2013apr IP Question
2013apr IP Question
(1)
IT Passport Examination
Instructions:
1. Use a pencil. If you need to change an answer, erase your previous answer completely
and neatly. Wipe away any eraser debris.
2. Mark your examinee information and your answers in accordance with the instructions
below. Your answer will not be graded if you do not mark properly. Do not mark nor
write on the answer sheet outside of the prescribed places.
(1) Examinee Number
Write your examinee number in the space provided, and mark the appropriate space
below each digit.
(2) Date of Birth
Write your date of birth (in numbers) exactly as it is printed on your examination
admission card, and mark the appropriate space below each digit.
(3) Answers
Select one answer (a through d) for each question.
Mark your answers as shown in the following sample question.
[Sample Question]
Q1. In which month is the spring IT Passport Examination conducted?
Since the correct answer is “b)” (April), mark your answer sheet as follows:
[Sample Answer]
Q1 ウ
–1–
Answer questions Q1 through Q38 concerning technology.
Q1. In the sales campaign for a certain product, a full-page advertisement is run a total of
three times in three magazines A, B, and C. When the effects expected from running
a full-page advertisement zero to three times in each of the magazines are as shown in
the table below, how many times should the advertisement be run in magazine A to
gain the largest possible effect? Here, the effects of the advertisements placed in the
individual magazines are independent of one another, and the effects from multiple
magazines can be calculated by simply adding the individual effects.
a) 0 b) 1 c) 2 d) 3
Q2. Which of the following is the appropriate meaning of the units that are shown in the
specifications given in brochures or catalogs?
–2–
Q3. There is a standard that can represent data in a hierarchical structure by enclosing data
that corresponds to attribute N with the tags <N>, which means the start, and </N>,
which means the end, and then linking and nesting these tags. Company A decides to
comply with this standard and create a paper by using the structural rules (1) through
(3) below. Which of the following is the appropriate header of a paper named “New
Document Management” that is created by Jack Smith of the Information Systems
Department (I/S Department) in accordance with this standard and these structural
rules?
[Structural rules]
(1) A paper is composed of a header and a body text.
(2) The header is composed of a title and author information.
(3) Author information is composed of a name and a department.
a) <header>
<author info>
<title>New Document Management
<name>Jack Smith</name><dept>I/S Department</dept>
</title>
</author info>
</header>
b) <header>
<title>New Document Management</title>
<author info><name>Jack Smith</name></author info>
<dept>I/S Department</dept>
</header>
c) <header>
<title>New Document Management</title>
<author info>
<name>Jack Smith</name><dept>I/S Department</dept>
</author info>
</header>
d) <header>
<title>New Document Management</title>
<name>Jack Smith
<author info><dept>I/S Department</dept></author info>
</name>
</header>
–3–
Q4. Which of the following is an appropriate description concerning HTML?
a) It is a markup language that can specify the logical structure and layout of a Web
page by using tags.
b) It is a script language that can describe the program or processing steps executed on
a browser.
c) It is a communication protocol that is used between a browser and a Web server.
d) It is a markup language that enables users to describe the meaning and structure of
data by defining their own unique tags.
a) A document file that is transmitted from a Web site and saved onto the user’s PC
when the Web browser accesses the Web site
b) A language that is used for creating a Web page
c) A program that is downloaded from a Web server and embedded into a client
browser, and then executed in the browser
d) A language that is used for database manipulation such as data addition,
modification, deletion, and search
Q6. Which of the following is an appropriate characteristic of tree structure that is one of
data structures?
–4–
Q7. Which of the following is a DVD disc in which users can write data, but cannot rewrite
data?
a) DVD-R b) DVD-RAM
c) DVD-ROM d) DVD-RW
Q9. Which of the following is the correct comparison of the amount of data?
Q10. Which of the following is a characteristic common to IEEE 1394 and USB that are
often used for connection interfaces between PCs and peripheral devices?
a) Peripheral devices can be connected and disconnected while the PC and/or devices
are powered on.
b) A maximum transfer rate is 100 Mbits/second.
c) A unique ID needs to be assigned to each device connected to a PC.
d) Data can be transmitted in parallel over multiple data lines.
–5–
Q11. Among the functions of client management tools, which of the following is the most
effective function for detecting whether or not software unrelated to the business
operations is installed on client PCs?
a) The partial failure of a system often leads to a shutdown of the entire system.
b) It is difficult to expand the system in line with the expansion of functions or the
increase in the volume of work.
c) It is easy to protect data and ensure security.
d) From a viewpoint of operations management, it often becomes complex to operate
the entire system efficiently.
Q13. Which of the following is the system that receives a processing request from a terminal
via a network and sends back the result immediately?
–6–
Q14. What is the minimum amount (in Mbytes) of virtual memory that is required under the
conditions below?
[Conditions]
1. Memory required for the OS: 200 Mbytes
2. Memory required for applications: An amount of 50 Mbytes is required for each
application, and a total can be calculated by multiplying it by the number of
applications that run concurrently. Eight applications run concurrently.
3. Memory required for controlling main memory or other related functions: In
addition to 512 Mbytes of main memory, a minimum amount of 20 Mbytes is
required.
4. Required virtual memory: The required amount is the sum of the above items 1
through 3.
Q15. When a new program was added and executed on a server that has the virtual memory
function, a lot of swapping occurred and the performance of existing programs in
operation was decreased. In order to resolve this problem, which of the following is
the most appropriate method?
–7–
Q16. Company A plans to make a backup copy of the data on a server, which is used for
business operations, in preparation of future hardware failures. Which of the
following is an appropriate backup plan that satisfies the backup requirements shown
below?
[Backup requirements]
• When a server failure occurs, the data is to be restored to the state of business
operations that were completed on the day before the failure.
• Although the amount of data updated daily during business operations is very
small in comparison with all data, the amount of retained data is large, which
means that a lot of time is taken for a full backup. Therefore, a full backup
cannot be taken from Monday through Saturday.
–8–
Q17. As shown in the directory structure below, when D3 marked by an asterisk (*) is the
current directory, which of the following the appropriate directory path that can
designate file A under directory D4 marked by an arrow? Here, a file is designated as
follows:
a) ..\..\D2\D4\A b) ..\D2\D4\A
c) D1\D2\D4\A d) D2\D4\A
Q18. Which of the following is the most appropriate purpose of installing a business
application software package instead of self-developed application software?
–9–
Q19. Which of the following is an appropriate description concerning OSS (Open Source
Software)?
a) The program is free to use for a certain trial period, but a fee is required to continue
using it.
b) Modifications and derived works are allowed to be distributed under the same terms
as the license of the original software.
c) The copyright is waived, so any modified program can be distributed without
permission.
d) The program may be restricted from being used in a business, or from being used for
a specific field.
Q20. Which of the following is the effect that is expected as a result of performing
defragmentation of a hard disk?
Q21. Which of the following is an appropriate type of menu that enables users to make
multiple selections on common GUIs as seen in PC operating systems?
– 10 –
Q22. Some sample photos of luxury women’s clothing, which were taken with a digital
camera in an uncompressed format, are to be provided on a shared server after image
processing such as color-correction and trimming. In such a situation, which of the
following is an appropriate compression format that can be used to reduce the amount
of image data?
Q23. From the “Product” table below, products whose supplier is “Company A” and the
price is 1.4 dollars or more, and products whose supplier is “Company B” and the price
is 1.7 dollars or less are extracted. Which of the following is a list of all of the
obtained product names?
Product
Product code Product name Price (dollars) Supplier
– 11 –
Q24. Which of the following is an appropriate purpose of normalizing the data of a relational
database?
– 12 –
Q25. In a relational database, when ( A B) and ( A B) are performed on table A and
table B shown below, which of the following is an appropriate combination of the
resulting two tables among the three tables P, Q, and R? Here, ( A B ) shows the
union of A and B, and ( A B) shows the intersection of A and B.
A B
Product_code Product_name Set_price Product_code Product_name Set_price
P R
Product_code Product_name Set_price Product_code Product_name Set_price
( A B) ( A B)
a) P R
b) Q R
c) R P
d) R Q
– 13 –
Q26. A program in operation detected that the sales data exceeded the upper limit. As a
result of checking the input form, it was found that sales quantity exceeded the upper
limit by two digits. Which of the following is the appropriate action for the
operations department to take toward this data?
a) Correcting the data with the approval of the head of the operations department
b) Consulting the systems development department
c) Discarding the data under the responsibility of the operations department
d) Asking the requester or requesting department to check the input form
Q27. Which of the following is the mechanism that determines a correspondence between a
domain name and an IP address on the Internet?
Q28. Which of the following is required to construct a LAN to connect several computers in
a room?
a) Internet b) Splitter
c) Hub d) Modem
Q29. Which of the following is placed between an internal network and an external network
in order to prevent unauthorized access from the outside to the inside?
– 14 –
Q30. Which of the following is an appropriate description concerning a router used in an IP
network?
Q31. When e-mails are sent and received between PCs on the Internet, which of the
following is an appropriate description concerning the selection of communication
protocols that are used between each pair of PCs and mail servers?
a) Each PC uses POP for sending e-mails and SMTP for receiving them.
b) Each PC uses SMTP for sending e-mails and POP for receiving them.
c) Each PC uses POP for both sending and receiving e-mails.
d) Each PC uses SMTP for both sending and receiving e-mails.
Q32. When the maintenance of a database is planned for employee information that includes
personnel information, which of the following is an appropriate item to be considered?
– 15 –
Q33. In the PDCA (Plan, Do, Check, Act) cycle of an information security management
system (ISMS), which of the following is performed during the “Act” phase?
Q34. Which of the following is a security attack that is sent to users as a part of a program
with a hidden destructive function, or as a program designed to trick users into
executing a malicious function?
Q36. Which of the following is a biometric authentication technique that uses a vein pattern?
– 16 –
Q37. In the description below of measures against spam mail, which of the following is an
appropriate combination of words to be inserted into blanks A and B?
Mr. C is tired of receiving spam mail, so he is trying to register the e-mail addresses,
from which he wants to receive e-mails, in a A so that e-mails sent from the
e-mail addresses registered in the A only can be B .
A B
a) blacklist permitted
b) blacklist denied
c) whitelist permitted
d) whitelist denied
a) A virus signature file for antivirus software is a database that contains the first 16
bytes or 32 bytes of the code for each virus.
b) Virus detection with antivirus software using signature files is effective for detecting
known viruses and identifying virus names.
c) If the size of a file infected by a virus is the same as before the infection, the file can
be restored to the state before the infection by removing the virus.
d) The method of detecting a virus by monitoring suspicious behavior identifies the
virus name based on the behavioral characteristics of the virus.
– 17 –
Answer questions Q39 through Q59 concerning management.
Q39. Which of the following is an appropriate test item to be performed by the integration
test in the software development process?
a) Connecting several PCs via a LAN cable, and testing to ensure that files can be
shared
b) Checking the shape of the connector on the cable that connects PCs and peripheral
devices, and testing to ensure that the cable can be smoothly inserted
c) Testing to ensure that after a contract is signed with an Internet service provider,
Web sites can be accessed from the browser
d) Combining two or more programs after the unit test, and testing to ensure that the
interface between the programs is implemented in accordance with the specifications
and is properly interlocked
Q40. It is determined that a new system is required to operate 24 hours a day, 365 days a
year. Which of the following is a development phase that involves making such a
decision?
– 18 –
Q41. For software that started full operation on January 1 last year, the number of
maintenance activities was added up for each month from January to December, and
the result is shown in the graph below. Which of the following is the most
appropriate set of maintenance activities corresponding to factor A in the graph?
Number of maintenance activities
of software
November
October
April
June
September
August
March
July
February
January
December
May
a) Activities concerning a hardware upgrade that was performed in June last year
b) Activities responding to requests for improvement of software
c) Activities responding to initial failures of software
d) Activities concerning data addition that is performed every April
a) If defects are detected at an early stage of the development process, they can be
corrected with fewer person-hours, and thereby productivity is increased.
b) Effective communication between the development team and the user department has
no relation to productivity.
c) Productivity is the same regardless of whether to use high-level languages or
assembly languages.
d) The adoption of an appropriate estimation of workload and cost improves
productivity.
– 19 –
Q43. When system development is conducted sequentially from upstream to downstream
processes, a significant amount of rework might arise in the test phase that is
performed by the system user. For the purpose of preventing such rework, which of
the following is the method that is used to create trial models in an early stage and
clarify user requirements?
Q44. The quality characteristics of software are classified into functional suitability, usability,
performance efficiency, compatibility, and so on. Which of the following is classified
as usability?
Q45. A factory requests the development of the production management system to its
information systems department, so the information systems department organizes a
development project. Which of the following is the most appropriate relation between
the factory, which is the client in this case, and the information systems department?
a) In order to reduce the load of development activities, once the requested items have
been conveyed at the beginning of the project, the factory does not communicate
with the information systems department.
b) When a problem occurs in the development project, the factory participates actively,
as a client, in solving the problem.
c) When a specification change is requested to the information systems department, the
factory directly communicates the request to the person in charge of development in
the information systems department, and gets on-the-spot support.
d) The information systems department is responsible for the development of the
production management system, so the information systems department does not
need to send the progress report and quality report to the factory.
– 20 –
Q46. At the beginning phase of a new personnel system development project, in order to
clarify the possible risks, the persons in charge of the planning department, personnel
department, and information systems department, who act as the project team members,
get together and freely exchange their opinions on the apparent risks concerning the
project. What is such a method called?
Q48. Which of the following is a technique that is used for creating a plan in project
management and dividing the entire project into detailed activities to represent them in
a hierarchically structured diagram?
a) DFD b) WBS
c) State transition diagram d) Risk analysis sheet
– 21 –
Q49. In the arrow diagram shown below, a total of 24 days are required to complete all the
activities. When the number of days required for activity C is reduced by three days,
the total number of days required for completion of all the activities can be reduced by
one day. How many days are required for activity D?
a) 6 b) 7 c) 8 d) 9
Q50. When the progress of a project is managed, which of the following is an appropriate
item to be considered?
a) The delay in progress can be corrected based on the judgment of the administrator.
b) Qualitative items are set in the control items of progress management.
c) Target values are set for each item in order to evaluate the progress quantitatively.
d) A radar chart is used to facilitate the understanding of progress.
a) Investigating and analyzing the usage status of a system to evaluate the service level
b) Investigating the cause of a bug to improve the quality of application software
c) Conducting interviews to collect computerization needs for future system planning
d) Responding to inquiries, such as system failures, for enhanced user convenience
– 22 –
Q52. Which of the following is the purpose of an SLA that is an agreement on the service
level between the IT service provider and the customer?
Q53. An orientation meeting is held to explain the new functions that are to be added to the
system. Mr. A, systems administrator, recommends that all the people who use the
system should attend the meeting and exchange opinions. Which of the following is
the effect that Mr. A hopes for?
a) It takes time to examine the priority order of change requests, so changes should be
implemented in order of arrival.
b) It is always necessary to record the changes in applications because they are helpful
in investigating the cause of a failure.
c) It is difficult to estimate the extent of an impact from changes, so all employees
should be informed of modifications at all times.
d) The release to the operational environment should be conducted late at night so that
users are not affected.
– 23 –
Q55. The process of IT service management consists of various activities such as incident
management, problem management, and release management. Which of the
following is the activity of problem management?
a) It was reported by several departments that e-mails were not able to be sent. The
backup system was started to resume the service.
b) There was an inquiry saying that e-mails were not able to be sent. When the user
was asked to check the settings of the PC, the e-mail address was found to be wrong
and the user corrected the address.
c) A hardware fault of a server caused the mail system to fail. The faulty hardware
component was replaced, and then a verification test was conducted.
d) The e-mail system failed. In order to analyze the root cause, the staff members of
the information systems department and the vendor engineers who constructed the
system got together and started to collect information.
Q56. In a certain company, multiple PCs are to be used on a 100-volt commercial power
supply available in the facility. The PCs and display monitors are connected to a
dedicated power distribution board, and the maximum capacity of the circuit breaker is
20 A (amperes). What is the maximum number of PCs that can operate
simultaneously? Here, the power consumption is 200 W (watts) per PC and 100 W
per display monitor. A PC and a display monitor are always used as a pair.
Moreover, the power consumption stays flat.
a) 4 b) 6 c) 10 d) 12
Q57. Which of the following is a process according to which a third party inspects and
evaluates the security and reliability of the information system of a company, and if
necessary, the third party makes suggestions and recommendations to the party being
inspected and evaluated.
– 24 –
Q58. Among descriptions of IT-based business processing control, which of the following is
a description concerning the combined control of software-based automatic processing
and human-intensive processing?
a) The sales persons directly enter the information of their new customers, so any
incorrect data entry can be prevented.
b) The excessive order amount entered by each sales person requires the manager’s
approval, so the appropriateness of transactions can be checked by several persons.
c) A contracting officer who specializes in the operation enters the information for
registering a new customer, so any incorrect data entry can be prevented.
d) Instruction data for manufacturing is automatically created by software based on the
registered order data, so any human error can be excluded.
Q59. Which of the following is the process that is used to assess and review the quality of a
company’s internal control performance over time?
a) Benchmarking b) Monitoring
c) Reengineering d) Restructuring
– 25 –
Answer questions Q60 through Q88 concerning strategy.
– 26 –
Q61. Which of the following is the arrow diagram that shows a series of activities performed
under the conditions below? Here, a dashed line represents a dummy activity.
[Conditions]
(1) Activity A is the first activity in the project.
(2) After activity A is completed, activity B and activity C can be started and
performed in parallel.
(3) After activity B and activity C are completed, activity D can be started.
(4) After activity C is completed, activity E can be started.
(5) After activity D and activity E are completed, activity F and activity G can be
started and performed in parallel.
(6) After activity F and activity G are completed, activity H can be started.
a) 3 6
B D F
A G H
1 2 5 7 8
C E
4
b) 3 6
B D F
A G H
1 2 5 7 8
C E
4
c) 3 6
B D F
A G H
1 2 5 7 8
C E
4
d) 3 6
B D F
A G H
1 2 5 7 8
C E
4
– 27 –
Q62. Which of the following is an appropriate example of how to use diagrams or charts?
a) A cause and effect diagram is used to show the relationship between the cost and
performance of CPUs.
b) A Gantt chart is used to show the order of telephone contacts at the time of a system
failure on non-working days.
c) A scatter diagram is used to understand the cause of product quality deterioration.
d) A flowchart is used to show the procedure for purchasing goods.
Q63. Which of the following has a negative correlation between temperature and total sales?
Total sales
Total sales
Total sales
Total sales
– 28 –
Q64. A set of PC LAN equipment with a purchase price of 10,000 dollars is to be used on a
five-year lease. When the lease rate is 2%, what is the total leasing expense in
dollars? Here, the lease rate is shown as a proportion of the monthly lease fee to the
purchase price.
Q65. Which of the following can be classified as a trade secret from a viewpoint of
preventing unfair competition?
– 29 –
Q67. Which of the following is an explanation of a volume license agreement on software?
Q68. In e-commerce using public key cryptography, which of the following is created by the
CA (Certification Authority) that is a third-party organization independent from the
parties involved in the transaction?
– 30 –
Q69. Company S purchases equipment from Company K by using the procedure shown in
the diagram below. In this transaction procedure, which of the following is the point
at which the sales contract is concluded? Here, once the quotation is provided, the
content of the transaction does not change throughout the procedure.
a) A b) B c) C d) D
Q70. Which of the following can be classified as “personal information” from a viewpoint of
the protection of personal information?
a) Corporate name, telephone number, address, and such other information that can be
used to identify a specific company
b) A report summarizing only the responses from questionnaires returned in signed
forms
c) A master copy of the customer information file that contains name, date of birth, and
address
d) A table showing both the number of customers grouped by age bracket and the sales
amount in each bracket
– 31 –
Q71. A company has a product line with four types of products A through D. The company
created the table below after investigating the sales, market share, and market growth
rate of each product. Which of the following is the appropriate product portfolio
matrix (PPM) that shows this situation? Here, the size (area) of a circle shows an
amount of sales.
Product A B C D
Sales (million dollars) 8 10 4 12
Market share (%) 10 1 3 8
Market growth rate (%) 15 2 20 4
a) b)
20 Market growth rate 20
Market growth rate
15 15
10 10
5 5
0 0 5 10
5 10
Market share Market share
c) d)
20 20
Market growth rate
Market growth rate
15 15
10 10
5 5
0 0
5 10 5 10
Market share Market share
– 32 –
Q72. Which of the following is a form of farming out all or most of the information system
development, operations, and maintenance work to an external specialized company
for the purpose of reducing information system costs?
Q73. Cross licensing is a way of using a company’s own patents effectively. Which of the
following is an appropriate explanation of the right to execute the patent in cross
licensing?
Q74. Among the forms of e-commerce, which of the following is the form in which
consumers purchase products from individuals, including transactions conducted at an
auction site, other than manufacturers and retail stores?
a) B to B b) B to C c) B to G d) C to C
– 33 –
Q75. Among the sales techniques for attracting customers, which of the following is an
appropriate example of cross selling?
Q76. A company decided to perform an investigation of the items shown in the analysis table
below in comparison with other companies in the same industry handling the same
kinds of products, and completed the table. There are five evaluation levels, with 5
being the highest. As a result of an overall evaluation, what is this company’s rank
from the top?
a) 1 b) 2 c) 3 d) 4
– 34 –
Q77. Which of the following is the most appropriate meaning of “de facto standard”?
Q78. Which of the following is an appropriate explanation of the point card system (or
loyalty program) implemented by retail businesses?
a) It is a system that enables the card applicant to do shopping within a credit limit
through deferred payment of the amount.
b) It is a system that enables the payment of the shopping amount through a bank ATM
card.
c) It is a system where credit corresponding to purchase amount is accumulated on a
card, and services are offered according to the accumulated credit.
d) It is a system where an amount is prepaid on the assumption of purchase of products,
and the amount is deducted from the card each time a product is purchased.
Q79. A single unit of Product A is composed of three pieces of Part B and two pieces of Part
C. In the production plan for a particular period, when the demand for Product A is
10, which of the following is the net requirement of Part B? Here, the quantity in
stock is five for Part B, and there are no other pieces in stock, in process, on back order,
or already allocated. The net requirement is calculated by subtracting the stock
available for allocation from the gross requirement.
a) 20 b) 25 c) 30 d) 45
– 35 –
Q80. Which of the following is a product that can take advantage of the cell production
system where a single worker or a small team of workers has responsibility for
assembling each product from the beginning to the end?
a) An IC card is more robust against forgery than a magnetic card, because the IC card
provides the features of storing and encrypting information in the IC chip.
b) An IC card is more robust against forgery than a magnetic card, because the IC card
uses a two-dimensional code for information recording.
c) A magnetic card is more robust against forgery than an IC card, because the
magnetic card stores information on a magnetic stripe and has a more complicated
data protection mechanism.
d) A magnetic card is more robust against forgery than an IC card, because the
magnetic card uses a bar code for information recording.
– 36 –
Q82. The diagram below shows the flow for a credit card transaction. Which of the
following is the action that corresponds to (5) in the diagram? Here, the numbers (1)
through (6) indicate the sequence in which the transaction is processed.
User
(1) Deliver product
or service
(2)
(3)
(4)
Credit card company
Q83. Which of the following is a type of cash card which can be used for real-time settlement
that withdraws the transaction amount directly from the customer’s bank account?
Q84. Which of the following is the system that is housed in home electric appliances, such
as rice cookers and air conditioners, and is used to implement the specific functions of
such appliances?
– 37 –
Q85. In the operations of an SFA (Sales Force Automation) system that is aimed at
supporting sales activities and strengthening management, which of the following is
the most appropriate information that must be managed?
a) Information about the number of visits to each customer, the progress status of
business talks, and the status of business transactions
b) Information about the skills, record of attended trainings, and business goals and
attainment level of each employee
c) Information about the date and time of sales, sales quantity, and sales amount of
each product
d) Information about the production plan, components and required quantity, and
inventory of each product
Q86. Which of the following is a set of activities that clarifies the target business operations,
cost, schedule, organizational structure, investment effect, and such other factors of
development, based on the information strategy?
Q87. Which of the following is a modeling technique that is used for analyzing business
operations and system from the viewpoint of the flow of data which is exchanged
between processes?
a) The company can decide to resume its own system operations as before at any time.
b) The company’s information systems department can focus on business operations
such as planning and development.
c) It becomes easier for the company to recognize problems in information systems.
d) It becomes easier for the company to take measures against troubles on its own.
– 38 –
Answer questions A through C, each of which has four questions.
Question A Read the following description concerning the method for selecting the
model of an office machine, and then answer the four questions.
Mr. F was instructed by his supervisor to create the study material for selecting the
model of an office machine to be used within the department in accordance with the
selection requirements shown below.
[Selection requirements]
(1) Any one model is selected from four similar models (models A through D).
(2) There are three evaluation items: price, performance, and service. A weighting
factor of 1 through 5 is given in consideration of the importance of each
evaluation item.
(3) The evaluated value of each evaluation item is decided for each model. The
evaluation value is any number from 1 through 9.
(4) The overall evaluated value is calculated from the weighting factor and evaluated
value of each evaluation item, and the model with the largest overall evaluated
value is selected.
Mr. F carried out his study by creating the evaluation table shown in Table 1. In this
case, the overall evaluated value of model A is calculated by the formula shown below.
The similar formula is used for models B through D as well.
– 39 –
[Strategy]
Q89. With respect to the weighting factor of each evaluation item, Mr. F was instructed by
his supervisor that the same weighting factor is set to both price and performance and a
higher weighting factor than service is set to performance. Based on this instruction,
Mr. F created Table 2 shown below in order to relatively compare the weighting factor
of each evaluation item. Which of the following is an appropriate combination of the
settings for the weighting factor of each evaluation item so that the conditions of Table
2 can be satisfied?
– 40 –
[Technology]
Q90. Upon receiving the instruction for setting the evaluated value from the supervisor, Mr.
F compared the relative merits for every two models of the models A through D based
on all combinations, with respect to each evaluation item of price, performance, and
service, before determining the evaluated value. The results are shown in Table 3.
One row of the table indicates the result of a single comparison. What is the total
number of comparisons required to complete the table?
… … …
… … …
Performance
Service
a) 6 b) 9 c) 18 d) 32
– 41 –
[Strategy]
Q91. Mr. F compared the relative merits for every two models of the models A through D
based on all combinations, with respect to each evaluation item of price, performance,
and service, and created the relative comparison table shown in Table 4. Mr. F
examined the evaluated values of the evaluation table based on the completed relative
comparison table. When the comparison results of the performance of model A and
the other models are as shown in Table 4, which of the following is an appropriate set
of the possible values for the evaluated value to be inserted into blank A of the
evaluation table proposal shown in Table 5?
…
Price
Model A > Model B
Model A > Model C
Performance
Model A < Model D
… …
… …
… …
Service
a) 1, 2 b) 3, 4, 5, 6
c) 4, 5 d) 7, 8, 9
– 42 –
[Strategy]
Q92. Mr. F asked his supervisor to review the evaluated values of the evaluation table
proposal that he created, and finally created the study material by using the evaluation
table shown in Table 6 below. Under these circumstances, which of the following is
the model that is selected in accordance with the selection requirements?
– 43 –
Question B Read the following description concerning the acceptance test of a system,
and then answer the four questions.
– 44 –
Table 1 Training course table
Tuition fee Cost of textbooks
Training course name Lecture date
(dollars) (dollars)
Course P September 04 100 20
Course Q September 17 80 20
Course R September 25 200 No charge
Course S October 02 150 15
[Technology]
Q93. In order to prepare the test data concerning the discount application function, Mr. B
prepared and arranged the discount application table shown in Table 2. Which of the
following is an appropriate description to be inserted into blank A in the discount
application table? Here, the top two rows of the discount application table are the
conditions for the application of discount. “Y” is described for “Yes,” and “N” is
described for “No.” The discount rate on the tuition fee, which is applied when the
two conditions in the same column are met together, is described in the third row of the
same column.
a) 0 10 10 20 b) 10 10 10 20
c) 20 10 10 0 d) 20 10 10 10
– 45 –
[Management]
Q94. When the training lecture status below is used as the test case, which of the following
is an appropriate description concerning the tuition fee and the cost of textbooks?
a) For Mr. Jack Smith, the tuition fee of course Q is 72 dollars, and the cost of
textbooks is 18 dollars.
b) For Mr. Jack Smith, the tuition fee of course R is 180 dollars, and no cost of
textbooks is charged.
c) For Ms. Helen Merrill, the tuition fee of course P is 80 dollars, and the cost of
textbooks is 20 dollars.
d) For Ms. Helen Merrill, the tuition fee of course S is 150 dollars, and the cost of
textbooks is 15 dollars.
– 46 –
[Management]
Q95. In order to ensure that the detailed invoices can be created correctly, Mr. B prepared
test data No.1 through No.4 shown in Table 3. Which of the following is an
appropriate combination of numbers to be inserted into blanks B and C in the
descriptions (1) and (2) below as the items that can be checked using the test data?
(1) If the data of No. 1 and No. B is used, it can be confirmed that a
discount on the tuition fee is applied when a member applicant attends several
lectures in the same month.
(2) If the data of No. C is used, it can be confirmed that the cost of
textbooks is not charged in the case of absence.
B C
a) 2 4
b) 2 3
c) 3 2
d) 3 4
– 47 –
[Management]
Q96. Mr. B tested the charged amount for cancellation of the application and absence.
When the acceptance test cases below were performed, which of the following is the
appropriate combination of the amount charged to each applicant? Here, Company A
is working on days other than holidays, and the course is opened on a business day.
The calendar for September is as shown in Fig. 1.
– 48 –
Question C Read the following description concerning the creation of a request for
proposal (hereinafter, RFP), and then answer the four questions.
A trading company called Company P has its presence in several buildings. In order to
improve business efficiency, the office is to be integrated into a single location. In order
to achieve this, an office integration project was started, and Mr. A was appointed as the
project leader of the general affairs department. Under the guidance of Mr. A, a
second-year employee Mr. B was appointed as the responsible person for installation of a
meeting room reservation system (hereinafter, reservation system) used for reserving a
meeting room from among the several meeting rooms. Mr. B collected the requirements
for the reservation of a meeting room.
The creation of an RFP for the reservation system is to be taken up under the office
integration project. Mr. B was instructed by Mr. A to create this RFP, and was explained
about the author of the RFP, the points to be mentioned, and the place of submitting the
RFP.
– 49 –
[Strategy]
Q97. Which of the following is an appropriate explanation concerning the RFP of the
reservation system?
[Strategy]
Q98. The members of the office integration project are as shown below. Under such
conditions, which of the following is the most appropriate description concerning the
author of the RFP for the reservation system?
a) Mr. B creates the RFP, and Messrs. C, D, E, and F support the creation.
b) Any one of Messrs. C, D, and E creates the RFP, and Mr. F supports the creation.
c) Mr. F creates the RFP, and Mr. G supports the creation.
d) Mr. G creates the RFP.
– 50 –
[Management]
Q99. Which of the following is not an appropriate explanation of the contents to be
described in the RFP of the reservation system?
a) It is described that a meeting room for general purpose can be reserved by all
employees.
b) It is described that several departments, such as the sales department, general affairs
department, accounting department, and information systems department, can share
the meeting rooms.
c) The delivery period and the start date of operations for the reservation system are
described, but the schedule of the interior finishing and delivery of fixtures and
furniture for the meeting rooms is not described.
d) The judgment criteria of the possibility of reserving a meeting room for visitors is
not decided, so it is not described that the criteria is different from that of the
meeting room for general purpose.
[Strategy]
Q100. As a result of Mr. B’s investigation about the technical skills possessed and the past
results achieved by several companies that were candidates for presentation of the
RFP of the reservation system, the companies described below remained behind as the
candidates. Which of the following is the most appropriate company or companies
that are invited to submit proposals in accordance with the RFP for the project?
a) Companies X and Y
b) Companies X and Z
c) Companies Y and Z
d) Company Z
– 51 –