May 2015 Flashcards

1
Q

Q1.) As shown in Figure 1, there is a box that generates a single output in response to two
inputs. The input to this box is either “Agree” or “Disagree.” The output “Agree” is
generated only when both inputs are “Agree,” and in other cases the output “Disagree”
is generated. When three inputs are entered into two boxes as shown in Figure 2,
which of the following is the correct description concerning the output? Here, each
box of Figure 2 has the same function as the box of Figure 1

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A single-sided single-layer DVD-R has a storage capacity of about 4.7 Gbytes. When
a book has 700 double-byte characters that are printed per page, how many tens of
thousands of pages, at maximum, can be recorded on this DVD-R? Here, two bytes
are required to record one character, and only character information is stored. In
addition, 1 Gbyte is 1 billion (10^9) bytes.

a) 42

b) 71

c) 335

d) 671

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3.)
An analog sound signal is digitized. Sampling is performed at Time 1 through Time 5
in the figure below, and four-level quantization is performed; in other words, the levels
closest to the sampling point are selected. After that, two-bit encoding is performed.
The result is “11 01 00 10 11”. When digitization is performed in the same way,
which of the following figures represents the sound signal that results in “01 00 10 11
01”?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The procedure described below is executed for two variables x and y, in order from
step (1) through step (4). When the procedure is completed, what is the resulting
value of x?

[Procedure]
(1) Assign 2 to x, and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, terminate the procedure. Otherwise, return to step (2).

a) 4

b) 5

c) 7

d) 8

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an appropriate description concerning the Java language?

a) It is a markup language that is used for describing web pages.

b) It is a language that is developed for scientific and engineering calculations.

c) It is an object-oriented language that provides platform-independent portability.

d) It is a language that is developed for business-oriented calculations.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6. )
The data is exchanged between variable A and variable B. When variable TMP is used
to temporarily store data, which of the following is the procedure for exchanging data
correctly? Here, “x←y” indicates that the content of “x” is replaced with the data of
“y”.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There is a program that displays text in accordance with the specifications below.
When the original text described below is displayed, in what point size does the
program display the underlined character string? Here, the first character of the
original text is displayed in 10 points.

[Specifications]
The characters between <b> and </b> are displayed one point larger than the
preceding character.
The characters between <S> and </S> are displayed one point smaller than the
preceding character.
Each of <b> </b> and <S> </S> must be used as a pair, and both of them can be
nested with each other.

[Original text]
The system administrator promotes and implements <b>department-level<b> or</b></b>

<S>group-level</S>

computerization</B> from a user <S>standpoint</S>.</B>

a) 10

b) 11

c) 12

d) 13

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate explanation of HDMI?

a) It is an interface for an audio-visual device that handles the input and output of video,
audio, and control signals through a single cable.

b) It is an interface that makes use of the infrared rays used for the exchange of information
between cell phones.

c) It is a serial interface that connects a peripheral device, such as an external hard disk,
through a cable.

d) It is a wireless interface that makes use of radio waves and can communicate even when
there is a slight shielding.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is implemented in a computer system in order to perform the
role of transferring data between the CPU and memory, or between the CPU and I/O
devices?

a) Bus

b) Hub

c) Port

d) Router

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an appropriate description concerning flash memory?

a) It is a type of rewritable memory that can erase all its content with ultraviolet light.

b) It can read out data at a high speed, and therefore, it is often used as cache memory.

c) It is a type of non-volatile memory that can erase and rewrite all or part of its content
electrically.

d) It is a type of memory that requires refresh operations and is widely used as main
memory.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate explanation of the hot standby system?
a) It is a system where a collection of various types of hardware, software, and data on
the Internet is provided to the user.

b) It is a system where a high level of reliability can be obtained by simultaneously
operating the two sets of equipment and performing the same processing while
cross-checking the results.

c) It is a system where a backup machine is always kept on standby in an operable state
and is immediately switched into operation at the occurrence of a failure.

d) It is a system where a backup machine is arranged, and at the occurrence of a failure,
the operator in charge starts up the backup machine to switch the production
machine to the backup machine.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate explanation of some functional units that
constitute a computer system?

