April 2022 Flashcards

1
Q

Japanese restaurants in Sapporo and Japanese restaurants in Hakodate are to be searched
for together. Which of the following is the logical expression that represents the search condition?

a) (“Sapporo” AND “Hakodate”) AND “Japanese restaurant”

b) (“Sapporo” AND “Hakodate”) OR “Japanese restaurant”

c) (“Sapporo” OR “Hakodate”) AND “Japanese restaurant”

d) (“Sapporo” OR “Hakodate”) OR “Japanese restaurant”

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is always true for two (2) sets A and B? Here, (X Y) represents the set that contains only the elements that are in both X and Y (intersection set), and (X Y) represents the set that contains all of the elements that are in at least one of X or Y (union set).

a) (A B) is a subset of the complement of (A B).

b) (A B) is a subset of A.

c) (A B) is a subset of (A B).

d) (A B) is a subset of the complement of A.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the binary result of the multiplication of binary 1011 and binary 101?

a) 1111

b) 10000

c) 101111

d) 110111

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a chairperson and a secretary are selected from three (3) candidates with a method that allows dual roles, there are three (3) ways for the selection of a single chairperson and three (3) ways for the selection of a secretary, so in total, there are nine (9)
combinations for the selection of a chairperson and a secretary. When a chairperson and a secretary are selected from five (5) candidates with a method that allows dual roles,
how many combinations for the selection are there?

a) 5

b) 10

c) 20

d) 25

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a queue, three (3) elements 33, 27, and 12 are enqueued in this order. After the element
45 is enqueued to this queue, two (2) elements are retrieved (or dequeued). Which of the
following is the second element to be retrieved?

a) 12

b) 27

c) 33

d) 45

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an appropriate description concerning HTML?

a) It is a markup language that can specify the logical structure and layout of a web page by using tags.

b) It is a script language that can describe the program or processing steps executed on
a web browser.

c) It is a communication protocol that is used between a web browser and a web server.

d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following represents a processing procedure of a program graphically?

a) Gantt chart

b) Data flow diagram

c) Flowchart

d) Radar chart

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate description concerning machine language?

a) A program that is written in Fortran or C is converted into machine language and
then executed.

b) Machine language is a high-level language.

c) Machine language expresses a program with sequences of decimal numbers.

d) Most of application software is still programmed in machine language.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q9. As shown in Figure 1, there is a box that generates two (2) numerical values B1 and B2
when two (2) positive integers A1 and A2 are entered. B1 has the same value as A2, and
B2 is the remainder of A1 divided by A2. As shown in Figure 2, when two (2) boxes are
connected, and 49 is entered as A1 and 11 is entered as A2 in the left box, what is the
value of B2 generated from the right box?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an appropriate description of a dual-core processor?

a) Two (2) types of OS are installed on a single PC, and the PC is configured so that
either OS can be booted.

b) Two (2) displays are connected to a single PC in order to have a single continuous wide display area across the two (2) displays.

c) Two (2) strips of memory with the same standard and capacity are combined, and
the effective speed of data transfer is increased by accessing each strip concurrently.

d) The integrated circuits of two (2) processors are implemented on a single LSI
package, and the two (2) processors can execute separate instructions concurrently.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate description concerning the primary and
secondary cache memory that a CPU is equipped with?

a) The primary cache memory has larger capacity than the secondary cache memory.

b) The secondary cache memory is slower than the main memory in writing and
reading.

c) When the CPU reads data, it first accesses the primary cache memory, and then it
accesses the secondary cache memory if the data is not available.

d) All of the data that is required for a process needs to be present on the primary or
secondary cache memory when a program starts.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an appropriate description concerning a device driver that
enables the use of peripheral devices with a PC?

a) When a hard disk drive is initialized and the operating system is reinstalled, it is
necessary to reinstall device drivers that were installed separately to the operating
system.

b) When new application software is installed, it is necessary to reinstall all device
drivers that this software uses.

c) Even if a device driver is no longer required, a user cannot delete the device driver
once it is installed.

d) It is only necessary to install one (1) device driver for a printer to use all printers
regardless of manufacturer or model.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a chip that is used in image processing in devices such as PCs
and smartphones, and is also used for large amount of calculation processing in AI?

a) AR

b) DVI

c) GPU

d) MPEG

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q14. The system configurations A through C are made up by connecting multiple identical
devices. Which of the following is a list where A through C are sorted in descending
order of availability? Here, represents a device. The parallel connection requires
only one (1) of the devices to be functional, while the series connection requires all
devices to be functional.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following includes all the appropriate measures to enable the normal execution of processing even in the event of a failure in part of a system?

