Oct 2014 Flashcards

1
Q

Which of the following is an appropriate description concerning the relationship that
always holds for two sets A and B? Here, “X  Y” represents the intersection (i.e.,
product set) of X and Y, and “X  Y ” represents the union set of X and Y.

a) “A B” is a subset of the set other than A.

b) “A B” is a subset of A.

c) “A B” is a subset of “A B”.

d) “A B” is a subset of A

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2.)
As shown in the table below, columns A and B contain all possible combinations of
numbers 0 through 9, and the table has 100 rows in total. When all the rows where the
value in column A is equal to or less than the value in column B are removed from the
table, how many rows remain in the table?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When the decimal to binary conversion is performed, which of the following is a decimal
number that can be represented in the finite number of bits?

a) 0.1

b) 0.2

c) 0.4

d) 0.5

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When an analog audio signal is digitized and converted back to analog again, which of
the following is the combination that can generate a signal waveform most closely
approximating the original wave?

Sampling cycle | Number of quantization levels
a) Long | Many
b) Long | Small
c) Short | Many
d) Short | Small

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q5.)
A stack is a first-in last-out data structure. By using the stack, a device changes the
order of data received from the right side and sends it to the left side, as shown in the
figure below. There are three types of operations available on the device, as described
below.
(1) Data received from the right side is sent to the left side without any alteration.
(2) Data received from the right side is pushed into the top of the stack.
(3) Data popped out of the top of the stack is sent to the left side.
When the device receives X, Y, and Z in this order from the right side, which of the
following is the order in which the device cannot send them to the left side even if the
operations (1) to (3) are combined?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CGI (Common Gateway Interface) is an interface to the Web server from a particular
program that is executed in response to a request from a client. Which of the following
is a script language that can be used to write such a program executed via CGI?

a) Perl

b) Postscript

c) SGML

d) SQL

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the language that enables the user to define and use tags
enclosed by angle brackets (“<” and “>”) specifying the structure and other aspects of a
document, in order to accomplish the intended purpose?

a) COBOL

b) HTML

c) Java

d) XML

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a file that is used to store information before and after database
updates and also used to recover from a database failure?

a) Backup file

b) Index file

c) Journal file

d) Snapshot file

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an appropriate characteristic of an HDD (Hard Disk Drive) that
is used as an auxiliary storage device?

a) The read/write speed of an HDD is slower than that of a CD-ROM drive.

b) An HDD can be used as main memory as well as auxiliary storage.

c) Electric power must always be supplied to an HDD in order to retain data.

d) Data can be read and written to and from an HDD in a direct (or random) access
manner.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a dedicated memory module that is used to retain data, such as
characters and graphics, to be displayed on a computer screen?

a) Cache memory

b) Flash memory

c) Video memory

d) Virtual memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the most appropriate description concerning a multi-core
processor?

a) Several microprocessors are installed in a single PC in order to improve the reliability
of the PC by performing the same processing simultaneously in each processor.

b) A quad core processor has four times as much processing power as a dual core
processor, if each core is equipped with the same arithmetic and logic unit.

c) The clock frequency of a processor is temporarily increased according to the load of
processing, and as a result, high-speed processing can be achieved.

d) A single processor has multiple processing circuits that can perform different
arithmetic operations in parallel in order to enhance the performance of the processor.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the unique value that is sequentially assigned to a memory
location in order to identify the location of instructions or data stored in the main memory
of a computer?

a) Address

b) Counter

c) Index

d) Pointer

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a technical term that refers to a dedicated file server that can be
connected directly to a LAN and shared among several client computers?

a) NAS

b) RAID

c) SAN

d) SSD

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q14. Which of the following is an explanation concerning the reliability index that is
calculated by the expression below?

MTBF
_______
MTBF+MTTR

a) Average amount of time between system failures

b) Average amount of time necessary to recover from a system failure

c) Proportion of the time available for system operations to the total time

d) Proportion of the downtime of a system to the total time

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the most appropriate description concerning the benchmark test
that is used as a method for the evaluation of a system?

a) The availability of a system is evaluated as a proportion of the time that the system is
normally operable.

b) The processing power of a system is evaluated by means of a set of standard programs
and data.

c) The reliability of a system is evaluated with the average time between inherent failures
of a system.

d) The maintainability of a system is evaluated with the average time to fix and restore
the system.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an appropriate explanation concerning a deadlock?

a) It is a state in which the processes of a computer are prohibited from getting
intentional or accidental access to information that usually must not be accessed.

b) It is a state in which, if the authentication of a user fails more than the limited number
of times, the user is prohibited from accessing the computer.

c) It is a state in which, when shared resources are exclusively used, two processes are
endlessly waiting for each other to release the lock of a shared resource.

d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an appropriate description concerning the virtualization of a
server?

a) A technique for virtually creating computer-generated worlds or immersive
environments that users can interact with

b) A technique for virtually operating the GUI of a remote computer connected via a
network by using a local computer

c) A technique for virtually implementing and operating two or more computers on a
single computer

d) A technique for virtually allocating more memory space than the capacity of main
memory by using a particular part of auxiliary storage

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an appropriate description concerning file management under
UNIX?

a) No removable storage media, such as CD-ROM, can be allocated to a directory, so it is
directly accessed by specifying the drive name.

b) Files are managed in a directory tree for each drive, and at first, the drive where the
target file is located is determined when the file is searched for.

c) The entire file system is managed in a single directory tree, and remote files via a
network are also allocated and accessed in the directory.

d) A home directory can be referenced by its owner only, and cannot be used when a file
is shared by multiple users.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is the most appropriate description concerning Java applet?

a) It is integrated into a client as add-in software and executed on the client.

b) It is downloaded from a server to a client and executed on the client.

c) It is executed in cooperation with an HTML document on a server.

d) It is executed without compiling the source code.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When a digital color image with a color depth of 24 bits per pixel is stored in graphics
memory, approximately how many megabytes of memory are required at a minimum to
display the image on a screen of 1,024 horizontal pixels by 768 vertical pixels? Here,
one megabyte is 106 bytes.

a) 0.8

b) 2.4

c) 6.3

d) 18.9

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a technique that can be used to compress both video and audio
data?

a) BMP

b) GIF

c) JPEG

d) MPEG

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is represented by an E-R diagram that is used for the design of a
relational database?

a) The state transition of a system that changes according to some factors, such as time
and events

b) The relationship between the input data, output data, and functions (i.e., processes) of
a system

c) The relationship between entities, such as humans, objects, places, and events, which
constitute the target world

d) The movement of business processes illustrated with the attention focused on the flow
of data

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Q23. ) In the description below concerning a relational database, which of the following is an
appropriate combination of technical terms to be inserted into blanks A and B?
In a relational database, information for uniquely identifying each individual record
(i.e., row) is called A , and tables are related to each other with a particular
B .
A B
a) an entity field
b) an entity record
c) a primary key field
d) a primary key record

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Among the primary key, foreign key, and index that are set in the tables of a relational
database, which of the following is the list that contains all the items where multiple units
of each item can be set for a single table?

a) Index

b) Foreign key, index

c) Primary key

d) Primary key, foreign key, index

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Q25. Which of the following is the relational operation that extracts only the rows of a product
whose price is 10 dollars or more, from the “Product” table of the relational database
shown below?
Product
Product number Product name Price (dollars)
S001 Scissors 20
S002 Pencil 5
S003 Notebook 12
S004 Eraser 8
S005 Ruler 15

a) Join

b) Projection

c) Selection

d) Union

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is an appropriate description concerning IPv6?

a) A larger number of addresses than IPv4 can be assigned because of a 128-bit address.

b) IPv6 and IPv4 cannot co-exist in the same single LAN.

c) IPv6 is a dedicated protocol for a wired LAN, and cannot be used for a wireless LAN.

d) An optical fiber cable rather than a regular twisted pair cable is required to use IPv6.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an appropriate role of the NTP (Network Time Protocol) that is
used in a TCP/IP network?

a) Delivering synchronized video and audio data via network in real time

b) Synchronizing the time between devices connected to a network

c) Providing proof that a file existed at or before a certain time

d) Changing the encryption key after a fixed period of time in a wireless LAN

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is the most appropriate description concerning WAN?

a) High-speed communication is enabled with the help of a wide frequency bandwidth
available for data communications using ADSL, optical fiber, etc.

b) All information terminals and devices are connected via diverse wired or wireless
networks, and various services can be used at any time and from any location.

c) Electric waves are used in place of metal cables or optical fiber cables to construct a
WAN infrastructure.

d) The network service of a telecommunications carrier is used to connect geographically
separated LANs, such as those for the headquarters and branch offices.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In the environment of a wireless LAN, which of the following is an appropriate
description concerning ESSID that is set in the access point and terminal?

a) It is a character string used as a key for encrypted communication.

b) It is a type of algorithm used for encryption and decryption.

c) It is a channel number for electromagnetic waves used in the wireless LAN.

d) It is a character string used to identify the network of a wireless LAN.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is an appropriate explanation concerning a router that is used as a
network device?

a) It is used to interconnect a LAN and a telephone line, and perform data modulation
and demodulation.

b) It is used to interconnect the terminals of LAN, and analyze the MAC address of the
received data in order to transfer it to the destination terminal.

c) It is used to interconnect the terminals of LAN, and transfer the received data to all
terminals.

b) It is used to interconnect LANs and/or WANs, and analyze the IP address of the
received data in order to transfer it to the appropriate network.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In an organization under the operation of an ISMS, the fact that the retired persons’ IDs
are deleted in a batch at the end of the month is reported during an audit. Among the
four steps of the PDCA cycle in the ISMS, which of the following is the step where the
corrective action plan is implemented so that such a deletion is performed each time a
person retires?

a) P

b) D

c) C

d) A

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In terms of information security, which of the following is an incident where availability
is compromised?

a) A system stops because of the occurrence of a power failure.

b) A file is accessed by an unauthorized user because of some wrong privilege settings.

c) Data of a transaction with a customer is leaked because of unauthorized access.

d) Data is updated erroneously because of a bug in a program.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Q33. )
The right of access to the file aaa is set as shown in the table below. When it is
necessary for user B to create another file bbb by copying the file aaa, which of the
following is the most appropriate description concerning the right of access to the file
aaa?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is the name of a malicious program that infects multiple
computers and simultaneously makes an attack, such as a DDoS attack, when a command
is received from an attacker who is in a remote location?

a) Bot

b) Honey pot

c) Macro virus

d) Worm

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is the most appropriate description concerning risk management
in information security?

a) The person with ultimate responsibility is appointed from among the staff members in
charge of information security management at the workplace.

b) Risk management is performed as an independent activity that is separated from the
activities of the organization.

c) All staff members of an organization divide up their roles, and perform the activities of
risk management across the organization.

d) An individual information security policy is developed for each department under a
single management system, and each department implements the policy independently.

A

c

36
Q

Which of the following is an appropriate explanation concerning a numeric check?

a) It examines whether the check characters calculated from the input data on the basis of
a certain rule are the same as the appended check characters.

b) It examines whether the input data to be handled as a numeric value does not include
non-numeric characters, such as alphabetic characters.

c) It examines whether there exist no inconsistencies between related items, such as sales
quantity, stock quantity, and purchase quantity.

d) It examines whether the input data does not include multiple records with the same key
during the creation of a master file.

A

b

37
Q

Hardware and software that are identical to the production environment are prepared, and
it is verified that the response time of a query from a terminal is within the target value.
What is this type of test called?

a) Software integration test

b) System test

c) Unit test

d) White box test

A

b

38
Q

In order to achieve a non-stop system, which of the following is an appropriate item to be
considered during the design of the system architecture?

a) Partitioning of software into components

b) Encryption of data

c) Reduction in power consumption of hardware

d) Dual redundancy of hardware

A

d

39
Q

As described below, there are three types of worksheets created by using spreadsheet
software. Each of the worksheets can be considered to be a program. Among the test
activities for those worksheets, which of the following is an activity that is regarded as an
integration test?

(1) Worksheet “First Half Year” that calculates the total sales when the sales of all the
months from January through June are entered
(2) Worksheet “Second Half Year” that calculates the total sales when the sales of all
the months from July through December are entered
(3) Worksheet “Full Year” that automatically calculates the annual total sales by adding
the total sales of “First Half Year” to that of “Second Half Year” and then displays
the sales by month in a graph

a) A test activity which verifies that, if the sales of any month fail to be entered in “First
Half Year” or “Second Half Year”, an error occurs in relation to the total sales in the
worksheet

b) A test activity which verifies that, when the sales of all the months from January
through June are entered in “First Half Year” and the sales of all the months from July
through December are entered in “Second Half Year”, the total half-year sales are
correctly calculated in each worksheet

c) A test activity which verifies that the total sales of “First Half Year” and those of
“Second Half Year” are correctly reflected in worksheet “Full Year”

d) A test activity which sums up the manually calculated total sales of “First Half Year”
and “Second Half Year” and then verifies that the result matches the total annual sales
that are manually calculated

A

c

40
Q

The development of new business software is completed and ready for installation in the
production environment. Which of the following is an appropriate activity that is
required during the installation of the software?

a) Estimating the total cost required for system operations

b) Obtaining all necessary hardware resources such as disk capacity

c) Determining the functions to be implemented by the software

d) Estimating the person-hours required for the development of the software

A

b

40
Q

Which of the following is an appropriate explanation concerning software maintenance?

a) During system development, each program is created and verified on the basis of the
detailed design, and also modified as appropriate if a significant error or inaccuracy is
detected.

b) Programs are revised or modified for the purpose of maintaining the stable system
operations and also keeping pace with the development of information technology and
some changes in business strategy.

c) In response to a question from a system user, the question is recorded and if necessary,
transferred to the appropriate department, and after that, the final result is also
recorded.

d) From a wide range of perspectives, the system including software is investigated, and
it is determined whether or not the system can contribute to the management of
business operations.

A

b

41
Q

Which of the following is an appropriate description concerning the creation of a test case
for a white box test?

a) For items in which a numeric value should be entered, a test case is created by setting
non-numeric data.

b) The relationship between input data and output data is illustrated by using a graph, and
the effective combination is created as a test case.

c) In a test for entering the body weight of people, a test case is created by setting the
upper limit as 300 kg and the lower limit as 500g.

d) A test case is created so that all branch paths of a program are executed at least once
on the basis of the program logic

A

d

42
Q

In a software development project, the development process is performed in sequence
from upstream to downstream. The judgment of whether or not a phase is completed is
made for each phase, such as requirements definition, system design, and detailed design,
and after that, programming is performed. Which of the following is the software
development model that is applicable to such a project?

a) Incremental model

b) Prototyping model

c) Spiral model

d) Waterfall model

A

d

43
Q

When the system development process is performed in the order of requirements
definition, external design, and internal design, which of the following is an activity that
is performed during internal design?

a) Determining the target value of the screen response time

b) Dividing the system into several subsystems

c) Determining the length and attributes of each record stored in a database

d) Designing the layout of the I/O screens and forms

A

c

44
Q

Which of the following is the most appropriate purpose of creating a WBS in project
management?

a) To improve the efficiency of progress management

b) To clarify the deliverables and associated activities

c) To clarify the standards for quality verification

d) To promote awareness of the purpose of a project

A

b

45
Q

In project management, which of the following is an appropriate diagram or chart that can
be used for representing the time sequence and dependencies of activities and creating the
schedule of a project?

a) Arrow diagram

b) Cause and effect diagram

c) Composite bar chart

d) Control chart

A

a

46
Q

In a project, a contingency reserve is the cost that is included in the initial project scope
and is prepared for measures against events that are predictable but uncertain. Among
the costs that are allocated by the project manager of a vendor company that receives an
order for a system development project, which of the following is an appropriate cost that
can be classified as a contingency reserve?

a) The cost that is necessary for the replacement of a device when the device happens to
fail under the development environment

b) The cost that is necessary for the activities of the project leader who manages the
development progress

c) The cost that is necessary for fulfilling the new requirements of users that are outside
the scope of the project

d) The cost that is necessary for purchasing the quality management tools of a system that
are planned to be adopted in the project

A

a

47
Q

Among the descriptions A through C concerning the measures for risk reduction to be
considered when a new product is developed, which of the following is the list that
contains all appropriate measures for reducing quality-related risks?

A: Developing the product by using stable technology

B: Purchasing insurance against development delays

C: Creating a prototype of the product

a) A, B

b) A, C

c) A, B, C

d) B, C

A

b

48
Q

In order to increase the productivity of programming activities in a system development
project, the course of training to improve skills necessary for using development tools is
planned for new project members. Which of the following is the most appropriate
indicator that can be used to evaluate the effect of this plan?

a) The total number of participants in training

b) The number of times that training is implemented

c) The amount of programming created in one day by each member

d) The total hours of participation in training by each member

A

c

49
Q

Among the management functions for service support, which of the following is the
process of identifying all IT assets such as hardware and software, and creating and
maintaining an up-to-date record of those IT assets including related documentation or
such other information?

a) Configuration management

b) Incident management

c) Problem management

d) Release management

A

a

50
Q

Which of the following is an appropriate description concerning incident management?

a) An incident that cannot be resolved within the time period specified in the SLA is
transferred to problem management.

b) Measures for eliminating or minimizing the possibility of any potential recurrence of
an incident are implemented.

c) The recovery of a normal service operation is given higher priority than the cause
investigation of an incident.

d) The occurrence of an incident for which the method of resolution is known does not
need to be recorded

A

c

51
Q

Which of the following is the technical term that shows the management cycle in IT
service management?

a) ITIL

b) PDCA

c) SLA

d) SLCP

A

b

52
Q

Which of the following is an appropriate description concerning a service desk?

a) The service desk must provide an automated answering mechanism rather than
operator-assisted services.

b) The service desk is located within a company, and the relevant business operations are
not outsourced.

c) Questions, such as how to operate the system, are received through e-mail and
telephone.

d) The service desk activities can be classified into inbound for receiving phone calls
such as those for receiving orders, and outbound for making phone calls such as those
for sales

A

c

53
Q

When a contract is signed between a user organization and an IT service provider, which
of the following is the document that describes the consensus between the two parties in
order to define the quality and scope of services?

a) Service catalog

b) Service document

c) Service level agreement

d) Service level requirements

A

c

54
Q

In a data center where IT equipment is installed for providing IT services, which of the
following is an appropriate activity that exercises control over the physical environment,
such as the cooling and power source of IT equipment, and control over the entrance and
exit to and from the data center?

a) Access management

b) Facility management

c) Incident management

d) Service level management

A

b

55
Q

IT control is classified into general control and application control concerning IT.
General control refers to the control activities for guaranteeing the environment in which
each application control works effectively. Application control refers to the control
activities for ensuring that all business operations approved in the system for managing
business operations are processed and recorded appropriately. Among the descriptions
concerning IT control activities, which of the following can be regarded as general
control?

a) A set of system development rules and regulations that are used commonly across an
entire company

b) A method for restricting the usage range of a personnel system that is used commonly
across an entire company

c) A method for managing the master data of an accounting system that is used
commonly across an entire company

d) A procedure for correcting the input errors of a purchasing system that is used
commonly across an entire company

A

a

56
Q

Among the improvement activities that are performed on the basis of the results of a
system audit conducted within a company as an internal audit, which of the following is
conducted by the system auditor?

a) Individual improvements are performed on the basis of the improvement action plan.

b) The improvement action plan is approved.

c) The items to be improved are decided, and the improvement action plan is developed.

