UGC NET Paper-III (22.01.2017 Sunday) with full explanation

LIS Paper-III (CBSE NET – 22.01.2017 Sunday)

 

  1. Index Indiana, an index to Indian Periodical Literature is being compiled by
  • Central Reference Library, Kolkata (2) National Library of India (3) NISCAIR (4) IASLIC

 

Ans. (1) Central Reference Library, Kolkata

 

  1. According to OCLC research report ‘Know your community and its needs’ is the rephrasing of which law of Ranganathan?
  • First Law (2) Second Law (3) Third Law (4) Fourth Law

 

Ans. (2) Second Law

 

  1. Identify the document which is published by H.W.Wilson.
  • Europa World Yearbook 55th 2014
  • The International Who’s Who 78th 2014
  • Sears List of Subject Headings 20th 2010
  • Ulrich’s Periodicals Directory 53rd2015

 

Ans. (3) Sears List of Subject Headings 20th ed. 2010

 

 

  1. ‘Open Journal System’ is an example of which of the following open access models?
  • Green (2) Red (3) Gold (4) Platinum

 

Ans. (3) Gold.

[Open Access Archive/Repository – green models/green rote]

 

  1. When was the final ‘ISBD Consolidation edition’ published by IFLA?
  • 2008 (2) 2009 (3) 2010 (4) 2011

Ans. (4) 2011

 

  1. According to S.R.Ranganathan the canons for chain are
  • Canon of Ascertainability (2) Canon of Recall Value (3) Canon of array and filitary sequence (4) canon of decreasing extension and modulation

 

Ans. (4) canon of decreasing extension and modulation

 

  1. In Colon Classification (6th edition) ‘LB’ denotes
  • Special (2) System (3) canonical Class (4) Rounds

Ans. System.

[Systems: The term system basic subjects denote a division of a main class expounded after a school of thought. A school of thought is a group, or succession of persons devoted to some cause or philosophy. The class number for a system is derived by the chronological device. Some examples of system facets are:

L-B Ayurveda. B is 999 to 1000 BC – a system of medicine that came into being prior to 1000, BC]

 

  1. According to AACR 2R who will be considered for the access point of the Main Entry for the document entitled ‘Adventures of Tom Sawyer’ by Mark Twain; rewritten for young readers by Felix Sutton.
  • Sawyer, Tom (2) Twain, Mark (3) Mark Twain (4) Sutton, Felix

Ans. (2) Twain, Mark

 

  1. ‘Time and Motion’ study was enunciated by ___________
  • Edward Evans (2) Frank and Lillian Gilbreth (3) Harrington Emerson (4) G.McGregor

Ans. (2) Frank and Lillian Gilbreth. [Time Study – F.W.Taylor, Motion Study – Frank & Lillian Gilbreth.]

 

  1. Which RFID component is attached to the Book/item for identification?
  • Barcode (2) Antenna (3) Reader (4) Tag

Ans. (4) Tag

 

  1. What is RJ45?
  • A network cable connector (2) A node (3) An electronic coupler (4) A video display unit

Ans. (1) A network cable connector

[RJ45 (Registered Jack 45) may refer to: RJ45 (telecommunications), a connector standardized as the 8P8C modular connector (and the similar RJ45S with a keyed 8P2C) often used with CAT5 and CAT6 cables].

 

  1. SIP, the communication protocol for signaling and controlling multimedia communication stands for
  • Signalling Information Protocol (2) Internet Session Protocol (3) Sound Initiation protocol (4) Session Initiation Protocol

Ans. (4) Session Initiation Protocol

 

  1. The Fifth Anniversary of the general release of OCLC World Share Management Service – the first ever cloud-based cloud-based Cooperative Library Management System (that selected 500 libraries spanning six continents) was celebrated on
  • July 01, 2015 (2) July 03, 2015 (3) May 01, 2016 (4) August 12, 2016

Ans. Wrong option [Correct answer is July 01, 2016]

 

  1. Which of the following is a measure of dispersion?
  • Geometric mean (2) Median (3) Mode (4) Root Mean Square Deviation

Ans. (4) Root Mean Square Deviation.

[Common examples of measures of statistical dispersion are the variance, standard deviation/ Root Mean Square Deviation, and interquartile range.]

