Fundamental IT Engineer Examination (Morning) Oct 2016

Fundamental IT Engineer Examination (Morning) Oct 2016

情報処理技術者試験 / ITPEC アジア共通統一試験

Fundamental IT Engineer Examination (Morning) Oct 2016

http://itpec.org/pastexamqa/fe.html


Q1. If a given bit string contains at least one 1-bit, the algorithm below leaves the rightmost

1-bit unchanged but makes all the others 0. For example, if the given bit string is 00101000,

the result will be 00001000. Which of the following is the appropriate logical operation to be

filled in D?

Step 1: By regarding the given bit string A as an unsigned binary number, let B be the

result of subtracting 1 from A.

Step 2: Calculate the XOR (exclusive logical sum) of A and B, and let C be the result.

Step 3: Calculate the D of A and C, then set the result back to A.

a) AND (logical product) b) NAND (negative logical product)

c) OR (logical sum) d) XOR (exclusive logical sum)

Q2. When 4-bit signed numbers in 2's complement are used, which of the following

operations will cause either an overflow or an underflow?

a) Add B to A when A is 0110 and B is 1111.

b) Add B to A when A is 1110 and B is 0110.

c) Subtract B from A when A is 0111 and B is 1010.

d) Subtract B from A when A is 1111 and B is 1111.

Q3. When two unbiased dice are rolled one by one, what is the probability that either the first

one is 2 or the sum of the two is less than 5?

a) 6

1

b)

9

2

c)

18

5

d) 3

1

Q4. A leap year is either a multiple of 4 but not a multiple of 100, or a multiple of 400. How

many leap years are there from 1998 to 2110?

a) 26 b) 27 c) 28 d) 29

– 5 –

Q5. Which of the following is the most appropriate description of a queue?

a) Data that is stored first is retrieved first.

b) Data that is stored last is retrieved first.

c) It references specific data by using an index.

d) It represents the hierarchical relationship of data by using at least two (2) pointers.

Q6. Binary search is used to search for an element from a sorted data of n elements.Which of

the following is an expression that represents the order of computational complexity for this

process?

a) log n b) n c) n2 d) n log n

Q7. In Java technologies, which of the following is the specification of creating reusable

software components that have frequently used functionalities?

a) Java applet b) Java application

c) JavaBeans d) JavaScript

Q8. Which of the following best describes the characteristics of XML?

a) The style languages such as XSL and CSS used in HTML can also be used in XML.

b) XML allows a tag to be defined in order for an easier data exchange between

information systems over the network.

c) XML is developed on its own specification, whereas HTML is on the SGML basis.

d) XML is HTML based and has some features added primarily for a performance

improvement of displaying a web page.

– 6 –

Q9. Which of the following is the addressing method that references data in the main memory

as shown in the figure below?

20

Operation part Address part

25

Data

Address Main memory

20

25

… … …

a) Direct addressing b) Indexed addressing

c) Indirect addressing d) Relative addressing

Q10. Which of the following is classified as an internal interrupt?

a) An interrupt because of the occurrence of a memory parity error

b) An interrupt because of the operation of division by zero (0)

c) An interrupt caused by a power failure, such as an instantaneous failure of the

commercial power supply

d) An interrupt caused by the completion of I/O

Q11. ECC is used for error detection and correction in memory. If n + 2 redundant bits are

required for a data bus with a width of 2n bits, how many redundant bits are required for a

data bus with a width of 128 bits?

a) 7 b) 8 c) 9 d) 10

– 7 –

Q12. Which of the following lists contain A through D in the order of shorter effective

memory access time of the main memory?

Cache memory Main memory

Existence

Access time

(nanoseconds)

Hit rate

(%)

Access time

(nanoseconds)

A No - - 15

B No - - 30

C Yes 20 60 70

D Yes 10 90 80

a) A, B, C, D b) A, D, B, C

c) C, D, A, B d) D, C, A, B

Q13. Which of the following is an appropriate description of the reliability of computer

systems?

a) As the system configuration becomes more complicated, MTBF increases.

b) Availability of systems can be improved by increasing MTTR and MTBF.

c) Preventive maintenance of systems is performed to increase MTBF.

d) Remote maintenance of systems can increase MTTR and improve availability.

Q14. A system is operated as a virtual machine environment with 20 physical machines.

When the operating conditions are shown below, what is the minimum number of physical

machine failures that causes the system to enter fall back operation?

[Operating conditions]

(1) If a physical machine fails, the virtual machines that were running on it are made to

run evenly on all the other physical machines, and the resources that were used are

distributed in the same way.

(2) When there are 20 physical machines, 70% of the resources of all physical machines

are used.

(3) If the resources used on a single physical machine exceed 90%, the whole system

enters fall back operation.

(4) Conditions other than (1) through (3) above do not need to be considered.

a) 2 b) 3 c) 4 d) 5

– 8 –

Q15. Which of the following is an appropriate graph that shows the relationship between

CPU utilization and average response time in an online real-time system? Here, transactions

occur according to a Poisson distribution, and the processing time for a transaction follows

an exponential distribution.

a)

Average response time

CPU

utilization

0 1

b)

Average response time

CPU

utilization

0 1

c)

Average response time

CPU

utilization

0 1

d)

Average response time

CPU

0 1 utilization

Q16. Which of the following occurs when a program attempts to access a page that is

mapped in the virtual address space, but is not located in the main memory? Here, the OS

supports paging.

a) Fatal error b) Page fault

c) Scheduling error d) Segmentation fault

– 9 –

Q17. Which of the following is an appropriate explanation of spooling?

a) It determines the execution order for jobs that are loaded into a system according to

characteristics and priority.

b) It sends communication data to a pre-registered agent instead of sending it directly to a

counterpart.

c) It temporarily saves input data from a keyboard to the queue in the main memory.

d) It temporarily saves output data for a low-speed device, such as a printer, to a highspeed

hard disk, and then sends it to the intended device.

