NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option
()
About this ebook
This book is useful for All students who give competitive exams in library and information science mainly NTA UGC NET/JRF/SET. the book covers all previous year's question papers with a detailed solution of each mcq option and each mcq is solved with full of exampl
Related to NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option
Related ebooks
Integrated Indian Public Library System Rating: 0 out of 5 stars0 ratingsGeneral English Made EaZy Rating: 0 out of 5 stars0 ratingsCTET Paper I Class I to V Child Development & Pedagogy Rating: 0 out of 5 stars0 ratingsTrackpad Pro Ver. 5.0 Class 7: WINDOWS 11 & MS OFFICE 2021 Rating: 0 out of 5 stars0 ratingsSSC CGL Preparatory Guide: General Knowledge (Part 1) Rating: 0 out of 5 stars0 ratingsBeyond Boundaries: Emerging Concepts in Social Thought Rating: 0 out of 5 stars0 ratingsSSC CGL Preparatory Guide -Mathematics (Part 2) Rating: 4 out of 5 stars4/5SSC CGL Preparatory Guide -Mathematics (Part 3) Rating: 0 out of 5 stars0 ratings3 Hundred MCQs for UPSC Prelims: II Rating: 0 out of 5 stars0 ratingsBeyond the Barracks Rating: 0 out of 5 stars0 ratingsTouchpad Plus Ver. 4.0 Class 3 Rating: 0 out of 5 stars0 ratingsExam Prep for:: Bundle: AISE - Global Strategic Management Rating: 0 out of 5 stars0 ratingsSurviving in the Hi-Tech World Rating: 0 out of 5 stars0 ratingsTouchpad Computer Applications Class 9 Rating: 4 out of 5 stars4/5Reimagining Reference in the 21st Century Rating: 0 out of 5 stars0 ratingsTransforming Brent Libraries Rating: 0 out of 5 stars0 ratingsIGNOU MCA Second Semester Previous Years Unsolved Papers Rating: 0 out of 5 stars0 ratingsExam Prep for:: Spain Country Study Guide Rating: 0 out of 5 stars0 ratingsNREN Rating: 0 out of 5 stars0 ratingsICT & Democracy Rating: 0 out of 5 stars0 ratingsControlling Knowledge: Freedom of Information and Privacy Protection in a Networked World Rating: 0 out of 5 stars0 ratingsPropaganda 2.1: Understanding Propaganda in the Digital Age Rating: 0 out of 5 stars0 ratingsThe Information Process: A Model and Hierarchy Rating: 0 out of 5 stars0 ratingsTouchpad Prime Ver. 1.2 Class 5 Rating: 0 out of 5 stars0 ratingsDr. Carla Hayden: The First Woman Librarian of Congress Rating: 0 out of 5 stars0 ratingsLibrary Vocabulary: A Terminology for Librarians and Students Rating: 0 out of 5 stars0 ratingsIGNOU MCA Security and Cyber Laws Previous Years Unsolved Papers MCS 215 Rating: 0 out of 5 stars0 ratingsExam Prep for:: Poland Business Law Handbook Rating: 0 out of 5 stars0 ratingsOn Duty at the Info Desk: Strategies and Best Practices forLibrary Reference and Information Services Rating: 0 out of 5 stars0 ratingsIGNOU MCA First Semester Previous Years Unsolved Papers Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Principles: Life and Work Rating: 4 out of 5 stars4/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5Vocabulary Cartoons, SAT Word Power: Learn Hundreds of SAT Words with Easy Memory Techniques Rating: 4 out of 5 stars4/5Mental Math Secrets - How To Be a Human Calculator Rating: 5 out of 5 stars5/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5How You Learn Is How You Live: Using Nine Ways of Learning to Transform Your Life Rating: 4 out of 5 stars4/5The Secrets of ChatGPT Prompt Engineering for Non-Developers Rating: 5 out of 5 stars5/5Learn Like a Pro: Science-Based Tools to Become Better at Anything Rating: 5 out of 5 stars5/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5Mnemonic Memory Palace Book One Rating: 4 out of 5 stars4/5Become an Engineer Not Just an Engineering Graduate Rating: 4 out of 5 stars4/5
Reviews for NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option
0 ratings0 reviews
Book preview
NTA UGC NET/JRF/SET Library And Information Science Objective Previous Year Questions with Details Solution of MCQ Option - Sachin Prabhakar Masane
March 2023
Library and Information Science
Paper II
1 Arrange the five parts of 13 digited ISBN in logical order :
(a) Prefixed digit 978
(b) Publisher identifier digit
(c) Group or country identifier digit
(d) Title identifier digit
(e) Check digit
Codes :
(A) (a), (c), (b), (d), (e)
(B) (a), (b), (c), (d), (e)
(C) (a), (d), (e), (b), (c)
(D) (d), (a), (c), (b), (e)
Ans :- (A) (a), (c), (b), (d), (e)
Solution :-
A 13-digit ISBN :- can be separated into its parts (prefix element, registration group, registrant, publication and check digit), and when this is done it is customary to separate the parts with hyphens or spaces.
(1) Prefixed digit 978 (2) Group or country identifier digit (3) Publisher identifier digit (4) Tittle identifier digit (5) Check digit. ISBN :-The International Standard Book Number system was introduced in the world in 1972 and in India this system was put into operation in January 1985 by Raja Rammohan National Agency for ISBN and in the alphabetical order of member countries, our country stands at serial No. 55.
2. Match the following :
List I
(a) Cataloguing-in-publication
(b) MARC
(c) Classified Catalogue Code
(d) AACR-II
List II
(i) 1966
(ii) 1977
(iii) 1934
(iv) 1978
Codes :
(a) (b) (c) (d)
(A) (i) (ii) (iii) (iv)
(B) (ii) (iii) (iv) (i)
(C) (iii) (iv) (i) (ii)
(D) (iv) (i) (ii) (iii)
Ans :- (A) (i), (ii), (iii), (iv)
Solution :-
(a) Cataloguing-in-publication :- (i) 1966
(b) MARC :- (ii) 1977
(c) Classified Catalogue Code :- (iii) 1934
(d) AACR-II :- (iv) 1978
3 Statement (A) : Precision is defined as the proportion of the total relavant documents retrieved.
Statement (B) : Recall is defined as the proportion of documents retrieved that are relevant.
Codes :
(A) (A) is true but (B) is false
(B) (A) is false but (B) is true
(C) Both (A) and (B) are true
(D) (D) Both (A) and (B) are false
Ans :- (D) Both (A) and (B) are false
Solution :-
Precision :- In the field of information retrieval, precision is the fraction of retrieved documents that are relevant to the query: For example, for a text search on a set of documents, precision is the number of correct results divided by the number of all returned results.
Recall :- is the ratio of the number of relevant records retrieved to the total number of relevant records in the database. It is usually expressed as a percentage.
4 Assertion (A) : CCF is developed for exchange of bibliographic data.
Reason (R) : It helps in development of universal union catalogue.
Select the correct answer from the codes given below :
Codes :
(A) (A) is true but (R) is false
(B) (A) is false but (R) is true
(C) Both (A) and (R) are true
(D) Both (A) and (R) are false
Ans :- (C) Both (A) and (R) are true
5 Assertion (A) : Google uses pre- coordinate indexing system.
Reason (R): Pre-coordinate indexing is suitable for automated indexing.
Codes :
(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Ans :- (B) Both (A) and (R) are false
Solution :-
Google :- analyses the text, images, and video files on the page, and stores the information in the Google index, which is a large database. Serving search results: When a user searches on Google, Google returns information that’s relevant to the user’s query.
Pre- coordinate indexing :- can be useful for either browse or keyword searching. Post- coordinate indexes are not as useful for browse searching, and individual facets cannot reliably be reassembled to offer syntax or relationships among the searched terms.
Automatic indexing :- is the computerized process of scanning large volumes of documents against a controlled vocabulary, taxonomy, thesaurus or ontology and using those controlled terms to quickly and effectively index large electronic document depositories.
6 Empirical approach in management is the basic element of ..........
(A) Control
(B) Leading
(C) Personal observation
(D) Command
Ans :- (C) Personal observation
Solution :-
Control :- is a function of management which helps to check errors in order to take corrective actions. This is done to minimize deviation from standards and ensure that the stated goals of the organization are achieved in a desired manner.
Leading :- consists of motivating employees and influencing their behaviour to achieve organizational objectives. Leading focuses on managing people, such as individual employees, teams and groups rather than tasks.
Personal observation :- Empirical approach , Empirical research is research that is based on observation and measurement of phenomena, as directly experienced by the researcher. The data thus gathered may be compared against a theory or hypothesis, but the results are still based on real life experience.
Command :- is the imparting of a vision to the organization in order to achieve a goal. It does this by formulating a well-thought-out vision and then clearly communicating it. Command emphasizes success and reward.
7 The principle ‘‘Scalar Chain’’ is related with ............
(A) Teamwork
(B) Working tenure
(C) Chain of command
(D) Absenteeism of employee
Ans :- (C) Chain of command
Solution :-
Teamwork :- is the collaborative effort of a group to achieve a common goal or to complete a task in the most effective and efficient way. This concept is seen within the greater framework of a team, which is a group of interdependent individuals who work together towards a common goal.
Chain of command :- Scalar Chain, This principle implies that authority and responsibility should flow in a clear unbroken line from the highest executive to lowest rank. This refers to hierarchy, which consist of a series or steps, extending in a unbroken line from chief librarian to the lowest employee or an attendant.
Working tenure :- The librarians at Princeton don’t have faculty status, although we do report to the Dean of the Faculty and we do have a three-tiered promotion structure and a tenure-like status called continuing appointment.
However, while that process does reward publication, it does not require it. My previous professional librarian job had no faculty status, no promotional structure, and no tenure-like status. Not only have I never been on the tenure track, when starting out I deliberately avoided jobs where the librarians had faculty status and tenure requirements. I’d have taken one of those jobs in a pinch, but I definitely didn’t want one.
Absenteeism of employee :- Absenteeism is when an employee consistently doesn’t appear for work at their scheduled time. This is true of both full-time and shift-working employees, and it is generally unplanned and without good reason.
8 The term MBO was first used by ......
(A) Henri Fayol
(B) Peter Drucker
(C) Frederick Taylor
(D) Luther Gulick
Ans :- (B) Peter Drucker
Solution :-
Henri Fayol :- The main proponent of the administrative management branch of classical theory was Henri Fayol, a French industrialist. Administrative management aims to improve organizational productivity by focusing on methods that managers can use to synchronize internal processes.
Peter Drucker :- The idea of management by objectives (MBO), first outlined by Peter Drucker and then developed by George Odiorne, his student, was popular in the 1960s and 1970s.
Frederick Winslow Taylor :- Father of Scientific Management Thinker | The British Library.
Luther Gulick :- POSDCORB. Among many other accomplishments in the field of public administration, Gulick is perhaps best known for the functions of the chief executive represented in the acronym POSDCORB. Each letter stands for Planning, Organizing, Staffing, Directing, Co-ordinating, Reporting and Budgeting.
9 The library budget prepared without considering previous year’s expenditure is ............
(A) Performance based budget
(B) Line-item budget
(C) Zero based budget
(D) Lump-sum budget
Ans :- (C) Zero based budget
Solution :-
Methods of library budget :-
Line by line item budget :- In this type of budget, the items of the expenditure are divided line by line, into broad categories such as books and journals, salaries and allowances equipment, contingencies, etc. With further sub-divisions of each of these broad categories. This is the usual traditional method which, by taking into account past expenditure of the previous years’ allocation, assuming that all current programmers’ are good and necessary. this budgetary method does not go into the evaluation of activities and services of performance.
Lump-sum budget :- In a lump-sum budget, a certain amount of money is allocated to the library. In this, the library got the freedom to decide as to how the amount is going to be allocated to different categories.
