Oct 2013 Flashcards

1
Q
  1. As shown in the figure below, there exists a process of converting each character of a
    character string in accordance with the conversion table. When the result of
    performing such a conversion is “0110001010”, which of the following is the character
    string before conversion?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. As shown in Figure 1, there is a processing unit which reads two positive input values
    A1 and A2, and then writes two output values B1 and B2. B1 is equal to A2, and B2 is
    the remainder of A1 divided by A2. In Figure 2, two processing units with the same
    function as the above are connected in series. When A1=15 and A2=6 are given to
    the left-hand unit in Figure 2, what is the output value of B2 for the right-hand unit?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Among the items A through C described below about programming languages, which of
the following is the list that contains all of the appropriate items?

A: A program that is created using a machine language or an assembly language can
be executed without relying on a particular CPU.

B: A program that is converted using a compiler is finally translated into a machine
language and then executed.

C: A high-level programming language with rules similar to human languages makes
it possible to develop programs with complex calculations that cannot be executed
using a machine language.

a) A

b) A, C

c) B

d) B, C

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following can be created using HTML?

a) Web browser

b) Web page

c) Cookie

d) SQL program

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the method for describing the logical structure of a sentence in
XML?

a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)

b) Separating the sentence, clauses, and other elements by using commas

c) Enclosing the sentence, clauses, and other elements by using tags

d) Separating the sentence, clauses, and other elements by using tabs

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an appropriate description of a characteristic of hypertext
written in HTML?

a) Text information is handled, so image files cannot be linked.

b) The user must return to the highest hierarchical level before jumping to another text.

c) Links have bidirectional information, so the user can be free to jump between texts.

d) The user can jump to another text, file, or website by clicking a link.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a method of writing the same data to multiple hard disks
simultaneously and improving reliability rather than performance?

a) Striping

b) Paging

c) Interleaving

d) Mirroring

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a storage device or medium that is based on semiconductor
memory technology?

a) CD-ROM

b) DVD-RAM

c) BD

d) SSD

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a type of software that is provided for each PC peripheral and
works as an intermediary between an OS and a specific peripheral so that application
programs can use such a peripheral?

a) Installer

b) Device driver

c) Device manager

d) Converter

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an appropriate description concerning PnP used on a PC?

a) A feature to launch application programs from a remote site

b) A feature to set up peripherals automatically when connected

c) A feature to start up an OS automatically when powered on

d) A feature to run software developed for another OS

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the most appropriate description concerning a characteristic
of RAID?

a) It increases the data transfer rate of each hard disk.

b) It provides a larger capacity than the total capacity of individual hard disks.

c) It provides better performance or reliability or both by using multiple hard disks.

d) It increases data access time because it needs to access multiple hard disks

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the most appropriate explanation of TCO (Total Cost of
Ownership) that is a major factor when any purchasing decision is made for a system?

a) It is the sum of the operation and management costs incurred after the installation of
the system.

b) It is the sum of the costs required to troubleshoot software and hardware faults that
occur after the installation of the system.

c) It is the sum of the costs incurred during the installation of the system and the
operation and management costs incurred after the installation.

d) It is the sum of the costs incurred during the installation of the system in addition to
the planning phase of the system.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13.) When a computer system operates for 1,200 hours, the status of the normal operation
time and the repair time is shown in the table below. What is the value of MTTR
(Mean Time To Repair, in hours) of the system?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most appropriate term that means the process of grouping
multiple files into one, for the purpose of making effective use of storage media or
promoting the efficiency of backup or distribution?

a) Archive

b) Aggregate

c) Bundle

d) Compile

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the purpose of the virtual memory system that is known as
one of the functions provided by an OS?

a) To prevent an application program from accessing the protected area on main
memory used by the OS

b) To reduce electricity consumption during the idle state, by stopping the power
supply after data is written from main memory to external storage

c) To make it possible to execute a program even if the program requires more storage
capacity than main memory

d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the most appropriate explanation of a “multimedia authoring
tool”?

a) It is a tool that is used to create multimedia content by combining materials, such as
image, sound, and text, on the screen.

b) It is a tool that is used to play back multimedia content, such as image, sound, and
text, in the PC environment.

