedure]
(1) Assign 2 to x, and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, terminate the procedure. Otherwise, return to step (2).

Answer: __________________________________________________________________________

12. There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the
program display the underlined character string? Here, the first character of the
original text is displayed in 10 points.

[Specifications]

The characters between <B> and </B> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <B> </B> and <S> </S> must be used as a pair, and both of them can be
nested with each other.

[Original text]

The system administrator promotes and implements <B>department-level<B> or


<S>group-level</S> computerization</B> from a user <S>standpoint</S>.</B>

Answer: __________________________________________________________________________

13. What is implemented in a computer system in order to perform the role of transferring
data between the CPU and memory, or between the CPU and I/O devices?

Answer: __________________________________________________________________________

Practice Exam No. 1 – Page 2 of 5


14. When MTBF is 600 hours and MTTR is 12 hours, what is the approximate availability?

Answer: __________________________________________________________________________

15. What method or technique is used to connect multiple computers over a network
such as a LAN or the Internet, and make these computers available as if they were a
single high performance computer?

Answer: __________________________________________________________________________

16. What is the image data that is pasted onto the documents or Web pages created by
the word-processing software or presentation software in order to improve the
representational power?

Answer: __________________________________________________________________________

17. What is the software that can be used free of charge on a trial basis but requires a
usage fee if it continues to be used after the trial period?

Answer: __________________________________________________________________________

18. What is the unit that represents the resolution when a photograph or a picture is read
by a scanner?

Answer: __________________________________________________________________________

19. What service provides disk space on a server connected to the Internet for storing files
and allows a user to read and write data from anywhere inside or outside the home?

Answer: __________________________________________________________________________

20. When a PC is connected to a network, what protocol is used for automatically


obtaining the IP address?

Answer: __________________________________________________________________________

21. In IPv4 (IP version 4), about 4.3 billion IP addresses can be defined. In IPv6 (IP version 6)
that is intended to replace IPv4, how many bits are used as the length of an IP
address?

Answer: __________________________________________________________________________

22. What critical factor of information security that can be improved by setting the
mirroring disks in a RAID system?

Answer: __________________________________________________________________________

23. What network area that is logically isolated from both a company’s internal network
and an external network, and is set up to ensure that no harm is caused to the internal
network even if a server that is installed within the network area is accessed from the
outside in an unauthorized manner?

Answer: __________________________________________________________________________

24. What is obtained by multiplying the binary value 10110 by three?

Answer: __________________________________________________________________________

25. What is the DVD in which users can write data, but cannot rewrite data?

Answer: __________________________________________________________________________

26. What device is used to recognize handwritten characters and convert them into
character codes?

Answer: __________________________________________________________________________

Practice Exam No. 1 – Page 3 of 5


27. What term is used for the design that is intended to provide comfortable usability to as
many people as possible, regardless of differences in culture, language, age, gender,
presence or absence of disability, or capability?

Answer: __________________________________________________________________________

28. On a display screen, various colors are created through additive color mixing with
three colors, namely red, green, and blue. When the red color, green color, and blue
color are mixed uniformly, what color is formed?

Answer: __________________________________________________________________________

29. In DBMS, what function is for maintaining consistency of data by preventing the
occurrence of conflicts due to simultaneous access to the data ?

Answer: __________________________________________________________________________

30. When an e-mail is sent to multiple destinations, there are cases that the receiver of the
e-mail should not know the e-mail addresses of other destinations. In such cases, what
is the appropriate place where the e-mail addresses of the multiple destinations to be
sent are entered?

Answer: __________________________________________________________________________

31. What is required to construct a LAN connecting several computers in a room?

Answer: __________________________________________________________________________

32. What mechanism determines the correspondence between domain names and IP
addresses on the Internet?

Answer: __________________________________________________________________________

33. What technology enables terminals connected to a shared network such as the
Internet to be used as if they are connected to a leased line by ensuring security with
encryption and authentication?

Answer: __________________________________________________________________________

34. What is the standard encoding system that is widely used for handling multilingual text
and symbols around the world in a single character set?

Answer: __________________________________________________________________________

35. In a queue, three elements 33, 27, and 12 are stored (i.e., enqueued) in this order.
After another element 45 is enqueued to the queue, two elements are retrieved (i.e.,
dequeued). What is the second element that has been dequeued?

Answer: __________________________________________________________________________

36. In a markup language with the purpose of displaying a screen or printing, it is possible
to directly embed not only the body of a document but specifications of the structure
and layout of the document, and the font and size of the characters. What is classified
as such as a markup language?

Answer: __________________________________________________________________________

37. It is designed to improve the processing efficiency of a PC by effectively reducing the


time for the CPU to access the main memory.

Answer: __________________________________________________________________________

Practice Exam No. 1 – Page 4 of 5


38. A total of 60,000 hours have passed since a computer system was put into operation.
During this operation period, a total of 100 failures occurred, and the system was
repaired each time. The last repair was completed at the 60,000th hours. If the MTTR is
60 hours, how many hours is the MTBF of the system during this period?

Answer: __________________________________________________________________________

39. What term is used for the form of using a PC by itself without connecting it to any
network?

Answer: __________________________________________________________________________

40. What unit is used to represent “resolution”, one of the performance indicators of a
display or a printer?

Answer: __________________________________________________________________________

41. What e-mail software that is an OSS (Open Source Software)?

Answer: __________________________________________________________________________

42. What is the communication network built in a limited area, such as the inside of a
building?

Answer: __________________________________________________________________________

43. What is a mechanism by which, if an e-mail is sent to a specific e-mail address, in


correspondence to the address, the e-mail with the same content is distributed to
multiple e-mail addresses that are already registered?

Answer: __________________________________________________________________________

44. What is the encryption method of wireless LAN?

Answer: __________________________________________________________________________

45. What is the most appropriate as a set of documents that comprehensively define the
approach to information security of a company or an organization, sometimes
including information security standards?

Answer: __________________________________________________________________________

Practice Exam No. 1 – Page 5 of 5

You might also like