 

  1. If ‘r’ is a rank of a word and ‘f’ is its frequency then rf=c, where ‘c’ is a constant. Which law is this?
  • Bradford’s law (2) Lotka’s law (3) Narain’s law (4) Zipf’s law

Ans. (4) Zipf’s law

[Zipf’s law – Word frequency, Lotka’s law – author productivity, Bradford’s law – scattering]

 

  1. VIDWAN (INFLIBNET) is
  • An open source software (2) an association of intellectuals (3) a programming language (4) a database of experts and a network of researchers and scientists at national level

Ans. (4) a database of experts and a network of researchers and scientists at national level

 

  1. Which of the following rights are granted for ‘Literary works’ according to Copyright Law of India?
  • To make translation (b) To use in reporting current events (c) To make any adaptation (d) To use for the purpose of research

Ans. (4) (b) and (d) are correct.  

 

[Meaning of copyright.

-For the purposes of this Act, “copyright” means the exclusive right subject to the provisions of this Act, to do or authorise the doing of any of the following acts in respect of a work or any substantial part thereof, namely:-

(a) in the case of a literary, dramatic or musical work, not being a computer programme,

(i) to reproduce the work in any material form including the storing of it in any medium by electronic means;

(ii) to issue copies of the work to the public not being copies already in circulation;

(iii) to perform the work in public, or communicate it to the public;

(iv) to make any cinematograph film or sound recording in respect of the work;

(v) to make any translation of the work;

(vi) to make any adaptation of the work;

(vii) to do, in relation to a translation or an adaptation of the work, any of the acts specified in relation to the work in sub-clauses (i) to (vi);

(b) in the case of a computer programme,-

(i) to do any of the acts specified in clause (a)

“(ii) to sell or give on commercial rental or offer for sale or for commercial rental any copy of the computer programme:

Provided that such commercial rental does not apply in respect of computer programmes where the programme itself is not the essential object of the rental.”

(c) in the case of an artistic work,-

(i) to reproduce the work in any material form including depiction in three dimensions of a two dimensional work or in two dimensions of a three dimensional work;

(ii) to communicate the work to the public;

(iii) to issue copies of the work to the public not being copies already in circulation;

(iv) to include the work in any cinematograph film;

(v) to make any adaptation of the work;

(vi) to do in relation to an adaptation of the work any of the acts specified in relation to the work in sub-clauses (i) to (iv);

(d) In the case of cinematograph film, –

(i) to make a copy of the film, including a photograph of any image forming part thereof;

(ii) to sell or give on hire, or offer for sale or hire, any copy of the film, regardless of whether such copy has been sold or given on hire on earlier occasions;

(iii) to communicate the film to the public;

(e) In the case of sound recording, –

(i) to make any other sound recording embodying it;

(ii) to sell or give on hire, or offer for sale or hire, any copy of the sound recording regardless of whether such copy has been sold or given on hire on earlier occasions;

(iii) to communicate the sound recording to the public.

Explanation :

For the purposes of this section, a copy which has been sold once shall be deemed to be a copy already in circulation]

 

  1. Identify from the following the features of tacit knowledge:
  • Resides in human mind (b) Cannot be articulated (c) Tangible (d) Easy accessible

Ans. (3) (a) and (b) are correct.

 

  1. Which of the following are the examples of web-based learning and education?
  • Answer Tips (b) Moodle (c) Revish (d) Campus bug

Ans. (1) (a), (b) and (d) are correct

[The most popular ways to assess students in web-based learning are:

  • discussion forums, where teacher can observe the student’s active participation;
  • online multiple choice test, where you can do (self)test;
  • e-portfolio, where you have collected all your material and assignments electronically during the course;
  • report or essay, where you can analyse and express your comprehension based on the content of the course.
  1. Which of the following are the two sections stated in ‘IFLA Digital Reference Guidelines’?

Ans. (2) (b) and (c) are correct.

Section 1:

The Administration of Digital Reference Services, was written with the responsibilities

of program administrators in mind.

Section 2:

The Practice of Digital Reference, provides guidance for the practitioner of digital reference, and articulates standards of practice to facilitate collaborative work.]

 

  1. Which of the following sites are offered by Britannica Library, a product of Encyclopaedia Britannica?
  • Children (b) Young Adult (c) Patron (d) Reference Centre

Ans. (1) (a), (b) and (c) are correct.

 

  1. Identify the key attributes of ‘Digest’ from the following:
  • Significant ideas on one document area arranged separately in an unhelpful sequence.
  • A methodically arranged compendium or summary of literary, historical, legal, scientific or other written matters.
  • Informative in nature and contains brief description of more than one document.
  • Often prepared by a non-subject specialist without understanding and assimilating the contents of documents.

Ans. (4) (b) and (c) are correct.

 

  1. Which of the following communication channels are used frequently in Virtual Reference Service?
  • Bulletin Board (b) instant Messaging (c) RSS (d) Voice Over IP.

Ans. (3) (b) and (d) are correct.

[Communication channels used frequently in virtual reference include chat, videoconferencing, Voice over IP, co-browsing, e-mail, and instant messaging].

 

  1. Identify the affinitive/associative relationship of the following:
  • Genus-Species (b) Translations (c) Generic (d) Conduct

Ans. (3) (c) and (d) are correct.

Affinitive/associative relationship indicates a kind of relation among terms that are not equivalent and is indicated by coding ‘RT’.

 

  1. Which of the following are the components of a master database in acquisition systems/module?
  • Membership Master (b) Vendor Master (c) Currency Master (d) Transaction Master

Ans. (4) (b) and (c) are correct.

 

  1. Which of the following are types of random samples?
  • Cluster sampling (b) Purposive sampling (c) Stratified sampling (d) Systematic sampling

Ans. (1) (a), (c) and (d) are connect.

  • Simple Random Sampling (SRS)
  • Stratified Sampling.
  • Cluster Sampling.
  • Systematic Sampling.
  • Multistage Sampling (in which some of the methods above are combined in stages)

 

  1. Who among the following devised the ‘Critical path method’?
  • Morgan R.Walker (b) Clank Sedore (c) Blake William (d) James E.Kelley

Ans.(2) (a) and (d) are correct.

[The critical path method (CPM) is a project modeling technique developed in the late 1950s by Morgan R. Walker of DuPont and James E. Kelley Jr. of Remington Rand.]

 

  1. Which of the following databases are available for scientific community free of cost?
    • Inspec (b) ERIC (c) IEEE Xplore (d) PubMed

Ans. (3) (b) and (d) are correct.

 

  1. Which of the following are protocol standards?
  • 50 (b) z39.71 (c) z39.05 (d) z39.81

Ans. (a), (b) and (d) are correct.

 

[Z39.50/ISO 23950 – 1995, 2003 (international standard client–server, application layer communications protocol for searching and retrieving information from a database over a TCP/IP computer network), z39.71 – 2006 (Holding Statements for Bibliographic Statement), z39.81 – 2001, z39.83 – 2012 (Circulation Interchange Protocol)]

 

  1. Which of the following are the Semantic Web technologies?
  • SKOS (b) AJAX (c) SPARQL (d) UTF

Ans. (2) (a) and (c) are correct.

[The term “Semantic Web” refers to W3C’s vision of the Web of linked data. Semantic Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data. Linked data are empowered by technologies such as RDF, SPARQL, OWL, and SKOS.]

 

  1. Which of the following are the features of operations Research?
  • Aid in decision making (b) Handles decision tables (c) Optimization of Performance (d) Used as motivational technique

Ans. (2) (a) (c) are correct.

 

  1. Which of the following are discrete distributions?
  • Beta (b) Exponential (c) Geometric (d) Poisson

Ans. (4) (c) and (d) are correct

 

  1. Identify the criteria for evaluation of qualitative research:
  • Objectivity (b) Reliability (c) Divisibility (d) Validity

Ans. (1) (a), (b) and (d) are correct.

 

[While the evaluation of quantitative research frequently depends on judgements based on The “holy trinity” of objectivity, reliability and validity (Spencer, Ritchie, Lewis, & Dillon, 2003, p.59), applying these traditional criteria to qualitative research is not always a “good fit” (Schofield, 2002). Instead, educational researchers who engage in qualitative research have suggested various sets of alternative criteria including: transferability, generalisability, ontological authenticity, reciprocity, dependability, confirmability, reflexivity, fittingness, vitality and, even, sacredness and goodness.]

 

  1. TRAILS-9 is
  • A process or an assessment tool for real time assessment of Information Literacy Skill of the student-learners.
  • A tool or process used by the School Librarians to produce evidence of Library’s impact on student achievements to share with stake-holders.
  • A tool to adjudge the quality of library services offered, but not to demonstrate the value of the Library’s contribution.
  • A tool funded by ILILE (Institute for Library & Information Literacy Education) based on Ohio-K12 Library Academic Content Standards.

Ans. (2) (a), (b) (d) are correct.

 

  1. Which of the following are the sources to lookup for DOI?
  • Central Search List (b) DOI Handbook (c) Registration Agencies (d) Search results using a search engine.

Ans. (1) (a) and (b) are correct.

 

  1. Arrange in sequence the following types of activity according to Ellis’s model of information-seeking behavior:
  • Browsing (2) Chaining (c) Differentiating (d) Extracting

Ans. (2) (b), (a), (c), (d).

[1. Activity Sequence of Ellis’s Model (1989) of ISB: Starting – Chaining – Browsing – Differentiating – Monitoring – Extracting – Verifying – Ending.

  • Starting (activities that form the information search)
  • Chaining (backwards or forwards – following references in initial information sources)
  • Browsing (semi-directed search)
  • Differentiating (filtering and selecting sources based on judgement of quality and relevance)
  • Monitoring (keeping track of developments in an area)
  • Extracting (systematic extraction of material of interest from sources)

Later studies by Ellis (focusing on academic researchers in other disciplines) resulted in the addition of two more activities;

  • Verifying (checking accuracy)
  • Ending (a final search, checking all material covered)

*** Ellis thought that hypertext-based systems would have the capabilities to implement these functions. Ellis model are being supported by capabilities to available in common web browser software.

·         An individual could begin surfing the web from one of a few favourite starting pages or sites (Starting);

·         Follow hyper textual links to related information resources in both backward and forward linking directions (Chaining);

·         Scan the web pages of the sources selected (Browsing);

·         Bookmark useful sources for future reference and visits (Differentiating);

  • Subscribe to email based services that alert the user of new information or developments (Monitoring);
  • Search a particular source or site for all information on that site on a particular topic (Extracting).

Episodic model

The episodic model was developed by Nicholas J. Belkin.

The episodic model is based largely on intuition and insight and concentrates on interactions with information. There are 4 dimensions which characterize search behavior. These dimensions can be combined in 16 different ways.

  • Method of interaction (scanning/searching)
  • Goal of interaction (learning/selecting)
  • Mode of retrieval (recognition/specification)
  • Resource considered (information/meta-information)

Anomalous state of knowledge (ASK)

ASK was also developed by Nicholas J. Belkin.

An anomalous state of knowledge is one in which the searcher recognises a gap in the state of knowledge. This, his further hypothesis, is influential in studying why people start to search.

  • Thomas Wilson proposed that information behavior covers all aspects of human information behavior, whether active or passive.

Information Seeking behavior is the act of actively seeking information in order to answer a specific query.

Information Searching behavior is the behavior which stems from the searcher interacting with the system in question. This system could be a technological one, such as the searcher interacting with a search engine, or a manual one, such as the searcher selecting which book is most pertinent to their query.

Information Use behavior pertains to the searcher adopting the knowledge they sought.

Information foraging

Developed by Stuart Card, Ed H. Chi and Peter Pirolli.

This model is derived from anthropological theories and is comparable to foraging for food. Information seekers use clues (or information scents) such as links, summaries and images to estimate how close they are to target information. A scent must be obvious as users often browse aimlessly or look for specific information. Information foraging is descriptive of why and not how people search in particular ways.

Life in the round

Developed by Elfreda Chatman.

She defines life in the round as a world of tolerated approximation. It acknowledges reality at its most routine, predictable enough that unless an initial problem should arise, there is no point in seeking information.

Chatman examined this principle within a small world: a world which imposes on its participants similar concerns and awareness of who is important; which ideas are relevant and whom to trust. Participants in this world are considered insiders.

Chatman focused her study on women at a maximum security prison. She learned that over time, prisoner’s private views were assimilated to a communal acceptance of life in the round: a small world perceived in accordance with agreed upon standards and communal perspective. Members who live in the round will not cross the boundaries of their world to seek information unless it is critical; there is a collective expectation that information is relevant; or life lived in the round no longer functions. The world outside prison has secondary importance to inmates who are absent from this reality which is changing with time.

Nicolaisen described four distinct types of information seeking behavior: visceral, conscious, formalized and compromised. The visceral need is expressed as the actual information need before it has been expressed. The conscious need is the need once it has been recognized by the seeker. The formalized need is the statement of the need and the compromised need is the query when related to the information system.

