B1S2 Monthly Test 3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Monthly Test For B1S2 (12 September 2023)

1. Japanese restaurants in London and Japanese restaurants in Paris are to be searched for
together. Which of the following is the logical expression that represents the search condition?
a) (“London” AND “Paris”) AND “Japanese restaurant”
b) (“London” AND “Paris”) OR “Japanese restaurant”
c) (“London” OR “Paris”) AND “Japanese restaurant”
d) (“London” OR “Paris”) OR “Japanese restaurant”
2. When a sound is recorded in a computer file, it is to be stored as a series of 8-bit encoded
data. When the same sound source is sampled at the same sampling frequency and then
encoded as a series of 16-bit data in lieu of 8-bit data, which of the following is an appropriate
explanation concerning this encoding?
a) The amplitude of the sound can be recorded more finely.
b) When the recording time is the same, the amount of data becomes smaller.
c) The CPU load required to process the recorded data decreases.
d) The upper limit of the frequency that can be recorded becomes higher.
3. Which of the following is an appropriate way for extracting data from a stack that stores
multiple data?
a) Data is extracted from an arbitrary location that is specified, regardless of the
sequence that data is stored in.
b) Data that was stored last is extracted first.
c) Data that was stored first is extracted first.
d) Data has a key, and it is extracted according to the priority of the key.
4. There are five (5) lamps arranged in line. Each of them can be turned on and off
independently. How many patterns are there where two (2) or more lamps are turned on? Here,
the pattern where all lamps are turned on is counted as one (1) and the pattern where any one
(1) of them is turned on is counted as five (5).
a) 4 b) 10 c) 26 d) 32
5. There is a standard that can represent data in a hierarchical structure by enclosing data that
corresponds to attribute N with the tags <N> , which means the start, and</N> , which means
the end, and then linking and nesting these tags. Company A decides to comply with this
standard and create a paper by using the structural rules (1) through (3) below. Which of the
following is the appropriate header of a paper named “New Document Management” that is
created by Jack Smith of the Information Systems Department (IS Department) in accordance
with this standard and the structural rules?

1
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.

6. Which of the following is an appropriate description concerning the usage of HTML (Hyper
Text Markup Language) tags?
a) <LABEL>is used to define the title of a web page.
b) <BODY> is used to describe the text of a web page.
c) <BIG>is used to specify the size and style applied to each character in a web page.
d) <FORM>is used to divide a web page into multiple frames.

2
7.

8. Which of the following graphically represents a processing procedure of a program in a visual


way?
a) Gantt chart b) Data flow diagram c) Flowchart d) Radar chart
9. There is a data structure where data that is entered last is retrieved first (hereinafter, stack).
By using this, a device that changes the order of data that is entered from the right side and
sends its output to the left side as shown in the Figure is considered. There are three (3) cases
of operations for this device.
(1) Data that is entered from the right side is sent to the left side as is.
(2) Data that is entered from the right side is added onto the top of the stack.
(3) Data on the top of the stack is retrieved and sent to the left side.
If the data A, B, C, and D is entered sequentially from the right side of the device, which of the
following cannot be an order of the output to the left side with any combination of the operations
(1) through (3)?

3
a) B, A, D, C b) B, D, C, A c) C, B, D, A d) C, D, A, B
10. The response time of an inventory management system that uses a relational database has
recently become slow. An investigation reveals that when the system was initially created, there
was no problem with response time, and after that, insertion and deletion of product data was
repeatedly performed on the database. Which of the following is the most effective way to
improve the response time of the database?
a) Upgrading the CPU of the database server
b) Extending the index area of the database
c) Defragmenting the database
d) Increasing the number of hard disks that store the database
11. Which of the following is the appropriate combination of compression technology standards
for still images, moving images, and audio?

12. Which of the following is a term for commands to a computer that are written in a
programming language?
a) PIN code b) Source code c) Binary code d) Character code
13. A markup language specifies the character color according to the “Syntax and meaning of
the markup language definition section” below. When an element (parent) contains another
element (child), the child inherits the parent’s specifications, but priority is given to the child-
specific specifications if the child and the parent have different values specified for the same
attribute. When the text in the “Example” below is displayed according to this rule, which of the
following is the appropriate display attribute for the underlined character string? Here,
“character string” specifies the character string to be emphasized, for example by using bold
font.

