0% found this document useful (0 votes)
72 views28 pages

2018S FE AM Question

Uploaded by

Pham Tien Thanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views28 pages

2018S FE AM Question

Uploaded by

Pham Tien Thanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

March 2018

(1)
Fundamental IT Engineer Examination (Morning)

Questions must be answered in accordance with the following:

Question Nos. Q1 - Q80


Question Selection All questions are compulsory.
Examination Time 9:30 - 12:00 (150 minutes)

Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely
and neatly. Wipe away any eraser debris.

2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.

[Sample Question]
Q1. In which month is the spring Fundamental IT Engineer Examination conducted
in 2018?

a) February b) March c) April d) May

Since the correct answer is “b)” (March), mark your answer sheet as follows:

[Sample Answer]
Q1

Do not open the exam booklet until instructed to do so.


Inquiries about the exam questions will not be answered.

– 1 –
Symbols commonly used in questions

Unless otherwise noted in each question, the following notational conventions are applied as
shown in the tables.

Logic Circuit

Graphic symbol Explanation

AND gate

NAND gate

OR gate

NOR gate

Exclusive OR (XOR) gate

Exclusive NOR gate

Buffer

NOT gate

Three-state buffer (or tri-state buffer)

Note: A small circle or “bubble” on either the input or the output


terminal shows inversion or negation of the logic state.

Company names or product names mentioned in the examination questions are the trademarks or
registered trademarks of their respective companies or organizations. The symbol ® or ™ is not used
within.

– 2 –
Q1. There is a register where an integer value is stored in binary. Let x be a positive integer
which is stored into the register, then perform the operations below.

(1) Shift the content of the register to the left by 2 bits


(2) Add x to the register.

How many times larger than the integer x is the content of the register?

a) 3 b) 4 c) 5 d) 6

Q2. When three sets A, B and C are given, which of the following equalities holds? Here, 
and  are union and intersection symbols, respectively.

a) (A  B )  (A  C ) = B  (A  C)
b) ( A  B )  C = (A  C )  ( B  C )
c) (A  C )  (B  A) = (A  B)  (B  C)
d) (A  C )  (B  C) = (A  B)  C

Q3. For two logical variables X and Y, a logical operation X NAND Y is defined as a composite
operation NOT (X AND Y) . Which of the following is equivalent to the logical operation
X OR Y ?

a) ((X NAND Y) NAND X) NAND Y


b) (X NAND X) NAND (Y NAND Y)
c) (X NAND Y) NAND (X NAND Y)
d) X NAND (Y NAND (X NAND Y))

Q4. Which of the following bit strings is accepted by the automaton described in the state
transition diagram below? Here, each string is processed one bit at a time in sequence from
the left.

0 1 0, 1

1 0

a) 0000 b) 0111 c) 1010 d) 1111

– 3 –
Q5. Which of the following is a binary search tree whose keys are numbers assigned to nodes in
natural order?

a) 16 b) 17

15 19 14 19

10 14 10 16 18

c) 18 d) 20

16 19 18 19

15 14 20 10 14 15 16

Q6. There is a two-dimensional integer array A whose (i, j)-th element A[i, j] is 2 × i + j. What
is the value of the element A[A[1, 1] × 2, A[2, 2] + 1]?

a) 12 b) 13 c) 18 d) 19

Q7. Function F(n) is a recursively defined integer function that calculates the factorial of n for
any non-negative integer n. Which of the following is an appropriate expression for the
blank A?

F(0) = 1
F(n) = A (if n > 0)

a) n + F(n - 1) b) n - 1 + F(n)
c) n × F(n - 1) d) (n - 1) × F(n)

– 4 –
Q8. What is the result of the procedure in the flowchart below, when x and y are positive
integers?