d) The improvement status is confirmed, and the improvement results are evaluated

A

d

57
Q

A system auditor is not allowed to have any vested interest in a subject for audit. Which
of the following is the technical term that is associated with such a situation?

a) Competence of auditor

b) Independence of auditor

c) Practical experience of auditor

d) Presentation ability of auditor

A

b

58
Q

Which of the following is the concept for promoting energy conservation in society and
protecting the environment through not only the energy saving of information and
telecommunications systems including PCs, servers, and networks, but also the effective
use of such systems as well as resources?

a) Eco farm

b) Environmental assessment

c) Green IT

d) Zero emission

A

c

59
Q

Which of the following is the most appropriate description concerning management
principles?

a) It is reviewed and revised every one to two years.

b) It expresses a company’s mission and its meaning of existence.

c) It defines the management plan and management policy.

d) It is not clearly written as a company’s motto or philosophy.

A

b

60
Q

Among the employee training methods, which of the following is classified as
“off-the-job training” rather than “on-the-job training”?

a) Promoting the independence and autonomy of employees by granting authority to the
site where the real work takes place

b) Enabling the acquisition of knowledge and techniques through education and training
implemented separately from work

c) Enabling the acquisition of necessary knowledge and techniques by imparting
guidance and training on a planned basis through actual tasks

d) Putting forward questions and simple advice to have employees work towards their
goals for themselves

A

b

61
Q

Which of the following is an appropriate explanation concerning a Pareto chart?

a) It represents the flow of activities from start to end by using an arrowed line for each
activity and a circle for the start point or end point for individual activity, and by
connecting circles and arrows sequentially from left to right.

b) It is created by plotting values of two-dimensional data as coordinate values of the
vertical axis and horizontal axis.

c) It is a type of graph that combines both a bar graph with items arranged in descending
order of frequency and a line graph with cumulative frequencies.

d) It has a polygon-like shape where the values on radially elongated numeric axes are
connected with a line.

A

c

62
Q

When the test scores of students in eight subjects are evaluated, which of the following is
the most appropriate type of graph where each student can compare the average score per
subject with his/her own score per subject, and evaluating the score balance between the
subjects?

a) Histogram

b) Pie chart

c) Radar chart

d) Scatter diagram

A

c

63
Q

Which of the following is a consolidated financial statement by which a parent company
indicates the status of revenue and expenses of an accounting period of a corporate group
including subsidiaries?

a) Consolidated balance sheet

b) Consolidated cash flow statement

c) Consolidated income statement

d) Consolidated statement of shareholders’ equity

A

c

64
Q

Q65. )
Company A researches the tier of loyal customers. “Loyal customers” are defined as
customers who have recently purchased something and who have made many purchases.
During some recent periods, such as the last one month, two months, and three months,
Company A counts the number of customers for each period and each number of
purchases, and then creates an analysis table for customer purchases, in order to narrow
down the loyal customers. Which of the following is a “customer purchase analysis
table” that is suitable for obtaining the stratified number of loyal customers?

A
65
Q

Which of the following is an explanation concerning ROE (Return on Equity)?

a) It is an index that measures how many times a company’s inventory is sold and
replaced in a given period.

b) It is an index that measures the safety and soundness of financial activities in a
company.

c) It is an index that measures the profitability calculated as a company’s net income
divided by its equity capital.

d) It is an index that measures the ratio of dividends paid to stockholders on the basis of
the current net profit.

A

c

66
Q

Among the various types of license agreements for a software package, which of the
following is an appropriate explanation concerning a site license?

a) A software package can be used on multiple computers in a designated company or
organization.

b) A software package can be used on a designated computer or a definite number of
computers.

c) A software package can be installed on a designated server, and can also be used by
any and all clients to access the server.

d) A software package can be used by a designated user or a definite number of users
regardless of use or purpose.