4
[Syntax and meaning of the markup language definition section]
(1) Syntax of the definition section . name{color specification}
(2) Meaning Assigns a color attribute to “name” to display the character string (element)
between and in the specified color.
[Example]
Definition:
. color1{blue}
. color2{red}
Body text: <strong>The role of the system administrator is<color1> to promote the use of
computers and other information technology to end-user departments.<color2> Increased use of
information technology improves the work efficiency of each user, <color2>and can also lead to
operational improvements across the entire organization.</color1></strong>
a) Blue characters, emphasized
b) Red characters, emphasized
c) Blue characters, not emphasized
d) Red characters, not emphasized
14. Which of the following is usually created using HTML?
a) Web browser b) Web page c) Cookie d) SQL program\
15.

16. Which of the following is an appropriate description of a rollback in transaction processing?

5
a) When a transaction attempts to update shared data, it prohibits another transaction
from updating that data.
b) When a transaction has been successfully processed, it commits an update to the
database.
c) When a transaction has not been successfully processed for some reason, it reverts
the database to the state that was present before the transaction was started.
d) It combines multiple tables into one (1) table by using mutually related columns as
keys.
17. In a system environment where several users have access to a database simultaneously, a
new user tries to view a data record while another user is updating the same record. In order to
assure data integrity in such circumstances, which of the following is an appropriate control
method that should be used in the DBMS?
a) Interrupting the updating process to permit the new user to view the record
b) Permitting the new user to view the latest data during the updating process
c) Permitting the new user to view the record after completion of the updating process
d) Canceling the updating process to permit the new user to view the last record
18. Which of the following is an appropriate description concerning the primary key of a
relational database?
a) NULL can be set only in one (1) record to a value of a field selected as a primary key.
b) Any values in a field selected as a primary key cannot be updated.
c) A field selected as a primary key cannot be referenced as the foreign key of another
table.
d) A combination of multiple fields can be selected as a primary key.
19. Sales data is to be managed with tables in a relational database. When the tables for sales
data are designed, which of the following activities analyzes the relationship between the fields
of the tables and decompose the tables so that there are no duplications or inconsistencies in
the data?
a) Join b) Projection c) Normalization d) Exclusive control
20. Which of the following is an appropriate description about association of records for a
relational database?
a) Records in multiple tables are associated at the same row position relative to the first
row in each of the tables.
b) Records in multiple tables are associated through the values of corresponding fields.
c) Records are associated with one another by a pointer that represents the parentage.

6
d) Records are associated with one another by a hash function.
21.

22. There are “Sales”, “Customer” and “Product” tables in a relational database. Among lists A
through C, which of the following contains all and only the lists that can be created from the data
in these tables? Here, a solid underlined part represents a primary key, and a dotted underlined
part represents a foreign key.

A The list of customers who bought more than a certain amount of money during a
certain period in the past
B The list of products that were out of stock in the previous month
C The ranking list for sales amount by product in the previous month
a) A, B b) A, B, C c) A, C d) B, C

7
23. Which of the following effect is obtained by normalizing the tables of a relational database?
a) The number of disk accesses for data update is reduced by compiling frequently used
data in the same table.
b) Data inconsistency due to data update is prevented by eliminating data duplication.
c) The usage efficiency of the main memory is improved by making the size of the tables
uniform.
d) Response time for queries is shortened by reducing the number of tables.
24. When an activity for building a relational database is divided into steps A through C below,
which of the following is an appropriate order of the steps?
A - Identifying the data items to be used in the business operation
B - Creating tables
C - Inserting records

25. Which of the following is a purpose of using a database management system?


a) To enable users to access data even when there is no OS available
b) To eliminate the need for backups created in preparation for disk failures
c) To encrypt data to be transmitted over a network
d) To enable multiple users to share information while maintaining data integrity
26. There is a system for entering and managing orders from customers. Sequential order
number is printed on each order form in the order of arrival unless the form has any mistakes
such as missing information. Before the order form shown below is entered into the system,
which of the following should be checked so as not to enter duplicated order data?

27. Employee information is managed by creating two tables “Emp” for employees and “Dept”
for Departments in a relational database. Which of the following is an appropriate combination
of the primary key(s) and foreign key(s) that are set in the “Emp” table and the “Dept” table as
needed? Here, any employee always belongs to a department that exists in the “Dept” table,

8
and when the employee data is added or updated, the referential constraints are used to ensure
consistency.

