Oct 2015 Flashcards

1
Q

When three balls are picked out consecutively from a box containing three white balls
and four black balls, which of the following is the lowest probability?

a) Probability of picking out the balls in order of black, black, black

b) Probability of picking out the balls in order of black, black, white

c) Probability of picking out the balls in order of black, white, black

d) Probability of picking out the balls in order of white, black, black

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

When the six characters a, b, c, d, e, and f are arranged in a row in any arbitrary order,
in how many ways can a and b be placed side-by-side?

a) 120

b) 240

c) 720

d) 1,440

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As shown in the figure below, decimal numbers 2, 5, 10, and 21 are represented using
five squares, each of which is either black or white.

2 □□□■□
5 □□■□■
10 □■□■□
21 ■□■□■

A white square indicates 0, and a black square indicates a different positive value that
is determined by the position of the square. When the sum of the values of the five
squares shows a decimal number, which of the following is the numeric value
represented by ■■□□□?

a) 12

b) 20

c) 24

d) 30

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

There is a standard that can represent data in a hierarchical structure by enclosing data
that corresponds to attribute N with the tags <N>, which means the start, and </N>,
which means the end, and then linking and nesting these tags. Company A decides to
comply with this standard and create a paper by using the structural rules (1) through (3)
below. Which of the following is the appropriate header of a paper named “New
Document Management” that is created by Jack Smith of the Information Systems
Department (I/S Department) in accordance with this standard and the structural rules?

[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.

a) <header>
<author></author>

<title>New Document Management
<name>Jack Smith</name><dept>I/S Department</dept>
</title>

</author info>
</header>
b) <header>

<title>New Document Management</title>

<author><name>Jack Smith</name></author info>
<dept>I/S Department</dept>
</header>
c) <header>
<title>New Document Management</title>
<author>
<name>Jack Smith</name><dept>I/S Department</dept>
</author info>
</header>
d) <header>
<title>New Document Management</title>
<name>Jack Smith
<author><dept>I/S Department</dept></author info>
</name>
</header>
</author></name></header></author></header></author>

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an appropriate description concerning EUC (End User
Computing)?

a) As EUC is widely spread, information systems departments in companies come to
have large backlogs in software development.

b) EUC is characterized with system construction and operations management by end
users without using software packages at all.

c) To support EUC, training in programming languages such as COBOL, C, and Java is
important, and it is a key role of information systems departments.

d) In order to achieve EUC, it is necessary to provide training to end users in PCs or
commercially available applications, and also to select easy-to-operate development
tools and provide training in those tools.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an appropriate characteristic of tree data structure?

a) Data elements can be retrieved by traversing a hierarchy of nodes from higher level
nodes to lower level nodes.

b) Data elements can be retrieved in the order in which they are stored.

c) Data elements can be retrieved in the reverse order to the order in which they are
stored.

d) Data elements can be retrieved by traversing cells composed of a data field and a
pointer field.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an appropriate explanation of Java?

a) It is an interpreter-type object-oriented language developed in the 1970s and
includes an integrated development environment with editor and debugger as well as
OS functions.

b) It incorporates object-oriented concepts, such as class and inheritance, into the
programming language C, and has upper compatibility with C.

c) It is a markup language used on the Web and describes the document structure by
using tags. It enables the creation of hypertext that links text, movies, etc.

d) It is an object-oriented language, and source code is compiled into a format called
bytecode that can be executed on a JVM (Java Virtual Machine).