Start

s←0
t ←x

Yes
t< y
No
t←t–y End
s←s+1

Value of s Value of t
a) Remainder of x ÷ y Quotient of x ÷ y
b) Quotient of x ÷ y Remainder of x ÷ y
c) Remainder of y ÷ x Quotient of y ÷ x
d) Quotient of y ÷ x Remainder of y ÷ x

Q9. Which of the following addressing modes determines the effective address by adding the
value of the instruction address register (program counter) to the value recorded in the
address part of the instruction?

a) Absolute addressing b) Base addressing


c) Indexed addressing d) Relative addressing

Q10. A computer has two levels of memories, cache memory and main memory, with an
access time of 0.01 µs and 0.1 µs respectively. If the hit ratio of the cache memory is 90%,
which of the following is the appropriate average memory access time for this system? In this
scenario, if the data is in the cache memory, the processor accesses the data directly with an
access time of 0.01 µs. However, if a cache miss occurs, the data is required to be transferred
from the main memory to the cache memory first, and then subsequently accessed from the
cache memory. Thus, the access time becomes 0.11 µs.

a) 0.011 µs b) 0.019 µs c) 0.020 µs d) 0.091 µs

– 5 –
Q11. Which of the following is an output device for the computer?

a) Camera b) Mouse c) Printer d) Scanner

Q12. What is the average rotational latency of a hard disk drive in milliseconds when its
rotation speed is 2000 rotations per minute?

a) 10 b) 15
c) 25 d) 30

Q13. Which of the following is a method that increases the speed of data input/output by
dividing logically sequential data and writing the divided data into multiple hard disks?

a) Disk cache b) Mirroring


c) Striping d) Swapping

Q14. Which of the following is a characteristic of a HA (High Availability) cluster


configuration based on a hot standby method when it is compared to a load distribution
cluster configuration that uses a load balancer?

a) A server that has the same specifications is necessary as a secondary server, but since
processes are taken over by the secondary server in the event of the primary failure, the
throughput can be maintained even in the event of a failure.
b) Given that processes are distributed to other servers in operation in the event of a
failure, the load of servers in operation increases and the throughput decreases.
c) Given that processes can be distributed uniformly, server machines can be utilized
effectively and expandability is ensured even if the amount of processing increases in
the future.
d) Given that processes must be consistent among multiple servers in operation, it is
necessary to share a database.

– 6 –
Q15. Which of the following is an appropriate description concerning system availability?

a) Even if the MTBF is different, the system availability is equal if the MTTR is equal.
b) If the MTTR can be shortened without changing the MTBF, the system availability
improves.
c) If the MTTR does not change and the MTBF increases, the system availability
deteriorates.
d) If the sum of the MTBF and the MTTR is equal, the system availability is equal.

Q16. Which of the following is a page fault in a virtual memory system?

a) An access to a page that is mapped in the virtual memory, but not loaded in the
physical memory
b) A hardware error in the physical memory
c) A program attempting to insert more data than it can hold in the physical memory
d) A reference to a page that another program is currently using in the virtual memory

Q17. In a direct organization file that has a range of storage addresses one (1) through six (6),
the data is stored under the conditions below. Which of the following is the key value of the
data that is stored in address one (1)?

[Conditions]
(1) Data is stored in the order of key values three (3), four (4), eight (8), 13, 14, and 18.
(2) The storage address is the value that is the remainder obtained by dividing the key
value of data by five (5) and then adding one (1) to it.
(3) If the storage address is already occupied, the data is stored in the next address. This
process is repeated until the data is stored. The next address of the last address is the
first address.
(4) In the initial status, nothing is stored in the file.

a) 8 b) 13 c) 14 d) 18

– 7 –
Q18. Which of the following is classified as a function of a static test tool?

a) Calculating the coverage from the paths executed by the test


b) Detecting an error in a program by analyzing the source code
c) Generating a driver or stub necessary for the module to be tested
d) Generating the data to test a specific path of the program

Q19. For a multiprogramming switching procedure of processes shown in the figure below,
which of the following is an appropriate combination of OS processing for A through C?

