April 2014 Flashcards

1
Q

Which of the following is the decimal number that is equivalent to the hexadecimal
number “A3”?

a) 103

b) 153

c) 163

d) 179

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2. Which of the following is the logical operation that is equivalent to the truth table
below?
Input A Input B Output
0 0 0
0 1 0
1 0 0
1 1 1

a) AND

b) NOT

c) OR

d) XOR

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a standard encoding system that is widely used for handling
multilingual text and symbols around the world as a single character set?

a) ASCII

b) EBCDIC

c) EUC

d) Unicode

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an appropriate combination of compression techniques that
are used for still images, moving images, and audio?

Still image | Moving image | Audio
a) GIF MPEG MP3

b) JPEG MP3 GIF

c) MP3 JPEG GIF

d) MPEG GIF MP3

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a queue, three elements 33, 27, and 12 are stored (i.e., enqueued) in this order.
After another element 45 is enqueued to the queue, two elements are retrieved (i.e.,
dequeued). Which of the following is the second element to be dequeued?

a) 12

b) 27

c) 33

d) 45

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an appropriate explanation of an algorithm that is used on a
computer?

a) A generic term for artificial languages used to enable a computer to perform a series
of operations

b) A processing procedure for enabling a computer to accomplish a specific purpose

c) Designing of buildings or industrial products with the assistance of a computer

d) Software for translating a program into a machine language that can be directly
executed by a computer

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q7.) Among the program control structures, which of the following is classified as a
“while-type” loop structure?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate description concerning the Java language?

a) It is a general-purpose language developed mainly for business applications.

b) It is a language developed for scientific and engineering calculations.

c) It is a markup language used for describing Web pages.

d) It is an object-oriented language that provides platform-independent portability.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a markup language with the purpose of displaying and printing a screen, it is
possible to directly embed not only the body of a document but also various types of
specifications, such as the structure and layout of the document, and also the font and
size of the character. Which of the following is classified as such a markup language?

a) CASL

b) HTML

c) SQL

d) URL

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q10. Which of the following is an appropriate combination of words that are inserted into
blanks A and B in the description below concerning the execution sequence of
instructions in a computer?
In a computer, the instructions are executed in the sequence shown below.
(1) Refer to the program counter.
(2) the instruction.
(3) Set the program counter to the main memory address of the next instruction.
(4) the instruction.
(5) Execute the process corresponding to the instruction.
(6) Return to (1).

A B
a) Decode Read

b) Read Decode

c) Read Write

d) Write Decode

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the most appropriate explanation of a DVD drive that is used
as an auxiliary storage device for a PC?

a) A laser beam is used for reading data, and magnetism is used for writing data.

b) It cannot be installed in a notebook PC because of its heat release and physical size.

c) It cannot read a CD-ROM disc because of the nature of the recording method.

d) Several types of media, such as DVD-R, DVD-RW, and DVD-RAM, can be used.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an appropriate description concerning a touch panel?

a) Operations are performed by using a pen-type or mouse-type device for specifying a
position on the screen, and a flat-plate input device for detecting the position.

b) Operations of a mouse pointer on the screen or other functions are performed by
tracing a flat-panel input device with a finger.

c) The movement of a finger is detected by a sensor on the surface, and operations are
performed by rotating a component called a wheel that is similar to a disc.

d) There are some methods such as electronic or electrostatic techniques, and
operations are performed through direct contact with the screen by using a finger.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a client/server system, which of the following is the most appropriate system that
manages both application software and data on the server side in a centralized manner
and has only the minimum required functions on the client side?

a) Distributed processing system

b) Interactive processing system

c) Rich client system

d) Thin client system

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an explanation of a dual system?

a) It is a computer system in which exactly the same processing is performed in two
computers, and its reliability is assured by cross-checking the results.

b) It is a computer system that is composed of a primary system used usually and a
secondary system kept on standby in preparation for a failure.

c) It is a distributed processing system in which the computers in a group connected via
a network have an equivalent relationship.

d) It is a distributed processing system that provides a clear hierarchical relation to the
computers in a group connected via a network.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The types of programs that are executed at the startup time of a PC are generally
classified into three categories: BIOS, OS, and resident applications. Which of the
following is the list that is arranged in the sequence of the execution of the programs?

a) BIOS → OS → Resident applications

b) OS → BIOS → Resident applications

c) OS → Resident applications → BIOS

d) Resident applications → BIOS → OS

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an appropriate explanation of plug-in software?

a) Plug-in software bridges differences between OSs, and provides more advanced and
specific functions than the OSs.

b) Plug-in software does not work as a standalone program, but can be integrated into
applications, such as a Web browser, to enhance their functions.

c) Plug-in software is often included in applications such as a spreadsheet, and allows
the users to record and replay the series of operations performed.

d) Plug-in software is provided to replace part of a program for the purpose of
modifying functions or fixing bugs.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an appropriate explanation of multitasking?

a) Several computers connected via a network build a system that works together to
achieve a high-performance system.

b) Several processor cores composed of arithmetic circuits and other control circuits
are implemented in a single CPU.

c) The CPU processing time is allocated to several processes in a sequence so that the
processes can be executed concurrently.

d) The same processing is performed for multiple data items by executing a single
instruction.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q18. Which of the following is the appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?

A: It is the directory at the topmost level of the hierarchy.
B: It shows all paths starting from the topmost directory of the hierarchy down to the
target file or directory according to the directory structure.
C: It is the directory that is currently being manipulated.
D: It shows all paths starting from the directory that is currently manipulated through
the target file or directory according to the directory structure.

Current directory | Absolute path | Root directory
a) A B C
b) A D C
c) C B A
d) C D A

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an appropriate description concerning the characteristics of
an interpreter-based program?

a) It can be used for batch processing, but cannot be used for interactive processing or
real-time processing.

b) It generally runs faster than a compiled program, and is suitable for a large-scale
program.

c) It takes a long runtime because the program is translated and executed on a
line-by-line basis.

d) The generated object program has a tendency to be larger than a program generated
by a compiler.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the reason why it is better to store a file in contiguous area
on a hard disk?

a) Because of less movement of the magnetic head, it takes less time to read data
continuously.

b) Since fewer areas are needed to store the management information of files, the user
can use more areas.

c) Since no area where data is not stored is required in the hard disk, all the areas can
be used.

d) The number of read errors can be decreased in comparison with a file that is stored
in fragmented areas.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an appropriate description concerning a pull-down menu that
is used as a user interface on a PC?

a) A list of the options is displayed when a title is clicked, and then an item from the
list can be selected.

b) All the necessary items can be selected from among the several options displayed on
the screen.

c) During keyboard input, subsequent input is anticipated and displayed on the basis of
the past input history.

d) It can be used for displaying error messages or entering the small amount of data on
the screen.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a technique that can provide accessible links between
information items represented in text, still images, video, voice, music, or other forms
so that related information can be easily reached by jumping from one place to another
in documents or Web pages?

a) Cyberspace

b) Groupware

c) GUI

d) Hypermedia

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Q23. Employee information is managed by creating two tables “Emp” for employees and
“Dept” for Departments in a relational database. Which of the following is an
appropriate combination of the primary key(s) and foreign key(s) that are set in the
“Emp” table and the “Dept” table as needed? Here, any employee always belongs to
a department that exists in the “Dept” table, and when the employee data is added or
updated, the referential constraints are used to ensure consistency.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Q24. There are three tables “Supplier” table, “Purchase_details” table, and “Product” table
that are managed by using a relational database. When a new product is purchased
from a new supplier, which of the following is the appropriate sequence of inserting
data into the tables? Here, an underline indicates a primary key, and a dotted
underline indicates a foreign key. An arrow (→) in the answer group represents the
sequence of the tables into which data is inserted.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Q25. Which of the following is the combination of conditions that can retrieve only three
employees including “Tom Cruise” from the “Employee” table managed in a relational
database?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is an appropriate explanation of a commercial database
service?

a) Databases created by users are managed on behalf of the users in order to release
information to the public.

b) Information collected only from the commercial field is published free of charge in
the form of a database.

c) Information is provided for profit by creating a database of information collected in
a specific field.

d) Professional advice is provided on various issues that occur when a database is
designed and built.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is a protocol that enables a client to download an e-mail that
has arrived at the mailbox of a remote server?

a) DNS

b) HTTP

c) POP3

d) SMTP

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is an appropriate explanation concerning URL?

a) It is a communications protocol between a Web page and a browser.

b) It is a message about the update history of a Web page.

c) It is a notation for representing the location of a Web page.

d) It is grammar for describing the content (i.e., body) of a Web page.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is an appropriate description concerning a virus check for an
e-mail?

a) A virus check does not need to be performed if the e-mail is encrypted.

b) A virus check is not required for the received e-mail if it is inspected by the sender.

c) A virus check is performed even if the attached file has a file extension of “jpg”.

d) A virus check is performed only for the e-mail sent by an unknown sender

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is an appropriate description concerning the characteristics of
cross site scripting?

a) It is an attack by which data being considered too long is sent to an application on a
Web site where the length of input data is not checked.

b) It is an attack that illegally uses the function of recording, invoking, and executing
the operating procedures of word processing software or spreadsheet software.

c) It is an attack that intrudes into a computer under the disguise of a useful program so
that a user installs it unsuspectingly.

d) It is an attack that uses a vulnerability, whereby a malicious script included in the
data entered on a Web site is sent to a Web browser as it is.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Q31. Items A through C below are explanations about information security incidents.
Which of the following is an appropriate combination of the three major elements of
information security that is directly related to items A throughC?
A: The necessary information cannot be accessed because of a system failure.
B: The important customer information is leaked to competitors.
C: The design information of a new product is falsified.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is an appropriate explanation of a DoS attack?

a) It refers to interrupting a network service by sending a large number of requests.

b) It refers to spying on the data of other people on a communication path.

c) It refers to trying various combinations of letters or numbers to unlock an account.

d) It refers to using a service illegally on a network by pretending to be another person.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is an appropriate purpose of using HTTPS for accessing a Web
page?

a) To receive all data of one screen effectively through a single connection

b) To secure communications by authenticating the server and encrypting data

c) To shorten the communication time by compressing data

d) To use a dynamically generated Web page in communications

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When a spam e-mail is received, which of the following is the most appropriate action
that should be avoided?

a) E-mails from the same sender are routed to a spam folder by setting a spam filter.

b) In order to make a complaint against the sender, a reply to the spam e-mail is sent.

c) The e-mail service provider is notified of the transmission of the spam e-mail.

d) The spam e-mail is deleted without opening, viewing, or forwarding.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When the current system is replaced with a new system, the data to be migrated from
the current system to the new system and the resources necessary for the migration are
assembled and organized to create a migration plan. Which of the following is the
most appropriate item to be included in the migration plan?

a) Functional requirements for the new system

b) Operational procedures for the screens and forms provided by the new system

c) Procedure for making a periodical backup copy of data files

d) Schedule and organizational framework for switching to the new system

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is an appropriate explanation and application example of an
E-R diagram?

a) It is a diagram describing the state transition and conditions; for example, it can be
used to describe the specifications of a communication protocol.

b) It is a diagram representing sequence, selection, and iteration structures by
combining them; for example, it can be used to describe the flow of a program.

c) It is a diagram representing the relationships between entities; for example, it can be
used to represent the relationships between the tables of a relational database.

d) It is a diagram showing the sequence of activities and the work period; for example,
it can be used to perform schedule management of system development.

A

c

37
Q

Which of the following is a problem that can be expected to be resolved by replacing
printed manuals with online manuals?

a) Discrepancy between one part of descriptions and another part

b) Incomprehensible key points because of too long text

c) Inconsistency between versions of applications and manuals

d) Poorly-written text because of wrong or omitted letters

A

c

38
Q

It takes about five minutes to search for customer information with the currently-used
system, but this should be completed within one minute with the next version of the
system. Which of the following is an appropriate development phase for setting such
an objective?

a) Software acceptance

b) System design

c) System requirements definition

d) System test

A

c

39
Q

In system development, which of the following is an activity that is performed after
software detailed design?

a) Programming

b) Software architecture design

c) Software outline design

d) Software requirements definition

A

a

40
Q

In system analysis and design, which of the following is described by using DFD?

a) Flow of data

b) Layout of items on a data entry screen

c) Procedure of a program

d) Physical structure of a database

A

a

41
Q

Among the test techniques to verify the quality of a program, which of the following is
a test technique that is used for analyzing the internal structure of the program and then
creating the test cases?

a) Black box test

b) Bottom-up test

c) Top-down test

d) White box test

A

d

42
Q

When system development progresses in the sequence of system requirements
definition, external design, internal design, and programming, which of the following is
the most appropriate phase for defining the layout of screens and the format of forms?

a) External design

b) Internal design

c) Programming

d) System requirements definition

A

a

43
Q

Which of the following is defined by “ISO/IEC 12207:2008 Systems and software
engineering – Software life cycle processes”?

a) A common framework for both contracting parties to visualize software-oriented
system development and transactions

b) A control level for project management (e.g., schedule management or process
management) that is effective for developing packages

c) A method for describing the content, format, and writing style of a contract
concerning software development and transactions

d) A specific method for evaluating deliverables, quality of processes, delivery date,
and productivity concerning system development

A

a

44
Q

Which of the following is the most appropriate description concerning the role of the
user department in large-scale system development?

a) The manager of the user department makes efforts to convince the development
department to accept implementing the functions requested by the user department
regardless of the investment effects on the installed system.

b) The user department checks the deliverables from the perspective of business
operations, but the detailed program design is left to the discretion of the
development department.

c) The user department is the party who uses the system built by the development
department, so all decisions regarding system development are left to the discretion
of the development department.

d) The user department needs to provide various suggestions, so its staff members with
computer skills should be preferentially involved even if they do not have sufficient
knowledge of the business operations.

A

b

45
Q

Which of the following is a chart or a diagram that is illustrated in length proportional
to the time period required for each activity, with time on the horizontal axis and
activities on the vertical axis?

a) Arrow diagram

b) E-R diagram

c) Gantt chart

d) Pareto chart

A

c

46
Q

When a project manager makes a plan for the schedule, cost, and quality of a project,
which of the following is the activity that should be performed first?

a) Defining the specifications of deliverables to be created in the project and the
activities to be performed for completing the deliverables

b) Identifying the activity path that requires the longest time period to complete the
entire project

c) Measuring the effects of countermeasures against uncertain events affecting the
objectives of the project positively or negatively

d) Reporting the actual results of the project to concerned parties who are affected
positively or negatively by the implementation and results of the project

A

a

47
Q

At the request of a user department, the development department launches a project of
system development. Which of the following is the most appropriate role of the
project manager?

a) Monitoring the progress to take preventive measures against problems

b) Preparing a proposal for the project on behalf of the user department

c) Presenting the requirements of the system to the user department

d) Raising funds to carry out the project on behalf of both departments

A

a

48
Q

Q48.) The risk response planning of a project starting in April of year X, which is the next
fiscal year, is being considered. When the four risks described in the table below are
assumed, which of the following is the risk that is expected to have the highest priority
for taking action? Here, the priority is determined in consideration of the probability
of occurrence and the extent of impact of the risk, and if the priority is the same, the
risk with the closer deadline is handled as soon as possible

A
49
Q

When the allocation of human resources in a project is compiled into a plan document,
which of the following is the most appropriate description concerning the items that
should be taken into consideration?

a) A shortage of members during the project period is not taken into consideration
because the purpose is to allocate sufficient members at the beginning of the project.

b) All project members should be able to clearly understand their individual missions,
roles, and responsibilities.

c) The limit of the working time of each project member is not taken into consideration
because the success of the project is the most important factor.

d) The total working hours of each project member should be the same throughout the
entire period of the project.

A

b

50
Q

Among the change items A through C concerning a project, which of the following is
the list containing all items that are subject to “change management” within the project
scope?

A: A change in related laws concerning the requirements occurring within the project
B: A change in customer requirements
C: A change in the affiliated department name of a project member

a) A

b) A, B

c) A, B, C

d) B, C

A

b

51
Q

Q51. The figure below shows the “service profit chain” developed by James L. Heskett.
Among the items to be inserted into blanks A through D, which of the following is the
appropriate item to be inserted into blank C?

A
52
Q

The service provider of a Web portal system to which functions are added as necessary
creates a catalog so that users can have a look at available IT services. Which of the
following is an appropriate description concerning the content of the catalog?

a) In order to reduce any extra cost of maintenance, the catalog should be updated
collectively once a year.

b) Technical terms should be used to ensure the accuracy of description even if it is
difficult for general users to understand them.

c) The catalog should be created in a format that is easy to explain from the standpoint
of the service provider.

d) The content of each service should be easy to understand even if a user does not
have sufficient knowledge of IT.

A

d

53
Q

Among the policies of facility management concerning an information system in a
BCP (Business Continuation Plan), which of the following is the policy that is based
on the assumption that a data center stops for a long period of time because of a huge
earthquake?

a) A backup center for periodic synchronization of the data is located at a remote site.

b) A UPS is connected to the servers as a backup power-supply in the data center.

c) The servers are installed on an upper floor in preparation for a tsunami.

d) The various types of redundant equipment or devices are installed in the data center.

A

a

54
Q

Which of the following is an appropriate description concerning the content of system
auditing?

a) An independent third party evaluates whether the risks of an information system are
appropriately controlled or not.

b) The person who is responsible for quality management establishes and operates a
quality management system based on 1SO 9001.

c) The persons in charge of development conduct a test for the content of a system that
they have developed.

d) The system administrators verify the security holes of a system on their own by
using a specially-designed software tool.

A

a

55
Q

Which of the following is an appropriate segregation of duties in view of internal
control?

a) A single activity is performed by several persons on the basis of division of labor.

b) The managers give authority to their subordinates because of long absence.

c) The remaining activity of a person on an early shift is transferred to another person.

d) The rules are set forth so as not to be approved by the applicants themselves.

A

d

56
Q

A company monitors and manages business operations by establishing standards and
operational procedures to prevent unlawful or unjustifiable acts, mistakes, errors, and
other problems, and to ensure that the organization is run healthy, effectively, and
efficiently. Which of the following is the most appropriate term that represents this
policy or mechanism?

a) Information ethics

b) Internal control

c) IT governance

d) Privacy protection

A

b

57
Q

Which of the following is a mechanism by which interested parties, such as the
shareholders or investors, supervise and monitor the management of a company
conducted by the management executives and board of directors?

a) Compliance

b) Corporate governance

c) Risk management

d) TOB

A

b

58
Q

Q58. )
Which of the following is an appropriate graph or diagram that is suitable for
comparing the value of shipped industrial products by industry in the three industrial
zones A, B, and C shown in the table below?

A
59
Q

Which of the following is an appropriate description of how to calculate the sales unit
price for each material by using the moving-average method?

a) For each purchase, the purchased amount is added to the last balance, and then the
result is divided by the total of the remaining quantity and purchased quantity.

b) The purchase amount of each material is recorded for each purchase, and the sales
unit price is equal to the unit price of the first purchased material during the period.

c) The sales unit price is calculated as the average of the unit prices for each of the
purchased materials.

d) The sales unit price is equal to the unit price of the last purchased material during the
period.

A

a

60
Q

Company A manufactures and sells product B. Which of the following is the
appropriate expression for calculating the total cost of product B? Here, the total cost
refers to all the costs incurred until product B is sold.

a) Manufacturing cost of product B + Operating cost of product B

b) Manufacturing cost of product B + Operating profit of product B

c) Sales of product B − Manufacturing cost of product B

d) Sales of product B − Operating cost of product B

A

a

61
Q

Q61. What is the sales amount in thousand dollars at the break-even point that is calculated
on the basis of the income statement shown below?

Unit: thousand dollars
Sales 4,000
Variable manufacturing cost 1,400
Variable selling cost 600
Fixed cost 800

a) 1,200

b) 1,231

c) 1,600

d) 2,154

A

c

62
Q

Which of the following is the right that belongs to a purchaser of a PC software
package provided by means of CD-ROM?

a) Copyright of the CD-ROM storing the program

b) Copyright of the program stored in the CD-ROM

c) Design right of the CD-ROM storing the program

d) Right to use the program stored in the CD-ROM

A

d

63
Q

When a business operator handling personal information conducts a questionnaire
survey regarding its service and asks respondents to fill in their addresses and names,
which of the following is an action that violates the OECD guidelines (i.e.,
Recommendation of the Council concerning Guidelines governing the Protection of
Privacy and Transborder Flows of Personal Data)?

a) Applying the same rules that are adopted for a paper-based questionnaire even when
the questionnaire survey is conducted via a browser screen

b) Indicating the usage purposes of both the questionnaire and its response in the
questionnaire form

c) Sending invitations to a launch event for a new product to respondents by mail
without mentioning any advance notice at the time of the survey

d) Taking measures to increase the response rate, such as offering special gifts to
respondents of the questionnaire

A

c

64
Q

Q64. )
Two control charts below show the quality characteristics of products manufactured by
Line A and Line B in the factory for each day of manufacture. Which of the following
is an appropriate response or reaction to Line A or Line B or both?

A
65
Q

Which of the following is a formula that can be used to calculate operating profit?

a) Sales amount − sales cost

b) Sales amount − (sales cost + selling, general, and administrative expense)

c) Sales amount − (sales cost + selling, general, and administrative expense)
+ non-operating income − non-operating expense

d) Sales amount − (sales cost + selling, general, and administrative expense)
+ non-operating profit and loss + extraordinary profit and loss

A

b

66
Q

Which of the following is the coding scheme that can encode a large amount of
information into a small area and has an error correction function that enables the code
to be read out correctly even when the code cannot be partially read out?

a) ISBN code

b) ITF code

c) QR code

d) Unicode

A

c

67
Q

Q67. )
Which of the following is an appropriate combination of the standards and their
applicable fields?

A
68
Q

Q68.)
Which of the following is an appropriate combination of terms to be inserted into
blanks A and B in the description below concerning PPM (Product Portfolio
Management)?
A is a group of products that create a profit with a little investment. In
contrast, B is a group of products that require an investment of more than
the fixed amount for potential future growth.

A
69
Q

Which of the following is an appropriate explanation of SWOT analysis?

a) It is a technique for deriving the future direction of corporate activities by analyzing
opportunities and threats underlying in the external environment surrounding the
company, and the strengths and weaknesses of the company.

b) It is a technique for designing a company’s own activities from the viewpoint of
what kind of value the activities finally generate for customers and whether this
satisfies the customers.

c) It is a technique for evaluating and analyzing the business performance of a
company in a well-balanced manner, from the perspectives of financial, customer,
internal business process, and learning and growth.

d) It is a technique for plotting a business on a matrix created by the two quantitative
items of market growth rate and market share, and then optimizing the allocation of
management resources.

A

a

70
Q

Strategies for promotion, which is known as one of the 4Ps of the marketing mix,
include the push strategy and the pull strategy. Among the sales promotion plans of
the manufacturer, which of the following is considered as the pull strategy?

a) Dispatching salespersons to a shop in order to sell products over the counter

b) Enhancing the training of salespersons concerning product knowledge and sales talk

c) Increasing sales incentives that are paid according to the sales amount or volume

d) Introducing advertisements that aim to draw customers to sales outlets

A

d

71
Q

Companies are classified into four different types: leader, challenger, follower, and
nicher on the basis of competitive position in the market. Which of the following is
the most appropriate characteristic of the strategy of a challenger?

a) A new product and its usage method are proposed to the consumer to expand the
market size, and at the same time, the product lineup is expanded and market share
is maintained or expanded.

b) A specific market that is not targeted by a high-ranking company is captured.
Limited management resources are concentrated, and predominance in the market is
secured and maintained.

c) Measures are taken for capturing regions and fields where leader companies do not
take a strength. There may be confrontation with leader companies, whereas there
may be a case where the market share of a low-ranking company is stolen.

d) The real ability of the challenger company in the market is determined, and priority
is given to securing stable profits rather than market share by doing as the leader
company does.

A

c

72
Q

In value engineering, which of the following is the combination of two elements that
define value?

a) Fixed cost and variable cost

b) Functions and cost

c) Gross profit and sales cost

d) Plans and results

A

b

73
Q

“The establishment of a satisfactory relationship with customers and acquisition of
excellent customers who bring about long-term profits” is set as a goal based on
business strategy. Which of the following is an appropriate system to be constructed
for supporting the achievement of this goal?

a) CRM system

b) MRP system

c) POS system

d) SCM system

A

a

74
Q

Q74.)
When some activities for planning a technology development strategy are performed in
the order of (1) through (5), which of the following is applicable to blank A?

A
75
Q

Which of the following is the most appropriate explanation of BTO that is used for the
production of PCs?

a) Each product is assembled by only one worker.

b) The products are manufactured with the minimum possible inventory between the
production processes by procuring the required amount of raw materials and
components at the required time.

c) The products are stocked as components rather than finished products, and
assembled after receiving an order from the customer, according to the details of the
order.

d) The products showing a company’s own logo are assembled by another company.

