April 2021 Flashcards

1
Q

Q1. A search is performed by specifying a character string comprised of multiple alphabetic characters and one delimiter character “.” (period). An “*” (asterisk) represents an
arbitrary character string with zero or more characters, and a “?” (question mark)
represents an arbitrary single character.

Which of the following character strings matches the character string represented below?

X*.Y??

a) XY.XYY

b) XXX.YY

c) XYX.YXY

d) YXYX.YXY

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2. Which of the following is a search condition for the black area of the Venn diagram
shown below?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is obtained by multiplying the binary value 10110 by three (3)?

a) 111010

b) 111110

c) 1000010

d) 10110000

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded
data. When the same sound source is sampled at the same sampling frequency and then
encoded as a series of 16-bit data in lieu of 8-bit data, which of the following is an
appropriate description concerning this encoding?

a) The amplitude of the sound can be recorded more finely.

b) When the recording time is the same, the amount of data becomes smaller.

c) The CPU load required to process the recorded data decreases.

d) The upper limit of the frequency that can be recorded becomes higher.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

There is a program that displays text in accordance with the specifications below. When
the original text described below is displayed, in what point size does the program
display the underlined character string? Here, the first character of the original text is
displayed in 10 points.

[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.

[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>

<S>group-level</S>

computerization</B> from a user’s <S>standpoint</S>.</B>

a) 10

b) 11

c) 12

d) 13

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6. Among the program control structures, which of the following is classified as a “whiletype” loop structure?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q7. A stack is a first-in last-out data structure. By using the stack, a device changes the order
of data received from the right side and sends it to the left side, as shown in the figure
below. There are three types of operations available on the device, as described below.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Among the items A through C described below about programming languages, which of the following is the list that contains all of the appropriate items?

A: A program that is created using a machine language or an assembly language can
be executed without relying on a particular CPU.

B: A program that is converted using a compiler is finally translated into a machine
language and then executed.

C: A high-level programming language with rules similar to human languages makes
it possible to develop programs with complex calculations that cannot be executed
using a machine language.

a) A

b) A, C

c) B

d) B, C

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There is a desk that can hold at most four (4) files. On this desk, six (6) files A through
F are used for a job. When the fifth file needs to be put on the desk, the file with the
longest time since the last use among the four (4) will be put in a drawer. If the files
are put on the desk and referenced in order of A, B, C, D, E, C, B, D, F, B, which of
the following is the last file to be put in the drawer?

a) A

b) B

c) D

d) E

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the most appropriate description concerning a multi-core
processor?

a) Several microprocessors are installed in one PC with the purpose of improving the
reliability of the processing results by performing the same processing at the same
time in each processor.

b) If the structure and clock frequency of the arithmetic logical unit are the same, a quad core processor has four times as much processing power as a dual core processor.

c) The clock frequency is temporarily increased according to the load of the processing so as to achieve high-speed processing.

d) A single CPU has several processing circuits that perform operations, and each
processing circuit performs different processing at the same time with the purpose of
improving the processing power.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate explanation of a hot plug?

a) It is a function that enables attachment or detachment of a peripheral device while PC
power remains on.

b) It is software that is installed afterwards in order to enhance the functions of application software.

c) It is a mechanism of supplying power from a PC to a peripheral device via a cable
connected to the peripheral device.

d) It is a technique of executing a specific program and evaluating system performance
on the basis of the time taken for the processing.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an appropriate explanation of GPU?

a) It is an index that shows the throughput of a CPU in terms of how many billions of
instructions it can execute per second.

b) It is a frequency signal that synchronizes the arithmetic processing of CPUs.

c) It is a storage unit that is placed between a CPU and a main memory, and has a
higher reading and writing speed than the main storage unit.

d) It is an arithmetic logical unit that is used instead of a CPU to accelerate processing
such as image processing for 3D graphics.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an appropriate description concerning CPU performance?

a) Compared with a 64-bit CPU, a 32-bit CPU is able to process a longer data at one
time.

b) The less the capacity of cache memory in the CPU, the faster the processing speed.

c) For a CPU of a given architecture, raising the clock frequency increases processing
speed.

d) A dual core CPU can perform a greater number of processes simultaneously than a
quad core CPU can.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When the processing speed of the system overall is constrained because of slow
processing speed in one of the components, which of the following is a term for the
component of a system that is causing the problem?