28. There are three tables “Supplier” table, “Purchase_details” table, and “Product” table that
are managed by using a relational database. When a new product is purchased from a new
supplier, which of the following is the appropriate sequence of inserting data into the tables?
Here, an underline indicates a primary key, and a dotted underline indicates a foreign key. An
arrow (→) in the answer group represents the sequence of the tables into which data is
inserted.

a) “Product” table → “Supplier” table → “Purchase_details” table


b) “Purchase_details” table → “Product” table → “Supplier” table

9
c) “Supplier” table → “Product” table → “Purchase_details” table
d) “Supplier” table → “Purchase_details” table → “Product” table
29. Which of the following is the combination of conditions that can retrieve only three
employees including “Tom Cruise” from the “Employee” table managed in a relational database?

a) (1) AND (2) AND (3)


b) ((1) AND (2)) OR (3)
c) (1) OR ((2) AND (3))
d) (1) OR (2) OR (3)
30. Which of the following is an appropriate explanation and application example of an E-R
diagram?
a) It is a diagram describing the state transition and conditions; for example, it can be
used to describe the specifications of a communication protocol.
b) It is a diagram representing sequence, selection, and iteration structures by
combining them; for example, it can be used to describe the flow of a program.
c) It is a diagram representing the relationships between entities; for example, it can be
used to represent the relationships between the tables of a relational database.

10
d) It is a diagram showing the sequence of activities and the work period; for example, it
can be used to perform schedule management of system development.
31. You are the project manager for a software development project to build a complex financial
management system for a large financial institution. The project has well-defined requirements
that are not expected to change, and it involves multiple teams working on different components
of the system. The project has a strict deadline, and it's crucial to minimize risks and ensure
thorough documentation throughout the project's lifecycle. Which project management approach
is most suitable for the software development project described in the case study?
A) Agile
B) Prototype
C) Waterfall
D) Spiral

32.You are the project manager for a mobile app development project. The client has provided
initial requirements but is not entirely sure about the user interface design and some specific
features. The client wants to see a working prototype of the app before finalizing the
requirements. The project has a tight timeline, and the client values quick iterations and
feedback. Which project management approach is most suitable for the mobile app
development project described in the case study?
A) Waterfall
B) Scrum
C) Prototyping
D) Lean

33.Which of the following is the development model where a trial model or a pilot unit is
developed at an early stage of system development so that users can verify their requirements
in a tangible manner?
a) Growth model
b) Incremental model
c) Spiral model
d) Prototyping model

34.Which of the following is an appropriate approach to performing maintenance work for


hardware?

11
a) Maintenance work should be planned and performed only after diagnostic and predictive
information, such as warning indicator or error log, is provided.
b) Maintenance work should be performed on a scheduled basis even when there is no fault or
failure detected.
c) Maintenance work should be suspended until the next periodical inspection even when a
sensuous change such as “operation noise louder than usual” is detected.
d) Maintenance work is required only for printers and storage devices that involve mechanical
operations.

35.Which of the following is the most appropriate design policy for an output form?
a) The numeric items and the character items are classified into different groups, and each
group is separately placed on the top and bottom or left and right of the form.
b) In order to ensure consistency between forms, rules regarding the form design, such as the
title position and the layout of data items, are predetermined.
c) All data items, including both numeric and character items, are printed with eitherright or left
justification.
d) The data items are arranged so that the program can be understood and maintained as
easily and simply as possible.

36.A test in system development often adopts a build-up approach where tests are performed
incrementally from a smaller to a larger unit. On such an occasion, which of the following is the
appropriate test sequence?
a) System test → integration test → unit test
b) System test → unit test → integration test
c) Unit test → integration test → system test
d) Unit test → system test → integration test

37.A client application for a mission-critical business system, which was built by the information
systems department, displayed an error message on the screen and stopped. Which of the
following is the most appropriate action to be taken by the user in this situation?
a) Restarting the PC, and then notifying the information systems department that a failure
occurred
b) Trying to resolve the problem on one’s own, on the basis of the error message or other
information

12
c) Checking the error message with the user manual, and deciding if the failure can be resolved
by self, or if the information systems department should be consulted
d) Notifying other PC-based clients about the occurrence of the failure, and asking sthem to
stop operations in progress

38. Which of the following is an appropriate explanation of software maintenance?


a) During system development, each program that has been created on the basis of the detailed
design is verified and corrected as appropriate if any error is detected.
b) Programs are corrected or revised for the purpose of the stable system operations and the
catch up with the development of information technology and changes in business strategy.
c) When a question is asked by a system user, the question is recorded and transferred to the
appropriate department, and the final response is recorded.
d) From a wide range of perspectives, the system including software is evaluated, and it is
determined whether or not the system is contributing to the business operations.

