Oct 2011 Flashcards

1
Q

Which of the following is an appropriate description concerning the Java language?

a) It is a markup language used for describing Web pages.

b) It is a language developed for scientific and engineering calculations.

c) It is an object-oriented language that provides platform-independent portability.

d) It is a language developed for business-oriented calculations.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an appropriate description concerning the Java language?

a) It is a markup language used for describing Web pages.

b) It is a language developed for scientific and engineering calculations.

c) It is an object-oriented language that provides platform-independent portability.

d) It is a language developed for business-oriented calculations.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an appropriate description concerning XML (eXtensible
Markup Language)?

a) It is an object-oriented language based on C++, but simplified to eliminate language
features that cause common programming errors.

b) It is an interpreter language for text processing and also a standard language for CGI
(Common Gateway Interface) programs that run on a Web server.

c) It is a page description language used in the electronic and desktop publishing areas
for defining the contents and layout of a printed page.

d) It is a language that enables users to create their own tags in order to describe the
structure and content of a document.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. ) When a relation between objects is abstracted, the relation from X to Y (called an order
    relation) is represented as (X, Y) and illustrated as . Which of the
    following is the diagram that illustrates three sets of order relations “(A, B), (A, C), (B,
    D)”?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. ) The data is exchanged between variable A and variable B. When variable TMP is used
    to temporarily store data, which of the following is the procedure for exchanging data
    correctly? Here, “x←y” indicates that the content of “x” is replaced with the data of
    “y”.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. ) When the reward for an improvement proposal concerning business operations is
    determined based on the decision table below, how much is the reward for an
    improvement proposal that results in an improvement of $20,000 and a turnaround time
    reduction of three days? Here, “Y” in the table means that each condition holds
    “true”, and “N” means “not true”. In addition, “” indicates the reward that applies
    to a specific combination of these conditions.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a sound is recorded in a computer file, it is to be stored as a series of 8-bit
encoded data. When the same sound source is sampled at the same sampling
frequency and then encoded as a series of 16-bit data in lieu of 8-bit data, which of the
following is an appropriate explanation concerning this encoding?

a) The amplitude of the sound can be recorded more finely.

b) When the recording time is the same, the amount of data becomes smaller.

c) The CPU load required to process the recorded data decreases.

d) The upper limit of the frequency that can be recorded becomes higher.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.) A sound signal is digitized. Sampling is performed at Time 1 through Time 5 in the
figure below, and four-level quantization is performed; in other words, the levels
closest to the sampling point are selected. After that, two-bit encoding is performed.
The result is “11 01 00 10 11”. When digitization is performed in the same way,
which of the following figures represents the sound signal that results in “01 00 10 11
01”?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an appropriate description concerning the clock frequency of
the CPU in a PC?

a) The instruction execution timing of the CPU changes depending on the clock
frequency. As the clock frequency becomes higher, the instruction execution speed
of the PC increases.

b) The communication speed of the LAN changes depending on the clock frequency.
As the clock frequency becomes higher, the communication speed of the LAN
increases.

c) The rotation speed of the hard disk changes depending on the clock frequency. As
the clock frequency becomes higher, the rotation speed becomes faster and the data
transfer rate of the hard disk increases.

d) The clock frequency serves as the reference for the internal clock of the PC. When
the clock frequency doubles, the interrupt interval becomes half and the speed of
real-time processing increases.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an appropriate explanation concerning the cache memory of
a PC?

a) It is placed between the CPU core and main memory, and is used to read and write
data at high speed.

b) It is used to store the same data in two locations at the same time in order to improve
reliability.

c) It is equipped with a mechanism that can run even a program whose size exceeds the
main memory capacity.

d) It enables simultaneous access to main memory blocks by dividing main memory
into multiple blocks.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate description concerning flash memory?

a) It is used as read-only storage once data is written.

b) No power supply is required to retain stored data.

c) It is not used for digital cameras because of the difficulty of downsizing.

d) Data is read or written using laser light.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an appropriate description concerning CD-R?

a) It is suitable for making a backup copy of data, because the saved data cannot be
erased or overwritten.

b) It is suitable as storage for frequently updated large master files, because it has a
large storage capacity.

