ITL611S - INFORMATION AND TECHNOLOGY IN LOGISTICS - 1ST OPP - JUNE 2025


ITL611S - INFORMATION AND TECHNOLOGY IN LOGISTICS - 1ST OPP - JUNE 2025



1 Page 1

▲back to top


nAmlBIA unlVERSITY
OF SCIEnCE Ano TECHnOLOGY
FACULTYOFCOMPUTINGAND INFORMATICS
DEPARTMENTOF INFORMATICSJ,OURNALISMAND MEDIATECHNOLOGY
QUALIFICATION : Bachelor of Informatics, Bachelor of Computer Science
QUALIFICATION CODE: 07BLSC
COURSE: Information Technology in Logistics
DATE: JUNE 2025
DURATION: 3 Hours
COURSE LEVEL:6
COURSE CODE: ITL611S
SESSION: 1
MARKS: 100
EXAMINER(S):
FIRST OPPORTUNITY EXAMINATION PAPER
Mr. Admire Kachepa
MODERATOR (SJ:
Mr. Nkululeko Mthembo
THIS EXAMINATION PAPER CONSISTS OF 7 PAGES
(INCLUDING THIS FRONT PAGE)
Instructions for the Examiners
1.
1. Answer all questions.
2.
When writing take the following into account: The style should inform than impress,
it should be formal, in third person, paragraphs set out according to ideas or issues
and the paragraphs flowing in a logical order. Information provided should be brief
and accurate.
3.
Please, ensure that your writing is legible, neat and presentable.

2 Page 2

▲back to top


SECTION A
Answer all questions in this section.
MULTIPLE CHOICE QUESTIONS [20 Marks]
1.
What is an embedded system?
A) A general-purpose computer used for multitasking
B) A computer system that performs a specific, dedicated function
C) A large-scale mainframe system
D) A system used only in smartphones
2.
A)
B)
C)
D)
Which of the following is NOT typically part of an loT system?
Sensors
Data processing
Internet connection
Manual typewriters
3.
A)
B)
C)
D)
What is the main function of sensors in loT devices?
Display data to users
Process data
Collect data from the environment
Store data permanently
4.
What is the role of cloud computing in loT?
A) To design hardware
B) To collect and process data from loT devices
C) To manufacture sensors
D) To clean data storage
5.
A)
B)
C)
D)
What is the main function offirmware
To clean the memory
To act as temporary storage
To control the hardware operations
To connect to the internet
in an embedded system?
6.
A)
B)
C)
D)
Which of the following is a common use of loT in smart homes?
Printing books
Voice-controlled lighting systems
Manual temperature adjustment
Landline phone calling
7.
Which loT service model provides complete infrastructure such as servers and storage for
developing loT solutions?
A) Saas
B) DaaS
C) laaS
D) CaaS
2

3 Page 3

▲back to top


8.
Which deployment model combines both public and private cloud environments?
A) Community Cloud
B) Hybrid Cloud
C) Private Cloud
D) Multi-Cloud
9.
What does "vendor lock-in" refer to in cloud computing?
A) Losing all your cloud data
B) Being tied to one provider due to proprietary tools or services
C) Shared resources between companies
D) Temporary suspension of cloud access
10.
A)
B)
C)
D)
What is SG technology known for?
Creating virtual avatars
Providing ultra-fast wireless communication
Managing cryptocurrency wallets
Editing genetic material
11.
A)
B)
C)
D)
What is the function of a data warehouse in Bl?
To process transactions in real-time
To store and integrate data from different sources for analysis
To protect against cyber threats
To create animated graphics
12.
A)
B)
C)
D)
How do RFIDtags contribute to Supply Chain Visibility?
Encrypt customer passwords
Provide energy to warehouse systems
Track and identify items automatically
Create virtual meetings between suppliers
13.
A)
B)
C)
D)
Which of the following is NOT typically a part of an SCVsystem?
Real-time shipment tracking
Customer satisfaction surveys
Inventory monitoring
Supplier performance tracking
14.
A)
B)
C)
D)
Which protocol is used for securely transmitting data over the internet?
HTTP
FTP
SSL/TLS
SMTP
15.
A)
B)
C)
D)
What is a switch used for in a computer network?
To connect multiple networks and route traffic
To filter traffic based on MAC addresses and forward it to the correct port
To provide wireless access to devices
To assign IP addresses to devices in a local network
16.
A)
B)
What type of software is used to manage hardware components of a computer?
Application software
System software
3