a) Throughput

b) Defragmentation

c) Flowchart

d) Bottleneck

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an appropriate characteristic of a dual system?

a) It provides two (2) sets of systems that perform the same processing and checks the
correctness of the processing by comparing the results. If one of the systems fails, it
isolates the failed system and continues the processing.

b) The same two (2) devices are used, so that the processing capability can be increased
to double that of a simplex system.

c) It provides a currently used system for performing online processing and also a
backup system that is made on standby while performing batch processing. In the event of a failure in the currently used system, it switches to the backup system, starts
the online processing on it, and continues the service.

d) It connects multiple devices in series and configures them in such a way that the load
of each function is distributed among them, so that processing capability is high. But if any one of the devices fails, it becomes unable to provide the service.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an appropriate explanation of parallel processing?

a) It is the division of a series of processing into processing units that can be executed
simultaneously, and the execution of these on multiple CPUs.

b) It is the execution of multiple related processes that are grouped together as a single
process.

c) It is the performing of business logic and database processes on the server side, and the performing of user interface processes on the client side.

d) It is the division of processing time for a single CPU into short units, and the sequential allocation of these to multiple applications for execution.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a purpose of the virtual memory system that is one of the
functions provided by an OS?

a) To prevent an application program from accessing the protected area on main memory used by the OS

b) To reduce electricity consumption during the idle state, by stopping the power supply after data is written from main memory to external storage

c) To make it possible to execute a program even if the program requires more storage
capacity than main memory

d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an appropriate explanation of the virtualization of a server?

a) It is a technique for virtually creating computer-generated worlds or immersive
environments that users can interact with.

b) It is a technique for virtually operating the GUI of a remote computer connected via a
network by using a local computer.

c) It is a technique for virtually implementing and operating two or more computers on
a single computer.

d) It is a technique for virtually allocating more memory space than the capacity of main
memory by using a particular part of auxiliary storage.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q19. Which of the following is an appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is an appropriate description concerning the use of OSS (Open Source Software)?

a) OSS users have an obligation to pay the developer the fee for the software.

b) OSS users are allowed neither to sell the OSS nor to distribute it at no fee.

c) OSS cannot be used in the field of genetic research.

d) Software derived from the published OSS can be made available as OSS.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an appropriate explanation concerning a deadlock?

a) It is a state in which the processes of a computer are prohibited from getting intentional or accidental access to information that usually must not be accessed.

b) It is a state in which, if the authentication of a user fails more than the limited number
of times, the user is prohibited from accessing the computer.

c) It is a state in which, when shared resources are exclusively used, two or more
processes are endlessly waiting for each other to release the lock of a shared resource.

d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

There is a system where a full backup is made after closing time every Sunday, and an
incremental backup is made after closing time on Monday through Saturday. On a
Wednesday, a failure happened during business hours, so a decision was made to restore
data to the state at the time of closing on Tuesday by using backup files. Which of the
following lists all the necessary backup files for restoring data? Here, an incremental
backup file means a backup file that contains only the data that has been modified since
the previous backup file (a full backup file or an incremental backup file) was made.

a) A full backup file on Sunday, incremental backup files on Monday and Tuesday

b) A full backup file on Sunday, an incremental backup file on Tuesday

c) Incremental backup files on Monday and Tuesday

d) An incremental backup file on Tuesday

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of the following can occur?

a) Viruses cannot be detected.

b) Data cannot be written correctly.

c) Data cannot be read correctly.

d) Stored data cannot be read quickly.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is an appropriate concept of universal design?

a) Ensuring that, once a product is designed, the design remains usable without being
changed for a long period of time

b) Ensuring that products keep the same levels of performance and quality regardless of
where they are manufactured in the world

c) Making the design as simple and easy as possible in order to reduce the manufacturing
cost

d) Making products usable to many people regardless of differences in age, culture, and
ability as well as whether disability is present

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is an appropriate description concerning the characteristics of video distribution using streaming?

a) The data to be distributed must be stored on the server beforehand, and videos of
events and sports cannot be distributed while they are being shot.

b) Deterioration in video quality due to partial loss of data in reception can be completely
eliminated.

c) Warm-up time is not required for starting playback of a video, and therefore, the
viewer can immediately start watching the video.

d) Rather than waiting for the entire video data to be downloaded, playback starts as
soon as some data has been received.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In DBMS, which of the following is a function for maintaining consistency of data by
preventing the occurrence of conflicts due to simultaneous access to the data?

a) Normalization

b) Deadlock

c) Exclusive control

d) Restore

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an appropriate description concerning foreign keys in a
relational database?

a) A property held by the foreign key is called a unique constraint.

b) Duplicate values cannot be set in the fields that are set as foreign keys.

c) Multiple foreign keys can be defined in a single table.

d) Multiple fields cannot be collectively set as a single foreign key.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Q28. The result of the Information-Technology Engineers Examination by some of the
employees of a company is shown below. In order to manage this table with a relational
database, which of the following is an appropriate method to partition the table into two
(2) tables? Here, this company has employees with the same name.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Q29. In a relational database, when (A B) and (A B) are performed on table A and
table B shown below, which of the following is an appropriate combination of the
resulting two tables among the three tables P, Q, and R? Here, (A B) shows the
union of A and B, and (A B) shows the intersection of A and B.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Q30. Three PCs and an Internet-capable TV (television) set are to be connected to the Internet
by using a hub and a router that has a firewall function. Which of the following is an
appropriate connection that enables the firewall function of the router to be used for all
the traffic between the devices and the Internet? Here, “FW” in the figure indicates the
firewall function.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is an appropriate effect of replacing IPv4 with IPv6?

a) Problems no longer occur when two or more devices that can be accessed directly
from the Internet have the same IP address.

b) The shortage of IP addresses that can be used on the Internet is resolved.

c) It becomes possible to use optical fibers for connecting to the Internet.

d) The communication speed on the Internet is increased.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is a mechanism by which, if an e-mail is sent to a specific e-mail
address, the e-mail with the same content is distributed to multiple e-mail addresses that
have been registered to the specific address?

a) Web mail

b) Chain mail

c) Mailing list

d) Reply mail

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Mr. A specifies the destinations for an e-mail as below and sends it. Mr. Y receives this
e-mail, and sends a reply to all the recipients and the sender listed in the received e-mail.
Among Mr. A, Mr. X, and Mr. Z, which of the following is the list that includes all and
only the destinations of the e-mail that Mr. Y sends?

[Destinations specified for Mr. A’s e-mail]

To: X
CC: Y
BCC: Z

a) A

b) A, X

c) A, X, Z

d) X, Z

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is the most appropriate explanation of a WAN?

a) It is a virtual private network that uses the Internet.

b) It is a network that connects countries, rather than a network that connects various
regions within a country.

c) It is a network that uses a network service from a network operator for connecting
geographically separated locations, for example, a head office and branch offices.

d) It is a brand name that is granted only to devices where interconnectivity has been
confirmed, by the industrial association that promotes products that support the IEEE
802.11 standard for wireless LANs.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is an appropriate example of biometric authentication?

a) Authentication by drawing a line connecting some of the nine (9) dots displayed on a
screen

b) Authentication by a password and a user ID that is unique for each individual

c) Authentication by recognizing the shape of a signature, the stroke order and pen
pressure used in signing, etc. using a reader device

d) Authentication by selecting, from among multiple illustrations, a combination of
illustrations that the user memorizes

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Q36. The authentication technology is classified into three (3) types, namely authentication
based on one’s possession, authentication based on physical characteristics, and
authentication based on one’s memory. Which of the following is an appropriate
combination of the implementation examples (1) through (3) and their classifications?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is appropriate as the characteristic of single sign-on?

a) It is an effective countermeasure for information leakage because data is processed and stored on a server side, and data does not remain on devices.

b) It implements high availability because when the data is saved, it is automatically
distributed and stored on multiple disks.

c) It implements high confidentiality because it employs authentication that uses fingerprint and iris in addition to a password.

d) It implements high convenience because once a user is authenticated, he or she is allowed to use multiple services without any more authentication.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Among descriptions A through D concerning how to conduct information security
education to employees, which of the following contains all and only the appropriate
descriptions?

A The re-education of one who has committed an information security breach includes
preventive actions to avoid the same fault being repeated again.

B One way to conduct it is to incorporate it in a training program for new employees.

C It is restricted to employees in the information systems department.

