Beruflich Dokumente
Kultur Dokumente
BAN QUN L
KHU CNG NGH CAO HO LC
FUNDAMENTAL
INFORMATION TECHNOLOGY
ENGINEER
EXAMINATION
ST HCH
K S
CNG NGH THNG TIN
C BN
Morning
Spring 2004
VITEC
Q1Q80
All questions are compulsory
9:00-11:30 (150 minutes)
Instructions:
1. Use an HB pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.
2. Mark your examinee information and test answers in accordance with the instructions below.
Your test will not be graded if you do not mark properly. Do not mark or write on the answer
sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space below
each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination admission
card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
In which month is this Fundamental IT Engineer Examination conducted?
a) March
b) April
c) May
d) June
Since the correct answer is b) (April), mark your answer sheet as follows:
[Sample Reply]
No.
Q1
Company names and product names appearing in the test questions are trademarks or registered trademarks of their
respective companies. Note that the and symbols are not used within.
Ma xun 2004
VITEC
Q1-Q80
Tt c cc cu hi u bt buc
9:00-11:30 (150 pht)
Hng dn:
1. Dng bt ch HB. Nu bn cn thay i cu tr li, hy xo sch cu tr li trc. Phi ht bi
ty trn giy.
2. nh du thng tin d thi v cc cu tr li ca bn theo hng dn di y. Bi thi s khng
c chm im nu khng nh du ng. Khng nh du hoc vit g ngoi nhng ch
c qui nh trn phiu tr li.
(1)
S bo danh
Hy vit s bo danh ca bn vo ch cho, v nh du ch thch hp di mi ch s.
(2)
Ngy sinh
Hy vit ngy sinh ca bn (bng s) chnh xc nh c in trong phiu d thi, v nh du
ch thch hp di mi ch s.
(3)
Cc cu tr li
Hy chn mt cu tr li (a n d) cho mi cu hi.
Bi en cc cu tr li nh c nu trong cu hi mu di y.
[Cu hi mu]
K thi st hch k s CNTT c bn ny c tin hnh vo thng no?
a) Thng Ba
b) Thng T
c) Thng Nm
d) Thng Su
V cu tr li ng l b) (Thng T), nn hy nh du vo phiu tr li nh sau:
[Tr li mu]
No.
Q1
Tn cng ti v tn sn phm xut hin trong cc cu hi st hch l thng hiu hay thng hiu ng k ca cc
cng ti . Ch rng cc k hiu v khng c dng bn trong.
Q1.
Which of the following numbers expresses the decimal number 0.6875 as a binary
number?
a) 0.1001
Q2.
c) 0.1101
b) 4
c) 5
d) 6
Which of the following expressions obtains n for an 8-digit binary number n when a
negative number is expressed as the twos complement? Here, + indicates addition,
while OR and XOR indicate, respectively, the logical sum and exclusive logical sum
of the bits.
a) (n OR 10000000) + 00000001
c) (n XOR 10000000) + 11111111
Q4.
d) 0.1111
Q3.
b) 0.1011
b) (n OR 11111110) + 11111111
d) (n XOR 11111111) + 00000001
b) Digit cancellation
d) Absolute error
Q5.
The function f(x) has real arguments and returned values. Consider the procedure
consisting of steps
~
as shown below using this function. After starting
execution and repeating the procedure a sufficient number of times, y in step stops
changing. Which of the following expressions holds at this point?
xa
y f(x)
Display value of y
xy
Return to
a) f(a)=y
Q6.
b) f(y)=0
c) f(y)=a
d) f(y)=y
The following table indicates the weather changes at a particular location. For
example, the day following a clear day, there is a 40% chance that the weather will
be clear, a 40% chance that it will be cloudy and a 20% chance that it will be rainy.
Assuming that the change in weather is a Markov process, what is the probability that
the weather two days after it rains will be clear?