39.When system development progresses in the sequence of system requirements definition,


external design, internal design, and programming, which of the following is the most
appropriate phase for defining the layout of screens and the format of forms?
a) External design
b) Internal design
c) Programming
d) System requirements definition

40.Among a series of tests of software, which of the following is implemented mainly by


the user who orders the development of the software?
a) Acceptance test
b) Integration test
c) System test
d) Unit test

41. Software development models include the waterfall model, spiral model, prototyping model,
and RAD, etc. Which of the following is the most appropriate explanation of the waterfall model?
a) After all activities in each phase in the development are complete, the project proceeds to the
next phase.

13
b) The functions to be developed are divided, and each function is efficiently and swiftly
developed with the use of development tools and parts.
c) At an early phase in software development, working sample software is created that enables
users to visually confirm requirements.
d) The functions of software are divided, and the software is gradually completed through
repeated design and development for each function so that feedback from users can be
incorporated.

42. At the beginning phase of a new personnel system development project, in order to clarify
the risks, the persons in charge of the planning department, personnel department, and
information systems department, who act as the project team members, get together and make
a list of the risks that they can think of concerning the project. What is such a method called?
a) Walk-through
b) Critical path method
c) Simulation
d) Brainstorming

43. Among the measures A through C for risk treatment to be considered when a new product
is developed, which of the following is the list that contains all and only appropriate measures
for reducing quality-related risks?
A: Developing the product by using proven technology
B: Purchasing insurance against development delays
C: Creating a prototype of the product
a) A, B
b) A, C
c) A, B, C
d) B, C

44. Which of the following is an appropriate description concerning decomposition that is


performed to create the WBS of a system development project?
a) It is desirable that decomposition be performed up to the level that the cost and time
required to create development deliverables can be estimated and manageable.
b) When system development is outsourced, the customer should entrust all decomposition
of deliverables to the developer that creates the deliverables.

14
c) Since a project’s progress report meetings are a means of communication, they are not
subject to decomposition.
d) If the developer has some experiences in developing similar systems, the developer does
not need to perform decomposition again.

45. After the start of a project, the scope is defined by collecting the requirements for the
project. Which of the following is the most appropriate purpose of defining the scope?
a) To clarify the activities to be implemented in the project
b) To create the action plan against the risk that has been realized in the project
c) To create an action plan for the delay of the project
d) To clarify the objectives of the project

46. A system development project at a company is starting to become delayed. In order to


resolve the delay, the project leader proposes to project members that part of the planned work
procedure be omitted. The opinion of the project members is divided into those who think that
this cannot be avoided and those who are opposed because the quality will decrease. From the
perspective of ensuring quality in a project, which of the following is the most appropriate action
for a project leader to take?
a) Discussing detailed measures against decrease in quality within the project, and building
consensus as a project
b) Deciding whether to accept or reject a proposal with a majority decision by highly skilled
people from among the project members
c) Adopting the project leader’s proposal because the project leader has the most experience
d) Replacing project members who cannot agree with the project leader’s proposal

47. When the management of a project is divided into progress management, quality
management, and cost management, which of the following is most appropriate to be checked
in progress management?
a) Whether an integration test is conducted exhaustively from a variety of viewpoints
b) The degree of an increase in cost in the future
c) The degree of the impact on the entire schedule by a delay in an activity
d) Whether a procedure has been established for a design review for finding defects in the
design

15
48. There is a project with a development period of 10 months and a labor cost budget for
development of 10 million yen. After the elapse of five (5) months, the actual labor cost is
recorded as 6 million yen, and 40% of the deliverables is complete. If the development is
continued till completion with the same productivity, how much will the excess of the budget
for labor cost be?
a) 1 million yen
b) 2 million yen
c) 2.5 million yen
d) 5 million yen

49.Which of the following scenarios is most suitable for conducting penetration testing on your
e-commerce website?
A) After the website goes live and is available to the public.
B) During the initial development phase before launching the website.
C) Once a month, as part of a routine maintenance schedule.
D) After implementing all security measures to confirm their effectiveness.

