April 2023 Flashcards

1
Q

Q1. Which of the following histograms has the largest variance? Here, the scale of the vertical
axis is the same on each histogram and the scale of the horizontal axis is the same on each
histogram

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the appropriate meaning of the units that are shown in the
specifications given in brochures or catalogs?

a) “2-Tbyte hard disk” refers to a capacity of 2× 1012 bytes.

b) “9600-dpi printer” refers to a printing precision of 9600 dots/cm2.

c) “CPU operates at a base clock of 3.3 GHz” refers to operation at a frequency of 3.3× 220Hz.

d) “Modem with a transmission speed of 56 kbps” refers to a minimum transmission speed of 5.6× 210 bits/second.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3. When the reward for an improvement proposal concerning business operations is
determined based on the decision table below, how much is the reward for an improvement
proposal for an improvement of $20,000 and a turnaround time reduction of three days? Here,
“Y” in the table means that the condition holds, and “N” means that the condition does not
hold. In addition, “√” indicates the reward that applies to a specific combination of these
conditions.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q4. Which of the following is the combination of the mean and median of the data?

[Data]
10, 20, 20, 20, 40, 50, 100, 440, 2000

  Mean | Median  a)     20     |   40  b)     40     |   20  c)    300    |   20  d)    300   |    40
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

There is a program that displays text in accordance with the specifications below. When
the original text described below is displayed, in what point size does the program display the
underlined character string? Here, the first character of the original text is displayed in 10 points.

[Specifications]
The characters between <b> and </b> are displayed one point larger than the preceding character.

The characters between <S> and </S> are displayed one point smaller than the preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be nested with each other.

[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>

<S>group-level</S>

computerization</B> from a user’s <S>standpoint</S>.</B>

a) 10

b) 11

c) 12

d) 13

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6. There is a series of numbered boxes stacked as shown in the figure below. The operations
described in the table below are performed in the sequence of operations 1 through 4. When
the operation 4 is completed, which of the following shows the status of the stacked boxes?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an appropriate description concerning the Java language?

a) It is a markup language used for describing Web pages.

b) It is a language developed for scientific and engineering calculations.

c) It is an object-oriented language that provides platform-independent portability.

d) It is a language developed for business-oriented calculations.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithms are important when a computer is used. Which of the following is an appropriate explanation of an algorithm?

a) It refers to software for converting a program to a machine language that can be directly run by a computer.

b) It refers to a processing procedure for enabling a computer to accomplish a particular purpose.

c) It refers to a collective term for artificial languages used to give instructions for a series of operations to a computer.

d) It refers to the designing of buildings and industrial products by using computers.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a term for a list of instructions to a computer that are written in a human-readable programming language?

a) PIN code

b) Source code

c) Binary code

d) Character code

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a standard for wireless communication between a PC and peripheral devices?

a) Bluetooth

b) IEEE 1394

c) PCI

d) USB 3.2

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate description concerning a touch panel?

a) Operations are performed by using a pen-type or mouse-type device for specifying a position on the screen, and a flat-plate input device that detects the position.

b) Movement of a mouse pointer on the screen or other operations are performed by tracing a flat-panel input device with a finger.

c) The movement of a finger is detected by a sensor on the surface, and operations are performed by rotating a component called a wheel that is similar to a disc.

d) There are some types such as resistive or capacitive, and operations are performed on a
computer through direct contact with the screen by a finger.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an appropriate description of a multi-core processor?

a) An improvement in the throughput of the entire system is aimed at by simultaneously executing different processing in each core.

b) An improvement in the reliability of the processing result is aimed at by executing the same processing in several cores.

c) Several cores are controlled by hardware alone, and the OS is not required to have a special function.

d) The throughput of the processor depends only on the number of cores, and does not depend on the clock frequency.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a plug and play function?

a) The automatic playback that is performed when a DVD is inserted

b) The automatic installation of a device driver that supports a newly connected peripheral device to the PC

c) The automatic fault diagnosis for a connected peripheral device

d) The automatic periodic virus scan of a disk drive

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an explanation of a dual system?

