Week 10 Flashcards

1
Q

When compared to traditional bar-code systems, a primary benefit of radio frequency
identification (RFID) tags is
a. low voltage power drawn from the battery.
b. faster data transmission that can be read from farther away.
c. the number of software applications that can process RFID data.
d. cost savings of tags.

A

b. faster data transmission that can be read from farther away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which quality tool is appropriate to graphically show production schedule information
for equipment that includes production work orders and different production jobs?
a. Gantt chart
b. Activity network diagram (AND)
c. Critical path method
d. Work breakdown structure (WBS)

A

a. Gantt chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following security risks is LEAST likely to disrupt operations at a
geothermal power plant and result in an emergency situation?
a. Connections to the Internet
b. E-mail viruses
c. Inadvertent network failures
d. Remote access to network components

A

b. E-mail viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A process audit surfaces a security lapse in a relatively new network security
application. What is the BEST course of action?
a. Implement a risk management process.
b. Identify all the consequences.
c. Prioritize the identified risks.
d. Take corrective action.

A

d. Take corrective action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a recommended alarm management practice per
Engineering Equipment Materials and Users Association (EEMUA) Specification
191?
a. Focusing
b. Timely
c. Layered
d. Prioritized

A

c. Layered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An overall limitation of using a general purpose business database for process data
in an industrial plant is
a. increased vulnerability to data corruption.
b. lack of required features.
c. inadequate documentation capabilities.
d. customization expense.

A

b. lack of required features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of OPC automation software detects special causes of process variation?
a. HMI
b. Statistical process control (SPC)
c. Multimedia alarming
d. Advanced process control (APC)

A

b. Statistical process control (SPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to the equipment hierarchy set forth in the ANSI/ISA-95.00.03-2005
standard, which statement BEST describes the relationship of Level 3 and Level 4
activities?
a. Level 3 relates to managing a manufacturing organization; Level 4 relates to
producing the desired end products.
b. Level 3 relates to monitoring and controlling the physical processes; Level 4
relates to producing the desired end products.
c. Level 3 relates to producing the desired end products; Level 4 relates to
managing a manufacturing organization.
d. Level 3 relates to sensing and manipulating the physical processes; Level 4
relates to monitoring and controlling the physical processes.

A

c. Level 3 relates to producing the desired end products; Level 4 relates to
managing a manufacturing organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The automation system security at a pharmaceutical manufacturer should
a. apply solely to automation processes that connect to phone lines.
b. parallel secure information technology (IT) computing practices.
c. apply solely to manufacturing components.
d. protect any system in the production process.

A

d. protect any system in the production process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do OPC specifications facilitate HMI software configuration?
a. Powerful controller modules
b. Ease of interoperability
c. Compliance with recommended standards
d. Support of batch processing

A

b. Ease of interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements describes a database record?
a. All data related to a particular subject kept in a group
b. A single row of information in a table
c. A single piece of data in a single row of a table
d. An electronic filing system

A

b. A single row of information in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A given smart device may be obtained from several different suppliers. In a
relationship database, this would be categorized as a
a. many-to-many relationship.
b. one-to-many relationship.
c. normal form.
d. flat file.

A

a. many-to-many relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the significance of the United States Food and Drug Administration (FDA)
Code of Federal Regulations, Title 21, Part 11 (21CFR11) in industrial automation
environments?
a. It establishes clear requirements for ensuring that electronic records and
signatures are trustworthy and reliable.
b. It specifies technology and methods to keep records or make reports to the
FDA.
c. It specifies criteria to use in defining security access in a closed system.
d. It requires organizations to use electronic records or signatures in closed
system environments.

A

a. It establishes clear requirements for ensuring that electronic records and
signatures are trustworthy and reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which statement is NOT reflective of how business production requirements are
used to coordinate and control plant floor activity?
a. Detailed production scheduling activities are derived from the production work
orders.
b. Production schedules developed by the business and sent to production drive
the production.
c. As production activities are executed, data is collected in a production data
collection activity.
d. Production work orders are dispatched to work centers and work units based
on time and events.

A

a. Detailed production scheduling activities are derived from the production work
orders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All of the following statements accurately characterize the current state of
automation and network security EXCEPT
a. It has many critical differences from typical business system or information
technology (IT) security.
b. Ubiquitous connectivity has increased the risk of harmful electronic intrusions.
c. Security with new systems is fairly seamless due to rigorous international and
national standards.
d. Most installed legacy systems lack the inherent design features to provide
adequate security.

