May 2015 Flashcards

1
Q

Q1.) As shown in Figure 1, there is a box that generates a single output in response to two
inputs. The input to this box is either “Agree” or “Disagree.” The output “Agree” is
generated only when both inputs are “Agree,” and in other cases the output “Disagree”
is generated. When three inputs are entered into two boxes as shown in Figure 2,
which of the following is the correct description concerning the output? Here, each
box of Figure 2 has the same function as the box of Figure 1

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A single-sided single-layer DVD-R has a storage capacity of about 4.7 Gbytes. When
a book has 700 double-byte characters that are printed per page, how many tens of
thousands of pages, at maximum, can be recorded on this DVD-R? Here, two bytes
are required to record one character, and only character information is stored. In
addition, 1 Gbyte is 1 billion (10^9) bytes.

a) 42

b) 71

c) 335

d) 671

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3.)
An analog sound signal is digitized. Sampling is performed at Time 1 through Time 5
in the figure below, and four-level quantization is performed; in other words, the levels
closest to the sampling point are selected. After that, two-bit encoding is performed.
The result is “11 01 00 10 11”. When digitization is performed in the same way,
which of the following figures represents the sound signal that results in “01 00 10 11
01”?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The procedure described below is executed for two variables x and y, in order from
step (1) through step (4). When the procedure is completed, what is the resulting
value of x?

[Procedure]
(1) Assign 2 to x, and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, terminate the procedure. Otherwise, return to step (2).

a) 4

b) 5

c) 7

d) 8

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an appropriate description concerning the Java language?

a) It is a markup language that is used for describing web pages.

b) It is a language that is developed for scientific and engineering calculations.

c) It is an object-oriented language that provides platform-independent portability.

d) It is a language that is developed for business-oriented calculations.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6. )
The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” indicates that the content of “x” is replaced with the data of
“y”.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the
program display the underlined character string? Here, the first character of the
original text is displayed in 10 points.

[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.

[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>

<S>group-level</S>

computerization</B> from a user <S>standpoint</S>.</B>

a) 10

b) 11

c) 12

d) 13

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate explanation of HDMI?

a) It is an interface for an audio-visual device that handles the input and output of video,
audio, and control signals through a single cable.

b) It is an interface that makes use of the infrared rays used for the exchange of information
between cell phones.

c) It is a serial interface that connects a peripheral device, such as an external hard disk,
through a cable.

d) It is a wireless interface that makes use of radio waves and can communicate even when
there is a slight shielding.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is implemented in a computer system in order to perform the
role of transferring data between the CPU and memory, or between the CPU and I/O
devices?

a) Bus

b) Hub

c) Port

d) Router

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an appropriate description concerning flash memory?

a) It is a type of rewritable memory that can erase all its content with ultraviolet light.

b) It can read out data at a high speed, and therefore, it is often used as cache memory.

c) It is a type of non-volatile memory that can erase and rewrite all or part of its content
electrically.

d) It is a type of memory that requires refresh operations and is widely used as main
memory.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate explanation of the hot standby system?
a) It is a system where a collection of various types of hardware, software, and data on
the Internet is provided to the user.

b) It is a system where a high level of reliability can be obtained by simultaneously
operating the two sets of equipment and performing the same processing while
cross-checking the results.

c) It is a system where a backup machine is always kept on standby in an operable state
and is immediately switched into operation at the occurrence of a failure.

d) It is a system where a backup machine is arranged, and at the occurrence of a failure,
the operator in charge starts up the backup machine to switch the production
machine to the backup machine.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate explanation of some functional units that
constitute a computer system?

a) The arithmetic and logical unit performs calculation processing at the direction of
the control unit.

b) The arithmetic and logical unit exchanges data with the control unit, the input unit,
and the output unit.

c) The memory unit requests the arithmetic and logical unit to perform calculation
processing and stores the results.

d) The memory unit requests the output unit to read out data from the memory unit.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When MTBF is 600 hours and MTTR is 12 hours, what is the approximate
availability?

a) 0.02

b) 0.20

c) 0.88

d) 0.98

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a method or technique that is used to connect multiple
computers over a network such as a LAN or the Internet, and makes these computers
available as if they were a single high performance computer?

a) End user computing

b) Social computing

c) Grid computing

d) Pervasive computing

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an appropriate description concerning the OS for PCs?

a) Only one type of OS can be installed and executed on one PC.

b) There is no OS for PCs that are equipped with a 64-bit CPU.

c) When an OS is upgraded to a new version, any software operating with the old
version of the OS can no longer be used.

d) There exist some OSs for PCs that can be started up by using an external storage
device, such as a CD-ROM and USB memory, other than the hard disk.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q16. )
In the hierarchical structure shown in the figure below, when the current directory is
marked with an asterisk (*), which of the following is the absolute path of the same
directory as the directory specified by the relative path “....\B\B”?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the image data that is pasted onto the documents or Web
pages created by the word-processing software or presentation software in order to
improve the representational power?

a) CSS

b) CAPTCHA

c) Clip art

d) Template

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q18. In comparison with the program execution method where programs are started and
executed sequentially, which of the following is an appropriate description concerning
characteristics of the method where multiple programs are started and executed
concurrently while switching between them in response to events such as input/output
requests?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is software that can be used free of charge on a trial basis but
requires a usage fee if it continues to be used after the trial period?

a) Groupware

b) Shareware

c) Adware

d) Freeware

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In comparison with the complier-based language processing, which of the following is
an appropriate description concerning the interpreter-based language processing?

a) Programs are executed at a slower speed.

b) Recursive function calls are not allowed.

c) Source programs are translated into machine language prior to execution.

d) It is not suited to an interactive operation environment.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an appropriate explanation of a general purpose computer that
is also known as a mainframe?

a) It is an ultra-small computer in which the CPU, main memory, and interface circuits
are embedded in a single chip.

b) It is a large computer that is used for a wide range of applications from office
processing to technical calculations, including mission-critical business as the main
target.

c) It is a client-dedicated computer that is equipped only with the minimum functions,
such as data entry and display, in the configuration of a system where resources,
such as the application programs and files, are managed at the server side.

d) It is a portable information terminal where functions, such as schedule management,
address book, and e-mail, are made available in a device that is small enough to fit
into the palm of one’s hand.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the unit that represents the resolution when a photograph or a picture is read by a scanner?

a) dpi

b) fps

c) pixel

d) ppm

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When a relational database is constructed according to the processes (A through C)
below, which of the following is the appropriate execution sequence?

A: Identifying the data items to be managed

B: Analyzing the target business operations

C: Creating the relational database tables

a) A → B→ C

b) B → A→ C

c) B → C → A

d) C → A → B

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q24. )
When the “Department,” “Location,” and “Employee” tables are joined to create Table
A, which of the following is the “Employee” table that is to be joined? Here, an
underline indicates a primary key, and a dotted underline indicates a foreign key.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a service that provides disk space on a server connected to
the Internet for storing files and allows a user to read and write data from anywhere
inside or outside the home?

a) Archive

b) Authoring

c) Online storage

d) Flash memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is an appropriate description concerning a wireless LAN?

a) A wireless LAN cannot be used with hardware other than a PC.

b) A wireless LAN has an operation mode that allows a one-to-one connection without
any access point.

c) The encryption standards are unified into one type.

d) When there are no barriers, communication can be performed regardless of the
distance.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a PC is connected to a network, which of the following is the protocol that is
used for automatically obtaining the IP address?

a) DHCP

b) HTTP

c) NTP

d) SMTP

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Q28. Three PCs and an Internet-capable TV (television) set are to be connected to the
Internet by using a hub and a router that has a firewall function. Which of the
following is the appropriate connection that enables the firewall function of the router
to be used for all devices? Here, “FW” in the figure indicates the firewall function.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In IPv4 (IP version 4), about 4.3 billion IP addresses can be defined. In IPv6 (IP
version 6) that is intended to replace IPv4, how many bits are used as the length of an
IP address?

a) 32

b) 64

c) 128

d) 256

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Q30. In order to implement communication between applications via a network, a certain
number of protocols are used in a hierarchical structure. Which of the following is
the appropriate combination of the protocol names to be inserted into blanks A and B in
the description below?

When a web page is viewed on the Internet, the browser and the web server use a
protocol called A .
Communication based on this A uses a
protocol of a lower layer called B and a protocol of a further lower layer
called IP (Internet Protocol).

A | B
a) FTP | Ethernet
b) HTTP | TCP
c) SMTP | POP3
d) WWW | HTML

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is a form of direct damage to a server which is caused by a
DoS attack?

a) The encrypted data is decrypted.

b) The administrator password is changed.

c) The server is infected by a virus.

d) The services of a server are interrupted.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is one of critical factors of information security that can be
improved by setting the mirroring disks in a RAID system?

a) Availability

b) Confidentiality

c) Authenticity

d) Accountability

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is a network area that is logically isolated from both a
company’s internal network and an external network, and is set up to ensure that no
harm is caused to the internal network even if a server that is installed within the
network area is accessed from the outside in an unauthorized manner?

a) DMZ

b) DNS

c) NAT

d) SSL

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is an appropriate explanation of a zero-day attack?

a) In order to search for a vulnerable TCP/IP port that can be used as an entry point for
unauthorized intrusion, an attacker accesses a server while changing port numbers in
sequence.

b) An attacker obtains important security information, such as a password, from the
system administrator or user through skilled conversation or peeping, and then
accesses the system illegitimately by posing as the user.

c) When a vulnerability in software is identified, the identified vulnerability is
exploited to perform an attack before a patch for the software is provided by the
vendor.

d) In order to identify the password or crack the encrypted code, an attacker
successively attempts all character strings that are generated by mixing upper-case
characters and lower-case characters of a term from the dictionary, or adding
numeric characters to such a term.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Q35. With regard to malware, which of the following is an appropriate combination of
descriptions (A through C) and keywords?

A: An infected computer performs a fusillade to a specific site or transmits spam
e-mails at the direction of an outside source.

B: The information about users recorded by the key logger or such other method is
collected.

C: A penetration path is set up to perform an unauthorized login to a computer
system from outside.

A | B | C
a) Spyware | Trojan | horse Back door
b) Spyware | Back door | Trojan horse
c) Bot | Spyware | Back door
d) Bot | Trojan horse | Spyware

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Among the descriptions (A through C) shown below, which of the following is the list
that contains only all the appropriate descriptions that are directly effective as a
measure against phishing?

A: When personal information is entered in a web site, it must be confirmed that the
web site uses an SSL connection, and also that the server certificate is valid.

B: When an e-mail urging the transmission of an ATM card number and a personal
identification number is received, its authenticity must be checked using several
methods just to be safe, even if it is from a trusted partner such as a bank of
account.

C: The login password of an e-commerce site must have a sufficient length and
complexity.

a) A, B

b) A, B, C

c) A, C

d) B, C

A

a

33
Q

Which of the following is an appropriate description concerning software
maintenance?

a) Monitoring application program errors

b) Updating the program to resolve defects or problems in the production environment

c) Replacing the server to improve system performance

d) Making data backups on a periodic basis

A

b

34
Q

Mr. A, a developer, is analyzing and verifying the internal structure of a program in
order to determine whether input data is processed as intended. Which of the
following is the test that Mr. A is currently conducting?

a) System test

b) Top-down test

c) Black box test

d) White box test

A

d

35
Q

In system development, which of the following is an appropriate phase or process that
clarifies the quality (e.g., response time) that should be achieved by the system?

a) Acceptance test

b) System requirements definition

c) Software detailed design

d) Programming

A

b

36
Q

Which of the following refers to a developer’s activity that provides the correction of
software errors and faults without any charge, and accepts responsibility for product
liability claims, when the deficiencies are discovered within a certain period of time
after the completion of the acceptance inspection?

a) Warranty against defects

b) SLA (Service Level Agreement)

c) System audit

d) Preventive maintenance

A

a

37
Q

In software development, which of the following is an appropriate description
concerning a system test?

a) It is a test that is performed by the developer in the final stage of development in
order to confirm whether the system requirements are met.

b) It is a test that is performed to confirm whether the system requirements are
appropriately and sufficiently defined.

c) It is a test that performs the unit test and integration test of a program in parallel and
simultaneously.

d) It is a test that is performed by the user independently of the developer in order to
confirm that the completed system is compatible with business operations.

A

a

38
Q

Which of the following is an appropriate description concerning the activities that are
performed in each process of system development?

a) In external design, items on screens and forms are considered.

b) In testing, design documents are reviewed, and system functions are checked in the
documents.

c) In programming, system operation procedures are confirmed by end users.

d) In project execution planning, the internal processing of the system is considered.

A

a

39
Q

Which of the following is an appropriate explanation of reverse engineering?

a) A method for conducting efficient experiments with the fewest possible number of
trials, in consideration for a better combination of multiple factors that should be
confirmed

b) A method for disassembling and analyzing an existing product in order to uncover
its structure and acquire technology

c) A method that transforms work into an ideal form by fundamentally reviewing
workflow and work methods without changing the content of work

d) A method that shortens the time from product development to production, through
the parallel execution of multiple activities that can be performed simultaneously

A

b

40
Q

In a system development project, a flowchart of the development process is created to
perform quality management. Which of the following is an appropriate purpose of
using such a flowchart?

a) To consider where and what kind of problem is likely to occur in the work processes

b) To determine whether the usage rate of the system is within the expected range

c) To identify the relationships between major problems in project execution and latent
causes of the problems

d) To assess the frequency of problem occurrence on a per-cause basis in order to
resolve the causes of the most problems

A

a

41
Q

Which of the following is an appropriate explanation of decomposition that is
performed to create the WBS of a system development project?

a) The cost and time required to create project deliverables can be estimated, and it is
desirable that decomposition be performed up to the manageable level.

b) When system development is outsourced, all decomposition of deliverables should
be left to the discretion of the outsourcee that creates the deliverables.

c) Since a meeting that is held to report the progress of a project is a means of
communication, the meeting is not subject to decomposition.

d) If there are some experiences in developing similar systems, it is not necessary to
perform decomposition again.

A

a

42
Q

In project management, it is necessary to manage cost, time, quality, and other factors.
Which of the following is an appropriate description concerning project management?

a) Since cost, time, and quality differ in order of priority according to constraints, a
balance among these must be achieved.

b) Since cost, time, and quality are all independent of each other, there is no need to
achieve a balance among these.

c) Since cost and quality are in direct proportion to each other, management can be
performed with the focus on either one of these.

d) Since cost and time are in inverse proportion to each other, management can be
performed with the focus on either one of these.

A

a

43
Q

Which of the following is an appropriate activity that is performed in “project scope
management” defined in the PMBOK (Project Management Body of Knowledge)
Guide?

a) Organizing a project team and developing staff members

b) Defining all activities required for a project without any omissions

c) Identifying the stakeholders of a project and deciding the communication method

d) Identifying the project risks and considering appropriate action plans

A

b

44
Q

In a project, each member must perform one-to-one communication for sharing
information. At this time, which of the following is an appropriate description
concerning the relationship between the number of project members and the number of
necessary communication paths?

a) In the case where the number of members increases by one, the higher the original
number of members, the higher the increase in the number of paths

b) If the number of members increases by one, the number of paths also increases by
one.

c) The relationship between the number “x” of members and the number “y” of paths is
represented by y = x!.

d) The relationship between the number “x” of members and the number “y” of paths is
represented by y = x^2
2
.

A

a

45
Q

It takes 10 days for Mr A to complete an activity of program development, and it takes
15 days for Mr. B to complete the same activity. When Mr. A and Mr. B work
together, how many days are required to complete this activity? Here, their individual
work efficiencies remain unchanged even when they work together.

a) 5

b) 6

c) 7.5

d) 12.5

A

b

46
Q

Q50.)
When the arrow diagram below is created to manage a project that consists of eight
activities A through H, which of the following is the critical path of this arrow
diagram?

A
47
Q

Which of the following is an explanation of IT service management?

a) Providing operationally-managed services by an IT-related service company in order
to satisfy customer requirements effectively

b) Verifying the feasibility of whether new IT-related products, new services, or new
schemes can be implemented as business activities

c) Providing efficient services through utilizing IT by organizing and managing
knowledge derived from the past accumulated experiences in an organization and by
sharing it among employees

d) Depicting graphically the market share and industry growth rate of IT-related
services offered by the company, and on the basis of the positioning, developing a
strategy with regard to a clear vision of services

A

a

48
Q

In order to reduce the risk of unauthorized entry into the server room where a computer
system is operating, the decision is made not to indicate the installation location of the
computers. Which of the following is the appropriate management that corresponds
to this measure?

a) Supply chain management

b) Knowledge management

c) Business continuity management

d) Facility management

A

d

49
Q

An SLA contains a written description of arrangements, such as the content of the
service agreed upon between the service provider and the user. Which of the
following is an appropriate merit that is obtained by both the service provider and the
user through concluding an SLA?

a) It is possible to confirm the validity of the charge rate, on the basis of the content of
the service performed.

b) It is possible to share common recognition of the content, scope of provision, and
minimum required level of the service.

c) It is possible to request to change fees when the content of the service is insufficient
or incomplete.

d) It is possible to perform business operations without excessive demands placed on
the content of the service.

A

b

50
Q

In an IT facility such as a data center, which of the following is used to improve the
maintainability and installation efficiency of several types of equipment?

a) Server rack

b) Hub

c) Firewall

d) Router

A

a

51
Q

There exists a bug in a program on PCs that are used for business operations, and a
symptom that a PC becomes unusable is reported to a service desk. From a
perspective of “incident and service request management” in IT service management,
which of the following is the most appropriate action to be taken at the service desk,
prior to handover to problem management?

a) Informing users of how to restart a PC and make it usable

b) Making a plan to distribute a fixed program to the PCs

c) Testing the fixed program

d) Fixing the bug in the program

A

a

52
Q

Which of the following is an appropriate explanation concerning the resolution
processes of IT service management?

a) The root causes of software faults are identified through problem management.

b) The necessity of changes in software is decided through release management.

c) Software versions are managed through incident management.

d) Software is embedded and its operation is verified through change management.

A

a

53
Q

Among the processes necessary for a system audit, which of the following is performed
by the system auditor?

a) Preparation of the audit targets such as operational rules

b) Preliminary assessment of the audit targets

c) Improvement of vulnerabilities in the audit targets

d) Acceptance of the system audit report

A

b

54
Q

Q58. A risk control matrix is used to evaluate the status of achievement of the established
internal controls. In the description below concerning the use of the risk control
matrix, which of the following is an appropriate combination of words or phrases to be
inserted into blanks A and B?
The risks and the A control items are described, and the B is
evaluated.

A | B
a) | candidate | cost efficiency of control items
b) | candidate | degree of risk reduction
c) | implemented | cost efficiency of control items
d) | implemented | degree of risk reduction

A

d

55
Q

In the course of a system audit, which of the following is performed by the auditee (i.e.
the organization or person to be audited)?

a) Verification of improvement results

b) Preparation of an audit plan

c) Creation of an audit report

d) Improvement of business operations

A

d

56
Q

Q60.)
The same type of product is manufactured by allocating sets of assembly parts to three
different factories A, B, and C. The profit of each factory that is based on the
allocated sets of parts is as shown in the table below. How much (in thousand dollars)
is the maximum profit that is obtained by allocating a total of four sets of parts to these
three factories?

A
57
Q

Among the senior management positions in a company or such other organization,
which of the following is the highest-ranking person who exercises control over the
information system?

a) CEO

b) CFO

c) CIO

d) COO

A

c

58
Q

Q62. )
As shown in the table below, a total of 1,000 products with a sales unit price of 1,000
dollars are to be manufactured and sold. Which of the following is an appropriate
description concerning plan A and plan B?

A
59
Q

Which of the following is an appropriate diagram or chart that is used for ABC
analysis?

a) Control chart

b) Scatter diagram

c) Cause and effect diagram

d) Pareto chart

A

d

60
Q

Q64. )
The production line of a product is composed of two processes A and B in that order,
and the number of machines in each process, the work time required for the production
of one component, and the defective rate are as shown in the table below. When the
work time per day is 10 hours, what is the daily production capacity (i.e., number of
non-defective components produced in a day) of the production line? Here, the
defective components of process A are not sent to process B. Furthermore, the
downtime and setup time of machinery, and the inter-process inventory between
processes are ignored, and the components that are being processed are always
completed even when the end time is already reached.

A
61
Q

Which of the following is an appropriate characteristic of the QR code?

a) The code can contain only single-byte alphanumeric characters and symbols.

b) The amount of information that can be stored is equivalent to that of a barcode.

c) The code can be read from any direction including the top, bottom, left, and right.

d) The code has a two-dimensional structure in which three barcode layers are stacked.

A

c

62
Q

Which of the following is an activity of quality management that is based on the ISO
9000 family?

a) Preventive actions for potential problems are implemented at the field staff level,
and are not reported to the management level.

b) Since an audit is performed by a third party on a regular schedule, no internal audit
is performed.

c) Records related to quality are stored in a server in order to share the information
among the interested parties.

d) Although a project consists of the company’s employees and the partner company’s
employees, only the company’s employees are informed of the quality policy.

A

c

63
Q

Which of the following is an appropriate description concerning a “volume license
agreement”?

a) It is an agreement where a master copy is provided to customers, such as companies,
who purchase the software in high volume, and the number of permitted installations
is determined in advance.

b) It is an agreement where the location of use is restricted to a specified facility, and
the software can be used without limiting the number of computers or users in the
facility.

c) It is an agreement where standard licensing conditions are defined and a license
agreement is automatically considered to be concluded between the right holder and
the purchaser when a certain limited number of packages are unwrapped.

d) It is an agreement where the use of software is permitted by accepting the terms and
conditions displayed on the screen when the software is downloaded from the
Internet.

A

a

64
Q

According to the ISO 9000 family, quality is defined as the “degree to which a set of
inherent characteristics fulfills requirements.” When products are evaluated on the
basis of this definition, which of the following is most appropriate as a product with
good quality?

a) A product having no customer complaints and a high level of customer satisfaction

b) A product that a company produces in-house without outsourcing

c) A product designed and manufactured using CAD and CAM

d) A product utilizing materials and components of high quality

A

a

65
Q

According to the WTO’s Agreement on Trade-Related Aspects of Intellectual Property
Rights (TRIPS), which of the following is a case example of copyright violation among
activities concerning the development or creation of a computer program?

a) Creating another web page by using the source of HTML that was downloaded from
the Internet

b) Creating a program based on an idea that was discussed on a bulletin board on the
Internet

c) Creating a program to increase a company’s operational efficiency by using a program that was created during one’s school days

d) Creating a program based on a flowchart that was shown in a purchased book

A

a

66
Q

An e-mail with a subject of “Caution: New computer virus” was received from the
external network. The sender is not a well-known person, and the content may or
may not be true. However, the e-mail describes the characteristics of the virus, and
instructs that the e-mail must be forwarded to as many people as possible. Which of
the following is an appropriate course of action to be taken in response to this e-mail?

a) Forwarding the e-mail to acquaintances

b) Forwarding the e-mail to all employees

c) Not forwarding the e-mail to anyone

d) Writing the sender an e-mail asking for a measure against the virus

A

c

67
Q

Which of the following is a case example that contains a potential “threat” that is one
of the four perspectives used in a SWOT analysis?

a) Company A (consumer electronics manufacturer): There is a decrease in the number of cases of new product development because of a decline in technical capabilities.

b) Company B (automobile distributor): The motivation of the sales staff seems to be
lower than before.

c) Company C (brand shop): The brand reputation has declined.

d) Company D (export enterprise): The exchange rate is changing because of the
appreciation of the local currency.

A

d

68
Q

Which of the following is an appropriate purpose of CRM?

a) To increase profits by building an excellent relationship with the customer from a
long-term perspective

b) To optimize the delivery time and cost by improving the series of processes from
procurement to manufacturing, distribution, and sales across several companies

c) To use management resources effectively by integrating and managing the
information that is independently controlled in each department

d) To determine when and how much of materials required for manufacturing products
is to be purchased on the basis of a bill of materials and inventory information

A

a

69
Q

Which of the following is the type of retailing where the headquarters provides the
business right, the right to use the trademark, and know-how about opening and
running stores, on the basis of contracts with member stores, and collects royalties in
return?

a) Outlet store

b) Antenna shop

c) Franchise chain

d) Voluntary chain

A

c

70
Q

In the planning of the business strategy of a retail business, “retention of loyal
customers” is set as the CSF (Critical Success Factor). Which of the following is the
most appropriate analysis that is used for evaluating the achievement level of this CSF?

a) RFM analysis by customer

b) Demographic analysis of new customers

c) POS analysis of new products

d) ABC analysis of the total sales amount by store and by product

A

a

71
Q

In advertisements using the Internet, which of the following is an advertisement that
uses a method where the prior consent of a recipient is acquired and advertisements
relating to the field of interest of the recipient are sent by e-mail?

a) Affiliate advertisement

b) Overlay advertisement

c) Opt-out e-mail advertisement

d) Opt-in e-mail advertisement

A

d

72
Q

Which of the following is an approach of mutually granting the right to execute the
patents owned by each company as a way of introducing external technologies?

a) Alliance

b) Cross license

c) Joint venture

d) Royalty

A

b

73
Q

Among advertisements on the Internet, which of the following is an appropriate
explanation of a banner advertisement?

a) When a web site is being browsed, an advertisement from an advertiser is
automatically displayed in another new window.

b) When a link from a web page to another page is clicked, a page with an
advertisement is briefly shown before the target page is displayed.

c) When an advertisement image that is placed on part of a web page is clicked, a page
prepared by an advertiser is displayed.

d) When keywords are entered into a search service site, an advertisement related to the
keywords is displayed on the page showing the search results.

A

c

74
Q

Which of the following is an appropriate case example that corresponds to traceability?

a) Computers are applied to education through the use of the Internet and web
technology.

b) All development activities are outsourced to an external specialized company
without placing the development department within one’s own company.

c) Business performance is improved by sharing and using personal knowledge and
information effectively across the entire organization.

d) The record from production up to sales can be confirmed on the basis of the food labels
pasted on meat and fish products.

A

d

75
Q

Which of the following is the most appropriate explanation of ERP (Enterprise
Resource Planning)?

a) It is the technique and concept to improve management efficiency by planning the
company-wide management resources in an effective and integrated way.

b) It is the technique and concept to perform commercial transactions for consumers
and between companies by using electronic networks, such as the Internet.

c) It is the technique and concept to introduce IT into business activities with the aim of improving not only efficiency and quality but also customer satisfaction.

d) It is the technique and concept where wholesalers and manufacturers support the
business activities of retail stores for increased turnover.

A

a

76
Q

Which of the following is the most appropriate purpose of using the OS for PCs as the
OS for intelligent home appliances?

a) Reducing the memory necessary for operation

b) Lowering the risk of being attacked from an outside source

c) Improving the processing speed

d) Shortening the development period of software

A

d

77
Q

Which of the following is a socio-economic disparity or inequality that is caused by the
differences in skills or opportunities to use ICT (Information and Communication
Technologies), such as a PC and the Internet?

a) Accessibility

b) Diversity

c) Digital divide

d) Digital democracy

A

c

78
Q

In online electronic commerce, retail stores and customers are vulnerable to threats,
such as falsification, spoofing, and repudiation, during order processing. Which of
the following is a security technique that is applicable to prevent these three threats?

a) Virus check

b) Junk mail filtering

c) Digital signature

d) Packet filtering

A

c

79
Q

Training on how to use a sales forecast system is planned for the persons in charge of
business operations across the country. Which of the following is the merit that is
obtained by using “e-learning” in training?

a) The persons in charge of business operations can be directly lectured about the
content of the system from the system designer, and can also ask questions on site.

b) The persons in charge of business operations can use their own free time and
undergo training at any suitable time.

c) Several persons in charge of business operations can participate together and
exchange their opinions on how to use the system.

d) The persons in charge of business operations can take a class all together by
assembling in a classroom.

A

b

80
Q

SOA (Service Oriented Architecture) is a concept of constructing a system by
combining some services. Which of the following is an appropriate merit of using
SOA?

a) The processing speed of the system is improved.

b) The security of the system is strengthened.

c) The system users do not need education and training.

d) The flexible system can be achieved.

A

d

81
Q

In the software life cycle, which of the following is the process that prepares and creates
the scheme of a computerization project?

a) Operation

b) Development

c) Planning

d) Requirements definition

A

c

82
Q

Q86.)
Which of the following is an appropriate E-R diagram that shows which department an
employee belongs to?

A
83
Q

Q87. For the procurement of a system, which of the following is an appropriate combination
of the words or terms to be inserted into blanks A and B?
In a certain company, prior to the procurement of a new system, an RFI is presented to
the vendors with the aim of obtaining A . Thereafter, an RFP is presented to
the vendors with the aim of obtaining B , and then a subcontractor is selected.

A | B
a) technology trend investigation reports | proposals

b) technology trend investigation reports | non-disclosure agreements

c) financial statements | proposals

d) proposals | technology trend reports

A

a

84
Q

Which of the following is an appropriate purpose of defining business requirements in
system development?

a) To use and control the management resources of the company in an effective and
integrated way

b) To fundamentally review and reconstruct the workflow, organization, and system of
the company

c) To create a policy and implementation plan for computerization in order to achieve
business objectives

d) To get the mutual consent of interested parties by clarifying and specifying the scope
and functions of computerization

A

d