a) It is a computer system in which exactly the same processing is performed in two
computers, and its reliability is assured by cross-checking the results.

b) It is a computer system that is composed of a primary system used usually and a secondary system kept on standby in preparation for a failure.

c) It is a distributed processing system with computers connected via a peer-to-peer network.

d) It is a distributed processing system that has a clear hierarchichy of computers connected via a network.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q15. When information processing systems are classified by their processing methods as
shown in the figure below, which of the following is an explanation of a horizontal load
distribution system?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an appropriate description of batch processing?

a) A method of processing data all together by collecting the data of a certain duration or a certain quantity

b) A method of executing a process immediately when a request for processing of data is made, and returning the result of the process within a short time limit such as a few seconds

c) A method of distributing processes to multiple computers or processors, and reducing the time of execution

d) A method of processing where a computer responds to a request for processing from a user, executes processes and proceeds with activities as if it is having a conversation with the user

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the most appropriate purpose of installing a business application software package instead of developing own application software?

a) To enhance the environment of development

b) To reduce the cost of development

c) To acquire the knowledge of software development methods

d) To improve the skills of application developers

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the most appropriate method for limiting the content of database to be displayed in accordance with its confidentiality and each user’s business needs?

a) Setting up access rights based on the combination of data and user

b) Distributing a copy of the database limited to each user

c) Setting up a set of data items (columns) dedicated to each user

d) Setting up a password for each record in order to protect data

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an appropriate description concerning OSs used for PCs?

a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.

b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary storage device, to application programs.

c) Since an OS has the function of automatically converting character set of a text in a file, application programs can display the text properly without regard to the character set.

d) The source code of an OS is required to be disclosed so that application programs can be free to use the various functions of the OS.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q20. Which of the following is an appropriate combination of the terms and explanations A
through D concerning the file system of a hierarchical directory structure?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is an appropriate explanation of a deadlock?

a) It is a state in which the processes of a computer are prohibited from getting any access including accidental access to information that must not be accessed.

b) It is a state in which, if the login attempt of a user fails more than a predefined number of times, the user is prohibited from logging in to the computer for a predefined time period or until a system administrator resets the user account.

c) It is a state in which, when common resources are exclusively used, two or more processes are endlessly waiting for each other to release a common resource.

d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Among the descriptions A through C concerning OSS (Open Source Software), which of the following is the list that contains all appropriate descriptions?

A: Some software is distributed only in compiled binary format, not in source code format.

B: The license can restrict the field of use or users (individuals or groups).

C: The Linux OS and the PostgreSQL relational database management system are some examples.

a) A

b) A, B

c) B, C

d) C

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of the following can most likely occur?

a) Viruses is not detected.

b) Data is not written correctly.

c) Data is not read correctly.

d) Stored data is not read quickly

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is an appropriate explanation of web accessibility?

a) It is a marketing technique that utilizes websites.

b) It is a mechanism that aims at unifying the design of web pages.

c) It is the extent to which anyone can receive and transmit information by using the web regardless of age or physical condition.

d) It is a mechanism where a web server starts a program and dynamically generates the web contents based on the information sent by the user to a website.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is the most appropriate explanation of virtual reality?

a) Improving the GUI not by displaying an image gradually from top to bottom, but by first displaying a coarse mosaic-like image, and then by gradually increasing the sharpness of the image

b) Enabling computer-simulated objects and spaces to be perceived like the real world by using computer graphics or other techniques

c) Conducting computer simulations instead of, among others, the wind-tunnel test used for the design of cars and airplanes

d) Combining images of separately shot scenery and people to create an image that is different from the real world

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is a service that provides disk space on a server connected to the Internet for storing files and allows users to read and write data from anywhere inside or outside their homes?

a) Archive

b) Authoring

c) Online storage

d) Flash memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an appropriate purpose of normalizing the data of a relational database?

a) To improve the compression ratio of data

b) To retain the consistency of data

c) To prevent the leakage of data

d) To enable the simultaneous access of data

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Q28. Which of the following is a term for an operation that extracts only the rows (records)
with a price of 100 yen or more, from the “Product” table of a relational database?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Q29. When an activity for building a relational database is divided into steps A through C below, which of the following is an appropriate order of the steps?