D It is conducted after an incident or an accident concerning information security as well as on a regular basis.

a) A, B, D

b) A, C, D

c) A, D

d) B, C

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When information security measures are grouped into three (3) categories of technical
security measures, human security measures, and physical security measures, which of
the following is an appropriate example of physical security measures?

a) Making a non-disclosure agreement with employees

b) Attaching a digital signature to an e-mail when it is sent

c) Storing a notebook PC in a place that can be locked

d) Recommending password change on a regular basis

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is an authentication method where a user uses information that
differs each time and is generated with a device called a token or other such device?

a) Digital signature

b) Password cracking

c) Password policy

d) One time password

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is a technique for taking advantage of psychological weaknesses
or carelessness in order to, for example, improperly obtain confidential information?

a) DoS attack

b) SQL injection

c) Social engineering

d) Buffer overflow

A

c

42
Q

Which of the following is a term for software that encrypts files on a computer in order
to make them unusable, and demands money or other valuables in exchange for the
decryption key?

a) Keylogger

b) Ransomware

c) Rootkit

d) Worm

A

b

43
Q

Which of the following is an appropriate description concerning password management?

a) A password that is used for a business system should not be used for any private
Internet services.

b) The initial password should not be changed until a user becomes familiar with the
operation of login to the system.

c) Several passwords should be prepared and used in rotation.

d) A password should be stored in a plaintext file and saved on a PC.

A

a

44
Q

Which of the following is an appropriate description concerning a scheme for
authenticating a user of a system?

a) A scheme where authentication is accomplished by utilizing a password that can be used only once is called a single sign-on.

b) A scheme where the use of multiple servers or applications is authorized by being
authenticated once is called a one time password.

c) A scheme where a sequence of numbers or characters that are placed on positions that
the user remembers within a table on the screen is entered as a password is called a
matrix authentication.

d) A scheme where authentication of the user is accomplished by using fingerprints,
voiceprint, or other physical characteristics is called a challenge-response
authentication.

A

c

45
Q

When information is classified and managed according to the protection level in
information security, which of the following lists all and only the appropriate methods
for the management?

I The protection level that is assigned to each piece of information is not changed until
the information is discarded.

II The procedure for handling information is defined for each protection level.

III The protection level for each piece of information is determined on the basis of
standards that the organization establishes.

IV The object that is managed according to the protection level is limited to electronic
data and storage media that store it.

a) I, III

b) I, IV

c) II, III

d) II, IV

A

c

46
Q

A system migration plan was created for the migration from an existing system to a new
system. Which of the following is an appropriate item to be described in the system
migration plan?

a) System selection policy

b) Schedule for parallel operation of the old and new systems

c) Evaluation criteria for the quality of the deliverables

d) The work history of project members

A

b

47
Q

Mr. A, a participant in system testing, has no access to the internal structure of the system
or software and prepares terminal input data and form output data for major transactions in the department for purpose of verification. Which of the following is the testing technique that Mr. A is going to implement?

a) Inspection

b) Walk-through

c) Black-box testing

d) White-box testing

A

c

48
Q

The processes of system development include system requirements definition, systems architecture design, system integration testing, and software acceptance. Which of the following is an activity that is performed in system requirements definition?

a) The party to which development is outsourced uses the software under the same conditions as the actual production environment in order to determine if it runs
correctly.

b) A system test plan is created, and a test environment is prepared.

c) The functions and performance required of the system are clarified.

d) A program is created and test results are reviewed according to the evaluation criteria.

A

c

49
Q

Which of the following corresponds to software maintenance?

a) A response time that was measured in a system test did not satisfy the requirement, so
tuning was performed on the software.

b) As a result of a software acceptance test, a fault was found, so the orderer requested the developer to fix the software.

c) A function was found missing in a unit test of a program, so the function was added
to the program.

d) A defect was reported on software that is running on a production system, so the
software was modified.

A

d

50
Q

When system development is conducted sequentially from upstream to downstream
processes, a significant amount of rework might arise in the test phase that is performed
by the system user. For the purpose of preventing such rework, which of the following
is the method that is used to create trial models in an early stage and clarify user
requirements?

a) Object-oriented approach

b) Spiral model

c) Data oriented approach

d) Prototyping

A

d

51
Q

Among the following lists of descriptions A through D, which is the set that contains all
appropriate descriptions concerning quality management in information systems?

A: Continuous initiatives according to the PDCA cycle are effective in improving quality.

B: The more functions a system has, the higher the quality.

C: The cost of preventing defects is generally less than the cost of correcting them when they are found.

