Sunteți pe pagina 1din 31

# Keywords Content

1 Supercomputer - It improves performance by combining several to a dozen processors with vector instructions,or by interconnecting hundreds to thousands of
microprocessors.
2 instruction execution cycle "fetch instruction ⇒ dedoce instruction ⇒calculate address of operands  ⇒fetch operands ⇒execute instruction"
- is an architecture in which the types of instructions are simplified and all instructions are executed using wired logic on hardware.
3 RISC(Reduced Instruction Set Computer) - Since the instruction length is fixed,execution times for most instructions are the same,which makes it suitable for pipeline control.
- It has many registers so that operations can be executed on registers to increase processing performance.
4 CISC(Complex Instruction Set Computer) - is a legacy architecture which provides a wide variety of instructions and implements multifunctional and complex instructions using microprograms.
-Since the instruction lengths are variable and their execution times differ,it is not suitable for pipeline control.
- is a method of increasing CPU performance by dividing instruction execution cycles into several stages and overlapping each stage.
- the instruction cycle is fetch instruction(1) → decode instruction (2) →calculate address of operands(3)→fetch operands(4) →execute
5 Pipeline Processing instruction(5)→store result of operation(6)
-In this way,pipeline processing increases the performance of instuction executions by fetching the next instruction before the execution of the previous
instruction has finished,and then executing different stages of multiple instructions at the same time.
- A situation which disturbs and prevents the parallel execution of processing is called a pipeline hazard.

6 Tightly coupled multiprocessor system -main memory is shared,and a single OS controls the system.
-the processors are usually considered equal,and tasks in the system can be executed on any processor.
7 Loosely coupled multiprocessor system each processor has its own main memory and OS(can be different OS),and exchanges information by using high-speed I/O ports.
I/O interrupts(completion of I/O operations or malfunctions in I/O devices), timer interrupts(expiration of timers),and machine check interrupts(such as
8 External interrupts
malfuncitons in hardware or power failure)
9 Internal interrupts supervisor call interrupts(use of OS functions through SVC instructions or system call instructions by the program being executed),program interrupts(such
as divede-by-zero,overflow,executing invalid instructions,and page fault)
- A clock,which is a component of a CPU,is a circuit that generates a signal(clock signal) to synchronize the operation timing in each funcitonal unit of a
computer.
-Clock frequency,represented in MHz,is the number of cycles of the clock signal that occur in a second.
-The clock frequency of a CPU is several times greater than the system bus(equaling several pulses of the clock).
10 Clock frequency -The inverse of the clock frequency is the clock pulse interval time.
-The number of instructions(in millions)that can be executed in a second is represented by MIPS.
-By increasing the CPU clock frequency,a PC's overall performance does not increase propotionately.Because When there is a performance bottleneck in a
device other than the CPU,overall system performance will not improve no matter how much CPU performance improves.
-If the types of CPUs and their clock frequencies in two PCs are the same,the program execution performance of the two PCs can be considered
equivalent.
11 VLIW(Very Long Instruction Word) Multiple instructions are executed simultaneously with one instruction word.
12 Super-pipeline Increasing the number of pipeline stages enables operation at high frequency and speeds up processes.
13 Superscalar Each instruction processing stage.such as fetch,decode,and execution,is processed in parallel.
-enables high-speed memory access.
DDR-SDRAM(Double Data Rate Synchronous -High-speed is achieved by accessing data at both the rising and falling edges(double)of the clock signal.
14 -In other words,two data can be accessed in one clock cycle.Therefore.access speed is doubled in comparison with standard SDRAM(which enables one
DRAM) data to be accessed in one clock cycle).
-Since DDR-SDRAM is a type of SDRAM,it operates in synchronization with the clock signal.
-When data is read from a memory cell,a row address is specified only once and multiple data is read from a row buffer at high speed while altering the
15 Fast Page Mode(FPM)DRAM column address.
-this DRAM is categorized as asynchronous DRAMs.
16 EDO(Extended Data Out)DRAM -It reduces the page access cycle time for high-speed page mode DRAM and thereby tranfers data at higher speed.
-this DRAM is categorized as asynchronous DRAMs.
17 SDRAM -One data is read per clock cycle in synchronization with a memory bus clock(external clock).

-In order to compensate for the gap between CPU processing performance and main memory access speed,cahce memory that can be accessed at high-
speed is placed between them.
18 cache memory access time & hit ratio -Hit ratio is the porobility that the target data exists in cache memory.If the target data is not in cache memory,it is read form main memory.
-When the hit ratio is p,then the probability of reading the data from main memory is defined as 1-p.
-When the access time of cache memory is Tc and that of main memory is Tm,the effective access time is Tc*p+Tm*(1-p).
19 Write-back method -When the data is written into the same address repeatedly,the number of accesses to main memory can be reduced.
-The method in which data is simultaneously written to both cache memory and main memory.
20 Write-through method -When data is flushed out of cache memory,main memory need not be updated.
-Mismatch does not occur between the data in cache memory and its corresponding data in main memory.
21 Memory Interleaving -Partitioned banks are connected with a CPU via separate buses so that they can be accessed independently.
-A method of increasing data I/O speed by distributing and writing data onto multiple hard disks.
22 Striping -this method is used in RAID which aims to achieve a disk system with high capacity,high reliability,and high I/O performance by handling multiple hard disks
as one hard disk.
# Keywords Content
-The term "swapping" is usually used to refer to replacing something.
-To replace devices such as a failed hard disk while continuing the operation of a computer system is called hot swapping.
23 Swapping -To save processes that were not running for a long time to disk from memory is called swap-out,and the reverse is called swap-in.
-A program is temporarily suspended and the data used in main memory is saved in auxiliary storage.When resuming the program ,it is reloaded into main
memory and restored to its original state.
# Keywords Content
24 Disk caching -Based on the property that data read from a disk is often referenced again,this is a mechanism or memory to improve disk performance by temporarily
saving data read from the disk to disk memory and eliminating the need for input operations when the data is referenced again.
25 Mirroring Or Disk duplexing -By writing data into two disks simultaneoulsy,when either disk fails,operations can be continued using the other disk.
-This increases the availability of a computer system.
-Since one hard disk out of six is used as a spare disk,the number of hard disks that can be used to configure a RAID5 system is five.
26 RAID 5 -RAID5 consists of effective data and parity data.
-The parity data is distributed among multiple disks but its total capacity sums up to the equivalent of one hard disk.
-Therefore,the capacity of effective data is equivalent to the capacity of four hard disks,which is 80GB*4=320GB.

-The storage media on which organic dye is used as a recording layer and data is recorded by creating singes with a laser.
27 CD-R(CD-Recordable) -is a type of CD in which data can be written only once.
-Since singes are created,data cannot be erased once it has been written.
28 CD-RW(CD-ReWritable) -is a type of CD which enables data to be written or erased any number of times.
-records data by using a laser to heat the material in the recording layer to change its characteristics(reflectance).
29 DVD - is a recording media with the same diameter as that of CD(12 cm).
-Its recording density is higher than that of CD,and double-sided and double-layered recordings are possible.
-refers to rewritable DVD
30 DVD-RAM -In DVD-RAM,data is recorded in almost the same way as in CD-RW.

31 DVD-ROM -refers to read-only DVD.


-In DVD-ROM,similar to CD-ROM,data is recorded by creating small dimples called "pits".
-It is used in backplanes and expansion slots,and is a digital signal transmission path shared by multiple devices.
-There are several methods of categorizing buses.
32 System bus -When they are categorized as internal and external buses of computer,a system bus is categorized as an internal bus similar to a processor bus(a
connection between components in a CPU) or a memory bus(a connection between a CPU and main memory).
-External busses include the I/O bus between an I/O controller and auxiliary storage devices,and between I/O controllers.
33 RS-232C It is a standard used in many PCs to transfer data serially between PCs and modems or between PCs and peripherals.
34 DMA(Direct Memory Access) or I/O channel It is a mechanism of transferring data between I/O devices and the main memory independently of the CPU.
- It connects devices in a tree structure using hubs and has two data transfer modes: high-speed and low-speed modes.
35 USB - High-speed(480Mbits/sec)mode was additionally defined from USB2.0,and super speed mode(5Gbits/sec) was further added from USB3.0.
- there are four tranfer mode: isochronous transfer,interrupt transfer,control transfer,and bulk transfer.
36 Isochronous transfer -is a mode of focusing on real-time transfer without retransmission.It is mainly used for playing back video or audio.
37 Interrupt transfer -in which,polling is periodically performed by the computer to detect the status of buttons or the like,is mainly used for mice or joysticks.
38 Control transfer -is used for configuring or controlling devices.
39 Bulk transfer -is used for exchanging large amounts of data.
-is used for devices connected via USB such as disk devices,printers,scanners,and network adapters.
- is an interface specialized for high-speed transfer of large amounts of image data.
40 AGP(Accelerated Graphics Port)
-a bus specification as an interface specifilcally for transferring video data.
41 ATA(AT Attachment) -is a standard defined by ANSI(American National Standards Institute) based on the IDE(Integrated Device Electronics)specification which is an industry
standard used for interfaces to connect hard disks in IBM PC/AT-compatible PCs.
42 ISA(Industrial Standard Architecture) -is an I/O bus with a data width of 16 bits to connect I/O expansion cards to PCs.
- ISA(Industrial Standard Architecture) bus is an industry standard based on the AT bus specification disclosed by IBM as a bus specification for PC/AT.
- is an I/O bus used to connect I/O expansion cards to PCs and is similar to an ISA bus,but with a significantly increased data transfer rate such as by
43 PCI(Peripheral Component Interconnect) bus widening the data width to 32 bits.
- is widely used as a standard bus which does not depend on CPU architecture.

- is a method in which a dedicated control circuit transfers data between I/O devices and main memory.
44 DMA(Direct Memory Access) - The ciruit dedicated for this purpose is referred to as DMAC(DMA Controller).
- By using this dedicated circuit to control data transfer(i.e., data I/O for peripheral devices) between I/O devices and main memory, the CPU can be
relieved of this control function.
45 Direct Control - It is a transfer method in which the CPU exchanges data between the hard disk and main memory.

- It maps registers of I/O devices to I/O-specific address spaces in main memory.


46 Memory-mapped I/O - It is mainly used in RISC machines that have huge memory space.
- Incidentally,the alternate method is called the I/O mapped I/O method.

47 I/O-mapped I/O method - It is widely used in mainframes or PCs which use CISC processors.
# Keywords Content
48 Pipelining - It is a method to shorten overall processing time by partially overlapping the execution stages of multiple instructions.
- It is a method to control the execution of CPU instructions and is not an I/O control method like the other options.
# Keywords Content
- It is a Braun tube used for television sets.
49 CRT(Cathode Ray Tube) - Fluorescent material applied on the display surface illuminates when an electron beam deflected by a magnetic field or electrode hits the display surface.
- Its power consumption is high in comparison with LCDs.

50 PDP(Plasma Display Panel) -It is a display which has gas such as helium or neon sealed in between two sheets of glass and emits light by applying voltage to the gas.
-Althrough it is slim,lightweight,and luminous,power consumption is high in comparison with LCDs.

- It is a display which has material called liquid crystal sandwiched between glass plates.
51 TFT liquid crystal - Liquid crystal changes its transparency by altering its molecular structrure when voltage is applied.
- A type of LCD in which voltage is applied to each bit of pixel through a thin-film transistor is called a TFT(Thin Film Transistor) system.
- Liquid crystals require a backlight since they do not emit light on their own.
52 Vertical distribution system -There is a hierachy or dependency between processors like the relationship between client and server.

- In order to increase the efficiency of the system,load is distributed among multiple processors running the same application.
- It has the advantage of being able to continue processing even if some processors fail.
53 Horizontal distribution system - In order to balance the load,the processor in the network on which each application runs is predetermined.
-Since each of the functions is assigned to different processors,applicatio programs are easier to manage.
- It also has other advantages such as being able to install the most appropriate processor for each application.