A Identifying the data items to be used in the business operation

B Creating tables

C Inserting records

a) A → B → C

b) A → C → B

c) B → A → C

d) B → C → A

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Q30. Which of the following is an appropriate combination of the protocols that are used for
transmitting and receiving e-mail as shown in the diagram below?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is placed between an internal network and an external network in order to prevent unauthorized access from the external network to the internal network?

a) DHCP server

b) Search engine

c) Switching hub

d) Firewall

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is an appropriate effect of replacing IPv4 with IPv6?

a) Problems no longer occur when two or more devices that can be accessed directly from the Internet have the same IP address.

b) The shortage of IP addresses that can be used on the Internet is resolved.

c) It becomes possible to use optical fibers for connecting to the Internet.

d) The communication speed on the Internet is increased.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is a mechanism by which, if an e-mail is sent to a specific e-mail address, the e-mail with the same content is distributed to multiple e-mail addresses that have been registered to the specific address?

a) Web mail

b) Chain mail

c) Mailing list

d) Reply mail

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Among the cases of communication between PCs, servers, communication devices, printers, and other devices, which of the following needs to use a WAN?

a) Multiple PCs and a file server are connected to a LAN in Osaka branch office, and files stored in the file server are made to be accessible from any PC connected to the LAN.

b) Inside a house, a PC and a printer are connected with Bluetooth, and documents created on the PC are printed on the printer.

c) Inside a server room, a PC and a web server are connected to a hub, and the web server is maintained from the PC.

d) A PC connected to the LAN in Kyoto-City sales office accesses the server in Tokyo
head office and uploads sales information.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is an appropriate explanation of a keylogger that is a threat to information security?

a) Stealing information by watching the keyboard input and the display output from behind a PC user

b) Monitoring and recording the keyboard input on a user’s PC

c) Identifying a password by using a dictionary of the words that are likely to be used as passwords

d) Searching for a access point that allows unauthorized access by moving around a town with a PC that can detect the electromagnetic waves of a wireless LAN

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is the most appropriate explanation of phishing?

a) A computer infected with a virus is controlled without owner’s consent from an external location via a network such as the Internet by the functions of the virus.

b) A false e-mail is sent, in order to lead the recipient to a fake website or to an imitation of an existing website, and then to illegally obtain personal information.

c) When user’s data sent to a website is displayed as is, its vulnerabilitiy is exploited in order to embed in a page a malicious script that illegally obtains the information about user who displayes the page.

d) A resident program is placed on a PC without the knowledge of the users in order to illegally obtain data in files or information about PC operations.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is a form of direct damage to a server that is caused by a DoS attack?

a) The encrypted data on the server is decrypted.

b) The administrator password of the server is changed.

c) The server is infected by a virus.

d) The services of a server are interrupted.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Among the countermeasures A through D concerning information security, which of the following is the list that contains all and only the appropriate countermeasures for virus
infections?

A: Installing antivirus software
B: Applying a security patch (i.e., update module)
C: Setting a password for the hard disk
D: Encrypting files

a) A, B

b) A, B, C

c) A, D

d) B, C

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Among the descriptions A through C concerning PKI, which of the following is the list that contains all and only the appropriate descriptions concerning a digital signature in email?

A The recipient can check whether the sender is the intended person.

B It is possible to prevent e-mail from being read before it reaches the recipient.

C The recipient can confirm that the e-mail has not been tampered with.

a) A, B

b) A, C

c) B, C

d) A, B, C

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is the general name for evil-minded software such as a key logger or worm?

a) Shareware

b) Firmware

c) Malware

d) Middleware

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Q41. In the description below concerning risk management in information security, which of
the following is an appropriate combination of words or phrases to be inserted into the blanks
A through C?

