April 2011 Flashcards

1
Q

1.) The graph below consists of two sets of bar graphs; one in black and the other in gray,
with the vertical axis representing the number of people and the horizontal axis
representing the score (0 through 10). Which of the following is observed in
comparison of these black and gray bar graphs?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A PC plays back moving image data recorded at 500400 pixels per frame, 30 frames
per second, and 3 bytes per pixel while reading it from a peripheral device. When the
data transfer rate between the peripheral device and the PC is 1106
bytes per second,
in order to play back the moving image without delay, the data must be compressed to
one n-th (1/n) in advance. Which of the following is the minimum value of n? Here,
the time to expand the compressed data and other impacts can be ignored.

a) 18

b) 54

c) 72

d) 144

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an explanation of proportional fonts?

a) As is the case with Arabic fonts, the shape of a character changes when it is located
at the beginning or end of a word.

b) As is the case with fonts used in English newspapers, each character may occupy a
different amount of space.

c) As is the case with fonts used in the headline of an advertisement flyer, proportional
fonts are characterized with distinctive decorative designs.

d) As is the case with typewriter fonts, the number of characters per line is fixed.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an appropriate description concerning EUC (End User
Computing)?

a) As EUC is widely spread, information systems departments in companies come to
have large backlogs in software development.

b) EUC is characterized with system construction and operations management by end
users without using software packages at all.

c) To support EUC, training in programming languages such as COBOL, C, and Java
is important, and it is a key role of information systems departments.

d) In order to achieve EUC, it is necessary to provide education to end users in PCs or
commercially available applications, and also to select easy-to-operate development
tools and provide training in those tools.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an appropriate characteristic of data structure?

a) Each element in an array can be read in any order by using an index.

b) Arrays can be used to make the data structure independent from the algorithm.

c) Each element in a list can be searched for and updated using an index in lieu of a
pointer.

d) When an element is inserted in a list or deleted from a list, existing elements must
be moved.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the program
display the underlined character string? Here, the first character of the original text is
displayed in 10 points.
[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.
[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>

<S>group-level</S>

computerization</B> from a user <S>standpoint</S>.</B>

a) 10

b) 11

c) 12

d) 13

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an appropriate explanation of SGML?

a) It is a language from which HTML and XML are derived and is used to describe the
logical structure of a document.

b) It is an extended HTML-based language and is used for displaying images and
documents on Web browsers.

c) It is a standard for communication between electronic musical instruments and is
used for processing music data.

d) It is a standard page description language and is used for well-formed documents

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the method for describing the logical structure of a sentence
in XML?

a) Enclosing the sentence, clauses, and other elements with double quotes (“”)

b) Separating the sentence, clauses, and other elements with commas

c) Enclosing the sentence, clauses, and other elements with tags

d) Separating the sentence, clauses, and other elements with tabs

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate explanation of some functional units
implemented in a computer?
a) The operation unit performs arithmetic processing at the direction of the control
unit.

b) The operation unit exchanges data with the control unit, the input unit, and the
output unit.

c) The memory unit requests the operation unit to perform arithmetic processing and
stores the results.

d) The memory unit requests the output unit to read out data from the memory unit.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the latest interface that is widely used to transfer a large
amount of data, such as 3D images or moving images, to graphics cards at higher speed?

a) AGP

b) ATA

c) ISA

d) PCI Express

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the standard that is used to exchange data, such as address
book data, between cell phones by using infrared rays?

a) IEEE 1394

b) IrDA

c) RFID

d) RS-232C

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate description of plug-and-play used on a PC?

a) A mechanism to start applications

b) A mechanism which performs required settings automatically when peripheral
devices are connected

c) A mechanism which starts up an OS automatically when the power is turned on

d) A mechanism to run software developed for another OS

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an appropriate description concerning a characteristic of
RAID?

a) It increases the data transfer rate of each hard disk drive.

b) It provides a larger capacity than the total capacity of individual hard disk drives.

c) It enhances the performance and reliability of the entire system by using multiple
hard disk drives all together.

d) It increases data access time because it needs to access multiple hard disk drives.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an appropriate description of fail-safe?

a) Keeping the system harmless, even in the event of a failure or an operation error

b) Operating only the normal parts of the system, even in the event of a failure, so as
not to make an impact on the entire system

c) Preventing intrusion into the computer network of an organization from outside

d) Accepting only the data that meets specific conditions

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

15.) There is a system consisting of two PCs, one file server, and one printer that are all
connected to a LAN. The availability of the printer and file server are both 0.9, while
the availability of each PC is 0.8. Which of the following is the appropriate
expression to calculate the availability of the entire system? Here, the system is
considered to be operating when at least one PC is running.

File server | Printer | PC | PC

a) 2 2 0.9  0.8

b) 0.9 (1 (1 0.8) ) 2 2   

c) 2 2 (1 0.9)  0.8

d) 2 2 (1 0.9 )  (1 0.8)

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is pertinent to the process of grouping multiple files into one,
for the purpose of making effective use of storage media or promoting the efficiency of
backup or distribution?

a) Archive

b) Allocate

c) Patch

d) Protect

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the purpose of the virtual memory system that is one of the
functions provided by an OS?

a) To prevent an application program from accessing the area on the main memory
used by the OS

b) To reduce electricity consumption while work is suspended, by turning off the
power supply after data is written from the main memory to the hard disk

c) To make it possible to execute a program even if the program requires more storage
capacity than is available in the main memory

d) To accelerate CPU processing through the intervention of a higher speed memory
device than the main memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an appropriate explanation of plug-in software?

a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.

b) Plug-in software is provided to replace parts of a program for the purpose of
modifying functions or fixing bugs.

c) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a Web browser, to enhance their functions.

d) Plug-in software is often included in applications such as spreadsheets, and allows
the users to record and replay the series of operations performed.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An examination is conducted, and the results of the examination are grouped into four
performance classes “Excellent,” “Good,” “Passed,” and “Not passed,” based on the
scores by using spreadsheet software. To show the results of grouping in column C,
an expression is entered in cell C1 and then copied to cells C2 through C35. Which
of the following is the appropriate expression to be entered into cell C1? Here, the
procedure for grouping is as shown below.

[Spreadsheet creation procedure]

(1) Cells A1 through A35 contain scores.

(2) Cell A36 contains a function to calculate the average score.

(3) Cell B1 contains the expression below, and this expression is copied to cells B2
through B35.
A1 − $A$36

(4) Performance classes are defined as follows: if the score is above the average by 10
points or more, it is marked as “Excellent”; if it is above the average by less than
10 points, it is marked as “Good”; if it is below the average by 10 points or less, it
is marked as “Passed”; all other scores are marked as “Not passed.”

a) IF(B1 > 10, ‘Passed’,
IF(B1 > 0, ‘Not passed’, IF(B1 < −10, ‘Excellent’, ‘Good’)))

b) IF(B1 > 10, ‘Excellent’,
IF(B1 > 0, ‘Good’, IF(B1 < −10, ‘Passed’, ‘Not passed’)))

c) IF (B1 ≥ 10, ‘Excellent’,
IF (B1 > 0, ‘Good’, IF (B1 < −10, ‘Not passed’, ‘Passed’)))

d) IF (B1 ≥ 10, ‘Excellent’,
IF (B1 ≥ 0, ‘Good’, IF (B1 < −10, ‘Not passed’, ‘Passed’)))

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When a spreadsheet application is used to create a line graph based on actual sales in the
table below, the scale range of the vertical axis is automatically set between 0 and
1,500,000 dollars. However, as the graph does not show clearly how sales have
changed over time, the fluctuation of sales needs to be more clearly emphasized without
changing the frame size of the graph. When the graph-editing features are used for
this purpose, which of the following is the most appropriate operation to be done?

Unit: dollar
Month Actual sales

January 1,124,000
February 1,063,000
March 1,092,000
April 1,159,000
May 1,103,000
June 1,201,000
July 1,098,000
August 1,182,000
September 1,135,000
October 1,093,000
November 1,142,000
December 1,220,000

a) Changing the unit of the vertical axis to 1,000 dollars, which will make the range
from 0 to 1,500 (Unit: thousands of dollars)

b) Changing the display range of the vertical axis to 1,000,000 through 1,300,000
dollars

c) Converting the line graph to a bar graph

d) Inserting an auxiliary line parallel to the horizontal axis for the purpose of indicating
average sales

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

21.) As shown in the spreadsheet below, three types of examinations were conducted. Each
type of examination has a different perfect score. Each resulting score is converted to a
value assuming 100 points as the perfect score, and displayed in cells F3 through H10.
Which of the following is the expression to be entered in cell F3? Here, the expression
in cell F3 is copied to cells F3 through H10.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

On a standalone PC, sequential access to a database is taking longer to process than
before. When the number of records remains almost unchanged, which of the
following can be considered to be the cause?

a) Unnecessary records, such as already deleted data, are read.

b) Data has been added and deleted many times, so the record area in the database file
is fragmented.

c) Access takes longer as free space in the database has increased.

d) Because of hardware deterioration, data transmission between the hard disk and the
processor has become slower.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is an appropriate policy for designing data entry screens?

a) Related input items should be placed close to each other, in order to improve ease of
operation on the screen.

b) A method of entering commands should be provided, in order to ensure ease of
operation even for entry-level users.

c) A common message “Input Error” to all data entry errors should be displayed on the
screen.

d) Detailed directions for use should be displayed on the screen, in order to ensure ease
of operation for users.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following can provide accessible linkage between information items
represented in text, still images, video, sound, music, and other forms so that associated
information can be reached by visiting one link after another?

a) Graphical user interface

b) Groupware

c) Cyberspace

d) Hypermedia

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When relational databases are used, which of the following is an appropriate purpose of
normalizing data?

a) To guarantee data compatibility between heterogeneous computers

b) To prevent data duplication as well as occurrence of inconsistency at the time of
updating data

c) To eliminate characters that cannot be transmitted when a database is used over a
network

d) To handle data storage areas distributed over multiple media as a contiguous storage
area

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Under an environment where several users have access to a database simultaneously, a
user tries to view the data while another user is updating it. In order to assure data
integrity, which of the following is an appropriate control method in the database
management system?

a) Interrupting update processing and permitting the user to view the data

b) Permitting the user to view the latest data while updating

c) Permitting the user to view the data after completion of the update

d) Discarding the updated data and permitting the user to view the data before the
update

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is the network area that is provided by installing a firewall and is
accessible from both the Internet and the intranet but not accessible to the intranet?

a) DHCP

b) DMZ

c) DNS

d) DoS

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A Web server in Company A provides SSL communication using a digital certificate
for the Web server generated by a certification authority. Which of the following is a
procedure in which a PC accesses the Web server of Company A and after obtaining a
digital certificate, uses the public key of the certification authority?

a) Generating a common key used for encrypted communication and encrypting it by
using the public key of the certification authority

b) Using the public key of the certification authority to decrypt the common key used
for encrypted communication

c) Using the public key of the certification authority to verify the validity of the digital
certificate

d) Encrypting confidential data by using the public key of the certification authority

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is a mechanism that enables a Web server to store user
information in a browser in order to identify which PC is accessing the Web server?

a) CGI

b) Cookie

c) SSL

d) URL

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When ten e-mail messages are sent successively from Company A to Company B, they
may arrive at Company B in a different order from the order they are sent. Which of
the following is an appropriate opinion on this matter?

a) There is a problem with the setup of Company A’s mail server.

b) There is a problem with the setup of Company B’s firewall for e-mail.

c) There is a high possibility that e-mail delivered late is falsified on the way.

d) The arrival sequence is subject to change because of different transfer routes.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

29.) Which of the following is an appropriate combination of the protocols that are used for
transmitting and receiving e-mail as shown in the diagram below?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is an appropriate description concerning cryptography?

a) The process of turning the encrypted text back into its original plain text is called
reset.

b) In common key cryptography, the encrypted text and common key are transmitted
together.

c) In public key cryptography, the key used for encryption is different from that for
recovering the plain text from the encrypted text.

d) Common key cryptography is used for digital signature.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following can be made possible by using a digital signature in electronic
commerce?

a) Preventing an unintended third party from accessing any confidential file

b) Checking that a file is not infected with a virus

c) Preventing the contents of a transaction from being leaked through wiretapping

d) Authenticating the trading partner and checking that the contents of a transaction are
not falsified

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is the purpose of a DoS attack against a server?

a) Takeover of server administrator’s privileges

b) Blocking of services

c) Falsification of data

d) Stealing of data

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the self-propagating program that can send its replication
attached to an e-mail message via a network, such as the Internet, or copy itself onto
other computers in the network?

a) Cookie

b) Spyware

c) Trojan horse

d) Worm

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is an appropriate explanation of spam mail?

a) E-mail that is indiscriminately sent to users without their consent

b) E-mail that is distributed to all participants registered previously for a specific
purpose

c) E-mail that is sent or forwarded with the same content by a receiver to multiple
destinations and causes the number of receivers to continue increasing

d) A message exchange system that provides a message posting function using e-mail
or Web page to enable information exchange with the general public

A

a

34
Q

Which of the following is a security incident categorized as being caused by a physical
threat?

a) The server room is flooded because of heavy rain, which causes the equipment to
stop.

b) A large amount of data is sent from the external network to the public server, which
causes the server to stop.

c) An attacker intrudes into the corporate server over the network and destroys files.

d) An employee makes an operational error on the computer, and data is destroyed.

A

a

35
Q

A client application for a mission-critical business system built by the information
systems department displayed an error message on the screen and stopped. Which of
the following is the most appropriate action to be taken by the user in this situation?

a) Restarting the PC and notifying the information systems department that a failure
occurred

b) Trying to resolve the problem on one’s own, based on the error message or other
information

c) Checking the error message with the user manual and determining if the failure can
be resolved on one’s own, or if the information systems department should be
consulted

d) Informing other PC-based clients on this system of the failure and asking them to
stop operations in progress

A

c

36
Q

Which of the following describes a “limit check” that is a method of checking input
data?

a) Checking the data for either the minimum or maximum value

b) Checking whether the data is in a certain order

c) Checking whether the data is logically correct

d) Checking the data code with the code registered in a table

A

a

37
Q

40.) A system, consisting of four subsystems a through d, is being developed. The chart
below shows the cumulative number of bugs found during the test phase for each
subsystem. Which subsystem can be regarded as being at the highest quality level?
Here, all detected bugs have already been removed, and the development scale,
development period, and the number of staff are almost the same for all subsystems.

A
38
Q

Which of the following is an appropriate description of programming?

a) Consolidating individual programs and verifying that the software works as
specified

b) Performing a functional decomposition of software, based on its hierarchical
structure

c) Describing procedures in accordance with the grammar of a programming language,
and then verifying that there is no error in the procedures

d) Representing the procedure of a program schematically or graphically

A

c

39
Q

Which of the following is an appropriate explanation of a white box test?

a) Test data is prepared based on external specifications.

b) Test data is prepared by applying the equivalence partitioning technique.

c) Test data is prepared based on internal structure.

d) Test data is prepared by using the relationship between input and output.

A

c

40
Q

Which of the following is an advantage of dividing the software development process
into four phases—requirements definition, system design, programming, and
testing—and then executing them in this order?

a) It provides flexibility to handle changes in software specifications at any point of the
development phases.

b) It contributes to the ease of understanding the progress status of development.

c) It requires fewer person-hours spent for reviews in the upstream phases.

d) It allows users to try the software at an early stage of development.

A

b

41
Q

Which of the following is the development model where a trial model or a pilot unit is
developed at an early stage of system development so that users can verify their
requirements in a tangible manner?

a) Waterfall model

b) Extreme programming

c) Spiral model

d) Prototyping

A

d

42
Q

Which of the following is the chart or diagram that is illustrated in length proportional
to the time period required for each task, with time on the horizontal axis and the tasks
on the vertical axis?

a) E-R diagram

b) Arrow diagram

c) Gantt chart

d) State transition diagram

A

c

43
Q

46.) In the arrow diagram below, what is the maximum number of days that can be accepted
as a delay of the activity “CF” on condition that the total number of days required
for activities from A through G is not affected?

A
44
Q

Which of the following is the most appropriate description concerning the
communication that a project manager performs with the parties involved in the
project?

a) It is decided at the start of the project what kind of report is to be created, and when,
how, and to whom the report is to be presented.

b) When the progress of the project is reported to the ordering party, the progress report
created by the development staff member is used as is.

c) Communication with members of the project team is performed orally, with the
emphasis on promptness of contact.

d) All the internal and external parties involved in the project are convened regularly to
hold a meeting to check on the progress, regardless of the scale of the project.

A

a

45
Q

48.) In system development, which of the following is the most appropriate graph that shows
the relationship between the phase where a defect is detected and the cost to resolve it?

A
46
Q

In a development project, after a software integration test is completed, a system test is
being conducted to check the functions of a system. According to the system test
report, there are many defects in a certain program. Which of the following is the
most appropriate action that the project manager should take first?

a) Suspending the system test and starting all over again from the software integration
test

b) Increasing the staff members who test the defective program so as not to delay the
progress of the test

c) Re-evaluating the quality of the defective program to identify its impact on the
system test

d) Removing the defective program from the test target list and creating the program
again

A

c

47
Q

Which of the following is an appropriate characteristic of the single-step (or big bang)
migration method?

a) It requires an application that provides a connection between the new and old
systems.

b) The new and old systems are operated in parallel, and then migration to the new
system is performed at a certain point in time.

c) Problems during migration to the new system have a serious impact.

d) Operational costs are incurred from parallel operations.

A

c

48
Q

In the PDCA cycle model of ISMS, which of the following is performed as part of the
“Do” phase?

a) Correction of major nonconformity

b) Security education

c) Establishment of security policy

d) Internal audit

A

b

49
Q

When a service desk receives a call regarding a system failure from a user, which of the
following is an appropriate response from the perspective of incident management?

a) Giving priority to implementing a fundamental solution to the problem to prevent
recurrence in preference to system recovery

b) Giving priority to the continuity of the system user’s business and informing the user
of any known workarounds first

c) Reporting the recovery progress only to the user who called the service desk

d) Identifying the severity and details of the failure, and then advising the user about an
appropriate contact point

A

b

50
Q

Which of the following is the management system which imposes the costs of system
operations on user departments fairly?

a) Consigned computing system

b) Outsourcing system

c) Billing system

d) Standard cost system

A

c

51
Q

In the PDCA cycle of service management, which of the following is performed in the
“Act” phase?

a) Identifying the scope and necessary resources of service management

b) Measuring the usage of resources and monitoring the processes

c) Setting improvement goals related to the usage of resources and improving the
processes

d) Managing the allocated resources as well as the team including the service desk and
operators

A

c

52
Q

Which of the following is the appropriate action to be taken to improve the
environment of a department server from a viewpoint of facility management?

a) Installing antivirus software

b) Providing an automatic operation function, such as a scheduled backup

c) Avoiding installing the server near to the water pipe in fear for water leakage

d) Providing a function that encrypts information transmitted over the network

A

c

53
Q

Which of the following is the appropriate description concerning a system audit that is
performed as part of an internal audit for a company?

a) System operators check whether the business operations of their department are
done in accordance with rules, by using a self-inspection list.

b) System developers check the requirements for the next system by conducting a
questionnaire survey of the system users.

c) Persons other than the systems department staff members check whether the
business operations of the systems department are done in accordance with rules, by
using a check sheet.

d) Systems department staff members check whether all the information devices owned
by the company are installed as stated in the master list, by taking physical
inventory.

A

c

54
Q

Who has a role and final responsibility to establish and maintain internal controls under a
basic policy?

a) Shareholder

b) Auditing director

c) Management executive

d) Internal auditor

A

c

55
Q

Which of the following is the most appropriate for conveying a company’s belief in
management and its sense of values to employees, customers, and society?

a) Management issue

b) Management plan

c) Management strategy

d) Management principle

A

d

56
Q

Which of the following is an explanation of ABC analysis?

a) Combinations of goods purchased by customers are analyzed based on the sales data
collected by a POS system.

b) A region is evenly partitioned with lines of longitude and latitude, and the
population, purchasing power, and various other data for each region are collected to
analyze the region in more detail.

c) A region is partitioned into several areas for a certain purpose, and opinion leaders
are selected from each area for repeated surveys on the trends and actual situation of
the region.

d) Sales or gross profits of goods are sorted in descending order, and then, according to
its cumulative percentage of the total, the goods are classified into three ranks to
identify hot-selling goods.

A

d

57
Q

60.) Two control charts below show the quality characteristics of products manufactured by
Lines A and B in the factory for each day of manufacture. Which of the following is
an appropriate response or reaction to Line A or Line B or both?

A
58
Q

Which of the following is an appropriate description concerning the usage of diagrams
or charts?

a) A flowchart is used to show the relationship between the capacity and access speed
of a storage device.

b) A Gantt chart is used to show the telephone tree for emergency calls.

c) A cause and effect diagram is used to understand the reasons for the slowing of a
system development project.

d) An association diagram is used to show a series of procedures for purchasing
stationery

A

c

59
Q

62.) An acceptance inspection is performed on outsourced products with a non-defective
probability of 0.9 and a defective probability of 0.1. The table below shows four
proposed plans with each cost per non-defective product and defective product. Which
of the following is the plan with the lowest expected cost?
Plan Cost per non-defective product Cost per defective product

Picture…

A 0 1,500
B 40 1,000
C 80 500
D 120 200
a) A b) B c) C d) D

A
60
Q

When there are n evaluation items, n evaluation axes are drawn from the center of a
circle so that the circle can be divided into n equal pieces, and then evaluation values
are plotted on each axis. Which of the following is the appropriate chart or diagram
that is used for determining the relative balance between evaluation items and the
distance from averages by connecting neighboring plotted points with line segments?

a) Z chart

b) Scatter diagram

c) Fan chart

d) Radar chart

A

d

61
Q

Which of the following is a case where a Pareto chart can be effectively used?

a) On the occasion of a new product announcement, it is used to carefully plan the
arrangement of a venue, the communication with all related parties, and so on.

b) On the occasion of the design and construction of a building, it is used to investigate
the procedures for carrying out multiple tasks in the shortest period of time.

c) On the occasion of establishing quality improvement measures, it is used to analyze
the number of defects for each cause and select themes to be handled with high
priority.

d) On the occasion of developing a sales plan for a product with a short lifecycle, it is
used to prepare several alternative solutions in consideration of competitor’s
reactions.

A

c

62
Q

Which of the following is the appropriate use of management science techniques?

a) PERT (Program Evaluation and Review Technique) can be used to analyze the
reliability of a machine.

b) A queueing model can be used to perform financial analysis.

c) A time series analysis can be used to forecast the sales of a product in the market.

d) A simplex method can be used to control the quality of a product.