(1) Configuring HDDs with mirroring

(2) Minimizing the frequency of maintenance and inspections after stable operation of
the system starts

(3) Grouping multiple redundant network lines into a single high-speed line

(4) Making power supply redundant with the use of UPS (Uninterrupted Power Supply)
etc.

a) (1), (3)

b) (1), (4)

c) (2), (3)

d) (2), (4)

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Among the methods I through III for handling multiple hard disks as one (1) logical disk,
which of the following lists all and only the methods that can recover data even if one of
the constituent hard disks fails?

I RAID5
II Striping
III Mirroring

a) I, II

b) I, II, III

c) I, III

d) II, III

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q17. Spreadsheet software is used to predict sales according to the weather. The probability
for the weather type (sunny, cloudy, rainy) on the day to be predicted and the predicted
sales amount by weather type for each product is entered into the worksheet below. An
expression is entered in cell E4 to calculate the predicted sales amount on the day for
Product A, and this is copied to cells E5 through E6 and used. Under these conditions,
which of the following is an appropriate expression to be entered in cell E4? Here, to
obtain the predicted sales amount on the day for each product, the probability for each
weather type is multiplied by the predicted sales amount for each of weather type, and
then these values are added up.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an OS function that executes multiple application programs
concurrently on a single PC, such as when a file is downloaded from a web site while data is processed with spreadsheet software?

a) Virtual reality

b) Dual core

c) Dual system

d) Multitasking

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an advantage of using OSS (Open Source Software)?

a) Technical support is provided free of charge from the developer at the time of
installation.

b) The software is not prone to infection of viruses, as the source code is not released.

c) Compensation can be received for damages caused by defects in the software.

d) The source code can be modified to fit the environment of the user in accordance
with the license conditions.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multiple files stored on a hard disk are used in work, from Monday to Friday. In order
to handle failure of the hard disk, the data is backed up to another hard disk after the end
of each day’s work. When the backup has following conditions, what is the total time required (in minutes) to perform backups of data from Monday to Friday?

[Conditions for backups]
(1) There are 6,000 files used in work, each with a size of 3 Mbytes.
(2) In each day’s work, 1,000 files are modified. Modifications do not change the size
of the files.
(3) Files are copied to the other hard disk at a speed of 10 Mbytes/second. One (1) file
is backed up at a time; backup continues without interruption.
(4) From Monday to Thursday, only files modified that day are backed up. On Friday,
all files are backed up, whether or not they have been modified.

a) 25

b) 35

c) 50

d) 150

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Q21. The tax-inclusive prices of products A and B are calculated by using two (2) tax rates
that are set in cells D2 and E2 below. The correct expression that should be entered in
cell D4 is $B4(1.0+D$2), but a wrong expression $B4(1.0+$D$2) was entered. When
the expression that was entered in cell D4 is copied to cells D5, E4, and E5, which of the
following is the numeric value that is displayed in cell E5?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Q22. When directories d1 and d2 are placed on a web server as shown in the figure, which of
the following descriptions specifies the reference of the web page file f2.html on
directory d2 from the web page file f1.html on directory d1 (current directory)? Here,
the reference method of files is as follows.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is an appropriate description of a blade server?

a) It uses multiple board-type computers equipped with CPU and memory, housed in
a dedicated body.

b) It enables the use of office software, e-mail software, etc. as web services over the
Internet.

c) It is embedded in equipment such as home appliances or automobiles.

d) It supports handwriting input function by using a liquid crystal display with a touch
panel.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

With regard to the colors printed by a printer, theoretically, what color is formed when cyan, magenta, and yellow are mixed together by subtractive color mixing?