c) It is capable of high-speed writing by shrinking the recording area of the disc
surface.

d) A specially-designed CD-R drive is necessary for reading data, because the data is
recorded in a special format.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership) that represents the cost of a system?

a) The total cost of a company’s initial investment in an information system

b) The total cost incurred in system development

c) The total cost including system installation, operation, maintenance, and education

d) The total cost of system installation

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the new system environment of Company X, three systems including a customer
management system, an ordering management system, and a call center system are run
individually at separate locations and connected via a network so that they can
complement one another in the event of a failure. Also, the system operations are
managed at their respective locations. Which of the following is the greatest merit of
this new system?

a) The integration of operations helps reduce the number of operating staff.

b) Risks of disasters and other problems can be diversified.

c) The versions of software can be controlled easily.

d) Backup files can be managed in a consolidated manner.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the technical term that represents the work volume processed
by a computer per unit time?

a) Throughput

b) Turnaround time

c) Time slice

d) Response time

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an appropriate description concerning OSs used for PCs?

a) Since the interface between an OS and application programs is standardized, the
application programs can be developed without regard to the type of OS.

b) An OS allocates the computer resources, such as the CPU, memory, and auxiliary
storage device, to application programs.

c) Since an OS has the function of automatically converting character sets in a file,
application programs can access the file without regard to the type of character set.

d) The source code of an OS should be disclosed so that application programs can be
free to use the various functions of the OS.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the most appropriate method for displaying the content of
database to a limited extent in accordance with the level of confidentiality for each
user’s business operations?

a) Setting up access rights based on the combination of data and user

b) Distributing a copy of the database limited to each user

c) Setting up a set of data items (columns) dedicated to each user

d) Setting up a password for each record in order to protect data

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When a newly installed application program is concurrently executed on a PC that is
equipped with a virtual memory function, the swapping of pages between main and
secondary storage occurs frequently and the processing efficiency of the running
application programs drops sharply. Which of the following is the most appropriate
solution to this situation?

a) Installing more hard disks

b) Installing more main memory

c) Switching to a faster CPU

d) Switching to faster main memory

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an appropriate description concerning file systems that
manage files with directories and that are used for a wide variety of OSs on PCs?

a) The current directory is created first as the top directory of a hierarchical structure.

b) The file system should be created on a hard disk for directory management.

c) The directory path is used to identify a specific file stored on an auxiliary storage.

d) Files and directories cannot be registered in the same directory.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is an appropriate explanation of an interpreter?

a) It is a program that translates source programs written in assembler language to
machine language programs.

b) It is a program that reads high-level source programs line-by-line, alternately
translating lines and executing appropriate operations.

c) It is a program that translates source programs written in high-level language to
machine language programs, and then generates load modules.

d) It is a program that automatically generates purpose-specific programs based on the
specified parameters.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is software that can be used free of charge on a trial basis but
requires a usage fee if it continues to be used after the trial period?

a) Open source software

b) Shareware

c) Public domain software

d) Freeware

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is an explanation of defragmentation?

a) It reassigns defective clusters to other clusters.

b) It relocates free or unused clusters.

c) It removes failed or defective clusters.

d) It relocates physically distributed files into continuous areas.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is an appropriate concept of universal design?

a) Ensuring that, once a product is designed, the design remains usable without being
changed for a long period of time

b) Ensuring that products keep the same levels of performance and quality regardless of
where they are manufactured in the world

c) Making the design as simple and easy as possible in order to reduce the
manufacturing cost

d) Making products available to many people regardless of differences in age, culture,
and ability as well as whether disability is present

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is an appropriate explanation of MP3 that is used as a
multimedia file format?

a) File compression format for G4 facsimile communication data

b) File compression format for audio data

c) File compression format for color image data

d) File compression format for digital video data

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is an appropriate explanation of a commercial database service?

a) Publishing information collected only from the commercial field free of charge in
the form of a database

b) Providing professional advice on various issues that occur when a database is being
designed and built

c) Providing information for profit by creating a database of information collected in
specific fields

d) Managing user-built databases on behalf of users, in order to release information to
the public

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

There is an order entry system that is used to enter and manage orders from customers.
A numbering printer is used to print sequential order numbers on order forms in order
of arrival unless the forms have mistakes such as missing information. When the
order data shown below is entered in this order entry system, which of the following is
the item that should be checked so as not to enter the duplicate order data?