A
42
Q

IDs and passwords are leaked from the first website, and the users of this website suffer from a password list attack on the second website. In this case, which of the following is the problem concerning the IDs and passwords for the second website?

a) The ID and password are sent via unencrypted communication.

b) The same IDs and passwords as the first website are set.

c) Password are set with a combination of a small variety of characters.

d) Short passwords are set.

A

b

43
Q

Among the types of authentication I through IV, which of the following is a list that contains all and only biometrics authentication?

I PIN (Personal Identification Number)
II Iris
III Fingerprint
IV Vein

a) I, II, III

b) II, III

c) II, III, IV

d) IV

A

c

44
Q

When information security management is based on the PDCA cycle, which of the
following corresponds to C?

a) The objectives, processes, and procedures for information security are established.

b) Improvement is made through corrective and preventive actions on the basis of an evaluation.

c) Processes and procedures are introduced and operated.

d) Effectiveness of the processes are measured and evaluated.

A

d

45
Q

Which of the following is a protocol that is used for encrypted HTTPS communication
between a web server and a web browser?

a) SEO

b) SPEC

c) SQL

d) TLS

A

d

46
Q

Which of the following is an appropriate explanation of software maintenance?

a) During system development, each program that has been created on the basis of the detailed design is verified and corrected as appropriate if any error is detected.

b) Programs are corrected or revised for the purpose of the stable system operations and the catch up with the development of information technology and changes in business
strategy.

c) When a question is asked by a system user, the question is recorded and transferred to the appropriate department, and the final response is recorded.

d) From a wide range of perspectives, the system including software is evaluated, and it is determined whether or not the system is contributing to the business operations.

A

b

47
Q

When system development progresses in the sequence of system requirements definition, external design, internal design, and programming, which of the following is the most appropriate phase for defining the layout of screens and the format of forms?

a) External design

b) Internal design

c) Programming

d) System requirements definition

A

a

48
Q

Mr. A, a participant in system testing, has no access to the internal structure of the system or software and prepares input data and output data for common transactions in the department for purpose of verification. Which of the following is the testing technique that
Mr. A is going to implement?

a) Inspection

b) Walk-through

c) Black-box testing

d) White-box testing

A

c

49
Q

Among a series of tests of software, which of the following is implemented mainly by
the user who orders the development of the software?

a) Acceptance test

b) Integration test

c) System test

d) Unit test

A

a

50
Q

Software development models include the waterfall model, spiral model, prototyping
model, and RAD, etc. Which of the following is the most appropriate explanation of the waterfall model?

a) After all activities in each phase in the development are complete, the project proceeds to the next phase.

b) The functions to be developed are divided, and each function is efficiently and swiftly developed with the use of development tools and parts.

c) At an early phase in software development, working sample software is created that enables users to visually confirm requirements.

d) The functions of software are divided, and the software is gradually completed through repeated design and development for each function so that feedback from users can be
incorporated.

A

a

51
Q

At the beginning phase of a new personnel system development project, in order to clarify the risks, the persons in charge of the planning department, personnel department, and
information systems department, who act as the project team members, get together and make a list of the risks that they can think of concerning the project. What is such a method called?

a) Walk-through

b) Critical path method

c) Simulation

d) Brainstorming

A

d

52
Q

Among the measures A through C for risk treatment to be considered when a new product is developed, which of the following is the list that contains all and only appropriate measures
for reducing quality-related risks?

A: Developing the product by using proven technology
B: Purchasing insurance against development delays
C: Creating a prototype of the product

a) A, B

b) A, C

c) A, B, C

d) B, C

A

b

53
Q

Which of the following is an appropriate description concerning decomposition that is performed to create the WBS of a system development project?

a) It is desirable that decomposition be performed up to the level that the cost and time required to create development deliverables can be estimated and manageable.

b) When system development is outsourced, the customer should entrust all decomposition of deliverables to the developer that creates the deliverables.

c) Since a project’s progress report meetings are a means of communication, they are not subject to decomposition.

d) If the developer has some experiences in developing similar systems, the developer does not need to perform decomposition again.