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an appropriate description concerning the usage of HTML
(Hyper Text Markup Language) tags?

a) <label> is used to define the title of a Web page.</label>

b) <BODY> is used to describe the text of a Web page.

c) <big> is used to specify the size and style applied to each character in a Web page.</big>

d) <FORM> is used to divide a Web page into multiple frames.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an appropriate description of a multi-core processor?

a) An improvement in the throughput of the entire system is aimed at by
simultaneously executing different processing in each core.

b) An improvement in the reliability of the processing result is aimed at by executing
the same processing in several cores.

c) Several cores are controlled by hardware alone, and the OS is not required to have a
special function.

d) The throughput of the processor depends only on the number of cores, and does not
depend on the clock frequency.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is required for an application program to use the peripheral
equipment that is connected to a PC?

a) Compiler

b) Device driver

c) Plug and play

d) Hot plug

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a standard for wireless communication between a PC and
peripheral devices?

a) Bluetooth

b) IEEE 1394

c) PCI

d) USB 3.0

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an appropriate explanation concerning the cache memory of a PC?

a) It is placed between the CPU core and main memory, and is used to read and write
data at high speed.

b) It is used to store the same data in two locations at the same time in order to improve
reliability.

c) It is equipped with a mechanism that can run even a program whose size exceeds the main memory capacity.

d) It enables simultaneous access to main memory blocks by dividing main memory
into multiple blocks.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q13. When information processing systems are classified by their processing methods as
shown in the figure below, which of the following is an explanation of a horizontal
load distribution system?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q14. Among the system configurations shown below, which of the following has the lowest
probability of the entire system stopping on a failure? Here, represents an
identical device. For the entire system to work, at least one device must be running
when the devices are connected in parallel, and all devices must be running when the
devices are connected in serial.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an appropriate description concerning the hardware
maintenance of a system?

a) The hardware device that has not failed for a certain period of time is excluded from
scheduled maintenance.

b) It is safe to replace a failed hardware device with the latest model rather than the
same model, because
compatibility is guaranteed.

c) Scheduled maintenance is performed only for the hardware device that has failed
before.

d) In preventive maintenance, measures are taken before a failure occurs.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the most appropriate purpose of installing a business
application software package instead of self-developed application software?

a) To enhance the environment of development

b) To reduce the cost of development

c) To acquire knowledge of software development methods

d) To improve the skills of application developers

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When the log file on a Web server is analyzed in daily system administration, which of
the following can be found?

a) Web pages accessed by Web site visitors

b) The model name of a computer used by each visitor

c) The speed of a Web browser on each visitor’s computer

d) Personal information about individual Web site visitors

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If data is repeatedly added to and deleted from a hard disk on a PC, data may not be
stored in consecutive areas on the hard disk. When no measures are taken, which of
the following can occur?

a) Viruses cannot be detected.

b) Data cannot be written correctly.

c) Data cannot be read correctly.

d) Stored data cannot be read quickly

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In theory, what color is printed by a printer, when cyan, magenta, and yellow are mixed
together by a subtractive color mixture?

a) Blue

b) Red

c) Black

d) Green

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an appropriate explanation of MP3, which is used as a
multimedia file format?

a) File compression format for G4 facsimile communication data

b) File compression format for audio data

c) File compression format for color image data

d) File compression format for digital video data

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following effect is obtained by normalizing the tables of a relational
database?

a) The number of disk accesses for data update is reduced by compiling frequently
used data in the same table.

b) Data inconsistency due to data update is prevented by eliminating data duplication.

c) The usage efficiency of the main memory is improved by making the size of the
tables uniform.

d) Response time for queries is shortened by reducing the number of tables

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a purpose of using a database management system?

a) To enable users to access data even when there is no OS available

b) To eliminate the need for backups created in preparation for disk failures

c) To encrypt data to be transmitted over a network

d) To enable multiple users to share information while maintaining data integrity

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Q23. There is a system for entering and managing orders from customers. Sequential order
number is printed on each order form in the order of arrival unless the form has any
mistakes such as missing information. Before the order form shown below is entered
into the system, which of the following should be checked so as not to enter duplicated
order data?