Order data
Order number | Order date Product code | Quantity | Customer code

a) Customer code

b) Product code

c) Order number

d) Order date

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

27.) As shown in the figure below, a LAN system comprises two PCs, one server, and one
printer. When PC A cannot print any output data on the printer, which of the
following should be applied to blank P in the problem determination flowchart? Here,
both PCs can send output data directly to the printer without using the server.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is an appropriate explanation of a router that allows messages
to be sent between two or more networks?

a) It performs connection at the data link layer, and provides the traffic isolation
function.

b) It converts protocols including protocols above the transport layer, and interconnects
networks with different types of network architecture.

c) It performs connection at the network layer, and is used for connecting LANs via
wide-area networks.

d) It performs connection at the physical layer, and is used for extending the connection
distance.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In order to implement communication between applications via a network, a number of
protocols are used in a hierarchical structure. Which of the following is the
appropriate combination of the protocol names to be inserted into blanks A and B in the
description below?
When a Web page is viewed via the Internet, the browser and the Web server use a
protocol called A . Communication over this A uses a protocol
of a lower layer called B and a protocol of a further lower layer called IP
(Internet Protocol).

A | B

a) FTP (File Transfer Protocol) | Ethernet

b) HTTP (Hyper Text Transfer Protocol) | TCP (Transmission Control Protocol)

c) SMTP (Simple Mail Transfer Protocol) | POP3 (Post Office Protocol version 3)

d) WWW (World Wide Web) | HTML (Hyper Text Markup Language)

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is an appropriate explanation concerning URL?

a) It is a communications protocol between a Web page and a browser.

b) It is a message about the update history of a Web page.

c) It is grammar for describing the content (body) of a Web page.

d) It is a notation for representing the location of a Web page.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When an e-mail message titled “Returned mail: Host unknown” is returned in response
to an e-mail over the Internet, which of the following is a probable cause of this
message?

a) The recipient’s mail server remains stopped.

b) In the recipient’s address, the domain name after the @ symbol is incorrect.

c) The transmitted data is too large, so it exceeds the mail server’s storage capacity.

d) The encoder used for the attached file is incompatible with the recipient’s decoder

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A cookie is a small data file that a web site can transfer to a browser to maintain
records of the visit to the web site. Among descriptions A through C concerning such
a cookie, which of the following is a list of only the appropriate descriptions?

A: Since the cookie always inherits the ID and password entered during the last visit
to a Web site, it is not necessary to enter them again when the Web site is viewed
using another PC.

B: After a Web site is viewed from a temporarily PC rented at an Internet cafe or
other places, the cookie should be deleted.

C: When personal information is stored in the cookie, such information may be
stolen using cross site scripting or some other means.

a) A,

B b) A, B, C

c) A, C

d) B, C

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is an appropriate guideline for users concerning protection
against computer viruses?

a) When software is installed, the “read-me” file or other instructions should be read
and followed prior to running a virus check.

b) The autostart function should be enabled as a preventive measure against virus
infection via removable disc media.

c) The auto preview function should be disabled as a preventive measure against virus
infection via e-mail.

d) File extension names should be hidden to prevent application software from being
started automatically by identifying the type of file.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is an appropriate description concerning a method used for
phishing?

a) If data entered in a Web page is displayed as is, a malicious script embedded in the
page causes damage to users and servers.

b) Computers infected with a virus are controlled from outside via a network such as
the Internet.

c) Computer user’s personal information, such as IP address or Web browsing history,
is secretly collected and sent outside.

d) E-mails, which pretend to be from an existing business or organization, are sent to
lead recipients to a bogus Web site and to steal their personal information.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When portable computers are used for remote access to data on an office server, which
of the following is an effective security measure?

a) The login screen of portable computers should be set up so that the previously
entered user ID and password can be reused.

b) As much of the required data as possible should be copied onto the portable
computers in order to keep network use to a minimum.

c) User IDs should be shared among multiple users so that unauthorized access can be
detected easily.

d) One-time passwords should be used to allow access to the office server from a
remote location.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Among information security measures A through D implemented in the workplace to
maintain the “confidentiality” and “integrity” of information, which of the following is
a list of only the appropriate measures?

A: PCs should remain unlocked to keep them ready for operation from the start to
the end of the business day.
B: Documents and electronic storage media, such as CD-R containing important
information, should be stored in locked cabinets except when they are used.
C: Documents sent or received by facsimile should be picked up immediately
without leaving them unattended on the tray.
D: Messages or information written on the whiteboard should be erased
immediately after use.

a) A, B

b) A, B, D

c) B, D

d) B, C, D

A

d

37
Q

In system analysis and design, which of the following is described using DFD?

a) Layout of items on a data entry screen

b) Flow of data

c) Physical structure of a database

d) Procedure of a program

A

b

38
Q

The upper bound of accounts receivable for each customer and the total value of the
receivables up to now are recorded in the customer master file. Which of the
following is the process that checks whether or not a new order should be received in
consideration of the upper bound of accounts receivable?

a) Sequence check

b) Duplication check

c) Format check

d) Limit check

A

d

39
Q
  1. ) One of the criteria for judging quality during the test phase is the relation between the
    number of test items completed and the cumulative number of bugs detected. Which
    of the following graphs indicates that the quality is going into a steady or stable state?
A
40
Q

Which of the following is the test method that determines whether or not the output
based on the system specifications is obtained for any given input with the focus on
input and output only, and thereby verifies the functions that can be seen from the
outside of the system regardless of its internal structure?

a) Operational test

b) Integration test

c) Black box test

d) White box test

A

c

41
Q

Among software development process models, which of the following is the model that
aims to reach a high degree of completion of a system by iterating the development
cycle in consideration of minimizing the risk in each cycle?

a) Incremental model

b) Waterfall model

c) Spiral model

d) Evolution model

A

c

42
Q

Which of the following is an appropriate characteristic of a prototyping model?

a) Development is promoted by evaluating and finalizing the specifications through
creating trial models at an early stage of system development and then clarifying the
user requirements.

b) Development is promoted by designing data processing and system operation
through taking them into consideration as the extraction of targets as well as their
attributes and procedures, rather than as the flow of procedures.

c) Development is promoted by starting with the development of partial functions, and
then repeating the expansion and improvement of functions to satisfy user
requirements.

d) Development is promoted by clearly distinguishing between development phases
from requirements analysis through to testing, and then sequentially reviewing and
verifying each phase from upstream to downstream.

A

a

43
Q

Which of the following is the most effective example of an arrow diagram?

a) A launch event for a new product is planned so that the preparation of the venue,
communication to interested parties, and other activities can make smooth progress.

b) When a building is designed and constructed, control is exerted over how to proceed
with several activities so as not to delay the process.

c) When a theme is selected, problems are narrowed down to identify the significant
problems or concerns to be solved.

d) Before a negotiation for the revision of transaction prices, several alternative plans
are prepared in anticipation of the other party’s attitude.

A

b

44
Q
  1. ) In the graph below, the probability that the actual project cost does not exceed the
    estimated cost is shown based on risk simulation. A total of 4.0 million dollars are
    reserved as project budget. In order to increase the probability that the actual cost
    does not exceeds the estimate up to 80%, how much money (in million dollars) should
    be additionally reserved?
A
45
Q

45.) Five weeks have passed since the start of a project whose schedule is shown by the
arrow diagram below. At this time, the percentage of completion of each activity is as
shown in the table below. For example, 80% of activity B is completed. In other
words, it takes one more week (20% of 5 weeks) to complete activity B. When all the
activities are evaluated based on the table, which of the following is the activity that
causes a delay in the completion of the project? Here, the remaining activities make
progress as initially planned.