A

a

54
Q

After the start of a project, the scope is defined by collecting the requirements for the project. Which of the following is the most appropriate purpose of defining the scope?

a) To clarify the activities to be implemented in the project

b) To create the action plan against the risk that has been realized in the project

c) To create an action plan for the delay of the project

d) To clarify the objectives of the project

A

a

55
Q

A system development project at a company is starting to become delayed. In order to resolve the delay, the project leader proposes to project members that part of the planned work procedure be omitted. The opinion of the project members is divided into those who think
that this cannot be avoided and those who are opposed because the quality will decrease. From the perspective of ensuring quality in a project, which of the following is the most appropriate action for a project leader to take?

a) Discussing detailed measures against decrease in quality within the project, and building consensus as a project

b) Deciding whether to accept or reject a proposal with a majority decision by highly skilled people from among the project members

c) Adopting the project leader’s proposal because the project leader has the most
experience

d) Replacing project members who cannot agree with the project leader’s proposal

A

a

56
Q

When the management of a project is divided into progress management, quality management, and cost management, which of the following is most appropriate to be checked in progress management?

a) Whether an integration test is conducted exhaustively from a variety of viewpoints

b) The degree of an increase in cost in the future

c) The degree of the impact on the entire schedule by a delay in an activity

d) Whether a procedure has been established for a design review for finding defects in the
design

A

c

57
Q

There is a project with a development period of 10 months and a labor cost budget for development of 10 million yen. After the elapse of five (5) months, the actual labor cost is recorded as 6 million yen, and 40% of the deliverables is complete. If the development is
continued till completion with the same productivity, how much will the excess of the budget for labor cost be?

a) 1 million yen

b) 2 million yen

c) 2.5 million yen

d) 5 million yen

A

d

58
Q

Which of the following is the most appropriate activities of a service desk?

a) Eliminating the root cause of an incident and preventing the recurrence of the incident

b) Installing updated software in order to prevent the recurrence of an incident

c) Performing centralized management of changes in a service

d) Receiving and recording inquiries from users

A

d

59
Q

Q59. In a certain IT service, four (4) priority levels are set for system changes: urgent, high,
medium, and low. Among the proposed system changes, which of the following is the change
that should be classified as “urgent”? Here, regular release is scheduled at the end of each
month.

A
60
Q

Which of the following is an appropriate explanation of facility management?

a) It refers to the monitoring of compliance with SLAs and their periodical reviewing, for the purpose of maintaining and managing IT service levels.

b) It refers to a method for optimizing ownership, operation, maintenance, etc. of buildings and physical IT infrastructures from a business standpoint.

c) It refers to the continuous improvement of business processes to increase the quality of products and services.

d) It refers to sharing and managing information across the departments and the companies that participate in the series of processes from component procurement to manufacturing, distribution, and sales.

A

b

61
Q

In order to automatically respond to queries from users of an IT service, it was decided to install a chatbot. Which of the following is the most appropriate management process where such automation by a chatbot is effective?

a) Incident management

b) Configuration management

c) Change management

d) Problem management

A

a

62
Q

Which of the following is the appropriate description concerning SLM in an IT service?

a) In SLM, maintaining the service level that is agreed upon in the SLA is the highestpriority issue. Therefore, improving the service quality becomes a secondary activity.

b) In SLM, in order to measure the level of achievement of the quantitative targets agreed upon in the SLA, the service performance is monitored and reviewed.

c) The objective of SLM is to obtain a common understanding of the service, the level of requirements, and other details with customers, and the creation of an SLA is the final objective of the activity.

d) In order to make SLM an effective activity, it is important to set the service level agreed upon in the SLA to an easily-attainable level.

A

b

63
Q

As a part of internal control, access management conforming to the segregation of duties is implemented for the use and operation of an information system. During the development
of the information system, which of the following is an appropriate process to start taking access management into account?

a) Requirements definition

b) Programming

c) Test

d) After operation start

A

a

64
Q

Types of governance within a company include IT governance and corporate governance. Which of the following is an appropriate explanation of the positioning of IT governance?

a) IT governance and corporate governance are the same concepts.

b) IT governance and corporate governance are opposing concepts.

c) Corporate governance is one (1) component of IT governance.

d) IT governance is an indispensable element of corporate governance.

A

d

65
Q

When an external systems auditor conducts a systems audit of a company as an outsourcing service, which of the following is an appropriate action by the external systems auditor?

a) Writing the audit report in such a way that no disadvantage is caused to the managers of the company

b) Disclosing to the public the entire information obtained by the systems audit

c) Concluding a contract that audit fee is paid according to the number of findings, and then conducting an audit

d) Making audit judgements on the basis of sufficient and appropriate audit evidence

A

d

66
Q

Q66. Which of the following has a negative correlation between temperature and total sales?

A
67
Q

Among the parts of a cash flow statement, which of the following is the part where the income from product sales is reported?

a) Operating activities

b) Financing activities

c) Investing activities

d) Administrating activities

A

a

68
Q

Among the senior management positions, which of the following is the highest-ranking person who exercises control over the information systems?

a) CEO

b) CFO

c) CIO

d) COO

A

c

69
Q

Q69. Which of the following is the appropriate combination of words and phrases to be
inserted into blanks A and B in the description below, concerning companies of making and
receiving investments?

A
70
Q

Among company rules, which of the following is a rule that implements segregation of duties?

a) Rule that defines the management organization that is the foundation of the company

b) Rule that defines the role, responsibilities, and authority of each department and each employee

c) Rule that defines employees’ working conditions and other matters related to
employment

d) Rule that defines proper conduct in terms of laws, regulations, and social norms

A

b

71
Q

Which of the following is the appropriate term that refers to a variety of individuals with different sex, age, nationality, experience, and the like?

a) Glass ceiling

b) Diversity

c) White collar exemption

d) Work-life balance

A

b

72
Q

Q72. A certain product’s sales plan and sales result are shown in the table below. What is the
ratio in percentage of the profit result to the profit plan? Here, the decimal fractions of the
ratio are truncated.

A
73
Q

Q73. Which of the following is an appropriate combination of the standards and their
applicable fields?

A
74
Q

Which of the following is free software that can be copied or modified freely without permission from the author?

a) Shareware

b) Package software

c) Public domain software

d) Utility software

A

c

75
Q

Which of the following is appropriate as a characteristic of the QR code?

a) The code can contain only single-byte alphanumeric characters and symbols.

b) The amount of information that can be stored is equivalent to that of a barcode.

c) The code can be read from any direction including the top, bottom, left, and right.

d) The code has a two-dimensional structure in which three barcode layers are stacked.

A

c

76
Q

Among the lists of corporate activities A through D, which of the following is the list that contains all activities concerning the establishment of compliance?

A: Supporting fine art and cultural activities
B: Training employees in the codes of conduct
C: Performing activities for prevention of global desertification
D: Creating a mechanism for whistle blowing

a) A, B

b) A, C

c) B, D

d) C, D

A

c

77
Q

Which of the following is the most appropriate example of standardization in the manufacturing industry?

a) Daily workload is balanced, and the types and volume of components taken daily in from the previous process are equalized.

b) In order to streamline the production process, common components and procedures are used for manufacturing.

c) In order to improve the speed of a production management program, the optimum algorithm is selected.

d) Production planning, production processes, and working methods are simplified through a reduction in product types and a review of work details.

A

b

78
Q

Which of the following is the most appropriate description of NDA?

a) It is a specialized organization that monitors and analyzes threats to the information systems in a company, etc.

b) It is a contract that makes the contracting parties agree to hold and maintain in confidence the confidential information of the other party.

c) It is an agreement of an objective quality standard that is concluded between a service provider and the user concerning the service provided.

d) It is a hierarchical decomposition of the tasks to be implemented in a project.