Order data

Order number | Order date | Product code | Quantity | Customer code

a) Customer code

b) Product code

c) Order number

d) Order date

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Q24. )
In a company which has its offices dispersed in several buildings, it is decided to
construct a relational database to manage the locations where PCs are installed.
“Asset” table, “Room” table, and “Building” table are created, and these tables are
linked. When new data is entered, data in the table to be referenced should exist
beforehand. Which of the following is the appropriate sequence of entering data into
each table? Note that the underlined items in each table indicate the primary keys or
the foreign keys.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A DHCP server has been installed in a LAN. When a PC that automatically acquires
information from the DHCP server is to be connected to the LAN, which of the
following will be set in the PC?

a) IP address

b) Latest virus definition file

c) Address list of spam mail

d) Mail addresses assigned by the provider

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is the unit of the data transmission speed in a network?

a) bps

b) fps

c) ppm

d) rpm

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is an appropriate explanation concerning the function of a
router?

a) It optically reads pictures and texts and converts them into digital data.

b) It converts analog signals to digital signals and vice versa.

c) It controls the communication path of data and relays data across networks.

d) It archives and provides Web page data via networks

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is appropriate for the description of Bcc recipients of an
e-mail?

a) The e-mail is automatically encrypted before being sent to Bcc recipients.

b) The text is deleted from the e-mail and an e-mail containing only the subject is sent
to the Bcc recipients.

c) The Bcc addresses are not revealed to other recipients of the e-mail.

d) The destination specified in Bcc is the notification destination when a delivery error
occurs

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is an appropriate example of biometric authentication?

a) Authentication is performed by a password that is known only to the person
concerned.

b) Authentication is performed by an identification card that belongs only to the person
concerned.

c) Authentication is performed by using the fingerprints of the person concerned.

d) Authentication is performed by using a one-time password.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Among the handling of a smartphone, which of the following is inappropriate from the
viewpoint of security?

a) The smartphone data, which would cause a problem if it were deleted, is encrypted
and stored at a location separate from the smartphone.

b) Since a smartphone may also be infected by a virus, antivirus software is installed.

c) Since a smartphone is in its highest state of security when it is purchased, it is used
without updating the OS.

d) When a smartphone is lost, remote lock and remote wipe is performed.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Among information security measures A through D implemented in the workplace to
maintain the “confidentiality” and “integrity” of information, which of the following is
a list of only the appropriate measures?

A: PCs should remain unlocked to keep them ready for operation from the start to
the end of the business day.
B: Documents and electronic storage media, such as CD-R containing important
information, should be stored in locked cabinets except when they are used.
C: Documents sent or received by facsimile should be picked up immediately
without being left unattended on the tray.
D: Messages or information written on the whiteboard should be erased
immediately after use.

a) A, B

b) A, B, D

c) B, D

d) B, C, D

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is the term that is used for the drawbacks and defects that may exist in computer systems or networks and can be exploited for unauthorized
accesses?

a) Incidents

b) Security holes

c) Hacking

d) Forensics

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A new system is required to operate 24 hours a day, 365 days a year. Which of the
following is the development phase that involves making such a decision?

a) Software acceptance

b) Testing

c) Programming

d) Requirements definition

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A system migration plan was created for the switch from an existing system to a new
system. Which of the following is an appropriate item to be described in the system
migration plan?

a) System selection policy

b) Schedule for parallel operation of the old and new systems

c) Evaluation criteria for the quality of the deliverables

d) The work history of project members

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Among the descriptions A through D below, which of the following is the list that
contains all items that are to be considered in the design of easy-to-use user interface
for system users?

A: The time to recover from a failure
B: The ease of learning methods of operation
C: The layout of pushbuttons
D: The size and color of text

a) A, B, C

b) A, B, D

c) A, C, D

d) B, C, D

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is an appropriate test item to be performed by the integration test in the software development process?

a) Connecting several PCs on a LAN, and testing to ensure that files can be shared

b) Checking the shape of the connector on the cable that connects a PC and a peripheral
device, and testing to ensure that the cable can be smoothly inserted

c) Testing to ensure that after a contract is signed with an Internet service provider,
Web sites can be accessed from the browser

d) Combining two or more programs after the unit test, and testing to ensure that the
program interfaces are implemented in accordance with the specifications and are
properly bound together