Horizontal distribution system (Or) Horizontal load - Multiple computer systems that can run also as stand-alone computers are connected to a network as almost equivalent entities and share resources
54 distribution system including data.
55 Grid Computing -It is a mehod of distributing tasks among multiple processors ranging from PCs to large computers in the network.
- It is a method of distributing tasks among multiple processors which have their own roles; for example,one processor runs the OS and another processor
56 Asymmetric multiprocessing runs an application.
-In which,processors are preassigned according to the tasks they will perform.
-It is a processing method in which kernel processes are not distinguished from user processes and multiple processors behave in a basically equivalent
57 Symmetric multiprocessing manner.
- In which, multiple CPUs perform tasks as equivalent entites.
58 Multithreading - It is a method of increasing the utilization efficiency of processors by realizing thread-level(a unit of program execution) parallelization.
- is a system in which the client/server application consists of three logical tiers: the presentation layer,the function layer(business logic player), and the
data layer(database layer).
59 Three- tier client/server system - The presentation layer provides user interface functions,the function layer provides business processing functions such as data processing,and the data
layer provides database access functions.
- By lowering the interdependency between each tier,development tasks for each tier can be performed in parallel.
60 RPC(Remote Procedure Call) - is a type of inter-program communication method in which part of the operations are performed on other computers.
61 Remot Login - is a method of checking if users accessing the computer from remote sites are registered users or not.
62 Store Procedures - is a method of grouping a series of database procedures into one operation which is executed on servers with arguments passed by clients.
63 Network drives - is a method of remotely using hard disks on computers in other locations as a shared resource.
System configuration requirements for adopting thin Software,hardware,and network configuration
64
clients
65 Cluster Configuration - is a method of bringing(or clustering) multiple computers together and using them as one system.
66 Tightly coupled multiprocessor system - multiple CPUs share memory.
67 Dual Configuration - two systems with the same configuration perform the same task and compare the results to proceed with processing .
68 VM(Virtual Machine) system - in which multiple Oss run on one CPU.
- is a method in which two systems(i.e., production and backup) are prepared,and if the prodution system fails,processing can be continued by switching
69 Duplex Configuration operation to the backup system.
-When the producing system is working normally,the backup system often performs batch processing,etc.
70 Fault tolerance -is technology to prepare for failures by multiplexing important components of the system.
71 Fail safe - is technology to desing systems so that a failure in one part of the system will have an effect of leaning towards the safer side.
- is required in systems such as those related to human life or social infrastructure.
- is technology to design systems to allow failed equipment to be temporarily disconnected from the system so that the system can continue operating
72 Fail soft without completely stopping,alothough its performance will be lowered.
- is technology which enables operations to continue even if some components fail.
73 Fault avoidance is technology which prevents failure by enhancing the reliability of each component.
- It can be directly connected to the LAN so that files can be shared by multiple computers running different OSs.
74 NAS(Network attached Storage) - data is shared in units of files.
# Keywords Content
- In SAN,a dedicated network,which is separate from the network connecting servers and clients,is used to connect servers and storage devices, and data
is exchanged over the network in units of blocks.
75 SAN(Storage Area Network) - data is shared in units of blocks.
- Since SAN uses a dedicated network to connect servers to storage devices,network load is lower compared with NAS.
- In addition,SAN uses a data transfer method called fiber channel to achieve long-distance high-speed data transfer.
# Keywords Content
76 DAS(Direct Attached Storage) - A file system built on general-purpose servers can be shared to increase the freedom of using files.
- is a storage device that is connected directly to a server on a one-to-one basis.
77 Load balancer - It distributes requests from clients among multiple servers so that they are not concentrated at a particular server.
78 SSL(Secure Sockets Layer)accelerators - encrypts and decrypts data exchanged in SSL communication at a high-speed to relieve the load on a Web server.
79 Bandwidth controllers - transfers data by allocating required line bandwidth for each business application.
80 Multilink(link aggregation) -handles multiple lines as a single virtual line to realize enhancements in reliability and transmission bandwidth.
81 Benchmark test -Running several kinds of benchmark tests to evaluate performance is effective when choosing machines to be installed because it provides understanding
of system performance characteristics.
82 Computer system performance evaluation using In order to maintain calculation accuracy and prevent excessive increase in calculation time,the handling of events not directly related to a specific
simulations performance item to be evaluated should be modeled in a simple manner.
83 Frequency of paging the best indicates a state of contention on main memory.
84 Availability MTBF/(MTBF + MTTR)
85 MTBF Total operating hours/ Number of failures
86 MTTR Total repair hours/ Number of failures
-which represents the failure rate of hardware.
87 Batchtub curve - this curve can be divided into the following three periods,based on the main causes of failure that occur in these periods: Early failure period,Random
failure period,Wear-out failure period.
- It is the technical term referring to the early period after the systems starts operating.
88 Early Failure period - In this period,failures occur because of design errors,mistakes in the development process,etc.
- These kinds of failures decrease over time.

89 Random failure period - It is the technical term used to designate the period of time whnen the influence of early failures has decreased,the state is stable with failure rate being
constant,and failures occur at random.
90 Wear-out failure period -It is the technical term used to describe the period of time when failures caused by wear or damage from long-term usage occur.
- Failure rate increases over time.
91 UNIX - It can handle peripherals as files in a directory hierarchy.
92 Thrashing - In a virtual memory system,system overhead increases and processor utilization of programs decreases when main memory capacity is not sufficient and
multiplicity of programs is increased.
- A situation where memory in a storage device is fragmented and the system cannot allocate contiguous memory of a required size,reslulting in a series of
93 Fragmentation interspersed memory areas.
-When write and delete operations are repeatedly performed on the storage device,this condition gets worse and the efficiency of the system will decrease.

-In virtual memory systems,when there is no space in real memory,the system pages out the part of a program in real memory which is not required
immediately to an auxiliary storage device and instead pages in the part that will be required next to that space.
94 Paging -These two operations are collectively referred to as paging.
- The pages that were paged out are stored and managed in places called slots in the auxillary storage device.
-The main memory and program are divided into fixed-length units for efficient memory managemet.Thus ,a large progarm can be executed with a small
amount of main memroy.

95 Bottleneck - A bottleneck is a hindrance to progress or production in the overall resources of a computer system ,such as the heavily-loaded resource.
- In system development,it includes an event which hinders development activities.
96 FIFO(First in First Out) - is a method which replaces the page that has been in real memory for the longest time.
97 LRU(Least Recently Used) - replaces the page which has not been accessed for the longest time since the last reference.
- A job is a set of procedures performed in a computer and consists of one or more job steps.
98 Job - A job step consists of tasks or processes that are units for which CPU is allocated.
99 Round Robin Scheduling - allocates CPU to jobs fairly,it is possible to assure throughput and response time.
100 appropriate explanation of job scheduling in -In systems where interactive processing and batch processing coexist,the response of interactive processing can be enhanced by giving higher priority to
computer systems interactive processing.
Task scheduling method in which a certain task is -SJF(Shortest Job First).
101 likely to continue waiting for CPU resource - The task with the shortest expected processing time is executed first.
allocation -The next task is started when the current task is completed or interrupted for some reason.

- Preemption in process control means that the system takes away CPU from a running process and assigs it to another process.
- In the Round robin method,the system assigns CPU to a process for a certain period of time ,and if the process does not finish after this period,the
system adds the process to the end of the ready queue having the same priority and then assigns CPU to the process at the top of the queue.
102 Preemptive & non-preemptive processes - Preemption is performed when the process does not finish within time quantum.Thus,this method can be classified as a preemptive method.
- In the first-come first-served method,processing is performed in order of arrival(in order of entering into ready state)and preemption does not occur until
the process finishes.Thus,this method can be classified as a non-preemptive method.
- In the SPTF(Shortest Processing Time First) method,the system gives higher priority to processes with the shortest processing time.
Thus,this method can be classified as a preemptive method.
# Keywords Content
103 semaphore "V operation" moves a process,if any,in waiting state to ready state.
- A process is an execution environment of a program.
- A thread is an executabel unit in a process,and one process contains one or mor threads.
104 threads and processes - Address space(memory space) is allocated to each process,and threads within the same process share this address space.
- CPU resources(program counter,status register) are allocated to each thread.
- Communication between threads contained in the same address space can be efficiently conducted compared with communication between processes.
105 API(Application Program Interface) - It is a mechanism for applications to use the various functions provided by an OS.
106 Fast screen rendering(e.g., DirectX in Windows) -It is a mechanism for applications to directly operate hardware to achieve various functions.
107 Socket - an inter-process communication interface in TCP/IP,is one mechanism which allows applications to communicate over a network.
108 standardization of GUI(Graphical User - It is a mechanism to standardize menu items in applications for user convenience.
Interface),eg.,Motif and OPEN LOOK in UNIX
109 Device driver - It is part of an OS and performs device-dependent I/O control and is provided for each device.
- In computers such as PCs,when a new peripheral device is connected,its corresponding device driver may need to be installed.
110 Spooling -For input and output which do not need immediate processing such as file printing or file transfers over a serial line,requests are passed to dedicated
processes so that I/O operations and progarm execution can be performed concurrently.
-Performance can be improved by concurrently performing the I/O and other operations of a program.
111 Buffer pool
- For this purpose ,many areas to perform I/O operations are prepared in main memory and are shared by multiple programs.
112 Dynamic relocation - A technique which allows the system to move the locations of object modules in main memory while executing programs for effecive use of main memory.
113 Garbage collection - A technique of retrieving heap ares that are not used by programs anymore and making them usable again .
114 Dynamic linking - A technique of loading program modules provided by libraries on an as-required basis during the execution of a program.
115 Memory leak -Memory areas allocated to processes remain unreleased even when they are no longer required.
116 Memory fragmentation -Many unused areas scattered everywhere are generated as many processes are executed.
- A technique which allows the system to execute programs larger than the amount of main memory .
- When limited space is available for executing programs,only necessary modules are stored and used on main memory by loading them over unnecessary
117 Overlay modules.
- A program is divided into several units and is stored in auxiliary storage in advance.Then,the program is loaded or unloaded between main memory and
auxiliary storage according to the instructions in the program.
118 write-protected -A process writes data into areas other than the one allocated for it and destroys other process areas.
119 An appropriate description of handling multiple - It masks an interrupt with lower priority than the one it is currently handling.
interrupts in a real-time OS
120 role of a shell in OS -It interprets commands entered by the user and instructs the OS to run the corresponding functions.
121 shorcut key -It substitutes mouse operations with keyboard operations such as selecting commands from menus or items on setup screens on an application.
122 Provided by an OS - It effeciently performs security management and mutual exclusion(exclusive control) when multiple users simultaneously access shared resources.
123 icons(shortcuts) - It retains reference information to frequently used files and directories to make them available to users even if they do not know the actual paths.
- Two-way reference is possible between parent and child directories: from parent to child,and from child to parent.
124 Path Specification in file systems - An absolute path specification which describes the path from the root directory to the file.
- A relative path specification which describes the path from the current working directory(current directory).

125 Simulator - is a tool which mimics(or simulates) the behavior of software or hardware or both.
- A program which generates large artificial traffic to evaluate the performance of online processing is a kind of simulator.
126 Inspector - A tool used to check the content of an object at the time of debugging a program .
127 Snap shot - which records the values of variables.
128 Code auditor(code audit tool) - is a tool to detect programs which violate development standards including programming format,name conventions ,and commands that can be used.
129 Editor - A tool that has functions including automatic replacement of string to edit program source code.
130 tracer - is a tool to support debugging by printing out instructions and their results in order of program execution.
131 Assertion checker - A tool which inserts logical conditions that should hold true between variables into appropriate places in programs to inspect whether or not they are
satisfied at run time .
132 Coverage monitor - is a tool to monitor the run time coverage of instructions in programs.
- A language processing program which generates object programs for different machine platforms that have different instruction formats.
- For example,in the case of developing embedded systems for cell phones or household electronic appliances,since development is not possible on such
133 Cross Compiler target machines,programs are developed on a PC and the object program that can run on the target machine is generated using a cross compiler.
- This kind of development method is sometimes referred to as cross building.
- is a language processing program which executes source code while translating it line by line into machine language.
134 Interpreter - Interpreted language includes BASIC and Perl.
135 Emulator - is a software which enables a computer to execute programs developed for a machine platform which has a different instruction format.
- For example,it provides a function to execute programs for dedicated gaming machines on a PC.
- is a language processing program which generates programs by specifying processing conditions as parameters.
136 Generator
- Program development support tools classified as fourth generation languages often provide generator functions.
# Keywords Content
137 Upper CASE tool - is a tool which supports activities in upstream processes of system development including basic planning,external design, or internal design.
- Thus,a function to create a DFD(Data Flow Diagram)required at the design stage is classified as a funciton provided by an upper CASE tool.
- Supporting the creation of test data
- Automatic generation of program code
138 Lower CASE tool - Although a function to support library management may be classified as a lower process in consideration of managing libraries such as source
programs,object modules,and load modules,it is difficult to classify this function as an upper or lower process in consideration of including the management
of documents that are deliverables in upstream processes.

- defines open source software as having distribution terms that comply with ten criteria.
1. It must be freely redistributable.
2. Source code must be disclosed.
3. The creation of derived software must be allowed,and the same license must be inherited.
4. The author of the software can require a person who modifies and distributes the software to divide the distributed software into the author's source
code and difference software(integrity of the author's source code).
139 OSI(Open Soruce Initiative) 5. Persons or groups must not be discriminated.
6. Fields of endeavor must not be restricted.
7. Additional licenses must not be requested at the time of redistributing.
8. A license must not be specific to a product.
9. A license must not restrict other software distributed on the same media.
10.A license must be technology-neutral.
- Therefore,OSS can be used by for-profit businisses and alos in a specific research areas.
When OSS is integrated into commercial software,disclosing the source code of the commercial software may be required depending on the OSS license.

- uses a flip-flop,a circuit that has two stable states,as a memory cell.
140 SRAM - is used as cache memory owing to its high-speed access.
- Since its circuit is complex and high integration is difficult,there is no SRAM with capacity as large as DRAM.
- In addition, the cost is higher than DRAM.
- A type of RAM which needs to be refreshed every several milliseconds becaues the electrical charge weakens over time.
141 DRAM - Although access speed is lower than SRAM because of this behavior,its circuit is simple,cost is low,and creating high-capacity memory is relatively easy.
- It is used as main memory,RAM disk,etc.
- Its characteristics is that the memory content does not disappear when the power is turned off(nonvolatile).
142 EEPROM(Electrically Erasable Programmable ROM) -- Although ROM means read-only memory,rewritable ROM is referred to as PROM(Programmable ROM).
Among PROMs,flash EEPROM(flash memory) allows its content to be electrically erased entirely or in units of blocks and is used as a storage medium for
digital cameras or IC cards.

143 Mask ROM - A kind of ROM in which memory content is set when manufacturing as read-only memory.
- Data cannot be rewritten.
144 System LSI - It is a kind of LSI which combines Ips ( Intellectual Properties) to consolidate functions previously implemented in multiple LSIs into one chip.
145 SoC(System-on-a-Chip)technology - Integrating various functions onto one chip is often called SoC(System-on-a-Chip)technology.
- In processors using CMOS,by lowering operating frequency,electric current on logical inversion can be decreased and thus power consumption can be
reduced.
- Power consumption of CMOS is lower than that of bipolar(transistor).
146 power-saving technology in microprocessors - Clock gating is a method of reducing power consumption in an internal circuit of an integrated circuit by stopping clock input to the part of the circuit
which does not neeed to operate.In this method,power consumption can be reduced even when the CPU is not in standby mode.
- In general, power consumption in an integrated circuit is proportional to the frequency and the number of gates and to the square of the power voltage.
Therefore,as the operating voltage is raised,power consumption of the circuit increases.
Tightly coupled multiprocessor
OS

CPU Memory CPU

CPU CPU

VM(Virtual Machine)system

OS OS

Memory

CPU

Loosely coupled multiprocessor configuration

OS OS

Memory Memory

CPU CPU

Dual Configuration

OS OS

Memory Memory

CPU CPU

Collator

Duplex Configuration

Cluster Configuration
# Keywords Content
1 Web content usability - It refers to the extent to which users can achieve desired requests with as little stress as possible.
2 Universal Design - It refers to a design that anyone can use regardless of such factors as physically-challenged,age ,gender,or nationality.
3 Barrier-free Design - It refers to a function that allows the physically-challenged,elderly, and the like to operate or use a service without difficulty.
- It refers to a design that does not place any burden on the physically-challenged,elderly,or the like.
4 Accessibility - It means that software,information services,Web sites,and the like are available to anyone,including the elderly or the physicall challenged.
- It refers to improving resident services and streamlining administrative work processing by managing Basic Resident Register information via computer networks.
5 Basic Resident Register Network System - This is a system for the sharing and use of information on individuals that have been assigned resident registration codes(individuals recorded in the Basic Resident
Register)by networking governmental organizations and centers nationwide with local governments(prefectural and municipal).
6 Interoperability -It refers to interoperability,such as accessing databases managed by computers with different specifications over a network.
7 Traceability It means that records can be traced for products,food items,and the like,from the manufacturing stage to the final consumption stage or the disposal stage.
8 To improve the consistency of operations - Retaining the same position and shape for operation buttons on every screen
9 Undo function - which returns a system to its previous operational state,is prevent problems because of user operation errors.
10 Shortcut keys - is to save the time and effort involved in information entry.
11 Displaying progress status - is to eliminate user's feeling of unease by providing processing feedback to the user.
- In order to maintain uniformity across forms,it is desirable to determine in advance design rules,including paper sizes as well as print positions and font sizes
12 Output form design related to form titles and printed items.
13 Sequence code - Sequence codes are codes ordered in accordance with defined rules.For example,these can include codes in natural number code,or alphabetical order.

- It is a code in which each digit of a decimal number is expressed by a string of a specified number of bits.
14 Decimal code - Example: Expressing each digit of a decimal number with 4 bits]
- 0 0 0 1 ⇒ 1 ,0 1 0 1 ⇒ 5

15 Block code - It refers to the sets of symbolic strings created by encoding data which has been divided into blocks, and the method for performing that encoding.
- a code system which suggests the data content is disired.
16 Mnemonic code - "Mnemonic" means "assisting the memory," and mnemonic code is code which assists people's memory by suggesting the content of data.
- Using symbols in assembler language instructions such as ADD to represent an addition instruction is an example of a mnemonic code.

- lossless compression method and lossy compression method.


- With lossless compression,expanding the compressed data results in the original data being perfectly restored.This is used for compressing programs and data,but
17 two types of image encoding methods the compression ratios offered are not very high.
- Conversely,with lossy compression,the original data cannot be perfectly restored by expanding the compressed data.This is used for compressing images,audio,and
the like,in which a certain degree of error is acceptable.It offers high compression rates.
- is a compression method for use on full-color still images.
18 JPEG(Joint Photographic Experts Group) - It is generally lossy,but there also exist lossless JPEGs.Therefore, this corresponds to "a compression method with which the original data may not be fully
recovered when compressed data is decompressed.
19 GIF(Graphic Interchange Format) - This is a lossless compression format developed by CompuServe for compressing 256-color still images.
20 ZIP -This is a file compression format developed by PKWARE.
21 Run length method - This is a compression method that counts how many times the same data appears consecutively,and uses that number as data to perform compression.
22 MPEG-4 -is used for transmitting video data to protable communications devices(e.g., cell phones) and other devices.
23 MMR(Modified MR) - This is a compression method that is primarily used by G4 FAX,and suited to monochrome images without gray scale information.
24 MP3( MPEG Audio Layer 3) - This is a layer 3 compression method for MPEG-1 audio.Layers 1 and 2 are used for digital broadcasting.
- is a code defined by ANSI(American National Standards Institute equivalent to Japan's JIS).
25 ASCII code - consists of the alphabetical letters,numbers ,special characters, and contol characters.
- does not define Kanji characters.
- EUC includes Kanji.
26 EUC(Extended UNIX code) - is a 2-byte or greater character code set for handling characters from every country by UNIX systems in a unified way.
- Kanji codes are expressed with 2 bytes, but JIS implemental Kanji,including control characters,are expressed with 3 bytes.
- This is a character code set for handling characters from every country in a unified way.
27 Unicode - All characters are assigned a 2-byte code or a 4-byte code.
- The description applies to Shift-JIS code.
-This is a modification of the JIS Kanji code.
28 Shift JIS code - The first byte is shifted in order to avoid overlapping with ASCII code,so it can be used individually or mixed together with ASCII code.
- The description applies to EUC.
29 Virtual Reality(VR) - VR enables computer-simulated objects and spaces to be perceived like the real world by using computer graphics,etc.

Section3-Technological Elements
# Keywords Content
30 Simulations - is one of the applications of virtual reality.
- VR conducts computer simulations in place of wind tunnel testing used in the design of cars ,airplanes,and the like.
31 VFX(Visual Effects) - VR combines separately taken images of scenery and people to create an image that is different than what is presented.
32 SFX(Special Effects) - is sometimes used synonymously,but in actuality refers to compositing methods which do not use computers.
-- VFX and SFX are
is a techinique thatsometimes
is used toused interchangeably.
obscure the step-like roughness at the boundaries of the shape by assigning intermediate changing colors to the pixels near the
33 Anti-aliasing boundaries.
34 Clipping - refers to specifying one part of an image in order to set a limit to the processing range.
35 Shading - refers to adding shadows on order to create a three-dimensional effect.
36 Morphing - refers to creating intermediate images between two images before and after a change in order to make the image change smoother.
- is composed of external schema(data item groups which describe the logical structures needed from individual user perspectives),conceptual schema(data item
37 Three - schema structure groups which describe the logical relationships inherent in the data),and internal schema(data item groups which are described taking into consideration
hardware,performance,recovery, and security).
38 ACID - stands for Atomicity,Consistency,Isolation,and Durability.
39 relational database index - Indexing is not effective on columns with two or three types of possible values.
- DISTINCT
- Set functions or calculations
40 impossible to update the view - Join operations
- subqueries
- GROUP BY and HAVING
- there are two types of exclusive control(locks): "shared locks" and "exclusive locks.".
41 Exclusive control - With an exclusive lock,a recored is made exclusive,and cannot even be referenced.
- Shared locks can co-exist,but other combinations cannot.

- For a database medium failure,the backup data is first restored, and then roll-forward processing is performed using "redo" information of journal files.
42 Database failure measures - For a database system failure," a checkpoint is set." during transaction processing and the processing is restarted from that point.
- When a transaction processing program terminates abnormally during a database update because of reasons other than physical failures, roll- back processing is
performed using "undo" information of journal files.

- Deadlocks occur as a result of using locks,so this combination is appropriate.


- Lost update: This means that update contents are lost because of updating of the same data by another transaction.
43 Problems related to transaction parallel control -Uncommitted dependency: This is also known as a dirty read.This means that data which has been updated by another transaction but not yet committed is read.
-Inconsistent analysis: This is also known as a non-repeatable read.This means that transactions read the same data several times,and because of updating by
another transaction the value of the data initially read does not match the value of the data read later.

- It is a technique to analyze high volumes of data and to find hidden patterns and interrelationships that cannot be discovered just by simple searching.
44 Data mining - These discoveries are made using neural networks and advanced mathematical methods such as statistics with an aim to make future forecasts based on past
data.
-Software with functions for processing high volume data at high speed and automatic rule detection algorithms have been developed as data mining tools.

45 Data mart creation - It is a technique to analyze high volumes of data and to find hidden patterns and interrelationships that cannot be discovered just by simple searching.

46 Metadata in data warehouse - It is a framework of data structures,meanings,and operations defined based on the data to be processed.

47 OLAP(OnLIne Analytical Processing) -It is a techinique to perform a wide range of analyses in a short period of time by storing multiple attribute items in a database and combining different attribute
items.

48 Database metadata - Data describing the data definition information


- is also stored in DBMS in the forms of data dictionaries or repositories.
49 domain - The range of values that an attribute can have

50 Recall ratio number of matching items searched(b) / total number of matching items in the database(a)
51 Precision ratio number of matching items searched(b) / total number of matching items searched(c)

Section3-Technological Elements
# Keywords Content
- are communications which are performed without first establishing a transmission route(connection) between the sending and receiving ends.
52 Connectionless Communications - With this communications approach,each packet is handled separately and individually,so the destination address must be attached to all transmitted data(packets).
- Therefore,All transmitted packets are attached with information indicating the destination.

53 PVC(Permanent Virtual Circuit) requires a transmission path to be permanently established between the parties involved in communications.This is an example of connection-oriented
communication.

54 Packet Switching - Information is divided into multiple blocks, and control information is added to each block before the block is sent.Error control is performed on the network side.
55 Circuit Switching - For each communication cell,the physical circuit between the sender and receiver is exclusively used to send and receive data.
56 ATM(Asynchronous Transfer Mode) - Data to be transferred is segmented into(fixed length) units called cells.Destination information is attached to each cell,and high speed switching is used to relay
the cells.
57 Frame relay -This is a transmission method which ues simplified network transmission processing,with error control handled by terminals,not by the network.
58 ADSL(Asymmetric Digital Subscriber Line) - Splitters separate high frequency and low frequency signals at both ends of the telephone line,and are sometimes embedded in ADSL modems.
- is used as the network layer(IP layer) security protocol when a VPN connection over the Internet is established.
-is a collective term for the technologies needed to ensure transmission security at the IP layer.
59 Ipsec(IP Security Protocol) - PPP authentication protocols include PAP(Password Authentication Protocol) and CHAP(Challenge Handshake Authentication Protocol).
- PAP performs authentication of the user name and password without using encryption.
- CHAP uses encryption in user authentication.

60 S/MIME(Secure/Multipurpose Internet Mail - This protocol is used to encrypt and transmit e-mail contents,attachments,and the like.
Extensions) - It corresponds with the application layer of the OSI basic reference model.
61 WEP( Wired Equivalent Privacy) - This is an encryption method for wireless LAN specified by IEEE802.11.
- It corresponds with the data link layer of the OSI basic reference model.
- This is a wireless LAN encryption and authentication method defined by an industry group called the Wi-Fi Alliance in order to resolve problems such as WEP
62 WPA(Wi-Fi Protected Access) vulnerabilities.As with WEP,this corresponds with the data link layer.
63 FTTH(Fiber To The Home) - This is used for extending fiber optic connections to users' premises.
64 ONU(Optical Network Unit) - This is a device installed on users' premises when fiber optic lines are used.
65 Broadcasting - Data is transmitted in a single transmission to every node within the same segment.
66 Unicasting - transmitting data to a specific node by specifying a single address.
67 Multicasting - Data is transmitted in a single transmission to multiple selected nodes.
68 Access conrol of FDDI(Fiber Distributed Data - A special electronic message called a token is passed from node to node,and nodes with requests to send data receive the right to do so when they receive the
Interface) token.
69 CSMA(Carrier Sense Multiple Access) - Each node checks for the presence of signals transmitted over the transmission media by other nodes,and then starts transmitting data if no signals are found.
- This reduces the frequency of transmission contention.
70 Polling - A master controller confirms with each node if there are any requests to send data, and grants the authority to transmit to nodes with such requests.
71 Gateways - are devices which primarily relay transport layer or upper layer traffic.
- can be used to connect networks with different protocols.
72 Bridges - are devices that relay traffic at the data link layer, and supports frame filtering function.
- are devices that relay traffic at the physical layer.
73 Repeaters - can compensate for attenuated signal levels during transmission, and perform regenerative amplification.

Section3-Technological Elements
# Keywords Content

74 Routers - are devices which perform frame relay and swithing based on netwok layer protocols,and supports functions such as flow contorl and optimal route selection.

75 switching hub(layer 2 switch) It transfers received packets only to LAN ports with corresponding destination MAC addresses.
76 DHCP(Dynamic Host Configuration Protocol) - It dynamically assigns IP addresses to the terminals connected to LAN ports.
77 Repeater Hubs - It transfers(broadcasts) received packets to all LAN ports.
78 Router Function -It divides(fragments) received packets at the network layer.
79 ATM switches(Asynchronous Transfer Mode) - They use fixed length data known as cells, and make it possible to perform high speed switching by using hardware.
- Cells are 53 bytes long: 5 bytes of header and 48 bytes of data.
80 PBXs(Private Branch eXchanges) - They are installed in limited areas such as offices, and are used to interconnect internal extension telephones and also to connect external telephone lines to
internal telephones.
81 Packet switches - They use data in units called packets,and can be used to perform highly reliable switching functions such as error control and retransmission control.
' - In packet swithes, switching is performed by hardware, so transmission rates are in the order of several dozen kpbs.
- They use data in units called frames, and switching equipment uses simplified transmission error control in order to support higher speeds and reduce transmission
82 frame relay switches used in frame relay services costs.
- Frame relay sevices presume the use of high-quality digital transmission circuits, and support greater speed by eliminating processing such as retransmission for
error recovery.
- is the second layer of the OSI model.
- manages "transmission control between adjacent open systems".
- "divides data into transmission units" and performs " sequence control for each transmission unit," "error control," and "data flow control."
83 Data link layer - HDLC( High Level Data Link Control) is a protocol which corresponds with this layer.
- Therefore, this layer is responsible for detecting bit errors that occur during transmissions between adjacent open systems, and recovering the errors, in order to
gurantee the transmission of data units called frames.

- is the seventh layer of the OSI model.


84 Application Layer - provides protocols and service definitions related to application services as the goal of communications.
- includes FTAM(File Transfer Access and Management), VT( Virtual Terminal), and RDA(Remote Database Access).
- is the fourth layer of the OSI model.
- supplements service quality offered by the layer beneath it,the network layer, and offers highly reliable and economical transmission functions.
85 Transport Layer - These include data "multiplexing and demultiplexing." "splitting and merging," "segmentation and reassembly," "concatenation and separation," "error control,"
"flow control," and the like.
- TCP( Transmission Control Protocol) of the TCP/IP stack corresponds to this layer.

- is the third layer of the OSI model.


- uses the data transmission functions offered by the data link layer to perform end-to-end communications.
86 Network Layer - includes "routing","data transmission and relay," and "coordination of differences in network quality when traffic passes through mulitple networks."
- The IP(internet Protocol) of the TCP/IP slack corresponds to this layer.
- In communications models such as the Internet, both ends of transmission may not always be in adjacent systems,so network layer functions are necessary.
- Class A:10.0.0.0 ~10.255.255.255
87 Private IP address ranges - Calss B: 172.16.0.0 ~172.31.255.255
- ClassC : 192.168.0.0 ~192.168.255.255
- is a distriuted system for managing domain names.
- TCP/IP transmissions use IP addresses to identify sources and destinations.
88 DNS(Domain Name System) - These(IPv4) IP addresses consist of 32-bit binary strings,and are hard for people to interpret.
- Instead, domain names, which consist of meaningful character strings, are used.
- is used to resolve these domain names into IP addresses.

Section3-Technological Elements
# Keywords Content
89 FTP(File Transfer Protocol) - is a protocol for uploading and downloading files over a TCP/IP network.
- is a technology for connecting two computers via a point-to-point connection over a network such as a telephone line.
90 PPP (Point-to-Point Protocol) - was used widely in dial-up Internet connections before ISDN became prevalent.
- was also used to identify users and allocate IP addresses when users connected their computers to provider access points.
91 APOP(Authenticated POP) - this is a command used for encrypting and transmitting passwords(challenge-response encryption) in POP authentication.
92 POP3 - is a protocol used for receiving e-mail from an e-mail server,but unlike IMAP4,e-mail contained in a mailbox on the e-mail server is downloaded to the client, and
managed in a folder on the client side.
93 SMTP(Simple Mail Transfer Protocol) - is used on TCP/IP networks to send e-mail from e-mail clients to e-mail severs,and to transmit e-mail between e-mail servers.
- is used on TCP/IP networks to send e-mail from e-mail clients to e-mail servers,and to transmit e-mail between e-mail servers.
- is used for receiving e-mail from an e-mail server and has two characteristics described below.
94 IMAP4 - (1) By managing e-mail in a mailbox on an e-mail server,it is possible to decide whether or not to download e-mails based on the sender or subject.
- (2) Messages within the mailbox on the e-mail server can be searched using character strings or the like.

- is a protocol for exchanging network management related information such as failure information between SNMP managers and SNMP agents on a TCP/IP network.
- is a protocol used in exchanging managemet information between monitoring computers and monitored devices.
- uses UDP to exchange a small amount of data.
- MIB(Management Information Base) is database which contains management information regarding monitored network devices,and is stored in those monitored
95 SNMP(Simple Network Mangement Protocol) network devices.
- The basic structure of SNMP is for SNMP agents to respond to queries sent by SNMP managers.However,in situations such as when a failure has occured in a
network device,SNMP agent may send nitifications to SNMP managers. The messages sent in such situations are called traps.
- Network devices monitored by SNMP are called SNMP agents.
- The computes used to monitor network devices are called SNMP managers.

96 SNMP PDU(Protocol Data Unit) - These are five types of SNMP PDU: get-request,get-next-request,set-request,get-response,and trap.
- The type of PDU which originates on the agent side and is sent to the manager to notify the agent of an exceptional situation is called a trap.
97 ICMP destination unreachable messages - are error messages used to indicate that an IP packet was unable to reach its destination IP address.
98 Finger - is a service funtion over the Internet used to display user information for an account on a TCP/IP host.
- For example,we can determine the names and login times of users logged in to a certain host by executing a finger command with the host name.
99 Ping - is a command used to confirm connectivity to an arbitary computer on a TCP/IP network.
- In common key cryptography, if a different key is used for each communicating party,the difficulty of key management increases as the number of communicationg
100 cryptography parties goes up.
- Public Key cryptography is suitable for digital signatures.
101 SSL -is a protocol which can be used to encrypt and transmit data between Web servers and browsers.
102 Challenge-response user authentication - can be used to prevent replay attacks through network wiretapping.
103 Single sign-on systems - An authentication approach in which one authentication server centrally manages authentication for multiple application servers.
104 Biometric authentication - consists of authentication using data generated from physical traits,such as finger prints,palm vein patterns,and iris patterns.
105 Knowledge-based authentication - Authentication which is based on confidential information remembered by the user.
106 By using a communication party's public key - A digital signature can be verified.
registered with a CA(Certification Authority)
107 overall explanation of Risk management - It identifies destablizing factor and system vulnerabilities which might impair the functional characteristics of an information system,and prevents or reduces losses
which might occur in corporate activities,while implementing measures at a reasonable cost.
108 measures against risks -it is a method for preventing accidents and disasters,and, in the event that they occur,minimizing losses.
-consists of methods such as avoidance,optimization,transfer,and retention.
109 contingency plans - It implements emergency measures to prevent or minimize business interruptions and confidential data leakage when functional failures occur in information
systems.
110 risk countermeasures - It provides the information needed to design controls for minimizing risk within economical constraints.
- is to predict risks which would result in management resource losses if they came to be,and to confirm the scope of their effects.
- Risks can be categorized into pure risks and speculative risks.
111 Risk analysis - The former consists of risks which would only result in losses,while the latter consists of risks which could result in either profits or losses.
- Speculative risks also include losses,so they are of course one of the risk analysis targets.
-Therefore,Risk analysis includes not only pure risks but also speculative risks.

112 Risk Financing - is a method of allocating funds in order to ercoup losses with minimal costs after a risk has occurred.
- Risk analysis,risk control,and similar costs are not included.
- information security is characterized by the maintaining of three items.
113 ISMS(Information Security Management System) - Confidentiality: Ensuring that information is accessible only to those authorized to have access.
- Integrity:Protecting the accuracy and completeness of information and the methods that are used to process it.
- Availability: Ensuring that information and related assets are accessible when needed by an authorized entity.

Section3-Technological Elements
# Keywords Content
- has been given various backronyms, including "Total Electronic and Mechanical protection against Emission of Spurious Transmissions" ,"Transient
Electromagnetic Pulse Surveillance Technology",etc.)
114 TEMPEST -was a codename used by America's NSA(National Security Agency) to refer to electromagnetic eavesdropping technologies.
-is the technology of intercepting the electromagnetic waves emitted from equipment,such as displays or cables,and observing their contents.
- It can be countered by installing equipment in an electromagnetically shielded room.
- is the technology used in macro viruses.
115 Computer virus related technologies - can be countered by installing antivirus software and applying the latest signature file.
116 eavesdropping on data frames - is the technology of intercepting and analyzing communication signals from wireless LANs.
- can be countered by encrypting communication packets.
117 CC (Common Criteria) '- Criteria for security evaluation concerning information technology
118 ISO/IEC 18033 '- Standards for encryption algorithms
119 ISO/IEC 17799(changed to ISO/IEC 27002 in 2007) '- Criteria for implementation of information security management

120 Standards for protocols in security management '- Security related protocols are standardized individually for each layer.For example,Ipsec is standardized by the IETF(Internet Engineering Task Force).
121 Disassembly '- is an effective technique for clarifying the functions of new binary-type viruses.
122 Pattern matching '- is to check bit patterns in data being scanned against bit patterns characteristic of virus code.
- In order to identify virus names,other confirmation, such as pattern matching,is needed.
'- are programs which can self replicate by,for example,creating copies of themselves.
123 Worms - Recently,worm propagation over networks has become common.
- Parasitic viruses which infect existing files are generally categorized as narrowly-defined viruses,not worms.
'- an image embedded in a Web page to collect information such as user access trends
124 Web beacon - also known as Web bugs.Recently,there has been a great deal of criticism of Web beacons, and some e-mail programs can be configured so as not to open image
files when previewing e-mail.
125 Spyware '- is the software that transmits users' personal data without permission,if once they install it into their PCs after accepting license aggreement.
'- is an application used to discover over the Internet user information for a host on the Internet.
126 Finger - is defined by RFC 1288.
- can be used to discover not only the names and login times of logged in users,but also,if a specific user name is specified,detailed information regarding that
user.As such,many hosts forbid Finger queries.
'- is a database that contains information about domain names(the IP addresses of the domain names, their administrators, contact information, etc.) for use in
127 Whois network operations management.
'- is the collective term for malicious tools such as backdoors and Trojan horses used in unauthorized intrusion and attacks.
128 Rootkit - Attackers often use rootkits in their initial attacks.

'- With the salami technique, small amounts are taken from a large number of assets,without the activity being noticeable.
- Scavenging is a criminal technique which involves silently searching inside and around computers for residual information after a program has been executed in
order to steal used information.For example,this might include recovering printed materials which have been thrown away in a garbage can.
129 Computer crime techniques - In the Trojan horse technique,programs(modules) which surreptitiously perform unauthorized actions within software systems are placed on those systems, and
perform unauthorized processing at a later time when triggered by some sort of event.
-Spoofing, is a criminal technique in which unrelated third parties bypass authentication procedures and prtend to be legitimate parties in order to carry out
unauthorized actions.