A

c. Security with new systems is fairly seamless due to rigorous international and
national standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An operator using HMI software to design graphics has direct access to data in the
OPC server. In this situation, what does the operator do next to specify parameters
for the data?
a. Access a driver device.
b. Point and click.
c. Access a host gateway module.
d. Use a direct point-to-point method.

A

b. Point and click.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which data shown in the figure below represent a key field?
a. Impeller Speed
b. Additive Concentration
c. DateTime
d. Additive Flowrate

A

c. DateTime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An organization can realistically expect to derive all of the following benefits from an
open software architecture EXCEPT
a. capital expenditure (CAPEX) savings.
b. seamless DCOM configuration.
c. operational expenditure (OPEX) savings.
d. integration of applications from multiple suppliers.

A

b. seamless DCOM configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A proven tool that facilitates revision control on automation software is
a. sequential function chart (SFC) programming methods.
b. implementation of HTML and XHTML universal graphical display construction
language.
c. peer review of proposed changes and the new program code.
d. the predominant use of IEC 61131-3 languages.

A

a. sequential function chart (SFC) programming methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following statements BEST describes network addressing?
a. Network addresses are typically expressed as a combination of alphabetic and
numerical expressions.
b. The higher the layer of the network destination address, the greater the need
for error detection and recovery.
c. All network addresses are expressed as some form of a numerical tag.
d. Both the source and destination addresses are often included in the data
transmission message.

A

d. Both the source and destination addresses are often included in the data
transmission message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MES integration data provided to business scheduling systems is classified as
a. production capability information.
b. process segment information.
c. production schedule information.
d. product definition information.

A

a. production capability information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the BEST method for providing data security for historical processing
information residing on a plant-wide network?
a. Integrate data historian security with existing plant network security.
b. Store the data on memory sticks so information is not on the system.
c. Store the data on the firewall server.
d. Use a spyware scanner on the data.

A

a. Integrate data historian security with existing plant network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is NOT a scheme for OPC data exchange?
a. Synchronous
b. Subscription
c. Asynchronous
d. Polling

A

d. Polling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A data storage technique where each row represents a set of data from one instant
in time BEST describes a
a. relationship database.
b. flat file.
c. time-stamped record.
d. real-time data snapshot.

A

b. flat file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which characteristics BEST describe the primary benefit to using OLE for process
control technology software architecture in place of application programming
interfaces (APIs)?
a. Process visualization and asset management capabilities
b. Connectivity that is open and easy to use
c. Greatly reduced troubleshooting and maintenance
d. Auto-configured servers and field linking capabilities

A

b. Connectivity that is open and easy to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A primary benefit of the customization of commercial components through software
is
a. lower costs compared to custom silicon.
b. more lenient installation standards.
c. more cost-effective topology options.
d. simplified network protocols in communications.

A

a. lower costs compared to custom silicon.

27
Q

Which statement BEST describes the rationale for an MES?
a. ERPs must have information from plant floor controllers.
b. To compete in a global economy there must be the capability to conduct
business using online means.
c. Equipment control cannot function unless it is integrated with ERP.
d. Automation effectiveness is not based solely on equipment control capability.

A

d. Automation effectiveness is not based solely on equipment control capability.

28
Q

Selecting, starting, and moving units of work (such as a batch or production run)
through the appropriate sequence of operations to physically produce the product
describes
a. production resource management.
b. production execution management.
c. production tracking.
d. production dispatching.

A

b. production execution management.

29
Q

A recommended procedure for automation system security is to
a. test and vet all security applications, updates, and patches in a non-production
environment.
b. install a firewall and set up a schedule for automatic system scans.
c. require strong passwords for alarm systems to prevent unauthorized access.
d. install the best available commercial off-the-shelf antivirus software.

A

a. test and vet all security applications, updates, and patches in a non-production
environment.

30
Q

An operator needs to review historical trend data to evaluate significant changes
exceeding a specific value. Which HMI parameter is BEST suited for this task?
a. Deadband
b. Server filtering
c. ActiveX graphic controls
d. Aggregates

A

a. Deadband

31
Q

When compared to flat files, a primary benefit of a relationship database is
a. The cost of storage media is considerably less.
b. Files can be opened by word processing software.
c. Changes to data can be accomplished more efficiently.
d. Data extraction from compressed files is faster and more reliable.

