Q2 2021 Fundamental IT Engineer Examination (Morning)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Q2 2021

Fundamental IT Engineer Examination (Morning)

Questions must be answered in accordance with the following:

Question Nos. Q1 - Q80


Question Selection All questions are compulsory.
Examination Time 9:30 - 12:00 (150 minutes)

Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.

2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the sample question below.

[Sample Question]
Q1. Which of the following should be used for marking your answer on the answer
sheet?

a) Ballpoint pen b) Crayon c) Fountain pen d) Pencil

Since the correct answer is “d) Pencil”, mark the answer as below:

[Sample Answer]
Q1 ウ

Do not open the exam booklet until instructed to do so.


Inquiries about the exam questions will not be answered.

– 1 –
Symbols commonly used in questions

Unless otherwise noted in each question, the following notational conventions are applied as
shown in the table.

Logic Circuit

Graphic symbol Explanation

AND gate

NAND gate

OR gate

NOR gate

Exclusive OR (XOR) gate

Exclusive NOR gate

Buffer

NOT gate

Three-state buffer (or tri-state buffer)

A small circle or “bubble” on either the


input or the output terminal shows inversion
or negation of the logic state.

Company names or product names mentioned in the examination questions are the trademarks or registered
trademarks of their respective companies or organizations. The symbol ® or ™ is not used within.

– 2 –
Q1. Which of the following is equivalent to the logic expression below?

Here, the letters are logic variables; , ∙ , and ̅ are OR, AND, and NOT
operations on the corresponding variables, respectively.

a) ∙ b) ∙
c) ∙ ∙ d) ̅ ∙

Q2. Which of the following is a decimal that is represented as a finite digit octal fraction?

a) 0.3 b) 0.4 c) 0.5 d) 0.8

Q3. The GCD (Greatest Common Divisor) of two positive integers, x0 and x1 (x0 > x1), is
computed by the procedure below. When x0 = 175 and x1 = 77, how many times should step
(2) of this procedure be executed before it stops? Here, “A ← B” indicates that B is substituted
for A.

[Procedure]
(1) i ← 2
(2) xi ← remainder of xi−2 divided by xi−1
(3) if xi = 0, stop with xi−1 as the GCD
(4) i ← i + 1
(5) return to step (2)

a) 3 b) 4 c) 6 d) 7

– 3 –
Q4. To compare the entrance exams of the current and previous years, a company required
many of its employees to take those exams. The correlation coefficient and the regression line
were obtained by assigning the scores of the previous year to the x-axis and the scores of the
current year to the y-axis. Which of the following can be derived from the results below?

[Results]
The correlation coefficient is 0.8.
The slope of the regression line is 1.1.
The y-intercept of the regression line is 10.

a) From the slope and the y-intercept of the regression line, the tendency is to obtain a
higher score for the current year than the previous year
b) From the slope of the regression line and the correlation coefficient, the exam of the
current year is of high quality.
c) From the slope of the regression line, the average score for the current year is 1.1 times
that of the previous year.
d) From the y-intercept of regression line, those who get zero for the current year can get a
score as high as 10 for the previous year.

Q5. The table below is a state transition table used for character string validation. In this table,
“A ” represents the initial state, and “E ” represents the failure state. Which of the following is
a character string that fails this validation? Here, each character of a string is parsed from the
leftmost side, and the symbol “” represents a blank character.

Character
Blank Number Sign Radix point Other
A A B C D E
Current B A B E D E
state C E B E D E
D A E E E E

a) +0010 b) −1 c) 12.2 d) 9.

– 4 –
Q6. Which of the following is an appropriate description of parity check (vertical parity) that
handles transmission errors on a communication line?

a) A parity check can correct 1-bit and 2-bit errors.


b) A parity check can detect a 1-bit error.
c) An odd parity check can detect a 1-bit error, but an even parity check cannot even detect
a 1-bit error.
d) An odd parity check can detect any odd number of bit errors, and an even parity check
can detect any even number of bit errors.

Q7. When a sequence of data, A, B, C, D, arrives in this order, which of the following is a
possible sequence that can be produced using a single stack?

a) A, D, B, C b) B, D, A, C c) C, B, D, A d) D, C, A, B

Q8. The in-order traversal of a binary tree is a procedure that visits all nodes of the tree. For a
non-empty binary tree T, it performs the following operations in order.

