Oct 2016 Flashcards

1
Q

Which of the following is obtained by multiplying the binary value 10110 by three?

a) 111010

b) 111110

c) 1000010

d) 10110000

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

2.)
Which of the following is a search condition for the black area of the Venn diagram
shown below?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q3. In the sales campaign for a certain product, a full-page advertisement is run a total of
three times in three magazines A, B, and C. When the effects expected from running
a full-page advertisement zero to three times in each of the magazines are as shown in
the table below, how many times should the advertisement be run in magazine A to gain
the largest possible effect? Here, the effects of the advertisements placed in the
individual magazines are independent of one another, and the effects from multiple
magazines can be calculated by simply adding the individual effects

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an appropriate explanation of an algorithm that is used on a
computer?

a) A generic term for artificial languages used to enable a computer to perform a series
of operations

b) A processing procedure for enabling a computer to accomplish a specific purpose

c) Designing of buildings or industrial products with the assistance of a computer

d) Software for translating a program into a machine language that can be directly
executed by a computer

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an appropriate description concerning HTML?

a) It is a markup language that can specify the logical structure and layout of a Web page
by using tags.

b) It is a script language that can describe the program or processing steps executed on a
browser.

c) It is a communication protocol that is used between a browser and a Web server.

d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the method for describing the logical structure of a sentence
in XML?

a) Enclosing the sentence, clauses, and other elements by using double quotes (“”)

b) Separating the sentence, clauses, and other elements by using commas

c) Enclosing the sentence, clauses, and other elements by using tags

d) Separating the sentence, clauses, and other elements by using tabs

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an appropriate explanation of Java?

a) It is an interpreter-type object-oriented language developed in the 1970s and includes an integrated development environment with editor and debugger as well as OS functions.

b) It incorporates object-oriented concepts, such as class and inheritance, into the
programming language C, and has upper compatibility with C.

c) It is a markup language used on the Web and describes the document structure by
using tags. It enables the creation of hypertext that links text, movies, etc.

d) It is an object-oriented language, and source code is compiled into a format called
bytecode that can be executed on a JVM (Java Virtual Machine).

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q8. There is a series of numbered boxes stacked as shown in the figure below. The
operations described in the table below are performed in the sequence of operations 1
through 4. When the operation 4 is completed, which of the following shows the status
of the stacked boxes?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an explanation of a hot plug?

a) A function that enables attachment or detachment of a peripheral device while PC
power remains on

b) Software that is installed afterwards in order to enhance the functions of application
software

c) A mechanism of supplying power from a PC to a peripheral device via a cable
connected to the peripheral device

d) A technique of executing a specific program and evaluating system performance on
the basis of the time taken for the processing

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an appropriate description concerning clock frequency of
CPU?

a) The CPUs which have the same clock frequency are equal in performance, regardless
of whether they are 32-bit or 64-bit.

b) The CPU with higher clock frequency gives higher heat generation than others in the
same type of CPU, so heat dissipation becomes important.

c) Clock frequency and network transfer rate are in direct proportion when the machine
is connected to the network.

d) For a multi-core processor, the throughput does not depend on the clock frequency

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an appropriate description concerning flash memory?

a) It is used as read-only storage once data is written.

b) No power supply is required to retain stored data.

c) It is not used for digital cameras because of the difficulty of downsizing.

d) Data is read or written using laser light.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a DVD in which users can write data, but cannot rewrite data?

a) DVD-R

b) DVD-RAM

c) DVD-ROM

d) DVD-RW

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Concerning configuration methods A through C for systems that are composed of two
(2) sets of devices, which of the following is the list in ascending order, from left to right,
of service downtime that is caused by a fault of one of the two (2) sets?