D: Quality can be increased through appropriate design and implementation.

a) A, B, D

b) A, C

c) A, C, D

d) C, D

A

c

52
Q

After the start of a project, the scope is defined by collecting the requirements for the
project. Which of the following is the most appropriate purpose of defining the scope?

a) To clarify the activities to be implemented in the project

b) To create the action plan against the risk that has been realized in the project

c) To create an action plan for the delay of the project

d) To create the objectives of the project

A

a

53
Q

When the system development activities are implemented, a plan is set up to complete
the activities in 20 days by six (6) members having the same productivity. However, the
plan is changed to have the activities finished in 15 days, and new members are added.
When the productivity of the new members is half of the initially planned members, what
is the minimum number of new members necessary for finishing the activities in 15
days?

a) 1

b) 2

c) 4

d) 6

A

c

54
Q

The response measure for risks in a project can be classified as avoidance, mitigation,
acceptance, and transfer. In a system development project, the design and development
process is to be subcontracted to Company A. In a previous system development,
Company A suffered a delay for delivery, so it is also possible that a delay will occur in
this project. Which of the following is a response measure that corresponds to mitigation of the risk of a delay?

a) The inclusion of causal analysis of the previous delay at Company A, and preventive
measures on the basis of this analysis into the development plan

b) Cancellation of subcontracting to Company A

c) Inclusion in the contract of the term of the compensation for damages by Company
A in the event of a delay

d) Inclusion in the project of the cost of measures in response to a delay

A

a

55
Q

In a project where 60 programs are created with a budget of 18 million yen, when the
status of the project was checked 20 days after the start of the project, it was found that
40 out of the 60 programs have been completed at a cost of 15 million yen. If the project
continues to proceed at the same pace, what is the excess of cost over budget? Here, the
scale of all programs and productivity are the same.

a) 3 million yen

b) 4.5 million yen

c) 6 million yen

d) 7.5 million yen

A

b

56
Q

When the management of a project is divided into progress management, quality
management, and cost management, which of the following is most appropriate to be confirmed in progress management?

a) Whether an integration test is conducted exhaustively with a variety of viewpoints

b) The degree that an increase in cost is expected in the future

c) The degree of the impact that is made on the entire schedule by a delay in an activity

d) Whether a procedure has been established for a design review for finding defects in
the design

A

c

57
Q

In an activity that is performed in the planning phase of a project, which of the following
is a method that identifies all of the activities that need to be performed in the project
and organizes them in a hierarchical structure, as well as clarifying the work units to be
managed in the project?

a) CRM

b) ERP

c) PPM

d) WBS

A

d

58
Q

Which of the following is an appropriate explanation of facility management?

a) It refers to the monitoring of compliance with SLAs and their periodical reviewing, for the purpose of maintaining and managing IT service levels.

b) It refers to a method for optimizing ownership, operation, maintenance, etc. of
buildings and physical IT infrastructures from a business standpoint.

c) It refers to the continuous improvement of business processes to increase the quality of products and services.

d) It refers to sharing and managing information across the departments and the
companies that participate in the series of processes from component procurement to
manufacturing, distribution, and sales.

A

b

59
Q

. In release management of IT service management, the items which have been planned
and approved according to the change management are implemented in the production
environment. Which of the following is an appropriate description concerning release
management?

a) Information may be provided after the completion of release to users and operation
managers concerned with changes.

b) During release planning, cases when activities cannot be completed within the planned
time period are also taken into account.

c) Since there is no possibility of new failures after release, it is not necessary to make
preparations.

d) Regardless of the scale of release, the release is implemented simultaneously for all users.

A

b

60
Q

Which of the following is the most appropriate explanation of what a service desk
implements?

a) It eliminates the root cause of an incident and prevents the recurrence of the incident.

b) It installs updated software in order to prevent the recurrence of an incident.

c) It performs centralized management of changes in a service.

d) It receives and records inquiries from users.

A

d

61
Q

In order to provide a service that meets customer needs, which of the following is an
appropriate approach in which an organization performs maintenance, management, and continuous improvement for operation of an information system?

a) IT governance

b) IT service management

c) Service desk

d) Project management

A

b

62
Q

In service level management concerning the degree of customer satisfaction with a
service desk, which of the following is an action that falls under the “A” of the PDCA
cycle?

a) The degree of customer satisfaction is surveyed in accordance with a plan.

b) The method of measurement and the target value for the degree of customer
satisfaction are defined.

c) The variance between the measured value of the degree of customer satisfaction and
its target value is analyzed.

d) Improvement measures are performed on factors that the target is not achieved for.

A

d

63
Q

Which of the following is the term for the assignment of employees’ role that applies
mutual restraint among employees for the purpose of reducing the risk of misconduct or errors in work from the standpoint of internal control?

a) Delegation of authority

b) Segregation of duties

c) Monitoring

d) Diversification of risk

A

b

64
Q

During a systems audit, systems auditors who are independent of the audit target inspect
and evaluate the information systems comprehensively from an objective viewpoint. As
a result of the systems audit requested by the management of a company, some problems
are found in the effectiveness of the current information systems. Who are the most
appropriate persons to whom the systems auditor gives advice and makes
recommendations?

a) Stockholders

b) Jurisdictional authority

c) Management

d) System users

A

c

65
Q

Which of the following is an appropriate measure to implement internal controls
function?

a) Avoiding creating a job description indicating the scope of work and roles

b) Avoiding creating a work handover document for a successor

c) Avoiding processing purchasing and payment by the same person

d) Avoiding separating team members for system development and system operation

A

c

66
Q

Q66. A person wishes to start at point X, pass through all of points A, B, and C, and arrive at
point Y. When the routes and the required times between points are as shown in the figure
and the table, what is the shortest time in minutes from point X to point Y? Here, the
points A, B, and C may be passed through in any order.

A
67
Q

Which of the following examples of capacity building and guidance for subordinates is classified as OJT?

a) A company made subordinates set career goals and make plans for achieving them.

b) With subordinates’ careers in mind, a company made subordinates attend a manager
development course hosted by the Personnel Department.

c) A company made subordinates take part in a new development project to improve their design capabilities.

d) A company selected an externally hosted seminar matched to subordinates’ fields of expertise and careers, and made the subordinates attend it.

A

c

68
Q

An implementation plan for a company-wide information system that is consistent with
the business strategy is to be created. Which of the following is the most appropriate
person to take responsibility for this activity?

a) CIO

b) CTO

c) Head of the core business department

d) Person in charge of planning in the information systems department

A

a

69
Q

Data of the defects and faults of products, complaints from customers, etc. are prepared
and categorized according to their cause and situation. Which of the following represents the number of data in each category in descending order on a bar graph and
the cumulative total on a line graph?

a) Control chart

b) Tree diagram

c) Pareto chart

d) Matrix chart

A

c

70
Q

Which of the following is an appropriate way to brainstorm?

a) Asking participants to present feasible ideas and refrain from generating unrestrained
ideas

b) Proceeding with the session without blaming any member who creates an improved
idea that takes advantage of another member’s idea

c) Proceeding with the session while selecting the ideas that are suitable to the theme

d) Encouraging the criticism of ideas to pursue quality rather than quantity of ideas

A

b

71
Q

Q71. There are activities A, B, and C that use machines X and Y, and it is required in all
activities that the machines are used in the sequence of machine X, machine Y. When the
use times of machines X and Y in each activity are as shown in the table below, which of
the following is the sequence of the activities where the total time required to complete
the three (3) activities becomes minimum? Here, machines X and Y can be used in
parallel as shown in the figure below, but two (2) or more tasks cannot be performed
simultaneously with any machine.

A
72
Q

Q72. A certain product’s sales plan and sales result are shown in the table below. What is the
ratio in percentage of the profit result to the profit plan? Here, the decimal fractions of
the ratio are truncated.

A
73
Q

Which of the following is the right to protect the content of user guides attached to
software packages?

a) Industrial design right

b) Trademark right

c) Copyright

d) Patent right

A

c

74
Q

Q74. Which of the following is an appropriate combination of the standards and their
applicable fields?

A
75
Q

According to the ISO 9000 family, quality is defined as the “degree to which a set of
inherent characteristics fulfills requirements.” When products are evaluated on the
basis of this definition, which of the following is most appropriate as a product with good quality?

a) A product having no customer complaints and a high level of customer satisfaction

b) A product that a company produces in-house without outsourcing

c) A product designed and manufactured using CAD and CAM

d) A product utilizing materials and components of high quality

A

a

76
Q

Which of the following is appropriate as a characteristic of the QR code?

a) The code can contain only single-byte alphanumeric characters and symbols.

b) The amount of information that can be stored is equivalent to that of a barcode.

c) The code can be read from any direction including the top, bottom, left, and right.

d) The code has a two-dimensional structure in which three barcode layers are stacked.

A

c

77
Q

Among the lists of corporate activities A through D, which of the following is the list
that contains all activities concerning the establishment of compliance?

A: Supporting fine art and cultural activities
B: Training employees in the codes of conduct
C: Performing activities for prevention of global desertification
D: Creating a mechanism for whistle blowing

a) A, B

b) A, C

c) B, D

d) C, D

A

c

78
Q

From the viewpoint of corporate governance, which of the following is the most
appropriate method of strengthening the functions of monitoring and supervising the
decision-making process of the management?

a) Installing a camera for monitoring the entry and exit of the president’s office

b) Periodically requesting a private detective to investigate the conduct of the
management

c) Appointing some outside directors

d) Employing law school graduates as members of the internal audit department

A

c

79
Q

Which of the following is an appropriate description concerning the Balanced Scorecard (BSC)?

a) It analyzes what activities generate the value of products and services that are
provided to customers.

b) It creates strategy and evaluates performance from four (4) viewpoints: financial,
customer, internal business processes, and learning and growth.

c) It records entries in a ledger in order to ensure that the amounts of credits and debits
are always in balance.

d) It scores and evaluates the creditworthiness of business partners through such means
as financial indicators.

A

b

80
Q

Among the business management systems, which of the following has an objective of maximizing customer lifetime value? Here, customer lifetime value is the amount of
profit expected to be brought into a company by a customer throughout his/her lifetime.

a) CRM

b) ERP

c) SCM

d) SFA

A

a

81
Q

As segmentation in marketing, consumers are classified on the basis of the attitude
toward product purchase. Which of the following is an appropriate attitude toward
product purchase of a consumer called an opinion leader?

a) Conveying one’s evaluation of a product to friends and acquaintances after the product
becomes popular

b) Taking into consideration their friends’ evaluation and public opinion when deciding
whether to purchase a product

c) Waiting for the sales of a new product to start, and being eager to acquire it before
friends and acquaintances

d) Purchasing a new product in its initial phase of sale, and conveying information about
the product to friends and acquaintances

A

d

82
Q

Which of the following is an appropriate example of vertical integration in corporate
business development?

a) An apparel manufacturer outsources product inspection at factories to a partner
company.

b) A major trading company makes a major retailer its subsidiary with the aim of
expanding sales of products that it purchases overseas.

c) A bank acquires another bank through an M&A with the aim of increasing its size.

d) Many PC assembling companies use the semiconductors and OS of a specific manufacturer.

A

b

83
Q

Q83. Which of the following is an appropriate combination of the management themes and
techniques for achieving them?

A
84
Q

A middle-sized electrical manufacturer company A divides the products into groups in
accordance with their potential and competitive strength in order to determine the
priority of investing funds among their lineup. Which of the following is the most
appropriate method of analysis for this purpose?

a) Cluster analysis regarding the prices and the customer bases of the company’s products

b) RFM analysis regarding the customers that purchase the company’s products

c) PPM analysis regarding the shares and the market growth rates of the company’s
products

d) Principle component analysis regarding the cause of faults in the company’s products

A

c

85
Q

Which of the following is the most appropriate explanation of a patent strategy of crosslicensing?

a) It is the acquisition of patents held by a company through absorption-style merger, to
gain that company’s technology.

b) It is implementation of joint research with other organizations, to complement a
company’s own technologies and apply for patents.

c) It is granting a company’s own patents to other companies and obtaining royalties commensurate with their value.

d) It is mutual consent between patent holders on the use of each other’s patents.

A

d

86
Q

Q86. When the spreadsheet shown below is converted into CSV format, which of the
following is an appropriate list of data that is generated by spreadsheet software? Here,
records are separated by the carriage return code “CR”. The expression in a cell is
automatically recalculated, and the resulting value is written back into that cell. Although
the entered expressions are shown in row 3 and column C below, the resulting values are
actually displayed on the screen

A
87
Q

An ERP package is a suite of fully integrated software applications that are used to
perform administrative business processes, such as financial management, procurement,
personnel, and payroll administration. Which of the following is the most appropriate
description concerning such an ERP package?

a) An ERP package can be installed with relative ease because the business processes of a company do not need to be analyzed.

b) An ERP package should be maintained by individual user departments after its
installation.

c) An ERP package should be installed after the business processes of a company are
verified and standardized.

d) An ERP package is an integrated type of system software that is designed especially for the domestic business processes.

A

c

88
Q

Which of the following is the system that is used to record sales information when a sales
transaction was made at the store, and also to collect, accumulate, and analyze sales
information for each item sold?

a) ECR

b) QR

c) EOS

d) POS

A

d

89
Q

Among the characteristics required for an embedded system, which of the following is the most appropriate terminology used when a certain process must be completed within a given period of time?

a) Availability

b) Reliability

c) Real-time ability

d) Serviceability

A

c

90
Q

Which of the following is an appropriate explanation of CAD, as used in the
manufacturing industry?

a) It calculates the required quantity of materials for a product production plan and
orders materials.

b) It manages information about the components, semi-finished products, quantities, etc. required for the manufacture of products.

c) It performs unified management of information such as product blueprints and
component tables, from design to manufacturing.

d) It uses computers in product design to improve the productivity and reliability of
design specifications.

A

d

91
Q

Which of the following systems can be realized through the use of RFID?

a) Providing medical care by transmitting images and voice data of patients from a
remote site via a network

b) Depositing and withdrawing money from a bank ATM by using an ATM card

c) Reading product information from the barcodes on products, and performing sales
management and order processing at the time of sale in stores

d) Setting an electronic tag on a delivery parcel, and checking information related to the
shipping history of the parcel

A

d

92
Q

. When build-to-order production is compared to build-to-stock production, which of the following is an appropriate characteristic of build-to-order production?

a) Shipment is not possible immediately when an order is received, but there is no risk of
an excessive number of products in the inventory.

b) It is required to increase the accuracy of order forecast, and maintain the optimum
inventory volume of products.

c) It brings the risk of the loss of sales opportunities through insufficient product
inventory.

d) Products are produced according to a production plan that is proposed on the basis of
order forecast.

A

a

93
Q

When system development is outsourced, which of the following is an appropriate item
to be considered?

a) Making the acceptance test simple when placing an order with a reliable outsourcee

b) Monitoring the progress of development in order to find and resolve problems early

c) Entrusting all tasks, including the determination of the specifications of business
processes, to an outsourcee who is familiar with the business processes

d) Giving detailed instructions on outsourced tasks down to each staff member, even if
the outsourcee is reliable

A

b

94
Q

Which of the following is the most appropriate description concerning DFD?

a) It represents transitions of the state of a system as time passes and the situation
changes.

b) It relates entities handled by a system, and represents the data structure.

c) It represents the attributes of, operations for and relations between the elements that
a system is composed of.

d) It focuses on the flow of data, and represents the relations between the flow and the
processing of business data.

A

d

95
Q

Which of the following is the term that expresses the disparity in the quality and quantity of information that can be obtained, or in income that can be earned between people who can handle information devices such as computers and those who cannot?

a) Social networking service

b) Digital signage

c) Digital divide

d) Digital native

A

c

96
Q

Which of the following is a business operator that provides access to the Internet?

a) ASP

b) ISP

c) SaaS

d) SNS

A

b

97
Q

Which of the following is an appropriate approver for the optimization plan of the overall
information system of a company?

a) CIO

b) Head of RFP creation department

c) Head of the business operations department handling the mission-critical system

d) System development project manager

A

a

98
Q

Company A runs a securities business and Company B is a system developer. Company
A outsources a project to develop a stock ordering system to Company B from the start
of the project. During the operational test of the project, a defect is discovered. The defect
is caused because Company A did not inform Company B of the “Exceptional rule for
approval of the responsible person during ordering of stocks.” Which of the following is the phase where such a rule should be clearly explained to Company B?

a) Definition of business requirements

b) Definition of software requirements

c) Definition of system requirements

d) Definition of system test requirements

A

a

99
Q

Which of the following is an appropriate procedure for selecting a contractor for system development?

A: Issuance of RFP

B: Conclusion of contracting agreement

C: Determination of contractor

D: Evaluation of proposals

a) A → C → D → B

b) A → D → C → B

c) C → A → B → D

d) C → B → A → D

A

b

100
Q

Q100. When the software life cycle in the figure below is classified into the operation process, development process, planning process, maintenance process, and requirements
definition process, which of the following corresponds to A? Here, each of “Development,” “Planning,” “Maintenance,” and “Requirements definition” goes into one of A and the shaded blocks.

A