2012S IP Question
2012S IP Question
2012S IP Question
(1)
IT Passport Examination
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely
and neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. In which month is the spring IT Passport Examination conducted in 2012?
Since the correct answer is “b)” (April), mark your answer sheet as follows:
[Sample Answer]
Q1 A ウ C D
– 1–
Company names and product names appearing in the examination questions are trademarks or
registered trademarks of their respective companies. Note that the symbols ® and ™ are not used
within.
– 2–
Answer questions Q1 through Q34 concerning technology.
Q1. In the worksheet of spreadsheet software shown below, rows 1 through 4 are sorted in
ascending order by using the last (or low order) two digits of each numeric value in
column A. When the numeric values of column B that are calculated from those of
column A are used as sort keys, which of the following is the appropriate calculation
result to be entered into column B?
A B
1 123411
2 156711
3 119813
4 123815
Q2. When a path goes from node A1 to node C2 in Fig. 1 and the passing nodes are counted
as shown in Fig. 2, it is found that there are three shortest paths with the minimum
number of passing nodes. How many shortest paths are there available to go from
node A1 to node D4 via node C2?
a) 6 b) 9 c) 12 d) 20
– 3–
Q3. Which of the following is an appropriate purpose of appending a check digit to a
customer code?
a) EUC enables users to directly access, reference, and manipulate data that they need
for business operations.
b) EUC gives priority to system operation and maintenance, so it causes backlogs to
increase in the information systems department.
c) EUC requires more development staff members in the information systems
department, so it often leads to an increase in the operating costs of the department.
d) EUC allows the information systems department to take a leadership role in
application development, so it can reduce the workload of users.
Q5. The procedure described below is sequentially performed for two variables x and y,
starting with step (1). When the procedure is completed, what is the resulting value of
x?
[Procedure]
(1) Assign 2 to x and 3 to y.
(2) Subtract 1 from the value of y, and assign the resulting value to y.
(3) Add the values of x and y, and assign the resulting value to x.
(4) If the value of y is 1, complete the procedure. Otherwise, return to step (2).
a) 4 b) 5 c) 7 d) 8
– 4–
Q6. Which of the following refers to an XML-based document format that is used for
efficient information collection and distribution on Web sites such as a blog, a news site,
or an electronic bulletin board, and is also used for describing metadata such as page
header, abstract, and update time in a structured form?
a) The cache memory that is integrated into a CPU is used to virtually extend the
capacity of the main memory.
b) A CPU is equipped with the arithmetic and logical unit that should serve as part of
control functions.
c) A CPU is categorized as a 16-bit, 32-bit, or 64-bit CPU depending on the data
volume processed at a time, but the width in bits is not related to the performance.
d) For CPUs that have the same architecture, the higher the clock frequency, the faster
the response time.
a) Some peripheral devices with low power consumption can receive power through a
USB cable without any additional power supply.
b) All peripheral devices connected to the USB port of a PC must be turned on before
the PC is powered on.
c) The data is transmitted in parallel over multiple data lines, in order to achieve high
speed data transfer.
d) The USB interface is suitable for a low speed peripheral device, such as a keyboard
or a mouse, rather than a high speed device like a hard disk.
– 5–
Q9. Which of the following is used for image sensors in digital cameras?
Q10. Which of the following is the interface that enables a PC and its peripheral devices to
be connected in the configuration shown in the diagram below? Here,
represents a hub.
Q11. Among the system configurations shown below, which of the following has the lowest
probability of causing the entire system to stop at the occurrence of a failure? Here,
represents an identical device. When the devices are connected in parallel,
only one device must be running, and when the devices are connected in serial, all
devices must be running.
a) b)
c) d)
– 6–
Q12. When a computer is installed under the conditions below, which of the following is an
appropriate graph to represent the relationship between the number of years of use
(horizontal axis) and the monthly costs (vertical axis)?
[Conditions]
(1) Computer costs
• For the initial five years, an amount that is calculated from a lease rate based
on the cost of purchasing the computer is paid in fixed monthly installments.
• From the sixth year on, an amount that is calculated from a lease rate based on
one tenth (1/10) of the cost of purchasing the computer is paid in fixed monthly
installments.
(2) Maintenance costs
• From initial installation, the maintenance fee is paid to a maintenance service
provider in fixed monthly installments.
a) b)
Monthly costs
Monthly costs
0 1 2 3 4 5 6 0 1 2 3 4 5 6
Number of years of use Number of years of use
c) d)
Monthly costs
Monthly costs
0 1 2 3 4 5 6 0 1 2 3 4 5 6
Number of years of use Number of years of use
– 7–
Q13. The graph below shows the relationship between the failure rate “λ(t)” of the devices
comprising the system and the time “t ” elapsed since the start of use. Which of the
following is a device that is expected to show the greatest increase in the failure rate
during the wear-out failure period?
λ(t)
t
Early Random Wear-out
failure failure failure
Q14. When a PC is powered on, which of the following is first activated to access a hard
disk or other bootable media before the OS is started?
a) BIOS b) POST
c) MBR d) Disk driver
– 8–
Q15. When print processing is executed using an application program such as word
processing software or spreadsheet software, there is a method that allows data for
printing to be stored temporarily on the hard disk without direct output to the printer,
and allows actual printer output to be performed by a dedicated program. Which of
the following is the advantage of separating actual printer output from application
execution in this way?
a) The time from the start of application execution until the end of printing can be
reduced.
b) The modification of a document that contains a large number of images becomes
possible.
c) The processing volume per unit time increases.
d) The font can be changed easily at the time of printer output.
Q16. In the description below concerning a file system, which of the following is an
appropriate combination of terms to be inserted into blanks A through C?
When files and directories on a PC are managed hierarchically, the directory at the
highest level is called the A directory, and the directory that a user is now
manipulating is called the B directory. A notation format that uses the
B directory as its starting point and shows the location of a file or a
directory is called a(n) C path.
A B C
a) current root absolute
b) current root relative
c) root current absolute
d) root current relative
Q17. When the log file of a Web server is analyzed as a part of daily system administration,
which of the following can be found?
A B C D E
1 Sales tax rate 1 Sales tax rate 2
2 Tax rate 0.1 0.2
Product Before-tax
3 Tax-inclusive price 1 Tax-inclusive price 2
name price
4 Product A 500 550 600
5 Product B 600 660 720
Q19. Which of the following is an appropriate description concerning the symptom and its
measures to be taken at the occurrence of file fragmentation?
a) Since more files are accessed simultaneously and the seek operation of the hard disk
takes more time, the efficiency of file access drops. The measure to be taken is to
store the simultaneously accessed files close together in the hard disk.
b) Since the recycle bin is full and an old file in the recycle bin is removed physically
each time a file is created or deleted, the efficiency of file access drops. The
measure to be taken is to remove the files in the recycle bin all together.
c) Since small separated areas, instead of a single contiguous area, are allocated when a
file is created, the efficiency of file access drops. The measure to be taken is to
reallocate contiguous areas to files and unused space.
d) The data area for files is large enough, but the control area for files is not sufficient
and it takes time to allocate the control area when a file is created. The measure to
be taken is to combine multiple files into one or to expand the control area.
– 10 –
Q20. Candidates for operating a new business are selected from all of the employees based
on the conditions below. When a decision table is used to represent the selection
process, which of the following is the appropriate “conditions table” to be inserted into
the decision table?
a) b)
N N Y Y N Y N Y
Y N N Y Y N N –
– Y N – – Y N –
c) d)
Y N N Y Y Y Y N
Y Y N N Y N N –
– – N Y – Y N –
– 11 –
Q21. In a company which has its offices dispersed in several buildings, it is decided to
construct a relational database to manage the locations where PCs are installed.
“Asset” table, “Room” table, and “Building” table are created, and these tables are
linked. When new data is entered, data in the table to be referenced should exist
beforehand. Which of the following is the appropriate sequence of entering data into
each table? Note that the underlined items in each table indicate the primary keys or
the foreign keys.
Asset
PCNo BuildingNo RoomNo ModelName
Room
BuildingNo RoomNo RoomName
Building
BuildingNo BuildingName
– 12 –
Q22. Which of the following is an appropriate explanation of the table obtained when the
SELECT statement shown below is executed?
Products Sales
Product_code Product_name Unit_price Customer Product_code Sales_volume
A5023 Shampoo 500 Company K A5023 100
A5025 Rinse 400 Store S A5023 150
A5027 Soap 100 Company K A5025 120
Company K A5027 100
Store S A5027 160
a) A table with 3 rows and 2 columns containing total sales grouped by product code is
obtained.
b) A table with 1 row and 1 column containing total sales for all products is obtained.
c) A table with 2 rows and 2 columns containing total sales for each customer is
obtained.
d) A table with 15 rows and 2 columns containing a list of sales grouped by customer
and by product code is obtained.
– 13 –
Q23. When a database is used, the execution of a function that can update information
during search may cause data inconsistencies in the database. Which of the following
is an appropriate function to prevent this situation?
Q25. Which of the following prevents unauthorized external access by using packet filtering
at the connection point between a company’s internal network and the Internet?
a) It optically reads data such as picture and text and then converts it into digital data.
b) It converts analog signals to digital signals and vice versa.
c) It controls the communication path of data and relays data across networks.
d) It archives and provides data of Web pages by using networks.
– 14 –
Q27. Which of the following is an appropriate description concerning a cookie used in the
Web?
a) It is a standard that can be used for formatting the layout of an HTML document in
detail.
b) It is the HTTP protocol to which an encryption function is added for private
communications over the Internet.
c) It is a mechanism where a Web server interacts with external programs to create Web
pages dynamically.
d) It is a mechanism where information from a Web server is temporarily saved in a
browser that accesses the Web server.
Q28. Which of the following is a system configuration that introduces Internet technology
into a company’s information and telecommunication system and is used for
information sharing and business support?
Q29. A PC was checked for computer viruses, and a certain number of infected files were
discovered. Which of the following is an appropriate course of action that should be
taken by the person who found the infected files?
a) Contacting the recipients to whom the files infected by an unknown virus were
forwarded, after identifying the virus so that they can take corrective action
b) Forwarding the infected files to the system administrator by e-mail so that the
administrator can promptly take measures
c) Disconnecting the infected PC immediately from the network in order to prevent
other PCs from being infected
d) Enabling the write protection of removable media that were used for a day-old
backup in order to prevent other files from being infected
– 15 –
Q30. There exists a model of communication from A to B based on public key cryptography
as shown below. Which of the following is an appropriate description concerning this
model?
The message sent by A is used to generate a message authentication code. This
authentication code is encrypted using A’s private key to generate a bit string that is
sent to B by e-mail along with the original message.
B obtains A’s public key from a trusted organization, and in addition to decrypting
the received bit string, B generates the message authentication code from the
received message to verify that both codes are the same before the message is used.
a) The security policy of a company is intended to define what should be set for each
security system, so its contents vary depending on the security-related product to be
installed.
b) The security policy of a company provides guidelines on the action and judgment to
be followed and does not cover the stance and direction on security measures.
c) It is desirable for top management of a company to disclose the vulnerability of the
information system that forces the company to create the security policy.
d) It is necessary to clarify the vision about the action and judgment to be followed to
achieve the target security level.
– 16 –
Q32. Which of the following is the term that refers to the act of setting up a bogus Web page
imitating a bank, a credit card company, or other organization, and tricking a user with
an e-mail disguised as an official message from the financial organization or a public
organization in order to guide a user to the bogus Web page and steal personal
information such as the personal identification number and credit card number?
Q34. Which of the following is a method that may cause a mail server to go down by
sending a large number of unsolicited e-mails to a lot of e-mail users in a short period
of time with the aim of advertising or selling goods or services?
– 17 –
Answer questions Q35 through Q56 concerning management.
Q36. In a DFD of sales management, which of the following is the data store that represents
“product inventory”? Here, each process corresponds to one of “inventory
allocation”, “order receipt”, order backlog”, “shipment”, and “order placement”.
(1)
Customer
(2)
Order
received (3)
Deliver of
Products
Supplier
Delivery
Instructions
Order backlog
(4)
– 18 –
Q37. When system administrators participate in a system test in cooperation with the
information systems department, which of the following is test data that should be
prepared in advance?
Q38. When word processing software, spreadsheet software or other application software is
installed on multiple PCs, which of the following is an appropriate point to be
considered by the system administrator?
Q39. Before migration, a newly developed online ordering management system is operated
in parallel with the existing system for two months. During that period, data is
entered into both systems, and output is checked. After parallel operation is started,
processing is initially smooth. However, just before migration to the new system, it is
discovered that response time increases if a large amount of data is entered into the
new system at a time. Which of the following is the test that is considered to be
insufficient as a cause of delay in discovering this problem?
– 19 –
Q40. Which of the following is an appropriate description concerning the characteristic of
prototyping that is a software development method?
a) The phases of basic planning, external design, internal design, program design,
programming, and testing are conducted sequentially, so the entire project can be
overviewed and it is easy to make the schedule and allocate resources.
b) A trial model is created at an early stage of system development, so perception gaps
and ambiguities between the user department and the development department can
be eliminated early.
c) Software is divided into two groups with and without the possibility of specification
changes, and then the processes of programming, review, and change are repeated
for the group with the possibility of changes. .
d) A large-scale application is divided into highly independent parts, and the phases of
design, programming, and testing are repeated part by part while the development
scope is expanded gradually.
Q41. Which of the following is the most appropriate description concerning the role of the
user department in large-scale system development?
– 20 –
Q42. There exist 50 work items, each having an equivalent workload, and a plan is made to
complete them in 10 days. However, at the end of the 5th day, only 20 items are
completed. If the delay in progress is to be represented as the difference between the
originally planned completion date and actual completion date for the work items that
are currently completed, how many days is the delay?
a) 1 b) 2 c) 3 d) 4
Q43. Company A in the manufacturing industry uses an NC machine tool to perform four
tasks A through D. The setup time between each task is as shown in the table below.
When the four tasks are performed so that the total setup time can be minimized, how
long is the total setup time in hours? Here, the tasks can be carried out in any order,
and the setup time between FROM and TO can be used for evaluation; for example, the
setup time from task A to task B is 2 hours.
Unit: hour
TO
Task A Task B Task C Task D
FROM
Task A – 2 1 2
Task B 1 – 1 2
Task C 3 2 – 2
Task D 4 3 2 –
a) 4 b) 5 c) 6 d) 7
a) The deepest level of detail of the component breakdown is the level that enables
more accurate project planning and cost estimation.
b) The deepest level of detail of the component breakdown is always the same level
regardless of the project scale.
c) The depth of the component breakdown is always the same depth for all component
deliverables.
d) The deeper the level of the component breakdown is, the higher the level of the
work efficiency becomes.
– 21 –
Q45. Five staff members with the same productivity are assigned to an activity that takes 20
days. Immediately before the start of the activity, three members have influenza and
are replaced by new members. When the new members’ productivity is 60% of the
original members’, what is the minimum number of new staff members that is needed
to complete the activity in 20 days or less?
a) 4 b) 5 c) 7 d) 9
Q46. In the arrow diagram shown below, Activity B is completed three days behind schedule.
In order to reduce the end-to-end delay to only one day, which activity should be
reduced by how many days?
– 22 –
Q47. Which of the following is the most appropriate description concerning the development
budget of a project?
a) A development plan is based on the total development budget, so the plan should not
be made by adding up the estimated costs of individual tasks.
b) The difference between the development budget and the actual cost should be
monitored, and then the plan should be reviewed and changed as necessary.
c) The development budget relates to the procurement of direct materials, so it should
not include the labor cost for the staff members who participate in the project.
d) A detailed estimate should be made using the FP (Function Point) method,
regardless of whether or not there is a similar project.
Q48. Which of the following is an appropriate description concerning the critical path in a
system development project?
a) When additional staff members are assigned in order to recover from a delay in
development, priority is given to activities on non-critical paths.
b) If an activity on the critical path is completed three days ahead of schedule, the
project is also completed three days earlier than expected.
c) If an activity on the critical path is delayed, completion of the project is also
delayed.
d) There exists only one critical path irrespective of the size, duration, or complexity of
the project.
– 23 –
Q49. Which of the following is the most appropriate description concerning system
operations?
a) There are many cases where problems and failures relating to system operations
cannot be realized until they actually occur, so it is better to take measures after
occurrence than to take proactive measures.
b) In order to perform system operations smoothly, it is preferable to strengthen the
authority of an operator and entrust the operator with a proper judgment relating to
the handling of a failure.
c) In order to perform system operations efficiently and effectively, it is better to
perform operational tests within the operations department than to request
participation from the development department and the user department.
d) Changes may occur after the system is put into full operation, so it is preferable to
define the standard of change management beforehand in order to ensure that all
changes are made in a controlled manner.
– 24 –
Q50. Mr. M was asked to prepare a management list of hardware, so he proposed a
management method using the table shown below.
• When a PC is purchased, a single entry including both the PC and its peripheral
devices is recorded in the list.
• When peripheral devices are purchased individually, an entry is recorded for each
device.
• A unique ID number sticker is attached to every device to be managed.
This method has a possibility that not all devices, including peripheral devices, can be
checked against the list. Which of the following is appropriate advice or guidance for
Mr. M?
– 25 –
Q52. Which of the following is the appropriate use of a security cable (or security wire)?
Q53. Which of the following is the device that can cope well with a momentary loss of
electric power and can also supply alternative electric power for the period of time
required to shut down the system in the event of a power failure?
a) AVR b) CVCF
c) UPS d) Private power generator
Q54. As a result of the system audit on personal information protection, the sales department
is notified that a list of customers which is generated by an information system is not
handled properly in accordance with company-wide rules. Who is responsible for
making an improvement plan based on this notification?
Q55. When a function for internal control is established, which of the following means that
the distribution of roles and the authority of management are clarified?
– 26 –
Q56. Which of the following is an appropriate description of internal control?
a) A process that is performed by all persons within a company in order to ensure the
effectiveness and efficiency of business operations, reliability of financial reporting,
compliance, and safeguarding of assets
b) A process where a manager who is entrusted with business management raises funds
from a financial institution and buys shares from the shareholders of a parent
company in order to obtain a controlling interest
c) An approach to both work and personal life outside of work where an attempt is
made to sacrifice neither work nor personal life and to keep a good balance between
both of them in a fulfilling way
d) A measure taken by an organization in order to achieve the target of organizational
activities, and a method that aims for the optimization of business activities and
systems
– 27 –
Answer questions Q57 through Q88 concerning strategy.
Q57. Which of the following is the term that refers to the description below?
Establish and take a course of action, investigate the result, and if the expected result
is not obtained, reflect upon the cause and utilize the conclusion in the next task.
a) AIDMA b) PDCA
c) SWOT d) Brainstorming
Q58. Company A, in the manufacturing and sales industry, sells 30 products. Based on an
ABC analysis, products are to be narrowed down and then sales promotion is to be
performed for those products with high total sales. The table below shows total sales
by product. How many products are contained in “A group” that is subject to the
sales promotion? Here, “A group” represents approximately 70% of the company’s
total sales.
Unit: $1,000
Product Product Product Product Product Product Product Product Product Product
Other Total
1 2 3 4 5 6 7 8 9 10
182 136 120 120 98 91 83 80 65 35 290 1,300
a) 7 b) 8 c) 9 d) 10
– 28 –
Q59. The graph below shows the total sales transition over the past five years for a product
that was released by Company A five years ago. Which of the following is an
appropriate description concerning the analysis of the total sales?
a) Sales are expected to increase in the future, because the product is continuously
improved and brought to the market.
b) The product was released too early, so it was not initially well received by the
market. However, sales are expected to increase in the future.
c) Sales increased rapidly during the initial phase after the release, and after that, sales
grow at a sluggish pace.
d) Sales did not increase during the initial phase after the release, but then increased
rapidly for a while. After that, sales grow at a sluggish pace.
– 29 –
Q61. The table below shows the monthly sales of a particular product at a retailer that sells
approximately 200 types of products. The product is replenished during the
beginning of each month according to the inventory quantity checked at the end of the
previous month. Which of the following is the appropriate order placement method
for this product? Here, the sales ranking is determined as the ranking of the product
when all the products are ranked by the amount of sales.
Quantity Month-end
Amount of sales Sales
Month replenished inventory
(dollars) ranking
this month quantity
January 50 45 100 150
February 0 25 400 90
March 10 0 700 45
April 50 0 1,000 23
May 100 5 1,900 8
June 200 20 3,700 3
a) The product shows stable sales, so a fixed quantity of the product should be ordered
at regular intervals.
b) The product shows a large fluctuation in sales, so a fixed quantity of the product
should be ordered only when the inventory becomes low.
c) The product is becoming a main product, so the quantity to be ordered should be
adjusted based on sales forecast with caution to avoid excessive inventory.
d) The product shows stable sales over a long term, so the quantity based on a
six-month sales forecast should be ordered at regular intervals.
– 30 –
Q62. A sales company records customer complaints in a complaint log. Which of the
following is an appropriate analysis material that is first created to reduce the number
of complaints?
a) Complaints are categorized, and the number of complaints is counted for each
category item. A Pareto chart is created using the category items and the number
of complaints as the axes.
b) The number of complaints is counted for each day of the week when a complaint is
received. A scatter diagram is created using the days of the week and the number
of complaints as the axes.
c) Regions of customers are categorized, and the number of complaints is counted for
each region. A histogram is created using the region categories and the number of
complaints as the axes.
d) Complaints that took long to respond are extracted into a list. Complaint items are
entered in the list so that the corresponding pages of the original complaint log can
be identified.
Q64. Among actions concerning the creation of a computer program, which of the following
is a copyright violation?
a) Creating another Web page by using the source of HTML that was downloaded from
the Internet
b) Creating a program based on an idea that was discussed on a bulletin board on the
Internet
c) Creating a program to increase a company’s operational efficiency by using a
program that was created during one’s school days
d) Creating a program based on a flowchart that was shown in a purchased book
– 31 –
Q65. Which of the following is an international book code?
a) A product having few customer complaints and a high level of customer satisfaction
b) A product that a company produces without outsourcing manufacturing
c) A product designed and manufactured using CAD and CAM
d) A product utilizing materials and components of high quality
– 32 –
Q68. Product portfolio management is a method for analyzing the positioning of a product
within the market and reviewing the resource allocation. It uses a matrix chart
divided into four quadrants, with the market growth rate on the vertical axis, and the
market share on the horizontal axis. Which of the following refers to a product that is
categorized into the quadrant for low market growth rate and high market share?
Q69. Which of the following is an explanation of affiliate that is one of the advertisement
methods on the Internet?
Q70. Which of the following is an explanation of the maturity stage in the product life cycle?
– 33 –
Q71. Which of the following is a method for analyzing the behavior of a visitor based on
information such as the number of accesses to a Web site and the browsing history
within the Web site?
Q72. There are two types of performance indexes: one to evaluate the achievement level of a
goal and the other to evaluate the method for achieving a goal. When the goal is to
“improve the English ability of employees,” which of the following is an appropriate
index to represent the achievement level of this goal?
– 34 –
Q74. Which of the following is an appropriate description concerning a technology
roadmap?
a) It organizes the transition of past technology and does not show future trends.
b) It is created for the technology strategy of a company or an industry and is not
created by a government or an administration.
c) It represents milestones in technology development, and no review based on market
trends is carried out.
d) It shows a technology development strategy based on an enterprise strategy, and is
intended to be understood not only by engineers but also by other people.
Q75. Which of the following is an appropriate explanation of the POS terminal (or POS cash
register) in a supermarket and other such places?
a) It is a terminal of the system used for collecting and managing information such as
the product code and price at the time of a sales transaction (at the “Point of Sale”).
b) It is a terminal of the “Purchase Order System”, and is mainly used to automate
purchase orders for the replenishment of products.
c) It is a terminal of the strategic product management system developed for
monitoring the “Probability of Survival” of such products.
d) It is a terminal of the inventory management system first manufactured in “Port of
Spain”, and it holds an overwhelming market share.
– 35 –
Q76. Which of the following is the most appropriate explanation of ERP (Enterprise
Resource Planning)?
Q77. Among e-commerce categories, which of the following corresponds to the concept of
“B to C” transactions?
a) CALS b) Web-EDI
c) Virtual companies d) Virtual malls
– 36 –
Q79. Which of the following is the situation where an improvement can be expected by
installing an MRP (Material Requirements Planning) system?
a) Drawing information is managed using electronic files and hard copies, so the
design change history cannot be accurately known.
b) Information concerning materials necessary for manufacturing and their required
quantities is insufficient or incorrect, so production is being adversely affected.
c) There are too many design change requests, so production efficiency does not
improve.
d) High-mix, low-volume production is adopted, so the cost of installing production
equipment is increasing.
Q80. When the spreadsheet shown below is converted into CSV format, which of the
following is an appropriate list of data that is generated by spreadsheet software?
Here, records are separated by the carriage return code “CR”. The expression in a cell
is automatically recalculated, and the resulting value is written back into that cell.
Although the entered expressions are shown in row 3 and column C below, the
resulting values are actually displayed on the screen.
A B C
1 2 7 A1+B2
2 6 4 A2+B1
3 A1+A2 B1+B2 C2+B3
C C C
a) 2 , 6 , 8 R 7 , 4 , 11 R 6 , 13 , 24 R
C C C
b) 2 , 6 , 8 R 7 , 4 , 11 R 9 , 10 , 19 R
C C C
c) 2 , 7 , 6 R 6 , 4 , 13 R 8 , 11 , 24 R
C C C
d) 2 , 7 , 9 R 6 , 4 , 10 R 8 , 11 , 19 R
– 37 –
Q81. Which of the following is an appropriate explanation of a banner advertisement that is
one of the Internet advertisements?
a) In order to understand the current status of business operations, the opinions of third
parties rather than staff members involved in the operations should be considered.
b) In order to make a computerization plan, more attention should be paid to “how to
do it” rather than “what to do”.
c) After the final decision on the hardware configuration of an information system, the
methodology of computerization should be investigated.
d) In order to evaluate a computerization plan, not only the occurrence of new
problems but also investment effect and feasibility should be considered.
– 38 –
Q84. During business system development, it is effective to collect the meaning and usage of
language (such as words, terms, and phrases) used in the target business operations and
to create a glossary for smooth communication between users and developers, and
between developers themselves. Which of the following is an appropriate description
concerning the handling of this glossary?
a) The glossary should be created and updated from an early stage of development.
b) The manual writer should create the glossary in the final stage of development.
c) The glossary is not necessary for small scale systems.
d) Only technical terms related to the target business operations should be collected.
Q85. As shown in the figure below, there exists a business process consisting of activities A,
B, and C. When an information system is installed to achieve improvement, what is
the percentage of reduction in the person-hours required for manufacturing a product in
comparison with before the improvement? Here, the arrows in the figure indicate the
sequence of the activities, and the person-hours are calculated by multiplying the
number of staff members by the working hours.
a) 15 b) 20 c) 30 d) 35
– 39 –
Q86. When the software lifecycle is divided into four processes consisting of planning,
requirements definition, development, and operation, which of the following is an
appropriate result of the planning process?
a) It takes too much time and cost to implement countermeasures against all possible
risks, so priority should be given based on the estimated amount of loss and
probability of occurrence.
b) For risks that are assessed with risk analysis, risk analysis should not be repeated
until all measures are completely implemented.
c) The purpose of risk analysis is to prevent loss in the future, so data that was
accumulated in similar projects in the past should not be referenced.
d) The purpose of risk analysis is to know the amount of loss caused by the occurrence
of a risk, and the cost of measures should be decided based on this amount of loss.
Q88. In the case of constructing a new system by either developing a new system or
adopting an existing package, when the initial investment amount, effect amount,
operational cost, and maintenance cost are as shown in the table below, which of the
following is the method for recovering the initial investment amount in the minimum
number of years?
– 40 –
Answer questions A through C, each of which has four questions.
Question A Read the following description concerning a contract for system development,
and then answer questions Q89 through Q92.
Company W manufactures everyday sundries and has a plan to construct a system for
managing sales (hereinafter referred to as sales management system) for business
expansion. Mr. G, a member of the system construction team, created an RFP under the
guidance of a supervisor and received a proposal from Company X. The overview of the
RFP and the proposal from Company X are as shown below.
In order to handle Company W’s important customer information, the necessary measures
are to be taken at the time of the conclusion of a contract.
[Overview of RFP]
System purpose: To manage an order from a customer for a manufactured
product from receipt of the order until shipment of the product
System requirements: The number of products to be managed is initially 2,000 with a
maximum of 5,000. The number of customers managed is
initially 500 with a maximum of 2,000. The maximum
number of orders placed per day is 200. An appropriate
software package suitable for the scale of Company W’s
activities is assumed to be used.
Delivery date: Within 6 months of order placement
– 41 –
[Strategy]
Q89. There is an insufficiency or omission in the overview of the RFP created by Company
W. Which of the following should be added to the RFP?
[Strategy]
Q90. The license for the database software is determined by the number of CPUs on the
servers that are running, and the license for a software package of sales management is
determined by a combination of the maximum number of products handled and the
maximum number of customers. Which of the following is an appropriate
combination of licenses that Company W should purchase?
– 42 –
[Strategy]
Q91. In order to allow Company X to use customer information directly during development
of the sales management system, which of the following should Company W do in
advance?
[Management]
Q92. Company W concludes a maintenance contract just after performing a receiving
inspection of the system delivered by Company X. If a failure occurs in the sales
management system in the next month, which of the following should Company W do?
a) Company W should investigate the cause of the problem and fix the problem
without any help from Company X even if the cause is a bug in the system
developed by Company X.
b) Company W should investigate the cause of the problem, and request that Company
X fix the problem for a fee if the cause is a bug in the system developed by
Company X.
c) Company W should request that Company X investigate the cause of the problem,
and have the problem fixed free of charge if the cause is a bug in the system
developed by Company X.
d) Company W should request that Company X investigate the cause of the problem,
and have the problem fixed for a fee if the cause is a bug in the system developed by
Company X.
– 43 –
Question B Read the following description concerning programming and testing, and then
answer questions Q93 through Q96.
[Processing details]
(1) Based on the desired number of tickets, determine if the conditions of purchase
are fulfilled. If the conditions of purchase are not fulfilled, set the total amount
to “– 1”.
(2) If the conditions of purchase are fulfilled, the total amount is calculated as shown
below based on the arguments that are passed.
Total = the desired number of adult tickets × 30
+ the desired number of child tickets ×10
(3) If a total of 20 or more tickets are purchased, subtract a 10% discount from the
total amount.
– 44 –
[Technology]
Q93. The flow of processing for the function is shown in Fig. 1. Which of the following is
an appropriate conditional statement to be inserted into blank A in Fig. 1?
a) 0 ≤ J ≤ 20 and 0 ≤ K ≤ 20
b) 0 ≤ J ≤ 20 or 0 ≤ K ≤ 20
c) 0 ≤ J + K ≤ 20
d) J > 20 and K > 20
– 45 –
[Management]
Q94. Table 1 below shows all combinations of conditions and their processing that are
organized in order to test the function. Which of the following is an appropriate
combination of symbols to be inserted into blanks B and C in Table 1?
0 ≤ K ≤ 20 Y Y Y Y N N N N
J + K < 20 Y N Y N Y N Y N
Calculate total amount X X
Process
B C
a) X X
b) X −
c) − X
d) − −
– 46 –
[Management]
Q95. Table 2 below shows part of the test data that is prepared in order to test the function
and expected results. Which of the following is the combination of values to be
inserted into blanks D and E in Table 2?
…
Note: No value is shown in the shaded area.
D E
a) 540 540
b) 540 –1
c) 600 540
d) 600 –1
– 47 –
[Technology]
Q96. In order to make it possible to calculate the total amount for different types of tickets
such a one-day or two-day ticket, (2) of “Processing details” and “Specifications of the
function” are changed, and the argument M is added to represent the number of days of
a ticket. The number of days for which a ticket is valid is entered into M. The array
that defines the ticket prices by type is TP(M, N). N is set to 1 for an adult and 2 for a
child. The value of each array element is shown below. Which of the following is
the total amount in dollars when the arguments are J = 10, K = 20, and M = 2? Here,
the function references this array based on the arguments and determines the ticket
price.
– 48 –
Question C Read the following description concerning the creation of a Web page, and
then answer questions Q97 through Q100.
Mr. D, a PR staff member at the town N store of a supermarket chain, is working with Mr.
E, a staff member in charge of the Web site of the company’s headquarters, to create an
introduction page for the town N store. A questionnaire with a gift included is to be
implemented with the aim of increasing the number of visitors to the introduction page
for the town N store. Mr. D created a proposal for a gift page as shown in Fig. 1 and
consulted Mr. E.
Note: [ ] is an input area, is a button, and < > explains that a component to
be displayed or content to be displayed is omitted.
Mr. E checked the proposal for a gift page and gave the advice and instructions below to
Mr. D.
– 49 –
[Main instructions concerning creation]
(1) Creating the gift page in an HTML format file called “ank01.html”, and transferring
it to a specified directory on the Web server
(2) Using a relative path to specify a file
(3) Making the file size of each photograph that is used 200 KB or less
[Technology]
Q97. Mr. D considered the advice from Mr. E and decided to improve the design of the
proposal for the gift page shown in Fig. 1. Which of the following is an appropriate
improvement?
a) Placing the “Submit” button at the very top of the page so that the user does not
forget to press it
b) Using a check box so that the user can choose the “desired gift” with a click of a
mouse
c) Using a radio button for “Sex” so that the user can choose either “Male” or
“Female”
d) Placing questionnaire items on the assumption that the user responds to questions
sequentially from the top-right of the screen
[Technology]
Q98. Mr. D received permission from the manufacturer of the gifts, and decided to scan
photographs of the gifts from the manufacturer’s product catalog and then place these
images on the gift page. The photographs are scanned in a bitmap format at a size of
2 inches high × 3 inches wide and in 24-bit color. The images are then edited with
photo-retouching software.
When compression of an image with the photo-retouching software is not considered,
which of the following is the highest resolution in dpi (dots per inch) for the image
scanner that Mr. D can select in accordance with Mr. E’s advice or instructions?
– 50 –
[Technology]
Q99. In order to release the completed gift page to the public on the Web site of the
company’s headquarters, a link is placed on the site. When the page is published, the
implementation of a questionnaire that includes a gift is notified on the top page, with
the aim of increasing the number of visitors to the introduction page for town N store
and guiding visitors smoothly from the top page to the gift page. Which of the
following is the diagram that shows the most appropriate page structure?
A rectangular box “ ” in the diagrams represents one screen on the Web site, and
an arrow “ ” represents a link between pages.
a) b)
Top page Top page
Introduction Introduction
page for page for
town N store town N store
Gift page
c) d)
Top page
Introduction
page for
town N sotre
Gift page
– 51 –
[Technology]
Q100. Mr. D was instructed by Mr. E to transfer the completed “ank01.html” file to the
directory “store_n” on the Web server, and to transfer the data used on the gift page
such as photographs to the “image” directory before the release to the public. So,
Mr. D added a tag to display photographs to “ank01.html” so that the photographs of
the gifts are displayed correctly.
When the directory configuration and the file specification on the Web server are as
shown below, which of the following is a tag that is inserted into blank A to display a
photograph converted to the JPEG format (filename: s01.jpeg)? Here, the “img” tag
displays an image that is specified as src="filename".
[File specification]
(1) A file is referenced as “directory name\···\directory name\file name”, where the
directory names on the path are listed and separated with “\” in sequence,
followed by the file name.
(2) The current directory is represented by “.” (a period).
(3) The directory one level above is represented by “..” (two periods).
(4) When a reference begins with a backslash “\”, it is assumed that the root
directory is omitted from the beginning of the reference.
(5) When a reference does not start with “\”, “.” (a period), or “..” (two periods), it
is assumed that “ .\” for the current directory is omitted from the beginning of
the reference.
a) ..\..\image b) ..\main\image
c) .\image d) \www\main\image
– 52 –
Spreadsheet Software Functions and Terminology
The following defines the basic functions and technical terms of spreadsheet software.
In addition, when worksheet functions not described here, such as save, read, print, line creation, and graph
creation, are used, they are described in the exam question text.
1. Worksheets
(1) The work area that is composed of a grid of rows and columns is called a worksheet. A
worksheet has 256 columns and 10,000 rows.
(2) The position of each column and row in a worksheet is represented by a column letter and a row
number. The leftmost column letter is A, and all column letters are represented as A, B, ..., Z, AA,
AB, ..., AZ, BA, BB, ..., BZ, ..., IU, and IV. The uppermost row number is 1, and all row numbers
are represented as 1, 2, …, 10000.
(3) Multiple worksheets can be used. In this case, a unique name is assigned to each worksheet in
order to distinguish worksheets from one another.
– 53 –
(4) A null value is represented as null, and a cell that has a null value is called a blank cell. The
initial state of a cell is null.
(5) An expression can be entered into a cell. A cell holds the resulting value of an evaluated
expression.
(6) An expression is composed of constants, cell addresses, operators, parentheses, and functions. A
constant is a notation that represents a numeric value, a character string, a logical value, or a null
value. A cell address in an expression refers to the value held in the cell at that cell address.
(7) An expression can be an arithmetic expression, a character expression, or a logical expression.
An expression whose evaluation generates a numeric value is called an arithmetic expression, an
expression whose evaluation generates a character string is called a character expression, and an
expression whose evaluation generates a logical value is called a logical expression.
(8) When an expression is entered into a cell, it is evaluated immediately. When the value in a cell
that is referenced by an expression is changed, the expression is immediately re-evaluated.
4. Operators
(1) Unary operators are the plus sign “+” and the minus sign “−”.
(2) Arithmetic operators are addition “+”, subtraction “−”, multiplication “*”, division “/”, and
exponentiation “^”.
(3) Comparison operators are greater than “>”, less than “<”, greater than or equal to “ ≥ ”, less than or
equal to “ ≤ ”, equal to “=”, and not equal to “ ≠ ”.
(4) For grouping symbols, a pair of parentheses “( )” is used.
(5) When there are multiple operations and parentheses in an expression, the order of calculation is
prioritized as shown in the table below.
5. Copying of cells
(1) A value or expression in a cell can be copied into other cells.
(2) In a cell copy operation, when the source cell holds an expression containing a cell address, the cell
reference method that changes the cell address in the expression so that the difference in the cell
addresses of the source cell and destination cell can be maintained is called a relative reference.
In this case, the expression that is entered into the destination cell is the expression modified by
– 54 –
adding the difference in column letter and row number between the source cell and destination cell
to each cell address in the expression that is entered into the source cell.
Example: When the expression A1 + 5 in cell A6 is copied into cell B8, the expression B3 + 5 is
entered into cell B8.
(3) In a cell copy operation, when the source cell holds an expression containing a cell address, the cell
reference method that does not change either of or both the column letter and row number of the
cell address is called an absolute reference. A dollar symbol “$” is placed immediately before
either of or both the column letter and row number to which an absolute reference is applied.
Example: When the expression $A$1 + $A2 + A$5 in cell B1 is copied into cell C4, the expression
$A$1 + $A5 + B$5 is entered into cell C4.
(4) In a cell copy operation, when the source cell holds an expression that refers to another worksheet,
the name of the referenced worksheet does not change at the copy destination.
Example: When the expression Sheet1!A1 in cell A6 of the worksheet “Sheet2” is copied into
cell B8 of the worksheet “Sheet3”, the expression Sheet1!B3 is entered into cell B8 of
“Sheet3”.
6. Functions
The functions defined in the table below are available for use in an expression.
Format Description
Returns the sum of the values in a specified cell range.
SUM(cell range1)) Example: SUM(A1:B5) returns the sum of the values in the cell range
A1:B5.
AVG(cell range1)) Returns the average of the values in a specified cell range.
SAMPLE_STD_DEV Sample standard deviation: Returns the standard deviation of the sample
(cell range1)) values in a specified cell range.
POPULATION_STD_D Population standard deviation: Returns the standard deviation of the
EV(cell range1)) population values in a specified cell range.
MAX(cell range1)) Returns the maximum value in a specified cell range.
MIN(cell range1)) Returns the minimum value in a specified cell range.
Returns the value of expression1 when the value of the logical expression is
IF(logical expression, true, and returns the value of expression 2 when it is false.
expression 1, expression Example: IF(B3 A4, ‘Chicago’, C4) returns the character string
2) “Chicago”, if the value in cell B3 is greater than the value in
cell A4. Otherwise, the value in cell C4 is returned.
COUNT(cell range) Returns the number of non-blank cells in a specified cell range.
– 55 –
Returns the number of cells within a specified cell range that meet the
specified search condition. The search condition is described using a
combination of a comparison operator and an expression, and the value of
each cell contained in the cell range is evaluated using the specified
COUNTIF(cell range, comparison operator.
search condition) Example 1: COUNTIF(H5:L9, > A1) returns the number of cells in cell
range H5:L9 that hold a greater value than the value in cell
A1 .
Example 2: COUNTIF (H5:L9, = ‘ABC’) returns the number of cells in
the cell range H5:L9 that hold the character string “ABC”.
Integer: Rounds a value down to the maximum integer that is less than or
INT (arithmetic equal to the value of a specified arithmetic expression.
expression) Example 1: INTEGER(3.9) returns 3.
Example 2: INTEGER(−3.9) returns −4.
Modulo arithmetic: Returns the remainder after the value of arithmetic
expression 1 (dividend) is divided by the value of arithmetic expression 2
MOD(arithmetic (divisor). The equation below holds for functions MOD and INT.
expression 1, arithmetic MOD(x, y) = x − y * INT(x / y)
expression 2)
Example 1: MOD(10, 3) returns 1.
Example 2: MOD(−10, 3) returns 2.
Square root: Returns the non-negative square root of the value of a
SQRT(arithmetic
specified arithmetic expression. The value of the arithmetic expression
expression)
must be a non-negative numeric value.
AND(logical expression Returns true only when the values of logical expression 1, logical
1, logical expression expression 2, and all other logical expressions specified are true.
2, ...)2) Otherwise, it returns false.
OR(logical expression Returns true when the value of at least one expression out of logical
1, logical expression expression 1, logical expression 2, and all other logical expressions
2, ...)2) specified is true. Otherwise, it returns false.
NOT(logical Returns false when the value of a specified logical expression is true, and
expression) returns true when the value of the logical expression is false.
ROUNDUP(arithmetic Returns the value of a specified arithmetic expression that is rounded to the
expression, position) position specified. The function ROUNDUP rounds the value up,
ROUNDOFF(arithmetic ROUNDOFF rounds the value off, and ROUNDDOWN rounds the value
expression, position) down. Here, the position is the number of places as counted from left to
right with the first position being 0.
ROUNDDOWN
Example 1: ROUNDUP(−314.159, 2) returns −314.16.
(arithmetic expression,
Example 2: ROUNDUP(314.159, −2) returns 400.
position)
Example 3: ROUNDUP(314.159, 0) returns 315.
Treats the value of expression 1, expression 2, and all other expressions as
CONCATENATE a character string, and returns these as a single character string joined in
(expression 1, order of the arguments.
expression 2, ...) 2) Example: CONCATENATE(‘Chicago’, ‘Washington’, 123, 456) returns
the character string “ChicagoWashington123456”.
Returns the rank order of the value of a specified arithmetic expression in a
cell range in ascending order when the order option is 0, and in descending
RANK(arithmetic
1) order when the order option is 1. Here, if the same value occurs more
expression, cell range ,
than once in the cell range, these values are given the same rank order and
order option)
the subsequent rank order is set as this rank order plus the number of cells
in the same rank order.
Returns a uniform random number (real value) that is greater than or equal
RANDOM( )
to 0 and less than 1.
Table lookup: Counts each row and column from the top left position of a
TLOOKUP(cell range,
specified cell range as 1, 2, ..., and returns the value of a cell at the location
row position, column
specified using a row position and a column position.
position)
Example: TLOOKUP(A3:H11, 2, 5) returns the value of cell E4.
– 56 –
Vertical lookup: Scans the leftmost column of a specified cell range
vertically from top to bottom, and searches for the first row with a cell that
meets the search option. For the row found, counts each column from the
leftmost column of the cell range as 1, 2, ..., and returns the value of the
cell in the column specified by the column position.
VLOOKUP • When the search option is 0: searches for values that matches the
(expression, cell range, expression value.
column position, search • When the search option is 1: searches for the maximum value that is less
option) than or equal to the expression value. Here, the leftmost column must
be sorted in ascending order from top to bottom in advance.
Example: VLOOKUP(15, A2:E10, 5, 0) searches the leftmost column in
the cell range from cell A2 to A10. Under this condition, if the
value 15 is first found in cell A6, the value in cell E6 is returned,
which is located at the 5th column E in the same row as cell A6.
Horizontal lookup: Scans the top row of a cell range horizontally from
left to right, and searches for the first column with a cell that meets the
search option. For the column found, counts each row from the top row of
the cell range as 1, 2, ..., and returns the value of the cell in the row
specified by the row position.
• When the search option is 0: searches for values that matches the
HLOOKUP
expression value.
(expression, cell range,
• When the search option is 1: searches for the maximum value that is less
row position, search
than or equal to the expression value. Here, the top row must be sorted
option)
in ascending order from left to right in advance.
Example: HLOOKUP(15, A2:G6, 5, 1) searches the top row in the cell
range from cell A2 to G2. Under this condition, if the
maximum value less than or equal to 15 is first found in cell D2,
the value in cell D6 is returned, which is located at the 5th row 6
in the same column as cell D2.
1)
Notes: Values other than numeric values contained in the cell range that is passed as an argument
are not processed.
2)
One or more expressions can be passed as a list of arguments.
– 57 –