A Dual system

B Duplex system (cold standby method)

C Duplex system (hot standby method)

a) Fault of one (1) device in A, Fault of the primary device in C, Fault of the primary
device in B

b) Fault of the primary device in B, Fault of one (1) device in A, Fault of the primary
device in C

c) Fault of the primary device in C, Fault of one (1) device in A, Fault of the primary
device in B

d) Fault of the primary device in C, Fault of the primary device in B, Fault of one (1)
device in A

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an appropriate explanation of the hot standby system?

a) It is a system where a collection of various types of hardware, software, and data on the Internet is provided to the user.

b) It is a system where a high level of reliability can be obtained by simultaneously
operating the two sets of equipment and performing the same processing while cross-checking the results.

c) It is a system where a backup machine is always kept on standby in an operable state
and is immediately switched into operation at the occurrence of a failure.

d) It is a system where a backup machine is arranged, and at the occurrence of a failure,
the operator in charge starts up the backup machine to switch the production machine
to the backup machine

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q15. When a computer system has operated for 1,200 hours, the status of the normal operation
time and the repair time is as shown in the table below. What is the value of MTTR
(Mean Time To Repair, in hours) of the system?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a record in a file is modified, which of the following is an appropriate way of
identifying the modified contents?

a) Keeping a record of the size and the modified date of a file

b) Keeping a copy of a file and comparing it to the modified one later

c) Keeping a record of the number of records into the file

d) Keeping records sorted in ascending order of the key field

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q17. In a Web server, five (5) directories have a hierarchical structure as shown in the figure
below. In an HTML document stored in directory B, which of the following references
the file img.jpg stored in the directory E? Here, directories and files are referenced using
the method described below.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an appropriate explanation concerning a deadlock?

a) It is a state in which the processes of a computer are prohibited from getting intentional or accidental access to information that usually must not be accessed.

b) It is a state in which, if the authentication of a user fails more than the limited number
of times, the user is prohibited from accessing the computer.

c) It is a state in which, when shared resources are exclusively used, two processes are endlessly waiting for each other to release the lock of a shared resource.

d) It is a state in which processes in the ready state under a multi-programming
environment have used up the CPU time allocated by the OS.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The types of programs that are executed at the startup time of a PC are generally
classified into three categories: BIOS, OS, and resident applications. Which of the
following is the list that is arranged in the sequence of the execution of the programs?

a) BIOS -> OS -> Resident applications

b) OS -> BIOS -> Resident applications

c) OS -> Resident applications -> BIOS

d) Resident applications -> BIOS -> OS

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is the purpose of the virtual memory system that is known as one
of the functions provided by an OS?

a) To prevent an application program from accessing the protected area on main memory used by the OS

b) To reduce electricity consumption during the idle state, by stopping the power supply after data is written from main memory to external storage

c) To make it possible to execute a program even if the program requires more storage
capacity than main memory

d) To accelerate CPU processing with the assistance of a higher speed storage device
than main memory

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is a device that is used to recognize handwritten characters and
convert them into character codes?

a) BD-R

b) CD-R

c) OCR

d) OMR

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is the term for the design that is intended to provide comfortable usability to as many people as possible, regardless of differences in culture, language, age, gender, presence or absence of disability, or capability?

a) Barrier-free design

b) Fail-safe

c) Foolproof

d) Universal design

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

On a display screen, various colors are created through additive color mixing with three
colors, namely red, green, and blue. When the red color, green color, and blue color
are mixed uniformly, which of the following is the color that is formed?

a) Red-violet

b) Yellow

c) White

d) Blueish green

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Q24. Transactions 1 (One) through 4 (Four) are processed in the order of the Process list below.
One of the transactions ended abnormally in the middle. As a result of canceling and
rolling back the transaction, data A and data B exist. Which of the following is the
transaction that ended abnormally? Here, if a transaction that ended normally, it will be
committed and the next transaction, if any, will be performed if it exists. If a transaction
ended abnormally, the subsequent transactions will not be performed.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Q25. There are “Sales”, “Customer” and “Product” tables in a relational database. Among lists
A through C, which of the following contains all and only the lists that can be created
from the data in these tables? Here, a solid underlined part represents a primary key, and
a dotted underlined part represents a foreign key.
Sales
SalesNumber CustomerNumber ProductNumber SalesDate SalesAmount
Customer
CustomerNumber CustomerName
Product
ProductNumber ProductCategoryName ProductName
A The list of customers who bought more than a certain amount of money during a
certain period in the past
B The list of products that were out of stock in the previous month
C The ranking list for sales amount by product in the previous month

a) A, B b) A, B, C c) A, C d) B, C

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In the description below concerning a relational database, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
Analyze the target business operations, identify the data which is used there, and create
, consisting of entities and . On the basis of the created,
design .