JISC‘s study of the Google Generation detailed six different characteristics of online information seeking behavior;

  • horizontal information seekers
  • navigation
  • viewers
  • squirreling behavior
  • diverse information seekers
  • checking information seekers.

Horizontal information seeking is the method sometimes referred to as “skimming“. An information seeker who skims views a couple of pages, then subsequently follows other links without necessarily returning to the initial sites. Navigators, as might be expected, spend their time finding their way around. Wilson found that users of e-book or e-journal sites were most likely spend, on average, a mere four to eight minutes viewing said sites. Squirreling behavior relates to users who download lots of documents but might not necessarily end up reading them. Checking information seekers assess the host in order to ascertain trustworthiness. The bracket of users named diverse information seekers are users whose behavior differs from the above sectors.

Sensemaking

Brenda Dervin developed the concept of sensemaking. Sensemaking considers how we (attempt to) make sense of uncertain situations.] Her description of Sensemaking consisted of the definition of how we interpret information to use for our own information related decisions.

Brenda Dervin described sensemaking as a method through which people make sense of their worlds in their own language.

Dervin (1983): sense-making is implemented in terms of four constituent elements – a situation in time and space, which defines the context in which information problems arise; a gap, which identifies the difference between the contextual situation and the desired situation (e.g. uncertainty); an outcome, that is, the consequences of the sense-making process, and a bridge, that is, some means of closing the gap between situation and outcome. Dervin presents these elements in terms of a triangle: situation, gap/bridge, and outcome,

Zipf’s Principle of least effort

This explains that information seekers prioritise the most convenient path to acceptable information.

2.Kuhlthau’s Information Search Process Model (1991) Steps: Initiation – Selection – Exploration – Formulation – Collection – Presentation (Search closure) [STAGE]

ACTIVITY: Recognize – Identify/Formulate – Gather – Complete

  1. Wilson’s Model: Context of Information Need: Environment – Social Role – Person: Physiological, Effective and Cognitive State. Barriers: Personal – Role Related – Environmental.
  2. Wilson’s Nested Model: Information Behaviour – Information Seeking Behaviour – Information Search Behaviour
  3. Wilson’s Extended Model (1995, 1999, 1st model – 1981): Context of Information Need – Activating Mechanism (Stress/Copying Theory) – Intervening Variables (Psychological, Demographic, Role Related/Interpersonal, Environmental, Source Characteristics) – Activating Mechanism (Risk/Reward Theory Social Learning Theory, Self Efficacy) – Information seeking Behaviour (Passive attention, Passive search, Active attention, Ongoing search)]

Krikelas (1983), Dervin (1983), Leckie, Pettigrew and Sylvain (1996), Savolainen (1995), Johnson (1997) and Sonnenwald &Livonen (1999)

Information seeking behavior refers to the way people search for and utilize information. The term was coined by Wilson in his 1981 paper.

A variety of theories of information behavior – e.g. Zipf‘s principle of least effort, Brenda Dervin‘s sensemaking, Elfreda Chatman‘s life in the round – seek to understand the processes that surround information seeking.

 

  1. Arrange in sequence the evolution of reference service:
  • Reference work with subject specialization.
  • Aid Reader/Assistance to Reader
  • Long Range Reference Service
  • ‘Personal relation between librarians and readers’

Ans. (3) (d), (b), (a), (c)

 

  1. Arrange the following class numbers according to Colon Classification, 6th edition
  • 2 (b) 2 Ob T (c) 2 ‘N (d) 2k

Ans. (2) (a), (b), (d) and (c)

 

  1. Arrange in sequence the following phases of disaster planning according to guidelines/principles of IFLA:
  • Preparedness (b) Prevention (c) Recovery (d) Response

Ans. (2) (b), (a), (d), (c)

[The National Governor’s Association designed a phase of disaster model to help emergency managers prepare for and respond to a disaster, also known as the ‘life cycle’ of comprehensive emergency management. The four phases of disaster: 1) mitigation; 2) preparedness; 3) response; and 4) recovery. IFLA: 1) Prevention; 2) preparedness; 3) response; and 4) recovery]

 

  1. Arrange the following bibliographic utilities according to their year of origin:
  • Ohio College Library Center (b) Washington Library Network (c) UTLAS (d) RLIN

Ans. (2) (a), (c), (d), (b)

[OCLC – 1967

WLN –  1976

RLIN – 1974]

 

  1. Arrange the steps of Big 6 skill information literacy model in correct order as given by M.Eisenberg and B.Berkowitz.
  • Evaluation (b) Location and Access (c) Information seeking strategies (d) Synthesis

Ans. (3) (c), (b), (d), (a)

STEP 1:Task Definition

STEP 2:Information Seeking strategies

STEP 3:Location and Access

STEP 4:Use of information

STEP 5:Synthesis (Putting Puzzle together)

STEP 6:Evaluation

 

  1. Arrange the following committees according to their year of constitution:
  • Committee on National Network System for University Libraries
  • P.Sinha Committee
  • Review Committee on Library and Information Science
  • P.Chattopadhyaya Committee on National Policy of Library and Information Services.

Ans. (1) (b), (c), (d), (a)

 

[(a) 1988 [INFLIBNET]

  • 1957
  • 1961
  • 1986]

 

Sl. No.             Committees/Commissions                      Year               Chairman

1       Library Committee                            1957    Dr. S.R.Ranganathan

2       Review Committee on Library Science         1961    Dr. S.R.Ranganathan

3       Education Commission                        1961    Prof.D.S.Kothari

4       Mehrotra Committee                          1983    R.C.Mehrotra

5       D.P.Chattopadhyay Committee                 1986    D.P.Chattopadhyay

6       Committee on National Network System

For University Libraries                        1988    Yash Pal

7       Curriculum Development Committee on

Library and Information Science               1990    Prof.P.N.Kaula

8       UGC Model Curriculum: Lib. & Inf. Sc.           2001    Dr.C.R.Karisiddappa]

 

  1. Arrange in sequence the following components of Tom Wilson’s Expanded Model in sequential order of their occurrence:
    • Information seeking behavior (b) Context of information need (c) Passive attention and search (d) Intervening variables

Ans. (1) (b), (d), (a), (c)

 

  1. Match the following:

List – I                                                  List – II

  • David Ellis                                   (i)         Process
  • James Krikelas                         (ii)        Complex
  • Tom Wilson                                  (iii)       Descriptive
  • Alan Foster                             (iv)       Cognitive

Ans. (3) a – iii, b – I, c – iv, d – ii

 

  1. Match the following:

List – I                                                                    List – II

  • Quality Trilogy Process                                                (i)         Philip B. Crosby
  • Quality Management Maturity Grid                                   (ii)        Complex
  • Tom Wilson                                                             (iii)       Descriptive
  • Alan Foster                                                             (iv)       Cognitive

Ans. (1) a– iii, b – i, c – ii, d – iv

 

  1. Match the following:

List – I                                                                    List – II

  • Maslow, A                                                   (i)         Two factor theory
  • Alderfer, C.P.                                                    (ii)        Acquired-needs theory
  • Frederick Herzberg                                              (iii)       ERG Theory
  • David Mcclelland                                         (iv)       Hierarchy of needs

Ans. (3) a– iv, b – iii, c – i, d – ii

 

  1. Match the following:

List – I                                                                    List – II

  • Instagram                                                    (i)         Facebook
  • Facetime                                                          (ii)        Apple
  • Tumbir                                                    (iii)       Google
  • Picasa                                                     (iv)       Yahoo

Ans. (2) a– i, b – ii, c – iv, d – iii

 

  1. Match the following:

List – I                                                                    List – II

  • Crowd Funding             (i)         Public assistance through donations
  • Crowd sourcing             (ii)        Collaborative milieu of knowledge dissemination
  • Hathi Trust                    (iii)       Re-setting priorities due to financial constraints
  • Social and Cultural hubs   (iv)       Collaborative huge collection of digital resources

 

Ans. (2) a– i, b – iii, c – iv, d – ii

 

  1. Match the following:

List – I                                                                    List – II

  • Portico                (i)   Preserves scholarly publications in dark archives to be accessed under

emergent situation

  • Lockss                   (ii) Non-profit service that allows libraries to collect e-contents for digital

preservation

  • Clockss               (iii) Non-profit digital preservation service for participating libraries
  • Chorus                (iv) Clearinghouse for the open resources of the U.S.

 

Ans. (2) a– iv, b – iii, c – ii, d – i

 

  1. Match the following Library Automation Software Products with their corresponding developers:

List – I                                                                    List – II

  • Genesis G4                                         (i)         Innovative Interfaces
  • VERSO                                          (ii)        ExLibris
  • Aleph                                                   (iii)       Auto Graphics
  • Millennium                                      (iv)       Library Resource Management System

Ans. (1) a– iv, b – iii, c – ii, d – i

 

  1. Match the following Gateways with their corresponding subjects:

List – I                                                                    List – II

  • AHDS                                     (i)         Urban Design

(b)  ALTIS                                 (ii)        Forestry Food, Veterinary & Agricultural Sciences

(c)  NOVAGate                              (iii)       Hospitality, Leisure, Sports & Tourism

(d)  RUDI                                   (iv)       Arts and Humanities

 

Ans. (3) a– iv, b – iii, c – ii, d – i

 

  1. Match the following:

List – I                                                                    List – II

  • Meta-analysis             (i) The most theoretical form of desk research, clarify

terms, concepts

  • Conceptual analysis      (ii) To assess the extent to which concepts and issues are

mentioned or not

  • Content analysis            (iii) Quantitative methods for describing and analysis

patterns of recorded communication

  • Bibliometric analysis       (iv) Quantitative data by statistical analysis

Ans. (2) a– iii, b – ii, c – i, d – iv

 

  1. Match the following:

List – I                                                                    List – II

  • Nominal Scale                             (i)  Places events in order and exhibits their relation
  • Ordinal Scale                             (ii) Classifies objects/Observations
  • Ratio Scale                            (iii) Involves judges to rank items into categories
  • Differential Scale                      (iv) Represents the actual amount of variable –

theoretically unobtainable

Ans. (4) a– iv, b – iii, c – ii, d – i

 

  1. Match the following:

List – I                                                              List – II

  • Impact Factor                     (i)  Cited during the current year
  • SNIP                                 (ii) Duration of citations to article in a journal
  • Immediacy factor                 (iii) Cited during the recent two years
  • Cited Half Life                    (iv) Citation based on the number of citations in a field

Ans. (2)  a– i, b – iii, c – ii, d – iv

 

  1. Match the following:

List – I                                                                    List – II

  • Systematic Sample                   (i) Population specified by traits, discretionary and

inexpensive

  • Stratified Sample                     (ii) Scattered population
  • Cluster Sample                           (iii) Heterogeneous population
  • Quota Sample                        (iv) Too large population

Ans. (1) a-iv, b – iii, c – ii, d – i

 

  1. Match the following:

List – I                                                                    List – II

(a)  Ibid                                                 (i) See

  • Cit.                                                       (ii) Previously used reference
  • Cit.                                                 (iii) Same reference cited immediately above
  • Vide                                                          (iv) Same page cited (in the place cited)

Ans. (1) a-iii, b – iv, c – ii, d – i

 

  1. Match the type of services suitable for the queries given below:

List – I                                                                    List – II

  • Alert service                         (i)  Can I have details of Lok Sabha elections 2009
  • Documentation service               (ii)  Who won Wimbledon Singles in 2015?
  • Retrospective search service         (iii) Let me know the forthcoming conferences on Green Libraries?
  • Reference service                         (iv) Let me have a comprehensive list of articles published on genome in 2016

Ans. (4) a-iii, b – iv, c – I, d – ii

 

  1. Match the following:

List – I                                                                    List – II

  • A.Katz                                     (i)  Documentation and Information
  • Guha                                         (ii)  Introduction to reference work 2 V.
  • Seetharama                                (iii) Documentation and its faets
  • R.Ranganathan                                (iv) Information consolidation and repackaging:Framework,                                           Methodology, Planning

Ans. (3) a-ii, b – i, c – iv, d – iii

 

  1. Match the following:

List – I                                                  List – II

  • Literary Warrant (i)  Melvil Dewey
  • Alternative location (ii)  E.Bliss
  • Decimal fraction notation (iii) S.R.Ranganathan
  • Seminal mnemonics (iv) E.W.Hulme

Ans. (1) a-iv, b – ii, c – i, d – iii

 

  1. Match the following symbols/signs used in UDC standard edition:

Sign/Symbols                                   Meaning

  • Double arrow                                       (i) Examples of combination

 

 

  • Diamond                                         (ii) Including
  • Square                                           (iii)See also
  • ~=    Approximately equal to                       (iv) subdivide as

Ans. (1) a-iii, b – i, c – ii, d – iv

 

  1. Match the following:

List – I                                                                          List – II

  • The Crisis in Cataloguing                         (i)  Michael Gorman
  • Headings and canons: Comparative              (ii)  Raymond Knox Olding

Study of Five cataloguing Codes

  • Our Enduring Values: Librarianship               (iii) Andrew D.Osborn

In the 21st Century

  • Readings in library cataloguing                        (iv) S.R.Ranganthan

Ans. (1) a-iii, b – iv, c – i, d – ii

 

  1. Assertion (A): ‘Information Economy’ which is based on the premise that, information has economic value and as such requires an ‘Information market Place’ in which such value can be exchanged, holds no good in the contemporary information age.

Reason (R): Information as a valuable resource occupies a slum dwelling in the town of economics, as this economic reality runs counter to the popular and historic notion that, “information is free”.

Ans. (1) (A) is true, but (R) is false.

 

  1. Assertion (A): Libraries should serve as a local serve as a local centre of information and knowledge and be a local gateway to national and global knowledge.

Reason (R): Libraries must modernize their collection, services and collaborate with other institutions to develop a community-based information system.

Ans. (3) Both (A) and (R) are true.

 

  1. Assertion (A): Some modern users are quite apprehensive about virtual reference service chat.

Reason (R): They fear negative judgements from librarians and advisors arising from the content of the chat transcript.

Ans. (3) Both (A) and (R) are true.

 

  1. Assertion (A): In recent years, the explosion of information in electronic format has placed a significant burden on the small public libraries.

Reason (R): E-resources are expensive, both in licensing cost and in the technology needed to support them to which small public libraries can hardly afford.

Ans. (2) (A) is false, but (R) is true.

 

  1. Assertion (A): In the digital environment, the University libraries in India need not build their reference collection.

Reason (R): ‘Question Point’ of OCLC provides a complete virtual reference management system for subscription.

Ans. (2) (A) is false, but (R) is true.

 

  1. Assertion (A): Libraries market their products and services to overcome the problems of under-utilization of their information resources and services.

Reason (R): Libraries are under-utilized because they do not provide access to electronic resources.

Ans. (2) (A) is false, but (R) is true.

 

  1. Assertion (A): In RDA the ‘rule of 3’, to provide upto three authors, is now the main instruction.

Reason (R): RDA does not encourage access to the names of persons and corporate bodies important to the users.

Ans. (4) Both (A) and (R) are false.

 

  1. Assertion (A): Application of six sigma in library management is a quality programme that improves customers’ experience and lower costs.

Reason(R): Six phases of sigma are necessary in all library operations.

Ans. (3) Both (A) and (R) are true.

 

  1. Assertion (A): A library needs to generate a satisfied customer base which is supportive of library programmes.

Reason (R): If a library’s resources and services are measured upto customer’s expectations, then repeat use cannot be ensured.

Ans. (1) (A) is true, but (R) is false.

 

  1. Assertion (A): Podcasting, once an obscure method of spreading information, has become a recognized medium for distributing audio contents – be it corporate or for personal use.

Reason (R): Podcasts, though similar to radio programs, are primarily audio files which the listeners can play at their convenience, using devices that have become more common than portable broadcast receivers.

Ans. (3) Both (A) and (R) are true.

 

  1. Assertion (A): Open-ended questions are suitable to glean more and candid information from the respondents seeking on a specific aspect.

Reason (R): Open-ended questions provide an opportunity to go beyond the closed option of ‘yes’ or ‘no’ as it enables to express one’s own ideas more candidly.

Ans. (2) Both (A) and (R) are true.

 

  1. Assertion (A): An information literate generally has the potential to determine the nature and extent of the information needed.

Reason (R): An information literate can define and articulate the need better than an information illiterate.

Ans. (3) Both (A) and (R) are true.

 

  1. Assertion (A): Majority of State Public Library Acts enacted from 1990s have provision for Library fund with contributions from State and Central Governments.

Reason (R): Library Cess is inadequate to manage public libraries.

Ans. (2) (A) is false, but (R) is true.

 

  1. Assertion (A): Most of the LIS professionals in India are yet to recognize fully the significance of Web-based OPAC services.

Reason (R): Although some libraries in India have started to develop their own websites and portals with enhanced features of Web-based OPACs, but none of these libraries are yet to have their library page and lack federated search facilities.

Ans. (1) (A) is true, but (R) is false.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *