0% found this document useful (0 votes)
76 views26 pages

2023A FE AM Questions

The document is an examination for a Fundamental IT Engineer position that will take place from 9:30-12:00. It provides instructions for examinees on how to fill out their answers on the provided answer sheet, including writing their examinee number and date of birth, and marking their selected answer for each multiple choice question. It also defines symbols that may be used in questions. The examination contains 15 multiple choice questions related to computer science topics such as logic circuits, data compression, binary search trees, and computer architecture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views26 pages

2023A FE AM Questions

The document is an examination for a Fundamental IT Engineer position that will take place from 9:30-12:00. It provides instructions for examinees on how to fill out their answers on the provided answer sheet, including writing their examinee number and date of birth, and marking their selected answer for each multiple choice question. It also defines symbols that may be used in questions. The examination contains 15 multiple choice questions related to computer science topics such as logic circuits, data compression, binary search trees, and computer architecture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

October 2023

Fundamental IT Engineer Examination (Morning)

Questions must be answered in accordance with the following:

Question Nos. Q1 - Q80


Question Selection All questions are compulsory.
Examination Time 9:30 - 12:00 (150 minutes)

Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely and
neatly. Wipe away any eraser debris.

2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.

[Sample Question]
Q1. Which of the following should be used for marking your answer on the answer
sheet?

a) Ballpoint pen b) Crayon c) Fountain pen d) Pencil

Since the correct answer is “d) Pencil”, mark the answer as below:

[Sample Answer]
Q1 ウ

Do not open the exam booklet until instructed to do so.


Inquiries about the exam questions will not be answered.

– 1 –
Symbols commonly used in questions

Unless otherwise noted in each question, the following notational conventions are applied as
shown in the table.

Logic Circuit

Graphic symbol Explanation

AND gate

NAND gate

OR gate

NOR gate

Exclusive OR (XOR) gate

Exclusive NOR gate

Buffer

NOT gate

Three-state buffer (or tri-state buffer)

A small circle or “bubble” on either the


input or the output terminal shows inversion
or negation of the logic state.

Company names or product names mentioned in the examination questions are the trademarks or registered
trademarks of their respective companies or organizations. The symbol ® or ™ is not used within.

– 2 –
Q1. In a school class, 13 students play basketball and 19 play football. Among them, 8
students play both. Further, 7 students play neither. How many students are there in the
class?

a) 17 b) 31 c) 33 d) 47

Q2. n is a binary integer represented in two’s complement. Which of the following operations
get the value 7 × n using only bit shifting and an addition or subtraction operation?

a) Shift n 2 bits to the left, then add n to the result.


b) Shift n 2 bits to the left, then subtract n from the result.
c) Shift n 3 bits to the left, then add n to the result.
d) Shift n 3 bits to the left, then subtract n from the result.

Q3. A parking lot has 10 parking spaces in a row, and 7 cars are parked at random parking
spaces. What is the probability that the three empty places are adjacent to each other?

1 1 1 1
a) b) c) d)
90 72 15 12

Q4. What is the sum of two binary fractions 1.0101 and 1.0111 expressed in decimal form?

a) 2.5 b) 2.75 c) 2.875 d) 2.9375

Q5. Which of the following expressions in postfix notation is equivalent to the expression
2+5×3+4 in infix notation? Here, the operator “×” has higher precedence than “+”.

a) 2 5 3 4 × + + b) 2 5 + 3 4 × +
c) 2 5 3 + × 4 + d) 2 5 3 × + 4 +

– 3 –
Q6. There is communication data that consists of five characters “A”, “B”, “C”, “D”, and “E”
that have different appearance frequencies, and in order to compress the data by using
Huffman coding, the code table shown below is created. Which of the following is an
appropriate code that should be inserted in the blank?

Character Appearance frequency (%) Code


A 26 00
B 25 01
C 24 10
D 13
E 12 111

a) 001 b) 010 c) 101 d) 110

Q7. When the series of stack operations below is performed on an empty stack, which of the
following is the data that is read out by the last READ operation? Here, “PUSH x” is the
operation to put data x in the stack, “POP” is used to retrieve data from the stack, and
“READ” is used to read data from the top of the stack without removing the original data.