A

c

63
Q

When corporate accounting is classified into financial accounting and management
accounting, which of the following describes a characteristic of management
accounting?

a) The accounts need to be settled at the end of each accounting term, and the
preparation of financial statements, such as balance sheet and income statement, is
mandatory.

b) Corporate management provides accounting reports to external stakeholders such as
shareholders and creditors.

c) Accounting procedures must be conducted in conformity with accounting
regulations such as financial statement rules, corporate accounting principles, and
various accounting standards.

d) Internal reports are prepared for business judgment, including budgetary control,
profit control, and performance evaluation for each department, product, region, etc.

A

d

64
Q

When the results of financial statement analysis for the current period are as shown in
the table below, which of the following is the cost of sales in thousands of dollars?

Cost of sales ratio 80%

Ratio of operating profit to net sales 10%

Operating profit 20,000 dollars

a) 140

b) 160

c) 180

d) 200

A

b

65
Q

In business accounting, which of the following serves as a baseline for providing
financial statements, based on transactions organized in order of date and posted by
account titles?

a) Trial balance

b) Journal book

c) Work sheet

d) General ledger

A

d

66
Q

For the year-end settlement of accounts, an income statement was prepared as shown in
the table below. How much is the operating income in thousands of dollars for the
period under review?

Unit: thousands of dollars

Item | Amount
Sales 1,500
Cost of sales 1,000
Selling, general and administration expenses 200
Non-operating income 40
Non-operating expenses 30

a) 270

b) 300

c) 310

d) 500

A

b

67
Q

Which of the following is an action that is compliant with the copyright law even if it is
done without the consent of the copyright holder?

a) Copying tunes from a purchased CD to one’s own PC and listening to those tunes on
the PC every day

b) Making the tunes in a purchased CD downloadable from one’s homepage

c) Distributing to one’s customers a copy of a magazine which has an article on a
product of one’s company

d) Uploading a recorded TV drama to a video sharing site

A

a

68
Q

Which of the following is the most appropriate activity based on CSR (Corporate Social
Responsibility)?

a) Providing products that require less material used and also consume less electricity

b) Providing products differentiated from competitors’ products by adding new
functions

c) Providing products that meet various market needs by adopting a cell production
system

d) Providing products that the company did not offer, by acquiring other companies

A

a

69
Q

Which of the following is the purpose of strengthening compliance in corporate
management?

a) To prevent corporate management and employees from being involved in
misconduct or scandals that may threaten the continued existence of the company

b) To retain management resources for differentiation from competitors and thereby
gain a competitive edge

c) To curb the exercise of the management powers and thereby build a framework for
sound management

d) To improve the satisfaction of stakeholders including customers, shareholders, and
employees in order to achieve the company’s continued growth

A

a

70
Q

Which of the following corresponds to a third-party audit defined in “ISO 9000:2005
Quality management system—Fundamentals and vocabulary”?

a) A parent company audits the quality management system of a subsidiary company.

b) A customer audits the quality management system of a trading partner company.

c) A company audits its own quality management system for internal purposes.

d) A certification body audits the quality management system of a client company.

A

d

71
Q

In the BSC (Balanced Score Card) of a consumer products manufacturer, which of the
following is the most appropriate performance evaluation indicator or index from the
customer viewpoint?

a) Development efficiency

b) Cash flow

c) Market share

d) Number of patents granted

A

c

72
Q

Which of the following is an explanation of core competence management?

a) Acquiring management resources from other companies that have an established
business operation, so as to gain an advantage over the competitors

b) Optimizing the combination of business operations so that it can have a greater
effect than merely operating each business independently

c) Concentrating the management resources on proprietary know-how and technology
that are not easy for other companies to imitate, so as to establish a competitive
advantage

d) Reviewing best practices (successful case stories) of other companies, so as to
fundamentally improve and restructure the current business processes

A

c

73
Q

Which of the following is an explanation of the just-in-time production method?

a) The entire production process is performed by one or a few workers.

b) The production process is started after a customer order is accepted.

c) Products are manufactured based on the demand forecast made at the time of
starting the production.

d) Only the necessary items are produced, in the necessary quantity at the necessary
time.