A

c. Changes to data can be accomplished more efficiently.

32
Q

A critical step in writing a custom software program for an automation system is the
creation of
a. a vendor change order and revision control process.
b. mandatory and optional troubleshooting procedures.
c. the manufacturing specification.
d. software hierarchy documentation.

A

c. the manufacturing specification.

33
Q

Which of the following functions is NOT characteristic of an MES?
a. Product tracking and geneology
b. Order entry and invoicing
c. Quality management
d. Detailed operations scheduling

A

b. Order entry and invoicing

34
Q

Kanban or JIT manufacturing is BEST applied to which part of production
scheduling?
a. Production resource management
b. Production data collection
c. Production tracking
d. Production dispatching

A

a. Production resource management

35
Q

Which statement BEST describes automation network and system security?
a. An application that adequately protects a legacy system typically requires
minimal configuration for a new system.
b. Automation network and system security is necessarily an engineered
solution.
c. Automation systems security is very similar to business system security.
d. Access controls and encryption devices are easily transported across
homogenous systems.

A

b. Automation network and system security is necessarily an engineered
solution.

36
Q

How should an HMI alarm generator be configured to minimize nuisance alarms and
alarm flooding?
a. Create an information bar that displays diagnostics, trends, and SOPs.
b. Install a navigation bar that uses icons for alarm notification.
c. Display real-time alarm data.
d. Write smart alarm hierarchies.

A

d. Write smart alarm hierarchies.

37
Q

An operator specifies a string of information through entry fields and drop-down
boxes about a particular product and unit price. The database receives a command
such as SELECT ALL WHERE PRODUCT NAME = TUBE
FLOW SENSOR > 10500. This is an example of
a. data mining.
b. a query.
c. a report.
d. a record.

A

b. a query.

38
Q

The three basic data interfaces found in open information architecture are
a. dynamic data exchange, alarm management, and data historian.
b. data access, alarms and events, and historical data access.
c. alarm summary, trending, and report viewing.
d. alarm capture and viewing, plant queries, and assets viewing.

A

b. data access, alarms and events, and historical data access.

39
Q

As specified in the ANSI/ISA-95.00.03-2005 standard functional hierarchy, work flow
data is classified as
a. Level 1.
b. Level 3.
c. Level 4.
d. Level 2.

A

c. Level 4.

40
Q

An activity causes a subsystem to fail. This in turn creates a high current flow that
subsequently leads the entire system to fail. Which level in the ANSI/ISA-95.00.03-
2005 standard functional hierarchy should this be managed at?
a. Level 2
b. Level 1
c. Level 3
d. Level 4

A

a. Level 2

41
Q

When developing a security plan for automation and network security, inventory and
mapping is a critical step in
a. integration, post-installation, and test plans.
b. risk assessment and gap analysis.
c. assessing and defining the existing system.
d. periodic audit and compliance.

A

c. assessing and defining the existing system.

42
Q

HMI reports can be distributed in a variety of formats. Which is NOT a feasible
presentation format?
a. E-mail
b. Hard copy (print)
c. RSS (Rich Site Summary) feeds
d. PDF files

A

c. RSS (Rich Site Summary) feeds

43
Q

Which of the following techniques will ease retrieval of information?
a. Data filtering
b. Data mining
c. Data compression algorithms
d. Data sampling

A

b. Data mining

44
Q

Which statement BEST describes how information is exchanged between a client
and server in an OPC automation environment?
a. Monolithic software
b. Software interfaces
c. Mapping registers to tags
d. Custom drivers

A

b. Software interfaces

45
Q

The ANSI/ISA-95.00.03-2005 standard functional hierarchy defines equipment
control and equipment monitoring of PLCs in
a. Level 1.
b. Level 2.
c. Level 3.
d. Level 4.

A

b. Level 2.

46
Q

Potential stockouts at suppliers and critical part shortages that can shut down an
entire line would be managed at which level in the ANSI/ISA-95.00.03-2005
standard functional hierarchy?
a. Level 1
b. Level 2
c. Level 3
d. Level 4

A

d. Level 4

47
Q

Why is it important to build a business case for an automation system and network
security program?
a. To establish buy-in from operators
b. To secure senior management commitment
c. To overcome resistance to change
d. To minimize turf battles between functional areas

A

b. To secure senior management commitment

48
Q

An ergonomic operator console might include all of the following features EXCEPT
a. voice recognition software.
b. variable work surfaces.
c. mounting a monitor on a swivel arm.
d. anti-glare monitor shields.