State of process I OS processing State of process II


Running
Interrupt state

A
Ready
state
B
Ready
state C

Running
state

A B C
Restoration of the running Saving of the running
a) Selection of the process
state state
Restoration of the running
b) Saving of the running state Selection of the process
state
Restoration of the running
c) Saving of the running state Selection of the process
state
Restoration of the running Saving of the running
d) Selection of the process
state state

– 8 –
Q20. Which of the following is the appropriate function of a linker?

a) Creating a load module from multiple object modules, etc. by performing operations
such as cross-reference resolution
b) Loading a load module into main memory before execution
c) Monitoring program execution and logging the execution result for each step
d) Registering a created program to a library

Q21. A D/A converter with a resolution of 8 bits generates an output voltage of 0 volts for a
digital input value of 0, and an output voltage of 2.5 volts for a digital input value of 128.
When the lowest 1 bit of the digital input value is changed, which of the following is the
change (in volts) of the output voltage that is generated by the D/A converter?

a) 2.5/128 b) 2.5/255
c) 2.5/256 d) 2.5/512

Q22. The half adder in the diagram below adds two (2) single-digit binary numbers x and y,
and produces z (the first digit of the sum) and c (the carry bit) as output. Which of the
following is the appropriate combination of gate devices A and B?

x z (First digit of the sum)


y A

B c (Carry bit)

A B

a) Exclusive logical sum (XOR) Logical product (AND)

b) Logical product (AND) Logical sum (OR)

c) Negative logical product (NAND) Negative logical sum (NOR)

d) Negative logical sum (NOR) Exclusive logical sum (XOR)

– 9 –
Q23. Which of the following is equivalent to the logic circuit shown below?

a) b)

c) d)

Q24. When ordering data in the format below is entered, which of the following is an
appropriate check to examine whether the value of the Order date field is on a business day
equal to or prior to the entering date?

Ordering data
Form number Order date Product code Quantity Customer code
(Characters) (Characters) (Characters) (Numbers) (Characters)

a) Sequence check b) Duplication check


c) Format check d) Logical check

Q25. Which of the following is a process in PCM to capture analog values from audio
signals at a regular interval?

a) Encoding b) Reverse quantization c) Quantization d) Sampling

– 10 –
Q26. Which of the following properties of database transactions refers to the ability of the
system to recover a committed transaction when either the system or the storage media
fails?

a) Atomicity b) Consistency
c) Durability d) Isolation

Q27. There is a “Delivery” table that has six (6) records. Which of the following is the
functional dependency that is satisfied by this table? Here, “X → Y” indicates that X
functionally determines Y.

Delivery
Delivery_ Department_ Department_ Delivery_ Component_ Quantity
date ID name destination ID
2016-08-21 300 Production Chicago 1342 300
department 2 office
2016-08-21 300 Production Chicago 1342 300
department 2 office
2016-08-25 400 Production Boston 2346 300
department 1 factory
2016-08-25 400 Production Boston 2346 1,000
department 1 factory
2016-08-30 500 Research and Boston 2346 30
development factory
department
2016-08-30 500 Research and New York 1342 30
development office
department

a) Delivery_date → Component_ID
b) Delivery_destination → Component_ID
c) Department_ID → Component_ID
d) Department_name → Delivery_destination

– 11 –
Q28. Which of the following methods to join two (2) tables in an RDBMS is a description of
the sort-merge join method?

a) All rows in the tables are re-ordered according to the values in the column to be joined,
and they are joined in order from the top.
b) If a column to be joined in one of the tables is included in the index, the column to be
joined in the other table and the index value are used to join the tables.
c) The values in a column to be joined in one of the tables are extracted in order, and they
are joined with the column to be joined from the other table.
d) The values in a column to be joined in one of the tables are used to create a hash table,
and this is joined with the column to be joined from the other table.

Q29. When the SQL statement shown below is executed on the “Employee” table and the
“Department” table, which of the following is the result?