A

d

74
Q

Which of the following is the corporate strategy to avoid excessive competition and gain
a competitive advantage by focusing on a small market segment where the customer
needs are not being fulfilled?

a) Niche strategy

b) Push strategy

c) Brand strategy

d) Pull strategy

A

a

75
Q

Which of the following is the most appropriate description concerning the advantageous
effects of implementing CRM?

a) It becomes easy to understand customer payment status of account receivables.

b) It becomes easy to reduce the lead time from a customer order placement to its
delivery.

c) It becomes easy to share sales approach to customers among the entire sales staff.

d) It becomes easy to clearly understand customer needs and requests, and thereby to
build up long-term relationships with customers.

A

d

76
Q

Which of the following corresponds to information barrier-free?

a) An environment in which information devices can be utilized practically, even when
the data entry method is limited to only voice, handwriting, etc.

b) An environment in which a user in motion can utilize a communication terminal
such as a cell phone and a smartphone

c) An environment in which a working style without time loss and emotional distress
because of commuting is made possible through the use of information
communication technology

d) An environment in which individuals can utilize computers seamlessly by means
such as mobile computing and home networks

A

a

77
Q

Which of the following is a method where tasks are performed according to the steps
(1) through (3)?
(1) Calculate the necessary quantities of the components, based on the types, quantity,
and component list for products planned to be produced in a certain period of time.
(2) Calculate the actual ordering quantity for each component, in consideration of the
quantity in stock available for allocation.
(3) Determine the reorder timing for each component, in consideration of the lead time
for manufacturing or procurement or both.

a) CAD

b) ERP

c) JIT

d) MRP

A

d

78
Q

Q81.) When online shopping via the Internet is done according to the procedure shown in the
figure below, at which of the following points does the transaction take effect unless
otherwise specified?

A
79
Q

Which of the following is the most appropriate characteristic of embedded systems?

a) A dedicated OS is used for the development and operation of embedded systems.

b) A connection to a network is required for embedded systems to operate.

c) Embedded systems are used for internal control of equipment, so they do not require
user interface.

d) Embedded systems are composed of dedicated or specially-designed hardware and
software.

A

d

80
Q

Which of the following is the appropriate explanation of the DFD that is created when
a business process is analyzed?

a) It shows various types of data items handled in the business operations and the
interrelations among them.

b) It shows various types of data items handled in the business operations, from sets to
elements in a hierarchically detailed fashion.

c) It shows the processes that make up the business operations and the data flow
exchanged among them.

d) It shows the contents of the processes that make up the business operations, from
overviews to details in a hierarchical fashion.

A

c

81
Q

Which of the following is a technique used for analyzing structures of data used for
business operations and depicting the relationship between extracted entities in diagrams
such as an E-R diagram?

a) Data cleaning

b) Data cleansing

c) Data mining

d) Data modeling

A

d

82
Q

85.) Which of the following is the profitable combination of system development projects A,
B, and C? Here, the profitability of a project is examined during the first five years
after the system starts its service, and the maintenance cost of the system equivalent to
10% of the initial investment amount is incurred every year after the start of the
service.

A
83
Q

Which of the following is an explanation of housing services?

a) A service in which a service provider provides business software via the Internet

b) A service in which a service provider performs planning, development, operations,
management, and maintenance of information systems owned by other companies

c) A service in which a service provider lends out servers and communication
equipment installed in the provider’s own buildings to users

d) A service in which a service provider operates customer’s servers and
communication equipment installed in the provider’s own buildings

A

d

84
Q

On January 1, 2009 which was the first day of the fiscal year, a company bought an air
conditioner for the office at 6,000 dollars. How much was its book value in dollars on
December 31, 2010? Here, the service life is six years, the yearly depreciation is
computed using the straight-line method, and the residual value after six years is 10%.

a) 3,600

b) 4,000

c) 4,200

d) 5,100

A

c

85
Q
  1. ) When Company B procures an information system according to the flow shown in the
    figure below, which of the following is the term to be inserted in blank A?
A