Q18. In a paged virtual memory system, the LRU method is used in the page replacement

algorithm. When the page frame assigned to the main memory is 4, and pages are accessed

in the order of 1, 2, 3, 4, 5, 2, 1, 3, 2, 6, which of the following page is replaced at the time

of accessing page 6? Here, no page exists in the main memory in the initial state.

a) 1 b) 2 c) 4 d) 5

Q19. There is a system in which the print requests waiting for output are assigned to an

available printer in an order of A, B, and C, and then the printer available first among the

three (3) printers A through C of the same model. If the print time of each print request is

5, 12, 4, 3, 10, and 4 (minutes) in the order of the requests waiting for output, which of the

following lists of printers is arranged in an order starting from the longest time assigned for

printing? Here, all printers are available in the initial state.

a) A, B, C b) B, A, C c) B, C, A d) C, B, A

Q20. Which of the following is an open source integrated development environment that

includes software and support tools for application development?

a) Eclipse b) Perl c) PHP d) Ruby

– 10 –

Q21. Which of the following is a characteristic of DRAM and not of SRAM?

a) It does not require refresh nor access operations in order to retain data.

b) It has a simple memory cell structure, and thus the price per bit is low.

c) It is mainly used for cache memory

d) It uses flip-flops for the memory cells to save data.

Q22. Which of the following is a logical expression that is equivalent to the digital circuit

shown in the figure below? Here, “•” is the logical product, “+” the logical sum, and “ X ”

the negation of X.

A

B

X

a) X = A ・ B + A ・ B b) X = A ・ B + A ・  B

c) X A B A B = ・ + ・ d) X = ( A + B ) ・ ( A + B )



@@

Which of the following is the name of a phenomenon where multiple ON/OFF

signals are generated within a few milliseconds after a push-button switch

with a mechanical contact is pressed once?

a) Buffering

b) Chattering

c) Sampling

d) Sharing

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q23.


Google 翻訳(一部訂正)

 メカニカル接点を備えた押しボタンスイッチを1回押すと、数ミリ秒以内に複数の

ON / OFF信号が発生する現象の名前はどれですか?

 a)バッファリング

 b)チャタリング

 c)サンプリング

 d)共有

------------------------------------------------------------------------

Which of the following shows the path information from the front page

of a web site to the current page, a user is currently viewing?

a) Breadcrumbs

b) Navigation bar

c) Scroll bar

d) Site map

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q24.


Google 翻訳(一部訂正)

 次のうち、現在表示しているWebサイトのフロントページから現在のページまで

パス情報を示します。

 a)パンくずリスト

 b)ナビゲーションバー

 c)スクロールバー

 d)サイトマップ

------------------------------------------------------------------------

Which of the following is an explanation of the morphing technique in

computer animation?

a) A hand-drawn outline is read with a scanner, then each enclosed area

is filled with a single color.

b) Based on the digital data collected from the actual movement of a body,

multiple images with a realistic movement are created.

c) In order to make a perspective two-dimensional animation, each image

of moving parts is superposed on the background one by one in descending

order of its distance from the viewer.

d) In order to represent a smooth transition between two images, multiple

intermediate images are created for interpolation.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q25.


Google 翻訳(一部訂正)

コンピュータアニメーションのモーフィング術の説明は次のうちどれです

か?

a)手で描いた輪郭をスキャナで読み取った後、それぞれの囲まれた領域を

  単一の色で塗りつぶす。

 b)身体の実際の動きから収集されたデジタルデータに基づいて、現実的な

  動きを有する複数の画像が生成される。

 c)遠近法二次元アニメーションを作成するために、可動部分の各画像は、

  視聴者からの距離の降順に背景に1つずつ重ね合わされる。

 d)2つの画像間の滑らかな遷移を表現するために、複数の中間画像が補間用に

  作成される。

------------------------------------------------------------------------


Q26. When new naming conventions for data items are provided, which of the following

problems cannot be avoided only by the naming conventions described below?

[Naming conventions]

(1) Always add a classification word such as the “name”, “code”, “number”, “amount”, or

“date” at the end of the data item name, and set the data type determined for each

classification word.

(2) Create a dictionary in which data item names and their meanings are registered, and

ensure that synonyms and homonyms do not occur.

a) Both the date type and the character string exist together as the data type of the data

item “ReceiptDate”.

b) It cannot be determined whether the data itemCustomer” is the “CustomerCode” or

“CustomerName”.

c) The scope of the possible values of the data item “OrderAmount” varies according to

the table.

d) There is a data item called “AwardAmount” that has the same meaning as the data item

“BonusAmount”.


– 12 –

Q27. The data model shown in the figure below is implemented as three (3) tables. At this

time, which of the following is an appropriate combination of A and B in the “Transfer”

table in which the transaction of “the sales of 500 dollars to Company C are booked in the

cash account on April 4, 2015” is recorded? Here, the data model is described in UML.

2..* *

Amount

Transfer

AccountCode

AccountTitle

Account

TransactionNumber

DateOfPosting

Description

AccountingTransaction

Debit Credit

Constraint:

The total “Debit” amount of

one (1) accounting transaction

must match the total “Credit

amount.

Account Transfer Accounting transaction

Account

Code

Account

Title

Account

Code

Debit/

Credit

Amount

Transaction

Number

Transaction

Number

DateOf

Posting

Description

208 Sales A B 500 0122 0122 2015-04-04

Company

A

510 Cash 208 Credit 500 0122 0124 2015-04-04

Company

A

511 Deposits 510 Credit 500 0124

812

Travel

expenses

812 Debit 500 0124

A B

a) 208 Credit

b) 208 Debit

c) 510 Credit

d) 510 Debit

– 13 –


In the process of table implementation, which of the following is an

appropriate SQL statement that removes a column in an existing table?

a) ALTER TABLE table_name

DELETE COLUMN column_name

b) ALTER TABLE table_name

DROP COLUMN column_name

c) UPDATE TABLE table_name

DELETE COLUMN column_name

d) UPDATE TABLE table_name

DROP COLUMN column_name

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q30.