a) Blue

b) Red

c) Black

d) Green

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following is an appropriate description of raster graphics, which is a method of handling the graphics that is used as a collection of points called pixels in painting software? a) It is widely used in CAD. b) The color and brightness can be adjusted for each pixel. c) The file size is constant regardless of the level of resolution. d) No jaggies are visible at the edges of shapes even upon enlargement.
b
26
Which of the following is an appropriate description of a rollback in transaction processing? a) When a transaction attempts to update shared data, it prohibits another transaction from updating that data. b) When a transaction has been successfully processed, it commits an update to the database. c) When a transaction failed for some reason, it reverts the database to the state before the transaction was started. d) It combines multiple tables into one (1) table by using mutually related columns as keys.
c
27
Q27. There is the “Employee” table and the “Department” table in a relational database. The “Employee” table and the “Department” table are joined, and employees who live in prefectures different from the prefectures that their departments are located in are extracted. How many employees are extracted?
28
Which of the following is an appropriate purpose of conducting data normalization when a relational database is constructed? a) Providing redundancy to data in order to detect data errors b) Eliminating data inconsistencies and duplications in order to make it easy to maintain and manage the data c) Unifying the character code of data in order to improve data reliability and storage efficiency d) Losslessly compressing data in order to improve access efficiency
b
29
In a relational database, which of the following is the reason for a primary key being specified? a) To clearly indicate that something is not subject to an arithmetic operation b) To enable the search of the column that is specified as the primary key c) To prevent another table from referencing the table d) To enable any record in the table to be uniquely identified
d
30
Which of the following is a protocol that is used for synchronization of the internal clock of a computer via a network with a server that holds a reference clock? a) FTP b) NTP c) POP d) SMTP
b
31
Which of the following is an appropriate description of online storage? a) A virtual private network that is established via the Internet b) A service that lends disk space for saving data via the Internet c) Software that is distributed or sold via the Internet d) A computer game that multiple users can simultaneously play via the Internet
b
32
Which of the following mobile communication systems not only offers higher communication speed than LTE, but also allows more devices to connect and has less lag time? a) Block chain b) MVNO c) 8K d) 5G
d
33
Q33. Which of the following is the appropriate combination of terms or phrases to be inserted into blanks A and B in the description below concerning NAT?
34
Which of the following is an appropriate characteristic of LPWA? a) It is a technology concerning AI, and it enables a computer to acquire new knowledge, rules, and other such things from entered data without any explicit programming of rules nor other such things. b) It is a wireless network that covers a broad area while consuming only small electrical power, and although its communication speed is lower than a cellphone system, its low electricity consumption enables it to run on common batteries for several years and its broad area coverage enables communication of up to several kilometers. c) It is a distributed ledger technology that creates a sequence of data item containing transaction records and embeds in each data item the hash value of the previous data item in order to associate data items with each other and make it difficult to tamper with them without causing any inconsistencies, and therefore increases the reliability of data. d) It is an encryption method for wireless LANs, and is recommended for use instead of WEP because WEP is known to have vulnerabilities.
b
35
Which of the following is an appropriate description concerning biometric authentication? a) If margin for error in matching with the authentication data is made larger, both the possibility of rejecting an authorized person and the possibility of accepting an unauthorized person become smaller. b) It eliminates the need to remember IDs and passwords for authentication, and the need to carry keys or cards. c) It cannot be used with other authentication methods such as passwords or tokens. d) The effective period in which retina pattern and finger vein pattern can be used for authentication is short because they change greatly over years.
b
36
Which of the following is an explanation of spyware? a) It is a scam where money is demanded just by viewing a web site or clicking an image on it. b) It is a mechanism where an attacker packages attack tools such as log removal or a back door and hides them in a PC so that the attacker can use them after intrusion. c) It is a program that infects a large number of PCs and performs actions such as simultaneous attacks by illegitimately operating the PCs as instructed over a network. d) It is a program that is installed without the user knowing and collects information such as the user’s personal information and access history.
d
37
Which of the following is an appropriate disposal method for media that stores confidential information to ensure that information leakage does not occur? a) CDs and DVDs are destroyed and then are disposed of. b) A PC is disposed of with its CPU being destroyed. c) USB memory is disposed of with its files and folders being deleted. d) Paper documentation is not reused as memo paper and is sealed in a confidential envelope and then is disposed of together with general trash.