4 Page 4

▲back to top


C) Utility software
D) Firmware
17.
A)
B)
C)
D)
Which software is specifically designed for creating and managing databases?
Spreadsheet software
Database Management System (DBMS)
Word Processor
Presentation Software
18. Today's ERPsystems focus on
A) providing real-time information within the enterprise
B) Facilitating collaboration efforts to improve quality management practices within the
enterprise.
C) Improving the value of information found in legacy systems.
D) Facilitating collaboration efforts among trading partners.
19.
A)
B)
C)
D)
Which of the following is NOT a primary activity in Porter's Value Chain Model?
Inbound Logistics
Operations
Marketing and Sale
Human Resource Management
20. Automatic identification systems are an essential component in _____
_
A) Every Warehouse
B) Point-of-sale System
C) Decision Support System
D) Office Automation System
4

5 Page 5

▲back to top


SECTIONB
[15 Marks]
State whether statement is True/ False
Answer all questions in this section.
1. loT devices always require internet connectivity to function.
2. Edge computing allows data to be processed closer to the device instead of in the cloud.
3. A VPN (Virtual Private Network) allows devices on a public network to communicate securely with
a private network.
4. Operating systems, like Windows or macOS, are examples of application software.
5. In the Value Chain, the primary activities include Human Resource Management and Technology
Development.
6. Outbound logistics in the Value Chain refers to the activities involved in receiving and storing raw
materials.
7. Supply chain management involves only the activities related to sourcing raw materials.
8. Transportation companies that have implemented global positioning systems (GPS)have reported
increased worker productivity, reduced operating costs, and improved customer relations.
9. Enterprise software applications increase the accessibility of information and can add value to
internal as well as external process integration and can reduce the gaps found in people-oriented
factors in supply chain management.
10. Warehouse management also includes the control of all inventories, such as raw materials, work-
in-process, and finished goods when not in use.
11. Software viruses are viewed as the most important information technology issue that companies
face today.
12. A hotel reservation system is a typical example of a management information system.
13. Information systems literacy describes the behavioural approach to information systems,
whereas computer literacy describes the technical approach.
14 A transaction processing system is a computerized system that performs and records the daily
routine transactions necessary to conduct business.
5

6 Page 6

▲back to top


15 Cloud-based software allows for a great deal of customization.
SECTIONC
(65 MARKS)
Answer all questions in this section.
QUESTION ONE
[25 Marks)
a. Compare and contrast SSDs(Solid-State Drives) and HDDs (Hard Disk Drives). Discuss their
advantages and disadvantages.
[10 Marks]
b.
1. What is Supply Chain Management (SCM)?
[3 Marks]
2. Name SIX key components of Supply Chain Management?
[12 Marks]
QUESTION TWO
[15 Marks)
Name FIVEchallenges faced in Supply Chain Management?
QUESTION THREE
[25 Marks]
(a) According to Michael Porter, a firm can survive and succeed in the long run if it successfully
develops strategies to confront the five competitive forces that shape the structure of competition in
its industry such as; Rivalry of competitors within its industry, Threat of new entrants, Threat of
substitutes, bargaining power of customers, Bargaining power of suppliers.
ABC Freight, a multinational logistics company engaged you as its IT consultant and you are required
to present to its management how Information Technology can help ABC Freight to develop the
following strategies. Write down your ideas for each of the strategies below.
1. Cost Leadership Strategy
2. Differentiation Strategy
3. Innovation Strategy
4. Growth Strategies
5. Alliance Strategies
[5 Marks]
[5 Marks)
[5 Marks]
[5 Marks]
[5 Marks]
TOTALMARKS 100
6