Explore 1.5M+ audiobooks & ebooks free for days

Only $12.99 CAD/month after trial. Cancel anytime.

NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option
NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option
NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option
Ebook691 pages6 hours

NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This book is useful for All students who give competitive exams in library and information science mainly NTA UGC NET/JRF/SET. the book covers all previous year's question papers with a detailed solution of each mcq option and each mcq is solved with full of exampl

LanguageEnglish
PublisherBlue Rose Publishers
Release dateJun 3, 2024
ISBN9789362619174
NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option

Related to NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option

Related ebooks

Teaching Methods & Materials For You

View More

Reviews for NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option - Sachin Prabhakar Masane

    March 2023

    Library and Information Science

    Paper II

    1 Arrange the five parts of 13 digited ISBN in logical order :

    (a) Prefixed digit 978

    (b) Publisher identifier digit

    (c) Group or country identifier digit

    (d) Title identifier digit

    (e) Check digit

    Codes :

    (A) (a), (c), (b), (d), (e)

    (B) (a), (b), (c), (d), (e)

    (C) (a), (d), (e), (b), (c)

    (D) (d), (a), (c), (b), (e)

    Ans :- (A) (a), (c), (b), (d), (e)

    Solution :-

    A 13-digit ISBN :- can be separated into its parts (prefix element, registration group, registrant, publication and check digit), and when this is done it is customary to separate the parts with hyphens or spaces.

    (1) Prefixed digit 978 (2) Group or country identifier digit (3) Publisher identifier digit (4) Tittle identifier digit (5) Check digit. ISBN :-The International Standard Book Number system was introduced in the world in 1972 and in India this system was put into operation in January 1985 by Raja Rammohan National Agency for ISBN and in the alphabetical order of member countries, our country stands at serial No. 55.

    2. Match the following :

    List I

    (a) Cataloguing-in-publication

    (b) MARC

    (c) Classified Catalogue Code

    (d) AACR-II

    List II

    (i) 1966

    (ii) 1977

    (iii) 1934

    (iv) 1978

    Codes :

    (a)   (b)   (c)   (d)

    (A) (i) (ii) (iii) (iv)

    (B) (ii) (iii) (iv) (i)

    (C) (iii) (iv) (i) (ii)

    (D) (iv) (i) (ii) (iii)

    Ans :- (A) (i), (ii), (iii), (iv)

    Solution :-

    (a) Cataloguing-in-publication :- (i) 1966

    (b) MARC :- (ii) 1977

    (c) Classified Catalogue Code :- (iii) 1934

    (d) AACR-II :- (iv) 1978

    3 Statement (A) : Precision is defined as the proportion of the total relavant documents retrieved.

    Statement (B) : Recall is defined as the proportion of documents retrieved that are relevant.

    Codes :

    (A) (A) is true but (B) is false

    (B) (A) is false but (B) is true

    (C) Both (A) and (B) are true

    (D) (D) Both (A) and (B) are false

    Ans :- (D) Both (A) and (B) are false

    Solution :-

    Precision :- In the field of information retrieval, precision is the fraction of retrieved documents that are relevant to the query: For example, for a text search on a set of documents, precision is the number of correct results divided by the number of all returned results.

    Recall :- is the ratio of the number of relevant records retrieved to the total number of relevant records in the database. It is usually expressed as a percentage.

    4 Assertion (A) : CCF is developed for exchange of bibliographic data.

    Reason (R) : It helps in development of universal union catalogue.

    Select the correct answer from the codes given below :

    Codes :

    (A) (A) is true but (R) is false

    (B) (A) is false but (R) is true

    (C) Both (A) and (R) are true

    (D) Both (A) and (R) are false

    Ans :- (C) Both (A) and (R) are true

    5 Assertion (A) : Google uses pre- coordinate indexing system.

    Reason (R): Pre-coordinate indexing is suitable for automated indexing.

    Codes :

    (A) Both (A) and (R) are true

    (B) Both (A) and (R) are false

    (C) (A) is true but (R) is false

    (D) (A) is false but (R) is true

    Ans :- (B) Both (A) and (R) are false

    Solution :-

    Google :- analyses the text, images, and video files on the page, and stores the information in the Google index, which is a large database. Serving search results: When a user searches on Google, Google returns information that’s relevant to the user’s query.

    Pre- coordinate indexing :- can be useful for either browse or keyword searching. Post- coordinate indexes are not as useful for browse searching, and individual facets cannot reliably be reassembled to offer syntax or relationships among the searched terms.

    Automatic indexing :- is the computerized process of scanning large volumes of documents against a controlled vocabulary, taxonomy, thesaurus or ontology and using those controlled terms to quickly and effectively index large electronic document depositories.

    6 Empirical approach in management is the basic element of ..........

    (A) Control

    (B) Leading

    (C) Personal observation

    (D) Command

    Ans :- (C) Personal observation

    Solution :-

    Control :- is a function of management which helps to check errors in order to take corrective actions. This is done to minimize deviation from standards and ensure that the stated goals of the organization are achieved in a desired manner.

    Leading :- consists of motivating employees and influencing their behaviour to achieve organizational objectives. Leading focuses on managing people, such as individual employees, teams and groups rather than tasks.

    Personal observation :- Empirical approach , Empirical research is research that is based on observation and measurement of phenomena, as directly experienced by the researcher. The data thus gathered may be compared against a theory or hypothesis, but the results are still based on real life experience.

    Command :- is the imparting of a vision to the organization in order to achieve a goal. It does this by formulating a well-thought-out vision and then clearly communicating it. Command emphasizes success and reward.

    7 The principle ‘‘Scalar Chain’’ is related with ............

    (A) Teamwork

    (B) Working tenure

    (C) Chain of command

    (D) Absenteeism of employee

    Ans :- (C) Chain of command

    Solution :-

    Teamwork :- is the collaborative effort of a group to achieve a common goal or to complete a task in the most effective and efficient way. This concept is seen within the greater framework of a team, which is a group of interdependent individuals who work together towards a common goal.

    Chain of command :- Scalar Chain, This principle implies that authority and responsibility should flow in a clear unbroken line from the highest executive to lowest rank. This refers to hierarchy, which consist of a series or steps, extending in a unbroken line from chief librarian to the lowest employee or an attendant.

    Working tenure :- The librarians at Princeton don’t have faculty status, although we do report to the Dean of the Faculty and we do have a three-tiered promotion structure and a tenure-like status called continuing appointment. However, while that process does reward publication, it does not require it. My previous professional librarian job had no faculty status, no promotional structure, and no tenure-like status. Not only have I never been on the tenure track, when starting out I deliberately avoided jobs where the librarians had faculty status and tenure requirements. I’d have taken one of those jobs in a pinch, but I definitely didn’t want one.

    Absenteeism of employee :- Absenteeism is when an employee consistently doesn’t appear for work at their scheduled time. This is true of both full-time and shift-working employees, and it is generally unplanned and without good reason.

    8 The term MBO was first used by ......

    (A) Henri Fayol

    (B) Peter Drucker

    (C) Frederick Taylor

    (D) Luther Gulick

    Ans :- (B) Peter Drucker

    Solution :-

    Henri Fayol :- The main proponent of the administrative management branch of classical theory was Henri Fayol, a French industrialist. Administrative management aims to improve organizational productivity by focusing on methods that managers can use to synchronize internal processes.

    Peter Drucker :- The idea of management by objectives (MBO), first outlined by Peter Drucker and then developed by George Odiorne, his student, was popular in the 1960s and 1970s.

    Frederick Winslow Taylor :- Father of Scientific Management Thinker | The British Library.

    Luther Gulick :- POSDCORB. Among many other accomplishments in the field of public administration, Gulick is perhaps best known for the functions of the chief executive represented in the acronym POSDCORB. Each letter stands for Planning, Organizing, Staffing, Directing, Co-ordinating, Reporting and Budgeting.

    9 The library budget prepared without considering previous year’s expenditure is ............

    (A) Performance based budget

    (B) Line-item budget

    (C) Zero based budget

    (D) Lump-sum budget

    Ans :- (C) Zero based budget

    Solution :-

    Methods of library budget :-

    Line by line item budget :- In this type of budget, the items of the expenditure are divided line by line, into broad categories such as books and journals, salaries and allowances equipment, contingencies, etc. With further sub-divisions of each of these broad categories. This is the usual traditional method which, by taking into account past expenditure of the previous years’ allocation, assuming that all current programmers’ are good and necessary. this budgetary method does not go into the evaluation of activities and services of performance.

    Lump-sum budget :- In a lump-sum budget, a certain amount of money is allocated to the library. In this, the library got the freedom to decide as to how the amount is going to be allocated to different categories.

    Formula budget :- In formula budget, predetermined standards are applied for the allocation of money. Such a budget is technical and easy to prepare. It does not require special skills to prepare the same.

    Programme budget :- It does not estimate the expenditure on the basis of the individual items. it is focused on the activities that the library plans. Hence the budget is prepared on the basis of the cost of programme. Every year, the library has to decide whether a programme has to continue, get modified, or deleted.

    Performance budget :- This method is similar to programme budget but in this method, the emphasis is given to performance in place of programmes. The expenditure is based on the performances of the activities and the stress is given to operational efficiency. The careful accumulation of quantitative data on all activities over a period of time is required. Management techniques such as cost-benefit analysis are used to measure the performance and establish med norms. Hence this method measures only the quantity, not quality.

    Planning programming budgeting system :- PPBS method combines the best of both program budget and performance budget and focuses on planning. it begins with the establishment of goals and objectives and ends with the formulation of programmes and services. This method combines the functions of planning activities. Programmes and services, translating them into tangible projects and finally presents the requirements in budgetary terms.

    Zero-based budget :- This method is similar to PPBS conceptually but does not take into account what happened in the past but emphasizes the current activities. Every programme and activity is spelled out in detail, and request for financial support to there has to be established afresh every year. In fact, no activating could continue simply because that activity was undertaken the previous year.

    10 ‘‘Hawthorne effect’’ is related to .........

    (A) Studies of cost effectiveness

    (B) Studies of Bureaucracy

    (C) Studies of human behaviour

    (D) Studies of operational management

    Ans :- (C) Studies of human behaviour

    Solution :-

    Studies of cost effectiveness :- Cost-effectiveness analysis is a way to examine both the costs and health outcomes of one or more interventions. It compares an intervention to another intervention (or the status quo) by estimating how much it costs to gain a unit of a health outcome, like a life year gained or a death prevented. idea icon.

    Studies of human behaviour :- The Hawthorne effect is the modification of behaviour by study participants in response to their knowledge that they are being observed or singled out for special treatment. In the simplest terms, the Hawthorne effect is increasing output in response to being watched.

    Study of bureaucracy :- is the analysis of how administrative agencies function as organizations within a governmental system.

    Studies of operational management :- Operations management (OM) is the administration of business practices to create the highest level of efficiency possible within an organization. It is concerned with converting materials and labor into goods and services as efficiently as possible to maximize the profit of an organization.

    11 Arrange the following according to library work flow :

    (A) Processing, ordering, dissemination, selection

    (B) Selection, ordering, processing, dissemination

    (C) Dissemination, processing, ordering, selection

    (D) Selection, processing, ordering, dissemination

    Ans :- (B) Selection, ordering, processing, dissemination

    Solution :-

    Selection :- The process of deciding which materials should be added to a library collection. Selection decisions are usually made on the basis of reviews and standard collection development tools by librarians designated as selectors in specific subject areas, based on their interests and fields of specialization.

    Ordering :- It involves pre-order bibliographic searching of the library catalogue to avoid duplication of materials. Then the selected materials are acquired by ordering them for purchase, exchange, or gift.

    Processing :- is a series of tasks or operations Before items can be shelved and then circulated from the library, they need to be physically prepared Library materials go through processing so that they can be located, used, and returned to the library from which they originated.

    Dissemination :- As part of information dissemination functions, a library establishes and maintains a collection of reference sources. Provides answers to simple factual reference queries directs users who need research information to possible sources of information. Publicize new issues and communicates directly with the users.

    12 Assertion (A) : Performance measurement is useful for decision making in libraries and information centres.

    Reason (R) : Right decision at a right time helps libraries and information centres to achieve goals.

