Search Anything Related to UGC NET Examination

2017 November CBSE UGC NET Solved Question Paper 3 in LIS

The UGC NET Examination solved question Paper-3 of 5th November, 2017 in Library and Information Science (LIS) is given below. The answer keys of the paper-III of UGC NET Exam in LIS provided below are as per the answer keys released by UGC / CBSE.

1. Identify the author of “Essays of an Information Scientist” from among the following.
(1) F.W. Lancaster
(2) Derek J. de Solla Price
(3) Eugene Garfield
(4) B.C. Vickery
Answer: (3)

2. Who has coined the term “Information Society” from the following?
(1) B.C. Brookes
(2) Fritz Machlup
(3) B.C. Vickery
(4) N.J. Belkin
Answer: (2)

3. Dance’s Helical Spiral Communication model is a-
(1) Classical
(2) Linear
(3) Non-Linear
(4) Multi-dimensional
Answer: (3)

4. What was the theme of IFLA World Library and Information Congress 2017?
(1) Connections. Collaboration. Community
(2) Dynamic Libraries: Access, Development and Transformation
(3) Libraries, Citizens, Societies: Confluence of knowledge
(4) Libraries. Solidarity. Society
Answer: (4)

5. Which of the following is a collaborative network of Reference Librarians?
(1) World Cat
(2) eSS
(3) Question Point
(4) Google Scholar
Answer: (3)

6. Resource Description and Access (RDA) is divided into how many sections?
(1) 9
(2) 10
(3) 11
(4) 12
Answer: (2)

7. p, q, r in the schema of operators in PRECIS belongs to:
(1) Core elements
(2) Extra-core concepts
(3) Dependent elements
(4) Special classes of action
Answer: (3)

8. According to APA Style Manual, a section at the end of a paper that includes information that is too detailed for the text of the paper itself and would “burden the reader” or be “distracting” or “in appropriate” is called:
(1) Appendix
(2) Bibliography
(3) References
(4) Tables
Answer: (1)

9. Who coined the word “Management theory jungle”?
(1) Henry Fayol
(2) F.W. Taylor
(3) Heinz Weihrich
(4) Harold Koontz
Answer: (4)

10. Which of the following case require the application of new ISSN?
(1) Change of publisher
(2) Change in publication medium and title
(3) Change in location of publication
(4) Change in editorial policy
Answer: (2)

11. Which of the following organizations have introduced “Dig by” – a new mobile application available as a part of “Worldshare Management Service”?
(1) Library of Congress
(2) NISCAIR
(3) OCLC
(4) UTLAS
Answer: (3)

12. Percentage (%) sign is used in an URL to represent:
(1) Space
(2) Date
(3) Time
(4) Person
Answer: (1)

13. FRBRoo version 2 is based on:
(1) FRBR model alone
(2) FRAD model alone
(3) FRBR and FRAD models only
(4) FRBR, FRAD and FRSAD models
Answer: (4)

14. Which one of the following is not Image format?
(1) TIFF
(2) MPEG
(3) JPEG
(4) GIF
Answer: (2)

15. Which of the following does not come under the domain of Descriptive bibliometrics (Descriptive Studies)?
(1) Geographical Distribution of Documents
(2) Nature of Information Conveyed
(3) Subject Distribution
(4) Medium of Communication
Answer: (2)

16. “Half-life” in the context of literary growth is used to indicate:
(1) Rate of obsolescence
(2) Rate of growth
(3) Degree of scatter
(4) Information explosion
Answer: (1)

17. Which sampling method is not suitable, if unit members are homogenous?
(1) Simple random
(2) Cluster
(3) Stratified
(4) Systematic
Answer: (2)

18. Hermeneutics, principle is primarily related with:
(1) Interpretation of texts
(2) Interrelation between data and knowledge
(3) Human experience
(4) Human behavious
Answer: (1)

19. How may Working Groups are constituted under National Mission on Libraries, India?
(1) Two
(2) Three
(3) Four
(4) Five
Answer: (3)

20. Who is responsible for development and maintenance of UGC official website?
(1) MHRD
(2) DoE
(3) NIC
(4) INFLIBNET
Answer: (4)

21. Which of the following are the necessary elements of an information society?
(a) Confidentiality
(b) Vulnerability
(c) Integrity
(d) Availability
Code:
(1) (b), (c) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (a), (b) and (d) are correct
Answer: (3)