c) It is a tool that is used to search for multimedia information, such as image, sound,
and text.

d) It is a tool that is used to interactively define schema for multimedia database
containing information, such as image, sound, and text.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a unit that is used to represent “resolution”, one of the
performance indicators of a display or a printer?

a) bps

b) dpi

c) fps

d) psi

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the concept representing a database that is built by extracting
and restructuring data from a mission-critical business system for the purpose of
supporting information analysis and decision making?

a) Data center

b) Data warehouse

c) Data mining

d) Data roaming

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an appropriate purpose of normalizing data in a relational
database?

a) To guarantee data compatibility so that data can be shared between different types of
computers

b) To prevent the occurrence of redundancy or inconsistency of data when data is
updated

c) To identify characters that are not permitted to be sent when a database is used via a
network

d) To handle data storage areas distributed over multiple media as a single contiguous
storage area

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. )When the order records shown below are entered in the system where each order
    number must be uniquely defined, which of the following is the appropriate method for
    searching the order master file containing all of the past order records, and for checking
    the uniqueness of the order number?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a system environment where several users have access to a database simultaneously, a
new user tries to view a data record while another user is updating the same record. In
order to assure data integrity in such circumstances, which of the following is an
appropriate control method that should be used in the DBMS?

a) Interrupting the updating process to permit the new user to view the record

b) Permitting the new user to view the latest data during the updating process

c) Permitting the new user to view the record after completion of the updating process

d) Canceling the updating process to permit the new user to view the last record

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is an appropriate explanation of DNS?

a) It is a system that is used to search for a wide variety of information through the
Internet.

b) It is a system that is used to map between host names and IP addresses of devices
connected to the Internet.

c) It is a personal authentication system that is used to provide a safe and secure online
shopping environment.

d) It is a system that is used to manage personal e-mail addresses for the delivery of
e-mail messages.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When the Internet is accessed from an intranet, which of the following is the most
appropriate mechanism that can be used to relay access to the Internet, to speed up
access to it by caching Web content, and also to ensure security?

a) DMZ

b) Firewall

c) Proxy

d) Router

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is the most appropriate term that is used to indicate the location
of information on the Internet, and has the standardized format, such as
“http://www.ipa.go.jp/” ?

a) Address tag

b) Domain name

c) Home page

d) URL

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following is an appropriate explanation of MIME used on the Internet? a) It is a language that is used to describe hypertext on the Internet. b) It is a hypertext transmission protocol between client and server on the Internet. c) It is a method of address notation for uniquely identifying a resource on the Internet. d) It is a standard of exchanging multimedia data, such as audio or video, by e-mail.
d
26
When ten e-mail messages are sent successively from Company A to Company B, they may arrive at Company B in a different order from the order they are sent. Which of the following is the most possible reason for this phenomenon? a) There is a problem with the setup of Company A’s mail server. b) There is a problem with the setup of Company B’s firewall for e-mail. c) There is a possibility that e-mail delivered late is falsified on the way. d) There is a possibility that each e-mail is sent via different transfer routes.
d
27
Which of the following is an appropriate description concerning cryptography? a) The process of transforming the encrypted text back into its original plain text is called reset. b) In common key cryptography, the encrypted text is transmitted together with the common key. c) Public key cryptography uses two types of keys: a key for encryption and a key for recovering the plain text d) Common key cryptography that is also known as secret key cryptography is used for digital signature.
c
28
Which of the following is a characteristic of a Trojan horse that is a type of malicious program? a) It is designed to infect a specific type of data file by using the macro function of application software. b) It sends out fake virus information, such as a warning message about a new type of virus, through chain e-mails. c) It performs self-propagation by sending copies of itself to other computers connected through a network. d) It masquerades as a legitimate file or helpful program with the purpose of performing harmful operations.
d
29
Which of the following can be made possible by using a digital signature in e-commerce? a) Preventing an unintended third party from accessing any confidential file b) Checking that a file is not infected with a virus or other malicious software c) Protecting the content of a transaction from being leaked through wiretapping d) Confirming the identity of a partner and the correctness of the details of a transaction
d
30
Which of the following is an appropriate method of managing user IDs for a company’s in-house system? a) Shared common user IDs rather than individually assigned IDs are helpful for the reduction of system resources. b) User IDs for retired employees are kept intact until removal is directly requested by each person in question. c) Registered user IDs and authority levels are regularly inspected from the viewpoint of whether or not they are still needed. d) When users are transferred, new access privileges are granted in addition to the previously assigned access authority levels.
c
31
31. ) When a PC is connected to an online shopping site on the Internet, the Web browser displays the SSL padlock icon on the screen. Also, it is confirmed that the server certificate is that of the operator of the intended online shopping site. Among the items A through C described below on such an occasion, which of the following is the appropriate combination of decisions to be made? Here, “√” means what can be decided, and “ −” means what cannot be decided?
32
32. )When a Web server is invaded from an outside source and its content is tampered with, which of the following is the appropriate course of actions to be taken?
33
A document was received via e-mail as an attachment while at work. When the document was opened by using a word processing program, it was abnormally terminated. When the received e-mail or attached document is possibly contaminated with a computer virus, which of the following is the most appropriate action to be taken? a) Disconnecting the PC from the network, and then removing the virus safely by reinstalling the OS b) Disconnecting the PC from the network, and immediately reporting to the person in charge of the system management department c) Checking whether the problem is reproducible, if necessary, by reinstalling the word processing program d) Sending an e-mail to all employees as soon as possible in order to alert them to the virus infection
b
34
Which of the following is the most appropriate description concerning operational management for user IDs and passwords? a) In order to simplify management work, currently unused user IDs and passwords are allowed to be reused. b) In order to respond to problems promptly, a table of user IDs and passwords are created and stored by administrators. c) In order to prevent someone from maliciously using another person’s ID and password, users are free to change their own passwords at any time. d) In order to improve convenience, personnel relocation information is used to register temporary user IDs and passwords in advance.
c
35
Which of the following is the most appropriate design policy for an output form? a) The numeric items and the character items are classified into different groups, and each group is separately placed on the top and bottom or left and right of the form. b) In order to ensure consistency between forms, rules regarding the form design, such as the title position and the layout of data items, are predetermined. c) All data items, including both numeric and character items, are printed with either right or left justification. d) The data items are arranged so that the program can be understood and maintained as easily and simply as possible.
b
36
A test in system development often adopts a build-up approach where tests are performed incrementally from a smaller to a larger unit. On such an occasion, which of the following is the appropriate test sequence? a) System test → integration test → unit test b) System test → unit test → integration test c) Unit test → integration test → system test d) Unit test → system test → integration test
c
37
Which of the following is an appropriate description concerning program test? a) It is better to assure software quality during the test phase than to improve it during the design phase. b) When a program is modified after completion of the test, it is better to test the program by using both the original and additional test data. c) It is better to exclude test data that triggers an error in the program, because the purpose of the test is to confirm that the program works without any errors. d) It is better for programmers to design and execute the test cases without any assistance from other persons.
b
38
A client application for a mission-critical business system, which was built by the information systems department, displayed an error message on the screen and stopped. Which of the following is the most appropriate action to be taken by the user in this situation? a) Restarting the PC, and then notifying the information systems department that a failure occurred b) Trying to resolve the problem on one’s own, on the basis of the error message or other information c) Checking the error message with the user manual, and deciding if the failure can be resolved by self, or if the information systems department should be consulted d) Notifying other PC-based clients about the occurrence of the failure, and asking them to stop operations in progress
c
39
Which of the following is an appropriate approach to performing maintenance work for hardware? a) Maintenance work should be planned and performed only after diagnostic and predictive information, such as warning indicator or error log, is provided. b) Maintenance work should be performed on a scheduled basis even when there is no fault or failure detected. c) Maintenance work should be suspended until the next periodical inspection even when a sensuous change such as “operation noise louder than usual” is detected. d) Maintenance work is required only for printers and storage devices that involve mechanical operations.
b
40
Which of the following is the term that means the process of modifying some of the functions of a software package on the basis of user environments and requirements? a) Reengineering b) Customization c) Refactoring d) Localization
b
41
Which of the following is the development model where a trial model or a pilot unit is developed at an early stage of system development so that users can verify their requirements in a tangible manner? a) Growth model b) Incremental model c) Spiral model d) Prototyping model
d
42
Among the charts and diagrams created for project management, which of the following is the most appropriate chart or diagram that can be used to visually check the overall status of progress as well as the planned start and finish dates? a) Arrow diagram b) Gantt chart c) Cause and effect diagram d) Pareto chart
b
43
Which of the following is the most appropriate example of a project? a) Performing the periodic or schedule-based inspection of the ATM in a bank b) Creating a monthly report concerning actual production results in a factory c) Increasing the purchase volume of popular or best-selling products in a shop d) Developing a new large-scale online system in a software house
d
44
Which of the following is the activity that is performed to confirm that project deliverables achieve the required quality? a) Selecting suppliers for tools necessary for the creation of project deliverables b) Performing the review of project deliverables in advance of delivery c) Performing the progress management based on the plan of project deliverables d) Defining the roles and responsibilities of each member involved in deliverables
b
45
The programming project of image processing using a newly devised algorithm is outsourced to an external vendor. In order to ensure the strict control of handling information, which of the following is an item that must be included in the contract? a) Maintenance plan after development b) Organizational structure of development c) Performance assurance of the program d) Protection of confidentiality
d
46
Which of the following is an appropriate diagram or chart used for the identification of the critical path that takes the longest period of time from the start to the end of a project? a) Arrow diagram b) Control chart c) Tree diagram d) Milestone chart
a
47
When direct one-to-one communication is performed between three project members A, B, and C, there exist three communication paths between A and B, B and C, and C and A. When communication is performed among seven persons, what is the maximum number of communication paths? Here, there exists a single communication path between any two of the seven members. a) 7 b) 14 c) 21 d) 42
c
48
Which of the following is an appropriate risk management practice for system development projects? a) Risk management begins at the point in time when the requirements definition is completed. b) The scope of risk management does not include factors dependent on individuals, such as a lack of skills. c) Measures are taken to prevent the occurrence of a risk and to minimize damages caused by the occurrence. d) Risks can be prevented by thoroughly taking proactive measures, in which case corrective actions become unnecessary.
c
49
Which of the following is the framework that describes a collection of best practices of IT service management? a) ISO 14001 b) ISO 27001 c) ITIL d) PMBOK
c
50
In IT service management, which of the following is an appropriate explanation concerning SLA and SLM? a) SLA is a proposal for improving services that are presented by the service provider, and SLM is an activity for providing technical means to perform the maintenance management of service levels. b) SLA is an agreement on service levels between the service provider and the users, and SLM is an activity for the maintenance and improvement of the quality of IT services. c) SLA defines the activities for measuring the degree of achievement of service levels and identifying problems, and SLM defines the technical means for resolving problems. d) SLA aims at delivering a higher level of services, and SLM aims at providing a common understanding of service contents, required service levels, and other service factors.
b
51
In a company’s accounting department, a new financial accounting package is to be used, and a new server with the package installed is delivered from a vendor. Operations management of the new server is performed by the information systems department. Among the items A through D described below about what should be agreed between the accounting department as the user department and the information systems department as the operations department from the point of view of service levels, which of the following is the list that contains all of the appropriate items? A: The operating hours available for the financial accounting package B: The cost sharing between both departments for purchasing the new server C: The items to be tested when the new server is received from the vendor D: The scope and frequency of data backup a) A b) A, B c) A, D d) C, D
c
52
Which of the following is a process of IT service management that proactively identifies and analyzes the root cause of an incident and also manages problems to closure? a) Incident management b) Change management c) Problem management d) Release management
c
53
Which of the following is an appropriate description concerning the organizational structure of risk management? a) Authority and functions should be concentrated at the executive officer who is in charge of all risk management tasks covering from detection or identification to evaluation of risks. b) Since risk management includes the handling of classified information and material, departments other than those specific to risk management should not be involved in risk management. c) Since risk handling has a direct relationship with insurance and business resource management, the financial department should play the role of the risk management team. d) Measures against risks should be performed by each department possessing authority and functions, and overall management should be performed by the risk management department directly connected with the top management team.
d
54
In an IT service agreement between a service provider and users, which of the following is the term that means the ratio of the amount of service time provided to users actually during the period of pre-defined service time? a) Responsiveness b) Availability c) Usability d) Serviceability
b
55
Which of the following is an appropriate description concerning a system audit? a) The actual user of a developed system evaluates the system in order to determine whether or not the system can be brought into full operation. b) Personal identification is performed as authentication for system use, on the basis of fingerprint, voice print, iris image, or any other unique physical representation. c) From an independent standpoint, it is verified whether or not the measures against risks concerning the information system are developed and operated appropriately. d) A system is evaluated by entering the system from outside the network, and trying to steal, modify, or destroy data and programs without permission.
c
56
In the ISO 9001 standard for quality management systems, which of the following is defined as a requirement for internal audits? a) Internal audits must be conducted periodically by the organization’s system audit department or certified system audit specialists. b) Internal audits must be conducted without notice at irregular intervals to verify that the quality management system is correctly working as specified. c) Internal audits must be conducted to check if the quality management system is effectively implemented and maintained, and conforms to the requirements. d) As a prerequisite for conducting internal audits, the quality management system of an organization must be certified by an independent external assessor.
c
57
Which of the following is an appropriate explanation of IT governance? a) A framework which is a comprehensive collection of best practices concerning the management and operation rules of IT services b) The organizational ability to guide the development and implementation of an IT strategy in the appropriate direction to establish a competitive advantage c) A specifications package requesting a detailed proposal from a subcontracting IT vendor from which information systems or IT services are to be procured d) An agreement in which the service level is clearly defined by a service provider in order to assure the quality of the service
b
58
58.) Which of the following is the organizational form of a company that is shown in the chart below?
59
Q59. ) There are four companies, each with a share price of 100 dollars. One of them is to be selected for investment. The table below shows the expected price increase for each stock under high, moderate, and low economic growth. Which of the following is the stock that is expected to show the highest price increase? Here, the probability is 0.4 for high economic growth, 0.4 for moderate economic growth, and 0.2 for low economic growth. It is not necessary that zero economic growth be considered.
60
60. ) The points representing the relations between production factors (w, x, and y) and quality (z) are plotted in the graphs shown below. Which of the following is an appropriate description concerning these graphs?
61
In order to prepare for any potential bad debt on accounts receivable from a business partner, which of the following is an action that enables the appropriation of a part of the business partner’s property for accounts receivable more preferentially than the other? a) Adding debt b) Issuing an invoice c) Setting collateral d) Increasing interest
c
62
When a server with a purchase price of 30,000 dollars is leased for a period of five years at a lease rate of 2%, what is the total leasing expense in dollars? Here, the lease rate is shown as a proportion of the monthly lease fee to the purchase price. a) 32,400 b) 33,000 c) 34,200 d) 36,000
d
63
Without any particular arrangements with Company A concerning the rights to the work, Company B makes a request to Company A for the development of a program for a sales management system based on the requirements of Company B. In this case, what happens to the original ownership of the copyright of the program? a) Company A and Company B decide the copyright through discussions. b) Company A shares the copyright with Company B. c) The copyright belongs to Company A. d) The copyright belongs to Company B.
c
64
From the viewpoint of careful and prudent consideration for recipients of e-mail, which of the following is the most appropriate example of e-mail transmission? a) A questionnaire on member satisfaction is sent by e-mail to all the addresses of 100 selected members entered in the “To” (destination) field. b) A large-size document presenting a company’s products is sent to a customer as an e-mail attachment without being compressed. c) A reply to an e-mail query about a product is sent to those customers who should know about the details, by entering their addresses in the “Cc” (carbon copy) field. d) An e-mail is sent to the limited customers by using the “Bcc” (blind carbon copy) field in order to inform them of the URL of a specially planned Web page.
d
65
Which of the following is an appropriate explanation of corporate governance? a) It quantitatively measures and analyzes the cost effectiveness of environmental conservation measures, and publicizes the cost and effects. b) In addition to essential profit-making activities, a company contributes appropriately for the betterment of society by acting as a member of society. c) It is a mechanism for monitoring whether or not business management is being performed appropriately, and maintaining the soundness of corporate activities. d) It publicizes the business status of a company accurately, promptly, and continuously as a part of public relations with investors and analysts.
c
66
Which of the following is an explanation of compliance enhancement in corporate management? a) Preventing management staff and employees from being involved in illicit or illegal acts that have a possibility of threatening the survival of the company b) Establishing a framework that enables sound management by keeping the use of power by management staff in check c) Improving the level of satisfaction of the interested parties, such as customers, shareholders, and employees, to ensure continued growth of the company d) Increasing competitiveness by securing management resources that can be a source of differentiation against competitors
a
67
Which of the following corresponds to a third-party audit that is defined in “ISO 9000:2005 Quality management system—Fundamentals and vocabulary”? a) A parent company audits the quality management system of a subsidiary company. b) A customer audits the quality management system of a trading partner company. c) A company audits its own quality management system for internal purposes. d) A certification body audits the quality management system of a client company.
d
68
Which of the following is the primary purpose of the ISO 9000 series? a) To provide standards for a quality management system that aims to improve customer satisfaction b) To provide the latest methodologies and tools for effective and efficient quality management c) To provide the successful best practices of software development processes and activities d) To provide quality management activities that should be performed in a development project
a
69
Which of the following is the most advantageous effect that is produced by SCM (Supply Chain Management) that is known as a management method? a) Sales or inventory information about commercial products in retail stores can be obtained efficiently and accurately. b) Knowledge and findings can be organized into a database and used effectively and efficiently in business. c) The sequence of processes from procurement to manufacturing, distribution, and sales can be improved, and the delivery time and cost can be optimized. d) Inquiries from customers or users via telephone, FAX, e-mail, and other methods can be responded in a timely and coordinated manner.
c
70
Which of the following is an appropriate effect of alliance in corporate strategy? a) Although confusion and friction may arise because of participation of a partner company with a different culture as a result of a merger or acquisition, tangible and intangible management resources can be acquired. b) By outsourcing the non-core activities of a company to some specialized vendors or service providers, the company can shift the staff members to its mission-critical activities. c) Through technological tie-ups, outsourcing of production and sales, and establishment of joint ventures, several companies can strengthen their cooperation while maintaining their independence. d) By holding the stocks of group companies, a company can be managed and operated in the form of a company that is specialized to function as a headquarters of such companies.
c
71
Which of the following is an explanation of core competence management? a) Acquiring management resources from other companies that have an established business operation, in order to gain an advantage over competitors b) Optimizing the combination of business operations in order to have a greater effect than merely operating each business independently c) Concentrating management resources on a company’s own proprietary expertise and technology in order to establish a competitive advantage d) Reviewing best practices of other companies in order to fundamentally improve and restructure the current business processes
c
72
Which of the following is an appropriate description concerning the JIT (Just In Time) production method? a) The entire production process is performed rapidly and thoroughly by one or a few professional workers. b) The production process is started at the manufacturing line as soon as a customer order is accepted. c) Products are manufactured on the basis of the demand forecast that is made at the time of starting the production. d) The necessary items are produced and delivered at the necessary time in the necessary quantity.
d
73
Which of the following is the terminology used when product improvement, addition of new varieties, and product disposal are planned according to each stage of introduction, growth, maturity, and decline? a) Experience curve effect b) Business continuity plan c) Product portfolio management d) Product life cycle strategy
d
74
Which of the following is the most appropriate description concerning the advantageous effects of implementing CRM? a) It becomes easy to maintain accurate records about the customer payment status of account receivables. b) It becomes easy to shorten the lead time required from the point of receipt of order to delivery. c) It becomes easy to share sales approach to customers among all of the sales staff members. d) It becomes easy to deeply understand customer needs and establish long-term positive relationships
d
75
Which of the following is an appropriate explanation of MOT? a) It is the business activity of a company gaining control of all or part of another company through merger or acquisition for the purpose of expanding the scale of operation. b) It is the concept of management under which a company doing industrial business invests in scientific methods and materials to promote innovation and to grow business continuously. c) It is the business activity of the management of a company raising funds from financial institutions and buying the stock to acquire the controlling interest of the company. d) It is the material management technique for calculating the quantities of the components and materials necessary to produce a product and reflecting the results on the production plan
b
76
An ERP package is a suite of fully integrated software applications that are used to perform administrative business processes, such as financial management, procurement, personnel, and payroll administration. Which of the following is the most appropriate description concerning such an ERP package? a) An ERP package can be installed with relative ease because the business processes of a company do not need to be analyzed. b) An ERP package should be maintained by individual user departments after its installation. c) An ERP package should be installed after the business processes of a company are verified and standardized. d) An ERP package is an integrated type of system software that is designed especially for the domestic business processes.
c
77
Which of the following is the system that is used to record sales information when a product is sold at the store, and also to collect, accumulate, and analyze product sales information for each product? a) ECR b) QR c) EOS d) POS
d
78
Which of the following is a technology that is defined by some international standards and used for contactless IC cards, such as tickets for public transport? a) IrDA b) RFID c) Bluetooth d) Wi-Fi
b
79
79.) The component table below shows the quantity of each component that is required to build one unit of Product A, and the stock table below shows the quantity in stock for A, a, b, and c. How many units of Component b are additionally required to build and ship a total of 300 units of Product A? Here, there are no other items in process, on back order, or already allocated.
80
80. ) When online shopping via the Internet is done according to the procedure shown in the figure below, which of the following is the point at which this order comes into effect between the two parties unless otherwise specified?
81
Which of the following is a form of e-commerce corresponding to an online bookstore or an online shopping mall that is constructed for individuals on the Internet? a) B to B b) B to C c) C to B d) C to C
b
82
Among the characteristics required for an embedded system, which of the following is the most appropriate terminology used when a fixed process must be completed within a given period of time? a) Availability b) Reliability c) Real-time ability d) Serviceability
c
83
Which of the following is the appropriate explanation of the DFD that is created when a business process is analyzed? a) It shows various types of data items handled in the business operations and the interrelations among them. b) It shows various types of data items handled in the business operations, from sets to elements in a hierarchically detailed fashion. c) It shows the flow of data exchanged among the processes that make up the business operations. d) It shows the contents of the processes that make up the business operations, from overview to detailed view in a hierarchical fashion.
c
84
Company A, which manufactures and sells house building materials, identifies a problem with its logistics operation and develops an improvement plan to resolve the problem. Which of the following is the most appropriate mechanism that should be computerized to implement the improvement plan? [Problem] Since it takes several days to deliver the product ordered by a sales office, each sales office has in stock all of the products dealt with by the company in fear of being out of stock. As a result, an enormous inventory cost is incurred by Company A as a whole. [Improvement plan] A logistics warehouse is built in the major territory of the sales area, and delivery trucks are allocated so that any product can be delivered on the day the order from the sales office is received. a) A mechanism that enables each sales office to inquire the number of new housing starts in its sales territory b) A mechanism that enables each sales office to immediately inform the logistics warehouse about the order details c) A mechanism that enables the manager of each sales office to understand the current inventory cost d) A mechanism that enables management to compare and analyze the sales performance of individual sales offices
b
85
Which of the following is an appropriate purpose of installing groupware? a) To integrate groupware into equipment, such as PCs and peripheral devices, and provide basic hardware control functions b) To enhance the overall work efficiency of an organization by providing an environment for collaborative work c) To enhance the organization’s Internet security by implementing a solution that combines both hardware and software into a single security product d) To shorten the period of system development and improve the efficiency of maintenance by installing a suite of packaged software
b
86
Among the various types of outsourcing services, which of the following is a service that is provided by an MSP? a) Connectivity of “co-location” servers with the Internet environment b) Business processes such as human resource management, accounting, sales, and logistics c) The operations control of an IT infrastructure, such as a network, server, and storage, over the network d) Standard application services over a network through a billing method such as a flat fee
c
87
Which of the following is an activity that is performed in the requirements definition process of system development? a) Creating and approving computerization plan b) Performing qualitative and quantitative risk analysis c) Estimating investment effect and computerization costs d) Identifying the needs and demands of system users
d
88
Which of the following is an appropriate explanation of an ASP? a) A business operator or a form of service that provides communication lines for connecting to the Internet b) A service on the Internet for creating a closed community that is accessible to users who are members of the community c) A business operator or a form of service that provides users with application software on a server via the Internet d) An approach of constructing an information system from the viewpoint of a service, rather than from the viewpoint of a product such as hardware and software
c