(1) Recursively performs the in-order traversal of the left subtree of T.


(2) Visits the root node of T.
(3) Recursively performs the in-order traversal of the right subtree of T.

Which of the following is the ordered sequence of nodes when the in-order traversal is
performed on the binary tree below?

a) 1, 2, 4, 7, 8, 5, 3, 6, 9 b) 6, 9, 3, 1, 5, 2, 8, 4, 7
c) 7, 4, 8, 2, 5, 1, 3, 9, 6 d) 7, 8, 4, 5, 2, 9, 6, 3, 1

– 5 –
Q9. Which of the following explains the objective of a recursive call?

a) To allow a function to use itself from within its body


b) To execute processes in an event-driven way rather than in a predetermined order
c) To retain a function in memory for reuse after its execution
d) To undo an execution of a process when it fails

Q10. Which of the following is a technology that provides a dynamic user interface without
page transition using an asynchronous communication in JavaScript?

a) Ajax b) CSS c) RSS d) SNS

Q11. Which of the following is a special register that contains the address of the next instruction
to be fetched?

a) Accumulator b) Program Counter (PC)


c) Stack Pointer d) Timer

Q12. Which of the following is the performance of a CPU in MIPS when the instruction mix of
the CPU is as listed in the table below? Here, the CPU does not use a pipeline architecture.

Instruction type Instruction execution Appearance ratio


time in μs
Register to register
0.1 40%
operation
Register from memory
0.3 50%
operation
Unconditional branch
0.6 10%
operation

a) 0.04 b) 0.25 c) 4 d) 25

– 6 –
Q13. Which of the following is a computer system or architecture where the CPU sequentially
reads and executes the programs that are stored in the main memory?

a) Addressing system b) DMA control architecture


c) Stored program architecture d) Virtual memory system

Q14. Which of the following is an appropriate description of USB 3.0?

a) It is a serial interface that adopts isochronous transmission that is suitable for audio or
video, and has a broadcast transmission mode.
b) It is a serial interface that has a data transmission mode of 5 Gbit/s that is called super
speed.
c) It is a serialized ATA specification that connects a PC to a peripheral device.
d) It is an interface that uses four (4) pairs of signal lines transmitting two (2) bits of
information in one (1) clock and has a maximum throughput of 1 Gbit/s.

Q15. Which of the following is the RAID level where the entire stored data is lost when one of
the multi-disks is damaged?

a) RAID 0 b) RAID 1 c) RAID 5 d) RAID 6

Q16. Which of the following is the approximate availability of a system in percentage when the
MTBF is 30 days and the MTTR is 6 hours?

a) 0.83 b) 83.33 c) 98.36 d) 99.17

– 7 –
Q17. In the switching procedure of processes in the multiprogramming shown in the figure
below, which of the following is an appropriate combination of OS processing from A to C?

State of process A OS processing State of process B


Running
Interrupt state

A
Ready
state
B
Ready
state C

Running
state

A B C
Restoration of the Saving of the running
a) Selection of the process
running state state
Saving of the running Restoration of the
b) Selection of the process
state running state
Saving of the running Restoration of the
c) Selection of the process
state running state
Selection of the Restoration of the Saving of the running
d)
process running state state

Q18. Among the page replacement methods in virtual memory management, which of the
following is the LRU control method?

a) Each page is managed by appending a reference flag and a change flag, and pages
without reference or change are replaced with higher priority.
b) One of the pages in main memory is randomly chosen with the same probability and
then replaced.
c) The page that has been stored in the main memory for the longest time is replaced.
d) The page that has not been referenced the longest time is replaced.

– 8 –
Q19. Which of the following is an appropriate function of a linker?

a) To load a load module to the main memory ahead of execution


b) To monitor the execution of a program and to record the execution results for each step
c) To perform a resolution of cross references and to create one (1) load module from
multiple object modules
d) To register a created program in a library

Q20. Which of the following is the appropriate explanation of sequence control for controlling
industrial devices?

a) It is based on fuzziness, such as “slightly more” or “slightly less.”


b) It is resistant to unexpected disturbances because it continuously detects the amount of
control and reflects it on the control.
c) It steps through each phase of control one after another according to a predefined order
or set of conditions.
d) It takes corrective action in advance by assuming the occurrence of disturbances when
disturbances can be expected.