'- is an encryption technology used in e-mail which uses RSA public key cryptography to encrypt digital signatures and e-mail bodies,and thereby prevents
130 S/MIME(Secure/Multipurpose Internet Mail spoofing,tampering,wiretapping,and the like.
Extensions) -is an extended specification that adds confidentiality to MIME(Multipurpose Internet Mail Extension),an e-mail standard in which images,non-English documents,and
the like are converted into ASCII code text files for transmission.
131 Compression '- Using set procedures to reduce data volume without losing the meaning of the data
'- is the sending of a reply e-mail notifying a sender that the e-mail has been received and opened.
132 Message disposition notification - is performed manually or by using e-mail software funcitons.
133 Retransmission of content '- Resending an e-mail message is generally performed manually,or with e-mail software or services which can resend the e-mail.

Section3-Technological Elements
# Keywords Content

'- When a Web server is accessed from a Web client va a proxy server,transimissions between the proxy server and the Web server normally use port 80
(HTTP).However,when SSL is used,port 443(HTTPS)is used. Therefore,even if there are proxy servers along the transmission route,HTTPS transmission is designed
to tunnel through proxy servers(they only relay traffic).
134 SSL(Secure Socket Layer) -In other words,proxy servers do not decrypt SSL encryption, so reference infromation sent between users and Web servers are not disclosed to any other parties.
- Therefore,if SSL is used,even if there is a proxy server on the transmission route,reference information between users and the Web server is not disclosed to users
other than the originally intended user.

135 Proxy server cache contents '- can be seen by multiple users,and so are disclosed to users other than the original users.
'- when users access a Web page which requires authentication,the Web server asks for their user ID and password.
136 HTTP(HyperText Transfer Protocol) authentication - Once these have been entered,pages beyond the login page become viewable.
- Therefore,if the browser is left running,and different users use the browser,information will remain viewable to users other than the original user.
137 Reverse proxy '- is useful to improve response time as it caches static content.
138 Threats to integrity '- falsification of Web pages
139 Confidentiality '- is the property of making information unusable or unviewable by unauthorized parties.
- Unauthorized access,unauthorized copying,information leakage,and wiretapping attacks are confidentiality related attacks.
140 Availability '- refers to the ability of authenticated users to access and use systems or data when they wish to.
- Using a DoS attack to prevent proper system usability is an attack to availability.
141 Confidentiality '- Eavesdropping on communications
142 SAML(Security Assertion Markup Language) '- A Web service protocol defined for transmitting attribute information and access control information,in addition to authentication information,to different domains.
143 UDDI( Universal Description Discovery and '- uses XML.
Integration) - a mechanism defined for widely publishing Web service related information and enabling the seaching of the functions such as service provides.
144 XKMS( XML Key Management Services) '- A Web service protocol defined for efficiently managing key information used in digital signatures.
- used in the registration and expiration of key information used in XML signatures, XML encryption, and the like,as well as validity check.
145 SSH(Secure Shell) '- A tool and protocol that enhances the security of remote login and remote file copy.
146 SET( Secure Electronic Transaction), 3D Secure '- A specification for safely performing credit card payments during online shopping.
147 PGP(Pretty Good Privacy) '- A tool with e-mail encryption and decryption functions using both symmetric and asymmetric encryption technologies.
148 SQL injection attacks '- are attacks which can occur when applications utilize user-entered data to dynamically generate SQL commands in order to access databases.
- Countermeasure: Preventing characters in input values that have special meanings related to database queries or operations from being interpreted.
149 Directory Traversal '- which makes improper user of directory specification methods.
- Countermeasure: Removing the string(../)that specifies an upper level directory from the input value.
'- which causes improver operation on clients,including server output containing improper HTML commands or scripts.
150 XSS(Cross site scripting) - Replacing character strings with other character strings is called sanitizing.
- Countermeasure: Replacing HTML tags contained in input values,if any,with other character strings that cannot be interpreted or executed.
'- which are triggered by inserting data that exceeds the maximum input buffer length,and which result in rewriting return addresses fraudulently on the stack and
151 Buffer overflows executing malicious code.
- Countermeasure : Prohibiting input values whose length exceeds the length limit.

Section3-Technological Elements
# Keywords Content
1 the activity performed during the external design - Logical data design
phrase in system development
2 in the internal dsign phase - Physical data design
3 in the program design phase - Program structured design
4 in th basic planning phase - Requirements definition
- compares conditions to processes in a table format to represent logic.
5 Decision table - is effective as a description method of requirement specifications for complex condigtion decisions.
- is also effective for checking omission of conditions in program controls.

- visually represents how the system status changes.


- are used in system analysis and design, and are suited to describing the changes in system status.
6 State Transition Diagram - represent the relationship between the system's "condition" type and the "causes" required for the trasition from that state,in an easy-to-understand manner.
- to imagine a state transition diagram(ready- executing-waiting)of tasks.
- For example,A greenhouse control system that maintains an optimum environment inside the greenhouse based on information from installed sensors.

- does not have a method for representing GOTO, and are suited to representing the logical structure within a module.
- For example,NS(Nassi-Shneiderman) chart.
7 Structured chart - is suited to illustrating the logical structure of programs.
- Howerver,its drawback is that diagrams become complicated as the logical structure becomes more complex.
- For this reason,PAD and YAC II charts which fix this problem are used.
8 Control flow diagram - can represent processing modes unique to control systems by adding "control conversions and control flow" to a DFD.
- can represent the network of data flow within a system by using the "source,sink,flow,process,and store" of data as basic elements.
9 Data flow diagram - are easy to represent data flow,but difficult to display processing procedures.
- is a method for analyzing a series of behaviors which are responses by the system over time to external events.
10 Event response analysis - Events are system states that are achieved through external actions.
- Responses are system behaviors in accordance with external events.
- This techinique is applied to the control flow model and the Petri net model.
- is a techinique devised by Jiro Kawakita based on the state-oriented approach.
11 KJ method - is a method for creating visual image diagrams of various ideas that have come up with regard to certain events when considering system improvement plans,and
for supporting participants to produce new ideas from a different perspective based on these diagrams.
- is a techinique for analyzing system functions from the perspective of both input data and output data.
12 Functional analysis
- defines the interrelationship between four elements(data,information,function,and condition).
13 Structural analysis - is a method for analyzing the structure of a system by using entities and their relationships at the time of modeling the system.
concerning the top-down and bottom-up
14 - In both the top-down and botton-up approaches, the final logical data model must be normalized and provided with all attributes.
approaches to creating a logical data model
15 DFD(Data Flow Diagram) - visually represents business applications by focusing on the flow of data.
16 Flowchart - visually represents a procedure of business operations by using flowchart symbols.
17 E-R diagram - visually represents a data structure by using the concept of entities and the relationship between entities.
'- is a unified modeling language used in object-oriented system development.
- is standardized by OMG(Object Management Group) in the US.
- In UML,a standard notation is used for analysis to design,implementation, and testing.
18 UML
- uses class diagrams,object diagrams,use case diagrams,sequence diagrams, communication diagrams,statechart diagrams,activity diagrams,component diagrams,and
deployement diagrams.
- Note that communication diagrams have the same content as sequence diagrams.
19 Component diagram - show what interfaces components(parts) of the software have,as well as the dependencies between components.
20 Sequence diagram - can illustarate the interaction of messages sent and received between objects.
21 Statechart diagram - show the state transition of objects from creation to termination.
22 Use case diagram - show the relationship between system functions and external functions.
six quality characteristics of software defined by
23 - functionality, reliablility,usability, efficiency,maintainability, and portability
ISO/IEC 9126

Section4-Development Technology
# Keywords Content
24 functionability - is the ability of the software product to provide functions that match stated or implied needs whne it is used under specified conditions.
25 reliablility - is the ability of the software product to maintain a specified achievement level when it is used under specified conditions.
26 usability - is the capability of the software product to be understandable,learnable, and usable, and is appealing to the user when it is used under specified conditions.
- is the ability of the software product to provide apropriate performance in comparison with the amount of resources utilized when it is used under stated
27 efficiency
conditions.
- means the ability of the software product to be easily modified.
28 maintainability - Modification may also include corrections or improvements, as well adapting the software to changes in envionment,changes in requirements specifications,and
changes in functional specifications.
29 Portablility - means that the ability of the software product to be transplanted from one platform to another.
- is the conventional structured design method.When using this method of system development,in the event of a change in processes,data structures need to be
30 Process-oriented design rebuilt,and all processes related to that data may need to be changed.
- The data-oriented design was introduced to avoid this problem.
31 Data-oriented design - Data is deemed a shared resoruce and is centrally managed.
32 HIPO(Hierarchy,plus Input,Process,Output) - show a visual table of contents of module structure diagarams and the funcitons of each module in an input-process-output format.
- is suitable for top-down design.
- is the collective term of technologies to develop applications by assembling software parts that are based on object-oriented technology.
33 Componentware - Typical examples are JavaBeans and Active X.
34 Groupware - is a software that improves the efficiency of group activities by implementing communications between users and information sharing.
- A typical example is Lotus Notes.
- is an activity to shorten development periods, effectively utilize resources, and cut costs by applying a concurrent approach to activities such as
35 Concurrent engineering
design,manufacture, and support.
- is the clarification of the technical details of software through schematization and reverse assembling of the structure and specifications.
36 Reverse engineering
- Caution is required regarding the infringement of intellectual property rights.
37 Basic concepts of object orientation - Abstraction, encapsulation, inheritance, class
Generalization-specialization relationship("is-a"
38 - defining an upper level class by extracting the common details of a lower level class is called "generalization".
relationship)

39 whole-part(aggregation- -
decomposition)relationship("part-of" relationship)
40 Delegation in object-orientation - A mechanism where operations on an object are assigned internally to another object.
41 complex object - A mechanism where an object consists of multiple objects.
42 propagation - A mechanism where operations applied to an object are automatically applied to related objects as well.
43 inheritance - A mechanism where lower classes inherit the attributes and operations of higher classes.

Section4-Development Technology
# Keywords Content

- Weak to Strong
- Concidental strength: Includes multiple functions with no relationships.
- Logical strength: Includes multiple functions that have relationships and selectively executes according to arguments.
For example,The code of function A considerabley overlaps wih that of function B,so A and B are made into one module and an argument is prepared for choosing
which of the two functions A and B to use.
- Classical strength: Groups functions that are executed sequentially at the same time.
For example,The initial setting operations requierd by multiple functions can be performed all at once at a certain point, and so these operations are grouped into
one module.
44 Module strength - Procedural strength: Includes multiple functions to implement one procedure(specification).
- Communicational strength: Includes the characteristics of procedural strength in addition to each function handling the same data.
For example,Functions A and B are always executed in order of A and B and the calculation results of A are used in B,so functions A and B are grouped into one
module.
- Informational strength: A module that groups multiple functions to handle specific data structures,and has separate entry points(aliases) for each function.
For example,Functions that handle certain tree-structured data are grouped together with the data itself,and the tree-structured data is made invisible from outside
the module.
- Functional strength: A module that consists of only one function.

- (1) Data coupling: Only data elements that are not in the common area and have no structure are passed along.
- (2) Stamp coupling: Data structure(structure or array) not in the common area is passed along between modules.
- (3) Control coupling: Data that instructs the control of the taget module is passed as parameters(arguments).
e.g.,When arguments are passed to determine the function and logic to execute.
45 Module coupling - (4) External coupling: Only data elements externally declared as global data are shared between multiple modules.
e.g.,The relationship between the modules that refer to a single global data item.
- (5) Common coupling: Only data structure externally declared (common area) as global data is shared between multiple modules.
e.g.,The relationship between the modules that refer to global data.
- (6) Content coupling: Data referencing or direct instruction execution takes place in modules that have not been externally declared.
e.g., When a module calls another module with the JUMP instruction without using the CALL instruction.

46 Jackson method - is a technique to determine the program structure by focusing on both input data stucture and output data structure.

47 STS(Source/Transform/Sink)partitioning - is a technique that focuses on the flow of data and partitions the flow into input data processing, conversion processing, and output data processing.

- is a technique that focuses on the flow of data and partitions the flow into the different processing details dependant on the type of input data.
48 TR partitioning - In other words,it is partitioned according to each type of transaction.
49 Common functional partitioning - is a technique that focuses on the functions of a program and extracts the comon functions of multiple modules to constitue a separate common module.

50 performing a design review - To find defects in specifications and design errors at an early stage and thereby reduce person-hours used for any rework.
51 Round robin - All participants take turns in acting as the review supervisor,which increases the motivation of all participants to participate in the activities.
52 Walk-through - The authors explain their own deliverables to be reviewed, and the review is performed on paper by setting tentative input data values and simulating the
procedures on a step-by-step basis.
- The roles of participants are determined in advance,the moderator acting as facilitator is fixed, and the focus of the review is narrowed down to promptly evalute
53 Inspection
the items under review.
Structured programming,a key point of modular logic - Descriptions are to be made using the three basic structures of "sequence,selection,and iteration."
54
design

Section4-Development Technology
# Keywords Content
- Equivalent classes or boundary values are identified from the functional specifications to prepare the test data.
- Thus,equivalence partitioning (a test method that divides a range of input into multiple equvalent classes and then takes representative values) and boundary value
analysis(a method that tests the boundary value of inputs)are used.
- Cause-effect graphs and experimental design are block box test methods which create test cases based on input and output conditions.
55 Preparing test data for a black box test
- Equivalence partitioning and boundary value analysis are black box test methods which create test cases by focusing on groupings of input condition and the
boundary values of input conditions.
- Module analysis and error guessing are black box test methods which create test cases where errors are more likely to occur from an analysis of the modules and
from experience.

56 Equivalence Partitioning - which is one method of test data design,uses,as test data,a representative value of the valid equivalence class,which is valid data,and representative value of the
invalid equivalence class,which is invalid data.
- Condition coverage,instruction coverage
- Condition coverage: test cases are created for all true and false decision condition combinations.
57 the creation methods of test data for a white box - instruction coverage: test cases are created where all instructions are executed at least once.
test - decision condition coverage(branch coverage): that covers both the true and false direction branches for all decisions by focusing on the coverage of the branch
direction of decisions.
- multiple-condition coverage,is the strictest coverage criteria.It requires tests that cover all possible combination for all conditions.

- System requirements analysis --------------------------------System qualification test


- Systems architecture desing --------------------------------- System integration(test)
For each test performed during system
development,the appropriate combination of the - Software requirements analysis----------------------------- Software qualification test
58 tests and the activites where the test requirements - Software architecture design -------------------------- Software integration(test)
- Software detailed design ------------------------ Software unit test
are defined
Software coding and testing

59 bottom-up testing - Drivers are required.


The appropriate approach to putting the system
- After completion of tests by the development department,acceptance tests are to be performed by the operations department and then the system is put back
60 back into full operation after a minor change to the into full operation.
business application system
When the ordered software is delivered,the
61 appropriate item to be checked - The functions described in the specifications have been implemented.
62 When the estimate is received - Verification of whether the estimate details provided by the contractor are appropriate should be done.
63 during software development - Verification of whether work is proceeding without delay should be done.
64 Before verification upon delivery - The quality management plan refers to a plan to veriy the quality of the ordered software.
65 Equation techniques - In-basket,OJT,role playing,brainstorming.
66 In-basket - is a technique that requires participants to deal with many issues within a limited amount of time,so as to improve the overall decision making capability regarding
relevance,urgency,and importance of issues.
- is a technique by which a supervisor or a senior staff member provides personal guidance within the scope of day-to-day development work,and allows participants
67 OJT(On-the-Job Training)
to acquire knowledge through actual experiences.
68 Role playing - is a technique that makes participants play specific roles in order to improve their understanding of the capacities as well as improve their problem solving skills.
69 Brainstorming - is a technique that is suited for creative problem solving in meetings where criticisms of ideas are prohibited.
70 Regression test - is the test for verifying that the result of a correction or modification during software maintenance does not effect other parts of the software.
71 Performance test - is a test to verify whether goals of system performance such as response time and turnaround time are met.
72 Load test - is a test to verify the durability of the system by applying stresses to it,such as whether the system can handle the processing of large amounts of data and can
operate for extended periods of time.

Section4-Development Technology
# Keywords Content
73 Exception handling test - is a test to verify whether the system can respond to exceptional events by entering exceptional data or performing exceptional operations that rarely occur in
regular operations.
74 Spiral model - is a model that improves the level of completion of a system by iteratively performing the development cycle.

75 RAD(Rapid Application Development)model - is a model that improves completion levels by using prototypes.
- is categorized as evolutional iteration and the scale of iterations are generally not large enough to be called development cycles.
- is a process model that conducts system development by prceeding from upstream to downstream through development processes such as requirements
76 Waterfall model definitions and external design.
- is a process model that advances development by repeating user tests and improvements using trial models known as prototypes.
77 Prototyping model
- falls under the category of system development through evolutional iteration.

- is a model to evaluate process maturity levels of projects and software development organizations.
- evaluates the maturity level of development process by using the five levels of evaluation criteria shown below.
- Level 1: An initial stage where processes have not been established.
78 CMMI(Capability Maturity Model Integration) - Level 2: A level where processes are managed individually but are not organized.
- Level 3: A level where individual experiences are collected and documented,and standard processes that are consistent throughout the organization are defined.
- Level 4: A level where standardized processes are quantitatively measured and analyzed.
- Level 5: A level where standard processes are optimized and improved in accordance with the differences in technical and requirement environments.

- models the procedures of development activites.


79 Process mdel in software development
- Some examples are the waterfall model and the growth model.
The common frame for system development and
80 transactions centered around software(SLCP- - defines the common mechanisms in the software lifecycle process with the aim of calarifying development and transactions.
JCF98)
- To clarify work scope and content, as well as the details of transactions between the acquirer and supplier ,by using a "common measuring stick" over the entire
software development wrok.
81 Purpose of Common Frame 2007(SLCP-JCF2007)
- does not handle proposal or management responsibilities in software transactions.
- does not exclude transitions between departments of a company.
82 Software management guidelines - the effect of incentives in a commendation system to promote the reuse of components is small during the early period but increases over time.
- is a process that is a reverse of the normal process of creating source code from a specification.
83 Reverse engineering
- Furthermore,the specifications obtained from reverse engineering are used for rebuilding systems and for system maintenance.
84 Re-engineering - is the engineered rebuilding of something that is already completed.
85 the technology of creating software components - is a technique for developing programs by dividing existing programs into components and then using those components.
software reuse technology in object-oriented
86 - is a technique for developing programs by reusing existing classes in a class library.
programming
- generally refers to the management of software names,version information, usage,installation information,license information,resources information,release
87 Configuration management of software
informatin,change management information,patch applicaition information,etc.

Section4-Development Technology
# Keywords Content
1 SLA(Service Level Agreement) An agreement between the user and the provider relating to service quality
2 ITIL(IT Infrastructure Library) A framework that is a collection of best practices for IT service management
3 SLCP(Software Life Cycle Process) A software lifec cycle process from development to maintenance.This concept is published in Japan as a common frame known as SLCP-JCF2007.
4 ISO 9000 series An international standard relating to quality management systems.These are corporate certification systems which are implemented based on this series.
5 Number of required staff (total number of work days) ÷ (number of operator work days)
6 The main purpose of performing a system migration To check the procedures for switching from the existing system to the new system,as well as the problems relating to this switching from the perspective of safety
test and efficiency
7 An SLA item recommended by ITIL Reliability and availability
8 the purpose of incident management performed as a To maintain service quality by recovering service as quickly as possible with minimum disruption
part of system operations management
9 the main task of a service desk Responding to inquiries such as system troubles in order to enhance user convenience
10 the implementatin of change management for Setting forecasted values of person-hours required for the change as well as target values for failure rates as the evaluation criteria for change implementation
programs results
Service level management in service delivery
11 defined by ITIL A process to maintain and improve the quality of IT services so as to achieve agreed items betwee the customer and the provider.
12 financial management for IT services A process that financially manages IT assets and resources used to provide IT services
13 incident management included in service support A process that quickly recovers service levels to previous levels when an event that impedes service quality occurs.
14 avability management A process that recovers required IT infrastructure and service facilities within an agree period of time
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

Section6- Service Management


# Keywords Content
According to "System Management Standards, the
1 purpose of defining a business operations model To organize the relationship between business operations and utilized information across the entire enterprise ,and clarify an overall picture of the information system
during the total optimization planning phase

2 According to "System Management Standards,the To understand the scope and development scale of computerization ,and estimate the requiresd time,person-hours ,and cost
development planning phase
3 According to "System Management Standards,the To identify hardware,software,and networking components required to build the information system
procurement phase
4 an appropriate improvement index in supply chain Rate of decrease in dead stock
management
5 Application Architecture Application Architecture representing the type of information system optimized for the business operations
6 ASP(Application Service Provider) It is a service to provide customers with application programs over the Internet.The customer accesses the provider's server by using a Web browser to run the
application programs supplied by the provider.
7 BPO(Business Process Outsourcing) BPO is a type of outsourcing which engages external vendors to provide indirect business processes and other services such as call center operation.One of the key
criteria for selecting a vendor is low operation cost
8 Business Architecture Business architecture including business objectives and processes
9 Company level business model The business operations model is also a model to identify enterpris activites. Therefore,business processes should include not only the work-related activities but
also the management-related activities such as decision making and business planning.
concerning the parties to whom and by whom the
10 RFP(Request For Proposal) for system The information system department submits an RFP to a vendor.
development is submitted.
11 Data Architecutre Data Architecture representing the information (in the system)used in each business operations or system and the relationship between the various data
12 DFD(Data Flow Diagram) It is a technique to represent a company's business processes by abstracting four basic elements of data flow,process,file,and data source/sink.
13 EA(Enterprise Architecture) It is a technique to review the business operations and information systems from the perspecutive of overall optimization through analysis of four key architectures -
business,data,application,and technology.
14 E-R(Entity-Relationship) diagram It is a technique to clarify the relationship between data structure and data items by representing a conceptual data model using entities and their relationships.
15 IaaS(Infrastructure as a Service) It is a service to provide customers with the system infrastructure,such as compouters and a network,over the Internet which is necessary for the construction and
operation of infromation systems.
16 Information strategy The purpose of developing an information strategy is to clarify the basic computerization policy and the overall computerization initiative,and it does not need to
include the details of development plans for each information system.
17 IT outsourcing A type of outsourcing which engages external vendors to provide business process related to information systems such as system development and system
operations.IT outsourcing can be regarded as a type of BPO,but is not appropriate as the definition of BPO.
18 KGI(Key Goal Indicator) Sales fro new customers
19 KPI(Key Performance Indicator) Number of visits to new customers
20 PaaS(Platform as a Service) It is a service to provide customers with a system platform over the Internet which is necessary for the construction and operation of computer systems.
21 PDCA Management Cycle Plan:(Develop business plans) , Do:(Carry out business plans) , Check:(Evaluate the outcome) , Act: (Implement improvement measures)

22 Purpose of modeling business operations during the To clarify the ideal form of a business by identifying the structure of the relationship between an organization's activities and information
overall planning of an information system
23 RFP(Request For Proposal) for an IT service It is a document prepared by a company which requests candidate vendors to submit specific proposals prior to the procurement of IT services.
Conducting efficient sales activities for existing and prospective customers by managing sales records such as the date fo customer visits and the outcome of sales
24 SFA(Sales Force Automation) activites.In other words,a system to provide a comprehensive sales support service by consolidating the management of customer information,contact
history,progress of business negotiations,and the schedules of salses representatives,among other information in a database.
25 Should be kept in mind during the interview for It must be considered to discern whether the interviewee's response is based on fact or speculation(ထင္ေႀကးေပးၿခင္း၊မွန္းဆခ်က္၊ထင္ၿမင္ခ်က္ ).
system analysis
26 SOA(Service Oriented Architecture) SOA - based service is implemented over the network and provides combined services.Therefore,it is recommended that the service interface be defined based on
standardized technological specifications.
27 Technology architecture Technology Architecture representing various techonology components and security infrastructure used for the actual system construction:

Section7- SystemStrategy
# Keywords Content

28 The main role of the staff members who participate To prepare business requirements
in a development project from the user department

To confirm operational procedures to create user


29 manuals and operations manuals required for the Although the expression "confirm the operational precedure" is not used in System Management Standards, this activity corresponds to the analysis phase of
actual operations of the infromation system planning operations.

30 UML(Unified Modeling Lanauage) It is a technique for system analyasis and design using model diagrams such as a class digram,which unifies and standardizes various methods for assisting object
oriented design.

Section7- SystemStrategy
# Keywords Content
1 ABC analysis It is an analysis technique that is used in the inventory management and sales management fileds in order to review management techniques and business strategies
by dividing target products or customers in three classes of A,B, and C depending on importance.
-is a function that ,for example,chooses the line for the most inexpensive carrier when lines from multiple carriers are available between the caller and the receiver of
2 ACR(Automatic Carrier Routing) a long-distance telephone call.
-Carriers are chosen using an adapter added to the telephone or a selection funciton bult into the telephone.

