ITL611S- INFORMATION TECHNOLOGIES IN LOGISTICS- 2ND OPP- JULY 2024


ITL611S- INFORMATION TECHNOLOGIES IN LOGISTICS- 2ND OPP- JULY 2024



1 Page 1

▲back to top


--·--·-
;
1
\\
:.·!<:}}
~••l•~:Z}~:r•,-~
nAmlBIA UnlVERSITY
OF SCIEnCE Ano TECHnOLOGY
FACULTY OF COMPUTING AND INFORMATICS
DEPARTMENTOF INFORMATICS
QUALIFICATION:Bachelor of Logistics and Supply Chain Management
QUALIFICATIONCODE: 07BLSC LEVEL:6
COURSECODE: ITL611S
COURSENAME: Information Technology in Logistics
SESSION:JULY 2024
DURATION: 3 HOURS
PAPER: PAPER1
MARl<S:100
SECOND OPPORTUNITY/SUPPLEiVJENTARY EXAMINATION QUESTION PAPER
EXAMINER{S} Mr Admire Kachepa
MODERATOR: Mr Nkululeko Mthembo
INSTRUCTIONS
1. Answer ALL the questions.
2. When writing, take the following into account: The style should
inform than impress, paragraphs set out according to ideas or issues
and paragraphs flowing in a logical order.
3. Information should be brief and accurate.
4. Please ensure that your writing is legible, neat, and presentable
THIS QUESTION PAPERCONSISTSOF 7 PAGES{Including this front page)

2 Page 2

▲back to top


SECTIONA
MULTIPLECHOICEQUESTIONS[20 Marks]
Answer all questions in this section.
1. Warehouse management systems (WMS) represent an example of what general type of information
management system?
A) Communication System
B) Transaction Processing System
C) Decision Support System
D) Office Automation System
E) Microsoft Office Suite
2. The origins of contemporary enterprise resource planning (ERP)system can be traced back to logistics
and -----
A) Manufacturing
B) Marketing
C) Purchasing
D) Finance
E) Advertising
3.
____
has been identified as the biggest information technology challenge that companies
· · . , . face today
· A) Software viruses
B) lnformatiori Security
·•.q ·The cost of technology
·· D) Employee resistance
E) Company politic
4. Which of the following would a manager use to determine the impact on production schedule if sales
doubled in.the next quarter?
A) .MIS
B) TPS
C) ESS
D) DSS ··
Ej CRM
5. The logistics network most likely consists of
A) PRODUCTIONlayouts
B) internal and external flow management
C) auto identification technologies
D) production and warehouse facilities
E) None of the above ·
6. Which of the following statements about wireless security is not true?
A) LANs.usingthe 802.11 stand.ard can be easily penetrated by outsiders.
··. BJ Wi~Finetworks are susceptible to hacking by eavesdroppers.
1

3 Page 3

▲back to top


C) War driving involves eavesdroppers driving by buildings or parking outside and trying to
intercept a wireless network.
D) Intruders can force a user's NICto associate with a rogue accesspoint.
,,
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
7. Today's ERPsystems focus on
A) providing real-time information within the enterprise
B) Facilitating collaboration efforts to improve quality management practices within the enterprise.
C) Improving the value of information found in legacy systems.
D) Facilitating collaboration efforts among trading partners.
E) None of the above
8. RFIDtags placed on case-packsand pallets within the distribution center can play a vital role in
A) controlling the flow of goods in a TMS
B) controlling the flow of goods in a WMS
C) controlling the flow of goods in a RMS
D) controlling the flow of goods in a VMS
E) All of the above
9. RFIDis not really a new technology, but it is being hailed as an emerging technology for
A) Tracking products as they move along the supply chain.
B) Connecting workers with the firm's system while out of the office.
C) Automating direct product data exchange between the key supply chain partners.
D) Smart 8PM systems.
E) All of the above
10. Automated decision systems involves the use of
A) Rule-based expert systems to make decisions.
B) RFID-basedsystems to make the day-to-day decisions.
C) GOS-basedsystems to make tactical transportation decisions.
D) Day-to-day decisions using generic rules.
E) All of the above
11. Information systems play a critical role in today's firms, and the most common enabler is
A) the use of email
B) The use of cell phones and other telecommunication devices.
C) ERPsystems.
D) Micro Soft systems.
E) None of the above
12. Using numerous computers to inundate and overwhelm the network from numerous launch points is
called a(n) ___
attack.
A) DDoS
B) DoS
C) SQLinjection
D) Phishing
E) Botnet
2

4 Page 4

▲back to top


13. Which of the following is not one of the six strategic business objectives that businesses are seeking to
achieve when they invest in information systems?
A) Operational excellence
B) Improved decision making
C) Improved community relations
D) Competitive advantage
E) Survival
14. Which of the following is not a true statement with respect to business processes?
A) Every business can be seen as a collection of business processes.
B) Analyzing business processes can enable you to achieve a clear understanding of how a
business.actually works.
C) The performance of a business firm typically is not related to its business processes.
D) Business processes can be either a source of competitive strength or a liability.
E) A business process may involve a unique way in which work, information, and knowledge are
coordinated within an organization.
15. Which of the following is not a potential benefit of transportation management systems (TMS)?
A) Fewer stock-outs
B) Reduced fuel consumption
C) Decreased empty vehicle miles
D) Reduced transportation expenditures
E) None of the above
16. The term management information systems refers to a specific category of information systems
serving:
A) Integrated data processing throughout the firm.
B) Transaction process reporting.
C) Employees with online accessto historical records.
D) The information technology function.
E) Middle management functions.
17.Warehouse management systems (WMS) represent an example of what general type of information
management system?
A) Communication System
B) Transaction Processing System
C) Decision Support System
D) Office Automation System
E) Microsoft Office Suite
18. The Internet of things (loT) is expected to drive value in the supply chain and logistics disciplines
through enhanced customer interactions and ____
_
A) Improved order management techniques
B) Faster transit times
C) Reduced warehousing requirements
D) Improvements in employee productivity
3

5 Page 5

▲back to top


E) None of the above
19. The origins of contemporary enterprise resource planning (ERP)system can be traced back to logistics
and ____
_
A) Manufacturing
B) Marketing
C) Purchasing
D) Finance
E) Advertising
20. Which of the following would a manager use to determine the impact on production schedule if sales
doubled in the next quarter?
A) MIS
B) TPS
C) ESS
D) DSS
E) CRM
SECTIONB
State True/ False
TRUE OR FALSE
[15 Marks]
Answer all questions in this section.
1. Managing and coordinating the functional views of processes within a network of supply chain partners
leads to successful CRM.
2. In general, CRM processes manage the firm's customer base so that customers remain satisfied and
continue to purchase goods and services.
3. Transportation companies that have implemented global positioning systems (GPS)have
reported increased worker productivity, reduced operating costs, and improved customer
relations.
4. CRM software applications can create significant competitive advantage for the company and its trading
partners.
5. One prominent drawback to radio-frequency identification (RFID)involves privacy
concerns.
6. Emerging technologies play a vital supporting role in customer service performance since this function
is also involves in moving, storing, and distributing products in response to a customer order.
7. Studies have shown that ERPsystem failures are often the result of poor training.
8. The Internet is the primary transaction medium for cloud-based software.
9. Many of the ERPsuppliers want their product to become the foundation of firms' planning system
infrastructures, by making the ERPsystem a decentralized repository for business systems.
10. The Internet of things (loT) is expected to drive value in the supply chain and logistics
disciplines through faster transit times and enhanced customer interactions.
11. Purchasing may also use RFIDto informally collect general information on price, design, timing, and/or
other terms the firm is interested in obtaining.
4

6 Page 6

▲back to top


12. Enterprise software applications increase the accessibility of information and can add value to internal
as well as external process integration and can reduce the gaps found in people-oriented factors in
supply chain management.
13. A computer worm is a program that can copy itself to other computers on the network.
14. Radio-frequency identification (RFID) is the most popular automatic identification system currently in
use.
15. Warehouse management also includes the control of all inventories, such as raw materials, work-in-
process, and finished goods when not in use.
5

7 Page 7

▲back to top


SECTIONC
Answer all questions in this section.
QUESTION ONE
Michael E. Porter was the first to introduce the concept of value chain.
A) What is the main purpose of Porter's value chain model?
B) Name and Explain the FIVEprimary activities of a value chain?
[65 MARKS]
[25 Marks]
[10 Marks]
[15 Marks]
QUESTION 2
(25 MARKS)
Readthe scenario below and answer the following questions:
Barcode and Radio Frequency Identification (RFID)are two examples of most commonly used Automatic
Identification and Data Capture systems in the logistics and supply chain management around the globe.
1. Identify and explain three main components of RFID
2. State and explain two different types of barcodes
3. Discuss FIVEbenefits of RFIDover barcodes.
[9 Marks]
[6 Marks]
[10 Marks]
QUESTIONTHREE
[15 Marks]
Business Process Automation (BPA)focuses on automating workflows such as document approval, data
capture, sending and receiving information within an organization.
1. Name the THREEcategories of BPAtools in Logistics
2. What is Big Data?
3. Name and explain any FIVEcharacteristics of Big Data
[3 Marks]
[2 Marks]
[10 Marks]
TOTAL MARKS 100
6