Q21. The half adder in the diagram below adds two (2) single-digit binary numbers, x and y,
and produces z (the first digit of the sum) and c (the carry bit) as outputs. Which of the
following is the appropriate combination of gate devices A and B?

A B
a) Exclusive logical sum (XOR) Logical product (AND)
b) Logical product (AND) Logical sum (OR)
c) Negative logical product (NAND) Negative logical sum (NOR)
d) Negative logical sum (NOR) Exclusive logical sum (XOR)

– 9 –
Q22. Which of the following is not an implementation of the function F = A • B + C • D ? Here,
“•” represents the logic AND operation, and “+” represents the logic OR operation in the
expression.

a) b)

c) d)

Q23. Which of the following is an appropriate purpose of check digit?

a) To detect an error that an alphabet or a symbol is contained in a numeric item field


b) To detect an error that the number of digits of an entered code is incorrect
c) To detect an error that the value of an entered code is incorrect
d) To detect an error that the value of an entered data is not within a specified range

Q24. Which of the following explains a drawing software?

a) It can create a picture on a screen using the mouse as a brush that can be saved to a
bitmap image file.
b) It can create a scenario-based content by editing and arranging several materials, such as
text, images, video, and sound.
c) It can create a simple movie from a series of still images by gradually changing the
differences among images.
d) It can create vector graphics composed of lines and curves defined mathematically with
geometric characteristics that can then be transformed or combined.

– 10 –
Q25. Which of the following is an appropriate explanation of a relational database?

a) Data is represented as a table, and the tables are linked to one another using the column
values of these tables.
b) Each attribute is represented as a pair of the attribute value and the storage location of
the record having that value and used as an index.
c) The relationship among records is represented by a data structure using links that can
represent both tree and network structures.
d) The relationship among records is represented by a data structure using pointers that are
limited to representing a tree structure.

Q26. Which of the following is performed periodically to prevent a decline in the access
efficiency of a database?

a) Backup b) Database dump


c) Reorganization d) Rollback

Q27. A student’s ID, name, and class ID are recorded in the Student table. Which of the
following SQL returns records of all students whose names start with A?

a) SELECT * FROM Student WHERE name LIKE ’%A’;


b) SELECT * FROM Student WHERE name LIKE ‘%A_’;
c) SELECT * FROM Student WHERE name LIKE ‘A_’;
d) SELECT * FROM Student WHERE name LIKE ‘A%’;

Q28. Among the search processes for the “Sales” table, which of the following is appropriate to
set a hash index rather than a B+ tree index? Here, the column in which the index is set is
shown inside <>.

Sales (form number, sales date, product name, user ID, store number, sales amount)

a) Searching for sales with a sales amount of 100 dollars or more. <sales amount>
b) Searching for sales with the product name beginning with ‘DB’. <product name>
c) Searching for sales with the sales date as the current month. <sales date>
d) Searching for sales with the user ID as ‘1001’. <user ID>

– 11 –
Q29. Which of the following is the appropriate explanation of the key value store that is used in
the processing of big data?

a) It is represented by a two-dimensional table with rows and columns based on the set
theory.
b) It represents the relationship among nodes with the three (3) elements, i.e., “node,”
“relationship,” and “property.”
c) It saves the desired data together with a value that enables this data to be uniquely
identified as a pair.
d) The data for one (1) case is called a “document,” and the data structure of each
document is unrestricted and can be changed whenever data is added.

Q30. Which of the following is the response time when a client and server at different locations
communicate under the conditions below? Here, the response time is in seconds and starts
from the moment the client sends a message until a response is received from the server. 1
MB is 106 bytes. The propagation delay between the client and server can be ignored.

[Conditions]
Line speed between client and server 8 Mbit/s
Transmission efficiency 60%
1 MB for upstreaming and 2 MB for
Message size
downstreaming
Processing time at client side Total of 0.4 s for sending and receiving
Processing time at server side Total of 0.4 s for sending and receiving

a) 1.4 b) 3.8 c) 5.0 d) 5.8

– 12 –
Q31. Which of the following is an appropriate transmission operation of a node connected to a
CSMA/CD LAN?

a) All nodes are connected in a ring topology, where a special frame is circulated around to
control transmission rights. Only the node that has the special frame can transmit data.
b) Each node is logically ordered, a transmission right is passed along in order, and only
the node that has received the right can transmit data.
c) Each node waits for the medium to be idle before transmitting data. When collision
occurs, it waits for a random backoff time before retransmission.
d) Only the node that has a time slot assigned can transmit data.