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In DBMS, which of the following is a function for maintaining consistency of data by
preventing the occurrence of conflicts due to simultaneous access to the data ?

a) Normalization

b) Deadlock

c) Exclusive control

d) Restore

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is an appropriate description concerning communications
protocols?

a) There are no
communications protocols that are used in analog communication.

b) They are developed only by international organizations, and those developed
independently by manufacturers are not called communications protocols.

c) In communications protocols, only the procedure of actions in a normal case is
defined.

d) Devices that are provided by different manufacturers or have different OS can
communicate with each other if they use the same communications protocol.

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When an e-mail is sent to multiple destinations, there are cases that the receiver of the e-mail should not know the e-mail addresses of other destinations. In such cases, which of the following is an appropriate place where the e-mail addresses of the multiple
destinations to be sent are entered?

a) Bcc

b) Cc

c) To

d) Both To and Bcc

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is required to construct a LAN connecting several computers in a room?

a) Internet

b) Splitter

c) Hub

d) Modem

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is the mechanism that determines the correspondence between
domain names and IP addresses on the Internet?

a) DNS

b) FTP

c) SMTP

d) Web

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is an appropriate explanation concerning URL of a Web page?

a) It is a communications protocol between a Web page and a browser.

b) It is a message about the update history of a Web page.

c) It is a notation for representing the location of a Web page.

d) It is grammar for describing the content (i.e., body) of a Web page.

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the technology that enables terminals connected to a shared network such as the Internet to be used as if they are connected to a leased line by ensuring security with encryption and authentication?

a) ADSL

b) ISDN

c) VPN

d) Wi-Fi

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is an explanation of DRM (Digital Rights Management), which
is used for digital content?

a) It is data compression technology for audio and video, and there are multiple standards for the technology according to playback quality.

b) It is a collective term for technologies for protecting the copyright of content and
restricting its use and duplication.

c) It is an XML-based description language for controlling data broadcasting on digital television.

d) It is a standard for reproducing realistic sound.

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In order to promote risk management, the execution plan for introducing the risk
management system was developed as the first step. When the subsequent actions are
divided into steps A through C below, which of the following is the order of the steps in
accordance with the PDCA cycle?

A Implementing the measures against risks according to the execution plan

B Measuring the effect of the implementation and evaluating the effectiveness of the
risk management system

C Taking corrective actions and improving the risk management system

a) A → B → C

b) A → C → B

c) C → A → B

d) C → B → A

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When information security measures are grouped into three (3) categories of technical
security measures, human security measures, and physical security measures, which of
the following is an appropriate example of physical security measures?

a) Making a non-disclosure agreement with employees

b) Attaching a digital signature to an e-mail when it is sent

c) Storing a notebook PC in a place that can be locked

d) Recommending password change on a regular basis

A

c

36
Q

Q37. In the description below concerning a one time password, which of the following is an
appropriate combination of terms to be inserted into blanks A and B?
A user is authenticated by using a password that is created by a device called
a token. This password is called a one time password, and the use of this makes it possible
to reduce the risk of caused by password leak.

A
37
Q

Which of the following is an appropriate description concerning biometric
authentication?

a) If margin for error in matching with the authentication data is made larger, the possibility of both rejecting an authorized person and accepting an unauthorized
person becomes smaller.

b) It eliminates the need to remember IDs and passwords for authentication, and the need to carry keys or cards.

c) It cannot be used with other authentication methods such as passwords or tokens.

d) The effective period in which retina and finger vein pattern can be used for
authentication is short because they change greatly over years

A

b

38
Q

Cryptography methods include symmetric cryptography and public key cryptography.
Which of the following is an appropriate characteristic of symmetric cryptography?

a) When the encrypted communication takes place with a single person, the number of keys that are used therein is larger than in public key cryptography.

b) It is safe to send a key unencrypted that is to be used for encrypting communication.

c) The processing time required for encryption and decryption is shorter than the time
required in public key cryptography.

d) A key pair is generated, and the text that is encrypted with one key can only be
decrypted with another key.

A

c

39
Q

Which of the following is an appropriate explanation of cracking in information security?

a) Conducting a durability test that applies external shock, pressure, drop, and vibration
to a device such as a PC

b) Making a malicious and unauthorized intrusion into a computer or spying or
destroying data

c) Setting up and maintaining system devices as a system administrator, including setting
up a firewall

d) Conducting an audit to ensure that the security measures of the organization work
effectively

A

b

40
Q

Q41.)
In the description below concerning computer viruses, which of the following is an
appropriate combination of terms to be inserted into blanks A and B?
In order to prevent infection with viruses that exploit of OS and
applications, it is necessary to keep the virus definition file updated and to .

A
41
Q

Which of the following is an appropriate explanation of IP spoofing, which is a means
of unauthorized access?

a) It refers to getting data such as personal information by pretending to be a financial
institution or a famous company, sending an e-mail, and misleading a user into
accessing a false site.

b) It refers to a communication route for unauthorized intrusion that is set on the intruded server.

c) It refers to sending a packet with a false source IP address.

d) It refers to collecting data such as operation logs and personal information of a user in such a way that the user does not realize it.

A

c

42
Q

Among descriptions A through D concerning how to conduct information security
education to employees, which of the following contains all and only the appropriate
descriptions?

A The re-education of one who has committed an information security breach includes
preventive actions to avoid the same fault being repeated again.

B It is incorporated in a training program for new employees.

C It is restricted to employees in the information systems department.

D It is conducted after an incident or an accident concerning information security as well as on a regular basis.

a) A, B, D

b) A, C, D

c) A, D

d) B, C

A

a

43
Q

In a project in which system development is performed on the basis of the waterfall
model, defects in the system requirements definition are found in the later processes.
Among the processes in which defects are found, which of the following processes
involves the least amount of the correction of defects and the rework as a result of the
correction?

a) System design

b) Programming

c) Test

d) Software acceptance

A

a

44
Q

When system development progresses in the sequence of system requirements definition,
external design, internal design, and programming, which of the following is the most
appropriate phase for defining the layout of screens and the format of forms?

a) External design

b) Internal design

c) Programming

d) System requirements definition

A

a

45
Q

Among the test techniques to verify the quality of a program, which of the following is
a test technique that is used for analyzing the internal structure of the program and then
creating the test cases?

a) Black box test

b) Bottom-up test

c) Top-down test

d) White box test

A

d

46
Q

In system development, which of the following is an activity that is performed after
software detailed design?

a) Programming

b) Software architecture design

c) Software outline design

d) Software requirements definition

A

a

47
Q

Q48. Which of the following is a development model for the system development that flexibly
adjusts to the changes in user requirements through repetition of improvements and
feature additions, as shown in the Figure?

A
48
Q

After the start of a project, the scope is defined by collecting the requirements for the
project. Which of the following is the most appropriate purpose of defining the scope?

a) To clarify the activities to be implemented in the project

b) To examine the action plan against the risk that has been realized in the project

c) To create an action plan for the delay of the project

d) To create the objectives of the project

A

a

49
Q

The project management knowledge areas include project cost management, project
human resource management, project time management, and project procurement
management. In a system development project, which of the following is an appropriate
activity of project procurement management when a device is purchased for testing?

a) Creating a schedule so as to start the test using the purchased device after the delivery of the device

b) Providing training in device operations to the person in charge of performing the test
by using the purchased device

c) Adding the purchase cost of the device for testing to the project budget, and managing
the estimated results and actual results of the total cost

d) Presenting the specifications of the device for testing to several supplier candidates,
evaluating the proposals, and deciding on the appropriate supplier accordingly

A

d

50
Q

Which of the following is an appropriate description concerning the processes in project
management?
a) In the monitoring and control process, the start of the project and the investment in
resources are approved formally.
b) In the planning process, the activities to be performed in the project are identified and
refined into manageable units.
c) In the executing process, the management of estimated results and actual results of the
schedule and cost, as well as change management of project activities is performed.
d) In the initiating process, activities included in project planning are implemented.

A

b

51
Q

Among the descriptions A through C concerning the measures for risk treatment to be considered when a new product is developed, which of the following is the list that
contains all and only appropriate measures for reducing quality-related risks?