22. Which of the following components are essential for National Information Policy?
(a) Legislation framework
(b) E-Journal consortium
(c) Digital repositories
(d) National bibliography
Code:
(1) (a) and (b) are correct
(2) (a) and (d) are correct
(3) (b) and (c) are correct
(4) (b) and (d) are correct
Answer: (2)

23. SWAYAM, the free online education was developed by:
(a) IIT, Madras
(b) AICTE
(c) IIM, Ahmedabad
(d) MHRD, Govt. of India
Code:
(1) (b) and (d) are correct
(2) (c) and (d) are correct
(3) (a) and (b) are correct
(4) (a) and (d) are correct
Answer: (1)

24. Which of the following are the activities of National Mission on Libraries?
(a) CIP Project
(b) Capacity Building
(c) Library Assistance Programme
(d) Setting up of Model Libraries
Code:
(1) (a) and (d) are correct
(2) (b) and (d) are correct
(3) (b) and (c) are correct
(4) (c) and (d) are correct
Answer: (2)

25. Which of the following indicate the purpose of reference list in a thesis / dissertation?
(a) Allows author to credit the work of others that directly influenced the present work.
(b) Gives interested readers the information necessary to identify and retrieve the sources.
(c) An expansive list that covers works that are consulted.
(d) Recommends to the interested readers the works that are not cited in the text.
Code:
(1) (a) and (b) are correct
(2) (b) and (c) are correct
(3) (c) and (d) are correct
(4) (b) and (d) are correct
Answer: (1)

26. Which of the following are the products of Chemical Abstract services?
(a) Sci Finder
(b) Sci Val
(c) Methods Now
(d) Analytical Services
Code:
(1) (a) and (c) are correct
(2) (b) and (d) are correct
(3) (a), (b) and (c) are correct
(4) (b), (c) and (d) are correct
Answer: (1)

27. Which of the following roles does a library have in the information transfer cycle?
(a) Information organization and control
(b) Primary distribution
(c) Secondary Publication
(d) Secondary distribution
Code:
(1) (b) and (d) are correct
(2) (b) and (c) are correct
(3) (a) and (d) are correct
(4) (a) and (b) are correct
Answer: (3)

28. Who among the following are associated with established theories of reference service?
(a) C.M. Winchell
(b) James I Wyer
(c) Daniel Brophy
(d) Samuel Rothstein
Code:
(1) (a) and (b) are correct
(2) (b) and (d) are correct
(3) (c) and (d) are correct
(4) (a) and (c) are correct
Answer: (2)

29. Which of the following are related to ‘Sugamya Pustakalaya’?
(a) An online platform that makes accessible the content available to ‘print disabled people’.
(b) Created by Department of Empowerment of persons with disabilities (Divyangjan), Ministry of Social Justice and Empowerment, GOI.
(c) Powered by TCS Access.
(d) Maintained by National Association for the Blind (India).
Code:
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (b), (c) and (d) are correct
(4) (a), (c) and (d) are correct
Answer: (2)

30. ‘Entropy’ in the context of ‘Information Science’ is:
(a) Measure which cannot be normalised by dividing it by information length.
(b) Measure of unpredictability of the state or equivalently, of its average information content.
(c) Average amount of information produced by a probabilistics stochastic source of data.
(d) Way to measure diversity.
Code:
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (b), (c) and (d) are correct
Answer: (4)

31. Controlled vocabularies fall broadly into following categories:
(a) Subject Heading Lists
(b) Thesauri
(c) Folksonomies
(d) Ontologies
Code:
(1) (a) and (c) are correct
(2) (b), (c) and (d) are correct
(3) (a), (b) and (d) are correct
(4) (c) and (d) are correct
Answer: (3)

32. Which of the following are the components of a barcode symbol?
(a) Antenna
(b) Quiet zone
(c) Transponder
(d) Start character
Code:
(1) (a) and (c) are correct
(2) (b) and (c) are correct
(3) (b) and (d) are correct
(4) (a) and (d) are correct
Answer: (3)

33. ‘Embargo’ in the context of ‘Book Trade’ is:
(a) A limitation on access, to older resources by the publishers.
(b) Perpetual ban on the access of the given resources of a publisher.
(c) A limitation on access to resources placed by publishers.
(d) A limitation on access to the resources usually to prevent the cancellation of individual
subscription.
Code:
(1) (c) and (d) are correct
(2) (a) and (b) are correct
(3) (a) and (c) are correct
(4) (a), (c) and (d) are correct
Answer: (1)