a
38
Among confidentiality, integrity, and availability, which of the following is the list that contains all and only the properties that are lost in the information security incident below? All of the files on a server in the workplace were encrypted and saved. However, the server was infected by a virus, and a number of the files were deleted. Elimination of the virus and recovery of the files required several hours. During the hours, work could not be performed, and users were inconvenienced. Some files were unable to be recovered. a) Confidentiality b) Confidentiality, integrity c) Integrity, availability d) Availability
c
39
Q39. When a user accessed the URL in the body of an e-mail message with a PC, the message shown in the figure appeared on the screen and the PC was locked. Which of the following is used in this attack?
40
Which of the following is an appropriate example of activities conducted in A (Act) in the organizations that operate ISMS on the basis of the PDCA model? a) Changing the server monitoring method as a corrective action for the results of the business operations audit b) Objectively evaluating the server administrator’s work details by a third party c) Identifying the information assets in the server room d) Monitoring the operation of the server according to the defined operational procedure
a
41
It is reported that WEP suffers from the problem that ciphers are decoded in a short time. Which of the following is a stronger wireless LAN encryption method? a) ESSID b) HTTPS c) S/MIME d) WPA2
d
42
When a smartphone is used, which of the following is an appropriate preventive measure for shoulder surfing? a) Always using the latest OS b) Turning off the GPS function c) Affixing a privacy screen protector on the screen d) Attaching a strap to prevent fall and theft
c
43
Which of the following is used to confirm that there is no falsification of the content of an e-mail? a) IMAP b) SMTP c) Information security policy d) Digital signature
d
44
Which of the following is not an appropriate security control concerning human resources as a security risk treatment in ISMS? a) Performing background checks and other such checks for all candidates for recruitment in accordance with the relevant laws, regulations, and ethics b) Defining official disciplinary proceedings for employees who violate information security, and ensuring employees’ awareness of them c) Requesting that all employees at a company comply with information security according to organizational policies and procedures, but not making any request to companies that work is outsourced to d) For employees who are leaving a company, defining obligations concerning information security valid after they leave the company, informing the employees about their obligations, and having them fulfill their obligations after they leave
c
45
Q45. A document file that is stored on a file server is directly edited on a PC and then an attempt is made to overwrite the file, but the message “You do not have permission, so the file cannot be saved” is displayed. Which of the following is the appropriate combination of permissions that were set for the document file and the folder that it is stored in?
46
Mr. A, a developer, is analyzing and verifying the internal structure of a program in order to determine whether input data is processed as intended. Which of the following is the test that Mr. A is currently conducting? a) System test b) Top-down test c) Black box test d) White box test
d
47
Estimation methods for system development include the analogy-based method, the bottom-up method, and the FP (Function Point) method. Which of the following is an appropriate explanation of the FP method? a) It is a method for the estimation of person-hours for an overall system on the basis of an estimation of person-hours for each activity identified with WBS. b) It is a method for the estimation of system scale by measurement of the number of functions on the basis of factors such as number of input screens, output reports and files that are processed by the system. c) It is a method for the estimation of the total person-hours for development from the standard lines of code to be developed per person per month after the estimation of the lines of code of a system’s programs. d) It is a method for the estimation of the person-hours for system development that takes into account the differences with similar systems developed in the past.
b
48
Which of the following is an appropriate test for a user to confirm by himself/herself whether the delivered software satisfies the requirements? a) Acceptance test b) Integration test c) System test d) Unit test
a
49
A company contracted to develop an accounting system and held meetings with the customer to clarify the types of required financial statements and the target processing time from accounting data confirmation to the output of the financial statements. Which of the following is the appropriate process for this activity? a) System test b) System requirements definition c) Software detailed design d) Software architecture design
b
50
Which of the following is an appropriate characteristic of agile development? a) Suitable for development with a large project team b) Preparing detailed documents with focus on the design document c) Focusing on contract negotiation rather than cooperation in terms of relationship with customers d) Flexibly responding to changes in requests as compared with waterfall development
d
51
Project management knowledge areas are classified into project cost management, project scope management, project quality management, project risk management and other areas. Which of the following is an appropriate activity performed in project quality management? a) To define and manage necessary work procedures and the measure of performance level in order to comply with deliverable acceptance criteria b) To manage a project so that it can be completed within the budget c) To identify potential events that may have negative impact on a project, analyze them, plan responses, and conduct monitoring and control d) To define and manage works that need to be performed for the success of a project
a
52
Q52. In an arrow diagram that shows system development, if activities A and D are delayed for three (3) days in total, what is the delay in the entire project?
53
There are negative and positive risks in a project. Among the treatment of risks in scheduling, which of the following corresponds to a treatment of a positive risk? a) Having all members receive vaccination before influenza spreads to prevent the members from not being able to work b) Reducing the entire project duration by carrying out tasks for creating software programs in parallel when the overall cost can be reduced by advancing the schedule c) Securing replacement staff in advance in preparation for delay due to unexpected withdrawal of staff d) Purchasing insurance in preparation for payment of a penalty due to delivery delay
b
54
In a development project for a system, there is a plan to create 36 programs with the same size. It was first planned to assign only Mr. A who can create six (6) programs per week, but the plan was changed and it was decided to assign two (2) people: Mr. A, and Mr. B who has half the productivity of Mr. A. When the cost per week for Mr. A and Mr. B is 300 thousand yen and 200 thousand yen respectively, how much is the change in the cost as compared to the original plan? Here, Mr. A and Mr. B perform activities in parallel, and the efficiency of Mr. A and Mr. B are always fixed. a) A decrease of 800 thousand yen b) A decrease of 300 thousand yen c) An increase of 200 thousand yen d) An increase of 1,200 thousand yen
c
55
Activities in project management include project time management, project cost management, and project human resource management, and also include project integration management that coordinates those activities. In a system development project, which of the following is an appropriate action in project integration management in a case where it has been decided that the delivery should be advanced? a) Considering a change in the sequence of tasks in order to shorten the critical path b) Comparing and considering a staff increase and the cost for reducing the scheduled duration, as well as the number of days that can be reduced c) Estimating the impact on the cost for a case where the scheduled duration is reduced d) Reviewing timings when staff members are assigned and revising the staff plan
b
56
When the outsourced development project of a system has passed beyond its halfway mark, there is a request from the outsourcer for adding a function to the system. Which of the following is the most appropriate action of the project manager? a) Accepting the request and securing the budget and staff members b) Declining the request by explaining that changes after halfway mark are generally not accepted c) Taking into account the impact on the cost and schedule, and following the procedure of change management d) Quickly updating the baseline of scope since only the project scope will be affected
c
57
A company orders information system to an overseas vendor under a contract for work. Which of the following is an appropriate activity that is performed as project procurement management by the company? a) When a defect is found after the acceptance of delivery, even if not indicated in the contract, the company instructs the vendor to examine not only the defect but similar defects and fix them. b) In order to make good use of the capabilities of the overseas vendor, the company does not include the provisions of intellectual property rights in the contract and allows the vendor to code programs freely. c) After the start of development, the company has the procurement detail such as the development scope, specifications, and work contents, etc. agreed upon by the vendor in writing. d) At the time of signing the contract, the company agrees upon in writing with the vendor the documents to be delivered and the rules for changing specifications during development.
d
58
When the operation of an information system is outsourced, which of the following is created in order to agree on the quality level for the service to be provided between the outsourcing party and the contractor? a) ASP b) ISP c) RFP d) SLA
d
59
Which of the following is an appropriate measure of facility management that maintains and protects facilities and equipment of information systems? a) Reviewing the fuel replenishment plan in order to maintain the appropriate duration that power can be generated with a private power generation system b) Introducing asset management software in order to manage all the company’s software centrally c) Standardizing how to set a screen saver in order to prevent unauthorized use of the PCs d) Reviewing the network firewall settings in order to enhance the prevention of unauthorized network access to the information systems
a
60
Which of the following is the purpose of incident management? a) Ensuring that activities are performed for migrating new software that is used in an IT service to a production environment b) Managing a series of activities for handling a change request about an IT service c) Recovering an IT service immediately when any disruption to the IT service occurs, and making the impact to business as small as possible d) Managing the information on the items that are required for providing an IT service and on their combinations
c
61
In the PDCA cycle of service level management, which of the following is implemented as C (Check)? a) Providing services on the basis of the SLA b) Preparing an improvement plan for services on the basis of the report and review of service provision results c) Agreeing upon the desired service quality on the basis of the service requirements and the service improvement plan, and preparing an SLA d) Monitoring and measuring the provided services, and preparing a service report
d
62
For a system that accepts a query from a user in the input area on the web site, which of the following is the most appropriate mechanism to efficiently and promptly respond to the query in an interactive and automated manner? a) Recommendation b) Chatbot c) Escalation d) FAQs
b
63
Which of the following is the most appropriate control on the development and implementation of an information systems strategy for improving the competitiveness of a company? a) IT governance b) Compliance c) Systems audit d) Project management
a
64
Which of the following is an appropriate explanation of monitoring in internal control? a) It is a process of continuously evaluating if internal control is working effectively. b) It is a process of promoting compliance to the laws and other regulations concerning internal control. c) It is a process of constructing an organization for internal control. d) It is a process of analyzing the risks that hinder internal control.
a
65
With the purpose of shortening the business processing time, the throughput of a business system was improved. When a systems audit is performed to evaluate if the improvement is effective, which of the following is the appropriate information to be requested by the system auditor to the operations department? a) Operation statistics material b) System operations organization c) System operations manual d) User manual
a
66
Which of the following refers to a technique by which several persons come together and give their ideas freely with prioritizing quantity over quality of ideas without criticizing each other so as to solve a problem? a) Brainstorming b) Benchmarking c) Role playing d) Work design
a
67
Which of the following is the scope that the CFO, one of the positions involved in corporate management, bears responsibility for? a) Technology b) Finance c) Information d) Personnel
b
68
Among the phases of the PDCA cycle in corporate business operations, which of the following measures and evaluates the status of execution of operations on the basis of KPI? a) P b) D c) C d) A
c
69
Retail company A is teaching the general distribution process for food products in an easily understandable manner at elementary schools near the company’s distribution center. Which of the following is an idea behind these activities by company A? a) CSR b) Alliance c) Core competence d) Corporate governance
a
70
Q70. The table below is a part of the ingredients table of a steamed meat dumplings lunch box. How many grams of meat is necessary to prepare 100 steamed meat dumplings lunch boxes? Here, the steamed meat dumplings lunch boxes do not contain any dish that uses meat other than the steamed meat dumplings, and there is no loss of ingredients in the preparing process.
71
If risk assessment is divided into three (3) processes, which of the following is the third process besides risk identification and risk evaluation? a) Risk transfer b) Risk avoidance c) Risk reduction d) Risk analysis
d
72
Which of the following is an expression that calculates operating profit? a) (Gross profit) − (Selling, general, and administrative expense) b) (Sales) − (Cost of sales) c) (Current profits) + (Extraordinary profit) − (Extraordinary loss) d) (Current net profit before tax) − (Corporate tax, residential tax, and business tax)
a
73
Which of the following is an appropriate example of an initiative based on the Green IT concept? a) Use of displays that reduce eye fatigue from blue LED light b) Installation of air shower at the server room entrance and exit c) Construction of backup systems in preparation for disasters d) Setting a policy of viewing materials on PC screens, limiting their printing on paper
d
74
Which of the following is an example of a Non-Disclosure Agreement (NDA)? a) A contract specifying the service content to be provided, which is agreed between the service provider and the customer before the provision of the IT service b) A contract specifying that the vendor of computer equipment bears the responsibility of transferring the property right, and that the buyer bears the responsibility of paying the charges. c) A contract, specifying the obligation of the outsourcer and outsourcee to maintain confidentiality of the secret information of a party that becomes known to the other party during system development d) A contract specifying that an outsourcee to whom the installation of a generalpurpose software package has been outsourced performs the task at the outsourcee’s own discretion and responsibility, and receives payment upon the completion of the task
c
75
Which of the following is appropriate as an expected advantage of the adoption of ISO 9001 by companies? a) The companies' trade procedures will be standardized, leading to increased efficiency and the avoidance of non-tariff barriers. b) Technical specifications will be standardized in the industry, and increase in product quality and expansion of markets will move forward. c) Methods for handling information assets will be standardized and the quality of information security will increase. d) Business operations concerning quality management will be standardized, and the quality and efficiency of management will increase.
d
76
Which of the following is an international standard for environmental management systems developed by ISO? a) ISO 9000 b) ISO 14001 c) ISO/IEC 20000 d) ISO/IEC 27000
b
77
Which of the following examples of the sending of e-mail is inappropriate from the standpoint of the protection of personal information? a) In responding to an e-mail asking questions about a product, you placed the e-mail addresses of multiple customers in the “CC” field as you want these customers to read the response. b) You created one (1) e-mail message for each of your top 10 customers with the largest amount of mail-order purchases, in order to inform each customer of a corresponding prize. c) You sent an e-mail message with information on an alumni meeting, and addressed the message to the e-mail addresses of all members listed in the alumni association directory that is distributed to all members. d) When you were arranging a special spring exhibition, you placed the e-mail addresses of selected members in the “BCC” field of an e-mail message and sent the message soliciting exhibits.
a
78
Mr. X stores images taken by a digital camera in a storage medium, inserts the storage medium in a printer, and prints them. It is possible to print the images without taking into consideration the manufacturer of the digital camera. Which of the following is the technical premise concerning image data that enables this? a) Commoditization b) Networking c) Standardization d) Ubiquity
c
79
In Company X, the experience and know-how of employees who have managed drainage treatment in the facility over a long period of time is documented and accumulated, and the accumulated experience and know-how is utilized on daily drainage treatment activities and design of new processing equipment. Which of the following is appropriate as a concept of this example? a) ERP b) SFA c) Supply chain management d) Knowledge management
d
80
Which of the following is a technique that analyzes the value of a product or service through the relationship between functionality and cost, and enhances that value through reduction in cost and increase in functionality and quality? a) Supply chain management b) Knowledge management c) Value engineering d) Reverse engineering
c
81
As a method for a company to utilize the business resources of another company, there is a corporate acquisition and a corporate alliance. Which of the following lists all and only the general demerits of a corporate alliance in comparison with a corporate acquisition? I It is required to reform the other company’s organization or business process. II The participation in decision making of the other company regarding the utilization of business resources is limited. III The required investment is large and has an impact on the financial status. a) I b) I, II, III c) I, III d) II
d
82
Which of the following is an appropriate explanation of 3C analysis that is used to analyze a business environment? a) The analysis is performed from the three (3) perspectives of the customers, the competitors, and the company. b) The analysis is performed from the three (3) perspectives of last purchase date, purchase frequency, and purchase amount. c) The analysis is performed by decomposition into the three (3) elements of era, age, and generation. d) The analysis is performed by categorization into three (3) groups in descending order of total sales.
a
83
Which of the following is an appropriate description concerning a balanced scorecard (BSC)? a) It is a business management technique that converts a company or organization’s vision and strategy into specific actions from four (4) viewpoints (“financial viewpoint,” “customer viewpoint,” “business process viewpoint,” and “growth and learning viewpoint”). b) It is an approach where the corporate activities of providing a product or service to customers are viewed as a chain of activities of procurement, development, manufacturing, sales, and service that adds and builds up value and costs in a sequential manner and produces the final “value” for the customer. c) It is a business analysis technique for a company that produces and sells a wide variety of products and is involved in several businesses to determine the products and businesses’ combination that has the most efficient and effective distribution of management resources from a strategic perspective. d) It is a business strategy technique for use in the evaluation of strengths, weaknesses, opportunities, and threats in projects, venture businesses, and other such activities by organizations and individuals that perform decision making in order to achieve a target.
a
84
Which of the following often uses a chart with relative market share for the horizontal axis and market growth rate for the vertical axis, and analyzes the strategic positioning of a company’s products or business? a) ABC analysis b) PPM c) SWOT analysis d) Value chain analysis
b
85
Which of the following is an appropriate purpose of Management Of Technology (MOT)? a) To improve the productivity by using mathematics and natural science in business administration and production management b) To grow a company by effectively connecting technical innovation with the business of the company c) To improve the quality of a company by ensuring that the employees put in efforts systematically to improve the quality of products d) To improve the business process efficiency by acquiring the necessary techniques and knowledge from senior employees through actual business operations at the workplace
b
86
Which of the following is an appropriate case example that corresponds to traceability? a) Taking advantage of the Internet and web technology for the use of computers in education b) Outsourcing all development to an external specialized company without placing any development department within one’s own company c) Sharing knowledge and information among employees across the entire organization, and utilizing it effectively to improve business performance d) Being able to check the history from production up to sales on the basis of the labels pasted on meat and fish products