50.You are the project manager for a construction project to build a new office building for a
client. The project has a strict deadline due to the client's business expansion plans. The scope
of work, budget, and resources are well-defined, and the project involves various tasks that
need to be completed in a specific sequence. During the project planning phase, you identify
that some tasks can be performed concurrently to expedite the project's completion. Which
project time management technique should you employ to ensure the project is completed on
time?
A) Critical Path Method (CPM)
B) Resource Leveling
C) Fast Tracking
D) Earned Value Management (EVM)

51.Which of the following is a process of IT service management that proactively identifies and
analyzes the root cause of an incident and also manages problems to closure?
a) Incident management
b) Change management

16
c) Problem management
d) Release management

52.Which of the following is the framework that describes a collection of best practices of IT
service management?
a) ISO 14001 b) ISO 27001 c) ITIL d) PMBOK

53.Which of the following is the most appropriate example of a project?


a) Performing the periodic or schedule-based inspection of the ATM in a bank
b) Creating a monthly report concerning actual production results in a factory
c) Increasing the purchase volume of popular or best-selling products in a shop
d) Developing a new large-scale online system in a software house

54. In IT service management, which of the following is an appropriate explanation concerning


SLA and SLM?
a) SLA is a proposal for improving services that are presented by the service provider, and SLM
is an activity for providing technical means to perform the maintenance management of service
levels.
b) SLA is an agreement on service levels between the service provider and the users, and SLM
is an activity for the maintenance and improvement of the quality of IT services.
c) SLA defines the activities for measuring the degree of achievement of service levels and
identifying problems, and SLM defines the technical means for resolving problems.
d) SLA aims at delivering a higher level of services, and SLM aims at providing a common
understanding of service contents, required service levels, and other service factors.

55. In a company’s accounting department, a new financial accounting package is to be used,


and a new server with the package installed is delivered from a vendor. Operations
management of the new server is performed by the information systems department. Among the
items A through D described below about what should be agreed between the accounting
department as the user department and the information systems department as the operations
department from the point of view of service levels, which of the following is the list that contains
all of the appropriate items?
A: The operating hours available for the financial accounting package
B: The cost sharing between both departments for purchasing the new server

17
C: The items to be tested when the new server is received from the vendor
D: The scope and frequency of data backup
a) A b) A, B c) A, D d) C, D

56. The table below shows the evaluated scores of the proposals of four (4) vendors from the
viewpoints of management, technology, and price. When each score of the management
viewpoint, technology viewpoint, and price viewpoint is weighted, and the vendor with the
highest total score is selected as the supplier, which of the following vendors is selected?

a) Vendor A b) Vendor B c) Vendor C d) Vendor D

57. A person wishes to start at point X, pass through all of points A, B, and C, and arrive at point
Y. When the routes and the required times between points are as shown in the figure and the
table, what is the shortest time in minutes from point X to point Y? Here, the points A, B, and C
may be passed through in any order.

18
a) 110 b) 130 c) 140 d) 150
58. A certain product’s sales plan and sales result are shown in the table below. What is the
ratio in percentage of the profit result to the profit plan? Here, the decimal fractions of the
ratio are truncated.

a) 77 b) 99 c) 110 d) 129

19
59. Company X summarized the results of positioning analysis of its marketing power in relation
to competitors into the table as shown below. In the table, “1” is the lowest score, and “5” is the
highest score. Where does Company X rank from the top?

a) 1 b) 2 c) 3 d) 4

60. The operating profit when the sales quantity of a product is 700 units is as shown in the
table below. When the unit sales price is reduced by 20% to expand sales, the sales quantity
increases by 20%. How much, in yen, is the operating profit at this time? Here, the variable cost
per one (1) unit of the product does not change.

a) 200,000 b) 204,000 c) 260,000 d) 320,000

61. Which of the following refers to a technique by which several persons come together and
give their ideas freely with prioritizing quantity over quality of ideas without criticizing each other
so as to solve a problem?
a) Brainstorming b) Benchmarking

20
c) Role playing d) Work design

62. Which of the following is the scope that the CFO, one of the positions involved in corporate
management, bears responsibility for?
a) Technology b) Finance c) Information d) Personnel
63. Among the phases of the PDCA cycle in corporate business operations, which of the
following measures and evaluates the status of execution of operations on the basis of KPI?
a) P b) D c) C d) A

64. Retail company A is teaching the general distribution process for food products in an easily
understandable manner at elementary schools near the company’s distribution center. Which of
the following is an idea behind these activities by company A?
a) CSR b) Alliance c) Core competence d) Corporate governance

