LIBRARY SCIENCE- PAGE 5
LIBRARY SCIENCE -PAGE 5
1. Books of Unknown or doubtful authorship is known as :
(A) Apograph
(B) Incunabulla
(C) Apocryphal books
(D) Blue Books
Ans: C
2. If we plot ‘recall’ and precision on ‘X’ and ‘Y’ axis to draw a graph, then we get a
(A) Downward sloping straight line
(B) Upward sloping straight line
(C) ‘α’ shaped curve
(D) Hyperbola
Ans: D
3. The term ‘Literary warrant’ for book classification was introduced by
(A) W.C.B. Sayers
(B) Wyndham Hulme
(C) J.D. Brown
(D) H.E. Bliss
Ans: A
4. Under which approach of WersigNeveling’s information theory, information is seen as static relations between physical objects which may be perceived or not ?
(A) The meaning approach
(B) The structural approach
(C) The process approach
(D) The knowledge approach
Ans: B
5. Which information theory focuses on the purpose of communication is, to inform, instruct or motivate the receiver ?
(A) Shannon’s Theory
(B) Weaver’s Theory
(C) Ackoff’s Theory
(D) Yovit’s Theory
Ans: C
6. ‘Noise’ in Information retrieval is due to
(A) Precision
(B) Recall
(C) Relevant Information
(D) Redundant Information
Ans: D
7. In which scheme of classification, special auxiliaries denote locally recurrent characteristics ?
(A) Deuey Decimal Classification
(B) Universal Decimal Classification
(C) Bibliographic Classification
(D) Colon Classification
Ans: B
8. Which of the following makes a network insecured ?
(A) Encryption
(B) Network Interface Card (NIC)
(C) Password Capture
(D) Static Keys
Ans: C
9. Whose model of communication of knowledge suggests that communication is an open system ?
(A) G. Garbner
(B) Juger Hebermans
(C) Shannon & Weaver
(D) M. Foucault
Ans: A
10. ‘Trans Border Data Flow’ means
(A) Exchange of documents between countries
(B) Free flow of information between countries
(C) Flow of information between countries
(D) Exchange of electronic information between countries
Ans: C
11. Which of the following three types of basic languages are used in computer programming ?
(A) Procedural, Non-procedural and Unconditional
(B) Zero, Low and High levels
(C) Machine, Assembly and High level languages
(D) COBOL, BASIC and C
Ans: D
12. FRBR Model consist of which of the following four entities ?
(A) Personality, Matter, Energy, Space
(B) Work, Expression, Manifestation, Item
(C) Book, Form, Availability, Type
(D) Action, Place, Impact, Category
Ans: B
13. The primary distinction between RDA and AACR is
(A) Structural
(B) Relational
(C) Non-structural
(D) Combinational
Ans: A
14. Which of the following are reasons for obsolescence of information ?
(i) Information is considered invalid.
(ii) Information is valid but mostly available online.
(iii) Works are extensively cited.
(iv) Information is valid but inadequate for exploration.
Codes :
(A) (i) and (ii) are correct.
(B) (ii) and (iii) are correct.
(C) (i) and (iv) are correct.
(D) (ii) and (iv) are correct.
Ans: C
15. Which of the following are news summaries ?
(i) Data India
(ii) Times of India Index
(iii) New York Times Index
(iv) Asian Recorder
Codes :
(A) (i), (ii) and (iii) are correct.
(B) (ii) and (iii) are correct.
(C) (ii) (iii) and (iv) are correct.
(D) (i) and (iv) are correct.
Ans: D
16. Which of the following are Web-zine ?
(i) Email Magazine
(ii) E-Conference
(iii) Online Bulletin
(iv) Electronic News Letter
Codes :
(A) (i), (iii) and (iv)
(B) (i), (ii) and (iii)
(C) (ii), (iii) and (iv)
(D) (i), (ii) and (iv)
Ans: A
17. Which of the following are not the Models of communication ?
(i) Vintage Model
(ii) Lasswell’s Model
(iii) Epidemic Model
(iv) Garbner’s Model
Codes :
(A) (i) & (iv) are correct.
(B) (ii) & (iii) are correct.
(C) (i) & (iii) are correct.
(D) (iii) & (iv) are correct.
Ans: C
18. In reference service, assimilation means :
(i) Recording the retrieved information
(ii) Sharing reference service experience with colleagues
(iii) Furnishing the exact information
(iv) Acquaintance with reference material
Codes :
(A) (i) and (ii) are correct.
(B) (i) and (iv) are correct.
(C) (ii) and (iii) are correct.
(D) (ii) and (iv) are correct.
Ans: A
19. The notation used to increase the capacity of an array are :
(i) Empty digit
(ii) Emptying digit
(iii) Indicator digit
(iv) Speciator
Codes :
(A) (i) and (ii) are correct.
(B) (iii) and (iv) are correct.
(C) (i), (ii) and (iii) are correct.
(D) (i), (ii) and (iv) are correct.
Ans: A
20. Which of the following are the functions of the physical layer in OSI Model ?
(i) Defines protocol for flow control.
(ii) Reliable sending of data packets.
(iii) Defines electrical specifications.
(iv) Functional and procedural means of transferring data.
Codes :
(A) (iii) and (iv) are correct.
(B) (ii), (iii) and (iv) are correct.
(C) (i) and (iv) are correct.
(D) (i) and (iii) are correct.
Ans: D
21. Rich Text Format (RTF) is concerned with
(i) Formatting features like Font type, size, etc.
(ii) Transporting text documents across different computers.
(iii) Multimedia formatting.
(iv) Formatting based on binary concept.
Codes :
(A) (ii) and (iii) are correct.
(B) (iii) and (iv) are correct.
(C) (i) and (ii) are correct.
(D) (i) and (iv) are correct.
Ans: C
22. Which of the following are nonprobability sampling ?
(i) Quota sampling
(ii) Judgement Sampling
(iii) Cluster Sampling
(iv) Multi-stage sampling
Codes :
(A) (i) and (iv) are correct.
(B) (ii) and (iii) are correct.
(C) (i) and (ii) are correct.
(D) (iii) and (iv) are correct.
Ans: C
23. Arrange the following in the ascending order of their first year of publication :
(i) BNB
(ii) INB
(iii) Compendex
(iv) Roget’s Thesaurus of English words
Codes :
(A) (iv), (iii), (i), (ii)
(B) (iii), (ii), (iv), (i)
(C) (ii), (iv), (i), (iii)
(D) (i), (iii), (ii), (iv)
Ans: A
24. Arrange the following ISBDs according to their year of formulation :
(i) ISBD (PM) (ii) ISBD (CF)
(iii) ISBD (M) (iv) ISBD (S)
Codes :
(A) (iii), (ii), (i), (iv)
(B) (iii), (iv), (i), (ii)
(C) (iv), (i), (iii), (ii)
(D) (iv), (ii), (iii), (i)
Ans: B
25. Arrange the following in the chronological order of their first year of publication :
(i) Arts and Humanities Index
(ii) Social Science Citation Index
(iii) ISI Web of Science
(iv) Science Citation Index
Codes :
(A) (iv), (ii), (i), (iii)
(B) (ii), (iii), (iv), (i)
(C) (iii), (ii), (i), (iv)
(D) (iv), (i), (iii), (ii)
Ans: A
26. Arrange the following Library Acts according to the year of their enactment :
(i) Arunachal Pradesh
(ii) Bihar
(iii) Lakshadweep
(iv) Rajasthan
Codes :
(A) (ii), (iv), (iii), (i)
(B) (iv), (i), (ii), (iii)
(C) (ii), (iii), (i), (iv)
(D) (iv), (iii), (ii), (i)
Ans: D
27. Arrange the following processes of research in order :
(i) Theory Building
(ii) Reflecting and Integrating of Idea
(iii) Research Design
(iv) Review of Literature
Codes :
(A) (iv), (iii), (ii), (i)
(B) (iii), (i), (iv), (ii)
(C) (ii), (iv), (iii), (i)
(D) (i), (ii), (iv), (iii)
Ans: A
(A) Apograph
(B) Incunabulla
(C) Apocryphal books
(D) Blue Books
Ans: C
2. If we plot ‘recall’ and precision on ‘X’ and ‘Y’ axis to draw a graph, then we get a
(A) Downward sloping straight line
(B) Upward sloping straight line
(C) ‘α’ shaped curve
(D) Hyperbola
Ans: D
3. The term ‘Literary warrant’ for book classification was introduced by
(A) W.C.B. Sayers
(B) Wyndham Hulme
(C) J.D. Brown
(D) H.E. Bliss
Ans: A
4. Under which approach of WersigNeveling’s information theory, information is seen as static relations between physical objects which may be perceived or not ?
(A) The meaning approach
(B) The structural approach
(C) The process approach
(D) The knowledge approach
Ans: B
5. Which information theory focuses on the purpose of communication is, to inform, instruct or motivate the receiver ?
(A) Shannon’s Theory
(B) Weaver’s Theory
(C) Ackoff’s Theory
(D) Yovit’s Theory
Ans: C
6. ‘Noise’ in Information retrieval is due to
(A) Precision
(B) Recall
(C) Relevant Information
(D) Redundant Information
Ans: D
7. In which scheme of classification, special auxiliaries denote locally recurrent characteristics ?
(A) Deuey Decimal Classification
(B) Universal Decimal Classification
(C) Bibliographic Classification
(D) Colon Classification
Ans: B
8. Which of the following makes a network insecured ?
(A) Encryption
(B) Network Interface Card (NIC)
(C) Password Capture
(D) Static Keys
Ans: C
9. Whose model of communication of knowledge suggests that communication is an open system ?
(A) G. Garbner
(B) Juger Hebermans
(C) Shannon & Weaver
(D) M. Foucault
Ans: A
10. ‘Trans Border Data Flow’ means
(A) Exchange of documents between countries
(B) Free flow of information between countries
(C) Flow of information between countries
(D) Exchange of electronic information between countries
Ans: C
11. Which of the following three types of basic languages are used in computer programming ?
(A) Procedural, Non-procedural and Unconditional
(B) Zero, Low and High levels
(C) Machine, Assembly and High level languages
(D) COBOL, BASIC and C
Ans: D
12. FRBR Model consist of which of the following four entities ?
(A) Personality, Matter, Energy, Space
(B) Work, Expression, Manifestation, Item
(C) Book, Form, Availability, Type
(D) Action, Place, Impact, Category
Ans: B
13. The primary distinction between RDA and AACR is
(A) Structural
(B) Relational
(C) Non-structural
(D) Combinational
Ans: A
14. Which of the following are reasons for obsolescence of information ?
(i) Information is considered invalid.
(ii) Information is valid but mostly available online.
(iii) Works are extensively cited.
(iv) Information is valid but inadequate for exploration.
Codes :
(A) (i) and (ii) are correct.
(B) (ii) and (iii) are correct.
(C) (i) and (iv) are correct.
(D) (ii) and (iv) are correct.
Ans: C
15. Which of the following are news summaries ?
(i) Data India
(ii) Times of India Index
(iii) New York Times Index
(iv) Asian Recorder
Codes :
(A) (i), (ii) and (iii) are correct.
(B) (ii) and (iii) are correct.
(C) (ii) (iii) and (iv) are correct.
(D) (i) and (iv) are correct.
Ans: D
16. Which of the following are Web-zine ?
(i) Email Magazine
(ii) E-Conference
(iii) Online Bulletin
(iv) Electronic News Letter
Codes :
(A) (i), (iii) and (iv)
(B) (i), (ii) and (iii)
(C) (ii), (iii) and (iv)
(D) (i), (ii) and (iv)
Ans: A
17. Which of the following are not the Models of communication ?
(i) Vintage Model
(ii) Lasswell’s Model
(iii) Epidemic Model
(iv) Garbner’s Model
Codes :
(A) (i) & (iv) are correct.
(B) (ii) & (iii) are correct.
(C) (i) & (iii) are correct.
(D) (iii) & (iv) are correct.
Ans: C
18. In reference service, assimilation means :
(i) Recording the retrieved information
(ii) Sharing reference service experience with colleagues
(iii) Furnishing the exact information
(iv) Acquaintance with reference material
Codes :
(A) (i) and (ii) are correct.
(B) (i) and (iv) are correct.
(C) (ii) and (iii) are correct.
(D) (ii) and (iv) are correct.
Ans: A
19. The notation used to increase the capacity of an array are :
(i) Empty digit
(ii) Emptying digit
(iii) Indicator digit
(iv) Speciator
Codes :
(A) (i) and (ii) are correct.
(B) (iii) and (iv) are correct.
(C) (i), (ii) and (iii) are correct.
(D) (i), (ii) and (iv) are correct.
Ans: A
20. Which of the following are the functions of the physical layer in OSI Model ?
(i) Defines protocol for flow control.
(ii) Reliable sending of data packets.
(iii) Defines electrical specifications.
(iv) Functional and procedural means of transferring data.
Codes :
(A) (iii) and (iv) are correct.
(B) (ii), (iii) and (iv) are correct.
(C) (i) and (iv) are correct.
(D) (i) and (iii) are correct.
Ans: D
21. Rich Text Format (RTF) is concerned with
(i) Formatting features like Font type, size, etc.
(ii) Transporting text documents across different computers.
(iii) Multimedia formatting.
(iv) Formatting based on binary concept.
Codes :
(A) (ii) and (iii) are correct.
(B) (iii) and (iv) are correct.
(C) (i) and (ii) are correct.
(D) (i) and (iv) are correct.
Ans: C
22. Which of the following are nonprobability sampling ?
(i) Quota sampling
(ii) Judgement Sampling
(iii) Cluster Sampling
(iv) Multi-stage sampling
Codes :
(A) (i) and (iv) are correct.
(B) (ii) and (iii) are correct.
(C) (i) and (ii) are correct.
(D) (iii) and (iv) are correct.
Ans: C
23. Arrange the following in the ascending order of their first year of publication :
(i) BNB
(ii) INB
(iii) Compendex
(iv) Roget’s Thesaurus of English words
Codes :
(A) (iv), (iii), (i), (ii)
(B) (iii), (ii), (iv), (i)
(C) (ii), (iv), (i), (iii)
(D) (i), (iii), (ii), (iv)
Ans: A
24. Arrange the following ISBDs according to their year of formulation :
(i) ISBD (PM) (ii) ISBD (CF)
(iii) ISBD (M) (iv) ISBD (S)
Codes :
(A) (iii), (ii), (i), (iv)
(B) (iii), (iv), (i), (ii)
(C) (iv), (i), (iii), (ii)
(D) (iv), (ii), (iii), (i)
Ans: B
25. Arrange the following in the chronological order of their first year of publication :
(i) Arts and Humanities Index
(ii) Social Science Citation Index
(iii) ISI Web of Science
(iv) Science Citation Index
Codes :
(A) (iv), (ii), (i), (iii)
(B) (ii), (iii), (iv), (i)
(C) (iii), (ii), (i), (iv)
(D) (iv), (i), (iii), (ii)
Ans: A
26. Arrange the following Library Acts according to the year of their enactment :
(i) Arunachal Pradesh
(ii) Bihar
(iii) Lakshadweep
(iv) Rajasthan
Codes :
(A) (ii), (iv), (iii), (i)
(B) (iv), (i), (ii), (iii)
(C) (ii), (iii), (i), (iv)
(D) (iv), (iii), (ii), (i)
Ans: D
27. Arrange the following processes of research in order :
(i) Theory Building
(ii) Reflecting and Integrating of Idea
(iii) Research Design
(iv) Review of Literature
Codes :
(A) (iv), (iii), (ii), (i)
(B) (iii), (i), (iv), (ii)
(C) (ii), (iv), (iii), (i)
(D) (i), (ii), (iv), (iii)
Ans: A
28. Match the following :
List – I List – II
a. CILIP i. 1972
b. ASLIB ii. 2002
c. ALA iii. 1876
d. COMLA iv. 1924
Codes :
a b c d
(A) ii iv iii i
(B) iv iii ii i
(C) iii iv i ii
(D) ii iii iv i
Ans: A
29. Match the following :
List – I List – II
a. Phenomenon i. Physical Media for grouping of Information
b. Spectrum ii. Facts or Occurrence
c. Modes iii. Transfer Process
d. Diffusion iv. A broad range of varied but related ideas
Codes :
a b c d
(A) i iii iv ii
(B) ii iv i iii
(C) ii iii iv i
(D) iv i iii ii
Ans: B
30. Match the following :
List – I List – II
a. Union Catalogue i. Primary sources
b. Pamphlets & Brochures ii. Unpublished sources
c. Indexing & Abstracting Sources iii. Tertiary sources
d. Memoirs of diaries iv. Secondary sources
Codes :
a b c d
(A) iv iii ii i
(B) ii iv iii i
(C) iii i iv ii
(D) i ii iv iii
Ans: C
31. Match the following :
List – I List – II
a. Fundamentals of Reference Service i. A.J. Walford
b. Introduction to Reference works ii. S.R. Ranganathan
c. Reference service iii. F.N. Cheney and W.J. Williams
d. Guide to Reference Books iv. William A Katz
Codes :
a b c d
(A) ii i iv iii
(B) iii iv i ii
(C) iv ii iii i
(D) iii iv ii i
Ans: D
32. Match the following :
List – I List – II
a. Information on important recent happenings of India i. India – A Reference Annual
b. Total number of foreigners visited in India in 2012 ii. Keesing’s Record of World Events
c. Name of Prime Minister of India iii. Statistical Yearbook
d. Postal Address of Anna Hazare iv. Who’s Who
Codes :
a b c d
(A) iv i ii iii
(B) ii iii i iv
(C) iii ii i iv
(D) i iv iii ii
Ans: B
33. Match the following :
List – I List – II
a. Scaler Chain i. Direct dealing with subordinates
b. Espirit de Corps ii. Production, efficiency and prevention of waste
c. Scientific Management iii. Emphasis on Team Work
d. Span of control iv. Top to Bottom
Codes :
a b c d
(A) iv iii ii i
(B) iii iv i ii
(C) iv ii iii i
(D) ii iii i iv
Ans: A
34. Match the following :
List – I List – II
a. Check Card i. Reader’s Ticket
b. Kardex ii. Three Card System
c. Newark System iii. Periodicals
d. Browne System iv. Borrower’s Card
Codes :
a b c d
(A) ii iii iv i
(B) iii iv i ii
(C) ii iv iii i
(D) iv i ii iii
Ans: A
35. Match the following :
List – I List – II
a. Skewness i. Numbers of frequently appearing variables
b. Modality ii. Degree of association between two/ more variables
c. Fdistribution iii. Structure of distribution
d. Correlation iv. Ratio of two Chisquare variables
Codes :
a b c d
(A) i iv ii iii
(B) iii i iv ii
(C) iv ii iii i
(D) ii iii i iv
Ans: B
36. Assertion (A) : Mail survey, a data collection technique in which questionnaires are mailed to potential respondents, who in then fill and return at their convenience become obsolete.
Reason (R) : Survey-Monkey, the free online survey tool has totally replaced the traditional Mail survey.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: D
37. Assertion (A) : Case situations are seldom comparable and as such the information gathered in case studies is often not comparable.
Reason (R) : The subject under case study are usually described in terms of the characteristics exhibited by the subject/case itself.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Ans: A
38. Assertion (A) : Intellectual Property Rights facilitate free flow of information.
Reason (R) : Effective free flow of information is the pre-requisite for knowledge society.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: B
List – I List – II
a. CILIP i. 1972
b. ASLIB ii. 2002
c. ALA iii. 1876
d. COMLA iv. 1924
Codes :
a b c d
(A) ii iv iii i
(B) iv iii ii i
(C) iii iv i ii
(D) ii iii iv i
Ans: A
29. Match the following :
List – I List – II
a. Phenomenon i. Physical Media for grouping of Information
b. Spectrum ii. Facts or Occurrence
c. Modes iii. Transfer Process
d. Diffusion iv. A broad range of varied but related ideas
Codes :
a b c d
(A) i iii iv ii
(B) ii iv i iii
(C) ii iii iv i
(D) iv i iii ii
Ans: B
30. Match the following :
List – I List – II
a. Union Catalogue i. Primary sources
b. Pamphlets & Brochures ii. Unpublished sources
c. Indexing & Abstracting Sources iii. Tertiary sources
d. Memoirs of diaries iv. Secondary sources
Codes :
a b c d
(A) iv iii ii i
(B) ii iv iii i
(C) iii i iv ii
(D) i ii iv iii
Ans: C
31. Match the following :
List – I List – II
a. Fundamentals of Reference Service i. A.J. Walford
b. Introduction to Reference works ii. S.R. Ranganathan
c. Reference service iii. F.N. Cheney and W.J. Williams
d. Guide to Reference Books iv. William A Katz
Codes :
a b c d
(A) ii i iv iii
(B) iii iv i ii
(C) iv ii iii i
(D) iii iv ii i
Ans: D
32. Match the following :
List – I List – II
a. Information on important recent happenings of India i. India – A Reference Annual
b. Total number of foreigners visited in India in 2012 ii. Keesing’s Record of World Events
c. Name of Prime Minister of India iii. Statistical Yearbook
d. Postal Address of Anna Hazare iv. Who’s Who
Codes :
a b c d
(A) iv i ii iii
(B) ii iii i iv
(C) iii ii i iv
(D) i iv iii ii
Ans: B
33. Match the following :
List – I List – II
a. Scaler Chain i. Direct dealing with subordinates
b. Espirit de Corps ii. Production, efficiency and prevention of waste
c. Scientific Management iii. Emphasis on Team Work
d. Span of control iv. Top to Bottom
Codes :
a b c d
(A) iv iii ii i
(B) iii iv i ii
(C) iv ii iii i
(D) ii iii i iv
Ans: A
34. Match the following :
List – I List – II
a. Check Card i. Reader’s Ticket
b. Kardex ii. Three Card System
c. Newark System iii. Periodicals
d. Browne System iv. Borrower’s Card
Codes :
a b c d
(A) ii iii iv i
(B) iii iv i ii
(C) ii iv iii i
(D) iv i ii iii
Ans: A
35. Match the following :
List – I List – II
a. Skewness i. Numbers of frequently appearing variables
b. Modality ii. Degree of association between two/ more variables
c. Fdistribution iii. Structure of distribution
d. Correlation iv. Ratio of two Chisquare variables
Codes :
a b c d
(A) i iv ii iii
(B) iii i iv ii
(C) iv ii iii i
(D) ii iii i iv
Ans: B
36. Assertion (A) : Mail survey, a data collection technique in which questionnaires are mailed to potential respondents, who in then fill and return at their convenience become obsolete.
Reason (R) : Survey-Monkey, the free online survey tool has totally replaced the traditional Mail survey.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: D
37. Assertion (A) : Case situations are seldom comparable and as such the information gathered in case studies is often not comparable.
Reason (R) : The subject under case study are usually described in terms of the characteristics exhibited by the subject/case itself.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Ans: A
38. Assertion (A) : Intellectual Property Rights facilitate free flow of information.
Reason (R) : Effective free flow of information is the pre-requisite for knowledge society.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: B
39. Assertion (A) : The total output of Indian publications is reflected in ‘Indian National Bibliography’.
Reason (R) : A number of publishers in India are defaulters and do not deposit their publications as per Delivery of Books and Newspapers (Public Libraries)
Act.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Ans: D
40. Assertion (A) : No library is self sufficient in terms of resources even in electronic age.
Reason (R) : Resource sharing and consortia initiatives are essential to meet user needs.
Codes :
(A) (A) is true and (R) is false.
(B) (A) is false and (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: C
41. Assertion (A) : Interviewing is essential to supplement the research data collected through questionnaire.
Reason (R) : Interview is the most suitable technique to collect data as all respondents cooperate more during interview.
Codes :
(A) (A) is false, but (R) is true.
(B) Both (A) and (R) are true.
(C) Both (A) & (R) are false.
(D) (A) is true, but (R) is false.
Ans: D
42. Assertion (A) : Indexing and abstracting services fulfil the 4 th Law of Library Science.
Reason (R) : These services serve as the substitute to the primary journals.
Codes :
(A) (A) is true, but (R) is false.
(B) Both (A) & (R) are false.
(C) Both (A) & (R) are true.
(D) (A) is false, but (R) is true.
Ans: A
43. Assertion (A) : All classification schemes adopt ‘phase relations’.
Reason (R) : Subject formation by loose assemblage leads to complex subjects and isolates.
Codes :
(A) (A) is true, but (R) is false.
(B) Both (A) and (R) are true.
(C) Both (A) and (R) are false.
(D) (A) is false, but (R) is true.
Ans: D
44. Assertion (A) : RSS (Rich Site Summary) is considered as an alternate to the SDI Service.
Reason (R) : RSS Feeds enable us to syndicate data automatically.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is false, but (R) is true.
(D) (A) is true, but (R) is false.
Ans: A
45. Assertion (A) : Majority of academic libraries in India are lagging behind in switching over as technology-oriented service institutions.
Reason (R) : The apex academic bodies and library Associations have not taken the lead role to devise standards and policies.
Codes :
(A) (A) is true, (R) is false.
(B) (A) is false, (R) is true.
(C) Both (A) and (R) is true.
(D) Both (A) and (R) are false.
Ans: C
Read the passage given below and answer the questions based on your understanding of the passage (Question Nos. 46 – 50) :
As the global information landscape increasingly facilitate the sharing, repurposing and dissemination of information, the ways in which students are accustomed to interacting with information resources are also changing. For some new students to universities, their understanding of referencing is based solely on fear (McGowan, 2005) and many are familiar wit the basic concept of plagiarism. Some students bring with them the academic process that served them well at school – however, these are not suitable at Universities (Chanock, 2008). Students understand they should not copy words without referencing, but fail to grasp the reasons why; the reasons are not explicit and often cloaked in unfamiliar and impenetrable academic language. Pak’s (2003) review of literature proved as a handy summation of the investigations, research, and thinking about plagiarism prior to the implementation of various plagiarism detection software products. There are three main schools of thought in referencing and plagiarism discourse. A punitive approach which focuses on the idea that students often deliberately engage in plagiarism and that the appropriate response is one of punishment (Blum, 2009; Sutherland – Smith, 2010; Bilic – Zulle, et. al. 2008). A Restorative Justice approach, however, suggests that plagiarism is in fact an act against a community (in this case, a community of students), and that steps need to be taken to restore a level of balance (Wenzel; et. al. 2010; Karp and Conrad, 2005; Karp, 2009; Dickson, etc. al. 2009). An educational approach that espouses that the best method of reducing plagiarism is to educate and support students. Marking criteria and assessment tasks should be linked to building referencing skills (especially in the first year) and ensure that the students learn these skills in a discipline related context (Jaschik; 2008). The approach of both the University of Southern Queensland (USQ) and Swinburne University of Technology is clearly aligned with the third school of thought. Students lack proper understanding of the purposes of referencing. For them, referencing and citing is linked to just words, not ideas (Jackson, 2006), so referencing is regarded as separate to the writing process, instead of an integral part. To help students develop good writing and referencing practices, it is useful if universities help them understand the research culture of tertiary study. Faculties need to make their referencing rules explicit and lectures should provide useful exemplars within courses.
46. Understanding of new students on Referencing is based on
(A) Plagiarism
(B) Fear
(C) Ability to write
(D) Insatiable desire to learn
Ans: B
47. An appropriate response to deliberate act of plagiarism according to punitive school of thought is
(A) to debar the student from library use
(B) to orient the student about plagiarism
(C) to award punishment
(D) to make him learn about referencing
Ans: C
48. To restore a ‘level of balance’ is advocated/reflected in
(A) Deterrent Approach
(B) Reformative Approach
(C) Punitive Approach
(D) Restorative Approach
Ans: D
49. ‘Educational approach’ which aims at reducing plagiarism should be linked with
(A) Building referencing skills of the students
(B) inculcating reading habits of the students
(C) building students as information literate
(D) ignorance of the students on methods of social research
Ans: A
50. Lack of understanding of students about referencing is linked to their
(A) Ideas (B) Words
(C) Experience (D) Intuition
Ans: A
Reason (R) : A number of publishers in India are defaulters and do not deposit their publications as per Delivery of Books and Newspapers (Public Libraries)
Act.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Ans: D
40. Assertion (A) : No library is self sufficient in terms of resources even in electronic age.
Reason (R) : Resource sharing and consortia initiatives are essential to meet user needs.
Codes :
(A) (A) is true and (R) is false.
(B) (A) is false and (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: C
41. Assertion (A) : Interviewing is essential to supplement the research data collected through questionnaire.
Reason (R) : Interview is the most suitable technique to collect data as all respondents cooperate more during interview.
Codes :
(A) (A) is false, but (R) is true.
(B) Both (A) and (R) are true.
(C) Both (A) & (R) are false.
(D) (A) is true, but (R) is false.
Ans: D
42. Assertion (A) : Indexing and abstracting services fulfil the 4 th Law of Library Science.
Reason (R) : These services serve as the substitute to the primary journals.
Codes :
(A) (A) is true, but (R) is false.
(B) Both (A) & (R) are false.
(C) Both (A) & (R) are true.
(D) (A) is false, but (R) is true.
Ans: A
43. Assertion (A) : All classification schemes adopt ‘phase relations’.
Reason (R) : Subject formation by loose assemblage leads to complex subjects and isolates.
Codes :
(A) (A) is true, but (R) is false.
(B) Both (A) and (R) are true.
(C) Both (A) and (R) are false.
(D) (A) is false, but (R) is true.
Ans: D
44. Assertion (A) : RSS (Rich Site Summary) is considered as an alternate to the SDI Service.
Reason (R) : RSS Feeds enable us to syndicate data automatically.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is false, but (R) is true.
(D) (A) is true, but (R) is false.
Ans: A
45. Assertion (A) : Majority of academic libraries in India are lagging behind in switching over as technology-oriented service institutions.
Reason (R) : The apex academic bodies and library Associations have not taken the lead role to devise standards and policies.
Codes :
(A) (A) is true, (R) is false.
(B) (A) is false, (R) is true.
(C) Both (A) and (R) is true.
(D) Both (A) and (R) are false.
Ans: C
Read the passage given below and answer the questions based on your understanding of the passage (Question Nos. 46 – 50) :
As the global information landscape increasingly facilitate the sharing, repurposing and dissemination of information, the ways in which students are accustomed to interacting with information resources are also changing. For some new students to universities, their understanding of referencing is based solely on fear (McGowan, 2005) and many are familiar wit the basic concept of plagiarism. Some students bring with them the academic process that served them well at school – however, these are not suitable at Universities (Chanock, 2008). Students understand they should not copy words without referencing, but fail to grasp the reasons why; the reasons are not explicit and often cloaked in unfamiliar and impenetrable academic language. Pak’s (2003) review of literature proved as a handy summation of the investigations, research, and thinking about plagiarism prior to the implementation of various plagiarism detection software products. There are three main schools of thought in referencing and plagiarism discourse. A punitive approach which focuses on the idea that students often deliberately engage in plagiarism and that the appropriate response is one of punishment (Blum, 2009; Sutherland – Smith, 2010; Bilic – Zulle, et. al. 2008). A Restorative Justice approach, however, suggests that plagiarism is in fact an act against a community (in this case, a community of students), and that steps need to be taken to restore a level of balance (Wenzel; et. al. 2010; Karp and Conrad, 2005; Karp, 2009; Dickson, etc. al. 2009). An educational approach that espouses that the best method of reducing plagiarism is to educate and support students. Marking criteria and assessment tasks should be linked to building referencing skills (especially in the first year) and ensure that the students learn these skills in a discipline related context (Jaschik; 2008). The approach of both the University of Southern Queensland (USQ) and Swinburne University of Technology is clearly aligned with the third school of thought. Students lack proper understanding of the purposes of referencing. For them, referencing and citing is linked to just words, not ideas (Jackson, 2006), so referencing is regarded as separate to the writing process, instead of an integral part. To help students develop good writing and referencing practices, it is useful if universities help them understand the research culture of tertiary study. Faculties need to make their referencing rules explicit and lectures should provide useful exemplars within courses.
46. Understanding of new students on Referencing is based on
(A) Plagiarism
(B) Fear
(C) Ability to write
(D) Insatiable desire to learn
Ans: B
47. An appropriate response to deliberate act of plagiarism according to punitive school of thought is
(A) to debar the student from library use
(B) to orient the student about plagiarism
(C) to award punishment
(D) to make him learn about referencing
Ans: C
48. To restore a ‘level of balance’ is advocated/reflected in
(A) Deterrent Approach
(B) Reformative Approach
(C) Punitive Approach
(D) Restorative Approach
Ans: D
49. ‘Educational approach’ which aims at reducing plagiarism should be linked with
(A) Building referencing skills of the students
(B) inculcating reading habits of the students
(C) building students as information literate
(D) ignorance of the students on methods of social research
Ans: A
50. Lack of understanding of students about referencing is linked to their
(A) Ideas (B) Words
(C) Experience (D) Intuition
Ans: A
51. According to Machlup the difference between information and knowledge is
(A) Information increases with use, whereas knowledge is constant.
(B) Information is stimulatory, whereas knowledge is practical.
(C) Information is shareable, whereas knowledge is one’s property.
(D) Information is piecemeal, fragmented, particular, whereas knowledge is structured, coherent and universal.
Ans: D
52. “Web of Science” is
(A) A Citation Index
(B) A Bibliography
(C) An Abstracting Service
(D) All of the above
Ans: A
53. “Facts on File” can be grouped under
(A) Primary source
(B) Secondary source
(C) Tertiary source
(D) None of the above
Ans: B
54. In MARC 21, subject access fields are
(A) 3xx (B) 4xx
(C) 5xx (D) 6xx
Ans: D
55. Transformation of traditional libraries to hybrid / digital libraries is
(A) Crisis Management
(B) Re-engineering
(C) Change Management
(D) Project Management
Ans: C
56. Which one of the following is not a switching system ?
(A) Packet (B) Circuit
(C) Router (D) Message
Ans: C
57. Access to back volumes of E-journals is known as _______.
(A) Random Access
(B) Perpetual Access
(C) Online Access
(D) Retrospective Access
Ans: B
58. The chi-square technique is used to compare the observed data with that of
(A) Collected raw data
(B) Expected data
(C) Analysed data
(D) Graphical data
Ans: B
59. ‘Parry Committee’ (UK) was set up to advise
(A) School Libraries
(B) Public Libraries
(C) Special Libraries
(D) University Libraries
Ans: D
60. FRBR is developed by
(A) LC (B) UNESCO
(C) IFLA (D) FID
Ans: C
61. Who were involved in Public Library Movement in India ?
(i) Sayaji Rao Gaekwad II
(ii) C.D. Deshmukh
(iii) S. Radhakrishnan
(iv) S.R. Ranganathan
Codes :
(A) (i) & (iii) are correct
(B) (ii) & (iv) are correct
(C) (i) & (iv) are correct
(D) (ii) & (iii) are correct
Ans: C
62. Which of the following are library networks ?
(i) Internet (ii) DELNET
(iii) NICNET (iv) OCLC
Codes :
(A) (i) and (ii) are correct.
(B) (ii) and (iv) are correct.
(C) (i) and (iii) are correct.
(D) (i) and (iv) are correct
Ans: B
63. Which of the following are review type services ?
(i) Current Awareness
(ii) Trend Reports
(iii) News Clippings
(iv) State of the Art Report
Codes :
(A) (i), (ii), (iii) are correct.
(B) (i), (iii), (iv) are correct.
(C) (ii) & (iv) are correct.
(D) (ii) & (iii) are correct.
Ans: C
64. The basic characteristics of a system are
(i) Interrelated components
(ii) Independent and can stand alone
(iii) Arranged in hierarchical order
(iv) Inputs, processes, outputs & feed back
Codes :
(A) (i), (ii), (iii) are correct.
(B) (i), (ii), (iv) are correct.
(C) (ii), (iii), (iv) are correct.
(D) (i), (iii), (iv) are correct.
Ans: D
65. The general image file formats are :
(i) TIFF (ii) JPEG
(iii) MPEG (iv) PNG
Codes :
(A) (i), (ii) and (iii) are correct.
(B) (i), (iii) and (iv) are correct.
(C) (i), (ii) and (iv) are correct.
(D) (ii), (iii) and (iv) are correct.
Ans: C
66. Which of the following are common types of protocols ?
(i) HTTP (ii) FTP
(iii) Telnet (iv) Gopher
Codes :
(A) (i) and (ii) are correct.
(B) (i), (ii) and (iv) are correct.
(C) (iii) and (iv) are correct.
(D) (i), (ii) and (iii) are correct.
Ans: D
67. Which of the following are not the elements of DOI system ?
(i) Policies (ii) Subject
(iii) Description (iv) Resolution
Codes :
(A) (i), (ii) and (iii) are correct.
(B) (i), (iii) and (iv) are correct.
(C) (i), (ii) and (iv) are correct.
(D) (ii), (iii) and (iv) are correct.
Ans: B
68. Which of the following are Trade Bibliographies ?
(i) Books-in-Print
(ii) Indian Books-in-Print
(iii) Indian National Bibliography
(iv) British National Bibliography
Codes :
(A) (i) and (iii) are correct.
(B) (ii) and (iv) are correct.
(C) (i) and (ii) are correct.
(D) (ii) and (iii) are correct.
Ans: C
69. Assertion (A) : Distance education for LIS courses is gaining ground in India.
Reason (R) : Majority of people prefer it as an alternative channel of education.
Codes :
(A) (A) is true but (R) is false.
(B) (A) is false but (R) is true.
(C) Both (A) and (R) are correct.
(D) Both (A) and (R) are wrong.
Ans: C
70. Assertion (A) : Indian libraries are making optimum use of social networking.
Reason (R) : Social networking has wider role in dissemination of information.
Codes :
(A) (A) is true but (R) is false.
(B) (A) is false but (R) is true.
(C) (A) and (R) both are true.
(D) (A) and (R) both are false.
Ans: B
71. Assertion (A) : Knowledge is growing exponentially.
Reason (R) : Number of researchers have increased.
Codes :
(A) Both (A) & (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is false but (R) is true.
(D) (A) is true but (R) is false.
Ans: A
(A) Information increases with use, whereas knowledge is constant.
(B) Information is stimulatory, whereas knowledge is practical.
(C) Information is shareable, whereas knowledge is one’s property.
(D) Information is piecemeal, fragmented, particular, whereas knowledge is structured, coherent and universal.
Ans: D
52. “Web of Science” is
(A) A Citation Index
(B) A Bibliography
(C) An Abstracting Service
(D) All of the above
Ans: A
53. “Facts on File” can be grouped under
(A) Primary source
(B) Secondary source
(C) Tertiary source
(D) None of the above
Ans: B
54. In MARC 21, subject access fields are
(A) 3xx (B) 4xx
(C) 5xx (D) 6xx
Ans: D
55. Transformation of traditional libraries to hybrid / digital libraries is
(A) Crisis Management
(B) Re-engineering
(C) Change Management
(D) Project Management
Ans: C
56. Which one of the following is not a switching system ?
(A) Packet (B) Circuit
(C) Router (D) Message
Ans: C
57. Access to back volumes of E-journals is known as _______.
(A) Random Access
(B) Perpetual Access
(C) Online Access
(D) Retrospective Access
Ans: B
58. The chi-square technique is used to compare the observed data with that of
(A) Collected raw data
(B) Expected data
(C) Analysed data
(D) Graphical data
Ans: B
59. ‘Parry Committee’ (UK) was set up to advise
(A) School Libraries
(B) Public Libraries
(C) Special Libraries
(D) University Libraries
Ans: D
60. FRBR is developed by
(A) LC (B) UNESCO
(C) IFLA (D) FID
Ans: C
61. Who were involved in Public Library Movement in India ?
(i) Sayaji Rao Gaekwad II
(ii) C.D. Deshmukh
(iii) S. Radhakrishnan
(iv) S.R. Ranganathan
Codes :
(A) (i) & (iii) are correct
(B) (ii) & (iv) are correct
(C) (i) & (iv) are correct
(D) (ii) & (iii) are correct
Ans: C
62. Which of the following are library networks ?
(i) Internet (ii) DELNET
(iii) NICNET (iv) OCLC
Codes :
(A) (i) and (ii) are correct.
(B) (ii) and (iv) are correct.
(C) (i) and (iii) are correct.
(D) (i) and (iv) are correct
Ans: B
63. Which of the following are review type services ?
(i) Current Awareness
(ii) Trend Reports
(iii) News Clippings
(iv) State of the Art Report
Codes :
(A) (i), (ii), (iii) are correct.
(B) (i), (iii), (iv) are correct.
(C) (ii) & (iv) are correct.
(D) (ii) & (iii) are correct.
Ans: C
64. The basic characteristics of a system are
(i) Interrelated components
(ii) Independent and can stand alone
(iii) Arranged in hierarchical order
(iv) Inputs, processes, outputs & feed back
Codes :
(A) (i), (ii), (iii) are correct.
(B) (i), (ii), (iv) are correct.
(C) (ii), (iii), (iv) are correct.
(D) (i), (iii), (iv) are correct.
Ans: D
65. The general image file formats are :
(i) TIFF (ii) JPEG
(iii) MPEG (iv) PNG
Codes :
(A) (i), (ii) and (iii) are correct.
(B) (i), (iii) and (iv) are correct.
(C) (i), (ii) and (iv) are correct.
(D) (ii), (iii) and (iv) are correct.
Ans: C
66. Which of the following are common types of protocols ?
(i) HTTP (ii) FTP
(iii) Telnet (iv) Gopher
Codes :
(A) (i) and (ii) are correct.
(B) (i), (ii) and (iv) are correct.
(C) (iii) and (iv) are correct.
(D) (i), (ii) and (iii) are correct.
Ans: D
67. Which of the following are not the elements of DOI system ?
(i) Policies (ii) Subject
(iii) Description (iv) Resolution
Codes :
(A) (i), (ii) and (iii) are correct.
(B) (i), (iii) and (iv) are correct.
(C) (i), (ii) and (iv) are correct.
(D) (ii), (iii) and (iv) are correct.
Ans: B
68. Which of the following are Trade Bibliographies ?
(i) Books-in-Print
(ii) Indian Books-in-Print
(iii) Indian National Bibliography
(iv) British National Bibliography
Codes :
(A) (i) and (iii) are correct.
(B) (ii) and (iv) are correct.
(C) (i) and (ii) are correct.
(D) (ii) and (iii) are correct.
Ans: C
69. Assertion (A) : Distance education for LIS courses is gaining ground in India.
Reason (R) : Majority of people prefer it as an alternative channel of education.
Codes :
(A) (A) is true but (R) is false.
(B) (A) is false but (R) is true.
(C) Both (A) and (R) are correct.
(D) Both (A) and (R) are wrong.
Ans: C
70. Assertion (A) : Indian libraries are making optimum use of social networking.
Reason (R) : Social networking has wider role in dissemination of information.
Codes :
(A) (A) is true but (R) is false.
(B) (A) is false but (R) is true.
(C) (A) and (R) both are true.
(D) (A) and (R) both are false.
Ans: B
71. Assertion (A) : Knowledge is growing exponentially.
Reason (R) : Number of researchers have increased.
Codes :
(A) Both (A) & (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is false but (R) is true.
(D) (A) is true but (R) is false.
Ans: A
72. Assertion (A) : Present decade has accepted E-journals as channels of fast communication.
Reason (R) : E-publications have added enormous quantity of literature but affected the quality of research.
Codes :
(A) (A) is true but (R) is false.
(B) (A) is false but (R) is true.
(C) Both (A) and (R) are true and (R) is the correct explanation.
(D) Both (A) and (R) are true, but (R) is not a correct explanation.
Ans: C
73. Assertion (A) : Library & Information centres are knowledge/management centres.
Reason (R) : Libraries handle tacit knowledge.
Codes :
(A) Both (A) and (R) are true.
(B) (A) is partially true, but (R) is false.
(C) (A) is false, but (R) is true.
(D) Both (A) and (R) are false.
Ans: B
74. Assertion (A) : Metadata hold much promise for information retrieval and access in the digital age.
Reason (R) : Metadata can save a number of functions including description, resource discovery and management of resources.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: C
75. Assertion (A) : Training methods through brain storming stimulate idea generation.
Reason (R) : Training methods do not provide opportunity to unskilled to become skilled.
Codes :
(A) (A) is false but (R) is true.
(B) Both (A) and (R) are false.
(C) Both (A) and (R) are true.
(D) (A) is true but (R) is false.
Ans: D
76. Assertion (A) : Random samples are not representative of the whole population.
Reason (R) : Random numbers are used in forming a random sample.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: B
77. Assertion (A) : Information Literacy is a basic skill essential for work environment in 21st century.
Reason (R) : Information Literacy helps to train the users to make use of ICT.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Ans: C
78. Arrange the following IFLA programmes according to their year of commencement :
(i) UBC
(ii) UAP
(iii) ISBD
(iv) International MARC Office
Codes :
(A) (i), (iv), (iii), (ii)
(B) (ii), (iv), (i), (iii)
(C) (iv), (i), (ii), (iii)
(D) (iii), (i), (ii), (iv)
Ans: D
79. Arrange the following according to their year of origin :
(i) Indian National Bibliography
(ii) British National Bibliography
(iii) Cumulative Book Index
(iv) Books in Print
Codes :
(A) (i), (iii), (iv), (ii)
(B) (ii), (i), (iii), (iv)
(C) (iv), (iii), (ii), (i)
(D) (iii), (iv), (ii), (i)
Ans: D
80. Arrange the following in a chronological order according to their year of establishment :
(i) Library of Congress
(ii) NISCAIR
(iii) Delivery of Books Act
(iv) National Library of India
Codes :
(A) (iii), (iv), (ii), (i)
(B) (ii), (iii), (i), (iv)
(C) (i), (iv), (iii), (ii)
(D) (iv), (i), (iii), (ii)
Ans: C
81. Arrange the following according to their year of origin :
(i) UNICODE
(ii) XML
(iii) HTML
(iv) SGML
Codes :
(A) (iv), (iii), (i), (ii)
(B) (iii), (iv), (ii), (i)
(C) (ii), (iv), (i), (iii)
(D) (i), (ii), (iii), (iv)
Ans: A
82. Arrange the following according to their year of enactment :
(i) Tamil Nadu Public Library Act
(ii) Kerala Public Library Act
(iii) Maharashtra Public Library Act
(iv) Orissa Public Library Act
Codes :
(A) (i), (iii), (ii), (iv)
(B) (ii), (iii), (iv), (i)
(C) (ii), (iii), (i), (iv)
(D) (iv), (iii), (ii), (i)
Ans: A
83. Match the following :
List – I List – II
a. ‘Guide to Use of Books And Libraries’ i. F.W. Lancaster
b. ‘If You Want to Evaluate Your Library’ ii. A.C. Foskelt
c. ‘Cuneiform to Computer : A History of Reference Sources’ iii. Jean K. Gates
d. ‘Subject Approach to Information’ iv. William A. Katz
Codes :
a b c d
(A) ii iii iv i
(B) i iv iii ii
(C) iii i iv ii
(D) iv ii i iii
Ans: C
84. Match the following :
List – I List – II
a. Directory i. Information Please Almanac
b. Annuals ii. Keesing’s Record of World Events
c. Bibliography iii. Encyclopaedia of Associations
d. News paper Digest iv. Publishers’ Weekly
Codes :
a b c d
(A) iii i iv ii
(B) i iii iv ii
(C) iii ii iv i
(D) iv i ii iii
Ans: A
85. Match the following :
List – I List – II
a. Guiding users to the place of information i. Digest
b. Guiding users in the use of information ii. User orientation
c. Alerting users with the latest arrivals iii. Referral
d. Providing users with summarised information iv. Current Awareness
Codes :
a b c d
(A) iii iv i ii
(B) iii ii iv i
(C) iv i iii ii
(D) ii i iii iv
Ans: B
86. Match the following :
List – I List – II
a. B.S. Kesvan i. School of librarianship
b. Paul Otlet ii. National Library of India
c. W.C.B. Sayers iii. UDC
d. M. Taube iv. Uniterm Indexing
Codes :
a b c d
(A) ii iii i iv
(B) iii ii i iv
(C) ii iii iv i
(D) iv ii iii i
Ans: A
87. Match the following :
List – I List – II
a. Classification i. LISA
b. Cataloguing ii. UDC
c. Subject Heading iii. AACR
d. Library Science Abstracts iv. LCSH
Codes :
a b c d
(A) ii i iv iii
(B) ii iii iv i
(C) iv iii i ii
(D) ii iv i iii
Ans: B
Reason (R) : E-publications have added enormous quantity of literature but affected the quality of research.
Codes :
(A) (A) is true but (R) is false.
(B) (A) is false but (R) is true.
(C) Both (A) and (R) are true and (R) is the correct explanation.
(D) Both (A) and (R) are true, but (R) is not a correct explanation.
Ans: C
73. Assertion (A) : Library & Information centres are knowledge/management centres.
Reason (R) : Libraries handle tacit knowledge.
Codes :
(A) Both (A) and (R) are true.
(B) (A) is partially true, but (R) is false.
(C) (A) is false, but (R) is true.
(D) Both (A) and (R) are false.
Ans: B
74. Assertion (A) : Metadata hold much promise for information retrieval and access in the digital age.
Reason (R) : Metadata can save a number of functions including description, resource discovery and management of resources.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: C
75. Assertion (A) : Training methods through brain storming stimulate idea generation.
Reason (R) : Training methods do not provide opportunity to unskilled to become skilled.
Codes :
(A) (A) is false but (R) is true.
(B) Both (A) and (R) are false.
(C) Both (A) and (R) are true.
(D) (A) is true but (R) is false.
Ans: D
76. Assertion (A) : Random samples are not representative of the whole population.
Reason (R) : Random numbers are used in forming a random sample.
Codes :
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Ans: B
77. Assertion (A) : Information Literacy is a basic skill essential for work environment in 21st century.
Reason (R) : Information Literacy helps to train the users to make use of ICT.
Codes :
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Ans: C
78. Arrange the following IFLA programmes according to their year of commencement :
(i) UBC
(ii) UAP
(iii) ISBD
(iv) International MARC Office
Codes :
(A) (i), (iv), (iii), (ii)
(B) (ii), (iv), (i), (iii)
(C) (iv), (i), (ii), (iii)
(D) (iii), (i), (ii), (iv)
Ans: D
79. Arrange the following according to their year of origin :
(i) Indian National Bibliography
(ii) British National Bibliography
(iii) Cumulative Book Index
(iv) Books in Print
Codes :
(A) (i), (iii), (iv), (ii)
(B) (ii), (i), (iii), (iv)
(C) (iv), (iii), (ii), (i)
(D) (iii), (iv), (ii), (i)
Ans: D
80. Arrange the following in a chronological order according to their year of establishment :
(i) Library of Congress
(ii) NISCAIR
(iii) Delivery of Books Act
(iv) National Library of India
Codes :
(A) (iii), (iv), (ii), (i)
(B) (ii), (iii), (i), (iv)
(C) (i), (iv), (iii), (ii)
(D) (iv), (i), (iii), (ii)
Ans: C
81. Arrange the following according to their year of origin :
(i) UNICODE
(ii) XML
(iii) HTML
(iv) SGML
Codes :
(A) (iv), (iii), (i), (ii)
(B) (iii), (iv), (ii), (i)
(C) (ii), (iv), (i), (iii)
(D) (i), (ii), (iii), (iv)
Ans: A
82. Arrange the following according to their year of enactment :
(i) Tamil Nadu Public Library Act
(ii) Kerala Public Library Act
(iii) Maharashtra Public Library Act
(iv) Orissa Public Library Act
Codes :
(A) (i), (iii), (ii), (iv)
(B) (ii), (iii), (iv), (i)
(C) (ii), (iii), (i), (iv)
(D) (iv), (iii), (ii), (i)
Ans: A
83. Match the following :
List – I List – II
a. ‘Guide to Use of Books And Libraries’ i. F.W. Lancaster
b. ‘If You Want to Evaluate Your Library’ ii. A.C. Foskelt
c. ‘Cuneiform to Computer : A History of Reference Sources’ iii. Jean K. Gates
d. ‘Subject Approach to Information’ iv. William A. Katz
Codes :
a b c d
(A) ii iii iv i
(B) i iv iii ii
(C) iii i iv ii
(D) iv ii i iii
Ans: C
84. Match the following :
List – I List – II
a. Directory i. Information Please Almanac
b. Annuals ii. Keesing’s Record of World Events
c. Bibliography iii. Encyclopaedia of Associations
d. News paper Digest iv. Publishers’ Weekly
Codes :
a b c d
(A) iii i iv ii
(B) i iii iv ii
(C) iii ii iv i
(D) iv i ii iii
Ans: A
85. Match the following :
List – I List – II
a. Guiding users to the place of information i. Digest
b. Guiding users in the use of information ii. User orientation
c. Alerting users with the latest arrivals iii. Referral
d. Providing users with summarised information iv. Current Awareness
Codes :
a b c d
(A) iii iv i ii
(B) iii ii iv i
(C) iv i iii ii
(D) ii i iii iv
Ans: B
86. Match the following :
List – I List – II
a. B.S. Kesvan i. School of librarianship
b. Paul Otlet ii. National Library of India
c. W.C.B. Sayers iii. UDC
d. M. Taube iv. Uniterm Indexing
Codes :
a b c d
(A) ii iii i iv
(B) iii ii i iv
(C) ii iii iv i
(D) iv ii iii i
Ans: A
87. Match the following :
List – I List – II
a. Classification i. LISA
b. Cataloguing ii. UDC
c. Subject Heading iii. AACR
d. Library Science Abstracts iv. LCSH
Codes :
a b c d
(A) ii i iv iii
(B) ii iii iv i
(C) iv iii i ii
(D) ii iv i iii
Ans: B
88. Match the following :
List – I (Budgetary technique)
List – II (Limitation of budgetary technique)
a. Line i. Detailed information required
b. Formula ii. Time consuming
c. PPBS iii. Do not permit variation
d. Zerobased iv. Do not suggest future
Codes :
a b c d
(A) ii i iv iii
(B) iii ii i iv
(C) iv iii i ii
(D) i iv ii iii
Ans: C
89. Match the following :
List – I List – II
a. File transfer protocol i. Data transmission capacity
b. Multimedia ii. Integration of text, colour sound and animation
c. Bandwidth iii. Bulletin Board
d. Electronic Notice Board iv. Internet
Codes :
a b c d
(A) iv ii i iii
(B) i iii ii iv
(C) ii i iv iii
(D) i iv ii iii
Ans: A
90. Match the following :
List – I List – II
a. ISDN i. Web page
b. URL ii. Video Conferencing
c. Firewall iii. Internet Standard for Information Transmission
d. HTTP iv. Protecting unauthorised access internet
Codes :
a b c d
(A) iii iv i ii
(B) iv i iii ii
(C) ii i iv iii
(D) i iii ii iv
Ans: C
91. Match the following :
List – I List – II
a. OCLC i. Bio-Med
b. INFLIBNET ii. Web-Dewey
c. IISC iii. N-List
d. NLM iv. Digital Library of India
Codes :
a b c d
(A) ii iii iv i
(B) iii i ii iv
(C) iv ii iii i
(D) i iii iv ii
Ans: A
Read the passage given below, and answer the questions based on your understanding of the passage. (Question Nos. 92-96)
With the realization across the world that the global economy is going to be increasingly knowledge-based, science and technology have become the subject of discussion not just in classical ministries but also in ministries as diverse as commerce, industry and finance, and in case of United States, even in the State Department. In India, the Prime Minister has made frequent statements about the need to step up scientific research in the country. Several large companies, including multinationals are outsourcing R & D programmes to India. This is partly because scientists are cheaper in India dollar for dollar, but also because India has a large pool of trained scientists. Industry data shows that R & D is now the third-largest segment in India’s export of Information Technology (IT) services. Foreign companies have invested over $ 1 billion in research operations in India from 1998 to 2003 and another estimated $ 5 billion are in the pipeline. The nited States is the biggest investor followed by Germany, France, Denmark and UK. Japan and China have also begun to invest in research programmes in India. Most foreign investment is being directed to research in computer sciences, pharmaceuticals, molecular hemistry, drug discovery, engineering and automotive design and biotechnology, including plant breeding. Whereas, flow of foreign investments has enthused research institutions that are targeted for collaboration, there is also cause for concern. Although, India now attracts considerable foreign investment in R & D, it has no system in place for assessing how this investment is affecting the country’s technological development. Nor is there any mechanism to monitor the impact of such investment on aspects such as skill development, sectoral capacity building etc. Do such foreign – funded research programmes benefit only the scientists and technicians in the form of better salaries and perks or do they also produce benefits for the country as a whole ?
92. Focus on science and technology has increased because
(A) Indian commerce and Finance Ministries are giving great importance to it.
(B) World economy has become knowledge based.
(C) US State Department gives priority on S & T
(D) Knowledge Commission has identified it as one of the potential area of development
Ans: B
93. The following group of countries are the biggest investors in research :
(A) U.S., Germany, India, Russia
(B) Britain, France, U.S., India
(C) France, Denmark, U.S.A., U.K.
(D) Japan, China, India, Denmark
Ans: C
94. What is the cause of concern regarding foreign investment in research ?
(A) Scientists and technicians involved in research are not paid well.
(B) There are insufficient institutions that can be targeted for research collaboration.
(C) The benefit of such investments doesn’t get transferred to India.
(D) Sufficient methods to assess and evaluate the impact of such investment are not available.
Ans: D
95. Most foreign investment is being made in the area of
(A) Microbiology and life sciences.
(B) Computer science and automotive design.
(C) Physical sciences and planting.
(D) Grafting and biology.
Ans: B
96. Foreign companies are outsourcing R & D programmes to India because
(A) Quality of research is quite high in India.
(B) Outsourcing is cost effective for foreign companies.
(C) There is scarcity of skilled manpower in those countries.
(D) None of the above.
Ans: B
97. Books of Copyright Act, 1957 (India) amended in
(A) 1957
(C) 1982
(B) 1956
(D) 1984
Ans: D
98. Sea Customs act of 1962 censor and ban foreign publications in
(A) India
(B) USA
(C) UK
(D) Australia
Ans: A
99. The term censorship is derived from the word censere of------ origin.
(A) German
(B) Greek
(C) Latin
(D) Sanskrit
Ans: C
100. FID was founded in the year 1895 at
(A) Brussels
(B) Hague
(C) Paris
(D) Bon
Ans: A
List – I (Budgetary technique)
List – II (Limitation of budgetary technique)
a. Line i. Detailed information required
b. Formula ii. Time consuming
c. PPBS iii. Do not permit variation
d. Zerobased iv. Do not suggest future
Codes :
a b c d
(A) ii i iv iii
(B) iii ii i iv
(C) iv iii i ii
(D) i iv ii iii
Ans: C
89. Match the following :
List – I List – II
a. File transfer protocol i. Data transmission capacity
b. Multimedia ii. Integration of text, colour sound and animation
c. Bandwidth iii. Bulletin Board
d. Electronic Notice Board iv. Internet
Codes :
a b c d
(A) iv ii i iii
(B) i iii ii iv
(C) ii i iv iii
(D) i iv ii iii
Ans: A
90. Match the following :
List – I List – II
a. ISDN i. Web page
b. URL ii. Video Conferencing
c. Firewall iii. Internet Standard for Information Transmission
d. HTTP iv. Protecting unauthorised access internet
Codes :
a b c d
(A) iii iv i ii
(B) iv i iii ii
(C) ii i iv iii
(D) i iii ii iv
Ans: C
91. Match the following :
List – I List – II
a. OCLC i. Bio-Med
b. INFLIBNET ii. Web-Dewey
c. IISC iii. N-List
d. NLM iv. Digital Library of India
Codes :
a b c d
(A) ii iii iv i
(B) iii i ii iv
(C) iv ii iii i
(D) i iii iv ii
Ans: A
Read the passage given below, and answer the questions based on your understanding of the passage. (Question Nos. 92-96)
With the realization across the world that the global economy is going to be increasingly knowledge-based, science and technology have become the subject of discussion not just in classical ministries but also in ministries as diverse as commerce, industry and finance, and in case of United States, even in the State Department. In India, the Prime Minister has made frequent statements about the need to step up scientific research in the country. Several large companies, including multinationals are outsourcing R & D programmes to India. This is partly because scientists are cheaper in India dollar for dollar, but also because India has a large pool of trained scientists. Industry data shows that R & D is now the third-largest segment in India’s export of Information Technology (IT) services. Foreign companies have invested over $ 1 billion in research operations in India from 1998 to 2003 and another estimated $ 5 billion are in the pipeline. The nited States is the biggest investor followed by Germany, France, Denmark and UK. Japan and China have also begun to invest in research programmes in India. Most foreign investment is being directed to research in computer sciences, pharmaceuticals, molecular hemistry, drug discovery, engineering and automotive design and biotechnology, including plant breeding. Whereas, flow of foreign investments has enthused research institutions that are targeted for collaboration, there is also cause for concern. Although, India now attracts considerable foreign investment in R & D, it has no system in place for assessing how this investment is affecting the country’s technological development. Nor is there any mechanism to monitor the impact of such investment on aspects such as skill development, sectoral capacity building etc. Do such foreign – funded research programmes benefit only the scientists and technicians in the form of better salaries and perks or do they also produce benefits for the country as a whole ?
92. Focus on science and technology has increased because
(A) Indian commerce and Finance Ministries are giving great importance to it.
(B) World economy has become knowledge based.
(C) US State Department gives priority on S & T
(D) Knowledge Commission has identified it as one of the potential area of development
Ans: B
93. The following group of countries are the biggest investors in research :
(A) U.S., Germany, India, Russia
(B) Britain, France, U.S., India
(C) France, Denmark, U.S.A., U.K.
(D) Japan, China, India, Denmark
Ans: C
94. What is the cause of concern regarding foreign investment in research ?
(A) Scientists and technicians involved in research are not paid well.
(B) There are insufficient institutions that can be targeted for research collaboration.
(C) The benefit of such investments doesn’t get transferred to India.
(D) Sufficient methods to assess and evaluate the impact of such investment are not available.
Ans: D
95. Most foreign investment is being made in the area of
(A) Microbiology and life sciences.
(B) Computer science and automotive design.
(C) Physical sciences and planting.
(D) Grafting and biology.
Ans: B
96. Foreign companies are outsourcing R & D programmes to India because
(A) Quality of research is quite high in India.
(B) Outsourcing is cost effective for foreign companies.
(C) There is scarcity of skilled manpower in those countries.
(D) None of the above.
Ans: B
97. Books of Copyright Act, 1957 (India) amended in
(A) 1957
(C) 1982
(B) 1956
(D) 1984
Ans: D
98. Sea Customs act of 1962 censor and ban foreign publications in
(A) India
(B) USA
(C) UK
(D) Australia
Ans: A
99. The term censorship is derived from the word censere of------ origin.
(A) German
(B) Greek
(C) Latin
(D) Sanskrit
Ans: C
100. FID was founded in the year 1895 at
(A) Brussels
(B) Hague
(C) Paris
(D) Bon
Ans: A
- Library Science
- Library Science- Page 1
- Library Science- Page 2
- Library Science- Page 3
- Library Science- Page 4
- Library Science- Page 5
- Library Science- Page 6
- Library Science- Page 7
- Library Science- Page 8
- Library Science- Page 9
- Library Science- Page 10
- Library Science- Page 11
- Library Science- Page 12
- Library Science- Page 13
- Library Science- Page 14
- Library Science- Page 15