April 2012 Flashcards

1
Q

In the worksheet of spreadsheet software shown below, rows 1 through 4 are sorted in
ascending order by using the last (or low order) two digits of each numeric value in
column A. When the numeric values of column B that are calculated from those of
column A are used as sort keys, which of the following is the appropriate calculation
result to be entered into column B?

A | B
1 123411
2 156711
3 119813
4 123815

a) The quotient obtained when the numeric value in column A is divided by 10

b) The remainder obtained when the numeric value in column A is divided by 10

c) The quotient obtained when the numeric value in column A is divided by 100

d) The remainder obtained when the numeric value in column A is divided by 100

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. ) When a path goes from node A1 to node C2 in Fig. 1 and the passing nodes are counted
    as shown in Fig. 2, it is found that there are three shortest paths with the minimum
    number of passing nodes. How many shortest paths are there available to go from
    node A1 to node D4 via node C2?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an appropriate purpose of appending a check digit to a
customer code?

a) To check the customer code for input errors

b) To arrange customers in order of acquisition when a list of customers is created

c) To enable customers to be inferred easily and quickly

d) To enable the grouping of customers by geographical area or other attributes

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an appropriate description concerning the characteristics of
EUC (End User Computing)?

a) EUC enables users to directly access, reference, and manipulate data that they need
for business operations.

b) EUC gives priority to system operation and maintenance, so it causes backlogs to
increase in the information systems department.

c) EUC requires more development staff members in the information systems
department, so it often leads to an increase in the operating costs of the department.

d) EUC allows the information systems department to take a leadership role in
application development, so it can reduce the workload of users.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The procedure described below is sequentially performed for two variables x and y,
starting with step (1). When the procedure is completed, what is the resulting value of
x?

[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).

a) 4

b) 5

c) 7

d) 8

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following refers to an XML-based document format that is used for
efficient information collection and distribution on Web sites such as a blog, a news site,
or an electronic bulletin board, and is also used for describing metadata such as page
header, abstract, and update time in a structured form?

a) CSS (Cascading Style Sheets)

b) DTD (Document Type Definition)

c) RSS (RDF(Resource Description Framework) Site Summary)

d) XSL (Extensible Stylesheet Language)

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an appropriate description concerning a CPU?

a) The cache memory that is integrated into a CPU is used to virtually extend the
capacity of the main memory.

b) A CPU is equipped with the arithmetic and logical unit that should serve as part of
control functions.

c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data
volume processed at a time, but the width in bits is not related to the performance.

d) For CPUs that have the same architecture, the higher the clock frequency, the faster
the response time.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate description concerning USB?

a) Some peripheral devices with low power consumption can receive power through a
USB cable without any additional power supply.

b) All peripheral devices connected to the USB port of a PC must be turned on before
the PC is powered on.

c) The data is transmitted in parallel over multiple data lines, in order to achieve high
speed data transfer.

d) The USB interface is suitable for a low speed peripheral device, such as a keyboard
or a mouse, rather than a high speed device like a hard disk.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is used for image sensors in digital cameras?

a) CCD

b) PDP

c) STN

d) TFT

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10.) Which of the following is the interface that enables a PC and its peripheral devices to
be connected in the configuration shown in the diagram below? Here,
represents a hub.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11.) Among the system configurations shown below, which of the following has the lowest
probability of causing the entire system to stop at the occurrence of a failure? Here,
represents an identical device. When the devices are connected in parallel,
only one device must be running, and when the devices are connected in serial, all
devices must be running.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. ) When a computer is installed under the conditions below, which of the following is an
    appropriate graph to represent the relationship between the number of years of use
    (horizontal axis) and the monthly costs (vertical axis)?
    [Conditions]
    (1) Computer costs
    * For the initial five years, an amount that is calculated from a lease rate based
    on the cost of purchasing the computer is paid in fixed monthly installments.
    * From the sixth year on, an amount that is calculated from a lease rate based on
    one tenth (1/10) of the cost of purchasing the computer is paid in fixed monthly
    installments.
    (2) Maintenance costs
    * From initial installation, the maintenance fee is paid to a maintenance service
    provider in fixed monthly installments.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. The graph below shows the relationship between the failure rate “λ(t)” of the devices
    comprising the system and the time “t ” elapsed since the start of use. Which of the
    following is a device that is expected to show the greatest increase in the failure rate
    during the wear-out failure period?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a PC is powered on, which of the following is first activated to access a hard
disk or other bootable media before the OS is started?