34. Which of the following are Research Information Management System?
(a) Pure
(b) Quetext
(c) Converis
(d) VIVO
Code:
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (b), (c) and (d) are correct
Answer: (3)

35. Which of the following are the open access initiatives of INFLIBNET?
(a) Shodhganga
(b) e-Shodh Sindhu
(c) Infoport
(d) IndCat
Code:
(1) (a) and (b) are correct
(2) (b) and (c) are correct
(3) (c) and (d) are correct
(4) (a) and (c) are correct
Answer: (4)

36. Which of the following are embedded processors?
(a) Micro Controller
(b) Digital Signal Processor
(c) Cor 2 extreme
(d) Intel Xeon
Code:
(1) (a), (b) and (d) are correct
(2) (b), (c) and (d) are correct
(3) (a), (b) and (c) are correct
(4) (a), (c) and (d) are correct
Answer: (1)

37. Jubilee (JISC User Behaviour in Information Seeking: Longitudinal Evaluation of Electronic Information Services ) seeks to :
(a) Predict, monitor and characterise ISB in relation to EIS (Electronic Information Services).
(b) Provide illuminative and contextual pictures built up overtime to users and non-users.
(c) Evaluate materials of rarity in nature.
(d) Adjudge the quality of hard copies of e-reference tools served to readers in a given library over a period of time.
Code:
(1) (c) and (d) are correct
(2) (a) and (b) are correct
(3) (b) and (c) are correct
(4) (a) and (d) are correct
Answer: (2)

38. Arrange the following state Public Library Acts according to their year of enactment:
(a) Chhattisgarh Public Libraries Act
(b) Haryana Public Libraries Act
(c) Orissa Public Libraries Act
(d) Lakshadweep Public Libraries Act
Code:
(1) (b), (c), (d), (a)
(2) (d), (b), (c), (a)
(3) (c), (b), (d), (a)
(4) (a), (b), (c), (d)
Answer: (1)

39. Arrange in sequence the following public libraries according to their year of origin.
(a) Connemara Public Library
(b) Delhi Public Library
(c) Calcutta Public Library
(d) Baroda Central Library
Code:
(1) (c), (a), (d), (b)
(2) (c), (d), (b), (a)
(3) (a), (b), (d), (c)
(4) (a), (d), (b), (c)
Answer: (1)

40. Arrange the following laws / principles from lower to higher level as propounded by
S.R. Ranganathan.
(a) Fundamental Laws
(b) Canons
(c) Principles
(d) Basic Laws
Code:
(1) (c), (b), (a), (d)
(2) (a), (b), (c), (d)
(3) (b), (d), (a), (c)
(4) (d), (c), (b), (a)
Answer: (1)

41. Arrange year-wise development of the following indexing systems:
(a) Relational Indexing by J.E.L. Farradane
(b) Chain Indexing by S.R. Ranganathan
(c) Subject Indexing by J.E. Coates
(d) PRECIS by Derek Austin
Code:
(1) (b), (a), (c), (d)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (c), (a), (b)
Answer: (1)

42. Arrange, from among the following, the areas of access-points in their proper sequence as given in ISBD.
(a) Notes
(b) Series
(c) Edition
(d) Material Specific details
Code:
(1) (a), (b), (c), (d)
(2) (c), (d), (b), (a)
(3) (b), (c), (d), (a)
(4) (d), (c), (b), (a)
Answer: (2)

43. Arrange the following connecting symbols of CC- 6th ed. according to their increasing ordinal value:
(a) ) (arrester)
(b) ← (backward arrow)
(c) → (forward arrow)
(d) 0 (zero)
Code:
(1) (b), (c), (d), (a)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (a), (c), (b)
Answer: (2)

44. Identify the correct sequence of indicator digits of Intra Facet Phase Relation as used in
CC (6th edition).
(1) j k m n r
(2) j k m r o
(3) i j k m n
(4) j k m n q
Answer: (1)

45. Arrange in sequence the following subject classes according to their occurance in the schedules of DDC, 21st Ed.
(a) Food Technology
(b) Public Finance
(c) General Encyclopaedias
(d) Bibliographies
Code:
(1) (d), (b), (c), (a)
(2) (d), (c), (b), (a)
(3) (c), (b), (a), (d)
(4) (c), (a), (b), (d)
Answer: (2)

46. Arrange in sequence the Maslow’s hierarchy of needs:
(a) Social
(b) Esteem
(c) Physiological
(d) Safety
Code:
(1) (c), (d), (a), (b)
(2) (d), (b), (a), (c)
(3) (d), (a), (c), (b)
(4) (c), (a), (b), (d)
Answer: (1)

47. Arrange in sequence the following document titles alphabetically word by word :
(a) Bookfinder
(b) Bookkeeping made simple
(c) Book bytes
(d) Books that changed the world
Code:
(1) (a), (b), (c), (d)
(2) (b), (c), (d), (a)
(3) (c), (a), (b), (d)
(4) (c), (d), (a), (b)
Answer: (3)

48. Arrange the steps of the 8W’S Literacy Model in correct order as given by Annette Lamb:
(a) Webbing
(b) Wishing
(c) Wondering
(d) Weaving
Code:
(1) (c), (a), (b) and (d)
(2) (b), (a), (c) and (d)
(3) (c), (a), (d) and (b)
(4) (c), (b), (a) and (d)
Answer: (3)

49. Match the following sources with their corresponding functions:
List – I
List - II
(a) Counter
(i) Tracking e-resources usage statistics
(b) Affinity string
(ii) Impact factor
(c) Link resolver
(iii) Tracking online usage by user categories
(d) Journal of citation report
(iv) Number of times users’ connectivity to a resource
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (ii)        (iv)       (iii)       (i)
(3)        (i)         (iii)       (iv)       (ii)
(4)        (iv)       (ii)        (i)         (iii)
Answer: (3)

50. Match the following consortiums with their corresponding locations:
List – I
List - II
(a) UGC-DAE Consortium
(i) Manesar (Gurgaon)
(b) ERMED-India Consortium
(ii) Gandhinagar, (Ahmedabad)
(c) DeLCON-DBT’s E-Library Consortium
(iii) Indore
(d) e-Shodh Sindhu
(iv) New Delhi
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (iv)       (iii)       (ii)        (i)
(3)        (i)         (ii)        (iii)       (iv)
(4)        (ii)        (i)         (iv)       (iii)
Answer: (1)

51. Match the following leading Abstracting and Indexing tools/Databases with their corresponding Publishers/Content Providers:
List – I            List - II
(a) LISA          (i) NISCAIR
(b) ILSA         (ii) EBSCO
(c) LISTA       (iii) IASLIC
(d) Indian Science Abstracts  (iv) ProQuest
Code:
(a)        (b)        (c)        (d)
(1)        (iv)       (iii)       (ii)        (i)
(2)        (i)         (ii)        (iii)       (iv)
(3)        (ii)        (iv)       (i)         (iii)
(4)        (iii)       (i)         (iv)       (ii)
Answer: (1)

52. Match the following threats to ‘information society’ with the corresponding concept:
List – I
List - II
(a) Compromises intellectual Property
(i) Confiscation of equipment or information
(b) Deliberate acts of theft
(ii) Unauthorized access to data
(c) Deliberate acts of information extortion
(iii) Piracy
(d) Deliberate acts of espionage or trespass
(iv) Blackmail of information disclosure.
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (iv)       (ii)        (iii)       (i)
(3)        (i)         (ii)        (iii)       (iv)
(4)        (iii)       (i)         (iv)       (ii)
Answer: (4)

53. Match the following:
List – I
List - II
(a) Political Map
(i) Features of land
(b) Route Map
(ii) Roads and bridges, etc.
(c) Physical Map
(iii) Limiting territorial boundaries
(d) Thematic Map
(iv) Mining, agriculture, etc.
Code:
(a)        (b)        (c)        (d)
(1)        (iv)       (i)         (ii)        (iii)
(2)        (i)         (ii)        (iii)       (iv)
(3)        (iii)       (ii)        (i)         (iv)
(4)        (ii)        (iii)       (i)         (iv)
Answer: (3)

54. The MARC Field 264 has different second indicator values to indicate separate data elements in RDA. Match these second indicator values with the respective data elements:
List – I
List - II
(a) −0
(i) Distribution statement
(b) −1
(ii) Publication statement
(c) −2
(iii) Manufacture statement
(d) −3
(iv) Production statement
Code:
(a)        (b)        (c)        (d)
(1)        (iv)       (ii)        (i)         (iii)
(2)        (iii)       (ii)        (iv)       (i)
(3)        (ii)        (iv)       (iii)       (i)
(4)        (i)         (ii)        (iii)       (iv)
Answer: (1)

55. Match the following mechanisms of information processing with corresponding service as given by S. Seetharama:
List – I
List - II
(a) Announcement
(i) Translation Service
(b) Evaluation
(ii) Current Awareness Service
(c) Document access
(iii) Indexing Service
(d) Accretion
(iv) State-of-the-art report
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (ii)        (iv)       (i)
(2)        (ii)        (iv)       (i)         (iii)
(3)        (i)         (iii)       (ii)        (iv)
(4)        (iv)       (i)         (iii)       (ii)
Answer: (2)

56. Match the following queries with corresponding type of reference service:
List – I
List - II
(a) Communication with Library Staff through VoIP
(i) Asynchronous reference service
(b) Reference query through e-mail
(ii) Online reference service
(c) Use of e-resources seeking answers
(iii) Virtual Reference Desk
(d) Webforms
(iv) Reference interview
Code:
(a)        (b)        (c)        (d)
(1)        (iv)       (iii)       (i)         (ii)
(2)        (i)         (ii)        (iv)       (iii)
(3)        (iii)       (i)         (ii)        (iv)
(4)        (ii)        (iv)       (iii)       (i)
Answer: (3)

57. Match the following with corresponding explanation:
List – I
List - II
(a) Embargo
(i) Publisher’s list of new titles
(b) Big Deal
(ii) Authorization for regular shipment of new editions of specific products
(c) Front List
(iii) Publisher’s restriction one-resource access
(d) Standing order
(iv) large bundled e-journal package of single publisher on discounted price
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (i)         (iv)       (iii)       (ii)
(3)        (iv)       (ii)        (i)         (iii)
(4)        (ii)        (iii)       (i)         (iv)
Answer: (1)

58. Match the following NISO (National Information Standard Organisation) standards with their corresponding descriptions applicable to Libraries:
List – I
List - II
(a) Z 39.41
(i) Dublin core Metadata Element set
(b) Z 39.63
(ii) Syntax for Digital Object Identifier (DOI)
(c) Z 39.84
(iii) Inter library loan data elements
(d) Z 39.85
(iv) Printed information on spines
Code:
(a)        (b)        (c)        (d)
(1)        (i)         (ii)        (iii)       (iv)
(2)        (iii)       (ii)        (iv)       (i)
(3)        (iv)       (iii)       (ii)        (i)
(4)        (ii)        (i)         (iii)       (iv)
Answer: (3)

59. Match the following:
List – I
List - II
(a) Counter
(i) Article metric
(b) PLoS ALMs
(ii) Author metric
(c) ORC ID
(iii) All metric
(d) Social Media citations
(iv) Journal metric
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (iv)       (i)         (ii)        (iii)
(3)        (ii)        (iv)       (iii)       (i)
(4)        (i)         (iv)       (ii)        (iii)
Answer: (2)

60. Match the following Office Products with their corresponding Producers/Organisations:
List – I
List - II
(a) Open Office
(i) IBM
(b) MS-Office
(ii) Apache Foundation
(c) Lotus Note
(iii) Apple
(d) iWork
(iv) Microsoft Corporation
Code:
(a)        (b)        (c)        (d)
(1)        (i)         (ii)        (iii)       (iv)
(2)        (ii)        (iv)       (i)         (iii)
(3)        (i)         (iv)       (iii)       (ii)
(4)        (iv)       (ii)        (i)         (iii)
Answer: (2)

61. Match the following statements with corresponding research process:
List – I
List - II
(a) What is the role of MOOCs in imparting LIS education?
(i) Hypothesis
(b) EDUCAUSE (2013) “Selective institutions can be democratized via MOOCs”.
(ii) Analytical statement
(c) MOOCs programmes will replace distance Learning in LIS
(iii) Formulation of the problem
(d) Though MOOCs is advantageous, majority respondents preferred distance learning
(iv) Literature study
Code:
(a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (ii)        (iii)       (iv)       (i)
(3)        (iv)       (ii)        (iii)       (i)
(4)        (i)         (ii)        (iv)       (iii)
Answer: (1)

62. Match the following Online Survey Development Cloud based Software Applications/tools with their corresponding founders:
List – I
List - II
(a) Survey Monkey
(i) Christian Vanek and Scott Mc Daniel- (Colorado, USA)
(b) Type Form
(ii) Gordon Tan-Brisbane (Austria)
(c) Client Heartbeat
(iii) Robert Munoz and David Okuniev-Barcelona (Spain)
(d) Survey Gizmo
(iv) Ryan Finley- Sanmateo, California (USA)
Code:
(a)        (b)        (c)        (d)
(1)        (i)         (ii)        (iii)       (iv)
(2)        (iv)       (iii)       (ii)        (i)
(3)        (ii)        (iv)       (i)         (iii)
(4)        (iii)       (i)         (iv)       (ii)
Answer: (2)

63. Match the following with their corresponding year of launching:
List – I
List - II
(a) National Mission on Manuscripts
(i) 2003
(b) National Mission on Libraries
(ii) 2007
(c) National Mission on Monuments and Antiquities
(iii) 2012
 (d) National Knowledge Network
(iv) 2010
Code:
(a)        (b)        (c)        (d)
(1)        (i)         (iii)       (ii)        (iv)
(2)        (iv)       (iii)       (ii)        (i)
(3)        (iii)       (ii)        (i)         (iv)
(4)        (ii)        (iv)       (iii)       (i)
Answer: (1)

64. Assertion (A): The copyright system, born and bred for print technology, faces a technological revolution in its environment.
Reason (R): The old print technology’s broadcast model of one to many communication is replaced with many to many global connectivity.
Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer: (3)

65. Assertion (A): Avoidance of difficult reference questions are usually an outcome of momentary panic in the face of a seemingly impenetrable question.
Reason (R): Reference never adhere to few helpful tips such as developing handy-referral systems, both with in and outside the reference area, and fail to establish a context for the questions to counter such panic attack.
Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
Answer: (1)

66. Assertion (A): In collection development, pamphlets do not require frequent review like books and journals.
Reason (R): Pamphlet’s information value is likely to be short lived, their physical format is usually flimsy and subject to rapid deterioration.
Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false
Answer: (2)

67. Assertion (A): The content-based indexing techniques enable identification of wanted persons in photographs of crowds.
Reason (R): The content-based indexing system uses all sorts of characteristics of the image to guess what it is about.
Code:
(1) (A) is true but (R) is false.
(2) (A) is false but (R) are true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
Answer: (4)

68. Assertion (A): In Gold Open Access, costs are not transferred to authors.
Reason (R): Gold Open Access journals publish peer-reviewed articles without paid subscription barriers for their readers.
Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer: (2)

69. Assertion (A): In recent years, QR codes have become ubiquitous and may replace the use of bar codes.
Reason (R): QR is a two - dimensional code with large capacity for storage. These codes hold information both horizontally and vertically and can be scanned by users with their smart phones at ease.
Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false
Answer: (2)

70. Assertion (A): Librarians usually prefer to provide access to e-content for the users via a proxy server, allowing authorized library users to access content from outside the physical confines of a library.
Reason (R): Proxy-server access is possible without IP-address recognition.
Code:
(1) Both (A) and (R) are true.
(2) Both (A) and (R) are false.
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.
Answer: (3)

71. Assertion (A): ‘Web Assembly’, a standard that enables applications to run securely in browsers (without the use of Plug-ins) is a people-friendly application in using Web.
Reason (R): A web language transforms the way people use their devices and the web making applications are more accessible to people at ease all over the globe.
Code:
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
Answer: (2)

72. Assertion (A): Grounded Theory methods in Qualitative research start from same set of assumptions as traditional Quantitative research design.
Reason (R): The inductive nature of these Grounded Theory methods allows the key issues emerge rather than force them into pre conceived categories.
Code:
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) Both (A) and (R) are false.
(4) (A) is false, but (R) is true
Answer: (4)

73. Assertion (A): The fundamental need of a hypothesis is to guide sound research.
Reason (R): Without hypothesis, research is focused and do not become a random empirical wandering.
Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer: (1)

74. Assertion (A): Traditional Knowledge Resource Classification (TKRC) is an innovative structured classification system useful for the systematic arrangement, dissemination and retrieval of all subjects.
Reason (R): It is structured, based on International Patent Classification.
Code:
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
Answer: (3)

75. Identify the resource sharing and document delivery principles as given by IFLA.
(a) Each country should accept responsibility for providing access to its own publications to any other country.
(b) Supplying libraries should accept requests submitted in hardcopy only.
(c) From the moment a library dispatches an item to a requesting library until it returns the supplying library is responsible for any loss or damage incurred.
(d) Each country should aim to develop an efficient national resource sharing system.
Code:
(1) (a) and (b) are correct.
(2) (b) and (c) are correct.
(3) (a) and (d) are correct.
(4) (b) and (d) are correct.
Answer: (3)
To Read Next Page Kindly Click Here

No comments:

Post a Comment