LIBRARY AND INFORMATION SCIENCE
September 2013
Note : This paper contains seventy five (75) objective type questions of two (2) marks each.
All questions are compulsory.
1. Which one of the following is not the feature of H-index ?
(A)
Mathematically simple index
(B)
Applied to any level of aggregation
(C)
Publication that are hardly ever cited don’t influence it.
(D)
Sensitive to performance change.
2. An Application Program Interface
(API)
language is used for
(A)
Network Management
(B)
Graphical user Interface
(C)
Relational Interface in Data
Base
Management
(D)
Database Management System
3. The correlational coefficient is
(A)
A strength of relationship between two
variables.
(B)
A typical relationship between two variables.
(C)
A linear relationship between two variables.
(D)
Non-linear relationship between two variables.
4. The following is a collaborative network of Reference
Librarians
(A)
Worldcat
(B) INDEST
(C)
Question point (D) Global scholar
5. Which of the following is not a synchronous virtual
reference service ?
(A)
Chat (B) E-mail
(C)
Video-conferencing (D) Voice over
IP
6. Which of the bibliometric law describes the frequency of
publications by author ?
(A)
Zipf’s law
(B)
Bradford’s law
(C)
Lotka’s law
(D)
None of the above
7. Indian patents on all areas are published in
(A)
India : A reference annual
(B)
Indian chemical patent index
(C)
Gazette of India, Part-III
(D)
None of the above
8. Which of the following does not protect intellectual
property ?
(A)
Encryption of data (B) Digital watermark
(C)
Uniquely encoded licences
(D) Plug-ins
9. “World directory of sources of Patents” is published by
(A)
Bowker-Saur, U.S.A.
(B) WIPO
(C)
Patent Information System, India (D) Derwent, London
10. ‘Web of Science’ covers
(A)
Sciences
(B) Social Sciences
(C)
Arts of Humanities
(D) All the above
11. What does encrypting a file mean ?
(A)
Set the read only property
(B) Hiding the file
(C)
Set a password (D) Scrambling the contents
12. Which of the following identifies user by a login permission
to a licensed site.
(A)
Authorization (B) Authentication
(C)
Digital signature (D)
All of the above
13. Papyras was used as a writing material by
(A)
Summarians (B) Italians (C) Egyptians (D) Assyrians
14. The intrinsic value of information lies in its
(A)
Procurement
(B) Processing and Storage
(C)
Communication and Retrieval
(D) Usage
15. Identification of an e-article and paying for full-text is
known as
(A)
Pay-per-view (B) Consortium (C) Campus license (D) E-subscription
16. Which of the following web resource for LIS has been
compiled by academic librarians of universities of California ?
(A)
Infomine (B)
Internet Public Library
(C)
Internet Library for Librarians
(D) Current Informed Librarian
17. Who said, “Public Library is the responsibility of Local and
National Authorities. It must be supported by specific legislation and financed
by National and Local Govnerments” ?
(A)
S.R. Ranganathan
(B) Gopala Rao Ekbote
(C)
Sinha Committee
(D) UNESCO Manifesto
18. The formula K(S) + ΔI = K(S + ΔS)
for summation of information is propounded by
(A)
Claude Shannon
(B) George Gerbner
(C)
Charles Osgood
(D) Mandy Brooks
19. ‘Library Technology Project (LTP) Reports’ are published by
________.
(A)
ILA (B) ALA (C) CILIP (D) SLA
20. Which Education Commission observed “Nothing can be more
damaging to a growing department than to neglect its library or give it a low
priority” ?
(A)
Kothari Education Commission
(B)
Radhakrishnan Education Commission
(C)
Calcutta University Commission
(D)
Mudaliar Commission on Secondary Education
21. International Advisory Committee on Documentation, Libraries
and Archives (UNESCO) was established in
(A)
1966 (B) 1967 (C) 1968 (D) 1969
22. Which law of Library Science states that information is
basic input to human growth and development ?
(A)
Fourth Law (B) Third Law (C) Second Law (D) Fifth Law
23. “Pro Quest” is ________.
(A)
Traditional Commercial Publisher
(B)
Scholarly Society Publisher
(C) Electronic Aggregator
(D)
Publisher of Higher Learning Institutions
24. Which of the following is/are part(s) of classified
catalogue ?
(A)
An author-title file
(B)
Subject file arranged by library classification
(C)
An alphabetical index to the subject file
(D) All of the above
25. The main components of an RFID system include
(A)
Handheld Reader, RFID label printer, server and External book return
(B) RFID tags, readers or sensors,
Antenna and server
(C)
RFID label printer, sensors, antenna and server
(D)
RFID tags, server, external book return, sensors
26. Which of the following is not the component of a search
engine ?
(A)
Spider
(B) Index
(C)
Search of retrieval mechanism
(D) Natural language technique
27. ‘Communities’ is a component of following digital library
software
(A)
GSDL (B) D space
(C)
Fedora (D) i-core
28. Which one of the following is not an operation involved in
quality circles ?
(A)
Problem identification
(B)
Problem selection
(C)
Solution recommendation
(D) Problem shifting
29. In a database table, the category of information is called
_______.
(A)
Tuple (B) Field (C) Record (D) All the above
30. The web address that acts as permanent identifier is ______.
(A)
URL (B) DOI (C) PURL (D)
UDI
31. Who developed the sense making approach for human information
behaviour which is implemented in terms of four constituent elements ?
(A)
T.D. Wilson
(B) B. Dervin
(C)
D. Ellis
(D) C.C. Kuhlthau
32. MARC records contain
(i)
Description of library materials
(ii)
Searchable headings
(iii)
Elements to organize collection
(iv)
List of index terms
Codes :
(A) (i), (ii), (iii) are correct.
(B)
(ii), (iii), (iv) are correct.
(C)
(iii), (iv), (i) are correct.
(D)
(iv), (i), (ii) are correct.
33. RDBMs are advantageous as they :
(i)
Manage and Maintain
(ii)
Represent data in the form of tables
(iii)
Facilitate handling of objects rather than records
(iv)
Are developed with mathematic theory of relations
Codes :
(A)
(i), (iv) are correct.
(B)
(ii), (iii) are correct.
(C) (ii), (iv) are correct.
(D)
(iii), (iv) are correct.
34. When a library is planning for a new building project, which
of the
following
technique|(s) is|are applicable to the plan and control the complex, long-term
project ?
(i)
PERT (ii) TQM (iii) CPM (iv) MBO
Codes :
(A) (i) and (iii) are correct.
(B)
(ii) and (iii) are correct.
(C)
(i) and (iv) are correct.
(D) (ii) is
correct
35. Which of the following leadership style(s) are suitable for
change management with persuation and inclusiveness ?
(i)
Authority
(ii) Systems of Management
(iii)
Contingency (iv)
Management
Codes :
(A)
(i), (ii) are correct.
(B)
(ii), (iii) are correct.
(C) (ii), (iv) are correct.
(D)
(ii) is correct.
36. Arrange in sequence, the steps in programming :
(i)
Program code
(ii) Program Documentation
(iii)
Program test
(iv) Program design
Codes :
(A)
iii ii i iv
(B) iv i iii ii
(C)
iv iii ii i
(D)
ii iv i iii
37. Which of the following is/are the major activities/services
of a library and networks in India ?
(i)
Consortium purchase
(ii)
Indexing of Internet resources
(iii)
Document delivery
(iv)
Staff training
Codes :
(A) (i), (iii), (iv) are correct.
(B)
(ii), (iii), (iv) are correct.
(C)
(i), (ii), (iii) are correct.
(D) (i),
(ii), (iii), (iv) are correct.
38. The normal curve in a distribution is
(i)
Symmetrical, bell shaped continuously curve
(ii)
Asymmetrical, bell shaped continuously curve
(iii)
Symmetrical, bell shaped curve which does not touch the ‘X’ axis
(iv)
Bell shaped curve
Codes :
(A)
(i) and (iv) are correct.
(B) (i) and (iii) are correct.
(C)
(ii) and (iv) are correct.
(D)
(i) is correct.
39. Arrange the following MARC formats in order of year of their
emergence :
(i)
CAN MARC (ii) US MARC (iii) LC MARC (iv) MARC 21
Codes :
(A)
i ii iii iv
(B)
ii iii iv i
(C) iii i ii iv
(D)
iv ii iii i
40. Arrange in sequence the following committees in order of
that year of commencement :
(i)
Library Committee
(ii)
Committee on national network system for university libraries
(iii)
Review committee on Library Science
(iv)
Curriculum Development Committee on Library and Information Science
Codes :
(A)
i ii iii iv
(B)
iii iv ii i
(C)
iii ii i iv
(D) i iii ii iv
41. Match the following :
List – I
List – II
a.
Every unit of population has equal chance of being selected i. Systematic sampling
b.
Every nth case
is selected from the list of population ii. Cluster sampling
c.
Units are randomly selected from the subgroups iii. Random
sampling
d.
Geographic area based units iv. Stratified
sampling
Codes :
a
b c d
(A)
i iv iii ii
(B)
iv ii i iii
(C) iii i iv ii
(D)
ii iii iv i
42. Match the following :
List – I
List – II
a.
Approach of measuring two opposite sets of items i. Semanticdifferential
scale
b.
Approach of measurement yielding a single score ii. Cumulative scale
c.
Approach of measurement adopting bipolar objective rating to study a social
phenomenon
iii. Sociometric scale
d.
Approach to measure interaction pattern among close associates in a variety of
groups
iv.
Summated scale
Codes :
a
b c d
(A)
ii iii i iv
(B)
iii i iv ii
(C)
i ii iv iii
(D) iv ii i iii
44. Match the following :
List – I List –
II
a.
Algorith
i. Instruction to the computer
b.
Flow charts
ii. Debugging
c.
Program code
iii. Pictorially represented direction lines
d.
Program test
iv. Set of explicit and finite steps
Codes :
a
b c d
(A)
ii iii iv i
(B)
iii i iv ii
(C) iv iii i ii
(D)
i ii iv iii
45. Match the following :
List – I
List – II
a.
Cumulative Book Index i. D.K.
Publishers & Distributors
b.
Publisher’s weekly
ii. Whitaker
c.
Publishing in India
iii. Wilson
d.
Book seller
iv. R.R. Bowker
Codes :
a
b c d
(A)
ii i iv iii
(B) iii iv i ii
(C)
i iii ii iv
(D) iv ii i
iii
46. Match the following :
List – I
List – II
a.
INDESTAICTE
i. Centrally funded
b.
CSIR consortia
ii. Open
c.
UGC Infonet
iii. Shared Budget
d.
IIM consortia
iv. Closed group
Codes :
a
b c d
(A) ii iv i iii
(B)
i iii ii iv
(C)
iii ii iv i
(D)
iv iii i ii
47. Match the following :
List – I
List – II
a.
Special library i.
Provides bibliographical services
b.
Public library
ii. Conservation of knowledge
c.
National library iii.
Popularisation of Govt. information
d.
Academic library iv. Critical compilation
Codes :
a
b c d
(A)
i iii iv ii
(B)
ii iv i iii
(C)
iii iv i ii
(D) iv iii i ii
48. Match the following language and their function :
List – I
List – II
a.
Procedural
i. Scan arbitrary files and extra information
b.
Special purpose ii.
Manipulate data and change memory
c.
Practical extraction report iii. Create documents to view with
web server
d.
Hyper text mark up iv. Data base
queries
Codes :
a
b c d
(A) ii iv i iii
(B)
i iii ii iv
(C)
iii iv i ii
(D)
ii iii iv i
49. Match the following :
List – I List
– II
a.
Information over load i. Indexing and
abstracting
b.
Variation in quality and reliability
ii. Translation
c.
Multiplicity of language
iii. Reviews and digests
d.
Information scatter iv. Alert
services
Codes :
a
b c d
(A)
i ii iii iv
(B) iv iii ii i
(C)
ii iv iii i
(D) iii i
ii iv
50. Match the following :
List – I List – II
a.
Coding
i. Received signal not the one transmitted
b.
Noise
ii. Measure of closeness of relationship
c.
Entropy
iii. Message to a signal
d.
Equivocation iv.
Measure of uncertainty
Codes :
a
b c d
(A)
iv ii iii i
(B)
ii iii iv i
(C)
i ii iii iv
(D) iii i iv ii
51. Match the following :
List – I
List – II
a.
Information Theory i. Ogden
and Richards
b.
Theory of Signs ii.
Locke
c.
Triadic Relationships iii. Shannon
d.
Doctrine of Signs iv.
Morris
Codes :
a
b c d
(A)
ii iii iv i
(B) iii iv i ii
(C)
i iii iv ii
(D)
ii i iii iv
52. Match the following :
List – I List
– II
a.
Intra-Facet Relation i. S
: 5210t3
b.
Intra-Array Phase Relation ii. Q 20 m4
c.
Intra-Facet Phase Relation iii. SO b2
d.
Inter-Subject Phase Relation iv. X.440j56
Codes :
a
b c d
(A) iv i ii iii (B) iv ii iii I (C) ii iii i iv
(D) i iv iii ii
53. Match the following :
List – I
List – II
a.
Organisational chart
i. Identification of responsibility for specific tasks
b.
Flow charts ii.
Examine specific detailed procedure
c.
Activity charts
iii. Division of responsibility & functions
d.
Decision table
iv. Diagrams composed of symbols and directional lines
Codes :
a
b c d
(A)
i iv ii iii (B) ii iii iv I (C) iii iv i ii
(D) iv ii iii i
54. Match the following :
List – I
List – II
a.
Information should be as accurate as possible
i. Broadus
b.
Get the best title on any subject but add midiocres that are well read. ii. Haines
c.
Know the community’s character and interest
iii. McColvin
d.
Consider the duration as well as intensity of the demand iv. Drury
Codes :
a
b c d
(A) iii iv ii I (B) ii iii i iv (C) i ii iv iii (D) iv i
iii ii
55. Match the functions performed by
different
layers of OSI model :
List – I
List – II
a.
Delivery of Packets from source of destination i. Application layer
b.
Data transmission rate
ii. Data link layer
c.
Access to network resources
iii. Network layer
d.
Provide hop-topop delivery
iv. Physical layer
Codes :
a
b c d
(A)
i iii ii iv (B) ii iv i
iii (C) iii iv i ii (D) iii i iv ii
56. Match the following :
List – I
List – II
a.
Gender i.
Dependent variable
b.
Information Technology ii. Variable
c.
Usership in libraries iii.
Binomial variable
d.
Logical set of attributes iv.
Independent variable
Codes :
a
b c d
(A)
i iv ii iii (B) iii iv i ii (C) ii i iv iii (D) iv iii ii i
57. Match the following :
List – I List –
II
a.
The assessment device that appears to measure the subject matter it purports
to i. Content validity
b.
The assessment device in which individual’s test score predicts the probable
behavior on a second variable ii.
Construct validity
c.
The assessment device which adequately measures the major dimensions of the
behavior under consideration
iii. Criterionrelated validity
d.
The assessment device which appears to measure the general elements it purports
to measure
iv. Face validity
Codes :
a
b c d
(A)
i ii iv iii (B) ii i iii iv (C) iv iii i ii (D) iii i ii iv
58. Match the following :
List – I
List – II
a.
Behaviour studies i. Extent of use of
facilities/services
b.
Use studies
ii. Pattern of Science communication
c.
User studies
iii. Interaction of user with communication system
d.
Information flow studies iv. Use of communication medium
Codes :
a
b c d
(A)
i iv ii iii (B) iii iv i ii (C) ii iii i iv (D) ii iv iii i
59. Match the following :
List – I
List
– II
a.
National Library of the World i. Wilfred
Ashworth
b.
Special Libraries
ii. L.J. Strauss
c.
Scientific and Technical Libraries iii. A. Esdaile
d.
Handbook of Special Libraries iv. C.M. Lewis
Codes :
a
b c d
(A)
i iv iii ii (B) ii iii iv I (C) iii iv ii I
(D) iv ii iii i
60. Match the following :
List – I
List – II
a.
Halftone
i. Translate instructions from original software to new platforms
b.
Threshold ii. Imaging with varying
densities
c.
Emulation
iii. Transfer of digital materials
d.
Migration
iv. Minimum level to detect a signal
Codes :
a
b c d
(A)
i iii iv ii (B) iii ii iv I (C) ii iv i iii (D) ii i iii iv
61. Assertion
(A) : Colon classification is the most
successful classification schemes in India.
Reason (R) : The most important factor behind the success of any classification
scheme is the revision and publication of different editions at regular
intervals.
Codes :
(A)
Both (A) and (R) are true.
(B)
(A) is true but (R) is false.
(C) (A) is false but (R) is true.
(D)
Both (A) and (R) are false.
62. Assertion
(A) : Proliferation of LIS schools in India
produced mediocre professionals.
Reason (R) : Curriculum and teaching techniques have not been upgraded at
university level.
Codes :
(A) Both (A) and (R) are partially
true.
(B)
Both (A) and (R) are false.
(C)
(A) is true and (R) is false.
(D)
(A) is false and (R) is true.
63. Assertion
(A) : Several Library Science departments in
India have shifted to integrated MLIS program.
Reason (R) : MLIS Program (integrated) is a right solution to knowledge
explosion in the field.
Codes :
(A)
Both (A) and (R) are false.
(B) (A) is true and (R) is false.
(C)
Both (A) and (R) are true.
(D) (A) is
false and (R) is true.
64. Assertion
(A) : UGC is financially supporting all
academic libraries.
Reason (R) : UGC is primarily responsible for the overall development of
libraries of higher education in India.
Codes :
(A) (A) is false and (R) is true.
(B)
(A) is true and (R) is false.
(C)
Both (A) and (R) are true.
(D)
Both (A) and (R) are false.
65. Assertion
(A) : The entire scholarly publishing system
is in danger of eroding due to increasing influence of predatory publishing.
Reason (R) : Many prey on Junior researchers and graduate students with
personalized messages praising their earlier work and inviting them to submit a
new manuscript.
Codes :
(A)
(A) is true but (R) is false.
(B)
(A) is false but (R) is true.
(C)
Both (A) and (R) are false.
(D) Both (A) and (R) are true.
66. Assertion
(A) : Metrics based evaluation is not
suitable for assessing research performance of individual.
Reason (R) : Construction of citation profiles depend upon the databases
used.
Codes :
(A) Both (A) and (R) are true.
(B)
Both (A) and (R) are false.
(C)
(A) is true, but (R) is false.
(D) (A) is
false, but (R) is true.
67. Assertion
(A) : Effective methods of communicating in
H.R. Management of libraries still remains elusive.
Reason (R) : The management do not have the needed direction of approach,
precision of thoughts and their expression and empathy.
Codes :
(A)
(A) is true, (R) is false.
(B)
Both (A) and (R) are false.
(C)
(A) is true, (R) is partially true.
(D)
(A) is false, (R) is true.
68. Assertion
(A) : UDC is used in subject gateways for
resource discovery with high recall.
Reason (R) : In online environment, a faceted scheme has a distinct
advantage over an enumerative one.
Codes :
(A) (A) is true but (R) is false.
(B)
(A) is true, (R) is partially true.
(C)
(A) is false, (R) is true.
(D)
(A) is partially true, (R) is true.
69. Assertion
(A) : MARC should never be used outside the
context of the cataloguing rules.
Reason (R) : MARC is simply a coding scheme for entering bibliographic
information into computer records.
Codes :
(A)
Both (A) and (R) are true.
(B)
(A) is true but (R) is false.
(C)
(A) is false but (R) is true.
(D) Both
(A) and (R) are false
70. Assertion
(A) : Library Associations in India striving
hard for the enactment of Library Acts.
Reason (R) : Library Acts help in systematic development of libraries.
Codes :
(A)
Both (A) and (R) are true.
(B)
Both (A) and (R) are false.
(C)
(A) is true, (R) is false.
(D) (A) is false, (R) is true.
71. Assertion
(A) : It is a time to separate the copyright
issues for scholarly works from entertainment works.
Reason (R) : The scholarly works are public funded fact based,
collaborative and intellectual heritage of the institution.
Codes :
(A)
(A) is false and (R) is true.
(B) Both (A) and (R) are true but (R) is not
the correct explanation of (A).
(C)
Both (A) and (R) are false.
(D)
(A) is true but (R) is false.
72. Assertion
(A) : With quick and comprehensive
availability of informative through internet resources, need for reference
service with a human touch is decreasing.
Reason (R) : Internet resources can satisfy all types of information
needs of information seekers.
Codes :
(A) (A) is true and (R) is false.
(B)
Both (A) and (R) are false.
(C)
(A) is false and (R) is true.
(D) (A) and
(R) are true.
73. Assertion
(A) : Scholar frequency to visit academic
libraries has decreased tremendously over the period of last two decades.
Reason (R) : E-scholarly resources are easily accessible to everyone from
anywhere anytime.
Codes :
(A)
Both (A) and (R) are true.
(B)
Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D)
(A) is false, but (R) is true.
74. Assertion
(A) : H-index lacks sensitivity to
performance changes.
Reason (R) : It can never decrease and is insensitive to number of
citations received.
Codes :
(A)
Both (A) and (R) are false.
(B) Both (A) and (R) are true.
(C)
(A) is true but (R) is false.
(D)
(A) is false, but (R) is true.
75. Assertion
(A) : Z 39.50 standard protocol enables
communication among networked computers through a single search interface.
Reason (R) : Z 39.50 application in library consortia environment can
enhance resource sharing.
Codes :
(A) Both (A) and (R) are true.
(B)
Both (A) and (R) are false.
(C)
(A) is true and (R) is false.
(D) (A) is
false and (R) is true.
No comments:
Post a Comment