a) BIOS

b) POST

c) MBR

d) Disk driver

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When print processing is executed using an application program such as word
processing software or spreadsheet software, there is a method that allows data for
printing to be stored temporarily on the hard disk without direct output to the printer,
and allows actual printer output to be performed by a dedicated program. Which of
the following is the advantage of separating actual printer output from application
execution in this way?

a) The time from the start of application execution until the end of printing can be
reduced.

b) The modification of a document that contains a large number of images becomes
possible.

c) The processing volume per unit time increases.

d) The font can be changed easily at the time of printer output.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. In the description below concerning a file system, which of the following is an
    appropriate combination of terms to be inserted into blanks A through C?
    When files and directories on a PC are managed hierarchically, the directory at the
    highest level is called the A directory, and the directory that a user is now
    manipulating is called the B directory. A notation format that uses the
    B directory as its starting point and shows the location of a file or a
    directory is called a(n) C path.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When the log file of a Web server is analyzed as a part of daily system administration,
which of the following can be found?

a) Web pages accessed by Web site visitors

b) The model name of a computer used by each visitor

c) The speed of a Web browser on each visitor’s computer

d) Personal information about individual Web site visitors

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Which of the following is the expression to be entered into cell D4 in order to calculate
    the tax-inclusive prices of the products shown in cells A4 and A5 by using the two
    tentative sales tax rates that are set in cells D2 and E2? Here, the expression to be
    entered into cell D4 is copied to cells D5, E4, and E5.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an appropriate description concerning the symptom and its
measures to be taken at the occurrence of file fragmentation?

a) Since more files are accessed simultaneously and the seek operation of the hard disk
takes more time, the efficiency of file access drops. The measure to be taken is to
store the simultaneously accessed files close together in the hard disk.

b) Since the recycle bin is full and an old file in the recycle bin is removed physically
each time a file is created or deleted, the efficiency of file access drops. The
measure to be taken is to remove the files in the recycle bin all together.

c) Since small separated areas, instead of a single contiguous area, are allocated when a
file is created, the efficiency of file access drops. The measure to be taken is to
reallocate contiguous areas to files and unused space.

d) The data area for files is large enough, but the control area for files is not sufficient
and it takes time to allocate the control area when a file is created. The measure to
be taken is to combine multiple files into one or to expand the control area.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

20.) Candidates for operating a new business are selected from all of the employees based
on the conditions below. When a decision table is used to represent the selection
process, which of the following is the appropriate “conditions table” to be inserted into
the decision table?
[Conditions for candidates]
(1) The employee has selected “I am interested in IT” in the questionnaire.
(2) The employee has a score of 85 or higher on the IT aptitude test.
(3) An employee with a test score lower than 85 can become a substitute candidate
if the employee has worked for five or more years in the current workplace.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

21.) In a company which has its offices dispersed in several buildings, it is decided to
construct a relational database to manage the locations where PCs are installed.
“Asset” table, “Room” table, and “Building” table are created, and these tables are
linked. When new data is entered, data in the table to be referenced should exist
beforehand. Which of the following is the appropriate sequence of entering data into
each table? Note that the underlined items in each table indicate the primary keys or
the foreign keys.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

22.) Which of the following is an appropriate explanation of the table obtained when the
SELECT statement shown below is executed?
SELECT Products.Product_code, SUM(Unit_priceSales_volume)
FROM Products, Sales
WHERE Products.Product_code = Sales.Product_code
GROUP BY Products.Product_code
ORDER BY SUM(Unit_price
Sales_volume)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a database is used, the execution of a function that can update information
during search may cause data inconsistencies in the database. Which of the following
is an appropriate function to prevent this situation?

a) Commitment control

b) Deadlock avoidance

c) Exclusive control

d) Shared access

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is an appropriate description of VoIP?

a) It is a method that enables PC users to access data or applications available on the
Internet.

b) It is a technology that converts voice data into packets and transmits them in
real-time over an IP network.

c) It is a technology that ensures the security of communication by using authentication,
encryption, and decryption between network nodes.

d) It is a system that defines and manages a correspondence between a host name and
an IP address for a network-connected computer.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following prevents unauthorized external access by using packet filtering
at the connection point between a company’s internal network and the Internet?

a) DNS

b) NAT

c) Gateway

d) Firewall

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is an appropriate explanation concerning the function of a
router?

a) It optically reads data such as picture and text and then converts it into digital data.

b) It converts analog signals to digital signals and vice versa.

c) It controls the communication path of data and relays data across networks.

d) It archives and provides data of Web pages by using networks.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an appropriate description concerning a cookie used in the
Web?

a) It is a standard that can be used for formatting the layout of an HTML document in
detail.

b) It is the HTTP protocol to which an encryption function is added for private
communications over the Internet.

c) It is a mechanism where a Web server interacts with external programs to create Web
pages dynamically.

d) It is a mechanism where information from a Web server is temporarily saved in a
browser that accesses the Web server.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is a system configuration that introduces Internet technology
into a company’s information and telecommunication system and is used for
information sharing and business support?

a) EDI

b) VAN

c) Intranet

d) Extranet

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A PC was checked for computer viruses, and a certain number of infected files were
discovered. Which of the following is an appropriate course of action that should be
taken by the person who found the infected files?

a) Contacting the recipients to whom the files infected by an unknown virus were
forwarded, after identifying the virus so that they can take corrective action

b) Forwarding the infected files to the system administrator by e-mail so that the
administrator can promptly take measures

c) Disconnecting the infected PC immediately from the network in order to prevent
other PCs from being infected

d) Enabling the write protection of removable media that were used for a day-old
backup in order to prevent other files from being infected

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

There exists a model of communication from A to B based on public key cryptography
as shown below. Which of the following is an appropriate description concerning this
model?
The message sent by A is used to generate a message authentication code. This
authentication code is encrypted using A’s private key to generate a bit string that is
sent to B by e-mail along with the original message.
B obtains A’s public key from a trusted organization, and in addition to decrypting
the received bit string, B generates the message authentication code from the
received message to verify that both codes are the same before the message is used.

a) A can confirm that the message is delivered to B.

b) A can guarantee to B that the message is not wiretapped.

c) B is guaranteed to receive the message from A.

d) B can confirm that the message is from A and is not falsified.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is an appropriate description concerning the information
security policy?

a) The security policy of a company is intended to define what should be set for each
security system, so its contents vary depending on the security-related product to be
installed.

b) The security policy of a company provides guidelines on the action and judgment to
be followed and does not cover the stance and direction on security measures.

c) It is desirable for top management of a company to disclose the vulnerability of the
information system that forces the company to create the security policy.

d) It is necessary to clarify the vision about the action and judgment to be followed to
achieve the target security level.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the term that refers to the act of setting up a bogus Web page
imitating a bank, a credit card company, or other organization, and tricking a user with
an e-mail disguised as an official message from the financial organization or a public
organization in order to guide a user to the bogus Web page and steal personal
information such as the personal identification number and credit card number?

a) Cracking

b) Buffer overflow

c) Phishing

d) Bot

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is an appropriate description concerning a macro virus?

a) It is a new virus that is created by combing multiple viruses into one.

b) It moves across computers connected via a network while replicating itself.

c) It is an executable file that is sent as an attachment to an e-mail message.

d) It infects data files used by word processing software or spreadsheet software.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is a method that may cause a mail server to go down by
sending a large number of unsolicited e-mails to a lot of e-mail users in a short period
of time with the aim of advertising or selling goods or services?

a) Spam mail

b) Chain mail

c) E-mail bomb

d) Multi-posting

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is an appropriate description concerning system maintenance?

a) In order to perform system maintenance in contrast to system design and
development, it is important to follow the manual without relying on knowledge of
the system.

b) When system maintenance is performed, it is important to respond appropriately to
improvement requests from users and to system failures, and also important to
record accurate response logs.

c) In order to efficiently perform system maintenance, it is preferable for the system
department to take the central role and execute the plan, and to avoid participation of
the user department as much as possible.

d) In order to handle system improvement requests from the user department efficiently
with the limited staff members of the system department, it is best to deal with
simple and easy-to-implement requests first.

A

b

36
Q

36.) In a DFD of sales management, which of the following is the data store that represents
“product inventory”? Here, each process corresponds to one of “inventory
allocation”, “order receipt”, order backlog”, “shipment”, and “order placement”.

A
37
Q

When system administrators participate in a system test in cooperation with the
information systems department, which of the following is test data that should be
prepared in advance?

a) Data handled as an exception and also used in actual business operations

b) Data to execute all instructions in the program one or more times

c) Data to detect errors related to interfaces between modules

d) Data to detect logical errors in program modules

A

a

38
Q

When word processing software, spreadsheet software or other application software is
installed on multiple PCs, which of the following is an appropriate point to be
considered by the system administrator?

a) In consideration of data compatibility and license cost, the standardized software
should be installed.

b) If the software has an online help function, support from the vendor does not need to
be considered.

c) Users have their own preference on which software to use, so they should be
allowed to select the software to be installed.

d) Users should be allowed to install free software at their own discretion if it is
downloadable from the Internet.

A

a

39
Q

Before migration, a newly developed online ordering management system is operated
in parallel with the existing system for two months. During that period, data is
entered into both systems, and output is checked. After parallel operation is started,
processing is initially smooth. However, just before migration to the new system, it is
discovered that response time increases if a large amount of data is entered into the
new system at a time. Which of the following is the test that is considered to be
insufficient as a cause of delay in discovering this problem?

a) Function test

b) Fault recovery test

c) Regression test

d) Load test

A

d

40
Q

Which of the following is an appropriate description concerning the characteristic of
prototyping that is a software development method?

a) The phases of basic planning, external design, internal design, program design,
programming, and testing are conducted sequentially, so the entire project can be
overviewed and it is easy to make the schedule and allocate resources.

b) A trial model is created at an early stage of system development, so perception gaps
and ambiguities between the user department and the development department can
be eliminated early.

c) Software is divided into two groups with and without the possibility of specification
changes, and then the processes of programming, review, and change are repeated
for the group with the possibility of changes.
.
d) A large-scale application is divided into highly independent parts, and the phases of
design, programming, and testing are repeated part by part while the development
scope is expanded gradually.

A

b

41
Q

Which of the following is the most appropriate description concerning the role of the
user department in large-scale system development?

a) Without considering the effect of investment in the installed systems, user
department managers make efforts to have the development department accept
requests for additional features from the user department.

b) The user department is in the position of using systems developed by the
development department, so it is better to leave the development entirely to the
development department than to take part in it.

c) The user department checks the deliverables of system development from the
viewpoint of business operations, but details of program design are entrusted to the
development department.

d) The user department needs to actively participate in system development and to
provide advice, so its staff members who are unfamiliar with business processes but
knowledgeable about computers should participate in it at a higher priority.

A

c

42
Q

There exist 50 work items, each having an equivalent workload, and a plan is made to
complete them in 10 days. However, at the end of the 5th day, only 20 items are
completed. If the delay in progress is to be represented as the difference between the
originally planned completion date and actual completion date for the work items that
are currently completed, how many days is the delay?

a) 1

b) 2

c) 3

d) 4

A

a

43
Q

43.) Company A in the manufacturing industry uses an NC machine tool to perform four
tasks A through D. The setup time between each task is as shown in the table below.
When the four tasks are performed so that the total setup time can be minimized, how
long is the total setup time in hours? Here, the tasks can be carried out in any order,
and the setup time between FROM and TO can be used for evaluation; for example, the
setup time from task A to task B is 2 hours.

A
44
Q

Which of the following is an appropriate description concerning the component
breakdown of the WBS (Work Breakdown Structure) in project management?

a) The deepest level of detail of the component breakdown is the level that enables
more accurate project planning and cost estimation.

b) The deepest level of detail of the component breakdown is always the same level
regardless of the project scale.

c) The depth of the component breakdown is always the same depth for all component
deliverables.

d) The deeper the level of the component breakdown is, the higher the level of the
work efficiency becomes.

A

a

45
Q

Five staff members with the same productivity are assigned to an activity that takes 20
days. Immediately before the start of the activity, three members have influenza and
are replaced by new members. When the new members’ productivity is 60% of the
original members’, what is the minimum number of new staff members that is needed
to complete the activity in 20 days or less?

a) 4

b) 5

c) 7

d) 9

A

b

46
Q

46.) In the arrow diagram shown below, Activity B is completed three days behind schedule.
In order to reduce the end-to-end delay to only one day, which activity should be
reduced by how many days?

A
47
Q

Which of the following is the most appropriate description concerning the development
budget of a project?

a) A development plan is based on the total development budget, so the plan should not
be made by adding up the estimated costs of individual tasks.

b) The difference between the development budget and the actual cost should be
monitored, and then the plan should be reviewed and changed as necessary.

c) The development budget relates to the procurement of direct materials, so it should
not include the labor cost for the staff members who participate in the project.

d) A detailed estimate should be made using the FP (Function Point) method,
regardless of whether or not there is a similar project.

A

b

48
Q

Which of the following is an appropriate description concerning the critical path in a
system development project?

a) When additional staff members are assigned in order to recover from a delay in
development, priority is given to activities on non-critical paths.

b) If an activity on the critical path is completed three days ahead of schedule, the
project is also completed three days earlier than expected.

c) If an activity on the critical path is delayed, completion of the project is also
delayed.

d) There exists only one critical path irrespective of the size, duration, or complexity of
the project.

A

c

49
Q

Which of the following is the most appropriate description concerning system
operations?

a) There are many cases where problems and failures relating to system operations
cannot be realized until they actually occur, so it is better to take measures after
occurrence than to take proactive measures.

b) In order to perform system operations smoothly, it is preferable to strengthen the
authority of an operator and entrust the operator with a proper judgment relating to
the handling of a failure.

c) In order to perform system operations efficiently and effectively, it is better to
perform operational tests within the operations department than to request
participation from the development department and the user department.

d) Changes may occur after the system is put into full operation, so it is preferable to
define the standard of change management beforehand in order to ensure that all
changes are made in a controlled manner.

A

d

50
Q
  1. Mr. M was asked to prepare a management list of hardware, so he proposed a
    management method using the table shown below.
A
51
Q

Which of the following is an appropriate description concerning a benefit of
introducing and operating a service desk for a company.

a) Reducing the time before the release of a new version of software

b) Eliminating the use of software that is not approved

c) Reducing the out-of-service state caused by the failure of a system change

d) Responding to an inquiry as promptly as possible

A

d

52
Q

Which of the following is the appropriate use of a security cable (or security wire)?

a) Preventing critical equipment from being destroyed in a fire

b) Preventing notebook PCs placed in the office from being stolen

c) Preventing the screens of mobile PCs used outside the office from being peeped at

d) Supplying alternative power to the system in the event of a power failure

A

b

53
Q

Which of the following is the device that can cope well with a momentary loss of
electric power and can also supply alternative electric power for the period of time
required to shut down the system in the event of a power failure?

a) AVR

b) CVCF

c) UPS

d) Private power generator

A

c

54
Q

As a result of the system audit on personal information protection, the sales department
is notified that a list of customers which is generated by an information system is not
handled properly in accordance with company-wide rules. Who is responsible for
making an improvement plan based on this notification?

a) The person in charge of the sales department

b) The person in charge of the audit department

c) The person in charge of the management planning department

d) The person in charge of the information systems department

A

a

55
Q

When a function for internal control is established, which of the following means that
the distribution of roles and the authority of management are clarified?

a) Segregation of duties

b) Internal audit

c) Activity-based management

d) Risk control matrix

A

a

56
Q

Which of the following is an appropriate description of internal control?

a) A process that is performed by all persons within a company in order to ensure the
effectiveness and efficiency of business operations, reliability of financial reporting,
compliance, and safeguarding of assets

b) A process where a manager who is entrusted with business management raises funds
from a financial institution and buys shares from the shareholders of a parent
company in order to obtain a controlling interest

c) An approach to both work and personal life outside of work where an attempt is
made to sacrifice neither work nor personal life and to keep a good balance between
both of them in a fulfilling way

d) A measure taken by an organization in order to achieve the target of organizational
activities, and a method that aims for the optimization of business activities and
systems

A

a

57
Q

Which of the following is the term that refers to the description below?
Establish and take a course of action, investigate the result, and if the expected result
is not obtained, reflect upon the cause and utilize the conclusion in the next task.

a) AIDMA

b) PDCA

c) SWOT

d) Brainstorming

A

b

58
Q

58.) Company A, in the manufacturing and sales industry, sells 30 products. Based on an
ABC analysis, products are to be narrowed down and then sales promotion is to be
performed for those products with high total sales. The table below shows total sales
by product. How many products are contained in “A group” that is subject to the
sales promotion? Here, “A group” represents approximately 70% of the company’s
total sales.

A
59
Q

59.) The graph below shows the total sales transition over the past five years for a product
that was released by Company A five years ago. Which of the following is an
appropriate description concerning the analysis of the total sales?

A
60
Q

In order to evaluate groupware installed, an information systems department sends a
questionnaire to employees once every six months. The questionnaire has eight
evaluation items including the transmission speed, level of sharing, and recentness of
information. Employees evaluate each item on a scale of one to ten. Which of the
following is an appropriate chart or diagram for representing this evaluation result?

a) Bar chart

b) Scatter diagram

c) Distribution chart

d) Radar chart

A

d

61
Q
  1. The table below shows the monthly sales of a particular product at a retailer that sells
    approximately 200 types of products. The product is replenished during the
    beginning of each month according to the inventory quantity checked at the end of the
    previous month. Which of the following is the appropriate order placement method
    for this product? Here, the sales ranking is determined as the ranking of the product
    when all the products are ranked by the amount of sales.
A
62
Q

A sales company records customer complaints in a complaint log. Which of the
following is an appropriate analysis material that is first created to reduce the number
of complaints?

a) Complaints are categorized, and the number of complaints is counted for each
category item. A Pareto chart is created using the category items and the number
of complaints as the axes.

b) The number of complaints is counted for each day of the week when a complaint is
received. A scatter diagram is created using the days of the week and the number
of complaints as the axes.

c) Regions of customers are categorized, and the number of complaints is counted for
each region. A histogram is created using the region categories and the number of
complaints as the axes.

d) Complaints that took long to respond are extracted into a list. Complaint items are
entered in the list so that the corresponding pages of the original complaint log can
be identified.

A

a

63
Q

In cost accounting, which of the following is handled as a cost element?

a) Donation

b) Material cost

c) Bond interest

d) Extraordinary loss

A

b

64
Q

Among actions concerning the creation of a computer program, which of the following
is a copyright violation?

a) Creating another Web page by using the source of HTML that was downloaded from
the Internet

b) Creating a program based on an idea that was discussed on a bulletin board on the
Internet

c) Creating a program to increase a company’s operational efficiency by using a
program that was created during one’s school days

d) Creating a program based on a flowchart that was shown in a purchased book

A

a

65
Q

Which of the following is an international book code?

a) EAN

b) ISBN

c) ITF

d) UPC

A

b

66
Q

According to ISO 9000:2005 Quality management systems — Fundamentals and
vocabulary, quality is defined as the “degree to which a set of inherent characteristics
fulfills requirements.” When product evaluation is based on this definition, which of
the following is the most appropriate as a good quality product?

a) A product having few customer complaints and a high level of customer satisfaction

b) A product that a company produces without outsourcing manufacturing

c) A product designed and manufactured using CAD and CAM

d) A product utilizing materials and components of high quality

A

a

67
Q

Which of the following is an appropriate description concerning the operations of a
quality management system in accordance with ISO 9001:2008?

a) Even if some different activities are performed by each department within an
organization, it is effective to define common quality objectives to achieve quality
assurance.

b) Even if there are many cases where the quality manual is not actually followed, the
manual should be continuously used during a certain period of time.

c) The quality management system is established in accordance with international
standards, so the operations of the currently existing quality management system
should be continued regardless of the implementation status of processes.

d) Even if a carefully designed quality management system is used, it should be
modified according to a formal procedure on occasions when a problem is identified
in the operational phase.

A

d

68
Q

Product portfolio management is a method for analyzing the positioning of a product
within the market and reviewing the resource allocation. It uses a matrix chart
divided into four quadrants, with the market growth rate on the vertical axis, and the
market share on the horizontal axis. Which of the following refers to a product that is
categorized into the quadrant for low market growth rate and high market share?

a) Cash cow

b) Star

c) Dog

d) Question mark (problem child)

A

a

69
Q

Which of the following is an explanation of affiliate that is one of the advertisement
methods on the Internet?

a) It is a method for sending advertisements of categories that recipients are interested
in, by e-mail with prior permission from them.

b) It is a method for displaying a company’s advertisement and Web link on a personal
home page, and for paying rewards based on the number of visitors attracted.

c) It is a method for making a company’s Web site visible near the top of the search
engine results.

d) It is a method for attracting users to a company’s Web site by placing a graphical
image on a large scale portal site as an entrance to the Web site.

A

b

70
Q

Which of the following is an explanation of the maturity stage in the product life cycle?

a) It is a stage where there is a sudden increase in sales. Competition intensifies as
newcomers enter the market.

b) It is a stage where sales and profits suddenly drop. In this stage, withdrawal from
the market should be considered.

c) It is a stage where demand growth slows down. Measures such as product quality
improvement and style change are taken to maintain market share and secure profits.

d) It is a stage where the product is marketed to early adopters. Strategies to enhance
brand recognition are planned and implemented.

A

c

71
Q

Which of the following is a method for analyzing the behavior of a visitor based on
information such as the number of accesses to a Web site and the browsing history
within the Web site?

a) Regression analysis

b) Cluster analysis

c) Access log analysis

d) Value chain analysis

A

c

72
Q

There are two types of performance indexes: one to evaluate the achievement level of a
goal and the other to evaluate the method for achieving a goal. When the goal is to
“improve the English ability of employees,” which of the following is an appropriate
index to represent the achievement level of this goal?

a) The ratio of employees’ awareness of a message from the company president
concerning the importance of learning English is 80% or more.

b) The ratio of employees who get a mark of 650 or higher in an English test is 60% or
more.

c) The ratio of employees who participate in an English test is 90% or more.

d) The ratio at which a company’s monthly English training course is held as planned
is 90% or more.

A

b

73
Q

Which of the following is an appropriate purpose of CRM?

a) To increase the level of customer satisfaction

b) To understand the purchasing trend of consumers

c) To gain the loyalty of new customers

d) To increase or retain market share

A

a

74
Q

Which of the following is an appropriate description concerning a technology
roadmap?

a) It organizes the transition of past technology and does not show future trends.

b) It is created for the technology strategy of a company or an industry and is not
created by a government or an administration.

c) It represents milestones in technology development, and no review based on market
trends is carried out.

d) It shows a technology development strategy based on an enterprise strategy, and is
intended to be understood not only by engineers but also by other people.

A

d

75
Q

Which of the following is an appropriate explanation of the POS terminal (or POS cash
register) in a supermarket and other such places?

a) It is a terminal of the system used for collecting and managing information such as
the product code and price at the time of a sales transaction (at the “Point of Sale”).

b) It is a terminal of the “Purchase Order System”, and is mainly used to automate
purchase orders for the replenishment of products.

c) It is a terminal of the strategic product management system developed for
monitoring the “Probability of Survival” of such products.

d) It is a terminal of the inventory management system first manufactured in “Port of
Spain”, and it holds an overwhelming market share

A

a

76
Q

Which of the following is the most appropriate explanation of ERP (Enterprise
Resource Planning)?

a) It is the technique and concept to improve management efficiency by planning the
company-wide management resources in an effective and integrated way.

b) It is the technique and concept to perform commercial transactions for consumers
and between companies by using electronic networks, such as the Internet.

c) It is the technique and concept to introduce IT into business activities with the aim
of improving not only efficiency and quality but also customer satisfaction.

d) It is the technique and concept where wholesalers and manufacturers support the
business activities of retail stores for increased turnover.

