2023A FE AM Questions
2023A FE AM Questions
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. Which of the following should be used for marking your answer on the answer
sheet?
Since the correct answer is “d) Pencil”, mark the answer as below:
[Sample Answer]
Q1 ウ
– 1 –
Symbols commonly used in questions
Unless otherwise noted in each question, the following notational conventions are applied as
shown in the table.
Logic Circuit
AND gate
NAND gate
OR gate
NOR gate
Buffer
NOT gate
Company names or product names mentioned in the examination questions are the trademarks or registered
trademarks of their respective companies or organizations. The symbol ® or ™ is not used within.
– 2 –
Q1. In a school class, 13 students play basketball and 19 play football. Among them, 8
students play both. Further, 7 students play neither. How many students are there in the
class?
a) 17 b) 31 c) 33 d) 47
Q2. n is a binary integer represented in two’s complement. Which of the following operations
get the value 7 × n using only bit shifting and an addition or subtraction operation?
Q3. A parking lot has 10 parking spaces in a row, and 7 cars are parked at random parking
spaces. What is the probability that the three empty places are adjacent to each other?
1 1 1 1
a) b) c) d)
90 72 15 12
Q4. What is the sum of two binary fractions 1.0101 and 1.0111 expressed in decimal form?
Q5. Which of the following expressions in postfix notation is equivalent to the expression
2+5×3+4 in infix notation? Here, the operator “×” has higher precedence than “+”.
a) 2 5 3 4 × + + b) 2 5 + 3 4 × +
c) 2 5 3 + × 4 + d) 2 5 3 × + 4 +
– 3 –
Q6. There is communication data that consists of five characters “A”, “B”, “C”, “D”, and “E”
that have different appearance frequencies, and in order to compress the data by using
Huffman coding, the code table shown below is created. Which of the following is an
appropriate code that should be inserted in the blank?
Q7. When the series of stack operations below is performed on an empty stack, which of the
following is the data that is read out by the last READ operation? Here, “PUSH x” is the
operation to put data x in the stack, “POP” is used to retrieve data from the stack, and
“READ” is used to read data from the top of the stack without removing the original data.
a) 2 b) 3 c) 4 d) 6
Q8. In the binary search tree below, when a new node of value 11 is inserted, where will this
insertion be made?
14
7 16
3 12 20
10 13 18 23
– 4 –
Q9. In the table below, there are five items A through E. Each item cannot be divided into
smaller pieces. When a knapsack with a maximum volume of 7 units is used for carrying the
items, which of the following is a set of items to be packed in the knapsack so that the total
price can be maximized?
a) A, B, D b) A, C, D
c) B, E d) D, E
Q11. In a CPU, which of the following is a special register that contains the address of the
next instruction to be fetched?
– 5 –
Q12. Which of the following is an appropriate CPU operation associated with cache
memory?
a) When a cache hit occurs, the CPU fetches data from ROM.
b) When a cache hit occurs, the CPU fetches data from the main memory.
c) When a cache miss occurs, the CPU fetches data from the cache memory.
d) When a cache miss occurs, the CPU fetches data from the main memory.
Q13. Which of the following is a computer architecture in which a processor executes the
same instruction on multiple data?
Q14. ECC is used for error detection and correction in memory. When n+2 redundant bits are
required for a data bus having a width of 2n bits, what is the number of redundant bits that
are required for a data bus having a width of 128 bits?
a) 3 b) 8 c) 9 d) 10
Q15. Which of the following is the most appropriate explanation of grid computing?
– 6 –
Q16. Which of the following is an RAID configuration that deploys two parity records to
different disk drives enabling two simultaneous disk drive failures in the same RAID group
to be recovered?
Q17. Which of the following occurs when a program attempts to access a page that is
mapped in the virtual address space but is not located in the main memory? Here, the OS
supports paging.
Q18. Which of the following is an appropriate description concerning the round robin
process scheduling method?
a) CPU resources are allocated to each process in order of priority specified in advance
when a particular event occurs.
b) CPU resources are allocated to each process in order of processing time from shortest to
longest.
c) CPU resources are allocated to the first executable process in the queue when an
interval-timer interrupt is generated.
d) CPU resources are allocated to the process that needs to start immediately when some
kind of interrupt is generated.
Q19. Which of the following is an explanation of the function of an archiver that is one of the
data management utilities?
a) Compiling several files into one file or reconstructing the original files in order to
perform data backup and distribution
b) Creating both an area for recording data and an area for managing data on a single hard
disk
c) Keeping data secure through file protection for safeguarding data from unauthorized use
and destruction, and also through copy protection for preventing unauthorized copying
d) Rearranging a file into contiguous areas, to the extent possible, on a hard disk in which
fragmentation has occurred
– 7 –
Q20. Which of the following is a sequential circuit that has two stable states?
Q21. Which of the following is equivalent to the logic circuit shown below?
a) b)
c) d)
Q22. A power supply unit has a rated output power of 500 watts and an efficiency of 80%. In
order to obtain an output power of 500 watts from this power supply unit, how many watts
is the minimum input power?
Q23. When an order data in the format shown below is entered, which of the following is a
data validation method that is performed to determine whether the order date is a business
day and whether the date is on or before the date of data entry or after the date of data entry?
Order data
Slip No. Order date Product code Quantity Customer code
(characters) (characters) (characters) (number) (characters)
– 8 –
Q24. Which of the following is a process in PCM to capture analog values from audio
signals at a regular interval?
Q25. In a DBMS, which of the following is a function that decides the schema?
Q26. Which of the following is an appropriate method used to remove data redundancy in
relational database systems?
Q27. Which of the following is the most appropriate description concerning the primary role
of an SQL query optimizer?
– 9 –
Q28. From a “Score” table, the average score for all subjects is to be calculated for each
student, and the student number and average score for students with an average score of 80
or higher are to be determined. Which of the following is the appropriate term or phrase to
be entered in blank A? Here, a solid underline represents a primary key.
[SQL statement]
SELECT StudentNumber, AVG(Score)
FROM Score
GROUP BY A
Q29. Which of the following is a file in which values before and after an update of the database
are written and saved as the update history of the database?
Q30. Which of the following is the most appropriate information for a router to determine the
destination of an incoming packet?
Q31. Which of the following is a feature of a switching hub (layer 2 switch) network device?
a) It breaks a received packet into smaller pieces (fragments) in the network layer.
b) It dynamically allocates an IP address for a terminal connected to its LAN port.
c) It forwards a received packet only to its LAN port connected to a device with the
packet’s destination MAC address.
d) It forwards a received packet to all its LAN ports (broadcast).
– 10 –
Q32. When a PC connected to a LAN is starting up, which of the following protocols is used
to automatically assign an IP address to the PC?
Q35. Which of the following is a method for embedding a malicious java script code in the
content sent to a victim’s web browser from a vulnerable website?
Q36. Mr. A encrypts a message to be sent to Mr. B using an asymmetric key encryption method
so that only Mr. B can decrypt the message. Which of the following is(are) the private key(s)
used to decrypt the message?
Q37. Which of the following is an attack using a trial-and-error method to obtain confidential
information such as a user password or personal identification number (PIN)?
– 11 –
Q38. When information, such as an e-mail or a document file, is sent and received with a
digital signature via the Internet, which of the following is an appropriate combination of
security properties that ensure that such information is from the signer and has not been
altered or tampered with during transmission?
a) It interrupts the communication between two parties and then collects and falsifies the
information being exchanged.
b) When Internet banking is used, it collects the password entered by the user.
c) When the user browses movies on a web browser, it arbitrarily displays unintended
advertisements for the user.
d) When the web browser is started, it arbitrarily displays a tool bar that the user has not
installed.
Q40. Which of the following is a role of a PKI certification authority as a reliable third party?
– 12 –
Q41. As shown in the figure below, an application on a client accesses the data in the database
on a server via database connection programs. Which of the following is a measure for
preventing the leakage of the commands and execution results transmitted between the
application and database?
Client Server
Application Database
Database Database
connection program connection program
Tapping by attacker
a) Changing the port number from its initial value that the database connection programs
use for communication in the database management system
b) Encrypting the communication between the database connection programs
c) Restricting the IP addresses of the clients that can access the database connection
program on the server to only those that are required
d) Setting a password for starting or stopping the database connection program on the
server
Q42. Companies usually provide a means for their mobile workforce to access the corporate
network securely over the Internet through insecure channels such as open wireless
networks in hotels or coffee shops. Which of the following is the appropriate technology
that can be used for this purpose?
– 13 –
Q43. Which of the following is a technique that attempts to intrude into the system in order to
detect security-related vulnerabilities of the computer or network?
Q44. Which of the following is a key that the SSL/TLS certificate of a website contains?
Q45. Which of the following is a description concerning a decision table that is one of the
design techniques used in system development?
Q46. The integration test for software composed of modules arranged in a hierarchical
structure is performed from a high-level module. In such a case, which of the following is a
test module that is used as a substitute for a low-level module?
a) Driver b) Emulator
c) Simulator d) Stub
– 14 –
Q47. Which of the following is the most appropriate feature of polymorphism in object-
oriented programming?
Q48. Which of the following is approved by the customer when the external design of a system
is completed?
a) After the code is created, and it is confirmed that it can be integrated, test cases are
created.
b) Integration of the code and testing are continuously repeated.
c) The code that passed the tests is not refactored until the next iteration.
d) The customer is responsible for the specification of unit tests.
Q50. Which of the following is a method that uses a modeling tool to create a design document
described with E-R diagrams or other representations from the definition information in an
active database?
– 15 –
Q51. The ten members of a project team hold meetings with each other with the conditions
below. If two (2) members are to be added to the team, how many additional meetings will
be held compared to if there were ten members?
[Conditions]
• Meetings are held one-on-one.
• Each member holds one meeting with every other member.
a) 12 b) 21 c) 22 d) 42
Q52. In order to determine the quality condition in a test process, it is necessary to analyze
and evaluate the relationship between the number of completed test items and the
cumulative number of bugs. Which of the following is a graph that indicates that the quality
is becoming stable?
a) b)
number of bugs
number of bugs
Cumulative
Cumulative
Number of Number of
completed test items completed test items
c) d)
number of bugs
number of bugs
Cumulative
Cumulative
Number of Number of
completed test items completed test items
– 16 –
Q53. When the number of programs composing the system and the number of person-days
required for coding per program are as shown in the table below, what is the minimum
number of staff members required to develop the system in 95 days? Here, in addition to
coding, the activities of design and testing are also necessary to develop the system, and
those activities require eight times as many person-days as coding.
a) 8 b) 9 c) 12 d) 13
Q54. Which of the following is a critical path of the project activities shown in the arrow
diagram below?
a) A → B → E → I → L b) A → C → D → E → H → K
c) A → C → F → I → L d) A → C → G → J → L
a) Setting a compensation as a penalty for every item that has a service level
b) Setting a service level for every item that can be taken into consideration
c) Setting a service level that is maintained into the future without any changes
d) Setting a service level under the cost and needs of a service provider and its customers
– 17 –
Q56. Which of the following is the most appropriate characteristic of the “big bang” or all-at-
once migration method that is one of the system migration methods?
Q57. In IT service management, which of the following is a problem management activity that
is performed proactively?
a) Analyzing the occurrence trend of incidents and proposing measures that prevent an
incident from occurring in the future
b) Classifying problems that have been detected and recorded, and setting the response
priority
c) Evaluating the effectiveness of a resolution to a critical problem
d) Monitoring whether an incident occurs again or not for a certain period of time after the
problem is resolved
Q58. Which of the following is a method that restores the system to its initial state and restarts
it when a system failure occurs, that does not accompany preprocessing of a copy before/after
an update, and that is also called initial program load?
– 18 –
Q59. Which of the following is an explanation of an audit work paper?
Q60. Which of the following is an appropriate description concerning a system audit team?
– 19 –
Q61. The purchase of two types of IT devices A and B is being examined. The payout period
is set in consideration of the useful life of each of the devices. Which of the following is an
appropriate description for the minimum amount of annual profit necessary to recover the
amount of investment within the set payout period for A and B? Here, the annual profit is
made evenly each year, and the interest rate is not considered.
A B
Amount of investment (10,000 yen) 90 300
Payout period (years) 3 5
Q63. Which of the following is a scheme where the user establishes a connection to the system
of a service provider via the Internet and makes online use of only the necessary functions of
the applications provided by the service provider at the necessary time?
– 20 –
Q64. Which of the following is an appropriate example of utilizing Business Intelligence
(BI)?
Q65. The RFP is presented to each vendor that has responded to an RFI. Which of the
following should be done beforehand to proceed fairly with the future vendor selection
processes?
a) Aside from the items of an RFP, giving a high evaluation to a vendor who is familiar
with the current system to select that vendor easily
b) Establishing processes of selection such as setting evaluation standards or weighting
rules of conformity to the requested items
c) Issuing unofficial agreements to all vendors to whom the RFP has been presented and
requesting them to prepare a contract and a statement of work to accelerate the
conclusion of the contract after the vendor selection
d) Preparing a bailout for a vendor who received a high evaluation on the response to the
RFI, in case it fails in the selection
Q66. A company has products that are at the peak of profitability and sales. As a result, many
competitors develop similar products to the market. Therefore, a company must develop
new products to meet new demands and market opportunities. Which of the following is a
state of such events in the product life cycle?
– 21 –
Q67. Which of the following is an explanation of benchmarking that is used for corporate
management?
Q68. Which of the following is a business management technique that is used to develop
specific targets and measures to implement a planned strategy, in consideration of the
appropriate mutual relationships among four perspectives (i.e., financial, customer, business
process, and learning and growth)?
– 22 –
Q70. Which of the following is an explanation of the IoT (Internet of Things)?
a) It refers to a form of electronic commerce carried out over the Internet, consisting of a
typical C to C transaction by which a seller posts a product’s name, photo, minimum
selling price, and other information on a website, after which the bidder that offers the
highest amount within the time limit becomes the successful bidder.
b) It refers to data centers designed for the connection to the Internet, with server operation
failure prevented through the implementation of measures including quality management
of communication lines, server maintenance, air conditioning, and power source-related
countermeasures against power interruptions and outages.
c) It refers to Internet advertising such as a banner advertisement that displays an image,
with a link to an advertiser’s website, or an e-mail advertisement that publicizes an
advertiser’s website.
d) It refers to the installation of communication functionality to various objects, in addition
to information and communication devices, and enabling automatic recognition or
remote measurement by connecting these to the Internet, to achieve high-level decision-
making services and automated control through the collection and analysis of large
volumes of data.
a) It is a system that aims at the utilization of recyclable energy, supply of stable electric
power, and optimum demand adjustment through the integrated control of power
generation and power consumption on the basis of communication and information-
processing technology.
b) It is a system that can provide ideal health advice to each individual by performing
analysis on the basis of similar case reports such as the result of health examinations and
medication use.
c) It is a system that can search for information on restaurants and entertainment, send and
receive traffic information, and communicate the current position at the time of an
emergency by using information-processing equipment installed in vehicles.
d) It is a system that supports varied work styles by enabling mutual communication
between workers with varied working styles, such as home-based employees and senior
workers.
– 23 –
Q72. Which of the following is an explanation of CAD?
a) Evaluating product performance and functions using computers, without using the actual
product to perform testing or experimentation
b) Using a computer to convert product design drawings to process design information, and
support automation of machine processing, etc.
c) Using a computer to create product design drawings from attribute data concerning
product shape, composition, etc.
d) Using a computer to derive the required volumes and timing of materials from a
production schedule, a BOM (bill of materials), inventory volumes, etc.
a) It is a method in which many sellers and buyers meet in a market set up on the Internet
and trade directly without an intermediate distributor.
b) It is a method that aims for overall optimization from material procurement to product
distribution by sharing information such as ordering, inventory, sales, and logistics
between a company and its business partners.
c) It is a method that converts information concerning business transactions into a
standardized format and electronically exchanges data such as estimation, ordering,
shipment and delivery, and payment between companies.
d) It is a method that runs a sales promotion campaign on the Internet and then draws
customers to a real store to encourage them to make purchases.
a) It handles a large amount of information. Thus it uses an external storage device for
storing information.
b) It is stain-resistant, and recorded information can be read from the outside of the
package.
c) It is used by inserting the tag into a dedicated magnetic reader.
d) It uses GPS to display location information or attribute information about the current
location.
– 24 –
Q75. Which of the following is an officer whose primary responsibility is the security of a
company’s information and data?
Q76. Which of the following is a method of education and training in which trainees engage
in simulated business activities, interact with other people to develop experiences, and try
out different strategies?
Q77. When the weather tomorrow is sunny with 30% probability, cloudy with 50%
probability, and rainy with 20% probability, which of the following strategies offers the
highest expected value?
(Unit: Value)
Sunny Cloudy Rainy
Strategy S1 +80 +20 −40
Strategy S2 +60 +10 −10
Strategy S3 +40 +30 −20
Strategy S4 +50 +15 −15
a) S1 b) S2 c) S3 d) S4
– 25 –
Q78. The following inventory statement of Build-Up Property Company describes the status
of the company’s inventory since the beginning of the year 2014. When the company uses a
first-in-first-out (FIFO) method for inventory asset valuation, what is the inventory value at
the end of the year 2014?
Q79. Which of the following is the type of financial statement that shows a company’s
assets, liabilities, and shareholders’ equity at a particular point of time?
a) Installing the software package on a large number of computers that are used for the
company’s business
b) Making a backup copy of software for limited purposes, such as the licensee’s personal
use or a temporary copy for maintenance
c) Modifying the software package for the company’s internal use and using it on a large
number of computers within the company
d) Placing the software package on the company’s internal website so that staff members
can download and install it
– 26 –