65. Which of the following is an expression that calculates operating profit?


a) (Gross profit) − (Selling, general, and administrative expense)
b) (Sales) − (Cost of sales)
c) (Current profits) + (Extraordinary profit) − (Extraordinary loss)
d) (Current net profit before tax) − (Corporate tax, residential tax, and business tax)

66. Which of the following is an appropriate example of an initiative based on the Green IT
concept?
a) Use of displays that reduce eye fatigue from blue LED light
b) Installation of air shower at the server room entrance and exit
c) Construction of backup systems in preparation for disasters
d) Setting a policy of viewing materials on PC screens, limiting their printing on paper

67. Which of the following is an example of a Non-Disclosure Agreement (NDA)?


a) A contract specifying the service content to be provided, which is agreed between the service
provider and the customer before the provision of the IT service
b) A contract specifying that the vendor of computer equipment bears the responsibility of
transferring the property right, and that the buyer bears the responsibility of paying the charges.
c) A contract, specifying the obligation of the outsourcer and outsourcee to maintain

21
confidentiality of the secret information of a party that becomes known to the other party during
system development
d) A contract specifying that an outsourcee to whom the installation of a generalpurpose
software package has been outsourced performs the task at the outsourcee’s own discretion
and responsibility, and receives payment upon the completion of the task

68. Which of the following is appropriate as an expected advantage of the adoption of ISO 9001
by companies?
a) The companies' trade procedures will be standardized, leading to increased efficiency and
the avoidance of non-tariff barriers.
b) Technical specifications will be standardized in the industry, and increase in product quality
and expansion of markets will move forward.
c) Methods for handling information assets will be standardized and the quality of information
security will increase.
d) Business operations concerning quality management will be standardized, and the quality
and efficiency of management will increase.

69. In Company X, the experience and know-how of employees who have managed drainage
treatment in the facility over a long period of time is documented and accumulated, and the
accumulated experience and know-how is utilized on daily drainage treatment activities and
design of new processing equipment. Which of the following is appropriate as a concept of this
example?
a) ERP b) SFA c) Supply chain management d) Knowledge
management

70. Which of the following is a technique that analyzes the value of a product or service through
the relationship between functionality and cost, and enhances that value through reduction in
cost and increase in functionality and quality?
a) Supply chain management
b) Knowledge management
c) Value engineering
d) Reverse engineering

22
71. As a method for a company to utilize the business resources of another company, there is a
corporate acquisition and a corporate alliance. Which of the following lists all and only the
general demerits of a corporate alliance in comparison with a corporate acquisition? I It is
required to reform the other company’s organization or business process. II The participation in
decision making of the other company regarding the utilization of business resources is limited.
III The required investment is large and has an impact on the financial status.
a) I b) I, II, III c) I, III d) II

72. Which of the following is an appropriate explanation of 3C analysis that is used to analyze a
business environment?
a) The analysis is performed from the three (3) perspectives of the customers, the competitors,
and the company.
b) The analysis is performed from the three (3) perspectives of last purchase date, purchase
frequency, and purchase amount.
c) The analysis is performed by decomposition into the three (3) elements of era, age, and
generation.
d) The analysis is performed by categorization into three (3) groups in descending order of total
sales.

73. Which of the following often uses a chart with relative market share for the horizontal axis
and market growth rate for the vertical axis, and analyzes the strategic positioning of a
company’s products or business?
a) ABC analysis b) PPM c) SWOT analysis d) Value chain
analysis

74. Which of the following is an appropriate purpose of Management Of Technology (MOT)?


a) To improve the productivity by using mathematics and natural science in business
administration and production management
b) To grow a company by effectively connecting technical innovation with the business of the
company
c) To improve the quality of a company by ensuring that the employees put in efforts
systematically to improve the quality of products
d) To improve the business process efficiency by acquiring the necessary techniques and
knowledge from senior employees through actual business operations at the workplace

23
75. Which of the following is a business objective that becomes possible to achieve with “the
introduction of a POS system”?
a) Improvement in the work productivity of salespersons and organizational strength of the sales
department
b) Reduction in inventory volume of component parts and partly finished goods
c) Optimization of the series of processes from procurement to manufacturing, shipment, and
sales
d) Improvement in the product lineup at each store and streamlining of ordering and inventory
control

76. Which of the following is an appropriate explanation concerning a deadlock?


a) It is a state in which the processes of a computer are prohibited from getting intentional or
accidental access to information that usually must not be accessed.
b) It is a state in which, if the authentication of a user fails more than the limited number of
times, the user is prohibited from accessing the computer.
c) It is a state in which, when shared resources are exclusively used, two or more processes are
endlessly waiting for each other to release the lock of a shared resource.
d) It is a state in which processes in the ready state under a multi-programming environment
have used up the CPU time allocated by the OS.