Google 翻訳(一部訂正)

 テーブル実装のプロセスでは、既存のテーブルのカラムを削除する適切なSQL

はどれですか?

a) ALTER TABLE table_name

DELETE COLUMN column_name

b) ALTER TABLE table_name

DROP COLUMN column_name

c) UPDATE TABLE table_name

DELETE COLUMN column_name

d) UPDATE TABLE table_name

DROP COLUMN column_name

------------------------------------------------------------------------

Q29. When a manager is analyzing the sales of products in a supermarket, he makes a query

to list all products with their sales amount, including the products that have no sales amount.

Which of the following is an appropriate combination of statements to be filled in the boxes

in the query? Here, the columns of Product and Sales are shown below.

Product: (ProductID, PName, Price, Cost)

Sales: (SalesID, ProductID, SalesDate, Unit, Amount)

SELECT Product.PName, SUM(Amount)

FROM Product _____A_____ Sales

on Product.ProductID = Sales.ProductID

GROUP BY ____ B___ _;

(A) (B)

a) INNER JOIN Amount

b) INNER JOIN Product.PName

c) LEFT JOIN Amount

d) LEFT JOIN Product.PName



Which of the following is an appropriate description of locks?

a) For a resource on which transaction T1 has acquired an exclusive lock,

transaction T2 can acquire an exclusive, but not a shared, lock.

b) For a resource on which transaction T1 has acquired an exclusive lock,

transaction T2 can acquire either an exclusive or a shared lock.

c) For a resource on which transaction T1 has acquired a shared lock,

transaction T2 can acquire a shared, but not an exclusive, lock.

d) For a resource on which transaction T1 has acquired a shared lock,

transaction T2 can acquire either a shared or an exclusive lock.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q30.


Google 翻訳(一部訂正)

 ロックの適切な記述はどれですか?

 a)トランザクションT1が排他ロックを獲得したリソースについて、

  トランザクションT2は排他的であるが共有ではないロックを獲得することが

  できる。

 b)トランザクションT1が排他ロックを獲得したリソースについて、

  トランザクションT2は排他ロックまたは共有ロックのいずれかを獲得するこ

  とができる。

 c)トランザクションT1が共有ロックを獲得したリソースについて、

  トランザクションT2は、排他ロックではなく共有ロックを獲得することがで

  きる。

 d)トランザクションT1が共有ロックを獲得したリソースについて、

  トランザクションT2は共有ロックまたは排他ロックのいずれかを獲得することができる。

------------------------------------------------------------------------

In a CSMA/CD based LAN, which of the following is an appropriate description

of the transmission operation performed by a network node?

a) All nodes are connected in a ring topology, and a special frame is sent

around to control the transmission right. Only the node that receives

the special frame can transmit data.

b) Each node checks if the transmission medium is in use, and can transmit

data if the medium is not in use. If a conflict is detected, a retransmission

occurs after a random interval of time.

c) Each node is assigned a logical priority, and a transmission right is

passed along in the order of priority. Only the node with the right can

transmit data.

d) Only the node that has been assigned a time slot for transmission can

transmit data.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q31.


Google 翻訳(一部訂正)

 CSMA / CDベースのLANでは、ネットワークノードによって実行される送信動作

の適切な記述は次のどれですか?

 a)すべてのノードがリングトポロジーで接続され、特別なフレームが送信権

  を制御するために送信されます。 特殊フレームを受信したノードだけがデータを送信できます。

 b)各ノードは、伝送媒体が使用中であるかどうかをチェックし、伝送媒体が

  使用されていない場合にデータ伝送することができる。 競合が検出され

  た場合、ランダムな時間間隔後に再送信が行われます。

 c)各ノードには論理的優先度が割り当てられ、送信権は優先度の順に伝達さ

  れる。 右のノードだけがデータを送信できます。

 d)送信用タイムスロットが割り当てられたノードのみがデータを送信するこ

  とができる。



Which of the following is an appropriate description of network devices?

a) A bridge relays frames based on IP addresses.

b) A gateway converts protocols of the first through the third layers

of the OSI basic reference model.

c) A repeater extends transmission distances by amplifying signals

between the segments of the same type.

d) A router relays frames based on MAC addresses.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q32.


Google 翻訳(一部訂正)

 次のうちネットワークデバイスの適切な説明はどれですか?

 a)ブリッジは、IPアドレスに基づいてフレームを中継する。

 b)ゲートウェイは、OSI基本参照モデルの第1層から第3層のプロトコル

  変換する。

 c)リピータは、同じタイプのセグメント間の信号を増幅することによって

  伝送距離を延ばす。

 d)ルータは、MACアドレスに基づいてフレームを中継する。

------------------------------------------------------------------------

In a TCP/IP environment, which of the following is a standard for attaching

image data to an email?

a) JPEG

b) MIME

c) MPEG

d) SMTP

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q33.


Google 翻訳(一部訂正)

 TCP / IP環境では、次のうちどれが画像データを電子メールに添付するため

の標準ですか?

   a)JPEG

   b)MIME

   c)MPEG

   d)SMTP

------------------------------------------------------------------------

Concerning email protocols, which of the following descriptions is

correct?

a) IMAP allows the message to remain on the server even after it is

downloaded to a local PC.

b) IMAP uses UDP for faster downloading of emails, whereas POP3 uses

TCP.

c) POP3 and IMAP uses the same port number for interoperability in email

communication.

d) POP3 is used for sending email messages from the sender’s mail server

to the receiver’s mail server.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q34.


Google 翻訳(一部訂正)

 電子メールプロトコルに関しては、以下の記述のどれが正しいですか?

 a)IMAPを使用すると、メッセージはローカルPCにダウンロードされた後でも

  サーバに残ることができます。

 b)POP3TCPを使用するのに対し、IMAPUDPを使用して電子メール

  ダウンロードを高速化します。

 c)POP3IMAPは、電子メール通信の相互運用性のために同じポート番号

  使用します。

 d)POP3は、送信者のメールサーバーから受信者のメールサーバーに

  電子メールメッセージを送信するために使用されます。

------------------------------------------------------------------------

In IPv6 networks, what is the length of an IP address in bits?

a) 32

b) 64

c) 128

d) 256

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q35.


Google 翻訳(一部訂正)

 IPv6 ネットワークでは、IP アドレスの長さは何ビットですか?

 a)32

 b)64

 c)128

 d)256

------------------------------------------------------------------------

Which of the following is a secure communication protocol that provides

a hybrid cryptosystem where public key cryptography is used to transfer

a shared private key securely to the other side, and private key cryptography

is used to encrypt subsequent communications for the remaining session?

a) AES (Advanced Encryption Standard)

b) RSA

c) SSL/TLS (Secure Socket Layer/Transport Layer Security)

d) WAF (Web Application Firewall)

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q36.



Google 翻訳(一部訂正)

 共有秘密鍵を安全に他の側に転送するために公開鍵暗号化を使用し、残りの

セッションの後続通信を秘密鍵暗号化を使用して暗号化するハイブリッド暗号システム

を提供する安全な通信プロトコルはどれですか?

 a)AES(高度暗号化標準)

 b)RSA

 c)SSL / TLS(セキュアソケットレイヤ/トランスポートレイヤセキュリティ

 d)WAFWebアプリケーションファイアウォール

------------------------------------------------------------------------

@@

In a meeting session, the security administrator provides a presentation

regarding risks on social media and recommends that the attendees not give

unnecessary personal information on social media websites. From which of

the following attacks do the social media users effectively reduce the

security risk most by following this recommendation?

a) Brute-force attack

b) Cognitive password attack

c) DoS (Denial of Service) attack

d) Phishing attack

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q37.



Google 翻訳(一部訂正)

 会議のセッションでは、セキュリティ管理者がソーシャルメディアのリスク

に関するプレゼンテーションを行い、出席者がソーシャルメディアのWebサイト

に不必要な個人情報を提供しないことを推奨しています。 次の攻撃のうち、

ソーシャルメディアユーザーは、この勧告に従って、セキュリティリスク

効果的に削減することができますか?

 a)ブルートフォース攻撃

 b)認知パスワード攻撃

 c)DoS(サービス拒否)攻撃

 d)フィッシング攻撃

------------------------------------------------------------------------

@@

Which of the following is an appropriate description of a Trojan horse

used for security attacks in computing?

a) It is a brute force attack algorithm.

b) It is an effective way to detect an intruder.

c) It is a rogue program that tricks users.

d) It is a user who steals valuable information.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q38.


------------------------------------------------------------------------

Google 翻訳(一部訂正)

 コンピューティングにおけるセキュリティ攻撃に使用されるトロイの木馬の

適切な記述はどれですか?

 a)ブルートフォース攻撃アルゴリズムです。

 b)侵入者を検出する有効な方法です。

 c)ユーザーを騙す不正なプログラムです。

 d)貴重な情報を盗むユーザーです。


Which of the following is an appropriate combination of the usage method

of a signature key in a digital signature, and the purpose of a digital

signature?

a) By the sender creating a digital signature with the signature key and

attaching it to a message, the recipient can confirm the identity of

the sender.

b) By the sender encrypting a message to which a fixed string is added

with the signature key, the recipient can identify sections that have been falsified.

c) By the sender encrypting a message with the signature key, the content of the message cannot be understood by unrelated parties.

d) The recipient can use the signature key to decrypt an encrypted message to the plain text message.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q39.



Google 翻訳(一部訂正)

 デジタル署名の署名鍵の使用方法とデジタル署名の目的を適切に組み合わせた

ものはどれですか?

 a)送信者が署名鍵でデジタル署名を作成してメッセージに添付することにより、

  受信者は送信者の身元を確認することができます。

 b)送信者が、固定ストリングが署名キーで追加されたメッセージ暗号化する

  ことによって、受信者は、改ざんされたセクションを識別することができる。

 c)送信者が署名鍵を用いてメッセージ暗号化することによって、メッセージ

  の内容は無関係の当事者によって理解されない。

 d)受信者は、署名鍵を使用して、暗号化されたメッセージを平文メッセージ

  復号することができる。

------------------------------------------------------------------------

Which of the following is an example of improper use of a key logger?

a) It interrupts the communication between two parties, and then collects

and falsifies the information being exchanged.

b) When Internet banking is used, it collects the password entered by

the user.

c) When the browser is initiated, it arbitrarily displays a tool bar

that the user has not installed.

d) When the user browses movies on a browser, it arbitrarily displays

unintended

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q40.



Google 翻訳(一部訂正)

 次のうちキーロガーを不適切に使用した例はどれですか?

 a)2 者間の通信を中断し、交換されている情報を収集して改ざんする。

 b)インターネットバンキングを使用すると、ユーザーが入力したパスワード

が収集されます。

c)ブラウザが起動されると、ユーザがインストールしていないツールバーが

任意に表示されます。

d)ユーザがブラウザ上でムービーをブラウズすると、ユーザに対して意図し

ない広告を任意に表示する。

------------------------------------------------------------------------


Biometric authentication includes a method of authentication by extracting

physical characteristics, and a method of authentication by extracting

behavior characteristics. Which of the following has behavior characteristics?

a) Performing authentication by extracting characteristics from the

branching angle of the branching point of a blood vessel, and the length

between the branching points

b) Performing authentication by extracting characteristics from the speed

of and pressure on a pen when a signature is written

c) Performing authentication by extracting characteristics of chaotic wrinkles

spreading out from the pupil

d) Performing authentication by extracting the characteristic points called

minutiae from the patterns formed by ridge lines

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q41.



Google 翻訳(一部訂正)

 生体認証には、身体的特徴を抽出して認証する方法と、行動の特徴を抽出し

て認証する方法がある。 次のうち行動の特徴を持つものはどれですか?

 a)血管の分岐点の分岐角と、分岐点間の長さから特徴を抽出して認証を行う

 b)署名が書かれたときにペンの速度と圧力から特性を抽出して認証を実行す

  る

 c)瞳孔から広がるカオス的シワの特徴を抽出して認証を行う

 d)隆線によって形成されたパターンから細目と呼ばれる特徴点を抽出して

  認証を行う。

------------------------------------------------------------------------


Which of the following is the most effective method of detecting

falsification of the contents of a web server?

a) Communications to the web server are monitored to ensure that there

is no communication other than HTTP and HTTPS.

b) The hash value of each file of the contents of the web server is stored

and periodically compared with the hash value generated from each file.

c) The memory usage of the web server is checked periodically to ensure

that a buffer overflow has not occurred.

d) The updated date of each file of the contents of the web server is

stored and compared periodically with the updated date of each file.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q42.



Google 翻訳(一部訂正)

 Webサーバーの内容の改ざんを検出する最も効果的な方法はどれですか?

 a)Webサーバーへの通信を監視して、HTTPおよびHTTPS以外の通信がないこと

  を確認します。

 b)Webサーバーのコンテンツの各ファイルのハッシュ値が納され、各ファイル

  から生成されたハッシュ値と定期的に比較されます。

 c)ウェブサーバのメモリ使用量を定期的にチェックして、バッファオーバーフロー

  が発生していないことを確認する。

 d)ウェブサーバの内容の各ファイルの更新日が保存され、各ファイルの更新日

  と定期的に比較される。

------------------------------------------------------------------------

When a digital certificate has been installed in an in-house system accessed

from a smartphone by an employee, which of the following can be checked

using the in-house system?

a) Ensuring that the applications on the smartphone are the latest versions

of the applications

b) Ensuring that the most recent security patch has been applied to the

OS of the smartphone

c) Ensuring that the smartphone has been allowed to access the in-house

system

d) Ensuring that the smartphone is not infected by a virus

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q43.



Google 翻訳(一部訂正)

従業員がスマートフォンからアクセスする社内システムにデジタル証明書が

インストールされている場合、社内システムを使用して以下のチェックを行うことができますか?

   a)スマートフォン上のアプリケーションがアプリケーションの最新バージョン

であることを確認する

   b)最新のセキュリティパッチがスマートフォンOSに適用されていることを

  確認する

   c)スマートフォンが社内システムアクセスすることを許可されていること

   を確認する

   d)スマートフォンがウイルスに感染していないことを確認する

------------------------------------------------------------------------

Which of the following is a technique where a system is actually attacked and an intrusion attempt is made in order to detect security-related vulnerabilities of a computer or network?

a) Penetration test

b) Regression test

c) Software inspection

d) Walk-through

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q44.



Google 翻訳(一部訂正)

 コンピュータやネットワークのセキュリティ関連の脆弱性を検出するために、

システムが実際に攻撃され、侵入が試みられる術はどれですか?

   a)浸透試験

   b)回帰テスト

   c)ソフトウェア検査

   d)ウォークスルー

------------------------------------------------------------------------


Which of the following can be used to detect worms by using SHA-256 to

calculate a hash value from a subject file, and then cross-checking this

against a database of hash values from files containing specimens of known

worms?

a) A worm that has the same file size as a worm specimen

b) A worm that is in the same subspecies as a worm specimen

c) A worm with code strings that have the same characteristics as a worm

specimen

d) The same worm as a worm specimen

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q45.



Google 翻訳(一部訂正)

 SHA-256を使って件名ファイルからハッシュ値を計算し、既知のワームの標本

を含むファイルからのハッシュ値のデータベースに対してこれをクロスチェック

することによって、ワームを検出するために使用できるのはどれですか?

 a)ワームの標本と同じファイルサイズのワーム

 b)ワームの標本と同じ亜種に属するワーム

 c)ワームの標本と同じ特性を持つコード列を持つワーム

 d)ワーム標本と同じワーム

------------------------------------------------------------------------

Which of the following is the most appropriate explanation of the

deployment diagram defined in UML 2.x (including 2.0 and later versions)?

a) It addresses the dynamic view of the system. In other words, it is

drawn for a single class to show the lifetime behavior of a single object.

b) It describes the types of objects in the system and the various kinds

of static relationships that exist among them.

c) It shows a static view of the run-time configuration of processing

nodes, such as servers and clients, as well as the components that run

on these nodes.

d) It shows the organizations and dependencies among a set of pieces

that are independently purchasable and upgradeable, and addresses the

static implementation view of the system.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q46.



Google 翻訳(一部訂正)

 UML 2.x(2.0以降のバージョンを含む)で定義されているデプロイメントダイアグラム

の最も適切な説明は次のどれですか?

 a)システムの動的ビューに対処する。 言い換えると、1 つのクラスが 1 つの

  オブジェクトの存続時間動作を示すように描画されています。

 b)システム内のオブジェクトの種類と、さまざまな種類の静的それらの間に

  存在する関係。

 c)サーバーやクライアントなどの処理ノードと、これらのノードで実行され

  るコンポーネントの実行時構成の静的ビューを示します。

 d)独立して購入可能でアップグレード可能な一連の要素の中の組織と依存関係

  を示し、システムの静的実装ビューに対処します。

------------------------------------------------------------------------


In software development for small projects, which of the following is

an appropriate explanation of test driven development (TDD)?

a) All functionalities are identified at the start of the project. Code

and test cases are developed together and functionalities are developed

simultaneously.

b) Continuous testing is implemented during the coding process using

automated testing. The process eliminates the requirement for system

testing

c) Development is done in increments of functionality where test cases

are executed and the code is developed to pass the test cases before

moving to the next increment.

d) Test cases are executed at the end for each stage of the development

process where all code must first pass the test case before proceeding

to the next stage.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q47.



Google 翻訳(一部訂正)

 小規模プロジェクトのソフトウェア開発では、次のうちテスト駆動型開発(TDD

の適切な説明はどれですか?

 a)すべての機能は、プロジェクトの開始時に特定される。 コードとテストケース

  は一緒に開発され、機能は同時に開発されます。

 b)自動テストを使用してコーディングプロセス中に継続的なテストが実施さ

  れる。 このプロセスにより、システムテストの必要性が排除されます

 c)開発は、テストケースが実行され、コードが次のインクリメントに移動す

  る前にテストケースに合するように開発された機能の増分で行われます。

 d)テストケースは、開発プロセスの各段階で最後に実行され、次の段階に

  進む前に、すべてのコードが最初にテストケースを通過する必要があります。

------------------------------------------------------------------------

Q48. There is a program module that is executed only when the value of integer x is

25 􀵑 􀝔 􀵏 50. When this module is tested using the boundary value analysis, which of the

following is an appropriate combination of values to be tested?

a) 24, 25, 49, 50 b) 24, 25, 50, 51

c) 25, 26, 49, 50 d) 25, 26, 50, 51

Q49. Which of the following is an appropriate category of system maintenance preformed for

the purpose of modifying the system to cope with changes in the software environment (e.g.

DBMS, Operating system)?

a) Adaptive maintenance b) Corrective maintenance

c) Perfective maintenance d) Preventive maintenance

Q50. Which of the following is an appropriate order of six phases used in every SDLC

(Software Development Life Cycle) model?

a) Requirements Analysis  Design  Programming  Deployment  Testing  Maintenance

b) Requirements Analysis  Design  Programming  Testing  Deployment  Maintenance

c) Requirements Analysis  Design  Programming  Testing  Maintenance  Deployment

d) Requirements Analysis  Programming  Testing  Design  Maintenance  Deployment

------------------------------------------------------------------------

According to PMBOK, which of the following is an appropriate explanation

of project definition?

a) It is a group of related projects, subprograms, and program activities

managed in a coordinated way to obtain benefits not available from

managing them individually.

b) It is a number of people who are gathered to undertake a common job

with different tasks with the aim of finishing all the tasks timeously

to satisfy their customers or stakeholders.

c) It is a temporary endeavor undertaken to create a unique product, service,

or result.

d) It is the application of knowledge, skills, tools, and techniques to

a program to meet the program requirements and to obtain benefits and

control not available by managing projects individually.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q51.



Google 翻訳(一部訂正)

 PMBOK によると、以下のうちどれがプロジェクト定義の適切な説明ですか?

 a)個別に管理することができない利益を得るために、調整された方法で管理さ

  れる、関連するプロジェクト、サブプログラム、およびプログラム活動の

  グループです。

 b)それは、顧客やステークホルダーを満足させるために、すべてのタスク

  時間通りに完了することを目的として、異なるタスクで共通の仕事を引き受け

  るために集められた数多くの人々です。

 c)ユニークな製品、サービス、または結果を作成するために行われる一時的な

  取り組みです。

 d)プログラムの要件を満たし、プロジェクトを個別に管理することによって

  得られない利益と制御を得ることは、知識、能、ツール、および法を

  プログラムに適用することである。


------------------------------------------------------------------------

In the Earned Value Management technique, which of the following is used

to calculate the Cost Performance Index (CPI)?

a) Earned Value (EV) - Planned Value (PV)

b) Earned Value (EV) / Planned Value (PV)

c) Earned Value (EV) - Actual Cost (AC)

d) Earned Value (EV) / Actual Cost (AC)


キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q53.



Google 翻訳(一部訂正)

Earned Value Management術では、以下のうちどれがコストパフォーマンス指標(CPI

の計算に使用されますか?

a)実績値(EV) - 計画値(PV)

b)実績値(EV)/計画値(PV)

c)獲得価額(EV) - 実際原価(AC)

d)実績値(EV)/実績コスト(AC)

------------------------------------------------------------------------


According to PMBOK, which of the following is the project management

knowledge area that includes the activities of make-or-buy decisions,

development time and material contracts, and selection of sellers from

bidders?

a) Project Communication Management

b) Project Cost Management

c) Project Integration Management

d) Project Procurement Management

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q54.



Google 翻訳(一部訂正)

 PMBOK によれば、以下のうち、買手の決定、開発の時間と材料の契約、入札者

からの売り手の選択を含むプロジェクト管理知識領域はどれですか?

 a)プロジェクトコミュニケーションマネジメント

 b)プロジェクト経費管理

 c)プロジェクト統合管理

 d)プロジェクト調達管理

------------------------------------------------------------------------

In order to check whether a system works normally, users in the system

user department and operators in the system operations department jointly

conduct operational testing prior to full operation. Which of the following

is an appropriate description of the users should prioritize during testing?

a) Testing whether all application programs work according to the

specifications

b) Testing whether online, batch, and other processing is performed according

to the operational procedures

c) Testing whether the performance objective is achieved

d) Testing whether the system operates according to predetermined business

procedures

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q55.



Google 翻訳(一部訂正)

システムが正常に動作しているかどうかを確認するために、システムユーザ部門

ユーザシステム運用部門のオペレータが、完全に動作する前に動作テストを

共同で行います。 テスト中にユーザーが優先順位を付けるべきであるという適切

な記述はどれですか?

 a)すべてのアプリケーションプログラムが仕様に従って動作するかどうかの

  テスト

 b)オンライン、バッチ、およびその他の処理が操作手順に従って実行されて

  いるかどうかをテストする

 c)パフォーマンス目標が達成されているかどうかのテスト

 d)システムが所定の業務手順に従って動作するかどうかのテスト

------------------------------------------------------------------------

When data in the business operations department is entered in a data

sheet by the information system department, which of the following is an

appropriate task executed by the information system department?

a) In order to prevent unauthorized use or leakage of confidential

information, data sheets are disposed of immediately after the completion

of data entry.

b) The data sheets are retained in the information system department

until the due date for processing, and confirmation including a check

of the number of sheets received is performed for all sheets collectively

just before the due date.

c) To enable the business operations department to check the processing

results of each data sheet, the processing results list is sent to the

business operations department.

d) When the data sheet contains an error, and only when the error is

obvious, the data sheet is corrected and an entry is made based on

the judgment of only the person in charge of data entry.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q56.


Google 翻訳(一部訂正)

 業務システム部門がデータシートにデータシートを入力すると、情報システム部門

が実行する適切なタスクは次のどれですか?

 a)機密情報の不正利用や漏洩を防止するため、データ入力が完了した直後

  にデータシートを廃棄する。

 b)データシートは、処理期日まで情報システム部門に保持され、期日の直前

  にすべてのシートについて受信されたシート数の確認を含む確認が実行される。

 c)事業部が各データシートの処理結果を確認できるようにするため、

  処理結果リストを事業部に送る。

 d)データシートにエラーが含まれており、エラーが明白である場合にのみ、

  データシートが訂正され、データ入力担当者の判断に基づいて記入されます。

------------------------------------------------------------------------


Among the structures and characteristics of a service desk organization,

which of the following is a description of a local service desk?

a) By consolidating the service desks at a single site or limited locations,

service staff can be deployed effectively and a large number of calls can be handled.

b) By deploying the service desk near the users, it is possible to provide

services for users who have different languages and cultures or for

VIPs by dedicated service staff.

c) By performing centralized and integrated management of all service staff

including those at the dispersed locations, well-controlled services

can be provided.

d) By using communication technology, services such as a single service desk

can be provided, even if the service staff is dispersed across several

regions and departments.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q57.


Google 翻訳(一部訂正)

 サービスデスク組織の構造と特性のうち、次のうちサービスデスクの説明があ

りますか?

 a)単一のサイトまたは限られた場所にサービスデスクを統合することにより、

  サービススタッフを効果的に配置し、多数のコールを処理することができます。

 b)ユーザーの近くにサービスデスクを配置することにより、言と文化が異な

  るユーザーや専用サービススタッフがVIPにサービスを提供することができま

  す。

 c)分散した場所のサービススタッフを含むすべてのサービススタッフの集中管理

  を一元管理することにより、適切なサービスを提供することができます。

 d)通信術を利用することで、サービススタッフが複数の地域や部門に分散

  している場合でも、単一のサービスデスクなどのサービスを提供できます。

------------------------------------------------------------------------

When a version management system for source code is installed, which of

the following is an appropriate check point to be added for the confidentiality

of the source code during the system audit?

a) The access control settings of the version management system are

appropriate.

b) The installation cost of the version management system is at a proper

level.

c) The results of the change registered in the version management system

are approved by the person in charge.

d) The version management system is selected by the development department.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q58.


Google 翻訳(一部訂正)

 ソースコードのバージョン管理システムがインストールされている場合、

システム監査中にソースコードの機密性のために追加される適切なチェックポイント

はどれですか?

 a)バージョン管理システムアクセス制御設定が適切であること。

 b)バージョン管理システムのインストール費用は適切なレベルにある。

 c)バージョン管理システムに登録されている変更の結果は担当者の承認を

  受けます。

 d)バージョン管理システムは、開発部門によって選択されます。

------------------------------------------------------------------------

Which of the following is an appropriate description of the implementation

structure of a system audit?

a) For an audit of the development progress in an information systems

department, the audit team consists of members of the information systems

department who are familiar with the details of the development.

b) In order to enable the person requesting the audit to issue improvement

instructions on the basis of the audit report, the system auditor reports

the audit results to the person requesting the audit.

c) When an audit of the information system is performed as a part of the

business operations audit, the audit team is formed by the members of

the user’s department.

d) When the system auditor accepts the help of an expert, the decisions

concerning the range of support, methods, and audit results is the

responsibility of the expert.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q59.


Google 翻訳(一部訂正)

 次のうち、システム監査の実装構造の適切な記述はどれですか?

 a)情報システム部門における開発進捗状況の監査の場合、監査チームは、開発

  の詳細を精通している情報システム部門のメンバーで構成されています。

 b)監査報告書に基づいて監査を要求する者が改善指示を出すことを可能にする

  ために、システム監査人は、監査を要求した人に監査結果を報告する。

c)情報システムの監査が事業運営監査の一部として実施される場合、監査チーム

は、ユーザー部門のメンバーによって形成される。

d)システム審査員が専門家の助けを受け入れる場合、支援の範囲、方法、

監査結果に関する決定は専門家の責任である。

------------------------------------------------------------------------

Which of the following is a check point for auditing control in relation

to the accuracy of the processing logic of a spreadsheet?

a) A backup of the spreadsheet is stored.

b) The person who creates and uses the spreadsheet is the same.

c) The program of the spreadsheet is documented and verified.

d) The users of the spreadsheet are defined.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q60.


Google 翻訳(一部訂正)

 スプレッドシートの処理ロジックの精度に関連する監査制御チェックポイント

は次のどれですか?

 a)スプレッドシートのバックアップが保存されます。

 b)スプレッドシートを作成して使用する人は同じです。

 c)スプレッドシートのプログラムが文書化され、検証される。

 d)スプレッドシートのユーザーが定義されます。

------------------------------------------------------------------------

Which of the following is the purpose of BPM (Business Process Management)

in the context of corporate activity?

a) Analysis and effective utilization of information resources.

b) Continual improvement of business processes.

c) Effective utilization of management resources.

d) Management and analysis of customer information.


キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q61.


Google 翻訳(一部訂正)

 BPM(ビジネスプロセスマネジメント)の目的は企業活動の中でどれですか?

 a)情報資源の分析と有効利用。

 b)ビジネスプロセスの継続的改善。

 c)経営資源の有効活用。

 d)顧客情報の管理と分析。

------------------------------------------------------------------------

When a workflow system is used for business improvement, which of the

following is an appropriate effect that can be expected?

a) A standard protocol used for data exchange between a company and its

customers can be provided.

b) Processing speed for office procedures from document submission to

approval can be improved.

c) Services, such as a discount, can be provided according to the amount

purchased by the customer.

d) Shipping and receiving of stocked products can be automated in a warehouse.


キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q62.


Google 翻訳(一部訂正)

 ビジネス改善のためにワークフローシステムを使用する場合、次のうち適切

な効果が期待できるものはどれか?

 a)企業とその顧客との間のデータ交換に使用される標準プロトコルを提供する

  ことができる。

 b)書類提出から承認までの事務手続きの処理速度を改善することができる。

 c)顧客が購入した金額に応じて、割引などのサービスを提供することができ

  ます。

 d)ストックされた製品の出荷および受領は、倉庫内で自動化することができ

  る。

------------------------------------------------------------------------

Q63. The table below shows the result of analyzing the daily activities of a sales

representative. By implementing SFA (Sales Force Automation), the preparation time for

customer visits can be reduced by 0.1 hours per customer visit. In order to increase the

number of customer visits to six (6) per day without changing the total working hours and

the hours per customer visit, how many hours must be reduced from “Other working time”?

Time analysis of working hours for a day

Total working hours

Number of

customer

visits

per day

Customer

visit

time

Office work

Preparation time

for customer

visits

Other

working

time

8.0 5.0 3.0 1.5 1.5 5

a) 0.3 b) 0.5 c) 0.7 d) 1.0

------------------------------------------------------------------------


Which of the following is an explanation of SOA?

a) It is a concept that considers the functions of software as components

called services, and combines these services in order to develop

application systems.

b) It is a concept that enhances the efficiency and quality of sales

activities by utilizing IT in order to increase sales and profits and

to improve customer satisfaction.

c) It is a concept that redesigns the business processes fundamentally

in order to improve cost, quality, service, and speed in an innovative

manner.

d) It refers to the outsourcing of internal activities other than the

core businesses in order to concentrate management resources on the

core businesses.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q64.


Google 翻訳(一部訂正)

SOAの説明はどれですか?

a)ソフトウェアの機能をサービスと呼ばれるコンポーネントとみなし、これらのサービスを組み合わせてアプリケーションシステムを開発するコンセプトです。

b)売上高と利益の増加と顧客満足度の向上のために、ITを活用して販売活動の効率性と品質を向上させるコンセプトです。

c)革新的な方法でコスト、品質、サービス、スピードを向上させるためにビジネスプロセスを基本的に再設計するコンセプトです。

d)中核事業以外の内部活動のアウトソーシングを指し、中核事業に経営資源を集中する。

------------------------------------------------------------------------


Which of the following is an explanation of application architecture

that configure enterprise architecture?

a) It systematically indicates the business processes and information flow

necessary for the business strategy

b) It systematically indicates the content of data required for a business

operation, the relationship between data, and the structure of data.

c) It systematically indicates the functions and configuration of a system

supporting a business process.

d) It systematically indicates the technical components necessary for the

development and the operation of the information system.

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q65.


Google 翻訳(一部訂正)

次のうち、構成するアプリケーションアーキテクチャの説明です。

エンタープライズアーキテクチャ

a)ビジネス戦略に必要なビジネスプロセス情報フローを体系的に示す

b)業務操作に必要なデータの内容、データ間の関係、データの構造を体系的に示す。

c)ビジネスプロセスをサポートするシステムの機能と構成を体系的に示す。

d)情報システムの開発及び運用に必要な術的要素を体系的に示す。

------------------------------------------------------------------------



Q66. In the table shown below, the investment category and KPI have been arranged

according to the investment purpose. Which of the following corresponds to investment

purpose C ? Here, a) to d) are applied to any one of A to D.

Investment purpose Investment category KPI

A

Business efficiency

improvement

investment

Adhering to the delivery date,

and required number of days for

monthly closing of accounts

B

Information utilization

investment

Number of registered proposals,

and number of proposals to

customers

C Strategic investment

ROI of new business and market

share of a new product

D

IT infrastructure

investment

Number of system failures and

search response time

a) Betterment of the work process and improvement of work quality

b) Creation of business and establishment of competitive advantages

c) Reduction of system maintenance and management cost, and improvement of system

performance

d) Visualization and sharing of knowledge

– 26 –


Q67. A SWOT analysis is a technique that is used to identify and evaluate the internal and

external factors that are advantageous or disadvantageous to achieve the objectives of the

business or project. When a company’s situation is analyzed as shown in the table below,

which of the following is the most appropriate combination that corresponds to the company’s

Strengths that give the company advantages over others, Weaknesses that give the company

disadvantages relative to others, Opportunities that are exploited for the company’s

advantages, and Threats that cause troubles for the business or project?

Advantage Disadvantage

Internal Factor The company has attempted to

promote innovation. Therefore,

the company holds a significant

number of patents.

The company cannot provide staff

training as a result of its low budget.

Therefore, many staff members are

forced to work inefficiently.

External

Factor

A world contest is determined to

be held by an international

committee in a location near the

company next year.

This year, significant rain caused

flooding in several locations,

including the area near the

company.

a)

Advantage Disadvantage

Internal Opportunities Weaknesses

External Strengths Threats

b)

Advantage Disadvantage

Internal Strengths Threats

External Opportunities Weaknesses

c)

Advantage Disadvantage

Internal Strengths Weaknesses

External Opportunities Threats

d)

Advantage Disadvantage

Internal Strengths Weaknesses

External Threats Opportunities

– 27 –


@@

According to the “competitive strategy” by Philip Kotler, which of

the following is a company that has no high market share, but has the

strategic aim of achieving high profits and acquiring a unique position

by focusing management resources on particular products and services?

a) Market challenger

b) Market follower

c) Market leader

d) Market nicher

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q68.


Google 翻訳(一部訂正)

Philip Kotlerの「競争戦略」によれば、高い市場シェアを持たないが、特定の製品やサービスに経営資源を集中して高収益を達成し、ユニークな地位を獲得するという戦略的目標を持つ企業はどれですか?

a)市場挑戦者

b)市場フォロワー

c)市場リーダー

d)市場ニッチャー

------------------------------------------------------------------------

Which of the following is an explanation of knowledge management?

a) Management centered on strengths that are a challenge for other

companies to imitate, such as the enterprise’s own know-how and technology

b) Management innovation driven by performing comparative analysis

with other successful companies

c) Management which improves the overall problem-solving capability by

sharing knowledge that is scattered across the enterprise

d) Management which maintains a flat organization structure with minimal

hierarchical layers to accelerate decision-making

キーワード

■解答■

Fundamental IT Engineer Examination (Morning) Oct 2016 Q69.


Google 翻訳

知識管理の説明は次のうちどれですか?

a)企業自身のノウハウや術など、他の企業が模倣する挑戦である強みを中心とした経営

b)成功した他の企業との比較分析を行うことによる経営革新

c)企業全体に散在する知識を共有することによって、全体的な問題解決能力を向上させる管理

d)意思決定を促進するために最小限の階層で平らな組織構造を維持する管理

-----