Formula budget :- In formula budget, predetermined standards are applied for the allocation of money. Such a budget is technical and easy to prepare. It does not require special skills to prepare the same.
Programme budget :- It does not estimate the expenditure on the basis of the individual items. it is focused on the activities that the library plans. Hence the budget is prepared on the basis of the cost of programme. Every year, the library has to decide whether a programme has to continue, get modified, or deleted.
Performance budget :- This method is similar to programme budget but in this method, the emphasis is given to performance in place of programmes. The expenditure is based on the performances of the activities and the stress is given to operational efficiency. The careful accumulation of quantitative data on all activities over a period of time is required. Management techniques such as cost-benefit analysis are used to measure the performance and establish med norms. Hence this method measures only the quantity, not quality.
Planning programming budgeting system :- PPBS method combines the best of both program budget and performance budget and focuses on planning. it begins with the establishment of goals and objectives and ends with the formulation of programmes and services. This method combines the functions of planning activities. Programmes and services, translating them into tangible projects and finally presents the requirements in budgetary terms.
Zero-based budget :- This method is similar to PPBS conceptually but does not take into account what happened in the past but emphasizes the current activities. Every programme and activity is spelled out in detail, and request for financial support to there has to be established afresh every year. In fact, no activating could continue simply because that activity was undertaken the previous year.
10 ‘‘Hawthorne effect’’ is related to .........
(A) Studies of cost effectiveness
(B) Studies of Bureaucracy
(C) Studies of human behaviour
(D) Studies of operational management
Ans :- (C) Studies of human behaviour
Solution :-
Studies of cost effectiveness :- Cost-effectiveness analysis is a way to examine both the costs and health outcomes of one or more interventions. It compares an intervention to another intervention (or the status quo) by estimating how much it costs to gain a unit of a health outcome, like a life year gained or a death prevented. idea icon.
Studies of human behaviour :- The Hawthorne effect is the modification of behaviour by study participants in response to their knowledge that they are being observed or singled out for special treatment. In the simplest terms, the Hawthorne effect is increasing output in response to being watched.
Study of bureaucracy :- is the analysis of how administrative agencies function as organizations within a governmental system.
Studies of operational management :- Operations management (OM) is the administration of business practices to create the highest level of efficiency possible within an organization. It is concerned with converting materials and labor into goods and services as efficiently as possible to maximize the profit of an organization.
11 Arrange the following according to library work flow :
(A) Processing, ordering, dissemination, selection
(B) Selection, ordering, processing, dissemination
(C) Dissemination, processing, ordering, selection
(D) Selection, processing, ordering, dissemination
Ans :- (B) Selection, ordering, processing, dissemination
Solution :-
Selection :- The process of deciding which materials should be added to a library collection. Selection decisions are usually made on the basis of reviews and standard collection development tools by librarians designated as selectors in specific subject areas, based on their interests and fields of specialization.
Ordering :- It involves pre-order bibliographic searching of the library catalogue to avoid duplication of materials. Then the selected materials are acquired by ordering them for purchase, exchange, or gift.
Processing :- is a series of tasks or operations Before items can be shelved and then circulated from the library, they need to be physically prepared Library materials go through processing so that they can be located, used, and returned to the library from which they originated.
Dissemination :- As part of information dissemination functions, a library establishes and maintains a collection of reference sources. Provides answers to simple factual reference queries directs users who need research information to possible sources of information. Publicize new issues and communicates directly with the users.
12 Assertion (A) : Performance measurement is useful for decision making in libraries and information centres.
Reason (R) : Right decision at a right time helps libraries and information centres to achieve goals.
Codes :
(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Ans :- (A) Both (A) and (R) are true
13 Match the following :
List I
(a) Henri Fayol
(b) F.W. Taylor
(c) Abraham Maslow
(d) Douglas McGregor
List II
(i) Hierarchy of human needs
(ii) Theory of X and Theory Y
(iii) Principles of management
(iv) Scientific management
Codes :
(a) (b) (c) (d)
(A) (iii) (iv) (i) (ii)
(B) (i) (iii) (ii) (iv)
(C) (ii) (i) (iv) (iii)
(D) (iv) (ii) (i) (iii)
Ans :- (A) (iii) (iv) (i) (ii)
Solution :-
(a) Henri Fayol :- (iii) Defines rules for exchanging data in a common neutral language
(b) F.W. Taylor :- (iv) Handles user’s authorization details
(c) Abraham Maslow :- (i) Transmission of raw bits over communication channel
(d) Douglas McGregor :- (ii) Routing function
15 Arrange the following Internet based facilities in the chronological order :
(i) Google
(ii) Hotmail
(iii) Facebook
(iv) WhatsApp
(A) (i) (iii) (ii) (iv)
(B) (ii) (i) (iii) (iv)
(C) (ii) (iv) (iii) (i)
(D) (iv) (iii) (ii) (i)
Ans :- (B) (ii) (i) (iii) (iv)
Solution :-
Google :- Founded: 4 September 1998, Menlo Park, California, United States. Founders: Larry Page; Sergey Brin.
Hotmail :- It was commercially launched on July 4, 1996, symbolizing freedom
from ISP-based email and the ability to access a user’s inbox from anywhere in the world. Sabeer Bhatia arrived in the United States from Bangalore at 19; now he’s a Web gazillionaire. With friend and co-worker Jack Smith, Bhatia founded Hotmail, the first free Web-based e-mail service.
Facebook :- Founders: Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, Chris Hughes CEO: Mark Zuckerberg (Jul 2004–) Headquarters: Menlo Park, California, United States Founded: February 2004, Cambridge, Massachusetts, United States.
WhatsApp :- Founders: Jan Koum, Brian Acton, Parent organization: Meta CEO: Will Cathcart (Mar 2019–) Headquarters: Menlo Park, California, United States Founded: 2009.
16 Assertion (A) : Li-fi can be used more effectively in a dense environment.
Reason (R) : Li-fi uses ultraviolate, infrared and visible light communication
Codes :
(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Ans :- (A) Both (A) and (R) are true
17 The following functions are carried out by firewall in a network :
(i) Filters the IP packets.
(ii) Open a port to only specific and reliable IP addresses.
(iii) Enables user privacy.
(iv) Enables anonymous surfing.
Codes :
(A) (i) and (ii) are correct
(B) (i) and (iv) are correct
(C) (ii) and (iv) are correct
(D) (iii) and (i) are correct
Ans :- (A) (i) and (ii) are correct
Solution :-
18 Transmission media are usually categorized as ......... and ..........
(i) Guided
(ii) Unguided
(iii) Fixed
(iv) Unfixed
Codes :
(A) (i) and (ii) are correct
(B) (i) and (iii) are correct
(C) (iii) and (iv) are correct
(D) (ii) and (iv) are correct
Ans :- (A) (i) and (ii) are correct
Solution :-
19 Which protocol is used to provide security to e-mails ?
(A) POP
(B) PGP
(C) SNMP
(D) HTTP
Ans :- (B) PGP
Solution :-
Types of Protocols :-
1. Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination.
2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks.
3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications.
4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
5. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail.
6. PGP: is short for Pretty Good Privacy, a security program that enables users to communicate securely by decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting files. It was one of the first freely available forms of public-key cryptography software. PGP stands for Pretty Good Privacy (PGP) which is invented by Phil Zimmermann.
7. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc.
8. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly.
9. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.
10. Simple Network Management Protocol (SNMP): is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. The purpose of SNMP is to provide network devices, such as routers, servers and printers, with a common language for sharing information with a network management system (NMS).
11. Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer.
12. Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle.
Some Other Protocols :-
Some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning. These are:
• ARP (Address Resolution Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• IMAP4 (Internet Message Access Protocol)
• SIP (Session Initiation Protocol)
• RTP (Real-Time Transport Protocol)
• RLP (Resource Location Protocol)
• RAP (Route Access Protocol)
• L2TP (Layer Two Tunnelling Protocol)
• PPTP (Point To Point Tunnelling Protocol)
• SNMP (Simple Network Management Protocol)
• TFTP (Trivial File Transfer Protocol)
20 Internet protocol version 4 defines an IP address as a bit number.
(A) 8
(B) 16
(C) 32
(D) 64
Ans :- (C) 32
Solution :-
An IPv4 address is 32 bits. An IP Address is shown as 4 decimal numbers representing 4 bytes: d.d.d.d where d = decimal number (0 - 255).
An IPv6 address is 128 bits. The preferred IP address format has 8 hexadecimal numbers representing 16 bytes.
21 .............is also called as a ‘‘Connection less’’ protocol.
(A) TCP
(B) UDP
(C) HTTP
(D) FTP
Ans :- (B) UDP
Solution :-
User Datagram Protocol (UDP) :- is a connectionless protocol used for less complex transmissions, TCP is the more complex protocol, used for connection-oriented transmissions based on its stateful design incorporating data stream services and reliable transmission.
22 The full form of SEO is .............
(A) Search E-mail Operation
(B) Search Engine Operation
(C) Search Engine Optimization
(D) Search Mail Optimization
Ans :- (C) Search Engine Optimization
Solution :-
SEO :- means Search Engine Optimization and is the process used to optimize a website’s technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
23 The high level language program before ready to be executed must go through various processes except ......
(A) Linking
(B) Loading
(C) Controlling
(D) Translation
Ans :- (D) Translation
Solution :-
High level language (HLL) :- is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages. In contrast, assembly languages are considered low-level because they are very close to machine languages. The main advantage of high-level languages over low-level languages is that they are easier to read, write, and maintain. Ultimately, programs written in a high-level language must be translated into machine language by a compiler or interpreter. The first high-level programming languages were designed in the 1950s. Now there are dozens of different languages, including Ada, Algol, BASIC, COBOL, C, C++, FORTRAN, LISP, Pascal, and Prolog.
24 Who developed (OAIS) Open Archival Information System) ?
(A) Consultative Committee for space data systems
(B) MIT university
(C) IFLA committee on standards
(D) IFLA linked data sub-committee
Ans :- (A) Consultative Committee for space data systems
Solution :-
NASA’s Consultative Committee for Space Data Systems :- (OAIS) Open Archival Information System).The development of the OAIS reference model has been pioneered by NASA’s Consultative Committee for Space Data Systems (CCSDS) and has been accepted as an ISO (14721:2003) standard[1]. A technical recommendation is also available for consultation on the CCSDS website[2].
25 Which part of the QR code represents the encoded data ?
(A) Three positioning element
(B) Data element
(C) Location
(D) Programme
Ans :- (B) Data element
Solution :-
OR code :- In 1994, DENSO WAVE (then a division of DENSO CORPORATION) announced the release of its QR Code. The QR in the name stands for quick response, expressing the development concept for the code, whose focus was placed on high-speed reading.
26 Which standard governs the syntax holdings of information in MARC records ?
(A) Z39.50
(B) Z59.50
(C) Z39.71
(D) Z59.71
Ans :- (C) Z39.71
Solution :-
Z39. 50 :- is an international standard protocol used by net- worked computer systems for information retrieval. It enables information seekers to search different systems on a network or the Internet through the use of a single user interface.
Z39. 71 :- lays out nine principles, or major concepts, that holding records need to adhere to. Levels of Specificity. There are four levels of specificity, ranging from a simple statement that the library holds the item on up to a complex, detailed statement of exactly what parts of the item are held.
27 The full form of RDFS is ..........
(A) Resource Description Framework Source
(B) Resource Description Framework Scheme
(C) Resource Description Framework Schema
(D) Resource Description Framework Summary
Ans :- (C) Resource Description Framework Schema
Solution :-
RDF Schema :- (Resource Description Framework Schema, variously abbreviated as RDFS, RDF(S), RDF-S, or RDF/S) is a set of classes with certain properties using the RDF extensible knowledge representation data model, providing basic elements for the description of ontologies.
28 In the process of digitization, ‘‘Digitization step’’ includes ........
(i) Image capturing
(ii) Selection of documents
(iii) OCR
(iv) Image cleaning
Codes :
(A) (i), (ii) and (iii) are correct
(B) (ii), (iii) and (iv) are correct
(C) (i), (ii) and (iv) are correct
(D) (i), (iii) and (iv) are correct
Ans :- (D) (i), (iii) and (iv) are correct
Solution :-
29 Characteristics of linked open data .............
(i) Are released under an open license
(ii) Does impede its reuse for free
(iii) Are released under restricted license
(iv) Does not impede its reuse for free
Codes :
(A) (i) and (ii) are correct
(B) (ii) and (iii) are correct
(C) (i) and (iv) are correct
(D) (iii) and (iv) are correct
Ans :- (C) (i) and (iv) are correct
Solution :-
Linked Open Data :- is a set of design principles for sharing machine-readable interlinked data on the Web. When combined with Open Data (data that can be freely used and distributed), it is called Linked Open Data (LOD). An RDF database such as Ontotext’s GraphDB is an example of LOD.
30 Match the following :
List I
(a) QR Code
(b) RFID Technology
(c) Biometric Technology
(d) Barcode Technology
List II
(i) Norman Joseph Woodland and Bernard Silver
(ii) Sir William Herschel
(iii) Denso Wave
(iv) Raytheon’s Raytag
Codes :
(a) (b) (c) (d)
(A) (iv) (i) (ii) (iii)
(B) (ii) (iv) (iii) (i)
(C) (ii) (i) (iv) (iii)
(D) (iii) (iv) (ii) (i)
Ans :- (D) (iii) (iv) (ii) (i)
Solution :-
(a) QR Code :- (iii) Denso Wave
(b) RFID Technology :- (iv) Raytheon’s Raytag
(c) Biometric Technology :- (ii) Sir William Herschel
(d) Barcode Technology :- (i) Norman Joseph Woodland and Bernard Silver
31 Assertion (A) : Many of the Big Libraries are giving preference for cloud computing.
Reason (R) : Cloud computing has helped libraries to avoid operating multiple servers.
Codes :
(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Ans :- (A) Both (A) and (R) are true
32 Arrange the following library software according to their first year of launching :
(i) phpMylibrary
(ii) ABCD
(iii) Koha
(iv) New Genlib
Codes :
(A) (iii), (iv), (i), (ii)
(B) (iii), (i), (iv), (ii)
(C) (i), (iii), (ii), (iv)
(D) (i), (iii), (iv), (ii)
Ans :- (B) (iii), (i), (iv), (ii)
Solution :-
• KOHA – 3 Jan 2000
• New Genlib – 2005
• Php Mylibrary – 2002
• ABCD – 2007
33 Match the following :
List I
(a) Publication manual of the APA
(b) The Chicago manual of style
(c) The MLA handbook
(d) AMA manual of style
List II
(i) 1906
(ii) 1952
(iii) 1962
(iv) 1985
Codes :
(a) (b) (c) (d)
(A) (ii) (i) (iv) (iii)
(B) (i) (ii) (iii) (iv)
(C) (iv) (iii) (ii) (i)
(D) (ii) (i) (iii) (iv)
Ans :- (A) (ii) (i) (iv) (iii)
Solution :-
(a) Publication manual of the APA :- (ii) 1952
(b) The Chicago manual of style :- (i) 1906
(c) The MLA handbook :-(iv)1985
(d) AMA manual of style :- (iii) 1962
34 Bradford’s law ...........
(i) Explains scattering of articles of a specific subject in different journals.
(ii) Demonstrates author’s productivity
(iii) Calculates impact factor
(iv) Enables to prepare rank list of journals.
Codes :
(A) (i) and (ii) are correct
(B) (i) and (iii) are correct
(C) (i) and (iv) are correct
(D) (iii) and (iv) are correct
Ans :- (C) (i) and (iv) are correct
Solution :-
Bradford’s Law of Scattering :- is a law of diminishing returns and scattering. Bradford formulated the law in 1948 and claimed that for a given subject area there are a few very productive periodicals, a larger number of more moderate producers, and a still larger number of constantly diminishing productivity
.
35 Assertion (A) : Case studies explore in detail features of a case under study.
Reason (R) : Primary purpose of case study is generalization.
Codes :
(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Ans :- (C) (A) is true but (R) is false
Solution :-
The general purpose of a case study is to:
1) Describe an individual situation (case), e.g. a person, business, organisation, or institution, in detail;
2) Identify the key issues of the case (your assignment question should tell you what to focus on);
3) Analyse the case using relevant theoretical concepts from your unit or discipline;
4) Recommend a course of action for that particular case (particularly for problem-solving case studies).
36 Assertion (A) : Interviews are used to supplement the data collected through questionnaire.
Reason (R) : Compared with questionnaire, interview data is more reliable.
Codes :
(A) (A) is false but (R) is true
(B) Both (A) and (R) are true
(C) Both (A) and (R) are false
(D) (A) is true but (R) is false
Ans :- (B) Both (A) and (R) are true
37 Case study :
(A) Attempts to understand population’s characteristics by studying samples
(B) Carries out in depth contextual analysis of single research element.
(C) Enquires only about past events
(D) Attempts to find why and how one variable produces change in another variable
Ans :- (B) Carries out in depth contextual analysis of single research element.
Solution :-
Case study :- methods are those in which an individual or group of people is observed in order to determine outcomes. For example, a group of individuals might be watched over an extended period of time to observe the progression of a particular disease.
38 SPSS stands for .........
(A) Statistical Package for the Science Scholars
(B) Statistical Package for the Social Sciences
(C) Statistical Package for Scientometrics Studies
(D) Statistical Package for Scientific Studies
Ans :- (B) Statistical Package for the Social Sciences
Solution :-
SPSS :- (Statistical Package for the Social Sciences) is a software program used by researchers in various disciplines for quantitative analysis of complex data. Initial release date: 1968. Platform: Java. License: Trialware or SaaS. Size: ~1.2 GB Operating system: Windows (x86-64), macOS (x86-64), Linux (x86-64, ppc64le, IBM Z) Developer: IBM, SPSS Inc. Programming language: Java.
39 In an experimental research a variable presumed to cause change in another variable is called ..........
(A) Extraneous variable
(B) Dependent variable
(C) Null variable
(D) Independent variable
Ans :- (D) Independent variable
Solution :-
Extraneous variables :- are those that produce an association between two variables that are not causally related. Anything that is not the independent variable that has the potential to affect the results is called an extraneous variable. It can be a natural characteristic of the participant, such as intelligence level, gender, or age, for example, or it could be a feature of the environment, such as lighting or noise.
Dependent variable :- is the variable that changes as a result of the independent variable manipulation. It’s the outcome you’re interested in measuring, and it depends
on your independent variable. In statistics, dependent variables are also called: Response variables (they respond to a change in another variable)
Null hypothesis :- Null
meaning nothing.
This hypothesis states that there is no difference between groups or no relationship between variables. The null hypothesis is a presumption of status quo or no change. Alternative Hypothesis (Ha) – This is also known as the claim.
Independent variable :- is exactly what it sounds like. It is a variable that stands alone and isn’t changed by the other variables you are trying to measure. For example, someone’s age might be an independent variable.
40 ‘BibExel’ is developed by ..........
(A) Peter Ingewersen
(B) Mike Thelwall
(C) Eugene Garfield
(D) Olle Persson
Ans :- (D) Olle Persson
Solution :-
Webometrics :- "The term Webometrics was first coined by Almind and Ingwersen 1997. It is a study of qualitative aspects of information.
Mike Thelwall :- is Professor of Information Science and leader of the Statistical Cybermetrics Research Group at the University of Wolverhampton, UK, which he joined in 1989. He was formerly Reader, Senior Lecturer and Lecturer at the University of Wolverhampton.
Eugene Garfield :- was responsible for many innovative bibliographic products,