SELECT COUNT(*) FROM Employee, Department


WHERE Employee.Department = Department.Department_name AND
Department.Floor = 2

Employee Department
Employee_number Department Department_name Floor
11001 Administration Planning 1
11002 Accounting Administration 1
11003 Sales Information systems 2
11004 Sales Sales 3
11005 Information systems Accounting 2
11006 Sales Legal affairs 2
11007 Planning Procurement 2
12001 Sales
12002 Information systems

a) 1 b) 2 c) 3 d) 4

– 12 –
Q30. In a distributed database system, which of the following is a method for the finalization
of update processing when an inquiry is made to multiple sites that perform a series of
transaction processes as to whether finalization is possible or not and whether finalization
is possible at all sites?

a) Exclusive control b) Roll back


c) Roll forward d) Two-phase commitment

Q31. Which of the following TCP/IP protocols is used to assign IP addresses dynamically?

a) ARP b) DHCP c) RIP d) SMTP

Q32. In a TCP/IP network hierarchical model, what is the name for Equipment A that
connects two LAN segments at the Internet Layer?

Node 1 Node 2
Application Layer Application Layer
Transport Layer Equipment A Transport Layer
Internet Layer Internet Layer Internet Layer
Link Layer Link Layer Link Layer

LAN segment 1 LAN segment 2


Data flow

a) Bridge b) Repeater hub c) Router d) Switching hub

Q33. Which of the following is a pair of IP addresses belonging to the same subnet, when the
subnet mask is 255.255.255.240?

a) 192.168.1.14 and 192.168.1.17 b) 192.168.1.17 and 192.168.1.29


c) 192.168.1.29 and 192.168.1.33 d) 192.168.1.33 and 192.168.1.49

– 13 –
Q34. Which of the following delivery models does an ARP response use?

a) Anycast b) Broadcast
c) Multicast d) Unicast

Q35. A PC and a web server are communicating via HTTP. When a request packet is sent
from the PC to the web server, which of the following combinations of port numbers does
the response packet have? Here, the source and the destination port numbers of the request
packet are 50001 and 80 respectively.

Destination (PC)
Source (web server) port number
port number
a) 80 50001
b) 50001 80
A number allocated on the web server, other than 80 and
c) 80
50001
A number chosen by the web server other than 80 or
d) 50001
50001

Q36. Which of the following is a technology that prevents automated input by a program by
requiring input of characters from a warped image or an image some parts of which are
hidden? The technology is based on the differences of recognition of those images between
humans and programs.

a) CAPTCHA b) QR code
c) Short URL d) Trackback ping

Q37. Which of the following is an attack that threatens the “integrity” of information?

a) A DoS attack which sets the system to an overloaded state


b) Falsification of a web page
c) Tapping of communication content
d) Unauthorized copying of data saved in a system

– 14 –
Q38. Which of the following is the name of an attack where manipulation is made to place a
malicious website near the top of the results of a search website?

a) Cross-site scripting b) DNS cache poisoning


c) SEO poisoning d) Social engineering

Q39. Which of the following is an appropriate explanation of a SQL injection attack?

a) An attack in which a large volume of packets is sent to a website via another website in
order to make the provision of services impossible due to the abnormally high network
traffic
b) An attack in which a program is forced to end abnormally, malicious code that is
inserted into the data area is executed, or other such actions are performed by reading
and writing data beyond the upper or lower limit of an area of memory that is secured
for the buffer
c) An attack in which if there is a defect in the way database is called from a web
application, an attacker can perform unauthorized retrieval, modification, and deletion
of data in a database by entering a malicious character string in the data manipulation
language for the call
d) An attack in which when a user views a website on which an attacker has placed a trap
and clicks a link to another website that has a vulnerability, a character string that
contains a malicious script is sent to the linked website, and when the malicious script
that is embedded in the response is executed in the user’s browser, information leakage
occurs

Q40. In an e-commerce transaction that uses public key cryptography, which of the following
is the role of a certificate agency (CA)?

a) To encode plain text with the public keys that are shared between the parties involved
in the transaction
b) To issue digital certificates for the public keys of the parties involved in the transaction
c) To manage the passwords of the parties involved in the transaction
d) To manage the private key that is shared between the parties involved in the transaction

– 15 –
Q41. Which of the following is an appropriate purpose of using a hash value in digital
forensics?

a) To convert a password with a one-way function so that recovery is not possible, then
store it
b) To prove the identicalness between the original and the duplicate copy of the data that
can be used as evidence
c) To restore altered data to its original form so that it can be used as evidence
d) To verify whether password tapping occurred or not

Q42. Which of the following is an appropriate operation for user authentication that uses an
IC card and a PIN?

a) Given that each user can be identified by an IC card, a common PIN is set for all users
in order to reduce the management workload.
b) If an IC card is lost, a new IC card is issued, and after the PIN is reset, the lost IC card
is deactivated.
c) The PIN is set by combining the numeric information imprinted on the surface of the
IC card.
d) When an IC card is delivered, the PIN is not enclosed, but is notified to the user
through another channel.

Q43. When malware that has made a successful intrusion into a PC communicates with a
command-and-control server on the Internet, which of the following is a reason for using
the TCP port number 80 as the destination port in most cases?

a) Given that this port is used for browsing websites, there is a high probability that
communication is allowed by the firewall.
b) Given that this port is used for browsing websites through HTTPS communication,
there is a low probability that this port is detected by an intrusion detection system.
c) Given that this port is used for the name resolution of a domain name, there is a low
probability that this port is detected by an intrusion detection system.
d) Given that this port is used in a DNS zone transfer, there is a high probability that
communication is allowed by the firewall.

– 16 –
Q44. When a normally functioning hard disk of a PC on which confidential files are stored is
handed over to an industrial waste disposal vendor, which of the following is an
appropriate countermeasure against information leakage?

a) Changing the filename of each confidential file to a random character string multiple
times
b) Compressing the confidential files multiple times with different compression
techniques
c) Erasing the master boot record of the hard disk multiple times with a specialized
erasing tool
d) Overwriting all areas of the hard disk with a random bit string multiple times

Q45. Which of the following is an appropriate reason why VLANs are used?

a) In order to obtain an IP address


b) In order to reduce network traffic
c) To remotely access the intranet from a public network
d) To use a virtual memory system

Q46. Which of the following must be approved by the customer when the external design of a
system is completed?

a) Physical database specification b) Program flowchart


c) Screen layout d) System development plan

Q47. Which of the following is the appropriate combination of the basic concept of object
orientation?

a) Abstraction, encapsulation, inheritance, class


b) Embodiment, structuring, continuation, class
c) Normalization, encapsulation, division, class
d) Virtualization, structuring, projection, class

– 17 –
Q48. In order to increase module independence, the level of module coupling must be low.
Which of the following methods of exchanging information between modules has the
lowest level of module coupling?

a) Control parameters are passed as arguments in order to control the execution order of
modules.
b) Only data items that are required for input and output are passed as arguments between
modules.
c) Relevant module reference data that is defined in a common area.
d) Required data is declared externally and shared.

Q49. The integration test for software composed of modules arranged in a hierarchical
structure is performed from a high-level module. In such a case, which of the following is a
test module that is used as a substitute for a low-level module?

a) Driver b) Emulator
c) Simulator d) Stub

Q50. Which of the following is the method that uses a modeling tool to create a design
document described with E-R diagrams or other representations from the definition
information in an active database?

a) Concurrent engineering b) Forward engineering


c) Reverse engineering d) Social engineering

Q51. Which of the following is an appropriate description of the Responsibility Assignment


Matrix that is used for project human resource management?

a) Allocating the current engagement level of the stakeholders.


b) Allocating work packages to those who are responsible for project work.
c) Defining the limits of the project sponsor’s responsibilities.
d) Defining the terms of reference of the project manager.

