Você está na página 1de 5

# College of Computer Studies

## PhilNITS IP – Practice Exam No. 1

Topic: TECHNOLOGY

Name Date

Schedule Section

1. When the six characters a, b, c, d, e, and f are arranged in a row in any arbitrary order,
in how many ways can a and b be placed side-by-side?

2. When three balls are picked out consecutively from a box containing three white balls
and four black balls, what colors have the lowest probability?

Answer: Probability of picking out the balls in order of _________, __________, _________

3. As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five squares, each of which is either black or white.

2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■

A white square indicates 0, and a black square indicates a different positive value
that is determined by the position of the square. When the sum of the values of the
five squares shows a decimal number, what is the numeric value represented by
■■□□□?

4. In theory, what color is printed by a printer, when cyan, magenta, and yellow are
mixed together by a subtractive color mixture?

5. There is a system for entering and managing orders from customers. Sequential order
number is printed on each order form in the order of arrival unless the form has any
mistakes such as missing information. Before the order form shown below is entered
into the system, what field should be checked so as not to enter duplicated order
data?

Order data

## Order number Order date Product code Quantity Customer code

6. A DHCP server has been installed in a LAN. When a PC that automatically acquires
information from the DHCP server is to be connected to the LAN, what will be set in the
PC?

## Practice Exam No. 1 – Page 1 of 5

8. Among information security measures A through D implemented in the workplace to
maintain the “confidentiality” and “integrity” of information, what is the list of only the
appropriate measures?

A: PCs should remain unlocked to keep them ready for operation from the start to
the end of the business day.
B: Documents and electronic storage media, such as CD-R containing important
information, should be stored in locked cabinets except when they are used.
C: Documents sent or received by facsimile should be picked up immediately
without being left unattended on the tray.
D: Messages or information written on the whiteboard should be erased immediately
after use.

9. What is the term used for the drawbacks and defects that may exist in computer
systems or networks and can be exploited for unauthorized accesses?

10. A single-sided single-layer DVD-R has a storage capacity of about 4.7 Gbytes. When a
book has 700 double-byte characters that are printed per page, how many tens of
thousands of pages, at maximum, can be recorded on this DVD-R? Here, two bytes
are required to record one character, and only character information is stored. In
addition, 1 Gbyte is 1 billion (109) bytes.

11. The procedure described below is executed for two variables x and y, in order from
step (1) through step (4). When the procedure is completed, what is the resulting value
of x?

[Procedure]
(1) Assign 2 to x, and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, terminate the procedure. Otherwise, return to step (2).

12. There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the
program display the underlined character string? Here, the first character of the
original text is displayed in 10 points.

[Specifications]

The characters between <B> and </B> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <B> </B> and <S> </S> must be used as a pair, and both of them can be
nested with each other.

[Original text]

## The system administrator promotes and implements <B>department-level<B> or

<S>group-level</S> computerization</B> from a user <S>standpoint</S>.</B>

13. What is implemented in a computer system in order to perform the role of transferring
data between the CPU and memory, or between the CPU and I/O devices?

## Practice Exam No. 1 – Page 2 of 5

14. When MTBF is 600 hours and MTTR is 12 hours, what is the approximate availability?

15. What method or technique is used to connect multiple computers over a network
such as a LAN or the Internet, and make these computers available as if they were a
single high performance computer?

16. What is the image data that is pasted onto the documents or Web pages created by
the word-processing software or presentation software in order to improve the
representational power?

17. What is the software that can be used free of charge on a trial basis but requires a
usage fee if it continues to be used after the trial period?

18. What is the unit that represents the resolution when a photograph or a picture is read
by a scanner?

19. What service provides disk space on a server connected to the Internet for storing files
and allows a user to read and write data from anywhere inside or outside the home?

## 20. When a PC is connected to a network, what protocol is used for automatically

21. In IPv4 (IP version 4), about 4.3 billion IP addresses can be defined. In IPv6 (IP version 6)
that is intended to replace IPv4, how many bits are used as the length of an IP

22. What critical factor of information security that can be improved by setting the
mirroring disks in a RAID system?

23. What network area that is logically isolated from both a company’s internal network
and an external network, and is set up to ensure that no harm is caused to the internal
network even if a server that is installed within the network area is accessed from the
outside in an unauthorized manner?

## 24. What is obtained by multiplying the binary value 10110 by three?

25. What is the DVD in which users can write data, but cannot rewrite data?

26. What device is used to recognize handwritten characters and convert them into
character codes?

## Practice Exam No. 1 – Page 3 of 5

27. What term is used for the design that is intended to provide comfortable usability to as
many people as possible, regardless of differences in culture, language, age, gender,
presence or absence of disability, or capability?

28. On a display screen, various colors are created through additive color mixing with
three colors, namely red, green, and blue. When the red color, green color, and blue
color are mixed uniformly, what color is formed?

29. In DBMS, what function is for maintaining consistency of data by preventing the

30. When an e-mail is sent to multiple destinations, there are cases that the receiver of the
e-mail should not know the e-mail addresses of other destinations. In such cases, what
is the appropriate place where the e-mail addresses of the multiple destinations to be
sent are entered?

## 31. What is required to construct a LAN connecting several computers in a room?

32. What mechanism determines the correspondence between domain names and IP

33. What technology enables terminals connected to a shared network such as the
Internet to be used as if they are connected to a leased line by ensuring security with
encryption and authentication?

34. What is the standard encoding system that is widely used for handling multilingual text
and symbols around the world in a single character set?

35. In a queue, three elements 33, 27, and 12 are stored (i.e., enqueued) in this order.
After another element 45 is enqueued to the queue, two elements are retrieved (i.e.,
dequeued). What is the second element that has been dequeued?

36. In a markup language with the purpose of displaying a screen or printing, it is possible
to directly embed not only the body of a document but specifications of the structure
and layout of the document, and the font and size of the characters. What is classified
as such as a markup language?

## 37. It is designed to improve the processing efficiency of a PC by effectively reducing the

time for the CPU to access the main memory.

## Practice Exam No. 1 – Page 4 of 5

38. A total of 60,000 hours have passed since a computer system was put into operation.
During this operation period, a total of 100 failures occurred, and the system was
repaired each time. The last repair was completed at the 60,000th hours. If the MTTR is
60 hours, how many hours is the MTBF of the system during this period?

39. What term is used for the form of using a PC by itself without connecting it to any
network?

40. What unit is used to represent “resolution”, one of the performance indicators of a
display or a printer?

## 41. What e-mail software that is an OSS (Open Source Software)?

42. What is the communication network built in a limited area, such as the inside of a
building?

## 43. What is a mechanism by which, if an e-mail is sent to a specific e-mail address, in

correspondence to the address, the e-mail with the same content is distributed to