a) The arithmetic and logical unit performs calculation processing at the direction of
the control unit.

b) The arithmetic and logical unit exchanges data with the control unit, the input unit,
and the output unit.

c) The memory unit requests the arithmetic and logical unit to perform calculation
processing and stores the results.

d) The memory unit requests the output unit to read out data from the memory unit.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When MTBF is 600 hours and MTTR is 12 hours, what is the approximate
availability?

a) 0.02

b) 0.20

c) 0.88

d) 0.98

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a method or technique that is used to connect multiple
computers over a network such as a LAN or the Internet, and makes these computers
available as if they were a single high performance computer?

a) End user computing

b) Social computing

c) Grid computing

d) Pervasive computing

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an appropriate description concerning the OS for PCs?

a) Only one type of OS can be installed and executed on one PC.

b) There is no OS for PCs that are equipped with a 64-bit CPU.

c) When an OS is upgraded to a new version, any software operating with the old
version of the OS can no longer be used.

d) There exist some OSs for PCs that can be started up by using an external storage
device, such as a CD-ROM and USB memory, other than the hard disk.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q16. )
In the hierarchical structure shown in the figure below, when the current directory is
marked with an asterisk (*), which of the following is the absolute path of the same
directory as the directory specified by the relative path “....\B\B”?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the image data that is pasted onto the documents or Web
pages created by the word-processing software or presentation software in order to
improve the representational power?

a) CSS

b) CAPTCHA

c) Clip art

d) Template

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q18. In comparison with the program execution method where programs are started and
executed sequentially, which of the following is an appropriate description concerning
characteristics of the method where multiple programs are started and executed
concurrently while switching between them in response to events such as input/output
requests?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is software that can be used free of charge on a trial basis but
requires a usage fee if it continues to be used after the trial period?

a) Groupware

b) Shareware

c) Adware

d) Freeware

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In comparison with the complier-based language processing, which of the following is
an appropriate description concerning the interpreter-based language processing?

a) Programs are executed at a slower speed.

b) Recursive function calls are not allowed.

c) Source programs are translated into machine language prior to execution.

d) It is not suited to an interactive operation environment.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an appropriate explanation of a general purpose computer that
is also known as a mainframe?

a) It is an ultra-small computer in which the CPU, main memory, and interface circuits
are embedded in a single chip.

b) It is a large computer that is used for a wide range of applications from office
processing to technical calculations, including mission-critical business as the main
target.

c) It is a client-dedicated computer that is equipped only with the minimum functions,
such as data entry and display, in the configuration of a system where resources,
such as the application programs and files, are managed at the server side.

d) It is a portable information terminal where functions, such as schedule management,
address book, and e-mail, are made available in a device that is small enough to fit
into the palm of one’s hand.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the unit that represents the resolution when a photograph or a picture is read by a scanner?

a) dpi

b) fps

c) pixel

d) ppm

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When a relational database is constructed according to the processes (A through C)
below, which of the following is the appropriate execution sequence?

A: Identifying the data items to be managed

B: Analyzing the target business operations

C: Creating the relational database tables

a) A → B→ C

b) B → A→ C

c) B → C → A

d) C → A → B

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q24. )
When the “Department,” “Location,” and “Employee” tables are joined to create Table
A, which of the following is the “Employee” table that is to be joined? Here, an
underline indicates a primary key, and a dotted underline indicates a foreign key.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Which of the following is a service that provides disk space on a server connected to the Internet for storing files and allows a user to read and write data from anywhere inside or outside the home? a) Archive b) Authoring c) Online storage d) Flash memory
c
22
Which of the following is an appropriate description concerning a wireless LAN? a) A wireless LAN cannot be used with hardware other than a PC. b) A wireless LAN has an operation mode that allows a one-to-one connection without any access point. c) The encryption standards are unified into one type. d) When there are no barriers, communication can be performed regardless of the distance.
b
23
When a PC is connected to a network, which of the following is the protocol that is used for automatically obtaining the IP address? a) DHCP b) HTTP c) NTP d) SMTP
a
24
Q28. Three PCs and an Internet-capable TV (television) set are to be connected to the Internet by using a hub and a router that has a firewall function. Which of the following is the appropriate connection that enables the firewall function of the router to be used for all devices? Here, “FW” in the figure indicates the firewall function.
25
In IPv4 (IP version 4), about 4.3 billion IP addresses can be defined. In IPv6 (IP version 6) that is intended to replace IPv4, how many bits are used as the length of an IP address? a) 32 b) 64 c) 128 d) 256
c
26
Q30. In order to implement communication between applications via a network, a certain number of protocols are used in a hierarchical structure. Which of the following is the appropriate combination of the protocol names to be inserted into blanks A and B in the description below? When a web page is viewed on the Internet, the browser and the web server use a protocol called A . Communication based on this A uses a protocol of a lower layer called B and a protocol of a further lower layer called IP (Internet Protocol). A | B a) FTP | Ethernet b) HTTP | TCP c) SMTP | POP3 d) WWW | HTML
b
27
Which of the following is a form of direct damage to a server which is caused by a DoS attack? a) The encrypted data is decrypted. b) The administrator password is changed. c) The server is infected by a virus. d) The services of a server are interrupted.
d
28
Which of the following is one of critical factors of information security that can be improved by setting the mirroring disks in a RAID system? a) Availability b) Confidentiality c) Authenticity d) Accountability
a
29
Which of the following is a network area that is logically isolated from both a company’s internal network and an external network, and is set up to ensure that no harm is caused to the internal network even if a server that is installed within the network area is accessed from the outside in an unauthorized manner? a) DMZ b) DNS c) NAT d) SSL
a
30
Which of the following is an appropriate explanation of a zero-day attack? a) In order to search for a vulnerable TCP/IP port that can be used as an entry point for unauthorized intrusion, an attacker accesses a server while changing port numbers in sequence. b) An attacker obtains important security information, such as a password, from the system administrator or user through skilled conversation or peeping, and then accesses the system illegitimately by posing as the user. c) When a vulnerability in software is identified, the identified vulnerability is exploited to perform an attack before a patch for the software is provided by the vendor. d) In order to identify the password or crack the encrypted code, an attacker successively attempts all character strings that are generated by mixing upper-case characters and lower-case characters of a term from the dictionary, or adding numeric characters to such a term.
c
31
Q35. With regard to malware, which of the following is an appropriate combination of descriptions (A through C) and keywords? A: An infected computer performs a fusillade to a specific site or transmits spam e-mails at the direction of an outside source. B: The information about users recorded by the key logger or such other method is collected. C: A penetration path is set up to perform an unauthorized login to a computer system from outside. A | B | C a) Spyware | Trojan | horse Back door b) Spyware | Back door | Trojan horse c) Bot | Spyware | Back door d) Bot | Trojan horse | Spyware
c
32
Among the descriptions (A through C) shown below, which of the following is the list that contains only all the appropriate descriptions that are directly effective as a measure against phishing? A: When personal information is entered in a web site, it must be confirmed that the web site uses an SSL connection, and also that the server certificate is valid. B: When an e-mail urging the transmission of an ATM card number and a personal identification number is received, its authenticity must be checked using several methods just to be safe, even if it is from a trusted partner such as a bank of account. C: The login password of an e-commerce site must have a sufficient length and complexity. a) A, B b) A, B, C c) A, C d) B, C
a
33
Which of the following is an appropriate description concerning software maintenance? a) Monitoring application program errors b) Updating the program to resolve defects or problems in the production environment c) Replacing the server to improve system performance d) Making data backups on a periodic basis
b
34
Mr. A, a developer, is analyzing and verifying the internal structure of a program in order to determine whether input data is processed as intended. Which of the following is the test that Mr. A is currently conducting? a) System test b) Top-down test c) Black box test d) White box test
d
35
In system development, which of the following is an appropriate phase or process that clarifies the quality (e.g., response time) that should be achieved by the system? a) Acceptance test b) System requirements definition c) Software detailed design d) Programming
b
36
Which of the following refers to a developer’s activity that provides the correction of software errors and faults without any charge, and accepts responsibility for product liability claims, when the deficiencies are discovered within a certain period of time after the completion of the acceptance inspection? a) Warranty against defects b) SLA (Service Level Agreement) c) System audit d) Preventive maintenance
a
37
In software development, which of the following is an appropriate description concerning a system test? a) It is a test that is performed by the developer in the final stage of development in order to confirm whether the system requirements are met. b) It is a test that is performed to confirm whether the system requirements are appropriately and sufficiently defined. c) It is a test that performs the unit test and integration test of a program in parallel and simultaneously. d) It is a test that is performed by the user independently of the developer in order to confirm that the completed system is compatible with business operations.
a
38
Which of the following is an appropriate description concerning the activities that are performed in each process of system development? a) In external design, items on screens and forms are considered. b) In testing, design documents are reviewed, and system functions are checked in the documents. c) In programming, system operation procedures are confirmed by end users. d) In project execution planning, the internal processing of the system is considered.
a
39
Which of the following is an appropriate explanation of reverse engineering? a) A method for conducting efficient experiments with the fewest possible number of trials, in consideration for a better combination of multiple factors that should be confirmed b) A method for disassembling and analyzing an existing product in order to uncover its structure and acquire technology c) A method that transforms work into an ideal form by fundamentally reviewing workflow and work methods without changing the content of work d) A method that shortens the time from product development to production, through the parallel execution of multiple activities that can be performed simultaneously
b
40
In a system development project, a flowchart of the development process is created to perform quality management. Which of the following is an appropriate purpose of using such a flowchart? a) To consider where and what kind of problem is likely to occur in the work processes b) To determine whether the usage rate of the system is within the expected range c) To identify the relationships between major problems in project execution and latent causes of the problems d) To assess the frequency of problem occurrence on a per-cause basis in order to resolve the causes of the most problems
a
41
Which of the following is an appropriate explanation of decomposition that is performed to create the WBS of a system development project? a) The cost and time required to create project deliverables can be estimated, and it is desirable that decomposition be performed up to the manageable level. b) When system development is outsourced, all decomposition of deliverables should be left to the discretion of the outsourcee that creates the deliverables. c) Since a meeting that is held to report the progress of a project is a means of communication, the meeting is not subject to decomposition. d) If there are some experiences in developing similar systems, it is not necessary to perform decomposition again.
a
42
In project management, it is necessary to manage cost, time, quality, and other factors. Which of the following is an appropriate description concerning project management? a) Since cost, time, and quality differ in order of priority according to constraints, a balance among these must be achieved. b) Since cost, time, and quality are all independent of each other, there is no need to achieve a balance among these. c) Since cost and quality are in direct proportion to each other, management can be performed with the focus on either one of these. d) Since cost and time are in inverse proportion to each other, management can be performed with the focus on either one of these.
a
43
Which of the following is an appropriate activity that is performed in “project scope management” defined in the PMBOK (Project Management Body of Knowledge) Guide? a) Organizing a project team and developing staff members b) Defining all activities required for a project without any omissions c) Identifying the stakeholders of a project and deciding the communication method d) Identifying the project risks and considering appropriate action plans
b
44
In a project, each member must perform one-to-one communication for sharing information. At this time, which of the following is an appropriate description concerning the relationship between the number of project members and the number of necessary communication paths? a) In the case where the number of members increases by one, the higher the original number of members, the higher the increase in the number of paths b) If the number of members increases by one, the number of paths also increases by one. c) The relationship between the number “x” of members and the number “y” of paths is represented by y = x!. d) The relationship between the number “x” of members and the number “y” of paths is represented by y = x^2 2 .
a
45
It takes 10 days for Mr A to complete an activity of program development, and it takes 15 days for Mr. B to complete the same activity. When Mr. A and Mr. B work together, how many days are required to complete this activity? Here, their individual work efficiencies remain unchanged even when they work together. a) 5 b) 6 c) 7.5 d) 12.5
b
46
Q50.) When the arrow diagram below is created to manage a project that consists of eight activities A through H, which of the following is the critical path of this arrow diagram?
47
Which of the following is an explanation of IT service management? a) Providing operationally-managed services by an IT-related service company in order to satisfy customer requirements effectively b) Verifying the feasibility of whether new IT-related products, new services, or new schemes can be implemented as business activities c) Providing efficient services through utilizing IT by organizing and managing knowledge derived from the past accumulated experiences in an organization and by sharing it among employees d) Depicting graphically the market share and industry growth rate of IT-related services offered by the company, and on the basis of the positioning, developing a strategy with regard to a clear vision of services
a
48
In order to reduce the risk of unauthorized entry into the server room where a computer system is operating, the decision is made not to indicate the installation location of the computers. Which of the following is the appropriate management that corresponds to this measure? a) Supply chain management b) Knowledge management c) Business continuity management d) Facility management
d
49
An SLA contains a written description of arrangements, such as the content of the service agreed upon between the service provider and the user. Which of the following is an appropriate merit that is obtained by both the service provider and the user through concluding an SLA? a) It is possible to confirm the validity of the charge rate, on the basis of the content of the service performed. b) It is possible to share common recognition of the content, scope of provision, and minimum required level of the service. c) It is possible to request to change fees when the content of the service is insufficient or incomplete. d) It is possible to perform business operations without excessive demands placed on the content of the service.
b
50
In an IT facility such as a data center, which of the following is used to improve the maintainability and installation efficiency of several types of equipment? a) Server rack b) Hub c) Firewall d) Router
a
51
There exists a bug in a program on PCs that are used for business operations, and a symptom that a PC becomes unusable is reported to a service desk. From a perspective of “incident and service request management” in IT service management, which of the following is the most appropriate action to be taken at the service desk, prior to handover to problem management? a) Informing users of how to restart a PC and make it usable b) Making a plan to distribute a fixed program to the PCs c) Testing the fixed program d) Fixing the bug in the program
a
52
Which of the following is an appropriate explanation concerning the resolution processes of IT service management? a) The root causes of software faults are identified through problem management. b) The necessity of changes in software is decided through release management. c) Software versions are managed through incident management. d) Software is embedded and its operation is verified through change management.
a
53
Among the processes necessary for a system audit, which of the following is performed by the system auditor? a) Preparation of the audit targets such as operational rules b) Preliminary assessment of the audit targets c) Improvement of vulnerabilities in the audit targets d) Acceptance of the system audit report
b
54
Q58. A risk control matrix is used to evaluate the status of achievement of the established internal controls. In the description below concerning the use of the risk control matrix, which of the following is an appropriate combination of words or phrases to be inserted into blanks A and B? The risks and the A control items are described, and the B is evaluated. A | B a) | candidate | cost efficiency of control items b) | candidate | degree of risk reduction c) | implemented | cost efficiency of control items d) | implemented | degree of risk reduction
d
55
In the course of a system audit, which of the following is performed by the auditee (i.e. the organization or person to be audited)? a) Verification of improvement results b) Preparation of an audit plan c) Creation of an audit report d) Improvement of business operations
d
56
Q60.) The same type of product is manufactured by allocating sets of assembly parts to three different factories A, B, and C. The profit of each factory that is based on the allocated sets of parts is as shown in the table below. How much (in thousand dollars) is the maximum profit that is obtained by allocating a total of four sets of parts to these three factories?
57
Among the senior management positions in a company or such other organization, which of the following is the highest-ranking person who exercises control over the information system? a) CEO b) CFO c) CIO d) COO
c
58
Q62. ) As shown in the table below, a total of 1,000 products with a sales unit price of 1,000 dollars are to be manufactured and sold. Which of the following is an appropriate description concerning plan A and plan B?
59
Which of the following is an appropriate diagram or chart that is used for ABC analysis? a) Control chart b) Scatter diagram c) Cause and effect diagram d) Pareto chart
d
60
Q64. ) The production line of a product is composed of two processes A and B in that order, and the number of machines in each process, the work time required for the production of one component, and the defective rate are as shown in the table below. When the work time per day is 10 hours, what is the daily production capacity (i.e., number of non-defective components produced in a day) of the production line? Here, the defective components of process A are not sent to process B. Furthermore, the downtime and setup time of machinery, and the inter-process inventory between processes are ignored, and the components that are being processed are always completed even when the end time is already reached.
61
Which of the following is an appropriate characteristic of the QR code? a) The code can contain only single-byte alphanumeric characters and symbols. b) The amount of information that can be stored is equivalent to that of a barcode. c) The code can be read from any direction including the top, bottom, left, and right. d) The code has a two-dimensional structure in which three barcode layers are stacked.
c
62
Which of the following is an activity of quality management that is based on the ISO 9000 family? a) Preventive actions for potential problems are implemented at the field staff level, and are not reported to the management level. b) Since an audit is performed by a third party on a regular schedule, no internal audit is performed. c) Records related to quality are stored in a server in order to share the information among the interested parties. d) Although a project consists of the company’s employees and the partner company’s employees, only the company’s employees are informed of the quality policy.
c
63
Which of the following is an appropriate description concerning a “volume license agreement”? a) It is an agreement where a master copy is provided to customers, such as companies, who purchase the software in high volume, and the number of permitted installations is determined in advance. b) It is an agreement where the location of use is restricted to a specified facility, and the software can be used without limiting the number of computers or users in the facility. c) It is an agreement where standard licensing conditions are defined and a license agreement is automatically considered to be concluded between the right holder and the purchaser when a certain limited number of packages are unwrapped. d) It is an agreement where the use of software is permitted by accepting the terms and conditions displayed on the screen when the software is downloaded from the Internet.
a
64
According to the ISO 9000 family, quality is defined as the “degree to which a set of inherent characteristics fulfills requirements.” When products are evaluated on the basis of this definition, which of the following is most appropriate as a product with good quality? a) A product having no customer complaints and a high level of customer satisfaction b) A product that a company produces in-house without outsourcing c) A product designed and manufactured using CAD and CAM d) A product utilizing materials and components of high quality
a
65
According to the WTO’s Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), which of the following is a case example of copyright violation among activities concerning the development or creation of a computer program? a) Creating another web page by using the source of HTML that was downloaded from the Internet b) Creating a program based on an idea that was discussed on a bulletin board on the Internet c) Creating a program to increase a company’s operational efficiency by using a program that was created during one’s school days d) Creating a program based on a flowchart that was shown in a purchased book
a
66
An e-mail with a subject of “Caution: New computer virus” was received from the external network. The sender is not a well-known person, and the content may or may not be true. However, the e-mail describes the characteristics of the virus, and instructs that the e-mail must be forwarded to as many people as possible. Which of the following is an appropriate course of action to be taken in response to this e-mail? a) Forwarding the e-mail to acquaintances b) Forwarding the e-mail to all employees c) Not forwarding the e-mail to anyone d) Writing the sender an e-mail asking for a measure against the virus
c
67
Which of the following is a case example that contains a potential “threat” that is one of the four perspectives used in a SWOT analysis? a) Company A (consumer electronics manufacturer): There is a decrease in the number of cases of new product development because of a decline in technical capabilities. b) Company B (automobile distributor): The motivation of the sales staff seems to be lower than before. c) Company C (brand shop): The brand reputation has declined. d) Company D (export enterprise): The exchange rate is changing because of the appreciation of the local currency.
d
68
Which of the following is an appropriate purpose of CRM? a) To increase profits by building an excellent relationship with the customer from a long-term perspective b) To optimize the delivery time and cost by improving the series of processes from procurement to manufacturing, distribution, and sales across several companies c) To use management resources effectively by integrating and managing the information that is independently controlled in each department d) To determine when and how much of materials required for manufacturing products is to be purchased on the basis of a bill of materials and inventory information
a
69
Which of the following is the type of retailing where the headquarters provides the business right, the right to use the trademark, and know-how about opening and running stores, on the basis of contracts with member stores, and collects royalties in return? a) Outlet store b) Antenna shop c) Franchise chain d) Voluntary chain
c
70
In the planning of the business strategy of a retail business, “retention of loyal customers” is set as the CSF (Critical Success Factor). Which of the following is the most appropriate analysis that is used for evaluating the achievement level of this CSF? a) RFM analysis by customer b) Demographic analysis of new customers c) POS analysis of new products d) ABC analysis of the total sales amount by store and by product
a
71
In advertisements using the Internet, which of the following is an advertisement that uses a method where the prior consent of a recipient is acquired and advertisements relating to the field of interest of the recipient are sent by e-mail? a) Affiliate advertisement b) Overlay advertisement c) Opt-out e-mail advertisement d) Opt-in e-mail advertisement
d
72
Which of the following is an approach of mutually granting the right to execute the patents owned by each company as a way of introducing external technologies? a) Alliance b) Cross license c) Joint venture d) Royalty
b
73
Among advertisements on the Internet, which of the following is an appropriate explanation of a banner advertisement? a) When a web site is being browsed, an advertisement from an advertiser is automatically displayed in another new window. b) When a link from a web page to another page is clicked, a page with an advertisement is briefly shown before the target page is displayed. c) When an advertisement image that is placed on part of a web page is clicked, a page prepared by an advertiser is displayed. d) When keywords are entered into a search service site, an advertisement related to the keywords is displayed on the page showing the search results.
c
74
Which of the following is an appropriate case example that corresponds to traceability? a) Computers are applied to education through the use of the Internet and web technology. b) All development activities are outsourced to an external specialized company without placing the development department within one’s own company. c) Business performance is improved by sharing and using personal knowledge and information effectively across the entire organization. d) The record from production up to sales can be confirmed on the basis of the food labels pasted on meat and fish products.
d
75
Which of the following is the most appropriate explanation of ERP (Enterprise Resource Planning)? a) It is the technique and concept to improve management efficiency by planning the company-wide management resources in an effective and integrated way. b) It is the technique and concept to perform commercial transactions for consumers and between companies by using electronic networks, such as the Internet. c) It is the technique and concept to introduce IT into business activities with the aim of improving not only efficiency and quality but also customer satisfaction. d) It is the technique and concept where wholesalers and manufacturers support the business activities of retail stores for increased turnover.
a
76
Which of the following is the most appropriate purpose of using the OS for PCs as the OS for intelligent home appliances? a) Reducing the memory necessary for operation b) Lowering the risk of being attacked from an outside source c) Improving the processing speed d) Shortening the development period of software
d
77
Which of the following is a socio-economic disparity or inequality that is caused by the differences in skills or opportunities to use ICT (Information and Communication Technologies), such as a PC and the Internet? a) Accessibility b) Diversity c) Digital divide d) Digital democracy
c
78
In online electronic commerce, retail stores and customers are vulnerable to threats, such as falsification, spoofing, and repudiation, during order processing. Which of the following is a security technique that is applicable to prevent these three threats? a) Virus check b) Junk mail filtering c) Digital signature d) Packet filtering
c
79
Training on how to use a sales forecast system is planned for the persons in charge of business operations across the country. Which of the following is the merit that is obtained by using “e-learning” in training? a) The persons in charge of business operations can be directly lectured about the content of the system from the system designer, and can also ask questions on site. b) The persons in charge of business operations can use their own free time and undergo training at any suitable time. c) Several persons in charge of business operations can participate together and exchange their opinions on how to use the system. d) The persons in charge of business operations can take a class all together by assembling in a classroom.
b
80
SOA (Service Oriented Architecture) is a concept of constructing a system by combining some services. Which of the following is an appropriate merit of using SOA? a) The processing speed of the system is improved. b) The security of the system is strengthened. c) The system users do not need education and training. d) The flexible system can be achieved.
d
81
In the software life cycle, which of the following is the process that prepares and creates the scheme of a computerization project? a) Operation b) Development c) Planning d) Requirements definition
c
82
Q86.) Which of the following is an appropriate E-R diagram that shows which department an employee belongs to?
83
Q87. For the procurement of a system, which of the following is an appropriate combination of the words or terms to be inserted into blanks A and B? In a certain company, prior to the procurement of a new system, an RFI is presented to the vendors with the aim of obtaining A . Thereafter, an RFP is presented to the vendors with the aim of obtaining B , and then a subcontractor is selected. A | B a) technology trend investigation reports | proposals b) technology trend investigation reports | non-disclosure agreements c) financial statements | proposals d) proposals | technology trend reports
a
84
Which of the following is an appropriate purpose of defining business requirements in system development? a) To use and control the management resources of the company in an effective and integrated way b) To fundamentally review and reconstruct the workflow, organization, and system of the company c) To create a policy and implementation plan for computerization in order to achieve business objectives d) To get the mutual consent of interested parties by clarifying and specifying the scope and functions of computerization
d