A

d

36
Q

In a newly outsourced system development, the plan to install software to the
production environment is explained to the customer. Which of the following is an
appropriate phase for performing the activities based on this plan?

a) Integration test

b) System test

c) Software deployment

d) Software maintenance

A

c

37
Q

Which of the following is part of software maintenance?

a) Adding more development staff in advance when it is found that the development
cannot be completed on schedule

b) Discovering a program that may cause a failure and correcting it in advance

c) Replacing a disk with one with a larger capacity in advance since data size is
increasing

d) Projecting the scale of program development based on requirement specifications

A

b

38
Q

When word processing software, spreadsheet software or other application software is
installed on multiple PCs, which of the following is an appropriate point to be
considered by the system administrator?

a) To improve data compatibility and reduce the license cost, the standardized software
should be installed.

b) If the software has an online help function, there is no need of support from the
vendor.

c) Users have their own preference on which software to use, so they should be
allowed to select the software to be installed.

d) Users should be allowed to install free software at their discretion if it is
downloadable from the Internet.

A

a

39
Q

Which of the following is an advantage of dividing the software development process
into four phases—requirements definition, system design, programming, and
testing—and then executing them in this order?

a) It provides flexibility to handle changes in software specifications at any point of the
development phases.

b) It contributes to the ease of understanding the progress status of development.

c) It requires fewer person-hours spent for reviews in the upstream phases.

d) It allows users to try the software at an early stage of development.

A

b

40
Q

Which of the following is the development model where a trial system is developed at
an early stage of system development so that users can verify their requirements in a
tangible manner?

a) Growth model

b) Incremental model

c) Spiral model

d) Prototyping model

A

d

41
Q

Mr. A is appointed as the project manager of a project to add functions to the finance
system. He gets a risk checklist that was used in a past project in order to create a new
risk checklist for the project. Which of the following is an appropriate description
concerning the risk checklist?

a) Because the past risk checklist was created based on past information and
knowledge, it is used as a reference for the new checklist that is to be created.

b) Because the past risk checklist is created based on past information and knowledge,
risks that are not mentioned in it do not need to be considered.

c) The past risk checklist is used without modification in order to ensure that there are
no discrepancies between projects.

d) Because risks change with projects, a new risk checklist is created based on only the
risks that are not mentioned in the past risk checklist.

A

a

42
Q

Five staff members with the same productivity are assigned to an activity that takes 20
days. Immediately before the start of the activity, three members have influenza and
are replaced by new members. When the new members’ productivity is 60% of the
original members’, what is the minimum number of new staff members that is needed
to complete the activity in 20 days or less?

a) 4

b) 5

c) 7

d) 9

A

b

43
Q

Which of the following is an appropriate description concerning the component
breakdown of the WBS (Work Breakdown Structure) in project management?

a) The most detailed level of the component breakdown enables accurate project
planning and cost estimation.

b) The most detailed level of the component breakdown is always the same regardless
of the project scale.

c) The number of levels of the component breakdown is always the same regardless of
the project scale.

d) The deeper the level of the component breakdown is, the higher the level of the work
efficiency becomes.

A

a

44
Q

Forms of communication include reciprocal-type communication, by which
information is exchanged among two (2) or more parties; push-type communication, by
which information is sent to specified persons; and pull-type communication, by which
persons access necessary information under their own volition. Which of the following
is a description of pull-type communication?

a) Looking up progress meeting schedules on an internal bulletin board site

b) Coordinating progress meeting schedules with key members via telephone

c) Using a teleconferencing system to conduct progress meetings

d) Attaching the minutes of progress meetings to email for distribution

A

a

45
Q

Q46. In a certain IT service, four (4) priority levels are set for system changes: urgent, high,
medium, and low. Among the proposed changes, which of the following is the change
that should be classified as “urgent”? Here, changes are released regularly at the end of
each month.