Unit %
Clear
40
40
20
Cloudy
30
40
30
Rainy
30
50
20
a) 15
Q7.
b) 27
c) 30
d) 33
b) AB
c) AB
d) AB
Q8.
When the logical expression AB is written as shown in the example below, which of
the following is represented by the expression shown in the figure?
Figure
Example
Adult
male
Male
a) Female
c) Male
Q9.
Female
Minor
female
There is an 8-bit register. The values of the bits in the register are d 0, d 1, , d 7 and
the value of the parity bit is p. Which of the following expressions always holds an
odd parity? Here, a represents an exclusive OR operation.
a) 0 d 0 d 1 d 7 = p
c) d 0 d 1 d 7 p = 0
b) d 0 d 1 d 7= p
d) d 0 d 1 d 7 p = 1
Q10.
The figure below expresses the state transition of a vending machine that sells drinks
for 150. A state is expressed as Si and the transition condition is expressed as
X/Y + Z. If S0 is taken as the initial state, which of the following combinations
should be used to fill in a and b in the figure? Here, X is the input, the coins which
can be used are 50 and 100 coins only, and only one coin can be inserted into the
machine at a time. Y is the output and an means that nothing is outputted. Also,
Z is the incidental condition change derived from X and Y, which is not indicated
if there is no change. For example, 100/Juice+50 means that, when a 100 coin is
inserted into the machine, juice comes out and the change is 50.
50/Juice
100/Juice + 50
Q11.
a) 100/
b) 100/50
50/
c) 100/ Juice
d) 100/ Juice
50/
50/ Juice
50/ Juice
When the syntax for numerical values is defined as follows, which of the following
items is treated as a <numerical value>?
Numerical
value >
Numeral
<
>
string
<Numeral>
<Sign>
::=+|
<
a) 12
Numeral
::=< string
Numeral
>|< string
>E< Numeral
>|< Numeral
>E<Sign>< Numeral >
string
string
string
b) 12E10
c) +12E10
d) +12E10
Q12.
The following binary tree consists of 10 nodes. Which of the following combinations
correctly fills in a and b when the numbers 1 to 10 are uniquely assigned to the
nodes? Here, the value assigned to each node is greater than the value of its left child
and descendents yet smaller than the right child and descendents.
a) a=6, b=7
c) a=7, b=8
Q13.
b) a=6, b=8
d) a=7, b=9
b) 2
c) 5
d) 6
Q14.
A key is composed of 3 alphabetic characters. When the hash value h is decided with
the following expression, which of the following collides with the key SEP? Here,
a mod b represents the remainder when a is divided by b.
h = (Sum of positions of alphabetic characters in the key) mod 27
Alphabetic
character
A
B
C
D
E
F
G
H
I
J
K
L
M
a) APR
Alphabetic
character
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Position
1
2
3
4
5
6
7
8
9
10
11
12
13
b) FEB
c) JAN
Position
14
15
16
17
18
19
20
21
22
23
24
25
26
d) NOV
Q15.
When a program whose functions are as shown in the flowchart in Figure 1 was
executed when the contents of array A were as given in Figure 2, array B, whose
contents are shown in Figure 3, was produced. Which operation should be filled in a
of Figure 1? Here, the elements of arrays A and B are represented by A (i, j ) and B (i,
j), respectively.
Start
Loop
(see Note)
Loop
(see Note)
Loop
Loop
End
Fig. 1 Flowchart
a) A (i, j) J B (i, 7j)
c) A (i, j) J B (7j, i)
Q16.
b) A (i, j) J B ( j, 7i)
d) A (i, j) J B (7i, 7j)
Q17.
Q18.
Q19.
Hardware control
Operation target
a)
Fixed
Memory, registers
b)
Fixed
Registers
c)
Variable
Registers
d)
Variable
Memory, registers
a) 0.1
Instruction type
1.0
50
Move instruction
5.0
30
Branch instruction
5.0
20
b) 0.3
c) 1.1
10
d) 3.0
Q20.
Q21.
Q22.
Which of the following is the correct ascending order of the effective memory access
times in ns?
Exists?
Access time
(ns)
Hit rate
(%)
Main
memory
Access time
(ns)
No
15
No
30
Yes
20
60
70
Yes
10
90
80
Cache memory
a) A, B, C, D
c) C, D, A, B
b) A, D, B, C
d) D, C, A, B
11
Q23.
Two software packages must be stored on a magnetic disk in a PC. What is the
minimum space in Mbytes needed on the magnetic disk to store and to execute the
software? The space needed on the magnetic disk to store each of the software
packages is indicated in the following table. Software package 1 and software
package 2 are never used at the same time.
Unit: Mbyte
OS
Software 1
Software 2
80
60
120
40
40
50
a) 260
Q24.
b) 310
c) 350
d) 390
The best way to store a file on a magnetic disk is to store it in a continuous area.
Why is that so?
a) It eliminates unrecorded areas of the magnetic disk and the entire disk can be
used.
b) It reduces the area needed to store file management information, and therefore
the space available to the user increases by that much.
c) Less reading errors occur compared to the case where the file is recorded in
partitioned areas.
d) The magnetic head moves less when reading continuous data, therefore read
time is shorter.
Q25.
There is a system which manages the files area in units of blocks, each containing
eight 500-byte sectors. How many sectors in total would be assigned to save two
files, one consisting of 2,000 bytes and the other of 9,000 bytes? Assume that the
sectors occupied by management information, such as directories, can be ignored.
a) 22
b) 26
c) 28
12
d) 32
Q26.
Q27.
Which of the following media records data on a magnetized disk by irradiating the
disk surface film with a laser beam, so as to heat it and subsequently change the
direction of the magnetism?
a) CD-R
Q28.
c) LD
d) MO
Which of the following interface standards allows, in a tree structure, the connection
of multiple peripheral devices through a hub?
a) IDE
Q29.
b) DVD
b) RS-232C
c) SCSI
d) USB
b) 4
c) 11
13
d) 15
Q30.
Q31.
a)
High
Large
b)
High
Small
c)
Low
Large
d)
Low
Small
A certain system consists of 2 CPUs. The CPU that is not being used is assigned to a
task whose execution is requested. On this system, two tasks, A and B, are executed.
These tasks both use a common resource R exclusively. The CPU usage of tasks A
and B, the usage of resource R and the execution sequence are shown in the figure
below. If both tasks are started at the same time, how long in ms will the completion
of processing take for the two tasks?
Task A
CPU
10 ms
Resource R
50 ms
CPU
60 ms
Task B
CPU
40 ms
Resource R
50 ms
CPU
30 ms
a) 120
b) 140
c) 150
14
d) 200
Q32.
If a job network is executed under the following conditions, what is the shortest
amount of time in hours required to complete processing?
[Conditions]
(1) Job execution multiplicity is 2.
(2) Processing time per job is 1 hour and other jobs do not affect this.
(3) Each job is scheduled in order of activation.
(4)
(5)
a) 4
Q33.
b) 5
c) 6
d) 7
There is a system that outputs to the printer using a spooling function. In order to
satisfy the following conditions, how big must the spooling file be in Mbytes?
[Conditions]
(1) There are 2 Mbytes of print data per job.
(2) Data is compressed 50% in the spooling file.
(3) 100 jobs are processed per hour and processing variations can be ignored.
(4) A maximum of 5 hours of print data can be spooled.
a) 100
b) 250
c) 500
15
d) 1,000
Q34.
Q35.
Q36.
Q37.
Which of the following is a technique for building a highly reliable system from
multiple computers that prevents the system from shutting down when trouble occurs,
by transferring processing to an unaffected computer if a failure occurs somewhere in
the system?
a) Clustering
c) Hot swap
b) Cold standby
d) Mirroring
16
Q38.
Which of the following indicators used in system performance evaluations is the one
most frequently used to indicate the contention state of the main memory?
a) Execution latency
c) Paging frequency
Q39.
Assume that the utilization ratio of a computer system with an MTBF of 1,500 hours
and an MTTR of 500 hours is to be increased by a factor of 1.25. What must the
MTTR be?
a) 100
Q40.
b) 125
c) 250
d) 375
Q41.
There is a program module that can simultaneously execute multiple task requests in
parallel. What is this quality called?
a) Reusable
c) Statically relocatable
Q42.
b) Re-entrant
d) Dynamically relocatable
b) Servelet
c) Script
17
d) Thread
Q43.
Q44.
Q45.
Q46.
18
Q47.
Q48.
Q49.
19
Q50.
The manual for a certain programming language contained the following text. Which
of the statements below accurately describes a feature of the good program
mentioned in the text?
When calling a function, this programming language uses a stack to hold arguments.
If the data received with arguments is moved to a common area for referencing by
many functions, stack usage can be reduced, but this defeats the purpose of a good
program.
a)
b)
c)
d)
Q51.
The amount of memory used for execution is kept below a certain level.
Execution speed is optimized.
Even if part of the program is changed, the rest of the program is unaffected.
The program has fewer lines of code and is easy to understand.
A black box test is a type of testing technique used in software development. Which
of the following statements accurately describes a black box test?
a) A black box test analyzes the source program and tests program control flow and
the flow of data such as variables. It is mainly performed by third parties and
not by the program developer.
b) A black box test tests whether or not the program functions as the designer
intended. It is mainly performed by third parties and not by the program
developer.
c) The objective of a black box test is to execute all of the instructions in the
program at least once. It is mainly performed by the program developer
him/herself.
d) A black box test is based on the internal specifications that describe the internal
structure and logic of the program. It is mainly performed by the program
developer him/herself.
20
Q52.
Q53.
What are the three control structures for creating programs in structured
programming?
a) Repetition, recursion and sequence
c) Repetition, sequence and selection
Q54.
Load test
Interface test between modules
Operation test based on module specifications
Regression test
21
Q55.
A system is being developed with subsystems A and B. At present, testing for the
two subsystems has been completed. Data for tests performed up to this point is
given in the table below. A standard test for this system has 10 items per k LOC
(lines of code).
Subsystem name
Development scale
30 k LOC
300
20 k LOC
200
The status of bug detection up to this point is plotted in the graphs below.
Subsystem B
Subsystem A
Cumulative
number of bugs
detected
Cumulative
number of bugs
detected
Time
Time
Assuming the same difficulty factor for both subsystems A and B, which of the
following statements is an accurate evaluation of the current situation?
a) The number of detected bugs has converged more in subsystem A than in
subsystem B, therefore subsystem A can be judged to be of higher quality.
b) Neither of the two subsystems is of stable quality, therefore additional testing is
required.
c) Roughly the same number of bugs were detected in both subsystems, therefore
quality can be judged to be about the same.
d) The number of unresolved bugs is 0 for each of the subsystems, therefore
sufficient testing has been done.
22
Q56.
Which of the following statements correctly describes the function point method?
a) It is a method for estimating the workload and cost involved in system
development, by taking into consideration development scale, difficulty factor
and factors related to development peculiarities.
b) It is a method for estimating the development scale and workload involved in
system development, by dividing the system development process into detailed
work, estimating each individual work in detail and totaling these estimates.
c) It is a method that computes the amount of system functions from information in
system external specifications and then estimates system development scale
based on that amount.
d) It is a method for estimating development scale and the workload for each
segment of the system development process, in order to improve the accuracy of
estimates.
Q57.
Which of the following methods recovers the most recent state of a database
following a disk failure, by first restoring data from a backup tape and then applying
a journal?
a) Checkpoint restarting
c) Rollback
Q58.
b) Rebooting
d) Rollforward
23
Q59.
Q60.
Q61.
b) Re-engineering
d) Reuse technology
Q62.
Q63.
b) Transport layer
d) Physical layer
b) 16
c) 32
d) 64
b) DHCP
c) RIP
24
d) SMTP
Q64.
In a CSMA/CD LAN, which of the following is used in the data link layer to identify
the sender and destination when sending and receiving frames?
a) Host ID in an IP address
c) Subnet mask
Q65.
b) MAC Address
d) Port No.
Three IP routers are connected by leased lines as shown in the figure below. Which
of the following statements correctly describes the operation of router a in relaying a
TCP/IP packet from terminal a to terminal b?
Leased line
Terminal
a
Router
a
Router
b
Terminal
b
Router
c
Terminal
c
Leased line
Q66.
What device connects public telephone lines and internal lines, as well as internal
lines amongst themselves?
a) DSU
b) PBX
c) TDM
25
d) Gateway
Q67.
Q68.
26
Q69.
Table A
Employee
ID
10010
10020
10030
10040
10050
10060
Name
Department
code
Salary($)
101
2,000
101
10010
201
3,000
101
10030
101
2,500
102
10040
102
3,500
102
10050
102
3,000
201
10020
201
2,500
201
10060
Lucy
Brown
Mike
Gordon
William
Smith
John
Benton
Tom
Cage
Mary
Carpenter
Department Employee
code
ID
Name
Lucy
Brown
William
Smith
John
Benton
Tom
Cage
Mike
Gordon
Mary
Carpenter
Q70.
b) Re-organizing
d) Backup
27
Q71.
There are two primary objectives in using a digital signature. One is to enable the
recipient of a message to check who the sender is. What is the other objective?
a) To enable the recipient of the message to check the ID of the sender.
b) To enable the recipient to confirm whether or not it is safe to return a security
key.
c) To check whether or not the message was modified after it was signed.
d) To check that the message in a transmission was not wrongly decoded.
Q72.
Q73.
28
Q74.
Which of the following statements correctly describes the role of the CIO?
a) In drafting an IT strategy, CIO the adopts a plan to optimize the effects of crosscompany investment in information assets in accordance with the companys
business strategy.
b) The CIO proposes specific improvements to a companys information system
aimed at maximizing system performance, by understanding the status of system
development and operation.
c) The CIO gives advice to the information systems department after examining
whether or not the information system is functioning soundly in response to
company activities.
d) To help ensure optimum operational efficiency of a companys information
system, the CIO receives reports from the information systems department on
inquiries made concerning system operation and related problems, then issues
specific instructions on how to proceed.
Q75.
Plans A and B shown in the table below have been put forth to make a product that is
to be sold at a retail price of $1,200. The plan that is more advantageous in terms of
sales quantity will be selected. What is the monthly sales quantity at which the
advantage between plan A and plan B reverses?
a) 400
Plan A
$100,000
$700/unit
Plan B
$200,000
$500/unit
b) 500
c) 600
29
d) 700
Q76.
Q77.
A distribution chart was prepared to look at the correlations in data. Which of the
following charts indicates a negative correlation?
a)
b)
c)
d)
Good
Flat
Bad
A1
800
300
200
A2
800
400
100
A3
700
300
300
A4
700
400
200
Strategy
a) A1
b) A2
c) A3
30
d) A4
Q78.
Which of the following services allows companies to connect their computers and
PCs to the computer center of a bank and use the online services offered by the bank?
a) Firm banking
c) Wholesale banking
Q79.
b) Home banking
d) Retail banking
Q80.
31
Q1.
Q2.
c) 0.1101
b) 4
c) 5
d) 6
Q4.
d) 0.1111
Q3.
b) 0.1011
b) (n OR 11111110) + 11111111
d) (n XOR 11111111) + 00000001
b) Hu b ch s
d) Li tuyt i
Q5.
Q6.
b) f(y)=0
c) f(y)=a
d) f(y)=y
Hm sau sng sa
Hm sau my m
Hm sau ma
Sng sa
40
40
20
My m
30
40
30
Ma
30
50
20
a) 15
Q7.
b) 27
c) 30
d) 33
b) AB
c) AB
d) AB
Q8.
V d
Nam
Nam
ngi ln
a) N
c) Nam
Q9.
N tr em
b) d 0 d 1 d 7= p
d) d 0 d 1 d 7 p = 1
Q10.
Q11.
a) 100/
b) 100/50
50/
c) 100/ Juice
d) 100/ Juice
50/
50/ Juice
50/ Juice
Numerical
value >
< Numeral >
string
<Numeral>
<Sign>
::=+|
<
a) 12
Numeral
::=< string
Numeral
>|< string
>E< Numeral
>|< Numeral
>E<Sign>< Numeral >
string
string
string
b) 12E10
c) +12E10
d) +12E10
Q12.
a) a=6, b=7
c) a=7, b=8
Q13.
b) a=6, b=8
d) a=7, b=9
b) 2
c) 5
d) 6
Q14.
V tr
1
2
3
4
5
6
7
8
9
10
11
12
13
K t ch ci
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
b) FEB
c) JAN
V tr
14
15
16
17
18
19
20
21
22
23
24
25
26
d) NOV
Q15.
Khi thc hin mt chng trnh vi cc chc nng nu trong biu lung trn Hnh
1, vi ni dung ca mng A nu trong Hnh 2, th mng B, m ni dung ca n c
nu trong Hnh 3, c to ra. Php ton no cn in vo a trong Hnh 1? y,
cc phn t ca mng A v B c k hiu tng ng bng A (i, j ) v B (i, j).
Start
Loop
(see Note)
Loop
(see Note)
Loop
Loop
End
Q16.
Q17.
Q18.
Q19.
Mc tiu thao tc
a)
C nh
Ch yu iu khin m macro
b)
C nh
Cc thanh ghi
c)
Bin i
Ch yu iu khin m macro
Cc thanh ghi
d)
Bin i
a) 0.1
Tc thc hin
(ms)
1.0
T l xy ra (%)
50
5.0
30
Lnh r nhnh
5.0
20
b) 0.3
c) 1.1
10
d) 3.0
Q20.
Q21.
Q22.
Khi vic chuyn bng b nh theo kiu nhy cch c hon thnh.
Khi khng tm thy ni dung trong b nh m.
Khi lnh vo/ra c thc hin.
Khi s trn xy ra do kt qu ca vic thc hin thc hin php ton thp phn
du phy ng.
B nh m
Tn ti?
Thi gian
truy cp (ns)
T l trng
(Hit rate)
(%)
Thi gian
truy cp (ns)
Khng
15
Khng
30
20
60
70
10
90
80
a) A, B, C, D
c) C, D, A, B
b) A, D, B, C
d) D, C, A, B
11
Q23.
Phn mm
Phn mm
hnh)
80
60
120
40
40
50
a) 260
Q24.
b) 310
c) 350
d) 390
Q25.
b) 26
c) 28
12
d) 32
Q26.
Cu no di y nh ngha ng v RAID?
a) l cng ngh t ng sao lu d liu bng cch kt hp t nht 2 thit b a
t vo thnh mt.
b) l cng ngh to o mt a t truy cp tc cao bng cch s dng b
nh bn dn.
c) l cng ngh lm tng tnh tin cy v tc ca cc thit b nh bng cch s
dng nhiu thit b a t.
d) l cng ngh to thit b a t c cc kh nng truy cp ngu nhin.
Q27.
Phng tin no di y ghi d liu trn a t ho bng cch chiu mt chm tia
lade ln mng ph mt a, lm nng n v sau thay i hng t trng?
a) CD-R
Q28.
c) LD
d) MO
Chun giao din no di y cho php, trong cu trc cy, kt ni nhiu thit b
ngoi vi qua hub?
a) IDE
Q29.
b) DVD
b) RS-232C
c) SCSI
d) USB
b) 4
c) 11
13
d) 15
Q30.
Q31.
a)
Cao
Ln
b)
Cao
Nh
c)
Thp
Ln
d)
Thp
Nh
Nh.v A
CPU
10 ms
Ti nguyn
R 50 ms
CPU
60 ms
Nh.v B
CPU
40 ms
Ti nguyn
R 50 ms
CPU
30 ms
a) 120
b) 140
c) 150
14
d) 200
Q32.
Nu mt mng cng vic c thc hin di cc iu kin sau, thi gian ngn nht,
tnh theo gi, cn hon thnh vic x l l bao nhiu?
[Cc iu kin]
(1) H s ca vic thc hin cng vic l 2 (Job execution multiplicity is 2).
(2) Thi gian x l mt vic l 1 gi v cc cng vic khc khng nh hng iu
ny.
(3) Mi cng vic c lp lch theo th t kch hot.
(4)
(5)
a) 4
Q33.
b) 5
c) 6
d) 7
b) 250
c) 500
15
d) 1000
Q34.
Q35.
Q36.
Q37.
16
Q38.
Q39.
Q40.
b) 125
c) 250
d) 375
Q41.
Q42.
b) Vo li
d) Ti cp pht ng
b) Servelet
c) Script
17
d) Thread
Q43.
Q44.
Cu no di y nh ngha ng v XML?
a) l mt ngn ng hng i tng trn c s C++.
b) l mt ngn ng thng dch x l vn bn v mt ngn ng chun cho cc
chng trnh CGI (Common Gateway Interface) chy trn cc my ch Web.
c) l mt ngn ng m t trang chun cho vic xut bn bng my bn.
d) l mt ngn ng s dng cc nhn din t cc cu trc d liu v ngha.
Q45.
Q46.
Theo nguyn tc, khng c php i tr ngc li trong quy trnh pht trin.
Vic pht trin h thng c chia thnh nhiu quy trnh phi qun l.
Hon ton cn thit phi to ra t chc d n.
Cng vic pht trin trong quy trnh tip theo c da trn cc kt qu c
chuyn xung t quy trnh trc .
18
Q47.
Q48.
H thng no c thit k tt nht bng cch s dng cc biu chuyn trng thi?
a). H thng kim k lp bng cc ti sn kim k vo cui thng hoc vo cc ngy
kt thc.
b) H thng gim st trng thi hot ng ca cc ti sn h thng v a ra bo
co.
c) H thng tnh mc nc t d liu ca dng c o nc.
d) H thng duy tr mi trng ti u cho nh knh trn c s thng tin thu thp t
cc b cm bin t trong nh knh.
Q49.
19
Q50.
Q51.
Kim th hp en l mt kiu k thut kim th dng trong pht trin phn mm.
Mnh no di y m t chnh xc kim th hp en?
a) Kim th hp en phn tch chng trnh ngun v kim tra lung iu khin
chng trnh v lung d liu th d nh cc bin. N c thc hin ch yu
bi cc bn th ba v khng phi bi nhng ngi pht trin chng trnh.
b) Kim th hp en kim tra xem cc chc nng chng trnh c nh ngi thit
k d nh hay khng. N c thc hin ch yu bi cc bn th ba v khng
phi bi nhng ngi pht trin chng trnh.
c) Mc tiu ca kim th hp en l thc hin tt c cc lnh trong chng trnh t
nht l mt ln. N c thc hin ch yu bi chnh ngi pht trin chng
trnh.
d) Kim th hp en c da trn nhng c t bn trong m t cu trc v logic
bn trong ca chng trnh. N c thc hin ch yu bi chnh ngi pht
trin chng trnh.
20
Q52.
Q53.
Q54.
Kim th ti vo
Kim th giao din gia cc modun
Kim th vn hnh trn cc c t modun
Kim th hi quy
21
Q55.
Mt h thng ang c pht trin vi cc h thng con A v B. Hin ti, vic kim
th hai h thng con c hon thnh. D liu kim th c thc hin cho n
im ny c cho trong bng di y. Mi kim th chun cho h thng ny c 10
mc cho mi k LOC (lines of code - dng lnh).
Tn h thng con
S mc kim th
30 k LOC
300
20 k LOC
200
H thng con A
S li lu tch
c pht hin
S li lu tch
c pht hin
Thi gian
Thi gian
22
Q56.
Q57.
Q58.
Khi pht trin h thng v vn hnh c t chc thnh cc phng ring bit, th tc
no di y thc y hiu qu vic chuyn giao h thng t phn pht trin sang
phn vn hnh?
a) Sau khi hon thnh vic kim th vn hnh, phng pht trin gii thch cc c
t h thng v phng php vn hnh cho phng vn hnh.
b) Phng vn hnh thc hin vic kim th vn hnh m khng c s tham gia hoc
h tr ca phng pht trin.
c) Phng pht trin thc hin vic kim th vn hnh v chun b ti liu hng
dn vn hnh cho phng vn hnh.
d) Phng vn hnh tham gia mt cch xy dng vo vic pht trin h thng h
tr t quan im v tnh vn hnh c.
23
Q59.
Cu no di y m t ng v TCO?
a) Chi ph pht trin v phn cng cho h thng vn hnh c ci t trong chnh
cng ty.
b) Chi ph mi th t ci t phn cng v phn mm cho n vn hnh v qun l.
c) Chi ph hon ton cho vic ci t v vn hnh phn cng v phn mm.
d) Chi ph phn cng v chi ph i hi cho vic h tr k thut, v d nh vn
phng tr gip (help desk) v gio dc ngi dng.
Q60.
Q61.
b) Re-engineering
d) Reuse technology
Q62.
Q63.
b) Tng vn chuyn
d) Tng vt l
b) 16
c) 32
d) 64
b) DHCP
c) RIP
24
d) SMTP
Q64.
Trong mng LAN CSMA/CD, thng tin no di y c dng trong tng lin kt
d liu nhn dng ngi gi v ni nhn khi gi v nhn cc khung (frames)?
a) ID ca my trm trong a ch IP
c) Mt n mng con
Q65.
b) a ch MAC
d) S hiu cng
ng thu bao
u cui
a
B nh
tuyn a
u cui
b
ng thu bao
B nh
tuyn c
u cui
c
Q66.
b) PBX
c) TDM
25
d) Gateway
Q67.
Q68.
26
Q69.
Bng A
Employee
ID
10010
10020
10030
10040
10050
10060
Name
Lucy
Brown
Mike
Gordon
William
Smith
John
Benton
Tom
Cage
Mary
Carpenter
Department
code
Salary($)
101
2,000
101
10010
201
3,000
101
10030
101
2,500
102
10040
102
3,500
102
10050
102
3,000
201
10020
201
2,500
201
10060
Department Employee
code
ID
Name
Lucy
Brown
William
Smith
John
Benton
Tom
Cage
Mike
Gordon
Mary
Carpenter
Q70.
b) T chc li
d) Sao lu
27
Q71.
Q72.
Q73.
28
Q74.
Q75.
a) 400
Gi c nh hng
thng
Gi giao ng cho
mt n vi
Plan A
$100000
$700/n v
Plan B
$200000
$500/n v
b) 500
c) 600
29
d) 700
Q76.
Q77.
Biu phn b c chun b xem nhng tng quan trong d liu. Biu
no di y ch ra mt tng quan m?
a)
b)
c)
d)
Tt
Thng
Xu
A1
800
300
200
A2
800
400
100
A3
700
300
300
A4
700
400
200
K hoch
a) A1
b) A2
c) A3
30
d) A4
Q78.
Q79.
Q80.
31