3 AIDMA model - is a psychological process model.


- explains consumer psychology from first being aware of a product to purchase in five levels: Attention,Interest,Desire,Memory, and Action.
An appropriate combination of information items
4 that are obtained in the chain stores and are needed Inventory information and POS information.
by the manufacturing company

5 Arrow Diagram It is used to chart the relationship among activities that make up the entire project in process management ,in order to create the scheduling of each activity and
reduce the amount of time required.
6 Benchmarking Conducting a comparative analysis of the best practices of other companies when the company's business process is reformed.
7 Benchmarking as a business process improvement Improving and reforming current business processes by reviewing best practices of other companies
8 Benchmarking as a management technique Reviewing best practices (successful case examples) of other companies to fundamentally improve and restructure current business processes
9 Best Practice analyis It is a technique that is useful for problem solving by researching and analyzing the successful measures and response examples of other companies for the purpose
of solving problems and issues faced by the company.
10 biometric authentication It is a technology used for identifying and verifying individuals based on biological information from physical characteristics such as fingerpring authentication and vein
authentication.
11 BSC(Balanced score card) It is used to analyze corporate activites based on a wide variety of evaluation criteria including customer statisfaction and employee morale.
12 CAT(Credit Authorizaiton Terminal) -is a terminal used for CAFIS(Credit and Finance Information Switching System) of NTT(Nippon Telegraph and Telephone Corporation).
-Connection to the CAFIS center is through telephone and the validity of the user's credit card and the credit limit are checked online.
-is a production method that appeared for the purpose of compensating the shortcomings of the traditional line prduction system.
13 Cell production System -an advantage of the cell production sytem is "Products which require wide variation and flexible manufacturing"
-one worker is reponsible for all processes including the mounting of parts,assembly,processing and inspection.
14 CIM(Computer Integrated Manufacturing) It aims to increase productivity by using computer systems to control various information generated at the production site.
15 Competitive Advantage Resources,usually categorized as people,materials,money,or information,which are leveraged(ကု တ္အ ား၊ကန္အား) by a company to gain a competitive advantage
16 compliance management To prevent misconduct involving corporate management and employees that may threaten the continued existence of the company
17 Core Competency Management Concentrating management resources on proprietary know-how and technology that are not easy for other companies to imitate,so as to establish a competitive
advantage.In otheror
- Unique qualities words, To possessofmnagement
characteristics resources
a company,also fortodifferentiation
referred as corporate from competitors
culture,which havetobeen
gain derived
a competitive edge.
and established over manay years of corporate
18 Corporate Culture activities.
19 Cost Leadership Strategy A strategy to gain an advantage by differentiating from other companies in cost is known as a cost leadership strategy.
20 CRM(Customer Relationship Management) It is acorporate strategy that improves business performance through raising service levels and customer satisfaction by sharing information through all customer
channels within the company,not just the sales department.
CSF(Critical Success Factor)
-Business success factor analysis is also known as CSF(Critical Success Factor) analysis.
-is a technique for clarifying the requirements for a company's success such as its differentiation and establishing of competitive advantage.
21 -Specifically, success factors are identified using history analysis(a technique that clarifies the historical success factors from the company 's founding to the
present)and SWOT analysis.
-is not an analysis techinique based on financial statements.
-includes elements that are decisive and critical to achieve goals.
-is an analysis technique that is used to clarify the most decisive and important elements to achieve goals and to handle them as key control items in management.
22 CSF(Critical Success Factor) It is a business success factor extracted as the requirement to achieve corporate management goals from predicted business changes and technological innovation.
23 Differentiation Strategy A strategy to gain an advantage by differentiating product performance an designs from other companies.
24 EC(Electronic Commerce) It is a technique or concept to perfrom commercial transactions with consumers or between businesses by utilizing an electronic network such as the Internet.
25 Electronic money It is a payment method that stores monetary value on IC cards or cell phones,and is used at things like POS registers.
26 ERP(Enterprise Resource Planning) It is a technique or concept to increase business efficiency by planning and controlling management resources throughout the company in an effective and
comprehensive way.
27 Focus Stragety A strategy to specialize in a specific area by differentiating the product selection from other companies.
28 Game Theorey It is used to perform analysis in order to maximize self profit by considering the effect of personal actions on the decision making of others,and vice versa.
-is a poistioning system that covers the entire planet.
29 GPS(Global Poistioning System) -is comprised of 24 satellities launched into orbit by the US military,ground based control stations,and the user's mobile station.
-Although the system was originally intended for military use,it is currently widely used in the civilian market including car navigation system and the "Doconvi"
service,a service from NTT DoCoMo that provides location based information.
To improve the satisfaction of stakeholders including customers,shareholders,and employees in order to achieve continual growth for the company
30 importance on stakeholders in corporate managemnt
-is a production method for producing large quantities of a single product in a certain period of time.
-The process for each person is decided beforehand and one product is completed through the accmulation and completion of all processes of an assembly line
31 Line Production System opeartion.
-an advantage of the Line production system is "products which require mass production to increase productivity","Products with specifications which do not
change over the long term", and "Products which require standardization,simplificatin,and specialization."

32 LP(Linear Programming) It is used to consider optimal resource distribution in order to achieve maximum effect by effectively combining limited resources and funds.
Acquiring management resources from other companies that have an established business operation ,so as to gain an advantage over competitors.In other
33 M&A(Mergers and Acquistions) words,Concentrating the commitment of funds and human resources in areas where competitive advantage can be maintained or strengthened through proprietary
know-how or technology
34 management governance To curb(ထိန္းခ်ဳပ္သည္၊ဟန္ ့ တားသည္။) the exercising of power by the management and to build a framework for sound mangement
35 Management plan -Long-term,mid-term,and short-term decision making plans for realizing the vision that indicates the future direction of the company.
- typically,long-term plans are more than three to five yeares,mid-term plans are less than three to five years,and short-term plans are less than one year.
36 Management principles Fundamental concepts that present the company's purposes and values,and act as the guideline for corporate activities
management strategy related to knowledge Concentrating the commitment of funds and human resources in areas where competitive advantage can be maintained or strengthened through proprietary know-
37
management how or technology
- is a technique to clarify the poistioning of a company's product or service in the market and customers' evaluation of the same.
38 Market analysis -However,market analysis consists of such things as demand analysis,trade area analysis,competitive analysis,and distribution analysis.
-includes neither complaint analysis nor failure analysis.
39 Market Segmentation consisting of population attributes,geography,psychology,and action.
40 Marketing Mix It is a method of fulfiling market needs consisting of product ,price,place,and promotion.
-Parts List(configuration and required numbers of each part in the final product)
41 MRP(Materials Requirements Planning) -Inventory status(quantity in stock,on back order,and in process)
-Order placement policy(lot organization method,order placement method,and safety inventory)
-Standard schedule (completion period,and lead time days)
- are small information devices that are about the size of the palm of the hand.
42 PDAs(Personal Digital Assistants)
-Currently,products that also combine cell phone or PHS(Personal Handyphone System)functions are called PDAs as well.
43 PPM(Product Portfolio Management) Analyzing each business by using a matrix of market growth rate and market share,and performing an optimal distribution of management resources
44 Product life cycle model is a process from product introduction to withdrawl,consisting of introduction,growth,maturity,and decline.

- is used to build an optimal product line by analyzing the competitiveness,profitability,and growth potential of a group of products or an individual product.
45 Product mix analysis -is not used to determine prices.
-its aim is to meet market needs,optimally use management resources,or maintain growth.

It is used in electronic tags,and combines a tiny integrated circuit and an antenna which can be used to identify and locate the tag by using wireless automatic
46 RFID(Radio Frequency Identification)
identification technology.

- is a traditionally used method among the various database marketing data analysis methods.
-evaluates customers based on three axes to obtain customer trends and customer composition ratio by segment.
47 RFM analysis -"R" stands for Recency(last purchase date),"F" for Frequencey(frequency of purchases),and "M" for Monetary(accumulated purchase amounts)
-By using RFM analysis,we can clearly understand "Who uses the service frequently(prime customers)?","Who used to use the service frequently but hasn't
recently?" and "Who are the new cusomers?".

48 RSS(Retail Support System) It is a technique or concept where wholesalers or manufacturers aim to support the business activities of retail stores and thereby increase their transactions.

49 SCM(Supply Chain Management) It is a business management techinique that aims to reduce costs by reducing excess inventory through the consolidated management of the entire management
process using computers,from material procurement to production and distribution.

-It is a technique or concept to improve sales efficiency and quality by utilizing IT in sales activities.
50 SFA(Sales Force Automation)
-It also aims to greatly increase sales and profits,and furthermore to imporve customer satisfaction.

51 SWOT analysis SWOT analysis is a method for planning the business strategy by analyzing the company's strengths, weakness,opportunities ,and threats.
52 Synergy Effect Optimizing the combination of business operations to improve the results over operating each business independently.
53 TLO(Technology Licensing Organization) The organization plays a role as an intermediary between companies and universities to patent research findings or to promote technology transfer from universities
to companies.
54 two-dimensional codes such as QR codes It displays a black and white lattice shaped pattern on a matrix and can store a large amount of data of not just numbers but also letters and Kanji data.
55 Valley of Death An issue where value capture is not possible because no funds were invested in research and development that connects fundamental research to product
development and as a result such basic research did not produce any product.

Section8- BusinessStrategy
★4Cs and 4Ps of a marketing mix
Element 4Cs(Customer's perspective ) 4Ps(Supplier 's perspective )

Product Customer solution Product


(Value to the customer) (Quality and appeal of the product)
Customer cost Price
Price (Cost incurred by the customer) (Product price)
Convenience Place
Distribution (Convenience of purchase method) (Sales method)
Communication Promotion
Promotioin (Information transmission) (Advertising)

B to B EC between companies.It is also written as B2B.The B stands for Business.

B to C EC between companies and individuals. The C stands for Consumer.

G to G EDI between goverments or local goverments. The G stands for Government

G to B EC and EDI between governments or local goverments and businesses.

G to C EC and EDI between governments or local goverments and individuals.The C stands for
Citizen.

C to C EC and EDI between consumers.Both Cs stand for Consumer


inG The digitization of agencies and ministries of goverments and local governments.

⇒Conducting electronic approval and electronic official documents management for a local inG
government
⇒Conducting electronic procurement or electronic bidding for commodities or materials used by G to B
a local government
⇒Exchanging residence certificate data among local governments through the Basic Resident Register G to G
Network
⇒Conducting electronic applications for residence certificates,copies of family registers, marriage G to C
notifications,and passports
# Keywords Content
1 Corporate governance It is a mechanism to monitor whether business management is being performed appropriately and maintain the validity of corporate activities for stakeholders.
2 Environmental Accounting It is to measure and analyze the cost-effectiveness of environment conservation measures quantitatively,and then to publish environment conservation costs and the
financial and environment conservation effects of implementing environment conservation measures.
3 CSR(Corporate Social Responsibility) It is to make an appropriate level of contribution to improve society as a member of society,aside from the primary commercial activities of a company.
4 Disclosure,which increases the transparency of It is to publish corporate financial conditions to investors and analysts accurately,promptly,and continuously as part of PR activities.
corporate management
-A method for developing problem -solving skills,in which many management issues that occur daily are presented in order to make evaluations and judgments on
5 In-basket them within a given period.
-In this method,a large amount of pending documents and memos are placed in the pending basket in order to train and evaluate how much required paperwork can
be completed in a limited amount of time.

-is orginally a method of management research.


6 Case study -collects materials concerning a specific company or workplace,thoroughly analyzes the elements that are affecting management phenomenon,and clarifies their
relationships.
-In short,it is a research method that aims to discover the commonality and principles of similar cases.
7 Affinity diagram -is a technique to represent chaotic factors,such as future problems and inexperienced problems,as language data,and to organize them into a diagram in
consideration of the affinity between these factors in order to clarify problem areas.
8 Role-playing -is an educational training method where the trainee undergoes training by playing various roles under set conditions.
-A characteristic of role playing is that there is no script prior to playing the roles.
9 Project Organization A temporary and flexible organization that is only active for a set period and for a set goal and is composed of specialists from various departments in order to
handle a specific issue
10 Matrix Organization An organization where members belong to both their own specific functional department and a department that performs a specific business
11 Functional Organization An organization that is composed of departments based on business properties such as purchasing,production,sales,and finance
12 SBU(Strategic Business Unit) An organization that can deploy self-contained management activities by having functions required for profit responsibilities and business operations either by
product,by customer,or by region.
13 CIO(Chief Information Officer) The CIO creates plans to optimize the investment effect of the company's information resources according to business strategy when proposing computerization
strategies.
-understands the status of development and operations of information systems and suggests specific improvements so that the company's information system will
14 Roles and funcitons of a system auditor function optimally.
-provides advice to the information systems department by auditing whether the information system is functioning in a sound manner for corporate activities.

15 General role of an administrator in charge of the -receives reports regarding inquires and trouble about the information system from the information systems department and provides specific instructions for the
information systems department optimal operation of the company's information system.