A: Developing the product by using stable technology
B: Purchasing insurance against development delays
C: Creating a prototype of the product

a) A, B

b) A, C

c) A, B, C

d) B, C

A

b

52
Q

Which of the following is an appropriate management system that improves the
efficiency of IT operations and the quality of services including availability?

a) IT technical strategy management

b) IT service management

c) IT project scope management

d) IT project time management

A

b

53
Q

In release management of IT service management, the items which have been planned
and approved according to the change management are implemented in the production
environment. Which of the following is an appropriate description concerning release
management?

a) Information may be provided after the completion of release to users and operation
managers concerned with changes.

b) During release planning, cases when activities cannot be completed within the planned
time period are also taken into account.

c) Since there is no possibility of new failures after release, it is not necessary to make
preparations.

d) Regardless of the scale of release, the release is implemented simultaneously for all
users.

A

b

54
Q

The purposes of facility management of an office using IT include ensuring cost
reduction, comfort, security, and confidentiality. Which of the following is the most
appropriate policy with regard to ensuring security?

a) Placing anti-earthquake measures and ensuring evacuation routes

b) Adopting IT devices with low power consumption

c) Improving environment, such as desks and chairs, sounds and lights, etc.

d) Implementing security measures such as entrance and exit control

A

a

55
Q

Q56.)
In a certain IT service, four (4) priority levels are set for system changes: urgent, high,
medium, and low. Among the proposed changes, which of the following is the change
that should be classified as “urgent”? Here, changes are released regularly at the end of
each month.

A
56
Q

Which of the following is a description concerning facility management for the
maintenance of information system equipment?

a) It manages schedules, budgets, personal resources, etc. for the success of information
system development projects.

b) It manages fault monitoring, creation of backups, etc for information systems.

c) It manages data centers and other buildings where information systems are operated.

d) It manages user IDs and passwords for the use of information systems.

A

c

57
Q

As a part of internal control, access management conforming to the segregation of duties is implemented. During the development of the information system, which of the following is an appropriate process in which the design of access management is started?

a) Requirements definition

b) Programming

c) Test

d) After operation start

A

a

58
Q

During a systems audit, systems auditors who are independent of the audit target inspect and evaluate the information systems comprehensively from an objective viewpoint. As a result of the systems audit requested by the management of a company, some problems
are found in the effectiveness of the current information systems. Who are the most
appropriate persons to whom the systems auditor gives advice and makes
recommendations?

a) Stockholders

b) Jurisdictional authority

c) Management

d) System users

A

c

59
Q

Which of the following is an act that is inappropriate in light of the code of professional
ethics of a systems auditor?

a) Checking the findings of a business operations audit by an auditor

b) Audit based on a contingent fee contract

c) Joint audit with another auditor having specialized knowledge

d) Checking the contents of an audit report of another auditor who performed the audit
the previous year

A

b

60
Q

In order to manufacture one (1) unit of a product, 10 kg of the raw material A and 5 kg
of the raw material B are needed. If the amount of raw material that can be used in one (1) month is 60 kg of raw material A and 40 kg of raw material B, what is the maximum number of units of the product that can be manufactured in one (1) month?

a) 4

b) 6

c) 8

d) 10

A

b

61
Q

Which of the following concepts forms the basis of corporate activities according to
which, rather than simply pursuing profit, social issues such as contribution to society
and protection of the global environment are perceived and tackled.

a) BCP

b) CSR

c) M&A

d) MBO

A

b

62
Q

Q63. Which of the following is an appropriate combination of the standards and their
applicable fields?

A
63
Q

Which of the following codes is used as an international standard for identifying a book?

a) ISBN

b) ITF

c) JAN

d) QR

A

a

64
Q

Which of the following can be classified as a trade secret from a viewpoint of preventing
unfair competition?

a) Information about a personal scandal involving a company executive

b) Information about technology under development, which is marked as “Strictly
Confidential” and circulated throughout the company

c) Information about a production method that is not publicly known, which is marked
as “Confidential” and stored in a locked cabinet

d) A commercially available book which describes how to sell a company’s products
effectively

A

c

65
Q

In e-commerce using public key cryptography, which of the following is created by a CA
(Certification Authority) that is a third-party organization independent from the parties
involved in the transaction?

a) Digital signatures of the parties involved in the transaction

b) Electronic certificates for private keys of the parties involved in the transaction

c) Electronic certificates for public keys of the parties involved in the transaction

d) Passwords for the parties involved in the transaction

A

c

66
Q

Q67. Company S purchases equipment from Company K by using the procedure shown in the
diagram below. In this transaction procedure, which of the following is the point at
which the sales contract is concluded? Here, once the quotation is provided, the content
of the transaction does not change throughout the procedure.