Q32. In a TCP/IP environment, which of the following is a protocol for synchronizing the clocks
of multiple computers with that of a time server?

a) FTP b) NNTP c) NTP d) RTP

Q33. Which of the following is an appropriate explanation of DHCP?

a) It is a protocol for accessing a directory service.


b) It is a protocol for automatically assigning an IP address.
c) It is a protocol for converting a private IP address to a global IP address.
d) It is a protocol for forwarding an e-mail.

Q34. Which of the following is classified as a web beacon?

a) A potential error of an application program used for a website


b) A technique to collect user information, such as access trends, by embedding a small
image in a web page
c) A virus that is downloaded from a website that deletes image files on a PC
d) An abusive method of using a malicious script that is harmful to both client PC and web
server

– 13 –
Q35. When risk treatment is classified as risk avoidance, risk reduction, risk acceptance, and
risk sharing, which of the following risk treatments is risk avoidance?

a) Applying appropriate controls to lower a risk


b) Discontinuing some operations that have a risk
c) Knowingly and objectively not taking any action on a risk
d) Transferring a risk to other parties

Q36. Which of the following is installed into an in-house network or server by an intruder to
enter through an access path other than the normal path?

a) Backdoor b) Forensic
c) Strict routing d) Thin client agent

Q37. Biometric authentication includes a verification method that extracts physical


characteristics and another verification method that extracts behavioral characteristics. Which
of the following is the method that uses behavioral characteristics?

a) Performing authentication by extracting characteristics from pen speed and pressure


when a signature is provided
b) Performing authentication by extracting characteristics from the bifurcation angle of the
bifurcation point of a blood vessel or from the distance between adjacent bifurcation
points
c) Performing authentication by extracting the characteristic point called minutia from the
pattern formed by ridges
d) Performing authentication by extracting the characteristics of chaotic wrinkles in the eye
from the pupil to the outside

Q38. Which of the following is an encryption method that can be used for encrypting data
managed in a database using the same key for encryption and decryption?

a) AES b) PKI c) RSA d) SHA-256

– 14 –
Q39. A given application only has the functions of retrieving and displaying user information
from a database that stores such information. Considering information security management,
which of the following is the appropriate database access right assigned to an account that
the application uses when it accesses the database? The names and scopes of rights are listed
below.

[The names and scopes of rights]


Reference right: Permits a record to be selected
Update right: Permits a record to be inserted, updated, and dropped
Administrator right: Permits a table to be displayed, created, altered, and dropped

a) Administrator right b) Reference right


c) Update right d) Update right and reference right

Q40. A cybersecurity incident response plan is defined as a set of instructions to aid the
cybersecurity team to detect, respond to, and recover from cybersecurity incidents. The
cybersecurity incident response plan resolves issues, such as cybercrime, data loss, and
service outages that threaten daily work. Which of the following is part of the cybersecurity
incident response plan?

a) Attacking systems with scripts b) Containment


c) Social engineering activities d) Stealing user credentials

Q41. Between a client and web server, which of the following is used for inspecting the data
that is sent from the client to the web server and blocking attacks, such as SQL injections?

a) Cluster configuration b) Load balancing function


c) SSL-VPN function d) WAF

Q42. Which of the following is an appropriate description of SSH?

a) It cannot use public key pairs, and it uses a password for authentication.
b) It helps in securely loading web site pages over HTTPS.
c) It provides a secure channel for server maintenance over a public network.
d) Its use is required in the Intranet.

– 15 –
Q43. Which of the following is an appropriate description concerning Sender Policy Framework
(SPF) for email communication?

a) It is a policy of the public relations department to designate a specific person to send


emails.
b) It is an email sent from a spoofed email address without authorization.
c) It matches the sender mail server IP address with the information from the domain server
and accepts or rejects email.
d) It sends an email to the address of a specific person instead of sending them to multiple
email addresses.