A
46
Q

At the request of a user department, the development department launches a project of
system development. Which of the following is the most appropriate role of the
project manager?

a) Presenting the requirements of the system to the user department

b) Monitoring the progress to take preventive measures against problems

c) Preparing a proposal for the project on behalf of the user department

d) Raising funds to carry out the project on behalf of both departments

A

b

47
Q

Which of the following is an appropriate index or indicator that is used to evaluate the
quality of deliverables in a system development project?

a) External procurement ratio

b) Test coverage

c) Total number of staff assigned

d) Number of days spent on the project

A

b

48
Q

Which of the following is the most appropriate item to be included in an SLA that is a
contract defining expectations between an organization and the service vendor to
provide an agreed upon level of support?

a) Server performance

b) Opening hours for services

c) System operation cost

d) Procedures to add new services

A

b

49
Q
  1. ) The figure below shows the “service profit chain” developed by James L. Heskett.
    Among the items to be inserted into blanks A through D in the figure, which of the
    following should be inserted into blank C?
A
50
Q

Which of the following is a technology that is used to link computers to equipment
such as PBX, in order to automatically respond to phone and FAX or to route them to
their appropriate destinations?

a) PAX (Private Automatic eXchange)

b) VoIP (Voice over Internet Protocol)

c) ISDN (Integrated Services Digital Network)

d) CTI (Computer Telephony Integration)

A

d

51
Q

Which of the following is the most appropriate method for computer system
maintenance?

a) Even if there is no system failure observed, a long-term maintenance plan should be
made and carried out on a regular basis, in consideration of ensuring stable system
operation.

b) Even if a failure occurs just before scheduled maintenance, the regular maintenance
cycle should be kept by taking measures to continue system operation without
stopping the system.

c) At the time of making a maintenance agreement with a service provider, it is
advisable to consult and follow the provider’s experienced specialist about details,
such as maintenance methods and schedule.

d) It is important to perform maintenance work under the observation of users at the
location where the system is installed, and on-site maintenance rather than remote
maintenance should be conducted even in the distributed system.

A

a

52
Q

Which of the following is the most appropriate description concerning the activity of
changing an application system by the system operations department?

a) Since it takes time to determine the priority for change requests, the change activity
should be done in order of arrival.

b) Since it is difficult to predict the extent of impact of the change activity, all the
employees should always be informed of the change.

c) Since the content of the change activity is important for identifying the cause of a
failure, it should always be recorded.

d) The change activity should always be done late at night so as not to have an impact
on users.

A

c

53
Q

The private power generator is installed to protect a business server against electric
power failure, but it takes one minute to provide a stable power supply after the power
failure is detected. Which of the following devices is necessary to supply temporary
power to the server during that one-minute period?

a) A/D converter

b) RAID

c) UPS

d) Firewall

A

c

54
Q

When the operational status of an information system is audited, who is in an
appropriate position to act as an auditor?

a) A person who is independent of the system to be audited

b) An operations manager of the system to be audited

c) A staff member in charge of the operations of the system to be audited

d) A consultant who advises on the operations of the system to be audited

A

a

55
Q

In the flow of a system audit, which of the following is carried out by the auditee (i.e.
the organization or person to be audited)?

a) Verification of improvement

b) Preparation of an audit plan

c) Creation of an audit report

d) Improvement of business operations

A

d

56
Q

A company monitors and manages business operations by establishing standards and
operational procedures to prevent unlawful or unjustifiable acts, mistakes, errors, and
other problems, and to ensure that the organization is run healthy, effectively, and
efficiently. Which of the following is the most appropriate term that represents this
policy or mechanism?

a) Information ethics

b) Internal design

c) Internal control

d) Privacy protection

A

c

57
Q

Which of the following is the most appropriate explanation of CSR that is becoming
increasingly important for the competitiveness and sustainable success in every size of
enterprises?

a) A technique that a company uses to analyze the management styles and business
processes of competitors and to learn and adopt their advantages

b) A concept that a company can enhance its value by taking responsibility for the
social and environmental impact of business activities

c) A system for checking the management of a company to ensure that the power and
authority of a management executive is exercised properly

d) A core competence of a company, such as technology or skill, which provides the
company’s unique value that cannot be imitated by competitors

A

b

58
Q

Which of the following is the appropriate rule for “brainstorming” that is a method of
resolving problems?

a) Participants should select and present only high-quality ideas among their own ideas.

b) Participants should criticize another participant’s ideas without hesitation.

c) Participants should avoid presenting better ideas based on another participant’s.

d) Participants should listen to free-wheeling opinions, including unique ideas.

A

d

59
Q

Which of the following indicates a characteristic of management accounting?

a) It is always necessary to verify every piece of accounting information based on
evidence such as a written contract.

b) The calculation of profit and loss, as well as financial calculation, is done by
department, by product, or by project, according to management needs.

c) Quantification of accounting information is limited to measurement on a monetary
basis.

d) It is necessary to do calculations based on relevant laws such as the commercial law
and tax law, not on economics or statistics.

A

b

60
Q

Company A manufactures and sells product B. Which of the following is the
appropriate expression for calculating the total cost of product B? Here, the total cost
refers to all the costs incurred until product B is sold.

a) Sales of product B  Operating expense of product B

b) Sales of product B  Manufacturing cost of product B

c) Manufacturing cost of product B + Operating expense of product B

d) Manufacturing cost of product B + Operating profit of product B

A

c

61
Q

Which of the following is the right that belongs to a purchaser of a PC software
package provided by CD-ROM?

a) Right to use the program stored in the CD-ROM

b) Copyright of the program stored in the CD-ROM

c) Design right of the CD-ROM storing the program

d) Copyright of the CD-ROM storing the program

A

a

62
Q

Which of the following is the most appropriate example of e-mail transmission from
the viewpoint of consideration for recipients?

a) A questionnaire on member satisfaction is sent by e-mail to all the addresses of 100
selected members entered in the “To” (destination) field.

b) A large-size document presenting a company’s products is sent to a customer as an
e-mail attachment without being compressed.

c) A reply to an e-mail query about a product is sent to those customers who should
know about the details, by entering their addresses in the “Cc” (carbon copy) field.

d) An e-mail is sent to the limited customers specified in the “Bcc” (blind carbon copy)
field in order to inform them of the URL of a specially planned homepage.

A

d

63
Q

In the case of placing an order for a product on an Internet shopping site, at which
point is the sales contract concluded?

a) At the point in time when the consumer’s purchase message reaches the shop

b) At the point in time when the shop sends out an acceptance notice to the consumer

c) At the point in time when the shop’s acceptance notice reaches the consumer

d) At the point in time when the ordered product reaches the consumer

A

c

64
Q

Which of the following is an appropriate description concerning the two-dimensional
code symbol?

a) Information is read in the horizontal direction only, in the same way as the
one-dimensional bar code.

b) Errors can be detected in both horizontal and vertical directions, but cannot be
corrected.

c) When the area is equivalent in size to the one-dimensional bar code, more
information can be recorded.

d) Since a matrix code has information in both horizontal and vertical directions, its
adjustable reading angle is narrow.

A

c

65
Q

Which of the following is the most appropriate explanation of “digital divide” in
relation to information technologies and services?

a) It refers to the economic or social gap between those who take full advantage of
information equipment and those who do not.

b) It refers to an environment where all people including handicapped people and
senior citizens have access to the Internet by using information equipment.

c) It refers to the level of availability of information equipment and services for all
people including handicapped people and senior citizens.

d) It refers to the people who cannot obtain information because of their lack of
knowledge or skills about information equipment such as a PC.

A

a

66
Q

Which of the following is an activity of quality management based on ISO 9001: 2008?

a) Preventive actions for potential problems should be implemented at the field staff
level and are therefore not reported to the management level.

b) Since an audit is performed by a third party on a regular schedule, no internal audit
is performed.

c) Records related to quality are stored in a server in order to share the information
among the interested parties.

d) Although a project consists of the company’s employees and the partner company’s
employees, only the company’s employees are informed of the quality policy.