A
67
Q

Which of the following corresponds to a third-party audit that is defined in “ISO
9000:2015 Quality management system—Fundamentals and vocabulary”?

a) A parent company audits the quality management system of a subsidiary company.

b) A customer audits the quality management system of a trading partner company.

c) A company audits its own quality management system for internal purposes.

d) A certification body audits the quality management system of a client company

A

d

68
Q

Which of the following is an appropriate explanation of blue ocean strategy?

a) Generating a new market that has no competition by providing new value

b) Trying to increase sales opportunities by handling a wide range of products other than
best-selling products

c) Thoroughly proceeding with differentiation from products provided by the top
companies in the industry

d) Building predominance over competitors through cost reduction

A

a

69
Q

As segmentation in marketing, consumers are classified on the basis of the attitude
toward product purchase. Which of the following is an appropriate attitude toward
product purchase of a consumer called an opinion leader?

a) Conveying one’s evaluation of a product to friends and acquaintances after the product
becomes popular

b) Taking into consideration their friends’ evaluation and public opinion when deciding
whether to purchase a product

c) Waiting for the sales of a new product to start, and being eager to acquire it before
friends and acquaintances

d) Purchasing a new product in its initial phase of sale, and conveying information about
the product to friends and acquaintances

A

d

70
Q

Which of the following is a means by which, analysis and evaluation of the management
of a company is performed not only from the perspective of the financial performance,
but also from the perspectives of customers, business processes, and learning and growth, and is then linked to the formulation of a strategy?

a) BSC

b) CSF

c) PPM

d) SWOT analysis

A

a

71
Q

Which of the following is the marketing technique that is composed of four components:
product, price, place, and promotion?

a) Social marketing

b) Direct marketing

c) Marketing channel

d) Marketing mix

A

d

72
Q

Which of the following is an appropriate purpose of MOT (Management Of
Technology)?

a) To improve the productivity by using mathematics and natural science in business
administration and production management

b) To grow a company by effectively connecting technical innovation with the business
of one’s company

c) To improve the quality of a company by ensuring that the employees put in efforts
systematically to improve the quality of products

d) To improve the business process efficiency by acquiring the necessary techniques and
knowledge from senior employees through actual business operations at the
workplace

A

b

73
Q

Which of the following systems can be realized through the use of RFID?

a) Performing medical activities by transmitting images and voice data of patients from
a remote site via a network

b) Depositing and withdrawing money from a bank ATM by using a cash card

c) Reading product information from barcodes on products, and performing sales
information management and order processing at the time of sale in stores

d) Setting an electronic tag on a delivery parcel, and checking information related to the
shipping history of the parcel

A

d

74
Q

Which of the following is an appropriate case example of improvement in business
operations using CAD?

a) Automating inventory control by installing an IC tag on each product and monitoring
shipment

b) Performing control to ensure that the temperature suitable for production is maintained
by installing temperature sensors on the production lines, and monitoring temperature

c) Converting the design information to a database, and then sharing and reusing the
design drawings

d) Automating the production lines by using robots, and thus realizing an unmanned
factory

A

c

75
Q

Which of the following is a technique for achieving effective business operations by managing and optimizing a company’s management resources in an integrated manner?

a) BPR

b) ERP

c) RFP

d) SLA

A

b

76
Q

Which of the following is the most appropriate explanation of BTO that is used for the
production of PCs?

a) Each product is assembled by only one worker.

b) The products are manufactured with the minimum possible inventory between the production processes by procuring the required amount of raw materials and components at the required time.

c) The products are stocked as components rather than finished products, and assembled after receiving an order from the customer, according to the details of the order.

d) The products showing a company’s own logo are assembled by another company

A

c

77
Q

Which of the following is classified as a “B to E” transaction?

a) A company provides services, such as welfare and education for the company’s own
employees, through the Internet.

b) A travel company uses the Internet to give campaign information and sell tickets to
consumers by subscription.

c) An automobile manufacturer uses the Internet to procure components and materials
from vendors across the world.

d) In an auction held on the Internet, a participant buys a product from another participant.

A

a

78
Q

A single unit of Product A is composed of three (3) pieces of Part B and two (2) pieces
of Part C. In the production plan for a particular period, when the demand for Product
A is 10, which of the following is the net requirement of Part B? Here, the quantity in
stock is five (5) for Part B, and there are no other pieces in stock, in process, on back
order, or already allocated. The net requirement is calculated by subtracting the stock
available for allocation from the gross requirement.

a) 20

b) 25

c) 30

d) 45

A

b

79
Q

Among e-commerce categories, which of the following corresponds to the concept of “B to C” transactions?

a) CALS

b) Web-EDI

c) Virtual companies

d) Virtual malls

A

d

80
Q

Which of the following is the most appropriate characteristic of BPM (Business Process
Management)?

a) In order to resolve a business issue, the introduction of a mechanism of management
according to international standards is required.

b) The workflow is analyzed and arranged for each process, and problems are identified
for continuous improvement of the workflow.

c) The efficiency of business processes is promoted by outsourcing some of them to
external vendors.

d) Business processes are fundamentally reviewed and redesigned.

A

b

81
Q

A company is aiming to analyze the data that is accumulated in information systems and
use such data in business operations. However, progress is not made because of the
insufficient experience of employees. Which of the following is the most appropriate
activity that should be performed with higher priority in order to achieve the objective?

a) Improving the performance of software used for analysis

b) Installing a high-performance PC for analysis in each department

c) Providing typical cases of analysis and templates for analysis

d) Speeding up the provision of data that can be used for analysis

A

c

82
Q

In order to make good use of IT to implement the business strategy of a company, which
of the following is the most appropriate point to be considered when an information
strategy is created?

a) The creation of the business strategy is the responsibility of top management, and on
the other hand, the creation of the information strategy is the responsibility of the
information systems department, and these activities should proceed independently.

b) When the computerization is planned, IT-based automation of business processes
should be implemented after identifying the business functions and workflow of the
current business operations.

c) When the computerization of business operations is planned, the ideal information
system should be defined and reviewed whether its purpose and functions conform to
the business strategy.

d) In the planning stage of the information strategy, the initial cost should be evaluated
as the cost of the system, and the cost of system operations and maintenance should
be evaluated at the start of operations.

A

c

83
Q

Which of the following is a set of activities that clarifies the target business operations,
cost, schedule, organizational structure, investment effect, and other factors of system
development, based on the information strategy?

a) Operational activities

b) Development activities

c) Planning activities

d) Maintenance activities

A

c

84
Q

Q85. The table below shows the evaluated value of the proposals of four (4) vendors from the
viewpoints of management, technology, and price. When each value of the management
viewpoint, technology viewpoint, and price viewpoint is weighted, and the vendor with
the highest total score is selected as the supplier, which of the following vendors is
selected?

A
85
Q

Which of the following is an appropriate approver for the optimization plan of the overall
information system of a company?

a) Chief Information Officer

b) Head of the business operations department handling the mission-critical system

c) Head of the department where RFP is created

d) System development project manager

A

a

86
Q

Which of the following is an appropriate explanation of an ASP?

a) A business operator or a form of service that provides communication lines for
connecting to the Internet

b) A service on the Internet for creating a closed community that is accessible to users
who are members of the community

c) A business operator or a form of service that provides users with application software
on a server via the Internet

d) An approach of constructing an information system from the viewpoint of a service,
rather than from the viewpoint of a product such as hardware and software

A

c

87
Q

Which of the following is an activity that is performed in the requirements definition
process of system development?

a) Creating and approving computerization plan

b) Performing qualitative and quantitative risk analysis

c) Estimating investment effect and computerization costs

d) Identifying the needs and demands of system users

A

d