A

a

77
Q

Among e-commerce categories, which of the following corresponds to the concept of
“B to C” transactions?

a) CALS

b) Web-EDI

c) Virtual companies

d) Virtual malls

A

d

78
Q

Which of the following is supported by a CAD system?

a) Process design

b) Production planning

c) Product design

d) Delivery planning

A

c

79
Q

Which of the following is the situation where an improvement can be expected by
installing an MRP (Material Requirements Planning) system?

a) Drawing information is managed using electronic files and hard copies, so the
design change history cannot be accurately known.

b) Information concerning materials necessary for manufacturing and their required
quantities is insufficient or incorrect, so production is being adversely affected.

c) There are too many design change requests, so production efficiency does not
improve.

d) High-mix, low-volume production is adopted, so the cost of installing production
equipment is increasing.

A

b

80
Q
  1. ) When the spreadsheet shown below is converted into CSV format, which of the
    following is an appropriate list of data that is generated by spreadsheet software?
    Here, records are separated by the carriage return code “C
    R”. The expression in a cell
    is automatically recalculated, and the resulting value is written back into that cell.
    Although the entered expressions are shown in row 3 and column C below, the
    resulting values are actually displayed on the screen.
A
81
Q

Which of the following is an appropriate explanation of a banner advertisement that is
one of the Internet advertisements?

a) When a Web site is being browsed, an advertisement from an advertiser is
automatically displayed in another new window.

b) When a Web page is accessed from another page, a page with an advertisement is
briefly shown before the accessed page is displayed.

c) When an advertisement image that is placed on part of a Web page is clicked, a page
created by an advertiser is displayed.

d) When keywords are entered into a search service site, an advertisement related to
the keywords is displayed on the page showing the search results.

A

c

82
Q

When computerization is promoted, which of the following is an appropriate point to
be noted?

a) In order to understand the current status of business operations, the opinions of third
parties rather than staff members involved in the operations should be considered.

b) In order to make a computerization plan, more attention should be paid to “how to
do it” rather than “what to do”.

c) After the final decision on the hardware configuration of an information system, the
methodology of computerization should be investigated.

d) In order to evaluate a computerization plan, not only the occurrence of new
problems but also investment effect and feasibility should be considered.

A

d

83
Q

Which of the following is an appropriate description concerning groupware?

a) It is software that has an animation or sound function and is helpful in effective
presentations by incorporating the output of spreadsheet software or database
software.

b) It is software that has functions, such as a format setting function used to define the
print layout and a function to change and edit text, and enters data to create a
document.

c) It is software that has functions, such as communication via e-mail and electronic
bulletin boards, data sharing, and schedule management, and supports collaborative
work.

d) It is software that is used to enter data into cells of a worksheet, create tables, and
tabulate data.

A

c

84
Q

During business system development, it is effective to collect the meaning and usage of
language (such as words, terms, and phrases) used in the target business operations and
to create a glossary for smooth communication between users and developers, and
between developers themselves. Which of the following is an appropriate description
concerning the handling of this glossary?

a) The glossary should be created and updated from an early stage of development.

b) The manual writer should create the glossary in the final stage of development.

c) The glossary is not necessary for small scale systems.

d) Only technical terms related to the target business operations should be collected.

A

a

85
Q
  1. ) As shown in the figure below, there exists a business process consisting of activities A,
    B, and C. When an information system is installed to achieve improvement, what is
    the percentage of reduction in the person-hours required for manufacturing a product in
    comparison with before the improvement? Here, the arrows in the figure indicate the
    sequence of the activities, and the person-hours are calculated by multiplying the
    number of staff members by the working hours.
A
86
Q

When the software lifecycle is divided into four processes consisting of planning,
requirements definition, development, and operation, which of the following is an
appropriate result of the planning process?

a) The requirements of the software to be developed are defined and reviewed.

b) The requirements and constraints of the system are defined and agreed.

c) A development project to implement the system is scheduled and approved.

d) The database is designed at the highest level and is reviewed.

A

c

87
Q

Which of the following is an appropriate description concerning risk analysis?

a) It takes too much time and cost to implement countermeasures against all possible
risks, so priority should be given based on the estimated amount of loss and
probability of occurrence.

b) For risks that are assessed with risk analysis, risk analysis should not be repeated
until all measures are completely implemented.

c) The purpose of risk analysis is to prevent loss in the future, so data that was
accumulated in similar projects in the past should not be referenced.

d) The purpose of risk analysis is to know the amount of loss caused by the occurrence
of a risk, and the cost of measures should be decided based on this amount of loss.

A

a