A

c

67
Q

Although a data warehouse is put into operation, it is seldom used. As a result of user
interviews, it is concluded that the user’s skill level is lower than expected. Which of
the following is an appropriate plan to promote the utilization of the data warehouse?

a) Sending a notification of usage promotion to users through their managers

b) Preparing standard templates for data extraction and analysis patterns

c) Providing data more promptly in real-time to improve data precision

d) Adding more information that users are likely to need

A

b

68
Q

When two or more companies work together under an alliance agreement, which of the
following is the most appropriate risk that is expected to be reduced?

a) Business investment risk

b) Information leakage risk

c) Brain drain risk

d) Fraud risk

A

a

69
Q

Which of the following is the most appropriate explanation of “benchmarking” used in
business management?

a) It is a tool to radically transform management practices and structures by
redesigning business processes and making full use of information technology.

b) It is a tool to compare business processes and performance metrics with those of the
strongest competitor or a leading company as a reference of best practices.

c) It is a tool to promote quality control across all departments, by reviewing the degree
of product quality improvement in comparison with competitors.

d) It is a tool to identify a company’s own original skills and technology that are highly
profitable and superior to other companies.

A

b

70
Q

Q70. Company A is evaluating the business strategy that was implemented last fiscal year.
When the conditions are as shown in the table below, what is the score of the overall
evaluation?

A
71
Q

A chain store with a distribution system is connected to the manufacturer via a
computer network, in order to use it to determine optimal production volumes.
Among the information collected by the chain store, which of the following is an
appropriate combination of information required for the manufacturer?

a) Inventory information and point-of-sale information

b) Shelf allocation information and inventory information

c) Shelf allocation information and inbound inventory information

d) Inbound inventory information and point-of-sale information

A

a

72
Q

Which of the following is the type of retailing where the headquarters provides the
business right, the right to use the trademark, and know-how about opening and
running stores, based on contracts with member stores, and collects royalties in return?

a) Outlet store

b) Antenna shop

c) Franchise chain

d) Voluntary chain

A

c

73
Q

Which of the following is an appropriate explanation of MOT (Management of
Technology)?

a) It is the business activity of a company gaining control of all or part of another
company through merger or acquisition for the purpose of expanding the scale of
operation.

b) It is the concept of management under which a company doing industrial business
invests in scientific methods and materials to promote innovation and to grow
business continuously.

c) It is the business activity of the management of a company raising funds from
financial institutions and buying the stock to acquire the controlling interest of the
company.

d) It is the material management technique for calculating the quantities of the
components and materials necessary to produce a product and reflecting the results
on the production plan.

A

b

74
Q

An ERP (Enterprise Resource Planning) package is a suite of fully integrated software
applications that are used to perform administrative business processes such as
financial management, procurement, personnel, and payroll administration. Which of
the following is the most appropriate description concerning such an ERP package?

a) An ERP package can be installed with relative ease because the business processes
of a company do not need to be analyzed.

b) An ERP package should be maintained by individual user departments after its
installation.

c) An ERP package should be installed after business processes are verified and
standardized.

d) An ERP package is system software integrated and designed especially for the
business processes of domestic companies.

A

c

75
Q

Which of the following is the system that records sales information when a product is
sold at the store and that collects, accumulates, and analyzes product sales information
for each product?

a) CAD

b) CIM

c) EOS

d) POS

A

d

76
Q

Which of the following is a technology that is defined by some international standards
and used for contactless IC cards such as train or bus passes?

a) IrDA

b) RFID

c) Bar code

d) Wireless LAN

A

b

77
Q

A factory is engaged in assembly production of product P that consists of components
A and B. The processing of component A requires component C, and the processing
period is one week. The delivery lead times of purchased components B and C are
two weeks and three weeks, respectively. Product P can be assembled in one week
only after components A and B are both delivered. What is the minimum number of
weeks required to produce one unit of product P, including the delivery periods of the
components? Here, there is no stock of any of the components.

a) 4

b) 5

c) 6

d) 7

A

b

78
Q

78.) As shown below, data in CSV format is entered using spreadsheet software and then
calculation formulas are entered in cells D1, D2, and D3. Which of the following
numeric values is displayed in cell D3? Here, data in CSV format is entered
sequentially from the leftmost cell in the first row, and a carriage return code (C
R)
causes the active cell to move to the leftmost cell in the next row. When a numeric
value is entered in a cell, values in other cells are re-calculated immediately.