A

a. voice recognition software.

49
Q

Which technique can prevent two operators from trying to update the same
information in a database at the same time?
a. File and record locking schemes
b. Transaction files
c. Requiring hard passwords
d. Data encryption

A

a. File and record locking schemes

50
Q

What is the best way to avoid a system shutdown in the event an OPC server fails?
a. Firewall solutions
b. Redundant OPC server
c. OPC bridges
d. Remote server diagnostics

A

b. Redundant OPC server

51
Q

Which level in the ANSI/ISA-95.00.03-2005 standard functional hierarchy operates
on times frames of months, weeks, and days?
a. Level 1
b. Level 3
c. Level 4
d. Level 2

A

b. Level 3

52
Q

According to ANSI/ISA-95.00.03-2005 standard terminology, a manufacturing bill
describing production routing and specific resources required is classified as
a. process segment information.
b. product definition information.
c. production performance information.
d. production schedule information.

A

b. product definition information.

53
Q

Which statement BEST describes the importance of having a cross-functional
perspective in developing and deploying an automation system and network
security program?
a. Buy-in and broad acceptance are necessary to achieve results.
b. Program personnel will be more committed and productive.
c. Results will be more cost-effective.
d. Program personnel will need less training to complete their charter.

A

a. Buy-in and broad acceptance are necessary to achieve results.

54
Q

Which of the following is NOT a recommended alarm management practice per
Engineering Equipment Materials and Users Association (EEMUA) Specification
191?
a. Advisory
b. Diagnostic
c. Accessible
d. Unique

A

c. Accessible

55
Q

A limitation of data sampling in a real-time process database is
a. Queries of archived data are tedious and often unreliable.
b. Changes that occur in a variable between sample times will be lost.
c. Values that are grossly out of range may result from transcription errors.
d. Data must often be extensively preprocessed before statistical or other
analysis.

A

b. Changes that occur in a variable between sample times will be lost.

56
Q

Which of the following is NOT a method used to generate an alarm in an OPC
environment?
a. Comparison of live data to trip levels
b. Interface to historical alarms and events (A&E)
c. Capturing alarms and events from network reporting
d. Comparison to set filter criteria and priorities

A

b. Interface to historical alarms and events (A&E)

57
Q

A company might choose wireless technology for all of the following reasons
EXCEPT
a. ease and flexibility of installation.
b. improved error detection and reliability.
c. cost reductions.
d. mobility.

A

b. improved error detection and reliability.

58
Q

ANSI/ISA-95.00.03-2005 standard terminology classifies work orders with specific
starting times or starting events and specifications about their sequencing in
manufacturing one or more products as
a. process segment information.
b. production schedule information.
c. product definition information.
d. production performance information.

A

b. production schedule information.

59
Q

During manufacturing operations, conditions surface that are not anticipated and
covered in the detailed production schedule. Such occurrences would be addressed
during
a. production dispatching.
b. production tracking.
c. product definition management.
d. production data collection.

A

a. production dispatching.

60
Q

Which quality tool would be MOST useful during an automation system security risk
assessment and gap analysis?
a. Failure mode and effects analysis (FMEA)
b. Operator surveys
c. Cause-and-effect diagrams
d. Cross-functional brainstorming sessions

A

a. Failure mode and effects analysis (FMEA)

61
Q

A nuisance alarm can be triggered as a direct result of
a. a process upset.
b. an earlier problem already reported.
c. pneumatic noise.
d. a sensor failure.

A

b. an earlier problem already reported.

62
Q

A sensor malfunction that causes values for a particular variable to be grossly out of
range describes which process data problem?
a. Outliers
b. Unexpected disturbances
c. Excessive noise
d. Missing variables

A

a. Outliers

63
Q

Which type of OPC automation software provides extensive data trending
capabilities?
a. Advanced process control (APC)
b. Process information management system (PIMS)
c. Real-time optimization (RTO)
d. Supervisory control and data acquisition (SCADA)

A

b. Process information management system (PIMS)