Week 10 Flashcards
When compared to traditional bar-code systems, a primary benefit of radio frequency
identification (RFID) tags is
a. low voltage power drawn from the battery.
b. faster data transmission that can be read from farther away.
c. the number of software applications that can process RFID data.
d. cost savings of tags.
b. faster data transmission that can be read from farther away.
Which quality tool is appropriate to graphically show production schedule information
for equipment that includes production work orders and different production jobs?
a. Gantt chart
b. Activity network diagram (AND)
c. Critical path method
d. Work breakdown structure (WBS)
a. Gantt chart
Which of the following security risks is LEAST likely to disrupt operations at a
geothermal power plant and result in an emergency situation?
a. Connections to the Internet
b. E-mail viruses
c. Inadvertent network failures
d. Remote access to network components
b. E-mail viruses
A process audit surfaces a security lapse in a relatively new network security
application. What is the BEST course of action?
a. Implement a risk management process.
b. Identify all the consequences.
c. Prioritize the identified risks.
d. Take corrective action.
d. Take corrective action.
Which of the following is NOT a recommended alarm management practice per
Engineering Equipment Materials and Users Association (EEMUA) Specification
191?
a. Focusing
b. Timely
c. Layered
d. Prioritized
c. Layered
An overall limitation of using a general purpose business database for process data
in an industrial plant is
a. increased vulnerability to data corruption.
b. lack of required features.
c. inadequate documentation capabilities.
d. customization expense.
b. lack of required features.
Which type of OPC automation software detects special causes of process variation?
a. HMI
b. Statistical process control (SPC)
c. Multimedia alarming
d. Advanced process control (APC)
b. Statistical process control (SPC)
According to the equipment hierarchy set forth in the ANSI/ISA-95.00.03-2005
standard, which statement BEST describes the relationship of Level 3 and Level 4
activities?
a. Level 3 relates to managing a manufacturing organization; Level 4 relates to
producing the desired end products.
b. Level 3 relates to monitoring and controlling the physical processes; Level 4
relates to producing the desired end products.
c. Level 3 relates to producing the desired end products; Level 4 relates to
managing a manufacturing organization.
d. Level 3 relates to sensing and manipulating the physical processes; Level 4
relates to monitoring and controlling the physical processes.
c. Level 3 relates to producing the desired end products; Level 4 relates to
managing a manufacturing organization.
The automation system security at a pharmaceutical manufacturer should
a. apply solely to automation processes that connect to phone lines.
b. parallel secure information technology (IT) computing practices.
c. apply solely to manufacturing components.
d. protect any system in the production process.
d. protect any system in the production process.
How do OPC specifications facilitate HMI software configuration?
a. Powerful controller modules
b. Ease of interoperability
c. Compliance with recommended standards
d. Support of batch processing
b. Ease of interoperability
Which of the following statements describes a database record?
a. All data related to a particular subject kept in a group
b. A single row of information in a table
c. A single piece of data in a single row of a table
d. An electronic filing system
b. A single row of information in a table
A given smart device may be obtained from several different suppliers. In a
relationship database, this would be categorized as a
a. many-to-many relationship.
b. one-to-many relationship.
c. normal form.
d. flat file.
a. many-to-many relationship.
What is the significance of the United States Food and Drug Administration (FDA)
Code of Federal Regulations, Title 21, Part 11 (21CFR11) in industrial automation
environments?
a. It establishes clear requirements for ensuring that electronic records and
signatures are trustworthy and reliable.
b. It specifies technology and methods to keep records or make reports to the
FDA.
c. It specifies criteria to use in defining security access in a closed system.
d. It requires organizations to use electronic records or signatures in closed
system environments.
a. It establishes clear requirements for ensuring that electronic records and
signatures are trustworthy and reliable.
Which statement is NOT reflective of how business production requirements are
used to coordinate and control plant floor activity?
a. Detailed production scheduling activities are derived from the production work
orders.
b. Production schedules developed by the business and sent to production drive
the production.
c. As production activities are executed, data is collected in a production data
collection activity.
d. Production work orders are dispatched to work centers and work units based
on time and events.
a. Detailed production scheduling activities are derived from the production work
orders.
All of the following statements accurately characterize the current state of
automation and network security EXCEPT
a. It has many critical differences from typical business system or information
technology (IT) security.
b. Ubiquitous connectivity has increased the risk of harmful electronic intrusions.
c. Security with new systems is fairly seamless due to rigorous international and
national standards.
d. Most installed legacy systems lack the inherent design features to provide
adequate security.
c. Security with new systems is fairly seamless due to rigorous international and
national standards.
An operator using HMI software to design graphics has direct access to data in the
OPC server. In this situation, what does the operator do next to specify parameters
for the data?
a. Access a driver device.
b. Point and click.
c. Access a host gateway module.
d. Use a direct point-to-point method.
b. Point and click.
Which data shown in the figure below represent a key field?
a. Impeller Speed
b. Additive Concentration
c. DateTime
d. Additive Flowrate
c. DateTime
An organization can realistically expect to derive all of the following benefits from an
open software architecture EXCEPT
a. capital expenditure (CAPEX) savings.
b. seamless DCOM configuration.
c. operational expenditure (OPEX) savings.
d. integration of applications from multiple suppliers.
b. seamless DCOM configuration.
A proven tool that facilitates revision control on automation software is
a. sequential function chart (SFC) programming methods.
b. implementation of HTML and XHTML universal graphical display construction
language.
c. peer review of proposed changes and the new program code.
d. the predominant use of IEC 61131-3 languages.
a. sequential function chart (SFC) programming methods.
Which of the following statements BEST describes network addressing?
a. Network addresses are typically expressed as a combination of alphabetic and
numerical expressions.
b. The higher the layer of the network destination address, the greater the need
for error detection and recovery.
c. All network addresses are expressed as some form of a numerical tag.
d. Both the source and destination addresses are often included in the data
transmission message.
d. Both the source and destination addresses are often included in the data
transmission message.
MES integration data provided to business scheduling systems is classified as
a. production capability information.
b. process segment information.
c. production schedule information.
d. product definition information.
a. production capability information.
What is the BEST method for providing data security for historical processing
information residing on a plant-wide network?
a. Integrate data historian security with existing plant network security.
b. Store the data on memory sticks so information is not on the system.
c. Store the data on the firewall server.
d. Use a spyware scanner on the data.
a. Integrate data historian security with existing plant network security.
Which of the following is NOT a scheme for OPC data exchange?
a. Synchronous
b. Subscription
c. Asynchronous
d. Polling
d. Polling
A data storage technique where each row represents a set of data from one instant
in time BEST describes a
a. relationship database.
b. flat file.
c. time-stamped record.
d. real-time data snapshot.
b. flat file.
Which characteristics BEST describe the primary benefit to using OLE for process
control technology software architecture in place of application programming
interfaces (APIs)?
a. Process visualization and asset management capabilities
b. Connectivity that is open and easy to use
c. Greatly reduced troubleshooting and maintenance
d. Auto-configured servers and field linking capabilities
b. Connectivity that is open and easy to use