A
79
Q

Which of the following is categorized as “embedded software” that is generally written
for special-purpose microchips, not for general-purpose CPUs?

a) Software that is used for designing, drawing, and other tasks for industrial products

b) Software that controls the amount of fuel supplied to the engine of an automobile

c) Software that is used on a PC to edit images taken by a digital camera

d) Software that performs macro calculation as a function of spreadsheet software

A

b

80
Q

Which of the following is an explanation of “contact management” that is a basic
function of SFA (Sales Force Automation)?

a) Sales efficiency is enhanced by taking prompt action on every inquiry from
salespersons.

b) The order receiving rate is increased by having the entire sales organization respond
to a customer, rather than having only a single salesperson respond to the customer.

c) A set of records including customer visiting days and sales results is managed, in
order to perform effective sales activities for prospective and existing customers.

d) Sales techniques accumulated on an individual basis are identified and shared, in
order to improve the performance level of the entire sales department.

A

c

81
Q

Which of the following is the chief position that has direct responsibility for
developing and implementing information systems strategy based on business strategy?

a) CCO

b) CFO

c) CIO

d) COO

A

c

82
Q

Which of the following is used for accumulating and consolidating a large amount of
data acquired through various business activities and thereby providing the helpful and
meaningful data as a management tool such as a decision-making support system?

a) Data mapping

b) Data warehouse

c) Data dictionary

d) Data modeling

A

b

83
Q

Company A, which manufactures and sells house building materials, identifies a
problem with its logistics operation and develops an improvement plan to resolve the
problem. Which of the following is the most appropriate mechanism or function to be
computerized to implement the improvement plan?

[Problem]
Since it takes several days to deliver the product ordered by a sales office, each sales
office has in stock all of the products dealt with by the company in fear of being out of
stock. As a result, an enormous inventory cost is incurred by Company A as a whole.

[Improvement plan]
A logistics warehouse is built in the major territory of the sales area, and delivery
trucks are allocated so that any product can be delivered on the day the order from the
sales office is received.

a) A mechanism that enables sales offices to inquire the number of new housing starts
in their sales territories

b) A mechanism that enables sales offices to immediately inform the logistics
warehouse about the order details

c) A mechanism that enables the manager of each sales office to understand the current
inventory cost

d) An analysis function that enables management to compare and review the sales
performance of individual sales offices

A

b

84
Q

When system development is outsourced for the purpose of constructing a system,
which of the following is an appropriate item to be considered?

a) Placing an order with a reliable outsourcee in order to complete the acceptance test
in a simple and easy way

b) Monitoring the progress of development on the outsourcer side in order to find and
resolve problems early

c) Entrusting all tasks, including the determination of the specifications of business
operations, to an outsourcee who is familiar with the business operations

d) Giving detailed instructions on outsourced tasks down to each staff member, even if
the outsourcee is reliable

A

b

85
Q

When computerization of an information system is planned, which of the following is
the most appropriate item to be considered?

a) Promoting a study of developing the system as much as possible by a company’s
own staff, in consideration of system operations

b) Installing an equivalent system used by other companies in the same industry in
order to avoid failures

c) Describing specifically the initiative of computerization, the operation manuals, and
the measures against system failures

d) Clarifying the effectiveness of the information system as well as the return on
investment

A

d

86
Q

When an error message displayed by an application program is designed, which of the
following is an appropriate item to be considered?

a) Only the fact and details of the error, rather than the way of handling the error,
should be displayed.

b) Only the information that system developers need to identify the cause of the error
should be displayed.

c) Since it is desirable that the error message be as short as possible, the abbreviation
and error code should be displayed as they are.

d) Action to be taken by the user should be displayed briefly and precisely with the
error message.

A

d

87
Q
  1. In the figure below, blanks A through D represent the transaction process that is used
    when Company X exchanges the forms or documents with the customer. When time
    progresses from left to right, which of the following should be inserted into blank B?
    Here, each of blanks A through D corresponds to one of the options “a)” through “d)”.
A
88
Q

Which of the following is an explanation of “acceptance inspection” performed for a
vendor?

a) Checking the estimate submitted by the vendor prior to placing an order based on
that estimate

b) Checking whether the deliverables provided by the vendor conform to the
requirements specifications

c) Requesting the vendor to study and submit the proposal for the construction of a new
system

d) Requesting the vendor to provide information for the purpose of collecting
information

A

b