PUSH 2 → READ → PUSH 3 → PUSH 6 → POP → READ → PUSH 4


→READ → PUSH 7 → PUSH 5→ POP → POP → READ

a) 2 b) 3 c) 4 d) 6

Q8. In the binary search tree below, when a new node of value 11 is inserted, where will this
insertion be made?
14

7 16

3 12 20

10 13 18 23

a) Left child of 16 b) Left child of 23


c) Right child of 3 d) Right child of 10

– 4 –
Q9. In the table below, there are five items A through E. Each item cannot be divided into
smaller pieces. When a knapsack with a maximum volume of 7 units is used for carrying the
items, which of the following is a set of items to be packed in the knapsack so that the total
price can be maximized?

Item Volume Price


A 3 4
B 2 3
C 3 5
D 1 2
E 5 9

a) A, B, D b) A, C, D
c) B, E d) D, E

Q10. Which of the following is an appropriate description concerning XML?

a) It is based on HTML and expands its functions.


b) It requires a dedicated editor for writing XML documents.
c) It integrates the logical structure and display style of documents.
d) It enables users to define the attribute information and logical structure of documents by
using the user’s own tags.

Q11. In a CPU, which of the following is a special register that contains the address of the
next instruction to be fetched?

a) Accumulator b) Index register


c) Instruction register d) Program counter

– 5 –
Q12. Which of the following is an appropriate CPU operation associated with cache
memory?

a) When a cache hit occurs, the CPU fetches data from ROM.
b) When a cache hit occurs, the CPU fetches data from the main memory.
c) When a cache miss occurs, the CPU fetches data from the cache memory.
d) When a cache miss occurs, the CPU fetches data from the main memory.

Q13. Which of the following is a computer architecture in which a processor executes the
same instruction on multiple data?

a) MIMD b) MISD c) SIMD d) SISD

Q14. ECC is used for error detection and correction in memory. When n+2 redundant bits are
required for a data bus having a width of 2n bits, what is the number of redundant bits that
are required for a data bus having a width of 128 bits?

a) 3 b) 8 c) 9 d) 10

Q15. Which of the following is the most appropriate explanation of grid computing?

a) A computing task is distributed to several computers in the network to attain


computational capacity.
b) Physical devices such as computers or network devices are emulated to circumvent
compatibility constraints and attain software portability and flexibility.
c) Requirements are stated as constraints on response time and/or on the temporal validity
of sensory data.
d) Sensing devices are connected to a network to provide feedback and control through
personal mobile devices.

– 6 –
Q16. Which of the following is an RAID configuration that deploys two parity records to
different disk drives enabling two simultaneous disk drive failures in the same RAID group
to be recovered?

a) RAID0 b) RAID1 c) RAID5 d) RAID6

Q17. Which of the following occurs when a program attempts to access a page that is
mapped in the virtual address space but is not located in the main memory? Here, the OS
supports paging.

a) Fatal error b) Page fault


c) Scheduling error d) Segmentation fault

Q18. Which of the following is an appropriate description concerning the round robin
process scheduling method?

a) CPU resources are allocated to each process in order of priority specified in advance
when a particular event occurs.
b) CPU resources are allocated to each process in order of processing time from shortest to
longest.
c) CPU resources are allocated to the first executable process in the queue when an
interval-timer interrupt is generated.
d) CPU resources are allocated to the process that needs to start immediately when some
kind of interrupt is generated.

Q19. Which of the following is an explanation of the function of an archiver that is one of the
data management utilities?

a) Compiling several files into one file or reconstructing the original files in order to
perform data backup and distribution
b) Creating both an area for recording data and an area for managing data on a single hard
disk
c) Keeping data secure through file protection for safeguarding data from unauthorized use
and destruction, and also through copy protection for preventing unauthorized copying
d) Rearranging a file into contiguous areas, to the extent possible, on a hard disk in which
fragmentation has occurred

– 7 –
Q20. Which of the following is a sequential circuit that has two stable states?

a) Adder circuit b) Capacitor


c) Flip-flop d) NAND gate

Q21. Which of the following is equivalent to the logic circuit shown below?

a) b)

c) d)

Q22. A power supply unit has a rated output power of 500 watts and an efficiency of 80%. In
order to obtain an output power of 500 watts from this power supply unit, how many watts
is the minimum input power?

a) 100 b) 400 c) 625 d) 900

Q23. When an order data in the format shown below is entered, which of the following is a
data validation method that is performed to determine whether the order date is a business
day and whether the date is on or before the date of data entry or after the date of data entry?