– 18 –
Q52. Which of the following is the structure that illustrates the relationship between project
activity and the units of project that will perform those activities?

a) Organizational Breakdown Structure


b) Product Breakdown Structure
c) Responsibility Assignment Matrix
d) Work Breakdown Structure

Q53. According to the PMBOK Guide – Fifth Edition, which of the following is an
appropriate definition of a project stakeholder?

a) A person or group who provides resources and support for the project, program, or
portfolio and is accountable for enabling success.
b) An individual, group, or organization, who may affect, be affected by, or perceive itself
to be affected by a decision, activity, or outcome of a project.
c) An organizational structure that standardizes the project-related governance processes
and facilitates the sharing of resources, methodologies, tools, and techniques.
d) The person assigned by the performing organization to lead the team that is responsible
for achieving the project objectives.

Q54. Which of the following is an appropriate explanation of the Function Point method that
is used for system development estimation?

a) It is a method for estimating the overall workload where the development work is
broken down into units of work items and then the workload for each item is
accumulated on the basis of a predefined standard value for the unit of workload.
b) It is a method for estimating the person-hours and period of time required to complete
development, on the assumption that the development scale is known. It can be applied
to all fields, not just to the business field.
c) It is a method for estimating the scale and person-hours of development on the basis of
the past experience of a similar system, where past data is used for the same areas and
past experience for different areas.
d) It is a method for estimating the scale of a system where the functions of the system are
quantitatively measured by using elements such as the number of I/O data items and the
number of files, and an adjustment is performed on the basis of the complexity and
characteristics of the application.

– 19 –
Q55. According to the ITIL 2011 edition, which of the following is an appropriate stage of
the service life cycle where a service provider builds and deploys new or modified
services?

a) Service design b) Service operation


c) Service strategy d) Service transition

Q56. ISO/IEC 20000-1:2011 requires the application of the methodology known as


“Plan-Do-Check-Act” (PDCA) to all parts of the Service Management System (SMS) and
the services. Which of the following is an activity that is included as a plan in SMS?

a) Conducting management reviews at planned intervals, and maintaining their records


b) Creating a framework of authorities, responsibilities, and process roles
c) Creating a plan for approved improvements, and implementing and reporting the
improvements
d) Implementing and operating SMS through allocation and management activities of funds
and budgets

Q57. According to the ISO/IEC 20000-1:2011, which of the following is a control process that
includes the identification, control, recording, tracking, reporting and verification of CI and
the management of CI information in the CMDB?

a) Capacity management b) Change management


c) Configuration management d) Release and Deployment management

– 20 –
Q58. Which of the following is the most appropriate purpose for which a system auditor
exchanges opinions with an audited department with respect to the draft version of an audit
report?

a) In order to confirm that there are no factual errors in the findings and recommendations
to be described in the audit report.
b) In order to issue the audit report to the audited department before the audit report is
submitted to the person who is requesting the audit.
c) In order to receive the approval of the responsible person of the audited department
with respect to the recommendations described in the audit report.
d) In order to substitute with an additional investigation concerning the audit report for
which the investigation is insufficient, by orally confirming with the audited
department.

Q59. Which of the following is a checkpoint for auditing the control of the risk of
information leakage, falsification, and unauthorized use of documents concerning a
system?

a) Creating the necessary documents even in prototype development


b) Standardizing documents
c) Taking measures in order to ensure the confidentiality of documents
d) Updating documents without delay as changes are made in the system

Q60. Which of the following is an appropriate description concerning the implementation of


a system audit?

a) For an audit of the development status of an information systems department, the audit
team consists of members of the information systems department who are familiar with
the details of the development.
b) In order to enable the person requesting the audit to issue improvement instructions on
the basis of the audit report, the system auditor reports the audit results to the person
requesting the audit.
c) When a system audit is performed as part of an operations audit, the audit team consists
of members of the user department.
d) When a system auditor accepts the help of other experts, the experts become
responsible for decisions concerning the scope and methods of support, as well as the
audit result.