A

a

67
Q

Which of the following is the type of software that can be copied or modified freely
without permission from the owner of copyright?

a) Open source software

b) Package software

c) Shareware

d) Utility software

A

a

68
Q

Which of the following is a case example where Bluetooth is used as a standard protocol
of wireless communications for cellular phones, household electric appliances, or such
other devices?

a) Connecting two controllers to one home video game console without any cables

b) Receiving signals from some GPS satellites into a car navigation system

c) Reading a QR code by using a cellular phone

d) Reading the information or data on an IC card ticket at an automatic ticket gate

A

a

69
Q

There exist two indicators for evaluating the status of achievement of strategic objectives:
one is the leading indicator for evaluating the means of achievement of objectives, and
the other is the lagging indicator for evaluating the level of achievement of objectives.

When the strategic objective is the “acquisition of new customers,” which of the
following is considered as a leading indicator?

a) The number of new customers

b) The number of visits to prospective customers

c) The rate of acquisition of new contracts

d) The rate of increase in total customers

A

b

70
Q

For the purpose of reviewing business strategy, Company A analyzes the internal and
external environments by using a SWOT analysis. Which of the following is the most
appropriate example that is handled as an analysis of the internal environment?

a) Identifying the characteristics of products that compete with Company A’s products

b) Understanding the marginal profit ratio of Company A’s products

c) Investigating the market value of Company A’s products

d) Performing market research into alternatives to Company A’s products

A

b

71
Q

Which of the following is an appropriate explanation concerning TOB?

a) It refers to announcing the time of purchase, number of stocks, price, and such other
conditions to buy the stocks of a specific company outside the market.

b) It refers to building cooperative relationships, such as financial contribution and
cross-shareholdings, between companies.

c) It refers to the acquisition of stocks of a company by its own management so that they
can become owners themselves.

d) It refers to the acquisition of a company through borrowing that uses the assets of the
target company as collateral.

A

a

72
Q

Which of the following is the strategy that enables a company to achieve growth by
incorporating advanced technologies developed by other companies and human resources
with high-level research and development capabilities into the management resources of
the company?

a) Alliance

b) M&A

c) R&D

d) Technology alliance

A

b

73
Q

Q74. )
In mutual decision-making between Company A and competitor Company B, the
scenarios to be executed mutually up to the third scenario, with Company A executing the
first scenario, are described as shown in the table below. The numeric values in the
table are the expected values of Company A in the step of the third scenario. While
Company A selects a scenario for improving its expected value, Company B selects a
scenario for reducing the expected value of Company A by predicting the result of the
third scenario. What is the expected value (in million dollars) of Company A in the step
of the third scenario?

A
74
Q

Which of the following is an appropriate explanation concerning target marketing?

a) Corporate activities are broken down into individual value activities, and the added
value of each activity is analyzed.

b) Businesses and products are classified from the viewpoint of growth and market share,
and optimum resource allocation according to positioning is performed.

c) The market is divided into several segments, and an approach focusing on a small
number of segments is undertaken.

d) The period of time from the introduction of a product to the market until its decline is
divided, and a strategy corresponding to each divided period is established.

A

c

75
Q

In order to achieve the marketing objectives such as an increase in the total sales and the
expansion of market share, a company aims for optimization by combining four elements
called 4Ps. Which of the following is an appropriate combination of the four elements?

a) Place, Price, Product, Profit

b) Place, Price, Product, Promotion

c) Place, Product, Profit, Promotion

d) Price, Product, Profit, Promotion

A

b

76
Q

Q77.)
In a sales company, the number of actually stocked products is 100 at the end of April,
and the order transactions are recorded until May 10 as shown in the table below. When
products come into stock in 5 days after an order is placed, how many stocked products
are available for allocation on May 10? Here, holidays of the sales company and its
trading partners do not need to be considered, and transactions prior to the previous
month can also be ignored.

Transaction date | Orders received | Orders placed
May 2 | 40 units | —
May 3 | — | 50 units
May 6 | 20 units | —
May 7 | — | 50 units
May 9 | 30 units| —

a) 60

b) 90

c) 110

d) 140

A

a

77
Q

Which of the following is an appropriate explanation concerning six sigma activities?

a) Taking preventive measures against the failures, which might occur in the process of
activities, by predicting such potential failures in advance

b) Solving the various problems continuously, which occur at the workplace, by getting
together as a group of staff members and by discussing such problems in the group

c) Improving the quality of target business operations by expressing the quality of the
operations in numerical values and by reducing avoidable variation in quality

d) Improving quality assurance and customer satisfaction by creating procedures,
documents, and records for all activities of quality management

A

c

78
Q

Among the devices A through D, which of the following is the list that contains all
devices that are equipped with an embedded system?

A: Automated teller machine

B: Car navigation device

C: Portable game console

D: Cellular phone

a) A, B

b) A, B, C, D

c) A, C, D

d) B, C

A

b

79
Q

Which of the following is the most appropriate service that makes use of the information
sharing function provided by groupware?

a) Network management

b) Schedule management

c) Security management

d) User management

A

b

80
Q

When the system life cycle is divided into planning process, requirements definition
process, development process, operation process, and maintenance process, which of the
following is the appropriate state at the time of completion of the planning process?

a) The scope of computerization, system configuration, and basic architecture that are
necessary to achieve business objectives are determined.

b) The requirements and constraints for the system that are based on user needs and
preferences are determined.

c) The software requirements that are optimized in light of the system requirements are
determined.

d) The requirements for business operations including the target system and for the
organization of system operations are determined.

A

a

81
Q

In order to make good use of IT to implement the business strategy of a company, which
of the following is the most appropriate point to be considered when an information
strategy is created?

a) The creation of the business strategy is the responsibility of top management, and on
the other hand, the creation of the information strategy is the responsibility of the
information systems department, and these activities should proceed independently.

b) When the computerization of business operations is planned, IT-based automation of
actual business processes should be implemented after the investigation into the
business functions and workflow of the current business operations.

c) When the computerization of business operations is planned, a clear vision of the
information system should be clarified, and it should be examined whether the purpose
and functions of the information system conform to the business strategy.

d) In the stage of creation of the information strategy, the initial cost should be evaluated
as the cost of the system, and the cost of system operations and maintenance should be
evaluated again at the start of operations.

A

c

82
Q

Which of the following is the technique for analyzing data, such as the purchase history
of customers accumulated in a database, and extracting helpful and valuable information
for use in business decisions and business operations?

a) Data cleansing

b) Data mining

c) Data modeling

d) Data warehouse

A

b

83
Q

Which of the following is the most appropriate system that is installed with the aim of
speeding up the application procedure for approval within a company and reducing the
administrative workload of staff members and managers?

a) MRP system

b) POS system

c) SFA system

d) Workflow system

A

d

84
Q

Company A runs a securities business and outsources a project to develop a stock
ordering system to Company B that is a system vendor. During the operational test of
the project, a defect is discovered. The defect is caused by the fact that Company B
cannot understand the “Exceptional rule for approval of the responsible person during
ordering of stocks,” which is established by Company A. Which of the following is the
phase where such a rule should be clearly explained?

a) Definition of business requirements

b) Definition of software requirements

c) Definition of system requirements

d) Definition of system test requirements

A

a

85
Q

When a system development project is started, which of the following is the appropriate
stage for setting the target values for quality, cost, and delivery date?

a) Creation of a computerization plan

b) Creation of a software installation plan

c) Definition of software requirements

d) Definition of system requirements

A

a

86
Q

Which of the following is an appropriate explanation concerning an RFP (Request for
Proposal)?

a) It is created by the vendor with whom an order is placed, with the purpose of
requesting the ordering company to submit a request for computerization.

b) It is created jointly by the ordering company and the vendor with whom an order is
placed, with the purpose of providing the details of the development.

c) It is created by the ordering company with the purpose of obtaining specific and
concrete ideas for a system from the vendors with whom an order is to be placed.

d) It is created by the ordering company with the purpose of collecting information and
accumulating knowhow and knowledge from a wide range of sources.

A

c