A
46
Q

Which of the following is classified as the C (i.e., Check) of the PDCA cycle for service
management concerning a mail system?

a) A review of server configuration was proposed to shorten the response time of the
mail system.

b) An availability target was set for the mail system, and necessary resources were
clearly identified.

c) The number of faults and the recovery time were measured for the mail system, and
Its availability was calculated from them and compared with target values.

d) Storage allocation and other system setup tasks were performed in accordance with
details of the mail system design.

A

c

47
Q

An organization is going to set up a service desk to respond to information system
users. Which of the following is the most appropriate description concerning incident
handling by the service desk?

a) In response to fault reports from users, the service desk provides information to them
after a resolution method has been formally decided
.
b) The service desk responds to fault reports from users with the primary aim of
restoration of service, not investigation of the causes of faults.

c) For receipt of user inquiries, the service desk standardizes on a single method such
as e-mail, telephone, or FAX, regardless of conditions in users’ organizations.

d) The service desk keeps records of only the user inquiries that are not able to be
quickly resolved.

A

b

48
Q

Which of the following is an appropriate explanation concerning the usage of a UPS
(Uninterrupted Power Supply)?

a) It is used as a spare battery for a cell phone in order to use the cell phone for a longer
time.

b) It is used to continue the supply of power when a long power failure occurs in a
computer center.

c) It is used to temporarily supply power to a computer when a power failure occurs,
and to safeguard the computer against a momentary drop in voltage.

d) It is used to enable the use of a computer for a long time in an outdoor area where no
other power source is available.

A

c

49
Q

A part of a program was changed to add a new function to a system in operation.
Which of the following is the most appropriate environment that is used for testing the
changed program and determining whether or not it can be brought into system in
operation?

a) Programming environment

b) Test environment for other systems

c) Production environment

d) Test environment equivalent to production

A

d

50
Q

Which of the following is the appropriate use of a security cable (or security wire)?

a) Preventing critical equipment from being destroyed in a fire

b) Preventing notebook PCs in the office from being stolen

c) Preventing the screens of mobile PCs used outside the office from being peeped at

d) Supplying alternative power to the system in the event of a power failure

A

b

51
Q

Which of the following is an appropriate explanation of system auditing?

a) It is implemented on the basis of ISO 9001 quality management system standards.

b) It confirms conformity with ISO 14001 environment management system standards.

c) It is a general name for audits that use IT as an auditing tool.

d) It verifies and evaluates information systems.

A

d

52
Q

Types of governance within a company include IT governance and corporate
governance. Which of the following is an appropriate explanation of the positioning of
IT governance?

a) IT governance and corporate governance are the same concepts.

b) IT governance and corporate governance are opposing concepts.

c) Corporate governance is one (1) component of IT governance.

d) IT governance is an indispensable element of corporate governance.

A

d

53
Q

. Company A’s internal auditors conduct a system audit concerning the company’s BCP
(Business Continuity Plan). The system audit found in the backup measures for
computer power supplies that some of the batteries in the uninterruptible power
supplies managed by the System Operations Department are deteriorated. Which of the
following is the party responsible for making improvements in response to the finding?

a) Head of the System Operations Department

b) Person responsible for system development

c) Internal auditor

d) Head of the Purchasing Department, who purchased the uninterruptible power
supplies

A

a

54
Q

Q55.)
Which of the following is the appropriate combination of words and phrases to be
inserted into blanks A and B in the description below, concerning companies of making
and receiving investments?
Company C is making an investment in Company D. To increase its
Company D, Company C may .

A
55
Q

Which of the following is the most appropriate activity based on CSR (Corporate Social
Responsibility)?

a) Providing products that require less material and less electricity

b) Providing products differentiated from competitors’ by adding new functions

c) Providing products that meet various market needs by adopting a cell production
system

d) Providing products that the company did not offer, by acquiring other companies

A

a

56
Q

Q57. Which of the following has a negative correlation between temperature and total sales?