A

b

79
Q

There are two types of performance indexes: one to evaluate the achievement level of a goal and the other to evaluate the method for achieving a goal. When the goal is to “improve the English ability of employees,” which of the following is an appropriate index to represent
the achievement level of this goal?

a) The ratio of employees’ awareness of a message from the company president concerning the importance of learning English is 80% or more.

b) The ratio of employees who get a mark of 650 or higher in an English test is 60% or more.

c) The ratio of employees who participate in an English test is 90% or more.

d) The ratio at which a company’s monthly English training course is held as planned is 90% or more.

A

b

80
Q

Which of the following is an appropriate example of alliance in corporate strategy?

a) By a merger or acquisition, although confusion and friction arises because of
participation of a partner company with a different culture, tangible and intangible
resources are acquired.

b) By outsourcing the non-core activities of a company to some specialized vendors or service providers, the company shifts the staff members to its mission-critical activities.

c) By technological tie-ups, outsourcing of production and sales, and establishment of joint ventures, several companies strengthen their cooperation while maintaining their independence.

d) By holding the stocks of group companies, a company is managed and operated in the form of a company that is specialized to function as a headquarters of such companies.

A

c

81
Q

Which of the following is an appropriate explanation of SWOT analysis?

a) It is a technique for deriving the future direction of corporate activities by analyzing opportunities and threats underlying in the external environment surrounding the company, and the strengths and weaknesses of the company.

b) It is a technique of evaluating and analyzing the business performance of a company in a well-balanced manner, from the perspectives of finance, customer, internal business processes, and learning and growth.

c) It is a technique of designing corporate activities from the viewpoint of what kind of value the in-house activities finally generate for customers and whether this satisfies the customers.

d) It is a technique of plotting a business on a matrix created by the two (2) quantitative values of market growth rate and market share, and then optimizing the allocation of
resources.

A

a

82
Q

As segmentation in marketing, consumers are classified on the basis of the attitude
toward product purchase. Which of the following is an appropriate attitude toward product purchase of a consumer called an opinion leader?

a) Conveying one’s evaluation of a product to friends and acquaintances after the product becomes popular

b) Taking into consideration their friends’ evaluation and public opinion when deciding whether to purchase a product

c) Waiting for the sales of a new product to start, and being eager to acquire it before friends and acquaintances

d) Purchasing a new product in its initial phase of sale, and conveying information about the product to friends and acquaintances

A

d

83
Q

Which of the following is a marketing technique that seeks to analyze the needs of each individual person and provide products and services that fulfill those needs?

a) Social marketing

b) Telemarketing

c) Mass marketing

d) One-to-one marketing

A

d

84
Q

Which of the following is the most appropriate as the underlying concept of CRM?

a) The source of profit is the choice of an area with little competition and the entry into the area before competitors.

b) The source of profit is the construction and maintenance of a good relationship with the customer.

c) The source of profit is the shorter product life cycle.

d) The source of profit is the obtaining of a large share in a specific market.

A

b

85
Q

Q85. In the promotion of technology development, charts such as the one shown below are
used for evaluating its progress or for checking its consistency with related technologies.
What is the name of this sort of chart that shows on the time axis the route toward progress
in required functions, underlying technology, etc. through research and development
initiatives?

A
86
Q

Which of the following shows a method that adheres to compliance, and sends
advertisement e-mails and collects personal information only to/from the users who provided an explicit agreement in advance?

a) Activation

b) Opt-out

c) Opt-in

d) Whitelist

A

c

87
Q

Which of the following is the system that is housed in home electric appliances, such as rice cookers and air conditioners, and is used to implement the specific functions of such appliances?

a) Expert system

b) Enterprise system

c) Embedded system

d) Simplex system

A

c

88
Q

Which of the following is a form of e-commerce corresponding to an online bookstore or an online shopping mall that is targeted at individuals?

a) B to B

b) B to C

c) C to B

d) C to C

A

b

89
Q

Which of the following is an appropriate explanation of an ERP package?

a) As it is a system that comprehensively supports business unique to an industry, it is used only for certain industry sectors such as the mobile phone business.

b) As it is a system specific to the financial accounting process, the function of passing accounting data to the general accounting process must be developed or purchased separately.

c) It is an integrated business system that processes various business-related applications, and is used in companies of various sizes in various industry sectors.

d) It is a system that integrates sales, purchasing, and financial accounting, and is a system specialized for the use by small company such as individually-owned shops.