77.There is a system where a full backup is made after closing time every Sunday, and an
incremental backup is made after closing time on Monday through Saturday. On a Wednesday,a
failure happened during business hours, so a decision was made to restore data to the state at
the time of closing on Tuesday by using backup files. Which of the following lists all the
necessary
backup files for restoring data? Here, an incremental backup file means a backup file that
contains only the data that has been modified since the previous backup file (a full backup file or
an incremental backup file) was made.

a) A full backup file on Sunday, incremental backup files on Monday and Tuesday
b) Afull backup file on Sunday, an incremental backup file on Tuesday
c) Incremental backup files on Monday and Tuesday
d) An incremental backup file on Tuesday

24
78.If data is repeatedly added to and deleted from a hard disk on a PC, data may not be stored
in consecutive areas on the hard disk. When no measures are taken, which of the following can
occur?
a) Viruses cannot be detected.
b) Data cannot be written correctly.
c) Data cannot be read correctly.
d) Stored data cannot be read quickly.

79.Which of the following is an appropriate concept of universal design?


a) Ensuring that, once a product is designed, the design remains usable without being changed
for a long period of time
b) Ensuring that products keep the same levels of performance and quality regardless of where
they are manufactured in the world
c) Making the design as simple and easy as possible in order to reduce the manufacturing cost
d) Making products usable to many people regardless of differences in age, culture, and ability
as well as whether disability is present

80. Which of the following is an appropriate description concerning the characteristics of video
distribution using streaming?
a) The data to be distributed must be stored on the server beforehand, and videos of events and
sports cannot be distributed while they are being shot.
b) Deterioration in video quality due to partial loss of data in reception can be completely
eliminated.
c) Warm-up time is not required for starting playback of a video, and therefore, the viewer can
immediately start watching the video.
d) Rather than waiting for the entire video data to be downloaded, playback starts as soon as
some data has been received.

81.Which of the following is an appropriate description concerning machine language?


a) A program that is written in Fortran or C is converted into machine language and then
executed.
b) Machine language is a high-level language.
c) Machine language expresses a program with sequences of decimal numbers.

25
d) Most of application software is still programmed in machine language.

82. There is a system where two units of the same device with availability of 0.9 are connected
in series. When one (1) more unit of the same device is
added so that three (3) units of the device are connected in series in the system, which of the
following is the appropriate description
of the availability of the entire system, when the system with two units of the device in series is a
reference point?
a) It increases by 10%.
b) It remains unchanged.
c) It decreases by 10%.
d) It decreases by 30%.

83. Which of the following is a term that means the validation of a software license by using the
product ID and the user’s hardware information,
in order to prevent unauthorized use of the software?
a) Activation
b) Cloud computing
c) Streaming
d) Fragmentation

84. Which of the following is the description of a 3D printer?


a) It prints an image with a 3D effect on a flat surface.
b) It uses three-dimensional data to form a stereoscopic (three-dimensional) object.
c) It prints an image on a curved surface of a stereoscopic (three-dimensional) object.
d) It uses a laser to display a stereoscopic image in space.

85.Which of the following is the appropriate reason for using a style sheet in the creation of a
website?
a) The data between the web server and the web browser can be exchanged in a safe manner.
b) The users can be notified of update to the website.
c) The users of the website can be identified.
d) The appearance of multiple web pages can be easily unified.

26
86. Which of the following is an appropriate combination of the protocols that are used for
transmitting and receiving e-mail as shown in the diagram below?

87. Which of the following is placed between an internal network and an external network in
order to prevent unauthorized access from the external network to the internal network?
a) DHCP server b) Search engine
c) Switching hub d) Firewall

87. Which of the following is an appropriate effect of replacing IPv4 with IPv6?
a) Problems no longer occur when two or more devices that can be accessed directly from the
Internet have the same IP address.
b) The shortage of IP addresses that can be used on the Internet is resolved.
c) It becomes possible to use optical fibers for connecting to the Internet.
d) The communication speed on the Internet is increased.

