April 2013 Flashcards

1
Q

1.) In the sales campaign for a certain product, a full-page advertisement is run a total of
three times in three magazines A, B, and C. When the effects expected from running
a full-page advertisement zero to three times in each of the magazines are as shown in
the table below, how many times should the advertisement be run in magazine A to
gain the largest possible effect? Here, the effects of the advertisements placed in the
individual magazines are independent of one another, and the effects from multiple
magazines can be calculated by simply adding the individual effects.
Number of times that the
full-page advertisement is run
Zero
times
One
time
Two
times
Three
times
Effect of magazine A 0 2 7 7
Effect of magazine B 0 1 6 10
Effect of magazine C 0 5 8 9
a) 0 b) 1 c) 2 d) 3

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the appropriate meaning of the units that are shown in the
specifications given in brochures or catalogs?

a) “2-Tbyte hard disk” refers to a capacity of 2× 1012 bytes.

b) “9600-dpi printer” refers to a printing precision of 9600 dots/cm2
.
c) “CPU operates at a base clock of 3.3 GHz” refers to operation at a frequency of
3.3× 220 Hz.

d) “Modem with a transmission speed of 56 kbps” refers to a minimum transmission
speed of 5.6× 210 bits/second.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There is a standard that can represent data in a hierarchical structure by enclosing data
that corresponds to attribute N with the tags <N>, which means the start, and </N>,
which means the end, and then linking and nesting these tags. Company A decides to
comply with this standard and create a paper by using the structural rules (1) through
(3) below. Which of the following is the appropriate header of a paper named “New
Document Management” that is created by Jack Smith of the Information Systems
Department (I/S Department) in accordance with this standard and these structural
rules?
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.

a) <header>

<author>
<title>New Document Management
<name>Jack Smith</name><dept>I/S Department</dept>
</title>
</author info>
</header>

b) <header>
<title>New Document Management</title>
<author><name>Jack Smith</name></author info>
<dept>I/S Department</dept>
</header>

c) <header>
<title>New Document Management</title>
<author>
<name>Jack Smith</name><dept>I/S Department</dept>
</author info>
</header>

d) <header>
<title>New Document Management</title>
<name>Jack Smith
<author><dept>I/S Department</dept></author info>
</name>
</header>
</author></name></header></author></header></author></header></author>

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an appropriate description concerning HTML?

a) It is a markup language that can specify the logical structure and layout of a Web
page by using tags.

b) It is a script language that can describe the program or processing steps executed on
a browser.

c) It is a communication protocol that is used between a browser and a Web server.

d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an appropriate description concerning an applet?

a) A document file that is transmitted from a Web site and saved onto the user’s PC
when the Web browser accesses the Web site

b) A language that is used for creating a Web page

c) A program that is downloaded from a Web server and embedded into a client
browser, and then executed in the browser

d) A language that is used for database manipulation such as data addition,
modification, deletion, and search

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an appropriate characteristic of tree structure that is one of
data structures?

a) Data elements can be retrieved by traversing a hierarchy of nodes from a higher
level node to a lower level node.

b) Data elements can be retrieved in the order in which they are stored.

c) Data elements can be retrieved in the reverse order to the order in which they are
stored.

d) Data elements can be retrieved by traversing cells composed of a data field and a
pointer field.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a DVD disc in which users can write data, but cannot rewrite
data?

a) DVD-R

b) DVD-RAM

c) DVD-ROM

d) DVD-RW

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an appropriate characteristic of flash memory?

a) It allows high-speed access, so it is used for cache memory.

b) Data can be written only once, so it is used for program memory.

c) It is rewritable and nonvolatile, so it is used for USB memory or SD card.

d) Although refresh cycles are required, it is used for main memory because of the
capability of rewriting data any number of times.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the correct comparison of the amount of data?

a) 1 KB < 1 MB < 1 GB < 1 TB

b) 1 KB < 1 MB < 1 TB < 1 GB

c) 1 KB < 1 TB < 1 MB < 1 GB

d) 1 TB < 1 KB < 1 MB < 1 GB

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a characteristic common to IEEE 1394 and USB that are
often used for connection interfaces between PCs and peripheral devices?

a) Peripheral devices can be connected and disconnected while the PC and/or devices
are powered on.

b) A maximum transfer rate is 100 Mbits/second.

c) A unique ID needs to be assigned to each device connected to a PC.

d) Data can be transmitted in parallel over multiple data lines.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Among the functions of client management tools, which of the following is the most
effective function for detecting whether or not software unrelated to the business
operations is installed on client PCs?

a) Inventory collection

b) Remote operation

c) Software distribution

d) Lifecycle management

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an appropriate characteristic of a distributed processing
system, in comparison with a centralized processing system?

a) The partial failure of a system often leads to a shutdown of the entire system.

b) It is difficult to expand the system in line with the expansion of functions or the
increase in the volume of work.

c) It is easy to protect data and ensure security.

d) From a viewpoint of operations management, it often becomes complex to operate
the entire system efficiently.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the system that receives a processing request from a terminal
via a network and sends back the result immediately?

a) Operating system

b) Online real-time system

c) Database system

d) Multimedia system

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the minimum amount (in Mbytes) of virtual memory that is required under the
conditions below?

[Conditions]
1. Memory required for the OS: 200 Mbytes

  1. Memory required for applications: An amount of 50 Mbytes is required for each
    application, and a total can be calculated by multiplying it by the number of
    applications that run concurrently. Eight applications run concurrently.
  2. Memory required for controlling main memory or other related functions: In
    addition to 512 Mbytes of main memory, a minimum amount of 20 Mbytes is
    required.
  3. Required virtual memory: The required amount is the sum of the above items 1
    through 3.

a) 762

b) 782

c) 1,112

d) 1,132

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a new program was added and executed on a server that has the virtual memory
function, a lot of swapping occurred and the performance of existing programs in
operation was decreased. In order to resolve this problem, which of the following is
the most appropriate method?

a) Installation of a high-speed CPU

b) Installation of a faster type of main memory

c) Installation of additional hard disk drives to expand the capacity of auxiliary storage

d) Installation of more main memory

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

16.) Company A plans to make a backup copy of the data on a server, which is used for
business operations, in preparation of future hardware failures. Which of the
following is an appropriate backup plan that satisfies the backup requirements shown
below?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

17.) As shown in the directory structure below, when D3 marked by an asterisk (*) is the
current directory, which of the following the appropriate directory path that can
designate file A under directory D4 marked by an arrow? Here, a file is designated as
follows:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the most appropriate purpose of installing a business
application software package instead of self-developed application software?

a) To enhance the environment of development

b) To reduce the cost of development

c) To acquire the knowledge of software development methods

d) To improve the skills of application developers

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an appropriate description concerning OSS (Open Source
Software)?

a) The program is free to use for a certain trial period, but a fee is required to continue
using it.

b) Modifications and derived works are allowed to be distributed under the same terms
as the license of the original software.

c) The copyright is waived, so any modified program can be distributed without
permission.

d) The program may be restricted from being used in a business, or from being used for
a specific field.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the effect that is expected as a result of performing
defragmentation of a hard disk?

a) The cluster with an error is replaced with an alternate cluster.

b) The apparent volume of files is decreased.

c) The number of read errors is decreased when files are accessed.

d) The access time to continuously read files is shortened.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an appropriate type of menu that enables users to make
multiple selections on common GUIs as seen in PC operating systems?

a) Check box

b) Text box

c) Pull-down menu

d) Radio button

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Some sample photos of luxury women’s clothing, which were taken with a digital
camera in an uncompressed format, are to be provided on a shared server after image
processing such as color-correction and trimming. In such a situation, which of the
following is an appropriate compression format that can be used to reduce the amount
of image data?

a) BMP

b) JPEG

c) MPEG

d) MP3

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. From the “Product” table below, products whose supplier is “Company A” and the
    price is 1.4 dollars or more, and products whose supplier is “Company B” and the price
    is 1.7 dollars or less are extracted. Which of the following is a list of all of the
    obtained product names?

Product
Product code Product name Price (dollars) Supplier

S001 Chocolate 1.5 Company A
S002 Cake 2.6 Company B
S003 Sponge cake 2.9 Company C
S004 Apple 1.9 Company A
S005 Strawberry 2.2 Company B
S006 Melon 2.8 Company C
S007 Juice 1.2 Company A
S008 Coffee 1.6 Company B
S009 Beer 2.2 Company C

a) Cake, Strawberry, Coffee

b) Cake, Strawberry, Juice

c) Chocolate, Apple, Coffee

d) Chocolate, Apple, Juice

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an appropriate purpose of normalizing the data of a relational
database?

a) To improve the compression ratio of data

b) To retain the consistency of data

c) To prevent the leakage of data

d) To enable the simultaneous access of data

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. ) In a relational database, when (A B) and ) (A B are performed on table A and
    table B shown below, which of the following is an appropriate combination of the
    resulting two tables among the three tables P, Q, and R? Here, ) (A B shows the
    union of A and B, and ) (A B shows the intersection of A and B.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A program in operation detected that the sales data exceeded the upper limit. As a
result of checking the input form, it was found that sales quantity exceeded the upper
limit by two digits. Which of the following is the appropriate action for the
operations department to take toward this data?

a) Correcting the data with the approval of the head of the operations department

b) Consulting the systems development department

c) Discarding the data under the responsibility of the operations department

d) Asking the requester or requesting department to check the input form

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is the mechanism that determines a correspondence between a
domain name and an IP address on the Internet?

a) DNS

b) FTP

c) SMTP

d) Web

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is required to construct a LAN to connect several computers in
a room?

a) Internet

b) Splitter

c) Hub

d) Modem

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is placed between an internal network and an external network
in order to prevent unauthorized access from the outside to the inside?

a) DHCP server

b) Search engine

c) Switching hub

d) Firewall

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an appropriate description concerning a router used in an IP
network?

a) It maps domain names to IP addresses.

b) It selects the path for transmitting packets based on IP addresses.

c) It converts analog signals to digital signals and vice versa.

d) It executes processes and provides data upon requests from other computers.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When e-mails are sent and received between PCs on the Internet, which of the
following is an appropriate description concerning the selection of communication
protocols that are used between each pair of PCs and mail servers?

a) Each PC uses POP for sending e-mails and SMTP for receiving them.

b) Each PC uses SMTP for sending e-mails and POP for receiving them.

c) Each PC uses POP for both sending and receiving e-mails.

d) Each PC uses SMTP for both sending and receiving e-mails.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When the maintenance of a database is planned for employee information that includes
personnel information, which of the following is an appropriate item to be considered?

a) It is essential to keep employee information up to date, so administrators in each
department should be responsible for updating staff members’ items.

b) Employee information is used for deciding personnel affairs, so managers should be
able to check any information of all employees.

c) The database includes employees’ private information, so access privileges should
be established to limit the range of available information.

d) When checking employee information for internal projects, any employee of
relevant departments should be able to search for all employee information.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In the PDCA (Plan, Do, Check, Act) cycle of an information security management
system (ISMS), which of the following is performed during the “Act” phase?

a) Maintenance and improvement of the ISMS

b) Establishment of the ISMS

c) Monitoring and review of the ISMS

d) Installation and operations of the ISMS

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is a security attack that is sent to users as a part of a program
with a hidden destructive function, or as a program designed to trick users into
executing a malicious function?

a) DoS attack

b) Dictionary attack

c) Trojan horse

d) Buffer overflow attack

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is an appropriate description concerning the management of a
user ID and password in system operation?

a) A user ID should be unconditionally given to any applicant, and a password should
be registered by each applicant.

b) The log-in operation should be blocked unless the user changes the password during
periodic intervals.

c) Applicants should be instructed to use only passwords with eight or more characters
listed in the dictionary.

d) Even if a user retires from work or moves to another organization, the user’s ID
should be left “as is”.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is a biometric authentication technique that uses a vein pattern?

a) Face authentication

b) Iris authentication

c) Voice authentication

d) Palm authentication

A

d

34
Q
  1. In the description below of measures against spam mail, which of the following is an
    appropriate combination of words to be inserted into blanks A and B?
    Mr. C is tired of receiving spam mail, so he is trying to register the e-mail addresses,
    from which he wants to receive e-mails, in a A so that e-mails sent from the
    e-mail addresses registered in the A only can be B .

A B
a) blacklist permitted

b) blacklist denied

c) whitelist permitted

d) whitelist denied

A

c

35
Q

Which of the following is an appropriate description concerning antivirus software?

a) A virus signature file for antivirus software is a database that contains the first 16
bytes or 32 bytes of the code for each virus.

b) Virus detection with antivirus software using signature files is effective for detecting
known viruses and identifying virus names.

c) If the size of a file infected by a virus is the same as before the infection, the file can
be restored to the state before the infection by removing the virus.

d) The method of detecting a virus by monitoring suspicious behavior identifies the
virus name based on the behavioral characteristics of the virus.

A

b

36
Q

Which of the following is an appropriate test item to be performed by the integration
test in the software development process?

a) Connecting several PCs via a LAN cable, and testing to ensure that files can be
shared

b) Checking the shape of the connector on the cable that connects PCs and peripheral
devices, and testing to ensure that the cable can be smoothly inserted

c) Testing to ensure that after a contract is signed with an Internet service provider,
Web sites can be accessed from the browser

d) Combining two or more programs after the unit test, and testing to ensure that the
interface between the programs is implemented in accordance with the specifications
and is properly interlocked

A

d

37
Q

It is determined that a new system is required to operate 24 hours a day, 365 days a
year. Which of the following is a development phase that involves making such a
decision?

a) Software acceptance

b) Testing

c) Programming

d) Requirements definition

A

d

38
Q

Q41.) For software that started full operation on January 1 last year, the number of
maintenance activities was added up for each month from January to December, and
the result is shown in the graph below. Which of the following is the most
appropriate set of maintenance activities corresponding to factor A in the graph?

A
39
Q

Which of the following is an appropriate description concerning the productivity of
software development?

a) If defects are detected at an early stage of the development process, they can be
corrected with fewer person-hours, and thereby productivity is increased.

b) Effective communication between the development team and the user department has
no relation to productivity.

c) Productivity is the same regardless of whether to use high-level languages or
assembly languages.

d) The adoption of an appropriate estimation of workload and cost improves
productivity.

A

a

40
Q

When system development is conducted sequentially from upstream to downstream
processes, a significant amount of rework might arise in the test phase that is
performed by the system user. For the purpose of preventing such rework, which of
the following is the method that is used to create trial models in an early stage and
clarify user requirements?

a) Object-oriented approach

b) Spiral model

c) Data oriented approach

d) Prototyping

A

d

41
Q

The quality characteristics of software are classified into functional suitability, usability,
performance efficiency, compatibility, and so on. Which of the following is classified
as usability?

a) Execution results and operations are provided based on the specifications.

b) The mean time between failures of the software is long.

c) The software can be executed in other operating system environments.

d) It does not take long for users to become familiar with the software.

A

d

42
Q

A factory requests the development of the production management system to its
information systems department, so the information systems department organizes a
development project. Which of the following is the most appropriate relation between
the factory, which is the client in this case, and the information systems department?

a) In order to reduce the load of development activities, once the requested items have
been conveyed at the beginning of the project, the factory does not communicate
with the information systems department.

b) When a problem occurs in the development project, the factory participates actively,
as a client, in solving the problem.

c) When a specification change is requested to the information systems department, the
factory directly communicates the request to the person in charge of development in
the information systems department, and gets on-the-spot support.

d) The information systems department is responsible for the development of the
production management system, so the information systems department does not
need to send the progress report and quality report to the factory.

A

b

43
Q

At the beginning phase of a new personnel system development project, in order to
clarify the possible risks, the persons in charge of the planning department, personnel
department, and information systems department, who act as the project team members,
get together and freely exchange their opinions on the apparent risks concerning the
project. What is such a method called?

a) Walk-through

b) Critical path method

c) Simulation

d) Brainstorming

A

d

44
Q

Which of the following is an appropriate item to be considered when a project is
started?

a) Although it is important to clarify the preconditions and constraints within the
organization, the preconditions and constraints of the external environment are not
clarified because such external factors cannot be controlled by self.

b) At the time of start of a project it is difficult to estimate how the project makes
progress in the future, so the purpose of the project is indicated after waiting until
the stage in which it becomes clear what kind of results might be achieved.

c) When a project is started, it is necessary to estimate the specific budget for each
smallest segmented process, and the project cannot be started unless this is
performed.

d) When a project is started, a project manager is appointed, and his/her responsibilities
and authority are clarified.

A

d

45
Q

Which of the following is a technique that is used for creating a plan in project
management and dividing the entire project into detailed activities to represent them in
a hierarchically structured diagram?

a) DFD

b) WBS

c) State transition diagram

d) Risk analysis sheet

A

b

46
Q

Q49. )
In the arrow diagram shown below, a total of 24 days are required to complete all the
activities. When the number of days required for activity C is reduced by three days,
the total number of days required for completion of all the activities can be reduced by
one day. How many days are required for activity D?

A
47
Q

When the progress of a project is managed, which of the following is an appropriate
item to be considered?

a) The delay in progress can be corrected based on the judgment of the administrator.

b) Qualitative items are set in the control items of progress management.

c) Target values are set for each item in order to evaluate the progress quantitatively.

d) A radar chart is used to facilitate the understanding of progress.

A

c

48
Q

Which of the following is the main role of a service desk?

a) Investigating and analyzing the usage status of a system to evaluate the service level

b) Investigating the cause of a bug to improve the quality of application software

c) Conducting interviews to collect computerization needs for future system planning

d) Responding to inquiries, such as system failures, for enhanced user convenience

A

d

49
Q

Which of the following is the purpose of an SLA that is an agreement on the service
level between the IT service provider and the customer?

a) To clearly define the scope and quality of the service

b) To clearly define the procedure for checking the service management periodically

c) To clearly define the objectives of computerization

d) To clearly define the education necessary for the staff

A

a

50
Q

An orientation meeting is held to explain the new functions that are to be added to the
system. Mr. A, systems administrator, recommends that all the people who use the
system should attend the meeting and exchange opinions. Which of the following is
the effect that Mr. A hopes for?

a) Verification of the correctness of algorithms

b) Reduction of the development costs and period

c) Increase in user awareness of participating in system development

d) Design of white box test cases

A

c

51
Q

Which of the following is an appropriate description concerning the updating of
application systems?

a) It takes time to examine the priority order of change requests, so changes should be
implemented in order of arrival.

b) It is always necessary to record the changes in applications because they are helpful
in investigating the cause of a failure.

c) It is difficult to estimate the extent of an impact from changes, so all employees
should be informed of modifications at all times.

d) The release to the operational environment should be conducted late at night so that
users are not affected.

A

b

52
Q

The process of IT service management consists of various activities such as incident
management, problem management, and release management. Which of the
following is the activity of problem management?

a) It was reported by several departments that e-mails were not able to be sent. The
backup system was started to resume the service.

b) There was an inquiry saying that e-mails were not able to be sent. When the user
was asked to check the settings of the PC, the e-mail address was found to be wrong
and the user corrected the address.

c) A hardware fault of a server caused the mail system to fail. The faulty hardware
component was replaced, and then a verification test was conducted.

d) The e-mail system failed. In order to analyze the root cause, the staff members of
the information systems department and the vendor engineers who constructed the
system got together and started to collect information.

A

d

53
Q

In a certain company, multiple PCs are to be used on a 100-volt commercial power
supply available in the facility. The PCs and display monitors are connected to a
dedicated power distribution board, and the maximum capacity of the circuit breaker is
20 A (amperes). What is the maximum number of PCs that can operate
simultaneously? Here, the power consumption is 200 W (watts) per PC and 100 W
per display monitor. A PC and a display monitor are always used as a pair.
Moreover, the power consumption stays flat.

a) 4

b) 6

c) 10

d) 12

A

b

54
Q

Which of the following is a process according to which a third party inspects and
evaluates the security and reliability of the information system of a company, and if
necessary, the third party makes suggestions and recommendations to the party being
inspected and evaluated.

a) System audit

b) System management

c) System design

d) System test

A

a

55
Q

Among descriptions of IT-based business processing control, which of the following is
a description concerning the combined control of software-based automatic processing
and human-intensive processing?

a) The sales persons directly enter the information of their new customers, so any
incorrect data entry can be prevented.

b) The excessive order amount entered by each sales person requires the manager’s
approval, so the appropriateness of transactions can be checked by several persons.

c) A contracting officer who specializes in the operation enters the information for
registering a new customer, so any incorrect data entry can be prevented.

d) Instruction data for manufacturing is automatically created by software based on the
registered order data, so any human error can be excluded.

A

b

56
Q

Which of the following is the process that is used to assess and review the quality of a
company’s internal control performance over time?

a) Benchmarking

b) Monitoring

c) Reengineering

d) Restructuring

A

b

57
Q

Which of the following is an explanation concerning a public offering of stock?

a) Management is left to management experts rather than the shareholders.

b) Companies buy and retain each other’s shares.

c) Through the technique of corporate acquisition, the company’s own shares and the
shares of the acquired firm are exchanged.

d) The unlisted shares of one’s company are circulated in the securities market.

A

d

58
Q

Q61. )Which of the following is the arrow diagram that shows a series of activities performed
under the conditions below? Here, a dashed line represents a dummy activity.
[Conditions]
(1) Activity A is the first activity in the project.
(2) After activity A is completed, activity B and activity C can be started and
performed in parallel.
(3) After activity B and activity C are completed, activity D can be started.
(4) After activity C is completed, activity E can be started.
(5) After activity D and activity E are completed, activity F and activity G can be
started and performed in parallel.
(6) After activity F and activity G are completed, activity H can be started.

A
59
Q

Which of the following is an appropriate example of how to use diagrams or charts?

a) A cause and effect diagram is used to show the relationship between the cost and
performance of CPUs.

b) A Gantt chart is used to show the order of telephone contacts at the time of a system
failure on non-working days.

c) A scatter diagram is used to understand the cause of product quality deterioration.

d) A flowchart is used to show the procedure for purchasing goods.

A

d

60
Q
  1. )Which of the following has a negative correlation between temperature and total sales?
A
61
Q

A set of PC LAN equipment with a purchase price of 10,000 dollars is to be used on a
five-year lease. When the lease rate is 2%, what is the total leasing expense in
dollars? Here, the lease rate is shown as a proportion of the monthly lease fee to the
purchase price.

a) 11,200

b) 11,400

c) 12,000

d) 12,400

A

c

62
Q

Which of the following can be classified as a trade secret from a viewpoint of
preventing unfair competition?

a) Information about a personal scandal involving a company executive

b) Information about technology under development, which is marked as “Strictly
Confidential” and circulated throughout the company

c) Information about a production method that is not publicly known, which is marked
as “Confidential” and stored in a locked cabinet

d) A commercially available book which describes how to sell a company’s products
effectively

A

c

63
Q

Which of the following is an explanation of free software?

a) It can be installed on any number of computers without limitation in a predetermined
location of use.

b) It requires the users to pay predetermined charges to the developer if it continues to
be used after a certain period of free trial.

c) It is commercially available and permitted to be installed on one or more computers.

d) It is provided without charge, and can be modified, copied, and distributed without
restriction under the license agreement.

A

d

64
Q

Which of the following is an explanation of a volume license agreement on software?

a) It is an agreement in which a master copy of software is provided to customers,
including companies, who purchase the software in high volume, and the number of
permitted installations is defined in advance.

b) It is an agreement in which the location of use is restricted to a specified facility, and
the software can be used without limiting the number of computers or users in the
facility.

c) It is an agreement in which the use of software is permitted by accepting the terms
and conditions of the contract displayed on the screen when the software is
downloaded from the Internet.

d) It is an agreement in which standard licensing conditions are defined and a license
agreement is automatically considered to be concluded between the right holder and
the purchaser when a certain amount of package is unwrapped.

A

a

65
Q

In e-commerce using public key cryptography, which of the following is created by the
CA (Certification Authority) that is a third-party organization independent from the
parties involved in the transaction?

a) Digital signature of the parties involved in the transaction

b) Electronic certificate for private keys of the parties involved in the transaction

c) Electronic certificate for public keys of the parties involved in the transaction

d) Passwords for the parties involved in the transaction

A

c

66
Q

Q69.) Company S purchases equipment from Company K by using the procedure shown in
the diagram below. In this transaction procedure, which of the following is the point
at which the sales contract is concluded? Here, once the quotation is provided, the
content of the transaction does not change throughout the procedure.

A
67
Q

Which of the following can be classified as “personal information” from a viewpoint of
the protection of personal information?

a) Corporate name, telephone number, address, and such other information that can be
used to identify a specific company

b) A report summarizing only the responses from questionnaires returned in signed
forms

c) A master copy of the customer information file that contains name, date of birth, and
address

d) A table showing both the number of customers grouped by age bracket and the sales
amount in each bracket

A

c

68
Q

Q71. ) A company has a product line with four types of products A through D. The company
created the table below after investigating the sales, market share, and market growth
rate of each product. Which of the following is the appropriate product portfolio
matrix (PPM) that shows this situation? Here, the size (area) of a circle shows an
amount of sales.

A
69
Q

Which of the following is a form of farming out all or most of the information system
development, operations, and maintenance work to an external specialized company
for the purpose of reducing information system costs?

a) Outsourcing

b) System integration

c) Housing

d) Hosting

A

a

70
Q

Cross licensing is a way of using a company’s own patents effectively. Which of the
following is an appropriate explanation of the right to execute the patent in cross
licensing?

a) The company grants an exclusive license of a patent to an authorized party.

b) An authorized party, who is granted the right to execute the patent, grants it to a third
party.

c) Two patent-holding companies mutually grant the right to execute their patents to
each other.

d) Multiple companies centralize the management of their own patents at a single place
and grant the licenses to the participating companies including those that do not own
a patent.

A

c

71
Q

Among the forms of e-commerce, which of the following is the form in which
consumers purchase products from individuals, including transactions conducted at an
auction site, other than manufacturers and retail stores?

a) B to B

b) B to C

c) B to G

d) C to C

A

d

72
Q

Among the sales techniques for attracting customers, which of the following is an
appropriate example of cross selling?

a) Recommending the use of business class to a customer requesting an economy-class
ticket

b) Recommending the purchase of a new type of car to a customer who needs an
inspection of the customer’s own car

c) Recommending the purchase of a single-lens reflex camera to a customer requesting
a compact camera

d) Recommending the purchase of ski-wear to a customer who buys skis

A

d

73
Q

76.)
A company decided to perform an investigation of the items shown in the analysis table
below in comparison with other companies in the same industry handling the same
kinds of products, and completed the table. There are five evaluation levels, with 5
being the highest. As a result of an overall evaluation, what is this company’s rank
from the top?

A
74
Q

Which of the following is the most appropriate meaning of “de facto standard”?

a) Standards for industrial products defined as national industry standards in each
country

b) Standards for industrial and scientific technologies defined by the ISO (International
Organization for Standardization)

c) Specifications which were originally adopted by a particular company or group and
are currently in wide-spread use as practical industry standards

d) Specifications applied anywhere in the world, rather than standards limited to a
particular country, region, or company

A

c

75
Q

Which of the following is an appropriate explanation of the point card system (or
loyalty program) implemented by retail businesses?

a) It is a system that enables the card applicant to do shopping within a credit limit
through deferred payment of the amount.

b) It is a system that enables the payment of the shopping amount through a bank ATM
card.

c) It is a system where credit corresponding to purchase amount is accumulated on a
card, and services are offered according to the accumulated credit.

d) It is a system where an amount is prepaid on the assumption of purchase of products,
and the amount is deducted from the card each time a product is purchased.

A

c

76
Q

A single unit of Product A is composed of three pieces of Part B and two pieces of Part
C. In the production plan for a particular period, when the demand for Product A is
10, which of the following is the net requirement of Part B? Here, the quantity in
stock is five for Part B, and there are no other pieces in stock, in process, on back order,
or already allocated. The net requirement is calculated by subtracting the stock
available for allocation from the gross requirement.

a) 20

b) 25

c) 30

d) 45

A

b

77
Q

Which of the following is a product that can take advantage of the cell production
system where a single worker or a small team of workers has responsibility for
assembling each product from the beginning to the end?

a) A product which requires mass production to increase productivity

b) A product whose specifications do not change over the long term

c) A product which requires wide variation and flexible production

d) A product which requires the division of labor based on standardization,
simplification, or specialization

A

c

78
Q

Which of the following is an appropriate description in comparison of how to
safeguard IC cards and magnetic cards against forgery?

a) An IC card is more robust against forgery than a magnetic card, because the IC card
provides the features of storing and encrypting information in the IC chip.

b) An IC card is more robust against forgery than a magnetic card, because the IC card
uses a two-dimensional code for information recording.

c) A magnetic card is more robust against forgery than an IC card, because the
magnetic card stores information on a magnetic stripe and has a more complicated
data protection mechanism.

d) A magnetic card is more robust against forgery than an IC card, because the
magnetic card uses a bar code for information recording.

A

a

79
Q
  1. ) The diagram below shows the flow for a credit card transaction. Which of the
    following is the action that corresponds to (5) in the diagram? Here, the numbers (1)
    through (6) indicate the sequence in which the transaction is processed.
A
80
Q

Which of the following is a type of cash card which can be used for real-time settlement
that withdraws the transaction amount directly from the customer’s bank account?

a) Credit card

b) Debit card

c) Prepaid card

d) Point card

A

b

81
Q

Which of the following is the system that is housed in home electric appliances, such
as rice cookers and air conditioners, and is used to implement the specific functions of
such appliances?

a) Expert system

b) Enterprise system

c) Embedded system

d) Simplex system

A

c

82
Q

In the operations of an SFA (Sales Force Automation) system that is aimed at
supporting sales activities and strengthening management, which of the following is
the most appropriate information that must be managed?

a) Information about the number of visits to each customer, the progress status of
business talks, and the status of business transactions

b) Information about the skills, record of attended trainings, and business goals and
attainment level of each employee

c) Information about the date and time of sales, sales quantity, and sales amount of
each product

d) Information about the production plan, components and required quantity, and
inventory of each product

A

a

83
Q

Which of the following is a set of activities that clarifies the target business operations,
cost, schedule, organizational structure, investment effect, and such other factors of
development, based on the information strategy?

a) Operational activities

b) Development activities

c) Planning activities

d) Maintenance activities

A

c

84
Q

Which of the following is a modeling technique that is used for analyzing business
operations and system from the viewpoint of the flow of data which is exchanged
between processes?

a) BPR

b) DFD

c) MRP

d) WBS

A

b

85
Q

Which of the following is an advantage of outsourcing system operations?

a) The company can decide to resume its own system operations as before at any time.

b) The company’s information systems department can focus on business operations
such as planning and development.

c) It becomes easier for the company to recognize problems in information systems.

d) It becomes easier for the company to take measures against troubles on its own.

A

b