A

c

90
Q

Which of the following is a general term for techniques or methods for trying to make the homepage of one’s own company to be displayed at a higher rank in the search results of a search engine on the Internet?

a) DNS

b) RSS

c) SEO

d) SNS

A

c

91
Q

Which of the following is the most appropriate example of the utilizing artificial intelligence?

a) A system controls the acceleration, steering, and braking of an automobile without intervention by the driver.

b) A person can check occupancy for a conference room or toilet in real time from his or her desk in an office.

c) Approval for a transaction is granted through distributed consensus building technology without the need for a central administrator, such as a bank.

d) A person enters information in advance from a PC at his or her house in order to perform a money transfer automatically without going to the bank.

A

a

92
Q

Crowdfunding can be classified into loan-based, donation-based, purchase-based, or investment-based types, depending on the differences in the form of funding and the way the compensation is received. In order to start a new business, Company A has decided to raise funds through crowdfunding and pay a part of the profits to the funders as dividends. Which
of the following is the most appropriate type of crowdfunding used by Company A?

a) Loan-based crowdfunding

b) Donation-based crowdfunding

c) Purchase-based crowdfunding

d) Investment-based crowdfunding

A

d

93
Q

Which of the following is the most appropriate characteristic of BPM (Business Process Management)?

a) In order to resolve a business issue, the introduction of a mechanism of management according to international standards is required.

b) The processes are analyzed, and problems are identified for continuous improvement of the processes.

c) The efficiency of business processes is promoted by outsourcing some of them to external vendors.

d) Business processes are fundamentally reviewed and redesigned.

A

b

94
Q

Which of the following is the general name of software that has various functions such as e-mail and chat, information sharing, and video conferencing?

a) Groupware

b) Shareware

c) Firmware

d) Freeware

A

a

95
Q

Which of the following is the most appropriate description concerning DFD?

a) It represents transitions of the state of a system as time passes and the situation changes.

b) It represents the relationship and data structure of the entities handled by a system.

c) It represents the attributes of, operations for and relations between the elements that a system is composed of.

d) It focuses on the flow of data, and represents the relations between the flow and the processing of data.

A

d

96
Q

Which of the following is a company that provides access to the Internet?

a) ASP

b) ISP

c) SaaS

d) SNS

A

b

97
Q

Which of the following is an explanation of “acceptance testing” performed for a new
system?

a) Checking the estimate submitted by the vendor prior to placing an order based on the result of the check

b) Checking whether the deliverables provided by the vendor conform to the requirements specifications

c) Requesting the vendor to study and submit the proposal for a new system

d) Requesting the vendor to provide information for the purpose of collecting information on the technologies that can be applied to a new system

A

b

98
Q

Q98. In the development of a consolidated accounting system, functional requirements and
non-functional requirements were classified as shown in the table below. Which of the
following is the appropriate requirement to be inserted into blank A?

A
99
Q

For the reconstruction of a business system, an RFI is scheduled to request multiple vendors to submit an implementation image of the new system. In that regard, which of the
following is appropriate information that the vendors are requested to submit at the same time?

a) Overview of the current system

b) Aim for system reconstruction

c) Requirements of the new system

d) Applicable technology and its trend

A

d

100
Q

In an online service, a website with a newly created design and a website with a
conventional design were run in parallel experimentally to compare them and find out the one that makes its users more likely to apply for paid services. Which of the following is the most appropriate technique used at this time?

a) A/B test

b) ABC analysis

c) Cluster analysis

d) Regression test

A

a