A
57
Q

In order to prepare for any potential bad debt on accounts receivable from a business
partner, which of the following is an action that enables the appropriation of a part of
the business partner’s property for accounts receivable more preferentially than the
other?

a) Adding debt

b) Issuing an invoice

c) Setting collateral

d) Increasing interest

A

c

58
Q

Which of the following is an appropriate rule for a method of resolving problems
called “brainstorming”?

a) Participants should select and present only high-quality ideas among their own ideas.

b) Participants should criticize another participant’s ideas without hesitation.

c) Participants should avoid presenting better ideas based on another participant’s.

d) Participants should listen to freewheeling opinions, including unique ideas.

A

d

59
Q

The design quality of software is associated with the skills of the designers, the design
methods, the design tools, and other factors. Which of the following is an appropriate
name for a diagram or a chart that resembles a fishbone and is used for identifying the
items that affect the quality?

a) Arrow diagram

b) Cause and effect diagram

c) Pareto chart

d) Matrix diagram

A

b

60
Q

Which of the following is an appropriate example of a practice based on the concept of
Green IT?

a) Use of displays that reduce eye fatigue from blue LED light

b) Installation of air shower devices in server room entrances and exits

c) Construction of backup systems in preparation for disasters

d) Making a rule of viewing materials on PC screens and limiting their printing on
paper

A

d

61
Q

Which of the following is an international book code?

a) EAN

b) ISBN

c) ITF

d) UPC

A

b

62
Q

Which of the following is the most appropriate explanation of “digital divide” in
relation to information technologies and services?

a) It refers to the economic or social gap between those who take full advantage of
information equipment and those who do not.

b) It refers to an environment where all people including handicapped people and
senior citizens have access to the Internet by using information devices.

c) It refers to the level of availability of information equipment and services for all
people including handicapped people and senior citizens.

d) It refers to the people who cannot obtain information because of their lack of
knowledge or skills about information equipment such as PC.

A

a

63
Q

Which of the following is the characteristic of QR code?

a) Reading direction is identified using position detection patterns (cut-out symbols).

b) It requires more space than a one-dimensional bar code to represent the same
amount of data.

c) It can only encode numbers and alphabetical characters.

d) It is a stacked bar code, which is composed of a set of bar codes stacked vertically
one above another.

A

a

64
Q

Which of the following is an appropriate description of certification to ISO 9001:2008?

a) Once a party is certified, the certification is permanent.

b) Certification is applied to manufacturing industries, not to service industries.

c) There is only one certification body in each country.

d) Organizations which fulfill the international standard “Quality Management System
- Requirements” are assessed and certified.

A

d

65
Q

Which of the following is an explanation of free software?

a) It can be installed on any number of computers without limitation in a predetermined
location of use.

b) It requires users to pay predetermined charges to the developer if it continues to be
used after a certain period of free trial.

c) It is commercially available and is permitted to be installed on one or more
computers.

d) It is provided without charge, or it can be modified, copied, and distributed without
restriction under a license agreement.

A

d

66
Q

Which of the following is an item that aims to secure preferred customers and
continuously generate profits, by creating databases of customer information and
contact history and by building positive relationships with customers through prompt
response to their questions and requests?

a) CRM

b) HRM

c) PPM

d) SCM

A

a

67
Q

In order to reduce the number of in-process or in-stock items between processes,
production is carried out in each process according to the requests from the subsequent
process and only the required number of the required items are supplied at the required
time to the subsequent process. Which of the following is the system that performs
this type of production?

a) Just-in-time production system

b) Cell production system

c) Build-to-stock production system

d) Lot production system

A

a

68
Q

The utilization of electronic commerce is one of the business strategies for creating
competitive superiority. Which of the following is “B to C” electronic commerce?

a) An auction site where general consumers sell products

b) An Internet shopping site for general consumers

c) A site for transactions between businesses, such as sale of raw materials to other
companies

d) An in-house sales site for the company’s employees for the purpose of welfare
benefits

A

b

69
Q

Which of the following is an appropriate explanation of opinion leaders who are
thought to be important for market penetration of a new product?

a) The tier of people who purchase the product after making sure that many people are using it.

b) The tier of people who take a cautious approach and purchase the product after
checking with the early buyers

c) The tier of people who purchase the product early based on their judgment and have an influence on other consumers who follow behind

d) The tier of people who are adventurous enough to take the initiative in purchasing
the product

A

c

70
Q

Which of the following is a method for analyzing the behavior of a visitor based on
information such as the number of accesses to a Web site and the browsing history
within the Web site?

a) Regression analysis

b) Cluster analysis

c) Access log analysis

d) Value chain analysis

A

c

71
Q

Q72. Company A is evaluating the business strategy that was implemented last fiscal year.
When the conditions are as shown in the table below, what is the score of the overall
evaluation?

A
72
Q

Which of the following is the most appropriate explanation of a patent strategy of
cross-licensing?

a) The acquisition of patents held by a company through absorption-style merger, to
gain that company’s technology

b) Implementation of joint research with other organizations, to complement a
company’s own technologies and apply for patents

c) Granting a company’s own patents to other companies and obtaining royalties
commensurate with their value

d) Mutual consent between patent holders on the use of each other’s patents

A

d

73
Q

Which of the following is an appropriate explanation of CAD, as used in the
manufacturing industry?

a) The derivation of the required quantity of materials from a product production plan
and the placement of orders for the materials.

b) The management of the information of components, semi-finished products, or
quantities

c) The unified management of the information in the process from design through
manufacturing, such as design documents or component tables.

d) The use of computers in product design to improve the productivity of the designing
process and the reliability of design specifications.

A

d

74
Q

Which of the following is a technology that is defined by some international standards
and used for contactless IC cards, such as tickets for public transport?

a) IrDA

b) RFID

c) Bluetooth

d) Wi-Fi

A

b

75
Q

Which of the following is an example of embedded software?

a) Operating systems that are pre-installed in PCs

b) Game software that is downloaded by users to smartphones

c) Software that performs automatic focus in digital cameras

d) Updated map data for car navigation systems, recorded on auxiliary memory media

A

c

76
Q

Which of the following is the situation where an improvement can be expected by
installing an MRP (Material Requirements Planning) system?

a) Drawing information is managed on both electronic files and hard copies, so the
history of design changes cannot be correctly understood.

b) Information about materials necessary for manufacturing and their required
quantities is complicated, so order quantities are often miscalculated and production
is adversely affected.

c) There are many design changes, so production efficiency is low.

d) High-mix, low-volume production is adopted, so the cost of installing production
equipment is increasing.

A

b

77
Q

Which of the following is an explanation of EDI (Electronic Data Interchange)?

a) It is an international standard for e-mail services, based on the OSI reference model,
which provides comprehensive services for the creation, transmission, and
processing of messages. It also enables the interconnection between heterogeneous
systems.

b) It is the exchange of business transaction data between computers (including
terminals) over a communication line. A set of standard protocols is used to
describe various rules and regulations that must be followed by the parties involved.

c) It is a communication service that provides added value, such as storage of data
transmitted over the network and conversion of data formats.

d) It is a system that allows orders to be placed by transmitting their information from a
data entry terminal to the head office or a supplier. This system saves labor in
processing orders, and improves the efficiency of logistics and inventory control.

A

b

78
Q

Which of the following is an appropriate explanation of a point card system (or loyalty
program) implemented by retail businesses?

a) It is a system that enables card holders to do shopping within a credit limit through
deferred payment of the amount.

b) It is a system that enables the payment of the shopping through a bank ATM card.

c) It is a system where credit corresponding to purchase amount is accumulated on a
card, and services are offered according to the accumulated credit.

d) It is a system where an amount is prepaid on the assumption of purchase of products,
and some amount is deducted from the card each time a product is purchased.

A

c

79
Q

Which of the following is an appropriate explanation of POS terminals (or POS cash
registers) in a supermarket and other such places?

a) They are terminals of the system used for collecting and managing information such
as the product code and price at the time of a sales transaction (at the “Point of
Sale”).

b) They are terminals of the “Purchase Order System”, and are mainly used to automate
purchase orders for the replenishment of products.

c) They are terminals of the strategic product management system developed for
monitoring the “Probability of Survival” of such products.

d) They are terminals of the inventory management system first manufactured in “Port
of Spain”, and they hold an overwhelming market share.

A

a

80
Q

Which of the following is an appropriate main objective of information system strategy
creation?

a) First, to clarify requirements for new work and information systems to be
constructed and, second, to determine the scope of computerization and specify its
specific functions from the requirements

b) To clarify the ideals for information systems overall based on management strategy, and to determine organization’ s optimization policy for the information systems overall

c) To determine the organization’s development methods and management methods for information system development, and set standard procedures for development and
management based on the standard procedures

d) To organize requirements for the targeted business activity and the information
systems to be constructed, and to create policy and an implementation plan for
computerization

A

b

81
Q

Which of the following is the most appropriate description concerning the role of CIO?

a) Making an audit of the company from an objective standpoint in order to check if
there is no problem with business operations and IT control works effectively

b) Playing a leading role in planning and execution of an information strategy for
implementing a business strategy

c) Establishing a personnel system for implementing a business strategy, and
controlling overall administrative operations such as understanding the actual
situation of services

d) Improving the efficiency of allocating company funds, and ensuring the accuracy of
financial accounting

A

b

82
Q

Which of the following is an appropriate description concerning groupware?

a) It is software that has an animation or audio function and is useful when making
presentations effective by incorporating the output of spreadsheet software or
database software.

b) It is software that has functions, such setting print layout or changing and editing
texts, and is used for creating documents.

c) It is software that has functions, such as communication via e-mail and electronic bulletin boards, data sharing, and schedule management, and supports collaborative work.

d) It is software that is used to enter data into cells of a worksheet, create tables, and
tabulate data.

A

c

83
Q

Which of the following is used as a management tool such as a decision-making support system for accumulating and consolidating a large amount of data acquired through various business activities and thereby providing helpful and meaningful data?

a) Data mapping

b) Data warehouse

c) Data dictionary

d) Data modeling

A

b

84
Q

In system development, which of the following is the process in which the business
functions to be newly constructed or reconstructed are clarified and the scope and the functions of the information system are specifically specified based on the business
functions?

a) External design

b) Internal design

c) Programming

d) Requirements definition

A

d

85
Q

When an error message to be displayed by an application program is designed, which
of the following is an appropriate item to be considered?

a) Only the fact and details of the error, rather than the way of handling the error,
should be displayed.

b) Only the information that system developers need to identify the cause of the error
should be displayed.

c) Since it is desirable that the error message be as short as possible, the abbreviation
and error code should be displayed as they are.

d) The action to be taken by a user should be displayed briefly and precisely with the
error message.

A

d

86
Q

Which of the following is an explanation of “acceptance inspection” performed on a
vendor?

a) Checking the estimate submitted by the vendor prior to placing an order based on the
estimate

b) Checking whether the deliverables provided by the vendor conform to the
requirements specifications

c) Requesting the vendor to provide information for the purpose of collecting
information

d) Requesting the vendor to study and submit the proposal for the construction of a new
system

A

b

87
Q

Which of the following is the most appropriate description concerning the creation of
documents in the development and maintenance of software?

a) When an itemized list or a chart is used, the meaning and the content of the
documents become unclear. Therefore, text based on natural language is used as
much as possible.

b) Because it is important to make the relationship between documents clear,
consistency checks of the content of the documents can lead to an improvement in
quality.

c) Duplication and redundancy of the content of a document are necessary to improve
not only the maintainability of the software but also the maintainability of the
document.

d) The first priority is that a document can be understood better by developers than by
maintenance personnel, and it is desirable to improve productivity without taking too
much time.

A

b