d
87
Which of the following is a business objective that becomes possible to achieve with “the introduction of a POS system”? a) Improvement in the work productivity of salespersons and organizational strength of the sales department b) Reduction in inventory volume of component parts and partly finished goods c) Optimization of the series of processes from procurement to manufacturing, shipment, and sales d) Improvement in the product lineup at each store and streamlining of ordering and inventory control
d
88
Which of the following is the most appropriate example of crowdfunding? a) A company provides a service that enables use of virtual storage on the Internet. b) A company collects investments from a large number of persons over the Internet. c) A company provides monetary compensation for losses caused by cloudy and rainy weather. d) A company develops a technique for discovering desired information from within large volumes of information, with a high degree of accuracy.
b
89
Which of the following corresponds to the lean production system of efficiently performing high-mix, high-volume production by incorporating production activities such as “just in time” and “kanban,” etc.? a) Not having a production line in one’s own company, and outsourcing production to another company b) Ordering the components required in the production line such that they can be obtained at the time of their requirement, and thus maintaining an appropriate quantity of the in-process items c) Producing the components for the delivery in excess of their predicted demand, and thus eliminating the unnecessary waiting time until delivery d) Having one (1) person in charge of all processes from the start to the completion of manufacturing of a single product, and thus eliminating the transfer of in-process items during manufacturing
b
90
Which of the following terminologies refers to an initiative to develop unprecedented and innovative services by utilizing IT in the field of finance, such as a service provided by a bank where AI manages depositors’ assets automatically? a) FA b) Fintech c) OA d) Sharing economy
b
91
Which of the following is one of the technologies used in deep learning, and represents a mathematical model of the circuits in the human brain? a) Content delivery network b) Storage area network c) Neural network d) Ubiquitous network
c
92
Which of the following is an appropriate effect of CAD? a) It can identify the required volume of material, and place the optimum order. b) It can automate production processes and remove the need for human work. c) It can manage the series of production processes in an integrated manner. d) It can reuse design data and simplify the streamlining of work.
d
93
Which of the following is an appropriate description of “cloud computing”? a) A communication protocol of the Internet b) A service model for providing computer resources c) A method of software development that can flexibly support changes in the specification d) A standard of electronic data exchange that is used in electronic commercial transactions
b
94
Which of the following is the most appropriate term for information in large quantities and in diverse forms that has real-timeness and is expected to help obtain knowledge useful for decision-making? a) Big data b) Diversity c) Core competence d) Crowdfunding
a
95
Attempts are being made to streamline the functions and services of cities and regions and make them more advanced with the use of ICT in order to solve regional problems, and vitalize regions. Which of the following is the most appropriate term to describe such a solution for community development? a) Capacity b) Smart city c) Diversity d) University
b
96
Which of the following is a term for a model where through a service or mechanism matching users and providers, idle assets, such as vehicles, residences, and clothes, that are owned by individuals or companies are lent to others, or services such as providers doing shopping on behalf of another person or giving language lessons in their spare time are provided? a) Cloud computing b) Sharing economy c) Telework d) Work-sharing
b
96
Q97. The table below shows the evaluated scores of the proposals of four (4) vendors from the viewpoints of management, technology, and price. When each score of the management viewpoint, technology viewpoint, and price viewpoint is weighted, and the vendor with the highest total score is selected as the supplier, which of the following vendors is selected?
97
When the system life cycle is divided into the planning process, requirements definition process, development process, and operation/maintenance process, which of the following is the appropriate process to clarify the functions of the system for the implementation of business operations? a) Planning process b) Requirements definition process c) Development process d) Operation/maintenance process
b
98
At power companies, the amount of electricity consumed by each household is measured remotely by communicating with electrical meters that are connected to the Internet, instead of measured by meter readings by a person. Which of the following is a term that represents the mechanism where a range of devices are connected to the Internet and utilize information in cases such as this? a) EDI b) IoT c) ISP d) RFID
b
99
Which of the following are international development targets that are composed of 17 objectives set by the United Nations in order to achieve a sustainable world? a) COP21 b) SDGs c) UNESCO d) WHO
b