A

c

76
Q

Which of the following is a technique for achieving effective business operations by
managing and optimizing a company’s management resources in an integrated
manner?

a) BPR

b) ERP

c) RFP

d) SLA

A

b

77
Q

Which of the following is a situation that is suitable for using CAM as an engineering
system?

a) Creation of a design drawing for an industrial product or a building

b) Creation of a monthly production plan

c) Creation of a plan for the order quantity of each component required for production

d) Generation of the processed data used for controlling a machine tool

A

d

78
Q

A factory is engaged in assembly production of product P that consists of components
A and B. The processing of component A requires component C, and the processing
period is one week. The delivery lead times of purchased components B and C are
two weeks and three weeks, respectively. Product P can be assembled in one week
only after components A and B are both delivered. What is the minimum number of
weeks required to produce one unit of product P, including the delivery periods of the
components? Here, there is no stock of any of the components.

a) 4

b) 5

c) 6

d) 7

A

b

79
Q

Which of the following is classified as a “B to E” transaction?

a) A company provides services, such as welfare and education for the company’s own
employees, through the Internet.

b) A travel company uses the Internet to give campaign information and sell tickets to
consumers by subscription.

c) An automobile manufacturer uses the Internet to procure components and materials
from vendors across the world.

d) In an auction held on the Internet, a participant buys a product from another
participant.

A

a

80
Q

Which of the following is an appropriate explanation of EDI?

a) A communication service that provides added values such as storage of data
transmitted over the network and conversion of data formats

b) An international standard for e-mail services, which is based on the OSI basic
reference model, and provides general services for the generation, transmission, and
processing of messages

c) An ordering system that enables orders to be placed by transmitting order
information from a data entry terminal to the head office or a supplier

d) The exchange of business transaction data between computers (including terminals)
over a network in accordance with standard protocols

A

d

81
Q

Which of the following is an appropriate general term for computers that are embedded
in home electric appliances, such as a microwave oven or a rice cooker?

a) Handheld computer

b) Micro computer

c) Mini computer

d) Mobile computer

A

b

82
Q

In the course of the planning of an information systems strategy, which of the
following should be performed when the policies and objectives for optimization of the
overall information system are set?

a) Analyzing risks resulting from the installation of the information system

b) Clarifying the skills of the staff members that are necessary for development

c) Taking into consideration the consistency with the business strategy

d) Verifying the conformity of user needs to the software package

A

c

83
Q

Which of the following is a term that means that the development and operation of a
system is farmed out to an overseas company or an overseas subsidiary?

a) Hosting

b) Offshore outsourcing

c) Onshore outsourcing

d) System integration

A

b

84
Q

A company is aiming to analyze the data that is accumulated in an information system
and use such data in business operations. However, progress is not made because of
the insufficient experience of employees. Which of the following is the most
appropriate activity that should be performed with higher priority in order to achieve
the objective?

a) Improving the performance of software used for analysis

b) Installing a high-performance PC for analysis in each department

c) Providing typical examples of analysis and templates for analysis

d) Speeding up the provision of data that can be used for analysis

A

c

85
Q

Which of the following is an appropriate approver for the optimization plan of the
overall information system of a company?

a) Chief Information Officer

b) Head of the business operations department handling the mission-critical system

c) Head of the department where RFP is created

d) System development project manager

A

a

86
Q

When the software life cycle is classified into the processes of planning, requirements
definition, development, and operations, which of the following is an item that should
be clarified in the requirements definition process?

a) The function and capability of each software configuration item

b) The needs and wants of the stakeholders

c) The purpose of developing a system

d) The structure of the database

A

b

87
Q

Which of the following is an explanation of “acceptance inspection” performed for a
vendor?

a) Checking the estimate submitted by the vendor prior to placing an order based on
that estimate

b) Checking whether the deliverables provided by the vendor conform to the
requirements specifications

c) Requesting the vendor to provide information for the purpose of collecting
information

d) Requesting the vendor to study and submit the proposal for the construction of a new
system

A

b

88
Q

When the initial investment in the development of a new system is 240,000 dollars, the
monetary effect after full operation is 10,000 dollars per month, the system operation
cost is 2,000 dollars per month, and the annual system maintenance cost is 15% of the
initial investment, how many years does it take to recover the investment? Here,
other factors such as the cost of interest can be ignored.

a) 2

b) 2.5

c) 2.9

d) 4

A

d