– 21 –
Q61. Which of the following is a technique that is used to perform the optimum resource
allocation for a computerization investment in each category classified on the basis of the
similarities of risks and the investment value?

a) 3C analysis b) Benchmarking
c) Enterprise architecture d) IT portfolio

Q62. Which of the following represents a part of the total cost of ownership (TCO) for SaaS
(Software as a service)?

a) Cost of upgraded installation


b) Data migration cost
c) New software development cost
d) Server hardware investment to host the software

Q63. Which of the following is a measure for the risk of a decline in the system maintenance
and operation quality during the outsourcing of an IT service?

a) Human resources with assessment capabilities with respect to the service cost of system
maintenance and operations are secured in the company.
b) In order to validate the service cost, the detailed fee structure by service is clearly
stated in the contract or other documents.
c) The proposal for the human resource development plan of the company after
outsourcing is requested during the stage of subcontractor selection, and is also clearly
stated in the contract or other documents.
d) The service quality improvement activities are proceeded by agreeing to the desired
level of quality with the subcontractor by using indexes that demonstrate the service
quality.

– 22 –
Q64. Which of the following is a characteristic of hosting service?

a) A usage method, such as a high-performance server of a service provider being


exclusively used by a single user, is not supported.
b) In terms of operations management, all activities, including the monitoring of server
operations, incident handling, etc. are addressed by users.
c) The utilization right of a server prepared by a service provider is lent out to users.
d) Users freely select and combine servers by providing their own servers to the service
provider facility.

Q65. Which of the following is an explanation of BYOD (Bring Your Own Device)?

a) Carrying information devices provided by the company at any time for work use
b) Configuring a usage environment for the personal use of personally-owned information
devices
c) Using employees’ personally-owned information devices for work
d) Using laptop computers or other information devices provided by the company for
personal use outside of the company

Q66. Which of the following is the work that is performed when non-functional requirements
are defined?

a) Clarifying the flow of information (i.e., data) between the functions constituting
business operations
b) Clarifying the interface for exchanging information with other systems
c) Creating the technical requirements for the development criteria and standards
according to the programming language used in system development
d) Defining the scope to be implemented as system functions

– 23 –
Q67. Which of the following is an explanation of the digital divide?

a) It refers to an economical or social gap that occurs because of differences in abilities


and opportunities when using computers and communication networks.
b) It refers to communications and broadcast services that can be used equally by any
citizen with reasonable charges, without any difference between regions.
c) It refers to citizens participating directly in government policies and autonomous
bodies through the use of the Internet.
d) It refers to the provision of all services from a single place for each event of the daily
life of citizens or each field of corporate activity.

Q68. Which of the following is the purpose of analyzing business plans and competitive
advantages through portfolio management that uses the matrix shown in the figure?

Strength of business
(market share)
Attractiveness of business

High
(market growth rate)

Low
Strong Weak

a) To evaluate tactics for maintaining a competitive edge in the market by improving


product quality
b) To evaluate the change in the market by considering seasonal fluctuation factors and
geographical distribution in order to set an objective
c) To evaluate the competitors’ move in the market so that the promotion effect, set as an
objective, can be measured
d) To evaluate the position of the company’s business as the basis for setting an objective
and prioritizing resource allocation

– 24 –
Q69. Which of the following is an explanation of core competence?

a) Corporate activities that follow laws, various regulations, and social norms for
performance management
b) Overall system and operation optimization techniques to achieve the purposes of
organizational activities
c) Predominant abilities that cannot be imitated by competitors in a company’s area of
activity
d) The development region of a business that is decided upon based on the viewpoint of
the market, technology, and products (or services)

Q70. Which of the following is the basic strategy of a niche in a competitive position?

a) A differentiation strategy necessary for a leader attack, such as a share pursuit


b) An imitation strategy that quickly responds to market opportunities
c) An omni-directional strategy that covers the entire market and secures the highest share
d) A specialization strategy that aims at the specialization of the product and market

Q71. The figure below is the work procedure of MRP (Material Requirements Planning), a
technique of a production management system. Which of the following information to be
inserted into A in the figure below is necessary for calculating the net requirements?

Calculation of
Master Calculation net requirements Calculation Arrange Arrangement
schedule of gross (Calculation of of the order
requirements quantity ment plan instructions
the shortage)

a) Bill of materials (configuration and requirements of each component in the final


product)
b) Inventory status (inventory amount, residual orders, in-process quantity)
c) Ordering policy (lot organization method, ordering method, safety stock)
d) Standard schedule (completion period, number of days of lead time)

– 25 –
Q72. Which of the following describes an RFID system?

a) Multiple RF Tags within range communicate with each other, and create a mesh
network.
b) RF Readers/Writers generate an electromagnetic field that charges the RF Tags within
range to allow transmission of information.
c) RF Tags process unique positioning information by using multiple satellites which
allow for the tracking of the item using longitude and latitude coordinates.
d) RF Tag transmission does not provide error correcting codes and still acquires high
reliability through a wired connection.

Q73. Which of the following is a management organization that creates a cross-functional


team between project and functional organizations in order to flexibly respond to changes in
the business environment?

a) Divisional organization b) Line and staff organization


c) Matrix organization d) Project organization

Q74. Which of the following is the appropriate role of a facilitator in a meeting?

a) To act as the chairperson and control the discussions so as to work out a conclusion that
matches the intentions of the management
b) To encourage the participants of the meeting to put forth their remarks and organize the
flow of discussions from a neutral and impartial position
c) To give advice only in discussions related to specific areas in which the facilitator
specializes, such as technical or legal fields
d) To offer specialized support for the administration of a meeting, such as adjusting the
schedule, preparing materials, or creating minutes.

– 26 –
Q75. Which of the following is an explanation of an affinity diagram?

a) It is a method by which along with the progress in a situation, measures are examined
for problems that might have several outcomes, and the process leading to the desired
result is decided.
b) It is a method by which a causal relationship is clarified for events intertwined with
complex factors.
c) It is a method by which the collected information is categorized on the basis of a
mutual relationship, and the problems to be resolved are clarified.
d) It is a method by which the means and measures for achieving the purpose and
objectives are developed sequentially, and the most appropriate means or measures are
sought.

Q76. Which of the following is an example of Green by IT?

a) Development of efficient in-house software


b) Development of a powerful in-house Data Centre
c) Using a desktop PC instead of a laptop thin client
d) Using web conferencing instead of travelling to meetings

Q77. A factory has recorded the number of occurrences of defective products according to
the cause of the defect. Based on this record, which of the following is a Pareto chart that
shows the top causes of defective product occurrences and the cumulative total of
percentages?

a) b)

c) d)

– 27 –
Q78. Company A sets a goal to make a profit of $36,000 under the conditions shown in the
table below. What is the minimum sales revenue for the company to achieve its goal?

Selling Price $ 40 per unit


Variable Cost $ 28 per unit
Fixed Cost $ 42,000 per period

a) 3,500 b) 6,500 c) 140,000 d) 260,000

Q79. When the inventory unit price is determined by dividing the total purchase amount by
the total quantity of items purchased, which of the following is an appropriate inventory
method to be used?

a) First-in first-out method


b) Periodic average method
c) Moving average method
d) Final acquisition cost method (Final purchase cost method)

Q80. Which of the following is an appropriate description of the scope of software protection
under WTO’s Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS)?

a) Algorithms and programming languages are protected.


b) Application programs are protected but basic programs such as an OS are not, as the
value of the right is included in the hardware cost.
c) Both source programs and object programs are protected.
d) Documents that describe algorithms are protected, but programs created by using the
algorithms are not.

– 28 –

You might also like