2017A FE AM Question
2017A FE AM Question
2017A FE AM Question
(1)
Fundamental IT Engineer Examination (Morning)
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. In which month is the autumn Fundamental IT Engineer Examination conducted?
Since the correct answer is “b)” (October), mark your answer sheet as follows:
[Sample Answer]
Q1 ウ
– 1 –
Symbols commonly used in questions
Unless otherwise noted in each question, the following notational conventions are applied as
shown in the tables.
I. Standards
Notation
Name of the standard
in the exam questions
– 2 –
II. Logic Circuit
AND gate
NAND gate
OR gate
NOR gate
Buffer
NOT gate
Company names or product names mentioned in the examination questions are the trademarks or registered
trademarks of their respective companies or organizations. The symbol ® or ™ is not used within.
– 3 –
Q1. What is the octal representation of a hexadecimal fraction F1B0.C?
a) 170660.6 b) 361540.14
c) 743300.6 d) 5213052.3
Q2. When two unbiased coins are tossed and an unbiased six-sided die is rolled at the same
time, what is the probability that at least one coin shows heads and the die shows an even
number?
a) 2 5 3 4 × + + b) 2 5 + 3 4 × +
c) 2 5 3 × 4 + + d) 2 5 3 × + 4 +
Q4. Analog audio data is being sampled and converted to 8-bit digital audio data using the PCM
method, then transmitted in 64,000 bits per second. What is the sampling interval in
microseconds?
– 4 –
Q5. Flowchart in Figure 1 describes a procedure to convert a matrix A to another matrix B.
When this flowchart converts matrix A in Figure 2 to matrix B in Figure 3, which of the
following should be filled in the blank C? Here, A(i, j) and B(i, j) represent the (i, j)-th
elements of matrices A and B. In Figure 1, the loop limits “k: n, m” indicates the variable k to
vary integers from n to m.
Q6. When Bubble sort algorithm is used, how many exchange operations are required to sort
the following numbers in ascending order?
9, 2, 13, 21, 3, 0
a) 7 b) 8 c) 9 d) 10
– 5 –
Q7. Values from 1 to 10 are assigned to 10 nodes in the binary tree below so that each node has
a different value. In this assignment, the value of each node is greater than the values of the
left child and all its descendants, and is less than the values of the right child and all its
descendants. Which of the following is a combination of values assigned to node A and node
B?
4 A
a) A = 6, B = 7 b) A = 6, B = 8
c) A = 7, B = 8 d) A = 7, B = 9
Q8. There are two boxes; the first box contains two green balls and three red balls; the second
box contains three green balls and two red balls. A boy randomly selects a box from the two,
and then randomly picks a ball from that box. If the ball is red, what is the probability that he
selected the first box?
a) One CPU core serves as a master, while the other CPU cores act as slaves and perform
the tasks assigned to them by the master.
b) One or more programs are loaded in the main memory, and only one program at a time
is able to get the CPU for the execution while all the others are waiting their turns.
c) Several CPU cores have schedules for their own tasks, with priorities set by the
operating system with equal access to the memory and system resources.
d) While one stage of an instruction is being processed, other instructions may be processed
at a different stage so that multiple instructions can be processed at the same time.
– 6 –
Q10. To determine an effective address from the value recorded in the address part of instruction,
various addressing modes are used. Which of the following modes uses the value of the
address part as an effective address?
Q11. Which of the following is a memory device that stores programs or data in factories, and
only has the read operation for the stored programs or data?
a) It decides the next task to be executed from tasks queued up for execution.
b) It directly controls the hardware according to requests from an application program.
c) It interprets the command strings that are entered by the user, and starts the applicable
program.
d) It manages the display status on the screen in multiple windows.
Q13. Which of the following is the RAID level that can recover data from the other disks, with a
minimum of two-disk configuration?
Q14. There exists a system composed of two processing devices. What is the difference in
availability between the system that works when either of the devices functions normally and
the one when both devices function normally? Here, the availability for both devices is 0.9,
and factors other than the processing devices can be ignored.
– 7 –
Q15. Which of the following is an appropriate characteristic of a web system implemented in
a three-layer client/server system configuration?
a) A business process is executed on the server side, and the client software displays the
result on a screen according to the HTML coding.
b) A program coded in HTML is run on the server side, and the client software displays
the result on a screen.
c) Every time a business process is changed, a business process application for operating
the web system must be sent and installed on the client terminal.
d) On the client terminal, it is necessary to have a resident service program waiting to
receive an HTTP request from the server side.
Q16. Below is the list of processes, P1, P2, P3, and P4, and their burst time for CPU scheduling
algorithms.
Process Burst time (millisecond)
P1 9
P2 5
P3 7
P4 4
Which of the following combinations is the average waiting time in millisecond for a First-
Come, First-Serve (FCFS) scheduling and Shortest-Job-First (SJF) scheduling given that
the process arrives in the order P1, P2, P3, and P4, and the latency can be ignored. Note that
the burst time is the actual time required to complete a process.
– 8 –
Q17. In input/output management, which of the following is an appropriate function of a buffer?
Q18. Which of the following is the backup method that requires the longest time to backup but
the shortest time to restore?
Q19. In UNIX, which of the following is a function that links the standard output of a command
directly to the standard input of another command?
a) Analyzing the source code and generating an object code with an improved run-time
processing efficiency
b) Generating an intermediate code for an interpreter rather than generating an object code
c) Generating an object code that displays the called subprogram name or the content of a
variable at a particular point in time during the execution of the program
d) Generating an object code that operates in a computer with a different architecture from
the computer in which the compiler is implemented
– 9 –
Q21. Which of the following is equivalent to the logic circuit below?
a) b)
c) d)
Q22. Which of the following is a logic gate combination that provides an output 1 when both
inputs are 0?
Q24. Which of the following is used to control the visual styles of HTML documents, such as
text sizes, text colors, or page layout?
– 10 –
Q25. In a DBMS, which of the following functions decides the schema?
Q26. The attributes of the relation “OrderRecord” have the functional dependency (1) to (6)
below. Normalization is performed with these functional dependencies up to the third normal
form, and the decomposition into the relations “Product,” “Customer,” “Order,” and
“OrderDetails” are performed. Which of the following is appropriate for the relation
“OrderDetails”? Here, {X, Y} represents a combination of the attributes X and Y, and X → Y
represents that X functionally determines Y. The solid underline represents a primary key.
[Functional dependency]
(1) OrderNumber, → OrderDate
(2) OrderNumber, → CustomerNumber
(3) CustomerNumber → CustomerName
(4) {OrderNumber, ProductNumber} → Quantity
(5) {OrderNumber, ProductNumber} → UnitSalesPrice
(6) ProductNumber → ProductName
Q27. Which of the following is an appropriate description of the mapping between the relational
model and relational database as its implementation?
– 11 –
Q28. When a storage location is to be calculated from a key value, which of the following
methods enables the same calculation result to be obtained from different key values?
Q29. Which of the following can change the deadlock state of the transaction back to the normal
state?
Q30. Which of the following is located at layer 3 of the OSI basic reference model, and performs
path selection and packet relay for an end-to-end communication?
Q31. When a PC connected to a LAN is starting up, which of the following protocols is used to
automatically assign an IP address to the PC?
Q32. Which of the following describes an IPv6 feature not existing in IPv4?
Q33. In TCP/IP network, which of the following is a combination of information that identifies
a TCP connection?
– 12 –
Q34. The figure below shows the basic mechanism to synchronize clocks using the NTP. A
response from the NTP server contains a Request Receive Time and a Response Transmit
Time. The PC calculates the difference between its internal clock and the NTP server clock
using the four times shown in the figure. How is the internal clock of the PC different from
that of the NTP server? Here, the request and the response require the same transmission time,
and each time in the figure shows the time on the internal clock of the PC or the NTP server.
In an expression aa:bb:cc.dddddd, aa, bb, cc, and dddddd represent hour, minute, second, a
fraction of a second (in microseconds), respectively.
Q35. Which of the following is a form of malware that requires a host in order to propagate from
one computer to another?
– 13 –
Q36. Which of the following is the term used to describe an attack where attackers exploit a
vulnerability of computer systems before a patch fixes the vulnerability?
a) An attack that floods the memory area secured by a program by continuously sending
long character strings or data to seize access privileges from the program, and causes
malfunctions
b) An attack that fraudulently overwrites cache information
c) An attack that sends a large amount of data continuously to the target server to place an
excessive load on the server’s CPU and memory, and obstructs its service
d) An attack that takes advantage of the vulnerabilities in software before the software
vendor can provide a fix for the vulnerability
Q38. A typical example of personal security threats is information leakage. Which of the
following is the most appropriate measure to prevent information leakage?
a) Data containing important information is encrypted with a private key before sending it
to the receiver via email. In a separate email, the private key is sent to the receiver so
that the receiver can decrypt the data.
b) Data containing important information is encrypted with the public key received in
advance from the receiver before sending it to the receiver via email. The receiver then
decrypts the data with the private key that the receiver has created as the pair of
public/private keys.
c) Data containing important information is password-locked, and it is attached in an email
that includes the password in the text part of the email. Before sending the email, the
receiver address is checked to make sure that the email is sent to the correct address.
d) Stored data containing important information is compressed as much as possible before
giving a USB memory to someone so that the new user can utilize the rest of the
memory space effectively.
– 14 –
Q39. When the process shown in the procedure below is performed, in addition to the detection
of message falsification, which of the following is what recipient B is able to do?
[Procedure]
Process of sender A
(1) A hash function is used to generate a digest from a message.
(2) The digest generated in (1) is encrypted with the sender A’s private key to generate a
digital signature.
(3) The message and the digital signature generated in (2) are sent to recipient B.
Process of recipient B
(4) The same hash function in the process of sender A is used to generate a digest from
the received message.
(5) The received signature is verified by comparing the digest generated in (4) and the
digest generated by decrypting the received digital signature with the sender A’s
public key that recipient B received in advance from sender A.
Q40. Among the techniques for code breaking given below, which of the following is classified
as a brute force attack?
a) By observing the difference between two different items of plain text and their encrypted
text, the key is identified.
b) For a given set of plain text and encrypted text, the key is identified by using all possible
combinations.
c) The encrypted text is decoded by analyzing the electromagnetic waves that an
encryption device emits during the operation.
d) The statistical bias of an encryption function is approximated with a linear function, and
the encrypted text is decoded.
– 15 –
Q41. Which of the following is an appropriate terminology concerning the behavior that
documents retrieved from distinct origins are isolated from each other?
Q42. When a mirror port is prepared to allow a LAN analyzer to be used to investigate the cause
of a network failure, which of the following is a point to consider?
Q43. Which of the following is an appropriate term for an organized and highly skilled team,
whose mission is to continuously monitor and improve the organization’s security posture
while preventing, detecting, analyzing, and responding to cyber security incidents with the
aid of both technology and well-defined processes and procedures?
– 16 –
Q44. When a packet filtering firewall controls packets by using a list of rules, which of the
following is the rule that is applied to packet A and its action? Here, the firewall applies the
rules shown in the list below in the order number 1–4, and if a rule is applied, then the
remaining rules are not applied.
[List of rules]
Source Destination Source Destination
Number Protocol Action
Address Address Port number Port number
1 10.1.2.3 * * * * Blocked
2 * 10.2.3.* TCP * 25 Permitted
3 * 10.1.* TCP * 25 Permitted
4 * * * * * Blocked
Note: * indicates a pattern that applies to any value.
[Packet A]
Source Destination Source Destination
Protocol
Address Address Port number Port number
10.1.2.3 10.2.3.4 TCP 2100 25
Q45. Which of the following is the most appropriate description of polymorphism in object
oriented design?
– 17 –
Q46. In the development process, which of the following is an activity that should be performed
in software architectural design?
a) Analyzing the requests in incremental steps by arranging them in the form of a chart
b) Describing the specifications so that the program is clarified on a line-by-line basis
c) Obtaining the opinion of the customer and deciding the specifications
d) Transforming the requirements for the software item into an architecture that describes
its top-level structure and identifies the software components
Q47. Which of the following is the most appropriate description of stack-trace in relation to
debugging a program?
Q48. Which of the following is an appropriate description concerning a state transition test in a
system integration test?
a) A method for black box tests that does not focus on a system’s internal state.
b) A method that checks whether a system behaves according to the designed combinations
of events and internal states.
c) A method that is suitable for tests of calculations and processing systems whose internal
state does not change depending on the occurrence of an event.
d) A method that uses a data flow diagram and a decision table to analyze the internal state
of a system.
Q49. Which of the following is a method for analyzing a source and object codes, and extract
program specifications and design information?
a) Reengineering b) Refactoring
c) Restructuring d) Reverse engineering
– 18 –
Q50. According to the ISO/IEC 12207 (Systems and software engineering – Software life cycle
processes (SLCP)), the Software Implementation Process has the following lower-level
processes:
1) Construction Process
2) Requirements Analysis Process
3) Architectural and Detailed Design Process
4) Integration and Testing process
Which of the following is an appropriate order for the Software Implementation Process?
a) 1) 2) 3) 4) b) 2) 3) 1) 4)
c) 2) 3) 4) 1) d) 3) 4) 2) 1)
Q51. According to PMBOK, which of the following processes is included in the Executing
Process Group?
a) Process of auditing the quality requirements and the results from quality control
measurements to ensure that appropriate quality, standards and operational definitions
are properly implemented
b) Process of checking and recording results of executing the quality activities to assess
performance and recommend necessary changes
c) Process of estimating the type and quantities of material, people, equipment, or supplies
required to perform each activity
d) Process of prioritizing risks for further analysis or action by assessing and combining
their probability of occurrence and impact
Q52. Which of the following is an appropriate description of “Lead” relationship in project time
management?
a) It is the amount of time by which a successor activity can be advanced with respect to a
predecessor activity.
b) It is the amount of time by which a successor activity will be delayed with respect to a
predecessor activity.
c) It is the amount of time that a schedule activity can be delayed or extended from its early
start date without delaying the project completion date or violating a schedule constraint.
d) It is the number of work periods (hours, days) required to complete individual activities
with the estimated resources.
– 19 –
Q53. The following arrow diagram shows the activities and the milestones of a project. What is
the minimum project completion time in days?
C Legend:
A G 3 H Activity Name
7 3 4
Number of days
B D F 4 required
5 4 I
E 5
2
Q54. Company A is going to launch a new software product and the sales team then has to
demonstrate it to the customers. There is a risk that the sales team does not understand the
product and cannot provide good demonstrations. As a consequence, the sales team will make
fewer sales and there will be less revenue for the company. So, the management decided to
provide good training for the sales team. Which of the following is the best method to manage
the risk?
Q55. What is the function point value of a program that has the functions and characteristics
described in the table below? Here, the correction coefficient of complexity is 0.75.
a) 18 b) 24 c) 30 d) 32
– 20 –
Q56. Which of the following is an appropriate purpose of using a Work Breakdown Structure
(WBS) in a software development project?
a) To clarify the time sequence of activities, and understand the critical path that should be
intensively managed
b) To decompose a development task into smaller sub-tasks of a manageable size, and
organize them into a hierarchical structure
c) To optimize the total cost when there is a trade-off relationship between the number of
days and the cost that is required for development
d) To show the schedule of an activity by using a bar, and clarify the start point and end
point of the activity as well as the progress at the current point
Q57. Which of the following device is used for protecting power supply circuits, communication
devices, or other equipment from the overvoltage and the over current generated from the
overvoltage?
Q58. Which of the following is an appropriate precaution to be observed when monitoring the
use of the capacity and performance of an online system in the capacity management process
of IT service management?
– 21 –
Q59. According to ITIL, which of the following is a description of a virtual service desk among
the characteristics of a service desk organization?
Q60. In an information security audit, which of the following is a check item for confirming
availability?
Q61. Which of the following situation is judged as appropriate when conducting an audit on a
Business Continuity Plan (BCP)?
a) A BCP having the same standard level is applied to all business operations without any
prioritization.
b) An emergency contact list of employees is created and updated to the latest version.
c) During normal times, the BCP is not disclosed to employees.
d) The important documents are stored collectively at one place without making copies.
– 22 –
Q62. Which of the following is an explanation of Enterprise Architecture (EA)?
a) It is a technique to abstract and express the business processes with the four (4) basic
elements of data flow, process, file, and data sources and absorption.
b) It is a technique to analyze each business operation and information system through the
four (4) systems of business, data, application, and technology and reexamine it from the
viewpoint of total optimization.
c) It is a technique to analyze or design a system by using schematic diagrams such as a
class diagram, and it is developed by integrating and standardizing various methods that
support an object-oriented design.
d) It is a technique to clarify the data structure and the relationship between data items by
expressing the conceptual data model with entities and relationships.
Q64. Which of the following is a purpose of Business Process Management (BPM) in corporate
activities?
– 23 –
Q65. The purchase of two types of IT devices A and B is being examined. The payout period is
set in consideration of the useful life of each of the devices. Which of the following is an
appropriate description for the minimum amount of annual profit necessary to recover the
amount of investment within the set payout period for A and B? Here, the annual profit is
made evenly every year, and the interest rate is not considered.
A B
Amount of investment (10,000 yen) 90 300
Payout period (years) 3 5
Q66. The weighted comprehensive evaluation method which integrates and quantifies the
evaluation scores of multiple items is applied to quantitatively evaluate the effect of
improvements. Which of the following is the improvement proposal that should be prioritized
in the table below?
Labor savings 4 6 8 2 5
Shortening of
3 5 5 9 5
time frame
Reduction of
3 6 4 7 6
resources
– 24 –
Q67. Which of the following descriptions corresponds to the CSR procurement?
Q68. The RFP is presented to each vendor that has responded to an RFI. Which of the following
should be done beforehand to proceed fairly with the future vendor selection processes?
a) Besides the items of an RFP, giving a high evaluation to a vendor who is familiar with
the current system to select that vendor easily
b) Establishing processes of selection such as setting evaluation standards or weighting
rules of conformity to the request items.
c) Issuing unofficial agreements to all vendors to whom the RFP has been presented and
requesting them to prepare a contract and a statement of work to accelerate the
conclusion of the contract after the vendor selection.
d) Preparing a bailout for a vendor who received a high evaluation on the response to the
RFI, in case it fails in the selection.
Q69. Which of the following is a marketing technique used to provide incentives for distributors
by applying conditions such as kickbacks and rebates, and increase the demands of
consumers?
– 25 –
Q70. The figure below illustrates the relationship between the four (4) Ps proposed from the
seller’s viewpoint and the four (4) Cs proposed from the buyer’s viewpoint in the marketing
mix. Which of the following corresponds to blank A in the figure below? Here, a) through d)
correspond to one of blanks A through D, without an exception.
4P 4C
Product A
Price B
Place C
Promotion D
Q71. The sales price of products is decided according to the different sales price setting methods.
Which of the following approaches sets a high sales price by using the consumer psychology
that high quality equals to high price?
– 26 –
Q72. Which of the following is an appropriate explanation of the technology S-curve?
a) A website of a company through which the company publishes information about its
management and financial status, as well as performance trends for individual investors
b) A website of a company through which the company transmits information about the
characteristics and usage methods of its products to the general consumers
c) A website of a government organization through which the agency publishes
information about its policies and administrative services to the general citizens
d) A website such as a blog and SNS, etc. through which an individual transmits
information to the general public about the evaluation of products, etc. that he/she has
used
– 27 –
Q74. Which of the following indicates a price setting method based on the cost plus approach?
a) Deciding the price by adding a margin right from the beginning with the prerequisite of
offering a discount to the customer
b) Deciding the price by incorporating the desired margin with reference to the
manufacturing cost and business expenses
c) Deciding the price on a level that can be expected to compete in the market
d) Deciding the price step-by-step in view of maximum profits and minimum risks through
price analysis
Q75. The figure below shows the relationships among components for product A, and a number
in parentheses is the quantity of components needed to produce one unit of the upper-level
product or component. When 10 units of product A are produced, how many units of
component C must be ordered? Here, there are presently five units of component C in the
inventory, and the components in the inventory must be used for the production before the
order.
B(2) C(1)
a) 15 b) 20 c) 25 d) 30
Q76. To secure transparency of business administration, which of the following is a concept that
supervises and monitors a company’s activities from the perspective of questions such as for
whom the company runs its business, what the structure of the top management is like, and
whether the organization has self-improvement capabilities?
– 28 –
Q77. Which of the following items should be put under “Liabilities and Stockholder’s Equity”
in a balance sheet?
Q78. Which of the following type of financial statements shows the financial position of an
enterprise at a particular point of time?
– 29 –
Q80. The horizontal and vertical axes of an Operating Characteristic (OC) curve in quality
management generally represent the percent defective of a lot and the success rate of a lot,
respectively. Samples of size n are extracted from a lot of size N, and when the number of
defective samples is equal to or less than the pass quantity C, the lot is considered to have
passed, and when it exceeds C, the lot is considered to have failed.
Which of the following is a diagram that represents the trend of change in the OC curve
when N and n are fixed and C takes the values 0, 1, and 2?
a) b)
C=
C=
C=
C=
2
0
C=
C=
1
1
0
2
0 0
c) d)
C= 1
C= 1
C= =0
C= =2
2
0
C
C
0 0
– 30 –