Q44. Which of the following is an appropriate explanation of OP25B for email communication?

a) Blocking communication to port 25 to reduce mass-scale delivery of spam or junk


emails
b) Blocking emails that are sent to more than 25 recipients at once due to organizational
policy
c) Blocking Simple Mail Transfer Protocol (SMTP) communication except those sent to
port 25
d) Blocklisting email addresses that send spams by monitoring email communication to
port 25

– 16 –
Q45. Which of the following is the UML class diagram that shows a generalization relation?

a) Automobile b) Automobile

1
1
Automobile Driver
inspection
certificate

c) Automobile d) Automobile

1 1
* *
Sports car Tire Engine

Q46. The figure below shows an example of a DFD that uses one of the DFD notations and
represents a flow of data in a system. Texts in the figure are not shown. Which of the
following is represented by the circle “” in the DFD notation used in the example?

a) Activity b) Data flow


c) Data store d) Process

– 17 –
Q47. Which of the following is an appropriate relationship between classes and instances in
object orientation?

a) An instance defines the specifications of a class.


b) An instance is created based on the definition of a class.
c) Multiple classes correspond to a single instance.
d) Only one (1) instance exists for a single class.

Q48. Which of the following is the weakest module coupling?

a) To implement as many functions as possible with a single module


b) To pass arguments that control another module’s logic when the module is called
c) To pass only required data items as arguments between two (2) modules
d) To use a global area to share data items with other modules

Q49. Which of the following tests verifies the interfaces between two (2) modules or
subsystems?

a) Acceptance test b) Integration test c) Operational test d) Unit test

Q50. Which of the following is an appropriate explanation of a comprehensive patent cross-


license?

a) An agreement to share the necessary costs for patent registration is concluded.


b) The source code is published free of charge on the Internet or other places, and anyone
may improve and redistribute the software.
c) The use of patent rights is mutually licensed among companies in the specified fields of
technologies or products.
d) To ensure that a company’s patent rights are not violated, the right to stop a
counterpart’s manufacturing is exercised.

– 18 –
Q51. Based on the definition of project management process groups in ISO 21500, which of
the following is an activity that is to be implemented in the planning process group among
the project management processes?

a) To define scope b) To develop a project charter


c) To identify stakeholders d) To perform quality assurance

Q52. In project time management, which of the following descriptions is appropriate for “slack
time”?

a) It is the amount of time between the earliest start time and earliest finish time of an
activity or between the latest start time and latest finish time of an activity.
b) It is the amount of time for which a non-critical path activity can be deferred without
delaying the project.
c) It is the amount of time that an activity can be deferred without delaying the earliest start
time of any succeeding activity or violating a schedule constraint.
d) It is the amount of time that an activity can be delayed past its latest start time or latest
finish time.

Q53. When the duration for painting a house is estimated, which of the following is an
appropriate technique that estimates the duration on the basis of the actual duration of a
similar painting job in the past of the same house or other historical data from similar work?

a) Analogous estimate b) Parametric estimate


c) Reserve analysis d) Three-point estimate

Q54. In system development, when the relationship between person-months and the duration
(months) is represented in the approximate expression shown below, and the total person-
month is 4096, how many months does it take?

Duration = 2.5  person-months1/3

a) 16 b) 40 c) 64 d) 160

– 19 –
Q55. An IT service is provided under the conditions that are described below. What is the
maximum downtime in hours that can satisfy the SLA during a service time period of one (1)
month? Here, the number of business days in one (1) month is 30, and no maintenance or
other scheduled downtime of the service is performed during the service time period.

[Conditions of the SLA]


- The service time period is from 8:00 AM to 10:00 PM on business days.
- The availability should be 99.5% or more.

a) 0.3 b) 2.1 c) 3.0 d) 3.6

Q56. Which of the following is the main purpose of a migration test for a system?

a) To confirm that a new system possesses all of the required functions


b) To confirm that sufficient performance can be derived from the new system using a copy
of the actual data from the existing system
c) To confirm the compatibility of the interface between a program of another existing
system and a newly developed program
d) To confirm the switch procedure from the existing system to the new system and the
problems that the switch can cause from the perspective of reliability and efficiency

Q57. In IT service management, which of the following is handled by incident management?

a) Inquiry regarding the function or usage of the IT service or system


b) Long delay in an application response
c) Request for providing the IT service to a new business site
d) Request for training of recruits on the IT service

– 20 –
Q58. When the PDCA methodology is applied to a service management system, which of the
following corresponds to Act?

a) Establishing, documenting, and agreeing the service management system


b) Implementing and operating the service management system for the design, transition,
delivery, and improvement of services
c) Monitoring, measuring, and reviewing the service management system and services
against the policies, objectives, plans, and service requirements, and reporting the results
d) Taking actions to continually improve the performance of the service management
system and services

Q59. In the system design stage, which of the following is the point to be checked during the
audit of control for reducing the risk of non-fulfillment of user requirements?

a) All programming should be performed in accordance with the specified standards and
conventions.
b) The program specifications should be created on the basis of the system design
documents.
c) The test plan should be created on the basis of the system test requirements and must
also be approved by the responsible person of the system operations department.
d) The user department should participate in the review of system design.

Q60. When IT controls are classified into preventive controls and detective controls, which of
the following is to be classified as a detective control?

a) A data entry manual is created, and the persons in charge of data entry are trained.
b) A data entry screen is designed so that operation errors are unlikely to occur.
c) Access rights are assigned only to the person in charge of data entry.
d) An output list resulting from data entry is cross-checked with the input form.

– 21 –
Q61. Which of the following is an explanation of CRM?

a) It is a business approach for significantly improving the efficiency of the entire supply
chain through the real time exchange of information regarding production, inventory,
procurement, sales, distribution, etc.
b) It is a concept to optimize customer loyalty by sharing information throughout all
customer channels within a company and improving customer satisfaction by raising the
level of service.
c) It is a method for improving business efficiency by planning and managing business
resources throughout the company effectively and comprehensively.
d) It is a method for wholesale dealers or manufacturers to increase business transactions
with retail stores by supporting their business activities, and increasing their sales and
profits.

Q62. Which of the following is an explanation of BPO?

a) A company outsources all work processes of a specific department, such as management


section or call center and its work system operation, to an external provider.
b) A company reduces software development costs by using employees of a temporary
employment agency with lower personnel expenses.
c) A company rents a portion of the processing and storage capacities of servers owned by
a telecommunications service provider and operates systems without owning its own
servers.
d) A company uses software functions provided by an external provider over a network
without owning the software.

Q63. Which of the following is an appropriate description of chatbot?

a) A software that uses image processing techniques and is employed for applications to
describe image details to a human
b) A software that uses natural language processing techniques and is employed for
applications to communicate with a human
c) A software that uses signal processing techniques and is employed for applications to
convert a human’s voice into texts
d) A software that uses speech processing techniques and is employed for applications to
generate subtitles automatically for a human to read while watching videos

– 22 –
Q64. Which of the following is a technique that performs the optimum resource allocation for
computerization investment in each category classified by the similarities of risks and
investment value?

a) 3C analysis b) Benchmarking
c) Enterprise architecture d) IT portfolio

Q65. In the verification of stakeholder requirements, which of the following indicates the ability
to keep track of the process until the implementation of a change request?

a) Interoperability b) Maintainability c) Traceability d) Usability

Q66. Which of the following is an explanation of core competence?

a) The basic mindset and action guidelines behind management activities


b) The business opportunities and threats in the environment around a company
c) The management resources that form the source of competitive advantage over other
companies
d) The objectives to be achieved through the execution of a business strategy

Q67. In a product life cycle, which of the following is a stage where the withdrawal of some
companies is observed when the demand peaks, and decision-making is necessary to
determine whether it is possible to gain a strong foothold?

a) Decline stage b) Growth stage


c) Introduction stage d) Maturity stage

– 23 –
Q68. When an IT vendor uses a “Balanced Scorecard” to promote a solution business, which of
the following is an example of the learning and growth KPI goal? Here, “solution” means “to
support a customer through information technology and professional services that are offered
by experts so that the customer can achieve its management objectives.”

a) To increase the number of customer proposals by a factor of 1.5 over that of the previous
year by preparing an environment for reusing proposals to augment the number of
registered solution cases
b) To increase the sales volume in the consulting business for information strategy planning
and system planning for it to account for 15% or more of the total sales of the company
c) To set an average satisfaction score of 3.5 out of five (5) or more in a satisfaction
survey of customers for whom a service is offered
d) To train 30 employees as IT professionals in order to focus on the consulting services in
the information strategy

Q69. Which of the following is an appropriate explanation of concurrent engineering?

a) A new product development technique that sequentially executes processes, such as


product design, manufacturing, and sales activities
b) A technique that analyzes a target system and clarifies its specifications
c) A technique that executes processes, such as product design and production planning, in
parallel during the new product development procedure
d) A technique that tries to figure out the optimal combination of functions and cost and to
improve value through systematic procedures

Q70. Which of the following is the appropriate description of telemedicine?

a) Caring for patients by using computer technologies when the physician and patients are
physically together in a hospital
b) Caring for patients by using electronic communication technologies when the physician
and patients are not in the same location
c) Caring for patients by using electronic communication technologies when the physician
and patients are physically together at the patients’ house
d) Caring for patients without using computer technologies when the physician and patients
are physically together at the physician’s clinic

– 24 –
Q71. The figure below shows the relationships among the components of product A, and the
numbers in parentheses indicate the quantity of components necessary to produce one unit of
the upper-level product or component. When 10 units of product A are produced, how many
units of component C must be ordered? Here, there are presently five units of component C
in the inventory.
A

B(2) C(1)

D(1) E(1) C(1)

a) 15 b) 20 c) 25 d) 30

Q72. The figure below shows the transaction model of an escrow service that is used in an
Internet auction site or other similar transactions. Which of the following is the action that
corresponds to (5) in this figure? Here, (1) through (6) indicate the sequence of transactions,
and each of the numbers from (3) to (6) corresponds to an action in a) through d).

Escrow service company

(3) (2) Payment


for purchase
(6) (5)
(4)
Seller Buyer
(1) Agreement of sale

a) Notice of payment deposit b) Notice of product receipt


c) Shipment of product d) Transfer of payment

– 25 –
Q73. Which of the following is an appropriate explanation of HEMS?

a) It is a system that connects multiple home appliances through a network to visualize the
power and perform optimum control of power consumption.
b) It is a system that converts the electricity produced by a solar power generation system
and a residential-use fuel cell for the electricity to be useable in households, etc.
c) It is a system that recycles the useful parts of home appliances discarded by general
households and offices to reduce the amount of waste materials and promote the
effective use of resources.
d) It is an electric hot water supply system that generates a considerable quantity of heat
with a relatively small amount of energy by using a heat pump.

Q74. When real-time systems are classified into hard real-time and soft real-time systems, which
of the following is in the category of a hard real-time system?

a) Airbag control system b) Bank ATM system


c) Seat reservation system d) Web delivery system

Q75. Which of the following is an organizational structure of a corporation that is temporarily


structured by specialists from each department to reach a specific goal over a limited period
and operates independently from all other standing organizations?

a) Company system organization b) Divisional system organization


c) Functional organization d) Project organization

Q76. There are several quality control tools that have been used primarily for manufacturing
and inspection departments. Which of the following is a combined graph containing a bar
graph that shows the numeric values of individual items in descending order, and a line graph
that shows the cumulative total of the composition ratios of these numeric values?

a) Control chart b) Histogram


c) Pareto chart d) Scatter diagram

– 26 –
Q77. In a sampling inspection, which of the following can be used to ascertain the probability
of acceptance of a lot with a certain defective ratio?

a) Bathtub curve b) Gompertz curve


c) Logistic curve d) OC curve

Q78. Which of following is an expression for calculating the cost of goods sold (or cost of sales)
of a manufacturing company?

a) Material cost in current period + Labor cost in current period + Expense in current
period
b) Product inventory at beginning of period + Product manufacturing cost in current period
− Product inventory at end of period
c) Product inventory at beginning of period + Product manufacturing cost in current period
− Work in process inventory at end of period
d) Work in process inventory at beginning of period + Product manufacturing cost in
current period − work in process inventory at end of period

Q79. The break-even point (BEP) is a level where total cost and total revenue are equal. The
table below lists the fixed cost, variable cost per unit, price per unit, and BEP in units.
Which of the following is a value of the price per unit?

Fixed cost ($) 100,000


Variable cost per unit ($) 2
Price per unit ($)
BEP in units 10,000

a) 4 b) 8 c) 12 d) 16

Q80. Which of the following is the intellectual property right that does not require registration
for protection in the World Trade Organization (WTO) member states?

a) Copyright b) Industrial design c) Patent d) Trademark

– 27 –