    Codes :

    (A) Both (A) and (R) are true

    (B) Both (A) and (R) are false

    (C) (A) is true but (R) is false

    (D) (A) is false but (R) is true

    Ans :- (A) Both (A) and (R) are true

    13 Match the following :

    List I

    (a) Henri Fayol

    (b) F.W. Taylor

    (c) Abraham Maslow

    (d) Douglas McGregor

    List II

    (i) Hierarchy of human needs

    (ii) Theory of X and Theory Y

    (iii) Principles of management

    (iv) Scientific management

    Codes :

    (a)   (b)   (c)   (d)

    (A) (iii) (iv) (i) (ii)

    (B) (i) (iii) (ii) (iv)

    (C) (ii) (i) (iv) (iii)

    (D) (iv) (ii) (i) (iii)

    Ans :- (A) (iii) (iv) (i) (ii)

    Solution :-

    (a) Henri Fayol :- (iii) Defines rules for exchanging data in a common neutral language

    (b) F.W. Taylor :- (iv) Handles user’s authorization details

    (c) Abraham Maslow :- (i) Transmission of raw bits over communication channel

    (d) Douglas McGregor :- (ii) Routing function

    15 Arrange the following Internet based facilities in the chronological order :

    (i) Google

    (ii) Hotmail

    (iii) Facebook

    (iv) WhatsApp

    (A) (i) (iii) (ii) (iv)

    (B) (ii) (i) (iii) (iv)

    (C) (ii) (iv) (iii) (i)

    (D) (iv) (iii) (ii) (i)

    Ans :- (B) (ii) (i) (iii) (iv)

    Solution :-

    Google :- Founded: 4 September 1998, Menlo Park, California, United States. Founders: Larry Page; Sergey Brin.

    Hotmail :- It was commercially launched on July 4, 1996, symbolizing freedom from ISP-based email and the ability to access a user’s inbox from anywhere in the world. Sabeer Bhatia arrived in the United States from Bangalore at 19; now he’s a Web gazillionaire. With friend and co-worker Jack Smith, Bhatia founded Hotmail, the first free Web-based e-mail service.

    Facebook :- Founders: Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, Chris Hughes CEO: Mark Zuckerberg (Jul 2004–) Headquarters: Menlo Park, California, United States Founded: February 2004, Cambridge, Massachusetts, United States.

    WhatsApp :- Founders: Jan Koum, Brian Acton, Parent organization: Meta CEO: Will Cathcart (Mar 2019–) Headquarters: Menlo Park, California, United States Founded: 2009.

    16 Assertion (A) : Li-fi can be used more effectively in a dense environment.

    Reason (R) : Li-fi uses ultraviolate, infrared and visible light communication

    Codes :

    (A) Both (A) and (R) are true

    (B) Both (A) and (R) are false

    (C) (A) is true but (R) is false

    (D) (A) is false but (R) is true

    Ans :- (A) Both (A) and (R) are true

    17 The following functions are carried out by firewall in a network :

    (i) Filters the IP packets.

    (ii) Open a port to only specific and reliable IP addresses.

    (iii) Enables user privacy.

    (iv) Enables anonymous surfing.

    Codes :

    (A) (i) and (ii) are correct

    (B) (i) and (iv) are correct

    (C) (ii) and (iv) are correct

    (D) (iii) and (i) are correct

    Ans :- (A) (i) and (ii) are correct

    Solution :-

    18 Transmission media are usually categorized as ......... and ..........

    (i) Guided

    (ii) Unguided

    (iii) Fixed

    (iv) Unfixed

    Codes :

    (A) (i) and (ii) are correct

    (B) (i) and (iii) are correct

    (C) (iii) and (iv) are correct

    (D) (ii) and (iv) are correct

    Ans :- (A) (i) and (ii) are correct

    Solution :-

    19 Which protocol is used to provide security to e-mails ?

    (A) POP

    (B) PGP

    (C) SNMP

    (D) HTTP

    Ans :- (B) PGP

    Solution :-

    Types of Protocols :-

    1. Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination.

    2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks.

    3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications.

    4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.

    5. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail.

    6. PGP: is short for Pretty Good Privacy, a security program that enables users to communicate securely by decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting files. It was one of the first freely available forms of public-key cryptography software. PGP stands for Pretty Good Privacy (PGP) which is invented by Phil Zimmermann.

    7. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc.

    8. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly.

    9. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.

    10. Simple Network Management Protocol (SNMP): is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. The purpose of SNMP is to provide network devices, such as routers, servers and printers, with a common language for sharing information with a network management system (NMS).

    11. Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer.

    12. Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle.

    Some Other Protocols :-

    Some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning. These are:

    ARP (Address Resolution Protocol)

    DHCP (Dynamic Host Configuration Protocol)

    IMAP4 (Internet Message Access Protocol)

    SIP (Session Initiation Protocol)

    RTP (Real-Time Transport Protocol)

    RLP (Resource Location Protocol)

    RAP (Route Access Protocol)

    L2TP (Layer Two Tunnelling Protocol)

    PPTP (Point To Point Tunnelling Protocol)

    SNMP (Simple Network Management Protocol)

    TFTP (Trivial File Transfer Protocol)

    20 Internet protocol version 4 defines an IP address as a bit number.

    (A) 8

    (B) 16

    (C) 32

    (D) 64

    Ans :- (C) 32

    Solution :-

    An IPv4 address is 32 bits. An IP Address is shown as 4 decimal numbers representing 4 bytes: d.d.d.d where d = decimal number (0 - 255).

    An IPv6 address is 128 bits. The preferred IP address format has 8 hexadecimal numbers representing 16 bytes.

    21 .............is also called as a ‘‘Connection less’’ protocol.

    (A) TCP

    (B) UDP

    (C) HTTP

    (D) FTP

    Ans :- (B) UDP

    Solution :-

    User Datagram Protocol (UDP) :- is a connectionless protocol used for less complex transmissions, TCP is the more complex protocol, used for connection-oriented transmissions based on its stateful design incorporating data stream services and reliable transmission.

    22 The full form of SEO is .............

    (A) Search E-mail Operation

    (B) Search Engine Operation

    (C) Search Engine Optimization

    (D) Search Mail Optimization

    Ans :- (C) Search Engine Optimization

    Solution :-

    SEO :- means Search Engine Optimization and is the process used to optimize a website’s technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.

    23 The high level language program before ready to be executed must go through various processes except ......

    (A) Linking

    (B) Loading

    (C) Controlling

    (D) Translation

    Ans :- (D) Translation

    Solution :-

    High level language (HLL) :- is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages. In contrast, assembly languages are considered low-level because they are very close to machine languages. The main advantage of high-level languages over low-level languages is that they are easier to read, write, and maintain. Ultimately, programs written in a high-level language must be translated into machine language by a compiler or interpreter. The first high-level programming languages were designed in the 1950s. Now there are dozens of different languages, including Ada, Algol, BASIC, COBOL, C, C++, FORTRAN, LISP, Pascal, and Prolog.

    24 Who developed (OAIS) Open Archival Information System) ?

    (A) Consultative Committee for space data systems

    (B) MIT university

    (C) IFLA committee on standards

    (D) IFLA linked data sub-committee

    Ans :- (A) Consultative Committee for space data systems

    Solution :-

    NASA’s Consultative Committee for Space Data Systems :- (OAIS) Open Archival Information System).The development of the OAIS reference model has been pioneered by NASA’s Consultative Committee for Space Data Systems (CCSDS) and has been accepted as an ISO (14721:2003) standard[1]. A technical recommendation is also available for consultation on the CCSDS website[2].

    25 Which part of the QR code represents the encoded data ?

    (A) Three positioning element

    (B) Data element

    (C) Location

    (D) Programme

    Ans :- (B) Data element

    Solution :-

    OR code :- In 1994, DENSO WAVE (then a division of DENSO CORPORATION) announced the release of its QR Code. The QR in the name stands for quick response, expressing the development concept for the code, whose focus was placed on high-speed reading.

    26 Which standard governs the syntax holdings of information in MARC records ?

    (A) Z39.50

    (B) Z59.50

    (C) Z39.71

    (D) Z59.71

    Ans :- (C) Z39.71

    Solution :-

    Z39. 50 :- is an international standard protocol used by net- worked computer systems for information retrieval. It enables information seekers to search different systems on a network or the Internet through the use of a single user interface.

    Z39. 71 :- lays out nine principles, or major concepts, that holding records need to adhere to. Levels of Specificity. There are four levels of specificity, ranging from a simple statement that the library holds the item on up to a complex, detailed statement of exactly what parts of the item are held.

    27 The full form of RDFS is ..........

    (A) Resource Description Framework Source

    (B) Resource Description Framework Scheme

    (C) Resource Description Framework Schema

    (D) Resource Description Framework Summary

    Ans :- (C) Resource Description Framework Schema

    Solution :-

    RDF Schema :- (Resource Description Framework Schema, variously abbreviated as RDFS, RDF(S), RDF-S, or RDF/S) is a set of classes with certain properties using the RDF extensible knowledge representation data model, providing basic elements for the description of ontologies.

    28 In the process of digitization, ‘‘Digitization step’’ includes ........

    (i) Image capturing

    (ii) Selection of documents

    (iii) OCR

    (iv) Image cleaning

    Codes :

    (A) (i), (ii) and (iii) are correct

    (B) (ii), (iii) and (iv) are correct

    (C) (i), (ii) and (iv) are correct

    (D) (i), (iii) and (iv) are correct

    Ans :- (D) (i), (iii) and (iv) are correct

    Solution :-

    29 Characteristics of linked open data .............

    (i) Are released under an open license

    (ii) Does impede its reuse for free

    (iii) Are released under restricted license

    (iv) Does not impede its reuse for free

    Codes :

    (A) (i) and (ii) are correct

    (B) (ii) and (iii) are correct

    (C) (i) and (iv) are correct

    (D) (iii) and (iv) are correct

    Ans :- (C) (i) and (iv) are correct

    Solution :-

    Linked Open Data :- is a set of design principles for sharing machine-readable interlinked data on the Web. When combined with Open Data (data that can be freely used and distributed), it is called Linked Open Data (LOD). An RDF database such as Ontotext’s GraphDB is an example of LOD.

    30 Match the following :

    List I

    (a) QR Code

    (b) RFID Technology

    (c) Biometric Technology

    (d) Barcode Technology

    List II

    (i) Norman Joseph Woodland and Bernard Silver

    (ii) Sir William Herschel

    (iii) Denso Wave

    (iv) Raytheon’s Raytag

    Codes :

    (a)   (b)   (c)   (d)

    (A) (iv) (i) (ii) (iii)

    (B) (ii) (iv) (iii) (i)

    (C) (ii) (i) (iv) (iii)

    (D) (iii) (iv) (ii) (i)

    Ans :- (D) (iii) (iv) (ii) (i)

    Solution :-

    (a) QR Code :- (iii) Denso Wave

    (b) RFID Technology :- (iv) Raytheon’s Raytag

    (c) Biometric Technology :- (ii) Sir William Herschel

    (d) Barcode Technology :- (i) Norman Joseph Woodland and Bernard Silver

    31 Assertion (A) : Many of the Big Libraries are giving preference for cloud computing.

    Reason (R) : Cloud computing has helped libraries to avoid operating multiple servers.

    Codes :

    (A) Both (A) and (R) are true

    (B) Both (A) and (R) are false

    (C) (A) is true but (R) is false

    (D) (A) is false but (R) is true

    Ans :- (A) Both (A) and (R) are true

    32 Arrange the following library software according to their first year of launching :

    (i) phpMylibrary

    (ii) ABCD

    (iii) Koha

    (iv) New Genlib

    Codes :

    (A) (iii), (iv), (i), (ii)

    (B) (iii), (i), (iv), (ii)

    (C) (i), (iii), (ii), (iv)

    (D) (i), (iii), (iv), (ii)

    Ans :- (B) (iii), (i), (iv), (ii)

    Solution :-

    KOHA – 3 Jan 2000

    New Genlib – 2005

    Php Mylibrary – 2002

    ABCD – 2007

    33 Match the following :

    List I

    (a) Publication manual of the APA

    (b) The Chicago manual of style

    (c) The MLA handbook

    (d) AMA manual of style

    List II

    (i) 1906

    (ii) 1952

    (iii) 1962

    (iv) 1985

    Codes :

    (a)   (b)   (c)   (d)

    (A) (ii) (i) (iv) (iii)

    (B) (i) (ii) (iii) (iv)

    (C) (iv) (iii) (ii) (i)

    (D) (ii) (i) (iii) (iv)

    Ans :- (A) (ii) (i) (iv) (iii)

    Solution :-

    (a) Publication manual of the APA :- (ii) 1952

    (b) The Chicago manual of style :- (i) 1906

    (c) The MLA handbook :-(iv)1985

    (d) AMA manual of style :- (iii) 1962

    34 Bradford’s law ...........

    (i) Explains scattering of articles of a specific subject in different journals.

    (ii) Demonstrates author’s productivity

    (iii) Calculates impact factor

    (iv) Enables to prepare rank list of journals.

    Codes :

    (A) (i) and (ii) are correct

    (B) (i) and (iii) are correct

    (C) (i) and (iv) are correct

    (D) (iii) and (iv) are correct

    Ans :- (C) (i) and (iv) are correct

    Solution :-

    Bradford’s Law of Scattering :- is a law of diminishing returns and scattering. Bradford formulated the law in 1948 and claimed that for a given subject area there are a few very productive periodicals, a larger number of more moderate producers, and a still larger number of constantly diminishing productivity.

    35 Assertion (A) : Case studies explore in detail features of a case under study.

    Reason (R) : Primary purpose of case study is generalization.

    Codes :

    (A) Both (A) and (R) are true

    (B) Both (A) and (R) are false

    (C) (A) is true but (R) is false

    (D) (A) is false but (R) is true

    Ans :- (C) (A) is true but (R) is false

    Solution :-

    The general purpose of a case study is to:

    1) Describe an individual situation (case), e.g. a person, business, organisation, or institution, in detail;

    2) Identify the key issues of the case (your assignment question should tell you what to focus on);

    3) Analyse the case using relevant theoretical concepts from your unit or discipline;

    4) Recommend a course of action for that particular case (particularly for problem-solving case studies).

    36 Assertion (A) : Interviews are used to supplement the data collected through questionnaire.

    Reason (R) : Compared with questionnaire, interview data is more reliable.

    Codes :

    (A) (A) is false but (R) is true

    (B) Both (A) and (R) are true

    (C) Both (A) and (R) are false

    (D) (A) is true but (R) is false

    Ans :- (B) Both (A) and (R) are true

    37 Case study :

    (A) Attempts to understand population’s characteristics by studying samples

    (B) Carries out in depth contextual analysis of single research element.

    (C) Enquires only about past events

    (D) Attempts to find why and how one variable produces change in another variable

    Ans :- (B) Carries out in depth contextual analysis of single research element.

    Solution :-

    Case study :- methods are those in which an individual or group of people is observed in order to determine outcomes. For example, a group of individuals might be watched over an extended period of time to observe the progression of a particular disease.

    38 SPSS stands for .........

    (A) Statistical Package for the Science Scholars

    (B) Statistical Package for the Social Sciences

    (C) Statistical Package for Scientometrics Studies

    (D) Statistical Package for Scientific Studies

    Ans :- (B) Statistical Package for the Social Sciences

    Solution :-

    SPSS :- (Statistical Package for the Social Sciences) is a software program used by researchers in various disciplines for quantitative analysis of complex data. Initial release date: 1968. Platform: Java. License: Trialware or SaaS. Size: ~1.2 GB Operating system: Windows (x86-64), macOS (x86-64), Linux (x86-64, ppc64le, IBM Z) Developer: IBM, SPSS Inc. Programming language: Java.

    39 In an experimental research a variable presumed to cause change in another variable is called ..........

    (A) Extraneous variable

    (B) Dependent variable

    (C) Null variable

    (D) Independent variable

    Ans :- (D) Independent variable

    Solution :-

    Extraneous variables :- are those that produce an association between two variables that are not causally related. Anything that is not the independent variable that has the potential to affect the results is called an extraneous variable. It can be a natural characteristic of the participant, such as intelligence level, gender, or age, for example, or it could be a feature of the environment, such as lighting or noise.

    Dependent variable :- is the variable that changes as a result of the independent variable manipulation. It’s the outcome you’re interested in measuring, and it depends on your independent variable. In statistics, dependent variables are also called: Response variables (they respond to a change in another variable)

    Null hypothesis :- Null meaning nothing. This hypothesis states that there is no difference between groups or no relationship between variables. The null hypothesis is a presumption of status quo or no change. Alternative Hypothesis (Ha) – This is also known as the claim.

    Independent variable :- is exactly what it sounds like. It is a variable that stands alone and isn’t changed by the other variables you are trying to measure. For example, someone’s age might be an independent variable.

    40 ‘BibExel’ is developed by ..........

    (A) Peter Ingewersen

    (B) Mike Thelwall

    (C) Eugene Garfield

    (D) Olle Persson

    Ans :- (D) Olle Persson

    Solution :-

    Webometrics :- "The term Webometrics was first coined by Almind and Ingwersen 1997. It is a study of qualitative aspects of information.

    Mike Thelwall :- is Professor of Information Science and leader of the Statistical Cybermetrics Research Group at the University of Wolverhampton, UK, which he joined in 1989. He was formerly Reader, Senior Lecturer and Lecturer at the University of Wolverhampton.

    Eugene Garfield :- was responsible for many innovative bibliographic products,

    Enjoying the preview?
    Page 1 of 1