88. Which of the following is a mechanism by which, if an e-mail is sent to a specific e-mail
address, the e-mail with the same content is distributed to multiple e-mail addresses that have
been registered to the specific address?
a) Web mail b) Chain mail c) Mailing list d) Reply mail

27
89. Among the cases of communication between PCs, servers, communication devices,
printers, and other devices, which of the following needs to use a WAN?
a) Multiple PCs and a file server are connected to a LAN in Osaka branch office, and files stored
in the file server are made to be accessible from any PC connected to the LAN.
b) Inside a house, a PC and a printer are connected with Bluetooth, and documents created on
the PC are printed on the printer.
c) Inside a server room, a PC and a web server are connected to a hub, and the web server is
maintained from the PC.
d) A PC connected to the LAN in Kyoto-City sales office accesses the server in Tokyo head
office and uploads sales information.

90. Which of the following is an appropriate explanation of a keylogger that is a threat to


information security?
a) Stealing information by watching the keyboard input and the display output from behind a PC
user
b) Monitoring and recording the keyboard input on a user’s PC
c) Identifying a password by using a dictionary of the words that are likely to be used as
passwords
d) Searching for a access point that allows unauthorized access by moving around a town with
a PC that can detect the electromagnetic waves of a wireless LAN

91. Which of the following is the most appropriate explanation of phishing?


a) A computer infected with a virus is controlled without owner’s consent from an external
location via a network such as the Internet by the functions of the virus.
b) A false e-mail is sent, in order to lead the recipient to a fake website or to an imitation of an
existing website, and then to illegally obtain personal information.
c) When user’s data sent to a website is displayed as is, its vulnerabilitiy is exploited in order to
embed in a page a malicious script that illegally obtains the information about user who
displayes the page.
d) A resident program is placed on a PC without the knowledge of the users in order to illegally
obtain data in files or information about PC operations.

92. Which of the following is a form of direct damage to a server that is caused by a DoS
attack?

28
a) The encrypted data on the server is decrypted.
b) The administrator password of the server is changed.
c) The server is infected by a virus.
d) The services of a server are interrupted.

93. Among the countermeasures A through D concerning information security, which of the
following is the list that contains all and only the appropriate countermeasures for virus
infections? A: Installing antivirus software
B: Applying a security patch (i.e., update module)
C: Setting a password for the hard disk
D: Encrypting files
a) A, B b) A, B, C c) A, D d) B, C

94. Among the descriptions A through C concerning PKI, which of the following is the list that
contains all and only the appropriate descriptions concerning a digital signature in email? A The
recipient can check whether the sender is the intended person. B It is possible to prevent e-mail
from being read before it reaches the recipient. C The recipient can confirm that the e-mail has
not been tampered with.
a) A, B b) A, C c) B, C d) A, B, C
95. Which of the following is the general name for evil-minded software such as a key logger or
worm?
a) Shareware b) Firmware c) Malware d) Middleware

96. In the description below concerning risk management in information security, which of the
following is an appropriate combination of words or phrases to be inserted into the blanks A
through C?

29
97. IDs and passwords are leaked from the first website, and the users of this website suffer
from a password list attack on the second website. In this case, which of the following is the
problem concerning the IDs and passwords for the second website?
a) The ID and password are sent via unencrypted communication.
b) The same IDs and passwords as the first website are set.
c) Password are set with a combination of a small variety of characters.
d) Short passwords are set.

98. Among the types of authentication I through IV, which of the following is a list that contains
all and only biometrics authentication?
I PIN (Personal Identification Number)
II Iris
III Fingerprint
IV Vein
a) I, II, III b) II, III c) II, III, IV d) IV

99. When information security management is based on the PDCA cycle, which of the following
corresponds to C?
a) The objectives, processes, and procedures for information security are established.
b) Improvement is made through corrective and preventive actions on the basis of an
evaluation.
c) Processes and procedures are introduced and operated.

30
d) Effectiveness of the processes are measured and evaluated.

100. Which of the following is a protocol that is used for encrypted HTTPS communication
between a web server and a web browser?
a) SEO b) SPEC c) SQL d) TLS

S1B2 C++
1.Write a C++ program ATM class.
Member data int cousid
string cousname'
double balance
int password
Member function getdata()
withdraw()
balance()
showdata()
Create objects for two mamber. (30 marks)

31

You might also like