- is an analysis techinique for estimating the effect on core business operations when they are halted by the occurrence of unforeseen events such as disasters.
-An analysis is typically performed in the following order.
16 BCP(Business impact analysis) (1)Select and priortize vital operations that need to be maintained and recovered.
(2)Identify required resources and confirm limiting conditions for business continuity and recovery.
(3)Determine the maximu allowed downtime and estimate losses.
(4)Evaluate resources required for recovery and establish measures.
(5)From the results of these considerations,propose and implement measures that need to be implemented beforehand.
17 Fixed quantity order system A method that is appropriate for products that can have order points set beforehand.
18 Periodic order system Since order dates in the periodic order system are predetermined,orders can be placed by estimating the required quanitity based on inventory quanity and demand
forecasting on the order date.
19 work sampling method Momentary measurements are performed several times in order to determine the status of a work activity at given points in time,and the work hours are estimated
for each activity from the percentage of the number of measurements.
20 most precise measurement method of standard time Working hours are measured with a stopwatch when the working hours for one cycle is short or when the work can be divided before measurement.
PTS(Predetermined Time Standards) Work activities are broken down and analyzed in terms of basic motions in order to determine the work hours based on standard operation times for basic motions
21
set for each work condition.
22 most common method for setting standard time Actual work
takes the hours defective
percent are aggregrated
of a lotfrom thehorizontal
on the work sheets
axisorand
daily
thelabor
passreports,and the
rate against average
the percentvalue is set based
defective as the on
standard work time.
the sampling method and expresses this as a
23 OC curve graph.
24 Monte Carlo method The method of obtaining approximate solutions by repeating simulations using random numbers.
25 Cluster analysis method A technique based on the creating of a number of clusters consisting of similar types of items from a target consisting of numerous types of items.
-One tehnique for predicting the future based on past data.
26 Exponential smoothing method -is not simply the extension of past trends,and is characterized by how it places weight on data that is more recent and less weight on past data and therefore
places importance on data from the recent past.

27 Delphi method -A technique for predicting the future and is a method that summarizes the predictions of numerous specicalists through repeated questionnaires.
-The world "Delphi" is taken from the temple with the same name in Greek myths.

Section9-Corporate&LegalAfairs
# Keywords Content
28 Pareto chart - is a composite graph that combines a histogram of the occurrence of items in descending order and a line graph of the cumulative total of such occurrences.
-can show the cause of the failures and the percentage that each cause accounts for at the same time,and is appropriate as an anaysis result.
29 Histogram The number and causes of failures in chronological order
30 Scatter diagram The correlation between system size and the number of failures
31 Cause and effect diagram The relationship between the failures and the causes which may affect them
- It is a method for identifying cause-and-effect relationships among complex and interwined factors of an event.
- is used to clarify the cause the effect of various elements that compose a problem and to find a solution.
32 Association diagram method -connects the complex and intertwined causes and effects by using arrows.
-Depending on the direction of the arrow,it can represent one of two types: either cause-effect or purpose-measure.
-It is one of the "new QC seven tools."

33 PDPC(Process Decision Program Chart) It is a method for considering measures that address issues where various events can be anticipated during the course of its progress and defining a process to
achieve a desired result.
-It is a method for grouping collected information according to its inerrelationships and identifying problems to be solved.
34 KJ method,a problem solving technique -is a technique that is effective for analyzing the substance of a problem by organizing data obtained through fieldwork.
-In addition,by organizing into groups,it can lead to sharing common values among group members and improving teamwork.
35 Tree Diagram It is a method for socking an optimal measure or method by successively implementing measures and methods for achieving goals and objectives.
- The traditional "QC seven tools" is an analysis method that uses number values to maintain a certain level of product quality.
-The new QC seven tools is also an analysis method for maintaining a level of product quality,but it is a set of tools to solve vague problems and often uses words
36 QC seven tools and language instead of number values for data.
-①PDPC(Process Decision Program Chart),②Association Diagram,③Tree Diagram,④Affinity Diagrams,⑤Matrix Diagrams,⑥Matrix data analysis and ⑦arrow
diagrams.
37 Balance sheet is a financial statement which indicates assets,liabilities,and net assets of a company at a certain point in time and clarifies its financial condition.
38 Statement of shreholders' equity With the implementation of the New Company Law of Japan in 2006,the appropriation methods of profit must now be recorded not only in the net assets section of
the balance sheet but also in the statement of shareholders' equity.
- shows the inflow and outflow of cash according to objectives and causes such as sales cash flow,investment cash flow,and financial cash flow.
39 Cash flow statement -is a statement that focuses on the flow of acutal cash.eg.on an income statement,when capital investment is made,it appears that the costs for the current period
are large and profit is low.
-However,on a cash flow statement,it can be seen that it is for an aggressive growth strategy.
40 Income statement This statement lists all the earnings for an accounting period and their related costs,and shows the difference between thes two as profits.
41 Financial indicators or indexes Total capital profit ratio is the percentage of profit to gross capital,and a larger value is more profitable.
42 ABC(Activity Based Costing) It is a technique that visualizes business processes of indirect departments,such as pruchasing and sales,and thereby reflects indirect costs ont o product cost.
43 Standard costing It is a technique that sets standard planned consumption volume and planned cost related to management resources for production and thereby calculates product
cost.
44 ABC analysis - is an inventory management technique.
-is a technique that classifies various types of inventory assets into groups A,B,and C based on sales and thereby improves inventory management efficiency.

45 Direct costing It is a technique that calculates product costs by using only variable manufacturing cost,subtracts variable costs from sales to calculate contribution profit on income
statements,and in addition subtracts fixed costs to calculate operating proft.

46 Sales at break-even point (Fixed cost)/(1 - (Variable cost/Sales)

-It is the ratio of profit to equity capital,and can be used to indicate the company's profitability on the shareholders's equity,as well as the management efficiency
for the shareholders' equity.
47 ROE(Return On Equity) - It also indicates the company's dividend capacity.
- ROE = Profit (current term net profit)÷ capital stock(gross captical× captical ratio)

48 ROA(Return on Assets) - It is the ratio of profit to total asset,and can be used to indicate the management efficiency of the capital invested in the business activities of the company.
- ROA = Profit( current term net profit)÷gross captical(= total assets)
-It is the ratio of profit to invested capital,and can be used as an index of the investment efficiency of the entire company,specific investment projects,or divisions of
the company.
49 ROI(Return on Investment) - ROI = Operating porfit(ordinary profit + interest paid)
÷invested capital(loans + value of corporate bonds issued + capital stock)

Section9-Corporate&LegalAfairs
# Keywords Content

-It is the ratio of profit to operating capital,and can be used to indicate the efficiency of the capital employed in the principal business activites,as well as the
profitability of the primary business activities.
50 Operating capital profit margin -operating profit(sales - cost of sales - selling costs - management cost)
÷ operating capital(gross capital(=total assets)-items not used in main business
(deferred assets,idle fixed assets,construction in progress,investment assets,etc,)

51 EVA(Economic Value Added) shows how much profit greater than capital cost(e.g.,shareholder dividends) was generated from business activities from the perspective of shareholders.
52 EPS(Earnings Per Share) is calculated by dividing the current term profits by the number of issued shares at the end of the period
53 PER(Price Earnings Ratio) shows how many times the EPS the current stock price is.
54 Amortization method 5-year amortization period using straight-line amortization
55 First-in First-out method The first items purchased are the first to be sent out, and the sold unit cost is the unit cost of the earliest items purchased.
56 Last-in first-out method The most recent items purchased are the first to be sent out,and the sold unit cost is the unit cost of the most recently purchased items.
57 Periodic average method The sold unit cost is the average value that is obtained by dividing the sum of the evaluated value at the beginning of the term and all the purchased cost through
the entire term by the total number purchased.
58 Simple average method The sold unit cost is the average of the purchased unit costs of throughout the term.
59 Moving average method For every purchase,the balance and purchase amount of an item are added.The sold unit cost is calculated by dividing the resulting value by the total numerical
quantity of the remaining amount and purchased amount.
60 Copyrights of Web pages A collection of Web page URLs sorted by specific fields along with simple comments on a link collection is protected by copyright law.
61 URL(Uniform Resource Locator) is an address to identify information resources on the Internet.
62 In,copyright law Unless there are particular arrangements in employment regulations,copyrights belong to the corporation.
63 copyrighted work such as computer programs Programming languages and conventions used to develop copyrighted work are not protected under copyright law.

- Trade secrets are protected under the Unfair Competition Prevention Act.
- Trade secrets are "technical or business information useful for commercial activities such as manufacturing or marketing method that is kept secret and that is not
publicly known."
-There are three conditions that must be met.
64 Trade secrets
(1) Undisclosed: Not publicly known
(2) Controlled secret:Kept secret
(3)Usefulness: Information useful for commercial activities
Therefore, " A non-disclosed customers list controlled as confidential and used for commercial activity" is the correct answer.

65 A patented invention Patented inventions are protected under the Patent Act.

Section9-Corporate&LegalAfairs
# Keywords Content
66 A proprietory system development procedure that System development procedures manuals that are distributed are protected under the Copyright Act.
is distributed
67 License aggreement Of 100 PCs,ten were moved to another department without removing Software X from their hard disks and continued being used as they are.
-"specifies computers with access restriction functions." Computers without access restriction functions are not protected under this law.
68 (Prohibition of Unauthorized Access) of the Act on
-Therefore,"For computers that have no access restriction functions such as a password,intrusion without the approval of the administrator is not penalized as an
the Prohibition of Unauthorized Computer Access
act of unauthorized access.
69 Security policy providing of management and support for information security in accordance with business requirements and relevant laws and regulations.
- Digital singatures have the same validity as impressed seals under the Code of Civil Procedure.
- Digital siganature technology used to be mainly public key cryptography based. However,it does not limit digital signatures to just public key crytography.
70 A provision under the Act on Electronic Signature - For example,digital signatures using biometric technologies such as fingerprints are recognized as digital signatures under this law.
and Ceritification Business - Digital signatures are defined as a" measure taken with respect to information that can be recorded in an electromagnetic record".
- Certification businesses can also be provided by private entities.
Act for securing the Proper Operation of Worker
71 Dispatching Undertakings and Improved Working Company X is informed that various operations for dispatch such as assigning work to dispatched workers are be done directly by Mr.P.
Conditions for Dispatched Workers

72 Underpinning contract - Work related instructions are given by the service provider.
-There are no particular constraints on workplaces.
73 Loan contract - There is no obligation to hand over completed work to the service provider.
- There is no obligation to hand over completed work to the service provider.
74 Quasi-mandate contract - Work related instructions are given by the service provider.
-There are no particular constraints on workplaces.
75 Dispatch contract - There is no obligation to hand over completed work to the service provider.
76 Act on the Protection of Personal The business operator handling personal information can charge a service fee when responding to a request for disclosure by the data subject.
Information(Charges)Article 30
77 Act on the Protection of Personal When consigning personal information,the business operator handling personal information need to supervise the consigned company if a non-disclosure aggreement
Information(Supervison of Trustees)Article 22 is signed.

78 Act on the Protection of Personal The business operator handling personal information must make an effort to retain the correctness of personal data and responsible for taking measures for security
Information(Security Control Measures)Article 20 management.

Act on the Protection of Personal When handling personal information,a business operator handling personal information shall specify the purpose of utilization of personal information to the extent
79 Information(Specification of the Purpose of
Utilization)Article 15 possible.
80 Software Management Guidelines Making sure that all software users are informed of the conditions of use as defined in the software license agreement.
81 JISC(Japanese Industrial Standards Committee) A council that is appointed by the Ministry of Economy,Trade and Industry based on the Industrial Standardization Act and conducts deliberations on the enacting
and reviewing of industrial standards in the country.
82 JSA(Japanese Standards Association) An organization that educates the public and promotes industrial standardization and unified stadndards.
83 JEITA(Japan Electronics and Information An industry organization that was started by the integration of the Japan Electronic Industry Development Association(JEIDA)and the Electronic Industries
Technology Industries Association) Association of Japan(EIAJ)
84 JIPDEC(Japan Information Processing Development An organization that is active as an operating agency for the Privacy Mark System,ISMS conformity assessment system,and digital signatures and certification
Corporation) services.
85 UCS-2(Universal Character Set) is a subset used to display the 16-bit(2-byte)characters in UCS and is based solely on BMP.
86 EBCDIC code 8-bit codes that were announced with System/360 by IBM and can represent 256 characters.
87 JIS Kanji code Kanji codes defined in JIS X 0208 consisting of the 1st level Kanji and the 2nd level Kanji,representing one character by using two bytes
88 Shift-JIS Kanji code Character codes defined in JIS X 0208,wherein so-called half-width and full-hidth characters can coexist without a switching code
- a 2-dimentional matrix barcode that has a pattern of black and white squares on a 2-dimensional plane.
- A sensor captures the horizontal and vertical aspects of the code to read it,and the rotation angle and read direction are identified using three position detection
89 QR codes (Quick Response) symbols allowing the code to be read from any angle.
-The code can handle a maximum of 4,296 alphanumeric characters or a maximum of 1,817 double byte(i.e.,Kanji) characters.
-A QR code is able to handle data such as numbers,letters,kanji,hiragana,symbols,as well as binary and control codes.
-QR codes are not a programming language.

Section9-Corporate&LegalAfairs

S-ar putea să vă placă și