SlideShare a Scribd company logo
Medium Questions



      by Tanat Tonguthaisri
        itpe@nstda.or.th
Question A
Read the following description concerning the procedure for
identifying a system failure in a LAN-based system, and
then answer Q1 through Q4.
 
 
Mr. M’s department uses a LAN-based system which
consists of two PCs (PC1 and PC2), one server, one
printer, and one hub, connected with four cables a
through d as shown in the figure below.




                              Fig. LAN configuration
The printer connected to the LAN has a print server
function, which is configured to allow PCs to print from
them directly. One day, Mr. M tried to print from PC1 but
could not. On the previous day, Mr. M could print from PC1
without any problem.
Here, in inspecting the connection between a device and a
cable, a defective socket is identified as a device failure,
and a defective connector is identified as a cable failure.
There can only be one failure in the system at any given
time, and there is no failure in PC1.

1. (NW) Among the eight components (PC2, Server,
Printer, Hub, and Cables a through d) of the LAN, how
many can be considered as a candidate (or candidates) for
the cause of the failure?

        a) 1          b) 2         c) 3          d) 4
2. (NW) In order to isolate the cause of the failure,
Mr. M checked if he could print from PC2. He then
repeated the test after switching the connection on
the Hub end for Cables c and d, which are
connected to PC1 and PC2, respectively.

If Mr. M succeeds in printing from PC2 in both cases
above, how many components can be considered as
a candidate (or candidates) for the cause of the
failure among the eight components (PC2, Server,
Printer, Hub, and Cables a through d)?

   a) 0         b) 1         c) 2               d)
3. (BT) Mr. M decides to make a flowchart of the
procedure for identifying the failure cause. Which of the
following is the appropriate statement for X in the
flowchart below? Here, the flowchart is not completed.




                    Note: The shaded box is intentionally left blank.
PC2 can print.
Swapping cables

PC2 cannot print.
Cable C is probably defective.
Swapping connection at Hub ends.

PC2 cannot print.
Socket 1 is probably defective.
a) Suspecting that the “socket” connecting PC1 to Hub is defective
b) Suspecting that “Cable c” connecting PC1 to Hub is defective
c) Suspecting “Cable b” connecting Printer to Hub is defective
d) Suspecting that “Printer” is defective
4. (BT) Mr. M continued working on the flowchart of the
procedure for identifying the failure cause. Which of the
following is the appropriate statement for Y in the flowchart
below? Here, the flowchart is not completed.




             Note: The shaded box is intentionally left blank.
a) Suspecting that “Hub” is defective
b) Suspecting that “Cable b” connecting Printer to Hub is
   defective
c) Suspecting that “Cable b” connecting Printer to Hub or “Hub” is
   defective
d) Suspecting that “Printer” is defective
Question B
Read the following description concerning sales management of
PC-related equipment, and then answer Q5 through Q8.
 
Company I is engaged in the PC-related equipment sales
business for corporate customers and manages its sales
management information by using databases. The company
issues billing statements (shown in Fig. 2) at the time of sales by
using the database (shown in Fig. 1) and the print function of the
database management system.

When the unit price of each product is changed as required, the
corresponding record in the unit price table is overwritten with the
new prices and the timestamp of update. Each corporate
customer (hereinafter called customer) designates one contact
person as a rule, or sometimes one person per department.
However, one customer code is assigned to each of the
customers, not to each of the contact persons.
Product table

  Product_code      Product_name     Classification_code           Manufacturer_code    Supplier_code




   Unit price table
      Product_code                 Unit_price           Update_timestamp

   Customer table
                 Customer_code                             Customer_name

  Contact person table


      Customer_code         Dept_name        Location       Name        Title     Phone_number



           NOTE: “Dept_name” means department name.

                 Fig. 1 Database structure for sales management operations
Fig. 2 Example of billing statement
5. (BT) Company I performs data backup of the tables
in Fig. 1 at month end. When the contact person table
has the structure described below, which of the
following is the minimum size of the storage in kilobytes
to be reserved for table backup? Here, the backup
data is not compressed, and 1 kilobyte is 103 bytes.

[Structure of contact person table]
    Number of records: 10,000
    Customer code and telephone number: 10 digits each in single-byte code
    Dept name: 20 characters in double-byte code
    Location: 40 characters in double-byte code
    Name and title: 10 characters each in double-byte code
                                                      a) 1,000
                                                      b) 1,500
                                                      c) 1,800
                                                      d) 2,000
Number of records: 10,000
Customer code and telephone number: 10 digits
each in single-byte code 10 x 2 x 1 = 20
Dept name: 20 characters in double-byte code
20 x 2 = 40
Location: 40 characters in double-byte code
40 x 2 = 80
Name and title: 10 characters each in double-
byte code 10 x 2 x 2 = 40

20 + 40 + 80 + 40 = 180
180 bytes x 10,000 / 1,000 bytes/kb
= 1,800 kb
6. (DB) Which of the following is
appropriate as a primary key or a
set of primary keys in order to
uniquely identify records in the
contact person table in Fig. 1?
       a)   Customer_code
       b)   Customer_code, Name
       c)   Customer_code, Dept_name
       d)   Name, Title
7. (DB) The four tables in Fig. 1 must be referenced in order to issue a
billing statement in Fig. 2. When one copy of the billing statement is
issued, which of the following shows the comparison of the number of
times that each of the four kinds of records is referenced?

         Here, customer code, name, department name, and product
code and quantity of the purchased product are known at the time of
issue of the billing statement, so each table is referenced based on
these values. At the time of referencing, the operation to retrieve one
record by using the primary key (or the set of primary keys) is counted
as one time. In addition, “product table > unit price table” means that
the number of times of referencing the product table is greater than that
for the unit price table.

 a)   Unit price table = Product table = Contact person table = Customer table
 b)   Unit price table = Product table ≥ Contact person table = Customer table
 c)   Unit price table ≥ Product table ≥ Contact person table = Customer table
 d)   Unit price table ≥ Product table ≥ Contact person table ≥ Customer table
8. (DB) The billing statement in Fig. 2 is to be recorded as a table.
     When the billing statement table records seven items—Slip_number,
     Date, Customer_code, Dept_name, Product_code, Quantity, and
     Unit_price—in a normalized form, which of the following is the
     appropriate table structure?
a)        Slip_number           Date         Customer_code         Dept_name         Product_code          Quantity       Unit_price


                  b)     Slip_number          Date           Customer_code                 Dept_name
                                        

                        Product_code         Quantity            Unit_price      



          c)           Slip_number         Date      Customer_code       Dept_name  
                                                                                                            


                       Slip_number         Product_code          Quantity             Unit_price


                  d)                       Slip_number                              Date             




               
                                                              
                                            Customer_code                                  Dept_name                   




               
                                                              
                                     Product_code                    Quantity                           Unit_price
Question C          Read the following description concerning room entry
control for facilities, and then answer Q9 through Q12.
 
Sales branch T of Company S has a plan to install a room entry control
system that uses ID cards. The types of facilities of sales branch T and
the categories of people subject to control (hereinafter called target
categories) are classified as shown in the table below, and the
categories indicating whether or not room entry is permitted are set
(hereinafter called permission categories). Here, a target category for
which entry into the facility is permitted is indicated by “√” and one for
which entry is not permitted is indicated by “−” in the table below.

Table Setting of the permission categories


   Target category                         Visitor     Sales department staff
   Facility
   Office                                     –                  √
   Reception room                             √                  √
In order to set permission categories for facilities and target categories,
the permission categories are entered in the setting formats shown
below from the administrative PC of the room entry control system.

[Setting formats]


      Format 1 Policy      Permission category




       Format 2 Facility   Permission category   Target category




              Note: The third field of format 1 is not
                used.
(1)         In order to set permission categories, format 1 is described on the
first line and format 2 is described on as many lines as necessary starting with
the second line.

(2)        For the permission category, “ACCEPT” is described when entry into
the facility is permitted, and “DENY” is described when entry is not permitted.

(3)      Format 1 is intended for describing a policy, and the word “Policy” is
described in the first field. The description of a policy specifies the permission
category to be applied to the combinations of both a facility and a target
category that do not correspond to any of the combinations described on the
second and subsequent lines.

(4)       Format 2 is intended for describing the combinations of a facility and
a target category as well as the permission categories for those combinations.
 Multiple target categories having the same permission category for a facility
can be described by separating each of them with a comma.

(5)       To determine whether entry into the facility is permitted or not, the
second and subsequent lines are checked in the order they are listed. When
the line containing the specified combination of both a facility and a target
category is found, the permission category described on that line is applied
and the subsequent lines are not checked.
9. (DB) Regarding the setting of the permission categories in the
table, when the permission category for Policy is set to “ACCEPT”,
the description of the setting is as shown in the figure below.
Regarding the setting in the table, when the permission category for
“Policy” is set to “DENY”, which of the following is the appropriate
description of the setting?
                        Policy       ACCEPT
                        Office       DENY      Visitor


    a)        Policy                        DENY
              Office                        ACCEPT        Sales department staff

               b)      Policy                      DENY
                       Reception room              ACCEPT          Visitor, Sales department staff




         c)         Policy                         DENY
                    Office                         DENY              Visitor
                    Reception room                 ACCEPT            Visitor, Sales department staff


     d)        Policy                              DENY
               Office                              ACCEPT              Sales department staff
               Reception room                      ACCEPT              Visitor, Sales department staff
10. (DB) Regarding the setting of the permission categories shown in
the table below, when the permission category for “Policy” in format 1
is set to “DENY”, what is the minimum number of lines required for
describing of the setting, including the line describing format 1?


                            Visitor   Sales department staff   Engineering department staff
          Target category
          Facility
         Conference room       –                √                           √

         Office 1              –                √                           –

         Office 2              –                –                           √

         Reception room        √                √                           √




                  a) 4          b) 5                    c) 6                    d) 7
Policy            DENY


Conference room   ACCEPT Sales department staff, staff
                         Engineering department


Office 1          ACCEPT Sales department staff



Office 2          ACCEPT Engineering department staff


                         Visitor,
Reception room    ACCEPT Sales department staff,
                         Engineering department staff
11. (BT) Regarding the setting of the permission categories shown in the table
below, when the permission category for “Policy” is set to “ACCEPT”, the
description of the setting is as shown in Fig. 1. As entry into the special
conference room is permitted for managers, a new target category “Manager”
is created and the description of the setting shown in Fig. 2 is inserted.
Among (1) through (4) shown in Fig. 1, which is the appropriate position
where the setting shown in Fig. 2 is inserted?
          Here, the manager of the sales department and the manager of the
engineering department belong to the target category of “Manager”, and both
managers also belong to the target categories of the staff of their respective
departments. In the case where a person to be controlled belongs to two
target categories, when the line matching the combination of a facility and one
of the target categories is found during checking of the description of the
setting, the permission category of that line is applied.

                               Visito   Sales department staff   Engineering department staff
     Target category             r
     Facility
     Special conference room     –                –                           –
     Conference room             –                √                           √
     Office 1                    –                √                           –
     Office 2                    –                –                           √
     Reception room              √                √                           √
Policy                  ACCEPT
(1)

                                          Visitor, Sales department staff,
         Special conference room DENY     Engineering department staff
(2)

         Conference room         DENY     Visitor
(3)
         Office 1                DENY     Visitor, Engineering department staff
         Office 2                DENY     Visitor, Sales department staff
(4)

      Fig. 1 Description of the setting
      when the permission category for Policy is set to ACCEPT

             Special conference room    ACCEPT       Manager
              Fig. 2 Description of the additional
              setting

          a) (1)b) (2)c) (3)                 d) (4)
12. (IS) In preparation for a lack of format 2
when a new facility or target category is
inserted, which of the following is the
appropriate method for setting the
permission category for “Policy” from the
viewpoint of security?
           a)“ACCEPT” is set so that entry is not
              allowed if any setting is missing.
           b)“DENY” is set so that entry is not allowed
              if any setting is missing.
           c) “ACCEPT” is set so that entry is allowed
              even if any setting is missing.
           d)“DENY” is set so that entry is allowed
              even if any setting is missing.
Question D         Read the following description concerning the task of
managing the loan-out of documents, and then answer Q13 through Q14.
 
The data room of Company A’s laboratory is engaged in the task of
managing the loan-out of documents. A document loan-out management
system (hereinafter called the document system) that utilizes PC-based
database software is used for the task of managing the loan-out of
documents.

The database structure of the document system is as follows:
    Employee table
                Emp_No             Emp_name                   E-mail_address

      Document table
                    Doc_No              Doc_title


     Loan-out table
       Doc_No    Doc_title   Emp_No    Emp_name     E-mail_address   Loan-out_date   Return_date

                Note: “Doc_No” stands for document number,
                   “Doc_title” for document title, “Emp_No” for employee number, and
                   “Emp_name” for employee name.
The conditions concerning the documents held and the loan-out of
documents are as follows:

[Conditions concerning the documents held and the loan-out]
(1)       Only one copy of the same document is held, and a unique
document number is assigned to each document.
(2)       The maximum loan-out period is two weeks including the day
on which the document is loaned out. A document returned by an
employee may be loaned out to another employee on the day the
document is returned, but a returned document is not loaned out to the
same employee on the day it is returned.
 
The procedure from loan-out to return is as follows:
[Procedure from loan-out to return]
(1)       An employee takes out the document that he or she wants to
borrow from the library, hands it to the staff member in charge of the
data room (hereinafter called the staff member), and shows his or her
employee number to the staff member.
(2)       The staff member performs the loan-out process by using the
document system and hands over the document to the employee.
(3)       When the employee returns the document, he or she hands it to
the staff member, who in turn performs the return process by using the
document system.
The specifications for the loan-out process and return process in the
document system are as follows:

[Loan-out process]
(1)       The document table is searched by using “Doc_No” to obtain
“Doc_title”.

(2)    The employee table is searched by using “Emp_No” to obtain
“Emp_name” and “E-mail_address”.

(3)       A record (hereinafter called the loan-out record) for the loan-out
table is prepared, and “Doc_No”, “Doc_title”, “Emp_No”, “Emp_name”, and
“E-mail_address” obtained in (1) and (2) are set. The current date is set as
“Loan-out_date”, and a null value is set as “Return_date”.

(4)      The loan-out record set in (3) is added to the loan-out table.


[Return process]
(1)      The loan-out table is searched by using “Doc_No” to retrieve the
loan-out record that has a null value as “Return_date”.

(2)      The current date is set as “Return_date” of the retrieved loan-out
record, and the loan-out table is updated.
13. (DB) Which of the following is the
appropriate description concerning the
database structure of the document system?
Here, a primary key is a field or combination of
fields that uniquely identifies each record in a
table.
        a)The primary key of the loan-out table is the
           combination of “Doc_No” and “Emp_No”.
        b)The primary key of the loan-out table is the
           combination of “Doc_No”, “Emp_No”, and
           “Loan-out_date”.
        c) The primary key of the employee table and
           loan-out table is “Emp_No”.
        d)The primary key of the document table and
           loan-out table is “Doc_No”.
14. (DB) An investigation is done to contact the
employees who have not returned documents within two
weeks including the loan-out date. Which of the following
is the appropriate method of retrieving these employees?
          a) Retrieving the records whose “Loan-out_date” in the
             loan-out table is a null value and whose
             “Return_date” is within two weeks from the
             investigation date
          b) Retrieving the records whose “Loan-out_date” in the
             loan-out table is two weeks ago from the
             investigation date or earlier
          c) Retrieving the records whose “Return_date” in the
             loan-out table is a null value and whose “Loan-
             out_date” is two weeks ago from the investigation
             date or earlier
          d) Retrieving the records whose “Return_date” in the
             loan-out table is a null value
Question E
Read the following description concerning the creation of a Web page, and
then answer questions Q15 through Q16.
 
Mr. D, a PR staff member at the town N store of a supermarket chain,
is working with Mr. E, a staff member in charge of the Web site of the
company’s headquarters, to create an introduction page for the town N
store. A questionnaire with a gift included is to be implemented with
the aim of increasing the number of visitors to the introduction page for
the town N store. Mr. D created a proposal for a gift page as shown in
Fig. 1 and consulted Mr. E.




                   Note:      [ ] is an input area, is a button, and < > explains that a component
                       to be displayed or content to be displayed is omitted.
                   Fig. 1 Proposal for a gift page
Mr. E checked the proposal for a gift page and gave the
advice and instructions below to Mr. D.
[Main advice concerning design]
(1)    Adopting an input method with ease of operation,
such as input by mouse
(2)    Placing input areas and buttons in the order that
operations such as responding are easy to perform
(3)    Using an input form depending on the data format in
order to prevent input errors
 
[Main instructions concerning creation]
(1)    Creating the gift page in an HTML format file called
“ank01.html”, and transferring it to a specified directory on
the Web server
(2)    Using a relative path to specify a file
(3)    Making the file size of each photograph that is used
200 KB or less
15. (HI) Which of the following is the
appropriate method for creating the
Usage analysis table shown in Fig. 2?
   a) Placing the “Submit” button at the very top of the
      page so that the user does not forget to press it
   b) Using a check box so that the user can choose
      the “desired gift” with a click of a mouse
   c) Using a radio button for “Sex” so that the user
      can choose either “Male” or “Female”
   d) Placing questionnaire items on the assumption
      that the user responds to questions sequentially
      from the top-right of the screen
16. (MM) Mr. D received permission from the
manufacturer of the gifts, and decided to scan
photographs of the gifts from the manufacturer’s
product catalog and then place these images on the gift
page. The photographs are scanned in a bitmap
format at a size of 2 inches high × 3 inches wide and in
24-bit color. The images are then edited with photo-
retouching software.
When compression of an image with the photo-
retouching software is not considered, which of the
following is the highest resolution in dpi (dots per inch)
for the image scanner that Mr. D can select in
accordance with Mr. E’s advice or instructions?
                                                    a)   60
                                                    b)   100
                                                    c)   300
                                                    d)   1,200
200 KB = 200 KB x 1,024 Bytes/KB = 200 x 1,024 Bytes
      = 200 x 1,024 Bytes x 8 Bits/Byte
      = 200 x 1,024 x 8 Bits

200 x 1,024 x 8 Bits / (24 Bits/dot) = 200 x 1,024 / 3 dots



(200 x 1,024 / 3) dots / (2 x 3) sq. inches
       = 100 x 1,024 / 9 dots/sq.inches
       = 11,377 dots/sq.inches

Square root (11,377 dots/sq.inches) = 106 dot/inch
                                 = 106 dpi
Question F
Read the following description concerning member data analysis,
and then answer Q17.
 
Mr. A is an employee of a fitness center. He decides to analyze the
usage of the facility based on the data stored in the member
management system, using a database application on his PC. From
the Member table and the Check-in table with their structures shown
in Fig. 1, Mr. A retrieved the data for one month of usage by
members in the age groups of 20s through 50s.

      Member table
       Membership_number     Member_name         Sex         Age

       Check-in table
              Membership_number           Date     Checkin_time


           Fig. 1 Data structure of the Member table and the Check-in
              table
Using the data retrieved from the Member and Check-in tables, Mr.
A created a Usage analysis table with the structure shown in Fig. 2.
    Usage analysis table
    Membership_number Member_name             Sex       Age   Date   Checkin_time
    Fig. 2 Data structure of the Usage analysis table


    Based on the Usage analysis table, Mr. A created a list showing the
    number of visits by age group and sex, as shown below. The values
    show the gross number of visits during the month.

               Table Visit counts by age group and sex
                   Sex                Age group                 Visit count (persons)
                                         20s                             56
                                         30s                            114
                   Male                  40s                            227
                                         50s                            295
                                       Sub total                        692
                                         20s                            100
                                         30s                            215
                  Female                 40s                            348
                                         50s                            227
                                       Sub total                        890
17. (DB) Which of the following is the
appropriate method for creating the
Usage analysis table shown in Fig. 2?
    a)Join the Member table and the Check-in table
       using Membership_number as a key.
    b)Sort the Member table by Membership_number,
       and then project from the Check-in table.
    c) Select the Member table using
       Membership_number of the Check-in table as a
       key.
    d)Sort the Check-in table by Membership_number,
       and then select the Member table.

More Related Content

Similar to Medium Questions

Coit11237 assignment 2 specifications
Coit11237 assignment 2 specificationsCoit11237 assignment 2 specifications
Coit11237 assignment 2 specifications
Nicole Valerio
 
3.2. Process Order Info (Change the name ComponentModule .docx
3.2. Process Order Info (Change the name ComponentModule .docx3.2. Process Order Info (Change the name ComponentModule .docx
3.2. Process Order Info (Change the name ComponentModule .docx
gilbertkpeters11344
 
Copying number ranges in SAP FICO ECC
Copying number ranges  in SAP FICO ECCCopying number ranges  in SAP FICO ECC
Copying number ranges in SAP FICO ECC
Srinivas Rao
 
Developing Microsoft SQL Server 2012 Databases 70-464 Pass Guarantee
Developing Microsoft SQL Server 2012 Databases 70-464 Pass GuaranteeDeveloping Microsoft SQL Server 2012 Databases 70-464 Pass Guarantee
Developing Microsoft SQL Server 2012 Databases 70-464 Pass Guarantee
SusanMorant
 
GRUG 2.0 6 Digital Guerrilla Validation 20180503
GRUG 2.0 6 Digital Guerrilla Validation 20180503GRUG 2.0 6 Digital Guerrilla Validation 20180503
GRUG 2.0 6 Digital Guerrilla Validation 20180503
Glasgow Revit User Group
 
Microsoft MCSE 70-469 it braindumps
Microsoft MCSE 70-469 it braindumpsMicrosoft MCSE 70-469 it braindumps
Microsoft MCSE 70-469 it braindumps
lilylucy
 
Dora ppt2(fico)
Dora ppt2(fico)Dora ppt2(fico)
Dora ppt2(fico)
Dorai Dorai
 
Bis 311 final examination answers
Bis 311 final examination answersBis 311 final examination answers
Bis 311 final examination answers
RandalHoffman
 
Garrage management system
Garrage management system Garrage management system
Garrage management system
Prateek Pandey
 
PYTHON programming.pptx
PYTHON programming.pptxPYTHON programming.pptx
PYTHON programming.pptx
SoojBonthu
 
Bca 5050 visual programming – practical
Bca 5050   visual programming – practicalBca 5050   visual programming – practical
Bca 5050 visual programming – practical
smumbahelp
 
Labeler Guide
Labeler GuideLabeler Guide
Labeler Guide
haven832
 
1Z0-061 Oracle Database 12c: SQL Fundamentals
1Z0-061 Oracle Database 12c: SQL Fundamentals1Z0-061 Oracle Database 12c: SQL Fundamentals
1Z0-061 Oracle Database 12c: SQL Fundamentals
Lydi00147
 
SQL Practice Question set
SQL Practice Question set SQL Practice Question set
SQL Practice Question set
Mohd Tousif
 
Benefits RegisterInstructionsProbability = How likely is this eve.docx
Benefits RegisterInstructionsProbability = How likely is this eve.docxBenefits RegisterInstructionsProbability = How likely is this eve.docx
Benefits RegisterInstructionsProbability = How likely is this eve.docx
jasoninnes20
 
284566820 1 z0-061(1)
284566820 1 z0-061(1)284566820 1 z0-061(1)
284566820 1 z0-061(1)
panagara
 
C_ARCON_2202 Dumps Questions
C_ARCON_2202 Dumps QuestionsC_ARCON_2202 Dumps Questions
C_ARCON_2202 Dumps Questions
Study Material
 
Fahri tugas cloud1
Fahri tugas cloud1Fahri tugas cloud1
Fahri tugas cloud1
FAHRIZAENURIPUTRA
 
Savitch Ch 02
Savitch Ch 02Savitch Ch 02
Savitch Ch 02
Terry Yoast
 
Savitch Ch 02
Savitch Ch 02Savitch Ch 02
Savitch Ch 02
Terry Yoast
 

Similar to Medium Questions (20)

Coit11237 assignment 2 specifications
Coit11237 assignment 2 specificationsCoit11237 assignment 2 specifications
Coit11237 assignment 2 specifications
 
3.2. Process Order Info (Change the name ComponentModule .docx
3.2. Process Order Info (Change the name ComponentModule .docx3.2. Process Order Info (Change the name ComponentModule .docx
3.2. Process Order Info (Change the name ComponentModule .docx
 
Copying number ranges in SAP FICO ECC
Copying number ranges  in SAP FICO ECCCopying number ranges  in SAP FICO ECC
Copying number ranges in SAP FICO ECC
 
Developing Microsoft SQL Server 2012 Databases 70-464 Pass Guarantee
Developing Microsoft SQL Server 2012 Databases 70-464 Pass GuaranteeDeveloping Microsoft SQL Server 2012 Databases 70-464 Pass Guarantee
Developing Microsoft SQL Server 2012 Databases 70-464 Pass Guarantee
 
GRUG 2.0 6 Digital Guerrilla Validation 20180503
GRUG 2.0 6 Digital Guerrilla Validation 20180503GRUG 2.0 6 Digital Guerrilla Validation 20180503
GRUG 2.0 6 Digital Guerrilla Validation 20180503
 
Microsoft MCSE 70-469 it braindumps
Microsoft MCSE 70-469 it braindumpsMicrosoft MCSE 70-469 it braindumps
Microsoft MCSE 70-469 it braindumps
 
Dora ppt2(fico)
Dora ppt2(fico)Dora ppt2(fico)
Dora ppt2(fico)
 
Bis 311 final examination answers
Bis 311 final examination answersBis 311 final examination answers
Bis 311 final examination answers
 
Garrage management system
Garrage management system Garrage management system
Garrage management system
 
PYTHON programming.pptx
PYTHON programming.pptxPYTHON programming.pptx
PYTHON programming.pptx
 
Bca 5050 visual programming – practical
Bca 5050   visual programming – practicalBca 5050   visual programming – practical
Bca 5050 visual programming – practical
 
Labeler Guide
Labeler GuideLabeler Guide
Labeler Guide
 
1Z0-061 Oracle Database 12c: SQL Fundamentals
1Z0-061 Oracle Database 12c: SQL Fundamentals1Z0-061 Oracle Database 12c: SQL Fundamentals
1Z0-061 Oracle Database 12c: SQL Fundamentals
 
SQL Practice Question set
SQL Practice Question set SQL Practice Question set
SQL Practice Question set
 
Benefits RegisterInstructionsProbability = How likely is this eve.docx
Benefits RegisterInstructionsProbability = How likely is this eve.docxBenefits RegisterInstructionsProbability = How likely is this eve.docx
Benefits RegisterInstructionsProbability = How likely is this eve.docx
 
284566820 1 z0-061(1)
284566820 1 z0-061(1)284566820 1 z0-061(1)
284566820 1 z0-061(1)
 
C_ARCON_2202 Dumps Questions
C_ARCON_2202 Dumps QuestionsC_ARCON_2202 Dumps Questions
C_ARCON_2202 Dumps Questions
 
Fahri tugas cloud1
Fahri tugas cloud1Fahri tugas cloud1
Fahri tugas cloud1
 
Savitch Ch 02
Savitch Ch 02Savitch Ch 02
Savitch Ch 02
 
Savitch Ch 02
Savitch Ch 02Savitch Ch 02
Savitch Ch 02
 

More from Tanat Tonguthaisri

Siam RegTech for Fintech Challenge
Siam RegTech for Fintech ChallengeSiam RegTech for Fintech Challenge
Siam RegTech for Fintech Challenge
Tanat Tonguthaisri
 
Siam RegTech
Siam RegTechSiam RegTech
Siam RegTech
Tanat Tonguthaisri
 
Messaging 20170615
Messaging 20170615Messaging 20170615
Messaging 20170615
Tanat Tonguthaisri
 
Learn SABAI for YC Startup School
Learn SABAI for YC Startup SchoolLearn SABAI for YC Startup School
Learn SABAI for YC Startup School
Tanat Tonguthaisri
 
Narration 20170615
Narration 20170615Narration 20170615
Narration 20170615
Tanat Tonguthaisri
 
Configuration management - certificate of achievement
Configuration management - certificate of achievementConfiguration management - certificate of achievement
Configuration management - certificate of achievement
Tanat Tonguthaisri
 
Siam RegTech
Siam RegTechSiam RegTech
Siam RegTech
Tanat Tonguthaisri
 
IBM Blockchain for developers
IBM Blockchain for developersIBM Blockchain for developers
IBM Blockchain for developers
Tanat Tonguthaisri
 
Learn SABAI for Research Gap Fund
Learn SABAI for Research Gap FundLearn SABAI for Research Gap Fund
Learn SABAI for Research Gap Fund
Tanat Tonguthaisri
 
RIAN SABAI
RIAN SABAIRIAN SABAI
RIAN SABAI
Tanat Tonguthaisri
 
Management (IP)
Management (IP)Management (IP)
Management (IP)
Tanat Tonguthaisri
 
Strategy (IP)
Strategy (IP)Strategy (IP)
Strategy (IP)
Tanat Tonguthaisri
 
Basic Theory (IP)
Basic Theory (IP)Basic Theory (IP)
Basic Theory (IP)
Tanat Tonguthaisri
 
Database (IP)
Database (IP)Database (IP)
Database (IP)
Tanat Tonguthaisri
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
Tanat Tonguthaisri
 
Security (FE)
Security (FE)Security (FE)
Security (FE)
Tanat Tonguthaisri
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
Tanat Tonguthaisri
 

More from Tanat Tonguthaisri (17)

Siam RegTech for Fintech Challenge
Siam RegTech for Fintech ChallengeSiam RegTech for Fintech Challenge
Siam RegTech for Fintech Challenge
 
Siam RegTech
Siam RegTechSiam RegTech
Siam RegTech
 
Messaging 20170615
Messaging 20170615Messaging 20170615
Messaging 20170615
 
Learn SABAI for YC Startup School
Learn SABAI for YC Startup SchoolLearn SABAI for YC Startup School
Learn SABAI for YC Startup School
 
Narration 20170615
Narration 20170615Narration 20170615
Narration 20170615
 
Configuration management - certificate of achievement
Configuration management - certificate of achievementConfiguration management - certificate of achievement
Configuration management - certificate of achievement
 
Siam RegTech
Siam RegTechSiam RegTech
Siam RegTech
 
IBM Blockchain for developers
IBM Blockchain for developersIBM Blockchain for developers
IBM Blockchain for developers
 
Learn SABAI for Research Gap Fund
Learn SABAI for Research Gap FundLearn SABAI for Research Gap Fund
Learn SABAI for Research Gap Fund
 
RIAN SABAI
RIAN SABAIRIAN SABAI
RIAN SABAI
 
Management (IP)
Management (IP)Management (IP)
Management (IP)
 
Strategy (IP)
Strategy (IP)Strategy (IP)
Strategy (IP)
 
Basic Theory (IP)
Basic Theory (IP)Basic Theory (IP)
Basic Theory (IP)
 
Database (IP)
Database (IP)Database (IP)
Database (IP)
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
 
Security (FE)
Security (FE)Security (FE)
Security (FE)
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 

Medium Questions

  • 1. Medium Questions by Tanat Tonguthaisri itpe@nstda.or.th
  • 2. Question A Read the following description concerning the procedure for identifying a system failure in a LAN-based system, and then answer Q1 through Q4.     Mr. M’s department uses a LAN-based system which consists of two PCs (PC1 and PC2), one server, one printer, and one hub, connected with four cables a through d as shown in the figure below. Fig. LAN configuration
  • 3. The printer connected to the LAN has a print server function, which is configured to allow PCs to print from them directly. One day, Mr. M tried to print from PC1 but could not. On the previous day, Mr. M could print from PC1 without any problem. Here, in inspecting the connection between a device and a cable, a defective socket is identified as a device failure, and a defective connector is identified as a cable failure. There can only be one failure in the system at any given time, and there is no failure in PC1. 1. (NW) Among the eight components (PC2, Server, Printer, Hub, and Cables a through d) of the LAN, how many can be considered as a candidate (or candidates) for the cause of the failure? a) 1 b) 2 c) 3 d) 4
  • 4. 2. (NW) In order to isolate the cause of the failure, Mr. M checked if he could print from PC2. He then repeated the test after switching the connection on the Hub end for Cables c and d, which are connected to PC1 and PC2, respectively. If Mr. M succeeds in printing from PC2 in both cases above, how many components can be considered as a candidate (or candidates) for the cause of the failure among the eight components (PC2, Server, Printer, Hub, and Cables a through d)? a) 0 b) 1 c) 2 d)
  • 5. 3. (BT) Mr. M decides to make a flowchart of the procedure for identifying the failure cause. Which of the following is the appropriate statement for X in the flowchart below? Here, the flowchart is not completed. Note: The shaded box is intentionally left blank.
  • 7. Swapping cables PC2 cannot print. Cable C is probably defective.
  • 8. Swapping connection at Hub ends. PC2 cannot print. Socket 1 is probably defective.
  • 9. a) Suspecting that the “socket” connecting PC1 to Hub is defective b) Suspecting that “Cable c” connecting PC1 to Hub is defective c) Suspecting “Cable b” connecting Printer to Hub is defective d) Suspecting that “Printer” is defective
  • 10. 4. (BT) Mr. M continued working on the flowchart of the procedure for identifying the failure cause. Which of the following is the appropriate statement for Y in the flowchart below? Here, the flowchart is not completed. Note: The shaded box is intentionally left blank.
  • 11. a) Suspecting that “Hub” is defective b) Suspecting that “Cable b” connecting Printer to Hub is defective c) Suspecting that “Cable b” connecting Printer to Hub or “Hub” is defective d) Suspecting that “Printer” is defective
  • 12. Question B Read the following description concerning sales management of PC-related equipment, and then answer Q5 through Q8.   Company I is engaged in the PC-related equipment sales business for corporate customers and manages its sales management information by using databases. The company issues billing statements (shown in Fig. 2) at the time of sales by using the database (shown in Fig. 1) and the print function of the database management system. When the unit price of each product is changed as required, the corresponding record in the unit price table is overwritten with the new prices and the timestamp of update. Each corporate customer (hereinafter called customer) designates one contact person as a rule, or sometimes one person per department. However, one customer code is assigned to each of the customers, not to each of the contact persons.
  • 13. Product table Product_code Product_name Classification_code Manufacturer_code Supplier_code Unit price table Product_code Unit_price Update_timestamp Customer table Customer_code Customer_name Contact person table Customer_code Dept_name Location Name Title Phone_number NOTE: “Dept_name” means department name. Fig. 1 Database structure for sales management operations
  • 14. Fig. 2 Example of billing statement
  • 15. 5. (BT) Company I performs data backup of the tables in Fig. 1 at month end. When the contact person table has the structure described below, which of the following is the minimum size of the storage in kilobytes to be reserved for table backup? Here, the backup data is not compressed, and 1 kilobyte is 103 bytes. [Structure of contact person table] Number of records: 10,000 Customer code and telephone number: 10 digits each in single-byte code Dept name: 20 characters in double-byte code Location: 40 characters in double-byte code Name and title: 10 characters each in double-byte code a) 1,000 b) 1,500 c) 1,800 d) 2,000
  • 16. Number of records: 10,000 Customer code and telephone number: 10 digits each in single-byte code 10 x 2 x 1 = 20 Dept name: 20 characters in double-byte code 20 x 2 = 40 Location: 40 characters in double-byte code 40 x 2 = 80 Name and title: 10 characters each in double- byte code 10 x 2 x 2 = 40 20 + 40 + 80 + 40 = 180 180 bytes x 10,000 / 1,000 bytes/kb = 1,800 kb
  • 17. 6. (DB) Which of the following is appropriate as a primary key or a set of primary keys in order to uniquely identify records in the contact person table in Fig. 1? a) Customer_code b) Customer_code, Name c) Customer_code, Dept_name d) Name, Title
  • 18. 7. (DB) The four tables in Fig. 1 must be referenced in order to issue a billing statement in Fig. 2. When one copy of the billing statement is issued, which of the following shows the comparison of the number of times that each of the four kinds of records is referenced? Here, customer code, name, department name, and product code and quantity of the purchased product are known at the time of issue of the billing statement, so each table is referenced based on these values. At the time of referencing, the operation to retrieve one record by using the primary key (or the set of primary keys) is counted as one time. In addition, “product table > unit price table” means that the number of times of referencing the product table is greater than that for the unit price table. a) Unit price table = Product table = Contact person table = Customer table b) Unit price table = Product table ≥ Contact person table = Customer table c) Unit price table ≥ Product table ≥ Contact person table = Customer table d) Unit price table ≥ Product table ≥ Contact person table ≥ Customer table
  • 19. 8. (DB) The billing statement in Fig. 2 is to be recorded as a table. When the billing statement table records seven items—Slip_number, Date, Customer_code, Dept_name, Product_code, Quantity, and Unit_price—in a normalized form, which of the following is the appropriate table structure? a) Slip_number Date Customer_code Dept_name Product_code Quantity Unit_price b) Slip_number Date Customer_code Dept_name     Product_code Quantity Unit_price   c) Slip_number Date Customer_code Dept_name       Slip_number Product_code Quantity Unit_price d) Slip_number Date       Customer_code Dept_name       Product_code Quantity Unit_price
  • 20. Question C Read the following description concerning room entry control for facilities, and then answer Q9 through Q12.   Sales branch T of Company S has a plan to install a room entry control system that uses ID cards. The types of facilities of sales branch T and the categories of people subject to control (hereinafter called target categories) are classified as shown in the table below, and the categories indicating whether or not room entry is permitted are set (hereinafter called permission categories). Here, a target category for which entry into the facility is permitted is indicated by “√” and one for which entry is not permitted is indicated by “−” in the table below. Table Setting of the permission categories Target category Visitor Sales department staff Facility Office – √ Reception room √ √
  • 21. In order to set permission categories for facilities and target categories, the permission categories are entered in the setting formats shown below from the administrative PC of the room entry control system. [Setting formats] Format 1 Policy Permission category Format 2 Facility Permission category Target category Note: The third field of format 1 is not used.
  • 22. (1) In order to set permission categories, format 1 is described on the first line and format 2 is described on as many lines as necessary starting with the second line. (2) For the permission category, “ACCEPT” is described when entry into the facility is permitted, and “DENY” is described when entry is not permitted. (3) Format 1 is intended for describing a policy, and the word “Policy” is described in the first field. The description of a policy specifies the permission category to be applied to the combinations of both a facility and a target category that do not correspond to any of the combinations described on the second and subsequent lines. (4) Format 2 is intended for describing the combinations of a facility and a target category as well as the permission categories for those combinations. Multiple target categories having the same permission category for a facility can be described by separating each of them with a comma. (5) To determine whether entry into the facility is permitted or not, the second and subsequent lines are checked in the order they are listed. When the line containing the specified combination of both a facility and a target category is found, the permission category described on that line is applied and the subsequent lines are not checked.
  • 23. 9. (DB) Regarding the setting of the permission categories in the table, when the permission category for Policy is set to “ACCEPT”, the description of the setting is as shown in the figure below. Regarding the setting in the table, when the permission category for “Policy” is set to “DENY”, which of the following is the appropriate description of the setting? Policy ACCEPT Office DENY Visitor a) Policy DENY Office ACCEPT Sales department staff b) Policy DENY Reception room ACCEPT Visitor, Sales department staff c) Policy DENY Office DENY Visitor Reception room ACCEPT Visitor, Sales department staff d) Policy DENY Office ACCEPT Sales department staff Reception room ACCEPT Visitor, Sales department staff
  • 24. 10. (DB) Regarding the setting of the permission categories shown in the table below, when the permission category for “Policy” in format 1 is set to “DENY”, what is the minimum number of lines required for describing of the setting, including the line describing format 1? Visitor Sales department staff Engineering department staff Target category Facility Conference room – √ √ Office 1 – √ – Office 2 – – √ Reception room √ √ √ a) 4 b) 5 c) 6 d) 7
  • 25. Policy DENY Conference room ACCEPT Sales department staff, staff Engineering department Office 1 ACCEPT Sales department staff Office 2 ACCEPT Engineering department staff Visitor, Reception room ACCEPT Sales department staff, Engineering department staff
  • 26. 11. (BT) Regarding the setting of the permission categories shown in the table below, when the permission category for “Policy” is set to “ACCEPT”, the description of the setting is as shown in Fig. 1. As entry into the special conference room is permitted for managers, a new target category “Manager” is created and the description of the setting shown in Fig. 2 is inserted. Among (1) through (4) shown in Fig. 1, which is the appropriate position where the setting shown in Fig. 2 is inserted? Here, the manager of the sales department and the manager of the engineering department belong to the target category of “Manager”, and both managers also belong to the target categories of the staff of their respective departments. In the case where a person to be controlled belongs to two target categories, when the line matching the combination of a facility and one of the target categories is found during checking of the description of the setting, the permission category of that line is applied. Visito Sales department staff Engineering department staff Target category r Facility Special conference room – – – Conference room – √ √ Office 1 – √ – Office 2 – – √ Reception room √ √ √
  • 27. Policy ACCEPT (1) Visitor, Sales department staff, Special conference room DENY Engineering department staff (2) Conference room DENY Visitor (3) Office 1 DENY Visitor, Engineering department staff Office 2 DENY Visitor, Sales department staff (4) Fig. 1 Description of the setting when the permission category for Policy is set to ACCEPT Special conference room ACCEPT Manager Fig. 2 Description of the additional setting a) (1)b) (2)c) (3) d) (4)
  • 28. 12. (IS) In preparation for a lack of format 2 when a new facility or target category is inserted, which of the following is the appropriate method for setting the permission category for “Policy” from the viewpoint of security? a)“ACCEPT” is set so that entry is not allowed if any setting is missing. b)“DENY” is set so that entry is not allowed if any setting is missing. c) “ACCEPT” is set so that entry is allowed even if any setting is missing. d)“DENY” is set so that entry is allowed even if any setting is missing.
  • 29. Question D Read the following description concerning the task of managing the loan-out of documents, and then answer Q13 through Q14.   The data room of Company A’s laboratory is engaged in the task of managing the loan-out of documents. A document loan-out management system (hereinafter called the document system) that utilizes PC-based database software is used for the task of managing the loan-out of documents. The database structure of the document system is as follows: Employee table Emp_No Emp_name E-mail_address Document table Doc_No Doc_title Loan-out table Doc_No Doc_title Emp_No Emp_name E-mail_address Loan-out_date Return_date Note: “Doc_No” stands for document number, “Doc_title” for document title, “Emp_No” for employee number, and “Emp_name” for employee name.
  • 30. The conditions concerning the documents held and the loan-out of documents are as follows: [Conditions concerning the documents held and the loan-out] (1) Only one copy of the same document is held, and a unique document number is assigned to each document. (2) The maximum loan-out period is two weeks including the day on which the document is loaned out. A document returned by an employee may be loaned out to another employee on the day the document is returned, but a returned document is not loaned out to the same employee on the day it is returned.   The procedure from loan-out to return is as follows: [Procedure from loan-out to return] (1) An employee takes out the document that he or she wants to borrow from the library, hands it to the staff member in charge of the data room (hereinafter called the staff member), and shows his or her employee number to the staff member. (2) The staff member performs the loan-out process by using the document system and hands over the document to the employee. (3) When the employee returns the document, he or she hands it to the staff member, who in turn performs the return process by using the document system.
  • 31. The specifications for the loan-out process and return process in the document system are as follows: [Loan-out process] (1) The document table is searched by using “Doc_No” to obtain “Doc_title”. (2) The employee table is searched by using “Emp_No” to obtain “Emp_name” and “E-mail_address”. (3) A record (hereinafter called the loan-out record) for the loan-out table is prepared, and “Doc_No”, “Doc_title”, “Emp_No”, “Emp_name”, and “E-mail_address” obtained in (1) and (2) are set. The current date is set as “Loan-out_date”, and a null value is set as “Return_date”. (4) The loan-out record set in (3) is added to the loan-out table. [Return process] (1) The loan-out table is searched by using “Doc_No” to retrieve the loan-out record that has a null value as “Return_date”. (2) The current date is set as “Return_date” of the retrieved loan-out record, and the loan-out table is updated.
  • 32. 13. (DB) Which of the following is the appropriate description concerning the database structure of the document system? Here, a primary key is a field or combination of fields that uniquely identifies each record in a table. a)The primary key of the loan-out table is the combination of “Doc_No” and “Emp_No”. b)The primary key of the loan-out table is the combination of “Doc_No”, “Emp_No”, and “Loan-out_date”. c) The primary key of the employee table and loan-out table is “Emp_No”. d)The primary key of the document table and loan-out table is “Doc_No”.
  • 33. 14. (DB) An investigation is done to contact the employees who have not returned documents within two weeks including the loan-out date. Which of the following is the appropriate method of retrieving these employees? a) Retrieving the records whose “Loan-out_date” in the loan-out table is a null value and whose “Return_date” is within two weeks from the investigation date b) Retrieving the records whose “Loan-out_date” in the loan-out table is two weeks ago from the investigation date or earlier c) Retrieving the records whose “Return_date” in the loan-out table is a null value and whose “Loan- out_date” is two weeks ago from the investigation date or earlier d) Retrieving the records whose “Return_date” in the loan-out table is a null value
  • 34. Question E Read the following description concerning the creation of a Web page, and then answer questions Q15 through Q16.   Mr. D, a PR staff member at the town N store of a supermarket chain, is working with Mr. E, a staff member in charge of the Web site of the company’s headquarters, to create an introduction page for the town N store. A questionnaire with a gift included is to be implemented with the aim of increasing the number of visitors to the introduction page for the town N store. Mr. D created a proposal for a gift page as shown in Fig. 1 and consulted Mr. E. Note: [ ] is an input area, is a button, and < > explains that a component to be displayed or content to be displayed is omitted. Fig. 1 Proposal for a gift page
  • 35. Mr. E checked the proposal for a gift page and gave the advice and instructions below to Mr. D. [Main advice concerning design] (1) Adopting an input method with ease of operation, such as input by mouse (2) Placing input areas and buttons in the order that operations such as responding are easy to perform (3) Using an input form depending on the data format in order to prevent input errors   [Main instructions concerning creation] (1) Creating the gift page in an HTML format file called “ank01.html”, and transferring it to a specified directory on the Web server (2) Using a relative path to specify a file (3) Making the file size of each photograph that is used 200 KB or less
  • 36. 15. (HI) Which of the following is the appropriate method for creating the Usage analysis table shown in Fig. 2? a) Placing the “Submit” button at the very top of the page so that the user does not forget to press it b) Using a check box so that the user can choose the “desired gift” with a click of a mouse c) Using a radio button for “Sex” so that the user can choose either “Male” or “Female” d) Placing questionnaire items on the assumption that the user responds to questions sequentially from the top-right of the screen
  • 37. 16. (MM) Mr. D received permission from the manufacturer of the gifts, and decided to scan photographs of the gifts from the manufacturer’s product catalog and then place these images on the gift page. The photographs are scanned in a bitmap format at a size of 2 inches high × 3 inches wide and in 24-bit color. The images are then edited with photo- retouching software. When compression of an image with the photo- retouching software is not considered, which of the following is the highest resolution in dpi (dots per inch) for the image scanner that Mr. D can select in accordance with Mr. E’s advice or instructions? a) 60 b) 100 c) 300 d) 1,200
  • 38. 200 KB = 200 KB x 1,024 Bytes/KB = 200 x 1,024 Bytes = 200 x 1,024 Bytes x 8 Bits/Byte = 200 x 1,024 x 8 Bits 200 x 1,024 x 8 Bits / (24 Bits/dot) = 200 x 1,024 / 3 dots (200 x 1,024 / 3) dots / (2 x 3) sq. inches = 100 x 1,024 / 9 dots/sq.inches = 11,377 dots/sq.inches Square root (11,377 dots/sq.inches) = 106 dot/inch = 106 dpi
  • 39. Question F Read the following description concerning member data analysis, and then answer Q17.   Mr. A is an employee of a fitness center. He decides to analyze the usage of the facility based on the data stored in the member management system, using a database application on his PC. From the Member table and the Check-in table with their structures shown in Fig. 1, Mr. A retrieved the data for one month of usage by members in the age groups of 20s through 50s. Member table Membership_number Member_name Sex Age Check-in table Membership_number Date Checkin_time Fig. 1 Data structure of the Member table and the Check-in table
  • 40. Using the data retrieved from the Member and Check-in tables, Mr. A created a Usage analysis table with the structure shown in Fig. 2. Usage analysis table Membership_number Member_name Sex Age Date Checkin_time Fig. 2 Data structure of the Usage analysis table Based on the Usage analysis table, Mr. A created a list showing the number of visits by age group and sex, as shown below. The values show the gross number of visits during the month. Table Visit counts by age group and sex Sex Age group Visit count (persons) 20s 56 30s 114 Male 40s 227 50s 295 Sub total 692 20s 100 30s 215 Female 40s 348 50s 227 Sub total 890
  • 41. 17. (DB) Which of the following is the appropriate method for creating the Usage analysis table shown in Fig. 2? a)Join the Member table and the Check-in table using Membership_number as a key. b)Sort the Member table by Membership_number, and then project from the Check-in table. c) Select the Member table using Membership_number of the Check-in table as a key. d)Sort the Check-in table by Membership_number, and then select the Member table.