Order data
Slip No. Order date Product code Quantity Customer code
(characters) (characters) (characters) (number) (characters)

a) Duplicate check b) Format check


c) Logical check d) Sequence check

– 8 –
Q24. Which of the following is a process in PCM to capture analog values from audio
signals at a regular interval?

a) Encoding b) Reverse quantization c) Quantization d) Sampling

Q25. In a DBMS, which of the following is a function that decides the schema?

a) Definition function b) Maintenance function


c) Recovery function d) Security function

Q26. Which of the following is an appropriate method used to remove data redundancy in
relational database systems?

a) Entity-relationship b) Functional dependency


c) Hierarchical d) Normalization

Q27. Which of the following is the most appropriate description concerning the primary role
of an SQL query optimizer?

a) It determines the most efficient way to execute a query.


b) It minimizes the number of rows in a result set.
c) It parses a query and improves it for efficient network transmission.
d) It stores the results of frequently used queries in a cache.

– 9 –
Q28. From a “Score” table, the average score for all subjects is to be calculated for each
student, and the student number and average score for students with an average score of 80
or higher are to be determined. Which of the following is the appropriate term or phrase to
be entered in blank A? Here, a solid underline represents a primary key.

Score (StudentNumber, Subject, Score)

[SQL statement]
SELECT StudentNumber, AVG(Score)
FROM Score
GROUP BY A

a) StudentNumber HAVING AVG(Score) >= 80


b) StudentNumber WHERE Score >= 80
c) Subject HAVING AVG(Score) >= 80
d) Subject WHERE Score >= 80

Q29. Which of the following is a file in which values before and after an update of the database
are written and saved as the update history of the database?

a) Backup file b) Checkpoint file


c) Dump file d) Log file

Q30. Which of the following is the most appropriate information for a router to determine the
destination of an incoming packet?

a) Destination IP address b) Destination MAC address


c) Source IP address d) Source MAC address

Q31. Which of the following is a feature of a switching hub (layer 2 switch) network device?

a) It breaks a received packet into smaller pieces (fragments) in the network layer.
b) It dynamically allocates an IP address for a terminal connected to its LAN port.
c) It forwards a received packet only to its LAN port connected to a device with the
packet’s destination MAC address.
d) It forwards a received packet to all its LAN ports (broadcast).

– 10 –
Q32. When a PC connected to a LAN is starting up, which of the following protocols is used
to automatically assign an IP address to the PC?

a) DHCP b) DNS c) FTP d) PPP

Q33. In telecommunication, which of the following is a standard for wireless broadband


communication for mobile devices and data terminals?

a) IEEE 802.11 b) LTE


c) NFC d) UWB

Q34. Which of the following is a multicast IPv4 address?

a) 10.1.1.1 b) 192.0.2.0 c) 203.0.113.4 d) 224.0.0.5

Q35. Which of the following is a method for embedding a malicious java script code in the
content sent to a victim’s web browser from a vulnerable website?

a) Cross-site request forgery b) Cross-site scripting


c) OGNL injection d) SQL injection

Q36. Mr. A encrypts a message to be sent to Mr. B using an asymmetric key encryption method
so that only Mr. B can decrypt the message. Which of the following is(are) the private key(s)
used to decrypt the message?

a) A third party’s b) Both Mr. A’s and Mr. B’s


c) Only Mr. A’s d) Only Mr. B’s

Q37. Which of the following is an attack using a trial-and-error method to obtain confidential
information such as a user password or personal identification number (PIN)?

a) Brute force b) Denial of service


c) Man-in-the-middle d) Sniffing

– 11 –
Q38. When information, such as an e-mail or a document file, is sent and received with a
digital signature via the Internet, which of the following is an appropriate combination of
security properties that ensure that such information is from the signer and has not been
altered or tampered with during transmission?

a) Atomicity and consistency b) Authenticity and integrity


c) Availability and confidentiality d) Durability and isolation

Q39. Which of the following is an example of a behavior of a key logger?

a) It interrupts the communication between two parties and then collects and falsifies the
information being exchanged.
b) When Internet banking is used, it collects the password entered by the user.
c) When the user browses movies on a web browser, it arbitrarily displays unintended
advertisements for the user.
d) When the web browser is started, it arbitrarily displays a tool bar that the user has not
installed.

Q40. Which of the following is a role of a PKI certification authority as a reliable third party?

a) Adding a digital signature to an e-mail body as requested by a user


b) Enabling the synchronization of time by returning an accurate time to a user’s request
c) Issuing a digital certificate that certifies the private key of a user or server
d) Issuing a digital certificate that certifies the public key of a user or server

– 12 –
Q41. As shown in the figure below, an application on a client accesses the data in the database
on a server via database connection programs. Which of the following is a measure for
preventing the leakage of the commands and execution results transmitted between the
application and database?

Client Server
Application Database

Database Database
connection program connection program

Tapping by attacker

a) Changing the port number from its initial value that the database connection programs
use for communication in the database management system
b) Encrypting the communication between the database connection programs
c) Restricting the IP addresses of the clients that can access the database connection
program on the server to only those that are required
d) Setting a password for starting or stopping the database connection program on the
server

Q42. Companies usually provide a means for their mobile workforce to access the corporate
network securely over the Internet through insecure channels such as open wireless
networks in hotels or coffee shops. Which of the following is the appropriate technology
that can be used for this purpose?

a) DMZ (DeMilitarized Zone)


b) SNMP (Simple Network Management Protocol)
c) VoIP (Voice over Internet Protocol)
d) VPN (Virtual Private Network)

– 13 –
Q43. Which of the following is a technique that attempts to intrude into the system in order to
detect security-related vulnerabilities of the computer or network?

a) Penetration test b) Regression test


c) Software inspection d) Walk-through

Q44. Which of the following is a key that the SSL/TLS certificate of a website contains?

a) The encrypted private-key of the website


b) The encrypted public-key of the website
c) The unencrypted private-key of the website
d) The unencrypted public-key of the website

Q45. Which of the following is a description concerning a decision table that is one of the
design techniques used in system development?

a) It represents a combination of conditions and the corresponding operations.


b) It represents entities by rectangles and their relationship through connecting lines.
c) It represents the flow of controls, such as a process or selection, by straight lines or
arrows.
d) It represents the flow of data between an external interface, processes, and data store.

Q46. The integration test for software composed of modules arranged in a hierarchical
structure is performed from a high-level module. In such a case, which of the following is a
test module that is used as a substitute for a low-level module?

a) Driver b) Emulator
c) Simulator d) Stub

– 14 –
Q47. Which of the following is the most appropriate feature of polymorphism in object-
oriented programming?

a) Developers are allowed to define classes incrementally by reusing classes defined


previously as the basis for new classes.
b) Only the information required to use a software module is published to the module user.
c) The processes and data are combined into a single object.
d) The same message can be interpreted differently by different classes of objects.

Q48. Which of the following is approved by the customer when the external design of a system
is completed?

a) Physical database specification b) Program flowchart


c) Screen layout d) System development plan

Q49. Which of the following is an appropriate description of an extreme programming (XP)


practice?

a) After the code is created, and it is confirmed that it can be integrated, test cases are
created.
b) Integration of the code and testing are continuously repeated.
c) The code that passed the tests is not refactored until the next iteration.
d) The customer is responsible for the specification of unit tests.

Q50. Which of the following is a method that uses a modeling tool to create a design document
described with E-R diagrams or other representations from the definition information in an
active database?

a) Concurrent engineering b) Forward engineering


c) Reverse engineering d) Social engineering

– 15 –
Q51. The ten members of a project team hold meetings with each other with the conditions
below. If two (2) members are to be added to the team, how many additional meetings will
be held compared to if there were ten members?

[Conditions]
• Meetings are held one-on-one.
• Each member holds one meeting with every other member.

a) 12 b) 21 c) 22 d) 42

Q52. In order to determine the quality condition in a test process, it is necessary to analyze
and evaluate the relationship between the number of completed test items and the
cumulative number of bugs. Which of the following is a graph that indicates that the quality
is becoming stable?

a) b)
number of bugs

number of bugs
Cumulative

Cumulative

Number of Number of
completed test items completed test items

c) d)
number of bugs
number of bugs

Cumulative
Cumulative

Number of Number of
completed test items completed test items

– 16 –
Q53. When the number of programs composing the system and the number of person-days
required for coding per program are as shown in the table below, what is the minimum
number of staff members required to develop the system in 95 days? Here, in addition to
coding, the activities of design and testing are also necessary to develop the system, and
those activities require eight times as many person-days as coding.

Number of person-days required


Number of programs
for coding per program
Input processing 20 1
Output processing 10 3
Calculation processing 5 9

a) 8 b) 9 c) 12 d) 13

Q54. Which of the following is a critical path of the project activities shown in the arrow
diagram below?

a) A → B → E → I → L b) A → C → D → E → H → K
c) A → C → F → I → L d) A → C → G → J → L

Q55. Which of the following is an appropriate policy for creating an SLA?

a) Setting a compensation as a penalty for every item that has a service level
b) Setting a service level for every item that can be taken into consideration
c) Setting a service level that is maintained into the future without any changes
d) Setting a service level under the cost and needs of a service provider and its customers

– 17 –
Q56. Which of the following is the most appropriate characteristic of the “big bang” or all-at-
once migration method that is one of the system migration methods?

a) Additional operational costs are incurred because of parallel operations.


b) An additional application is required for connecting the old and new systems.
c) The old and new systems operate in parallel, and migration to the new system is
performed at a particular point of time.
d) The problems that occur during migration to the new system have a big impact.

Q57. In IT service management, which of the following is a problem management activity that
is performed proactively?

a) Analyzing the occurrence trend of incidents and proposing measures that prevent an
incident from occurring in the future
b) Classifying problems that have been detected and recorded, and setting the response
priority
c) Evaluating the effectiveness of a resolution to a critical problem
d) Monitoring whether an incident occurs again or not for a certain period of time after the
problem is resolved

Q58. Which of the following is a method that restores the system to its initial state and restarts
it when a system failure occurs, that does not accompany preprocessing of a copy before/after
an update, and that is also called initial program load?

a) Cold start b) Rollback


c) Rollforward d) Warm start

– 18 –
Q59. Which of the following is an explanation of an audit work paper?

a) A compilation of the information security promissory letter that is presented to the


audited department when the auditor implements an audit
b) A compilation of the standards and guidelines used by the auditor for implementing an
audit
c) A document that must be disclosed along with the audit report to prove that the auditor
has fulfilled his or her obligations with proper attention
d) An execution record of the auditing procedure by an auditor, and it forms the basis of the
audit opinion

Q60. Which of the following is an appropriate description concerning a system audit team?

a) For an audit of the development progress in an information systems department, the


audit team consists of members of the information systems department who are familiar
with the details of the development.
b) In order to enable the person requesting the audit to issue improvement instructions on
the basis of the audit report, the system audit team reports the audit results to the person
requesting the audit.
c) When an audit of the information system is performed as a part of the business
operations audit, the audit team is formed by the members of the user’s department.
d) When the system audit team accepts the help of an expert, the decisions concerning the
range of support, methods, and audit results is the responsibility of the expert.

– 19 –
Q61. The purchase of two types of IT devices A and B is being examined. The payout period
is set in consideration of the useful life of each of the devices. Which of the following is an
appropriate description for the minimum amount of annual profit necessary to recover the
amount of investment within the set payout period for A and B? Here, the annual profit is
made evenly each year, and the interest rate is not considered.

A B
Amount of investment (10,000 yen) 90 300
Payout period (years) 3 5

a) It is necessary for A and B to make the same amount of annual profit.


b) It is necessary for A to make twice as much as the annual profit than that of B.
c) It is necessary for B to make 1.5 times as much as the annual profit than that of A.
d) It is necessary for B to make twice as much as the annual profit than that of A.

Q62. Which of the following is a purpose of Business Process Management (BPM) in


corporate activities?

a) Analysis and effective use of information resources


b) Conservation and analysis of customer information
c) Continuous improvement of business processes
d) Effective use of management resources

Q63. Which of the following is a scheme where the user establishes a connection to the system
of a service provider via the Internet and makes online use of only the necessary functions of
the applications provided by the service provider at the necessary time?

a) ERP b) SaaS c) SCM d) XBRL

– 20 –
Q64. Which of the following is an appropriate example of utilizing Business Intelligence
(BI)?

a) Analyzing a large volume of data stored on a business system to evaluate business


performance and develop a business strategy
b) Computerizing daily routine works, such as decision requests, to ensure that such
procedures are carried out without fail and to enable their swift completion
c) Enabling employees to use computerized learning materials via a network and managing
their learning and performance
d) Obtaining publications, such as annual reports issued by competitors, to understand their
business strategies and financial situations

Q65. The RFP is presented to each vendor that has responded to an RFI. Which of the
following should be done beforehand to proceed fairly with the future vendor selection
processes?

a) Aside from the items of an RFP, giving a high evaluation to a vendor who is familiar
with the current system to select that vendor easily
b) Establishing processes of selection such as setting evaluation standards or weighting
rules of conformity to the requested items
c) Issuing unofficial agreements to all vendors to whom the RFP has been presented and
requesting them to prepare a contract and a statement of work to accelerate the
conclusion of the contract after the vendor selection
d) Preparing a bailout for a vendor who received a high evaluation on the response to the
RFI, in case it fails in the selection

Q66. A company has products that are at the peak of profitability and sales. As a result, many
competitors develop similar products to the market. Therefore, a company must develop
new products to meet new demands and market opportunities. Which of the following is a
state of such events in the product life cycle?

a) Decline stage b) Growth stage


c) Introduction stage d) Maturity stage

– 21 –
Q67. Which of the following is an explanation of benchmarking that is used for corporate
management?

a) It refers to a qualitative and quantitative understanding of a company’s own products,


services, and operation through comparison with those of competitors or advanced
companies.
b) It refers to drastically reforming the quality and structure of a company by redesigning its
business processes from a customer viewpoint and by taking full advantage of
information technology.
c) It refers to the ability to plan and manage the allocation of company-wide management
resources in an effective and integrated manner and to achieve an improvement in
management efficiency.
d) It refers to the concentration of management resources on the unique skills and
technologies of a company that can generate profit and that are superior to those of other
companies.

Q68. Which of the following is a business management technique that is used to develop
specific targets and measures to implement a planned strategy, in consideration of the
appropriate mutual relationships among four perspectives (i.e., financial, customer, business
process, and learning and growth)?

a) Balanced scorecard b) Growth matrix


c) Product portfolio management d) SWOT analysis

Q69. Which of the following is the purpose of SCM?

a) To construct favorable customer relationships through unified management, including


customer information, purchasing history, and complaints, and also through meticulous
customer response
b) To improve management efficiency through integrated management of all information
concerning core business operations such as production, sales, inventory, and accounting
c) To improve the efficiency of sales activity through unified management of customer
information, business meeting schedules, and business meeting status including progress
status
d) To reduce costs and shorten delivery periods through integrated management of
information across multiple companies or organizations from procurement to sales

– 22 –
Q70. Which of the following is an explanation of the IoT (Internet of Things)?

a) It refers to a form of electronic commerce carried out over the Internet, consisting of a
typical C to C transaction by which a seller posts a product’s name, photo, minimum
selling price, and other information on a website, after which the bidder that offers the
highest amount within the time limit becomes the successful bidder.
b) It refers to data centers designed for the connection to the Internet, with server operation
failure prevented through the implementation of measures including quality management
of communication lines, server maintenance, air conditioning, and power source-related
countermeasures against power interruptions and outages.
c) It refers to Internet advertising such as a banner advertisement that displays an image,
with a link to an advertiser’s website, or an e-mail advertisement that publicizes an
advertiser’s website.
d) It refers to the installation of communication functionality to various objects, in addition
to information and communication devices, and enabling automatic recognition or
remote measurement by connecting these to the Internet, to achieve high-level decision-
making services and automated control through the collection and analysis of large
volumes of data.

Q71. Which of the following is an explanation of a smart grid?

a) It is a system that aims at the utilization of recyclable energy, supply of stable electric
power, and optimum demand adjustment through the integrated control of power
generation and power consumption on the basis of communication and information-
processing technology.
b) It is a system that can provide ideal health advice to each individual by performing
analysis on the basis of similar case reports such as the result of health examinations and
medication use.
c) It is a system that can search for information on restaurants and entertainment, send and
receive traffic information, and communicate the current position at the time of an
emergency by using information-processing equipment installed in vehicles.
d) It is a system that supports varied work styles by enabling mutual communication
between workers with varied working styles, such as home-based employees and senior
workers.

– 23 –
Q72. Which of the following is an explanation of CAD?

a) Evaluating product performance and functions using computers, without using the actual
product to perform testing or experimentation
b) Using a computer to convert product design drawings to process design information, and
support automation of machine processing, etc.
c) Using a computer to create product design drawings from attribute data concerning
product shape, composition, etc.
d) Using a computer to derive the required volumes and timing of materials from a
production schedule, a BOM (bill of materials), inventory volumes, etc.

Q73. Which of the following is an explanation of an e-marketplace?

a) It is a method in which many sellers and buyers meet in a market set up on the Internet
and trade directly without an intermediate distributor.
b) It is a method that aims for overall optimization from material procurement to product
distribution by sharing information such as ordering, inventory, sales, and logistics
between a company and its business partners.
c) It is a method that converts information concerning business transactions into a
standardized format and electronically exchanges data such as estimation, ordering,
shipment and delivery, and payment between companies.
d) It is a method that runs a sales promotion campaign on the Internet and then draws
customers to a real store to encourage them to make purchases.

Q74. Which of the following is a characteristic of an IC tag (RFID)?

a) It handles a large amount of information. Thus it uses an external storage device for
storing information.
b) It is stain-resistant, and recorded information can be read from the outside of the
package.
c) It is used by inserting the tag into a dedicated magnetic reader.
d) It uses GPS to display location information or attribute information about the current
location.

– 24 –
Q75. Which of the following is an officer whose primary responsibility is the security of a
company’s information and data?

a) CCO b) CIO c) CISO d) COO

Q76. Which of the following is a method of education and training in which trainees engage
in simulated business activities, interact with other people to develop experiences, and try
out different strategies?

a) Case study b) Debate c) In-basket d) Roll-playing

Q77. When the weather tomorrow is sunny with 30% probability, cloudy with 50%
probability, and rainy with 20% probability, which of the following strategies offers the
highest expected value?

(Unit: Value)
Sunny Cloudy Rainy
Strategy S1 +80 +20 −40
Strategy S2 +60 +10 −10
Strategy S3 +40 +30 −20
Strategy S4 +50 +15 −15

a) S1 b) S2 c) S3 d) S4

– 25 –
Q78. The following inventory statement of Build-Up Property Company describes the status
of the company’s inventory since the beginning of the year 2014. When the company uses a
first-in-first-out (FIFO) method for inventory asset valuation, what is the inventory value at
the end of the year 2014?

Build-Up Property Company


Inventory Statement
For the year ending December 31, 2014
Units Unit Price Value
Beginning inventory, January 1, 2014 100 10 1,000
Net Purchases
Purchase #1 500 14 7,000
Purchase #2 400 12 4,800
Cost of goods available for sale
Total sold units 400
Ending inventory, December 31, 2014 ?

a) 7,080 b) 7,600 c) 7,800 d) 8,000

Q79. Which of the following is the type of financial statement that shows a company’s
assets, liabilities, and shareholders’ equity at a particular point of time?

a) Balance sheet b) Statement of cash flows


c) Statement of changes in equity d) Statement of profit or loss

Q80. When a single-license software package is purchased by a company, which of the


following is an activity that is usually permitted in conformity with the concept of the
WTO’s Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)?

a) Installing the software package on a large number of computers that are used for the
company’s business
b) Making a backup copy of software for limited purposes, such as the licensee’s personal
use or a temporary copy for maintenance
c) Modifying the software package for the company’s internal use and using it on a large
number of computers within the company
d) Placing the software package on the company’s internal website so that staff members
can download and install it

– 26 –

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy