Lis 3000 MCQ
Lis 3000 MCQ
Lis 3000 MCQ
UGC NET
Library and Information Science
Code -59
Unit Wise Questions Answer 3000 + [MCQ]
Publication
DIWAKAR EDUCATION HUB
MSME Reg - UDYAM-UP-17-0007659
Head office - 1st floor Shiv Market Vidhur Kuti Road Bijnor UP -246701
Phone – 7310762592,7078549303
Email- info@diwakareducationhub.in
Ⓒ Diwakar Education Hub has obtained all the information in this book from the sources believed to be reliable and true
however Diwakar education hub or its editor or Authors don't take any responsibility for absolute accuracy of any information
published and damage or loss suffered their thereupon.
Printed & Bound By – In House Printing & Bounding by Diwakar Education Hub Bijnor UP
Get Free E- books Access of This Book on Diwakar Education Prep App after 10 Days of
Received Book Scan
The Code :
For Futher Informationabaout the product form Diwakar Education hub log on – diwakareducationhub.in or email-
info@diwakareducationhub.in
Preface
Books Play Important Role In The Present Preparation Of Any Examination And One Cannot
Deny The Importance Of Book While Preparing For Any Competitive Exam Book For
Competitive Exam Can Be The Source To Get The Concept Related To Various Topic Which Will
Help Source Well In Examination We At Diwakar Education Hub Provide Comprehensive Stuff
For Your Exam Which Is Analysis Design And Review By Expert Faculties Team this book has
been prepared after a comprehensive research by the expert faculties who are involved to
make this book and having experience of more than 18 years in particular subject on the basis
of research make this book stand for a part from other available books in the market
a clear indication of the type of Questions with proper explanation for each type of
question Bases of Requirement
the exercise of chapter wise graded as per the difficulty the questions are from taken
from all the level as per the exam pattern
basic level, moderate level and advanced level questions cover all types of questions
with explanation
we make sure that the content meets the requirements of the exam and the
According to Exam pattern so that you will obtain maximum Knowledge
However we have put our best effort in preparing this book but if any error whatsoever
has been skipped out I will by heartily welcome your suggestion apart from all those I like
to Thanks to all all the reviews of the books special thanks for Ravindra Rawat for their
expertise.
11. It shall be of the duty of the Central ii. Can requisition any public record or
Information Commission to receive and copies thereof from any court or office,
enquire into a complaint from any person iii. Cannot receive evidence on affidavit
i. Who has not been given a response to a like a Civil Court does.
request for information or access to a) (i) only
information within the time limit specified
b) (iii) only
under RTI Act 2005.
c) (ii) only
ii. Who has been required to pay an
amount of fee which he or she consider d) (i) and (iii) only
unreasonable; Answer: c
iii. Issuing summons for examination of 14. Who can file an appeal against the
witnesses or documents. decision of the CPIO under RTI Act?
a) (i) only i. The information seeker
b) (ii) only ii. The Third party aggrieved by the order
c) (iii) only of the CPIO
d) All of above iii. Any citizen
Answer: d Options:
12. The Central Information Commission a) (i) only
while inquiring into any matter under b) (i) and (ii) only
section 18 of RTI Act; c) (iii) only
i. Cannot compel a person to give written d) (ii) and (iii) only
evidence on oath like a Civil Court does. Answer: b
ii. Can compel a person to give written
15. Which one of the following statements
evidence on oath like a Civil Court does. is true?
iii. Can enforce that attendance of a person
i. In any appellate proceedings the onus
like a Civil Court does
lies on CPIO to prove that he acted
Options : diligently
a) (ii) and (iii) only ii. ln any appellate proceedings the onus
b) (iii) and (i) only lies on information seeker to prove that
c) (i) and (ii) only the CPIO did not act diligently.
d) (i) only iii. The Information Commission does not
have powers to recommend disciplinary
Answer: a
action against CPIO.
13. The Central Information Commission
Options :
while inquiring into any matter under
section 18 of RTI Act; a) (i) only
i. Cannot requisition any public record or b) (ii) only
copies thereof from any court or office, c) (ii) and (iii) only
30. Assertion (A): Formulation of (A) (i) and (ii) are correct
hypotheses is based on assumptions. (B) (ii) and (iii) are correct
Reason (R): Hypotheses cannot be tested (C) (iii) is correct
based on objectives of the study.
(D) (iv) is correct
(A) (A) is true, but (R) is false
Answer: (C)
(B) (A) is false, but (R) is true
34. ‘Hypothesis’ is a
(C) Both (A) and (R) are false
(i) Solution of the problems
(D) Both (A) and (R) are true
(ii) Statements of the assumptions
Answer: (A)
(iii) Statements to be tested
31. Assertion (A): Delphi Method of
(iv) Fact
research draws opinion from the panel of
experts in a research area. Codes:
Reason (R): Opinions expressed by the (A) (i) and (ii) are correct
panel of experts is valuable in formulating (B) (ii) and (iii) are correct
inference. (C) (i) and (iii) are correct
(A) (A) is true, but (R) is false (D) (i) and (iv) are correct
(B) (A) is false, but (R) is true Answer: (B)
(C) Both (A) and (R) are true 35. Following are the works of Paul Otlet
(D) Both (A) and (R) are false (i) UDC
Answer: (C) (ii) Traile de Documentation
32. Assertion (A): Provision of services (iii) Something about bibliography
inside the library helps in reaching out to (iv) Something about documentation
the large number of users
Codes:
Reason (R): library extension services do
not cover the internal users of a library. (A) (i) and (iv) are correct
(A) (A) is true, but (R) is false (B) (iii) and (iv) are correct
(B) (A) is false, but (R) is true (C) (ii) and (iv) are correct
(C) Both (A) and (R) are true (D) (i), (ii) and (iii) are correct
(D) Both (A) and (R) are false Answer: (D)
Answer: (D) 36. First Library Science School in the world
was started
33. ADONIS is a
(i) By Melvil Dewey
(i) Bibliographic database only
(ii) At Colombia University, NY
(ii) Numerical database only
(iii) By WC B Sayers
(iii) Full text database only
(iv) At London University, London
(iv) Abstracting database
Codes:
Codes:
Diwakar Education Hub Page 10
UGC NET Library Science Unitwise MCQ
95. Section 66A which penalized sending 98. Section 66A of IT Act,2000 has been
“offensive messages” was introduced in IT struck down by Supreme Court’s Order
Act, 2000 through? dated 24th March, 2015 in which case?
(A) Information Technology (Amendment) (A)Shreya Singhal vs. Union of India
Act, 2008 (B)Puttuswamy v. Union of India
(B) Information Technology (Amendment) (C)Shayara Bano vs Union Of India
Act, 2003
(D)Indra Sawhney and Union of India
(C) Information Technology (Amendment)
Answer: (A)Shreya Singhal vs. Union of
Act, 2015
India
(D) Information Technology (Amendment)
99. In the year 2020, Indian Government
Act, 2005
banned 59 Chinese mobile apps, including
Answer: (A) Information Technology TikTok invoking which Section of IT Act,
(Amendment) Act, 2008 2000?
96. Which among the following is/are the (A)Section 66A
major insertions in IT Act,2000 through
(B)Section 66F
Information Technology (Amendment) Act,
2008? (C)Section 72A
(A) Section 66A which penalized sending (D)Section 69A
“offensive messages” Answer: (D) Section 69A
(B) Section 69, which gave authorities the 100. The data privacy rules was introduced
power of “interception or monitoring or in IT Act, 2000 in the year?
decryption of any information through any (A)2008
computer resource
(B)2011
(C) it introduced provisions addressing –
(C)2015
pornography, child porn, cyber terrorism
and voyeurism (D)2020
(D) All the above Answer: (B) 2011
Answer: (D) All the above 101. The act of presenting someone else’s
work or idea as own is considered as
97. Which among the following offence
under IT Act, 2000 has the maximum 1. Plagiarism
penalty of imprisonment up to life? 2. Academic dishonesty
(A)Using password of another person 3. Wrongful appropriation
(B)Securing access or attempting to secure 4. All of these
access to a protected system Answer: 4
(C)Publication for fraudulent purpose 102. Do you think anti Plagiarism detection
(D)Acts of cyberterrorism software is useable for
Answer: (D)Acts of cyberterrorism 1. Avoiding plagiarism
120. Plagiarism detection software checks 1. When you refer to some previously
plagiarism by providing published studies
1. Similarity index 2. When you refer to your own papers
2. Citation index that you have previously written.
3. Content index 3. 1 & 2 both
4. None of these 4. When you write your own ideas.
Answer: 1 Answer: 3
121. Plagiarism can lead to 126. It is NOT a tool for paraphrasing
1. Retraction of your published paper 1. Modify the order & structure of
sentences
2. Suspension/termination from a job
2. Direct quotation
3. Rejection of thesis
3. Use synonyms & different forms of
4. All of the above
words
Answer: 4
4. Change the voice or perspective
122. You can use direct quotes
Answer: 2
1. Up to one page
127. Using different forms of words
2. Up to one para (adjective to noun or noun to verb) is one
3. Up to three lines of the tools of
4. Up to one line 1. Paraphrasing
Answer: 3 2. Summarizing
123. Plagiarism can NOT be detected by 3. Referencing
1. Scopus 4. All of the above
2. Turnitin Answer: 1
3. Ithenticate 128. Plagiarism can be avoided by the use
4. b & c both of
Answer: 1 1. Direct Quotation
124. Plagiarism is 2. Paraphrasing
1. Submitting some other’s work as of 3. Summarizing
your own 4. All of the above
2. Submitting your own previously Answer: 4
published work again 129. Plagiarism is
3. a & b both 1. OK sometimes
4. quoting with citation 2. Always wrong because it is theft and
Answer: 3 fraud
125. Which of the following requires 3. Not at all wrong
proper citation?
Diwakar Education Hub Page 22
UGC NET Library Science Unitwise MCQ
(c) Right not to work out patent (a) Infringement in some cases
(d) Right to oppose compulsory licence (b) Not infringement of copyright
Answer: (a) (c) Infringement of copyright
150. Adaptation in relation to an artistic (d) None of these
work means … Answer: (b)
(a) Conversion of the work into a patent 155. A provisional specification is filed to
(b) Conversion of the work into a fix the __
trademark (a) Expiry date of patent
(c) Conversion of the work into a design (b) Assignment of patent
(d) Conversion of the work into a dramatic (c) Term of the patent
work by way of performance in public or
(d) Priority date of patent
otherwise
Answer: (d)
Answer: (d)
156. The …………….. is granted in the case of
151. Registration of the trademark is a
substances which are not food items or
…………evidence of the validity of the
drugs as such, but are capable of being
trademark in all legal proceedings.
used as food and drugs.
(a) No
(a) Conditional license
(b) Secondary
(b) Licenses of marketing
(c) Conclusive
(c) Licenses of rights
(d) Prima facie
(d) Compulsory license
Answer: (d)
Answer: (c)
152. What can be copyrighted in law
157. __ is the first owner of a Book’s
reports for judgements and orders of the
copyright.
court?
(a) Author
(a) Head notes
(b) Publisher
(b) What reports as a whole
(c) Translator
Answer: (a)
(d) Printing press owner
153. In the case of infringement of patent
the court may award ………. Answer: (a)
(a) Damages or account of profits 158. A mark which is devoid of distinctness
are ……
(b) Account of profits with mental agony
(a) Not register-able
(c) Damages and account of profits
(b) Register-able under patent act
(d) Damages with mental agony
(c) Register-able under copyright act
Answer: (c)
(d) Register-able
154. Remix of old songs with different
music composition (remix) is … Answer: (a)
159. The first obligation of the patent (d) creation by the mental status of a
holder is he __ person
(a) Can deal with patent as per his will Answer: (a)
(b) Can use the patent 165. Who has to apply before registrar to
(c) Has to advertise the patent in daily be a registered user of trademark ?
news paper (a) Those who are the proprietor of
(d) Must work out the patent trademark
Answer: (d) (b) Proprietor of trademark and the other
person who want to be a registered user
160. Can an assignee sue an assignor for
hast to jointly apply.
infringement of copyright?
(c) Those who want to be a registered user
(a) No
Answer: (b)
(b) Yes
166. Which of the following can be
Answer: (b)
exercised by the government in the case of
161. Can judgement or order of court be the non working of the panted?
copyrighted ?
(a) Surrender compulsory
(a) Yes
(b) Assignment
(b) No
(c) Govt. file a suit
(c) Occasionally
(d) Compulsory licence
Answer: (a)
Answer: (d)
162. The assignment and licenses for the
167. Which of the following is not patent-
copyright can be registered with __
able?
(a) Registrar of Copyright
(a) which involves inventive steps
(b) Controller of Copyright
(b) Product which is used for medical
Answer: (a) treatment of human beings & animals
163. Which of the following cannot be (c) Process of medical treatment of human
pleaded in infringement of trademark? beings & animals
(a) Intentional infringement (d) None of these
(b) Innocent infringement Answer: (c)
Answer: (b) 168. Can genuine abridgment of a literary
164. Copyright is a __ work subject of copyright ?
(a) creation by person of efforts, (a) No
intellectual and capital (b) Yes
(b) creation by person of the efforts only (c) Occasionally
(c) creation by negligence of a person Answer: (b)
206. Which of the following is not part of 1. A knowledge audit should always be
the knowledge management framework? completed before an information
1. Share knowledge audit
2. Develop knowledge 2. Information and knowledge audits
are unrelated
3. Create knowledge
3. Information and knowledge audits
4. Capture knowledge
are complementary processes
Answer: Develop knowledge
4. Information and knowledge audits
207. A collection of internal and external are the same
knowledge resources in a single location
5. An information audit should always
for effective utilization by the organization
be completed before a knowledge
could be best described as:
audit
1. Digital Archives
Answer: Information and knowledge audits
2. Data Warehouse are complementary processes
3. Organizational memory 211. Hansen et al. suggest the % mix for
4. Knowledge Repository codification/personalization strategy
Answer: Knowledge Repository should be:
208. Which of the following is not one of 1. 50-0
Zak's types of knowledge? 2. 40-60
1. Tacit 3. 30-70
2. Causal 4. 80-20
3. Conditional Answer: 80-20
4. Relational 212. Knowledge management:
5. Declarative 1. Is synonymous with information
Answer: Tacit management
209. Nonaka introduced which of the 2. Refers to a particular application of
following knowledge concepts? information technology
1. Tacit and cultured 3. Is predominantly an organizational
2. Explicit and revealed activity
3. Tacit and explicit 4. Is mostly dependent on valid and
reliable data processing
4. Declarative and Procedural
Answer: Is predominantly an
5. Causal and Relational organizational activity
Answer: Tacit and explicit 213. The successful problem-solving
210. Which of the following statements do methods developed by an organization are
you agree with relating to knowledge generally referred to as:
audits? 1. Best Practices
3. 1970 3. 2002
4. 1979 4. 1990
Answer: 1976 Answer: 1990
223. National Mission for Manuscripts was 228. Full form of KBI
established in………? 1. Knowledge-Based Economy
1. February 2002 2. Knowledge-Biased Economics
2. February 2004 3. Knowledge-Base Ecosystem
3. February 2005 4. Knowledge-Basic Economist
4. February 2003 Answer: Knowledge-Based Economy
Correct Info: 229. ITES stands for
224. Full form of NII? 1. Information Technology Enabled
1. National Infrastructure of India Services
2. National Information Infrastructure 2. Infrastructure Technology Enabled
3. National Industrial Infrastructure Services
4. National Information Institutions 3. Information Technology Embedded
Services
Answer: National Information
Infrastructure 4. None
225. India’s National Policy on Information Answer: Information Technology Enabled
Technology was approved by the union Services
cabinet in the year 230. INSDOC was merged with NISCOM to
1. 2007 create
2. 2010 1. DELNET
3. 2012 2. NISCAIR
4. 2011 3. DESIDOC
Answer: 2012 4. NASSDOC
226. Full Form of EDI Answer: NISCAIR
1. electronic digit interchange 231. The National Mission on Manuscripts
is a programme of the
2. electronic data interchange
1. National Library of India
3. electronic dousers intelligence
2. National Archives of India
4. electronic democratic incharge
3. Ministry of Human Resources
Answer: electronic data interchange
Development, Government of India
227. The concept of information
4. Ministry of Culture, Government of
infrastructure was introduced in the year
India
1. 1993
Answer: Ministry of Culture, Government
2. 1994 of India
Diwakar Education Hub Page 33
UGC NET Library Science Unitwise MCQ
264. Which Software resident all DELNET 5. UNITED NATIONS GROUP ON THE
Database? INFORMATION SERVICE
1. KOHA 6. UNITED NATIONS GROUP ON THE
2. LIBSIS INFORMATION SOURCE
3. DELSIS 7. UNITED NATIONS GROUP ON THE
INFORMATION SCIENCE
4. DSPACE
8. UNITED NATIONS GROUP ON THE
Answer: DELSIS
INFORMATION SOCIETY
265. NML Model Libraries would develop
Answer: UNITED NATIONS GROUP ON THE
Which Department of India?
INFORMATION SOCIETY
1. Ministry of Culture
270. WHEN UNGIS WAS ENDORSED?
2. Ministry of Electronic
1. APRIL 2004
3. Ministry of Law and Justice
2. APRIL 2007
4. Ministry of Parliamentary Affairs
3. APRIL 2006
Answer: Ministry of Culture
4. APRIL 2009
266. National Mission for Manuscripts was
Answer: April 2006
established in………?
271. WHAT IS FULL FORM OF WSIS?
1. February 2005
1. World Summits on Information
2. February 2004
Society
3. February 2002
2. World Summits on Inter Change
4. February 2003 Social life and Technique
Answer: February 2003 3. World Summits on Intellectual
267. National Informatics Centre (NIC) was Society and Patents
established in…..? 4. World Summits on Information
1. 1976 Science and Technology
2. 1975 Answer: World Summits on Information
3. 1977 Society
4. 1970 272. The Word Data is plural form of
Answer: 1976 which word?
1. Datin
268. Full form of WTO
8. World Television Organization 2. Datum
3. Daton
9. World Treaty Organization
10.World Trade Organization 4. Datrun
C) Investigate and take corrective (B) (i) and (iii) are correct
measures. (C) (i), (ii) and (iv) are correct
D) Notify user community of user (D) (i), (ii) and (iii) are correct
restrictions. Answer: (D)
Codes: 4. Which of the following activities are
(A) (ii), (iv) are correct supported by UGC?
(B) (ii), (iii) are correct (i) Facilitating increased access to
(C) (i), (iii) are correct information.
(D) (i), (ii), are correct (ii) Monitoring the implementation of
revised curriculum.
Answer: (D)
(iii) Making policies for human resource 7. The alternatives and modifications of H-
development Index are
(iv) Funding all academic libraries. (i) I-index
Codes: (ii) Pure-h Index
(A) (i) and (ii) are correct (iii) Scimgo Journal Rank
(B) (i) and (iii) are correct (iv) European Impact Factor
(C) (ii) and (iii) are correct Codes:
(D) (i) and (iv) are correct (A) (i) & (iii) are correct
Answer: (B) (B) (i) & (ii) are correct
5. Which of the following methods are (C) (i) & (iv) are correct
suitable to achieve quality of teaching,
(D) (ii) & (iii) are correct
learning in LIS?
Answer: (B)
(i) Research-led teaching
8. Digitization of various cultural resources
(ii) State of the art computer lab
is possible through
(iii) Problem-based learning
(i) Scanners
(iv) Introducing the course at degree level
(ii) Digital cameras
Codes:
(iii) Video cameras
(A) (ii) and (iv)
(iv) Smart & Mobile phones
(B) (i), (iii) and (iv)
Codes:
(C) (i) and (iii)
(A) (i), (ii) are correct
(D) (iii) and (iv)
(B) (iv), (iii) are correct
Answer: (C)
(C) (iii), (iv) are correct
6. Poor ‘Accessibility’ and less
(D) (i), (ii), (iii) & (iv) are correct
‘affordability’ of journal subscription in
print era led to Answer: (D)
(i) High allocation of funds for serials 9. What is/are common feature/s between
RFID & Barcode Technology?
(ii) Open access movement
(i) Read more than one item at a time
(iii) Decrease in subscription of journals
(ii) Able to locate specific items on shelves
(iv) E-journal consortia subscription
(iii) Programmable
Codes:
(iv) Read while item is moving
(A) (i) & (ii) are correct
Codes:
(B) (i), (ii), (iv) are correct
(A) (i), (ii) are correct
(C) (ii), (iv) are correct
(B) (iii), (iv) are correct
(D) (i), (ii), (iii) are correct
(C) (ii), (iv) are correct
Answer: (C)
b. Race & Brittle ii. IGNCA (D) Both (A) & (R) are true.
c. Traditional Knowledge iii. C-DAC Answer: (C)
d. Mobile Digital Library iv. 30. Assertion (A) : Technical writing
National Library standards, style manulas and citation
Codes : a b c d standards are very essential in structuring
the research report.
(A) i iv iii ii
Reason (R) : Value will get enhanced by
(B) iv iii ii i
standardizing the structure of research
(C) ii iv i iii report.
(D) iii ii iv i Codes:
Answer: (C) (A) (A) is true and (R) is partially true.
28. Match the following : (B) Both (A) and (R) are true.
List – I List – II (C) Both (A) and (R) are flase.
a. Carol Kuhlthau i. 8 (D) (A) is true and (R) is flase.
stages
Answer: (A)
b. David Ellis ii. ISB is a 6
31. Which of the following research
stage process
method is useful in a study of scattering of
c. M.J. Belkin iii. ISB is of 8 periodicals.
key activities
(i) Citation analysis study
d. Marchionnini iv. ISB is 4
(ii) Webometric study
dimension characteristic
(iii) Bibliometrics study
Codes : a b c d
(iv) Scientrometic study
(A) ii iii iv i
Codes:
(B) ii iii i iv
(A) (i) and (iii) are correct
(C) iii i iv ii
(B) (iv), (iii) and (i) are correct
(D) iv ii i iii
(C) (i) is correct
Answer: (A)
(D) (i) and (ii) are correct
29. Assertion (A) : Colon classification is
popular in online catalogues. Answer: (B)
Reason (R) : Traditional classification 32. Which of the following were produces
systems are used in online searching by Institute of Scientific Information (ISI)
advantageously. (i) Science Citation Index
Codes : (ii) Current Contents
(A) (A) is true, but (R) is false. (iii) Social Science Citation Index
(B) Both (A) & (R) true, but (R) is not the (iv) Atom Index
correct explanation of (A). Codes:
(C) (A) is false, but (R) is true.
Diwakar Education Hub Page 49
UGC NET Library Science Unitwise MCQ
(A) (i) and (ii) are correct (iv) Library of Congress Classification
(B) (i) and (iv) are correct Codes:
(C) (ii), (iii) and (iv) are correct
(D) (i) and (ii) and (iii) are correct (A) i, iv, ii, iii
Answer: (D) (B) i, iv, iii, ii
33. Principles of Facet sequence includes (C) iii, iv, i, ii
(i) Whole –organ principle (D) ii, iii, i, iv
(ii) Principle of osmosis Answer: (A)
(iii) Cow-Calf principle 36. The Provision relating to ‘suo motu’
(iv) Principle of Parsimony disclosure is contained in
Codes: a) Section 4 of RTI Act
(A) (i) and (iv) are correct b) Section 11 of RTI Act
(B) (i) and (iii) are correct c) Section 22 of RTI Act
(C) (ii) and (iv) are correct d) Section 24 of RTI Act
(D) (i) and (ii) and (iii) are correct Answer: a
Answer: (B) 37. Indian Library Science Abstracts is
published by ______.
34. Arrange the following networks
chronologically according to their year of 1. IATLIS
establishment 2. SIS
(i) INFLIBNET 3. IFLA
(ii) DELNET 4. IASLIC
(iii) BLAISE Answer: 4
(iv) JANET 38. Who developed "Seven Faces of
Codes: Information Literacy"?
(A) ii, iv, iii, i 1. David Loerfscher
(B) iii, iv, ii, i 2. Christine Susan Bruce
(C) I, iii, iv, i 3. Robert E. Berkowitz
(D) iii, iv, i, ii 4. Jamie Mc Kenzic
Answer: (B) Answer: 2
35. Arrange the following schemes of 39. Part 3 of Colon Classification (6th ed.)
classification according to the year of their deals with:
publication. 1. Schedules of classics and sacred
(i) Expansive classification books with special names
(ii) Subject classification 2. Rules
(iii) Bibliograhic classification 3. Schedules of Classification
(d) Arunachal Pradesh Public Library Act 72. Which Law of Library Science is related
1. (a), (c), (b), (d) with the obligation of state, library
authority and reader?
2. (c), (a), (b), (d)
1. First Law
3. (b), (a), (c), (d)
2. Fifth Law
4. (d), (a), (c), (b)
3. Second law
Answer: 2
4. Third Law
68. Which law of 'Library Science'
advocates the weeding of unused material Answer; 3
from the library? 73. At which conference the first model
1. First Law public library act was presented by Dr.
Rangnathan in Banaras?
2. Fifth Law
1. All India Education Confrence,
3. Third Law
Banaras
4. Fourth Law
2. All India Library Confrence, Banaras
Answer: 2
3. All India Sciecne Confrence, Banaras
69. The 'Delivery of Books Act' was
4. All Asia Education Confrence,
enacted in the year:
Banaras
1. 1951
Answer: 4
2. 1954
74. The word the library is made of the
3. 1964 word
4. 1867 a. Latin Word ' Liber
Answer: 2 b. Latin Word ' Liberay
70. 'Rajasthan Public Library Act' was c. Greek Word ' Liber
enacted in ______.
d. Latin Word Lib
1. 2002
Ans- a
2. 2009
75. The library for the people, of the
3. 2003 people and by the people is called
4. 2006 1. Public Library
Answer: 4 2. Institution Library
71. Model Library Bill helps in 3. National Library
1. knowing public libraries better 4. None of These
2. modifying existing Library Acts Ans- a
3. drafting Library Acts 76. What are the first law of library
4. None of these science?
Answer: 3 a. The library is a growing organism
b. Books are for use
Diwakar Education Hub Page 54
UGC NET Library Science Unitwise MCQ
c. Every reader his/ her book 81. Where is the National Library of India
d. Save the time of the reader situated?
Ans- b a. Delhi
77. In which law of library science, the b. Kolkata
concept of child and adult growth has been c. Mumbai
discussed? d. Goa
a. 2th Law of Library Science Ans- b
b. 3th Law of Library Science 82. What are the main sources of income
c. 4th Law of Library Science for public libraries?
d. 5th Law of Library Science - "The library a. Donation
is a growing organism" b. Earn from Book Sell
Ans- d c. Library Cess
78. In which year the Delivery of Book Act d. None of Above
was passed in India?
Ans- c
a. 1955
83. What is the meaning of Resource
b. 1954 sharing?
c. 1956 a. Sharing of books
d. 1957 b. Sharing of materials
Ans- b c. Sharing of all sources
79. Who was brought by Sayaji Gaikwad ii d. Sharing of all sources, services, and
for the improvement of the library services staffs
in Baroda state?
Ans- d
a. W. Borden
84. Physical condition of the books should
b. W. Waden be property maintained. This is known as
c. Dr. Ranganathan (A) Collation.
d. Dr. Devey (B) Conservation
Ans- a (C) Shelf-arrangement
80. Library cess in one of the sources of (D) Organization
finance for which type of libraries?
Answer: (B)
a. Public Library
85. ________ is an important record of
b. National Library books, which shows the position of any
c. College Library book on the shelves.
d. Special Library (A) Bay Guide
Ans- a (B) Authority File
(C) Accession List.
145. This library has the responsibility for (B) Brussels, Belgium
preserving the nation's documented (C) Paris, France
heritage.
(D) Geneva, Switzerland
a) Virtual Library
Answer: (A)
b) Public Library
c) Academic Library 150. What is the full form of LED in Colon
d) National Library Classification?
Answer: d (A) Latest Effective Decade
146. Which of the following Universities (B) Latest Energy Division
was the pioneer to appoint a Reference (C) Light Emitting Diode
Librarian for the first time in India? (D) Latest Effective Division
(A) Banaras Hindu University Answer: (A)
(B) Delhi University 151. Ranganathan’s modified rules of chain
(C) Madras University procedure for deriving subject headings of
(D) Aligarh Muslim University specific subject entry was modified by M
M Job, who suggested to include
Answer: (C)
(A) Space isolate as a sought link term
147. Which of the following organisations
in India is responsible for assigning the (B) Time isolate as a sought link term
thirteen digit International Standard Book (C) ACI as a sought link term
Number? (D) None of the above
(A) NISCAIR Answer: (B)
(B) Raja Ram Mohun Roy National Agency 152. “Report on the Testing and Analysis of
for ISBN an Investigation into the Comparative
(C) Raja Rammohun Roy Library Efficiency of Indexing Systems” contains
Foundation the findings of the project entitled
(D) The National Library, Kolkata (A) MEDLARS
Answer: (B) (B) Cranfield I
148. The word ‘hyper’ in hypertext means (C) ISILT
(A) extension into broader dimensions (D) STAIRS
(B) extension into similar dimensions Answer: (B)
(C) extension into other dimensions 153. BABYLON is a computer software for
(D) extension into narrower dimensions (A) digital library
Answer: (C) (B) library management system
149. European Translation Centre is (C) translation
located at (D) statistical calculation
(A) Delft, Netherlands Answer: (C)
172. The Cow-Calf Principle as enunciated Journal of the American Society for
by Dr. S. R. Ranganathan is useful to Information Science =?
determine (A) Bulletin of the American Society for
(A) the sequence of isolates in an array Information Science and Technology
(B) the sequence of isolates in a chain (B) American Documentation
(C) the facet sequence (C) Annual Review of Information Science
(D) none of the above and Technology
Answer: (C) (D) American Libraries
173. When did Shannon and Weaver put Answer: (B)
forth the mathematical model of 177. The term ‘hypertext’ was coined by
communication? (A) Ted Nelson
(A) 1938 (B) Charles Babbage
(B) 1942 (C) Tim Berners-Lee
(C) 1945 (D) Tay Vaughan
(D) 1949 Answer: (A)
Answer: (D) 178. Library legislation generally ensures
174. Who has coined the term ‘blog’? smooth management of
(A) John Berger (A) Academic libraries
(B) Peter Merholz (B) Documentation centres
(C) Micheal Zeinne (C) Public libraries
(D) David Weiner (D) Special libraries
Answer: (B) Answer: (C)
175. h-index is an index that attempts to 179. Which digital library software was
measure the productivity and impact of developed at Cornell University?
the published work of (A) FEDORA
(A) An Institution (B) EPrints
(B) A Scientist (C) GSDL
(C) A Journal (D) DSpace
(D) An Article Answer: (A)
Answer: (B) 180. Which of the following is not a salient
176. If SRELS Journal of Information feature of Bibliographical Database
Management = Library Science with a Slant Management System?
to Documentation = Library Science, then (A) Variable Field
Journal of the American Society for
(B) Fixed Field
Information Science and Technology =
(C) Repeatable Field
(C) Bradford and Prince model (C) Library Association Publishing, London
(D) Goode and Hatt model (D) Learned Information Ltd., New Jersey
Answer: (C)
Answer: (A)
252. Starting, Chaining, Browsing,
247. The process of flow of Information
Differentiating, Monitoring, Extracting,
from the generator to the user is :
Verification and Ending are important
(A) Information search stages of which information seeking
(B) Information transfer behavior model?
(C) Information need (A) Dervin’s Model
(D) Information system (B) Ellis Model
(C) Marchionnini Model
Answer: (B) (D) Kuhlthan Model
248. “Information is piecemeal, Answer: (B)
fragmented and particular.” Who said ? 253. What kind of arrangement is followed
(A) Daniel Bell in LISA?
(B) Fritz Machlup (A) Alphabetical
(C) Brookers (B) Chronological
(C) Classified
(D) Belkin
(D) Geographical
Answer: (B) Answer: (C)
249. The function of shelf list becomes very 254. Webform is used in
fuzzy when : (A) Synchronous Virtual Reference Service
(A) The library also has an author (B) Asynchronous Virtual Reference Service
catalogue (C) Both (A) & (B)
(B) The library also has a title catalogue (D) None of the above
Answer: (B)
(C) e-books are added to a catalogue
255. An online search in which all aspects
(D) Library also acquires print serials
of the records in natural language may be
Answer: (C) used as sought terms is
250. “Poole’s Index to Periodical (A) Alphabetical collateral search
Literature” was brought out by (B) Multi aspect search
(A) William Frederick (C) Free text searching
(B) F.W. Lancaster (D) Streaming search
(C) Van Rijsbergen Answer: (C)
(D) H.P. Luhn 256. Science Abstracts published by
Answer: (A) (A) INSPEC (Institute of Electrical
251. Walford’s Gurde to Reference Engineering)
Material is published by (B) Institute of Physics, London
(A) American Library Association, Chicago (C) American Institute of Physics
(B) R.R. Bowker, London
267. Name the storage medium 272. Which reference tool defines
(compatible with speed of CPU) for storing Reference service as “….that phase of work
instructions or data temporarily during which is directly concerned with assistance
processing to readers in securing information and in
(A) RAM using the resources of the library in study
(B) ROM and research”?
(C) Cache (A) Encyclopedia of Librarianship
(D) EPROM (B) Encyclopedia of Library and
Answer: (C) Information Science
268. “Scitation” is the online host service (C) ALA Glossary of Library Terms
of (D) ALA World Encyclopedia of Library &
(A) American Institute of Physics Information Services
(B) University of Maryland Answer: (C)
(C) Society for Industrial Research 273. Indian National Advisory Board for
(D) Oxford University Libraries was setup in 1966 by
Answer: (A) (A) Association of Indian Universities
269. The process of surrogating, (B) Ministry of Education
repackaging and compaction of the (C) Planning Commission
primary literature that results in creation (D) University Grants Commision
of secondary journals, is Answer: (B)
(A) Newsletter 274. The process of establishing headings
(B) Abstracting and Indexing Periodical and providing ‘Cross references’ is called
(C) House Journals (A) Access points
(D) Electronic Journal (B) Headings
Answer: (B) (C) Authority control
270. Which of the following is not a (D) Bibliographic Records
language of DBMS? Answer: (C)
(A) DDL 275. Which set of rules is applicable for
(B) DML exchange of files over Internet?
(C) PASCAL (A) FTP/IP
(D) PLI (B) HTTP
Answer: (C) and (D) Both. (C) HTML
271. How do we render the name (D) HYPERLINK
‘Bernardo Augustine De Voto’? Answer: (B)
(A) Voto, Bernardo, Augustine De 276. The first printed works are called
(B) De Voto, Augustine, Bernardo (A) Impensis
(C) Bernardo Augustine, De Voto (B) Incunabula
(D) De Voto, Bernardo Augustine (C) Impression
Answer: (D) (D) Imprimatur
Answer: (B)
277. Which Law of Library Science, 282. Who said that information is both a
restated with emphasis on information as product and process?
a dynamic, continuum and never ending (A) S.R. Ranganathan
phenomenon? (B) J. Martin
(A) Fifth Law (C) D.J. Foskett
(B) Fourth Law (D) S.C. Bradford
(C) Third Law Answer: (B)
(D) Second Law 283. The process of planning, allocating,
Answer: (A) organizing and evaluation library tasks and
278. Andrew Carnegie donated two million activities within the framework of major
pounds for development of objectives, mission and policy refers to
(A) Library Collection (A) Functional control
(B) Library Building (B) Functional Classification
(C) Library Furniture (C) Functional Approach
(D) Library Staff (D) Functional Authority
Answer: (B) Answer: (C)
279. Whose model of communication of 284. Identify the MARC tag that is used for
knowledge suggests that communication variable fields containing data related to
as an open system may be regarded as subject access to the document :
subjective, selective, variable and yet (A) 7XX
unpredictable?
(B) 6XX
(A) G. Gerbner
(B) Juger Hebermans (C) 5XX
(C) E Shanon & Weaver (D) 2XX
(D) M. Foucault Answer: (B)
Answer: (A) 285. The generic tasks for which users use
280. Which Committee/Commission a database described in the FRBR model
recommended that Imperial Library be are :
designated as Copyright Library?
(A) ‘to find’, ‘to identify’, ‘to select’ and ‘to
(A) Fayzee Commission, 1939
acquire or obtain’
(B) Riche Committee, 1926
(C) Statham Committee, 1932 (B) ‘to browse’, ‘to identify’, ‘to select’ and
(D) Sadler Committee, 1916 ‘to acquire or obtain’
Answer: (A) or (B). (Not sure) (C) ‘to find’, ‘to select’, ‘to acquire’ and ‘to
281. What are the four entities of FRBR read’
model? (D) ‘to discover’, ‘to categorize’, ‘to select’
(A) Personality, Matter, Energy, Space and ‘to acquire’
(B) Books, Form, Availability, Type Answer: (A)
(C) Work, Expression, Manifestation, Item 286. In the context of the structure, the
(D) Discipline, Entity, Action, Personality second component of the MARC record is :
Answer: (C)
Diwakar Education Hub Page 76
UGC NET Library Science Unitwise MCQ
11. Assertion (A) : Micrographic services 14. Assertion (A) : The effective
have lost acceptance for preservation and reprographic service in libraries indirectly
dissemination of archival material. demotivates the user for tearing/theft of
Reason (R): ICT has brought in cost reading material.
effective alternatives and replaced Reason (R) : the user gets the photocopy of
micrographic services. reading materials free of cost.
Codes : Codes :
(A) (A) is true and (R) is partially true. (A) (A) is false and (R) is true.
(B) Both (A) & (R) are false. (B) Both (A) and (R) are true.
(C) (A) is true, (R) is false. (C) (A) is true and (R) is false.
(D) (A) is false, (R) is true. (D) Both (A) and (R) are flase.
Answer: (A) Answer: (C)
12. Assertion (A) : Institutions generate 15. Assertion (A) : RFID technology is still
information through research and not widely installed in Indian Library
development activities. Environment.
Reason (R) : All such generated Reason (R) : the standardization,
information forms the grey literature. application and innovation are constantly
Codes : changing.
(A) Both (A) and (R) are true. Codes:
(B) Both (A) and (R) are false. (A) Both (A) & (R) true and (R) is the
correct explanation of (A).
(C) (A) is true, (R) is partially true.
(B) Both (A) & (R) are true, but (R) is not
(D) (A) is false, (R) is true.
the correct explanation of (A).
Answer: (C)
(C) (A) is true, but (R) is false.
13. Assertion (A) : Maximizing the access to
(D) (A) is false, but (R) is true.
information in higher education is the
motto of UGC-INFONET project. Answer: (B)
Reason (R) : the financial grants of UGC- 16. Assertion (A) : Gap device is a
INFONET are not being fully utilized by all nonscientific solution to the problem of
University Libraries for the assigned growing universe.
purpose. Reason (R) : A classificationist cannot
Codes : forcast the areas/subjects wherein some
new ones may emerge.
(A) Both (A) and (R) false.
Codes:
(B) (A) is true and (R) is partially true.
(A) (A) and (R) is false.
(C) (A) is true and (R) is false.
(B) (A) is true and (R) is false.
(D) (A) is false and (R) is true.
(C) (A) is false and (R) is true.
Answer: (B)
(C) Both (A) and (R) are false (C) (iv) (i) (iii) (ii)
(D) Both (A) and (R) are true (D) (ii) (iii) (i) (iv)
Answer: (D) Answer: (C)
29. Assertion (A): Loose Assemblage is the 32. Which of the following are library
process of linking together the different networks?
classes 1. INTERNET
Reason (R): This mode was formerly known 2. DELNET
as subject bundle
3. NICNET
(A) (A) is true, but (R) is false
4. OCLC
(B) (A) is false, but (R) is true
(A) 1 and 2 are correct
(C) Both (A) and (R) are true
(B) 2 and 4 are correct
(D) Both (A) and (R) are false
(C) 1 and 3 are correct
Answer: (C)
(D) 1 and 4 are correct
30. Assertion (A): DDC is an enumerative
Answer: (B)
classification scheme.
33. The national level associations for
Reason (R): DDC has adapted analytic-
special libraries are:
synthetic approach for the enumeration of
classes. 1. Association for Information
Management (ASLIB)
(A) (A) is true, but (R) is false
2. Society for Information Science (SIS)
(B) (A) is false, but (R) is true
3. Charatered Institute of Library and
(C) Both (A) and (R) are true
Information Professionals (CILIP)
(D) Both (A) and (R) are false
4. Indian Association of Special Libraries
Answer: (A) and Information Centers (IASLIC)
31. Match the following: (A) 1 and 3 are correct
List-I List-II (B) 2 and 3 are correct
(a) BLAISE project (i) Library (C) 1 and 4 are correct
of congress
(D) 3 and 4 are correct
(b) MARC project (ii) Intel
Answer: (D)
(c) Union Catalogue project (iii) Insdoc
34. Arrange the following according to the
(d) Microchip (iv) British year of publication:
Library
A) Encyclopaedia Britannica,
Codes : Encyclopaedia Americana, Encyclopaedia
(a) (b) (c) (d) of Library & Information Science, McGraw-
(A) (iii) (ii) (iv) (i) Hill Encyclopaedia of Science & technology.
(B) (i) (ii) (iii) (iv) B) Encyclopaedia Britannica,
Encyclopaedia of Library & Information
4. Bibliography Answer: 4
Answer: 3 87. Who has developed the 'Guidelines on
82. Now 'DELNET' stands for: information literacy for lifelong learning?
1. Delhi Library Network 1. RUSA
2. Developing Library Network 2. ACRL
3. Distance Library Network 3. SCONUL
4. Digital Libraries Network 4. IFLA
Answer: 2 Answer: 4
83. 'National Register of Translators' is 88. 'Bibliographic Coupling’, was first
maintained by: advocated by
1. NISCAIR 1. B.K. Sen
2. IASLIC 2. S.R. Ranganathan
3. Central Translation Bureau 3. M.M. Kessler
4. National Translation Mission 4. S.C. Bradford
Answer; 4 Answer; 3
84. 'Contents by Journal' is an example of: 89. When the user requires almost all
relevant literature on a subject such
1. CAS
approach is called as :
2. SDI
1. Catching up approach
3. DDS
2. Exhaustive approach
4. Translation
3. Everyday approach
Answer: 1
4. Current approach
85. UNISIST is
Answer: 2
1. International system for the
90. Who was the first to give the concept
transfer of information
of Selective Dissemination of Information
2. Documentation centre in India as we understand it today?
3. Type of special information 1. Melvil J. Voigt
service in humanities
2. H. Peter Luhn
4. Directory
3. L.J.S. Strauss
Answer: 1
4. E M Hanson
86. ‘‘World Index of Scientific
Answer: 2
Translations’’ is published by
91. The Big6 Model and approach was
1. National Translations Center of UK
developed by ________.
2. Library of Congress
1. S. Serap Kurbanoglu
3. American Library Association
2. W. Edwards Deming
4. European Translation Center
Diwakar Education Hub Page 91
UGC NET Library Science Unitwise MCQ
(D) Non documentary Source 134. Who propagated the demand and
Answer: (C) supply theory of book
129. ‘Re P.Ec’ is a database of (A) SR Ranganathan
(A) Geography (B) Melvil Dewey
(B) Political Science (C) Adamsmith
(C) Petroleum (D) Mc Colvin
(D) Economics Answer: (D)
Answer: (D) 135. In the acronym ‘POSDCORB’, ‘CO’
stands for
130. Which of the following is an isolate
(A) Co-ordination
(A) Botany
(B) Co-operation
(B) Medicine
(C) Co-relation
(C) Geography
(D) Co-existence
(D) France
Answer: (A)
Answer: (D)
136. What leads to job description
131. Who initiated shared cataloguing
(A) Job satisfaction
(A) Library of Congress
(B) Job analysis
(B) Imperial Library
(C) Work Description
(C) British Museum
(D) Job evaluation
(D) National Library of Australia
Answer: (B)
Answer: (A)
137. Financial estimation is made on the
132. ‘Charles Ammi Cutter’ is well known
basis of
for
(A) Ledger Method
(A) Classified Catalogue
(B) Marginal Cost Method
(B) Alphabetico- classified catalogue
(C) Per-Capita Method
(C) Mixed catalogue
(D) Cost-based Method
(D) Dictionary catalogue
Answer: (C)
Answer: (D)
138. CDS/ISIS was introduced first by
133. ‘Accession Number’ means
(A) DRTC
(A) Call Number of a book
(B) IBM
(B) Unique Number given to a book by a
library (C) CSIR
(C) Book Number (D) UNESCO
(D) Class Number Answer: (D)
Answer: (B) 139. ‘Google earth’ is
168. Which one of the following is not a 173. Classical school of management
metadata schema? thought was introduced by
(A) DCMS (A) A. Maslow
(B) ONIX (B) F. W. Taylor
(C) GILS (C) H. Fayol
(D) LUCENE (D) W. Frederick
Answer: (D) Answer: (C)
169. MeSH is the name of 174. Who should undertake system
(A) a Bulletin in Medical Sciences analysis study in a university library?
(B) an International Medical Library (A) The Chief Librarian
(C) a Controlled Vocabulary Device in (B) The Systems Analyst
Medical Sciences (C) The Librarian & the System Analyst
(D) none of the above (D) The data entry operator
Answer: (C) Answer: (C)
170. Research Scholars generally prefer 175. The ISSN for Indian Journals is alloted
(A) Primary sources of information by
(B) Tertiary sources of information (A) ICSSR
(C) Secondary sources of information (B) RRRLF
(D) Primary & Secondary sources of (C) ISRO
information (D) NISCAIR
Answer: (A) Answer: (D)
171. Trend report gives the _____ picture 176. 2011 is the centenary year of
of a subject. publication of
(A) comprehensive (A) Sears list of Subject Headings
(B) executive (B) Expansive Classification
(C) latest (C) Systematic indexing
(D) recent (D) Grammar of Classification
Answer: (A) Answer: (C)
172. Pre-cordinate indexing was 177. Which association’s tagline is
propounded by “connecting people and information”?
(A) Melvil Dewey (A) SLA
(B) S. R. Ranganathan (B) IFLA
(C) Derek Austin (C) IASLIC
(D) M. B. Line (D) ILA
Answer: (B) Answer: (A)
225. The book entitled “Powershift” is 230. The complete catalogue record of a
authored by............................. . document is known as.................... .
(A) J.D. Bernal (A) Title Entry
(B) D. Solla Price (B) Added Entry
(C) Alvin Toffler (C) Analytical Entry
(D) H.E. Bliss (D) Main Entry
Answer: (C) Answer: (D)
226. Mark the “odd one out” : 231. The Berne convention is concerned
(A) Kaiser with.......................... .
(B) Line (A) Translation
(C) Farradane (B) Patents
(D) Coates (C) Copyright
Answer: (B) (D) Standards
227. “Broad system of ordering” Answer: (C)
is.............................. . 232. Routing of periodicals is considered
(A) Modified classificatory system as............................ .
(B) Method of acquisition (A) Current Awareness Service
(C) An information system (B) Selective Dissemination of Information
(D) Cataloguing principle (C) Translation Service
Answer: (A) (D) Indexing Service
228. Mark the “odd one out” : Answer: (A)
(A) Sought Link 233. Which of the following organization
was responsible for the development of
(B) Unsought Link
UDC ?
(C) Key Link
(A) Library of Congress
(D) False Link
(B) The British Library
Answer: (C)
(C) UNESCO
229. In DDC, phoenix schedules represent
(D) FID
classes which are.......................................
. Answer: (D)
(A) Slightly modified 234. The National Library of India receives
books for deposit under........................... .
(B) Completely modified
(A) Right to Information Act
(C) Yet to be modified
(B) Registration of Books Act
(D) Discontinued
(C) Copyright Act
Answer: (B)
(D) Delivery of Books and Newspapers Act
(d) Maslow’s hierarchy of Needs Theory (4) (b) and (c) are correct.
Code: Answer: (3)
(1) (a), (b) and (d) are correct. 20. Identify the key salient traits of Soft
(2) (b), (c), (d) are correct. data:
(3) (a), (b), (c) are correct. (a) human intelligence
(4) (a), (c), (d) are correct. (b) certain and definite
Answer: (1) (c) opinions and contradictions
18. Identify the ways in which the library (d) no scope for constructive criticisms
can benefit from the TQM as stated by Code:
Jurow and Barnard: (1) (a) and (b) are correct.
(a) Breaking down interdepartmental (2) (c) and (d) are correct.
barriers.
(3) (a) and (c) are correct.
(b) Redefining the beneficiaries of library
(4) (b) and (d) are correct.
services as internal customers (staff) and
external customers (patrons). Answer: (3)
(c) More inclined to short-term goals and 21. Identify the components of ‘LAMP’
defiant to changes to suit users needs. given below:
(d) Reaching a state of continuous (a) Linux
improvement. (b) Acrobat
Code: (c) MYSQL
(1) (a), (b) and (c) are correct. (d) Pearl
(2) (b), (c) and (d) are correct. Code:
(3) (a), (c) and (d) are correct. (1) (b) and (c) are correct.
(4) (a), (b) and (d) are correct. (2) (a) and (c) are correct.
Answer: (4) (3) (a) and (d) are correct.
19. Identify the cases that require an (4) (b) and (d) are correct.
application for a new ISSN number: Answer: (2)
(a) Change in the publication’s medium 22. Identify the features of proprietary
(b) Change in publisher software:
(c) Change in the frequency of publication (a) Continuity and Development
(d) Change in publication title (b) Ease of use
Code: (c) Transparency
(1) (a) and (b) are correct. (d) Documentation and Support
(2) (c) and (d) are correct. Code:
(3) (a) and (d) are correct. (1) (a), (b) and (d) are correct.
(2) (b), (c) and (d) are correct. 25. A virtual library:
(3) (a), (b) and (c) are correct. (a) Presupposes a physical existence.
(4) (a), (c) and (d) are correct. (b) Collection of resources available on one
Answer: (1) or more computer systems with a single
interface or entry point to the collection.
23. Which of the following research
methods are used in a study of scattering (c) Does not provide access to entire
of periodicals? content of a (digital) library via internet.
(a) Biobibliometric study (d) Provides user assistance services such
as reference, inter library loan, etc.
(b) Bibliometric study
Code:
(c) Citation analysis study
(1) (a) and (b) are correct.
(d) Altmetric study
(2) (b) and (c) are correct.
Code:
(3) (b) and (d) are correct.
(1) (a) and (d) are correct.
(4) (a) and (c) are correct.
(2) (b) and (c) are correct.
Answer: (3)
(3) (a) and (c) are correct.
26. Which of the following are review type
(4) (a), (b) and (c) are correct.
services?
Answer: (2)
(a) Current Awareness List
24. Information seeking behavior (ISB)
(b) Trend Reports
essentially refers to and concerned with:
(c) News clippings
(a) De-recognition of some needs
perceived by the user. (d) State of the Art Report
(b) The strategies and actions undertaken Code:
to locate discrete knowledge elements. (1) (a) and (b) are correct.
(c) The experiment conducted on (2) (a) and (d) are correct.
usefulness of library collection with (3) (b) and (d) are correct.
reference to a nonpurposive and conscious
(4) (b) and (c) are correct.
need of a particular piece of information.
Answer: (3)
(d) Interactive utilization of three basic
resources such as people, information and 27. Match the following:
system. List-I List-
Code: II
(1) (a) and (b) are correct. (a) Anthony Penezzi (i) C.C.C.
(2) (c) and (d) are correct. (b) C. A. Cutter (ii) ALA
code
(3) (a) and (c) are correct.
(c) S. R. Ranganathan (iii)
(4) (b) and (d) are correct.
British Museum
Answer: (4)
2. e-thesis Answer: 2
3. e-books 284. 'Mendeley' is developed by -
4. e-journals 1. ProQuest
Answer: 2 2. Sonny Software
279. Which of the following is a feature of 3. Labtiva
Web OPAC? 4. Elsevier
1. It is command-language-based Answer: 4
2. It is navigation-based 285. What is the purpose of WSDL in a web
3. It is pre-coordinated service?
4. It is phrase-indexed A - A web services takes the help of WSDL
Answer: 2 to tag the data, format the data.
280. Koha software was created by B - A web service takes the help of WSDL
to transfer a message.
1. Environ Software Private Limited
C - A web service takes the help of WSDL to
2. Autolib Software
describe the availability of service.
3. Katipo Communications
D - None of the above.
4. Algorithms Pvt. Ltd.
Answer: C
Answer: 3
286. Which of the following role of web
281. Sanjay software developed by service architecture implements the
1. INFLIBNET service and makes it available on the
2. DESIDOC Internet?
3. TATA Unisys A - Service Provider
4. NISSAT B - Service Requestor
Answer: 2 C - Service Registry
282. 'URKUND' offers D - None of the above.
1. Library statistical analysis Answer: A
2. Detect and prevent plagiarism 287. Which of the following layer in Web
Service Protocol Stack is responsible for
3. Helps in online Cataloguing
centralizing services into a common
4. Support in Library automation registry and providing easy publish/find
Answer: 2 functionality?
283. POP stands for _______? A - Service Transport
1. Print Office Protocol B - XML Messaging
2. Post Office Protocol C - Service Description
3. Pre Office Protocol D - Service Discovery
4. Post Object Protocol Answer: D
Reason (R) : The fixed order facilitates easy 7. Choose the correct one:
access in computer based information Assertion (A): As the level of Recall
retrieval. decreases, the precision increases.
Codes : Reason (R): Recall and Precision are not
(A) (A) is true and (R) is false. always inversely correlated.
(B) (A) is false and (R) is true. 1. (A) is false, but (R) is true
(C) Both (A) and (R) are true. 2. (A) is true, but (R) is false
3. Both (A) and (R) are true
(D) Both (A) and (R) are false.
4. Both (A) and (R) are false
Answer: (A)
Answer: (A) is true, but (R) is false
5. Assertion (A) : There is criticism by
8. Which among the followings are almost
academicians and scientists on the use of
enumerative classification schemes?
impact factor as a measure of importance.
a) Expansive Classification
Reason (R) : Impact factor is a journal
metrics and can not be used to assess b) Dewey Decimal Classification
quality of individual research. c) Library of Congress Classification
Codes : d) Subject Classification
(A) (A) is false but (R) is true. 1. a, b, and d are correct
(B) Both (A) and (R) are true. 2. a, c and d are correct
3. a and d are correct
(C) Both (A) and (R) are false.
4. b and d are correct
(D) (A) is true but (R) is false.
Answer: b and d are correct
Answer: (B)
9. Arrange the cataloging codes according
6. Match the following : to the year of publication
List I List II i) AAC
(i) Aslib Proceedings (a) Science ii) CCC
Direct
iii) AACR II
(ii) DOAJ (b) Web of
iv) British museum Code
Science
1. i,ii,iii,iv
(iii) Thomson Reuters (c) Open Access
2. i,ii,iv,iii
Journals
3. iv,i,ii,iii
(iv) Elsevier (d) Emerald 4. iv,ii,iv,ii
(i) (ii) (iii) (iv) Answer:C
(A) (d) (c) (b) (a) 10. Arrange the following facets in
(B) (c) (d) (b) (a) building book numbers according to facet
(C) (a) (c) (d) (b) formula as prescribed in colon
classification:
(D) (c) (a) (b) (d)
Answer: (A) a) Serial number
(b) Library (ii) Emerald Group (4) (iii) (iv) (i) (ii)
Quarterly Publishing Ltd Answer: (4)
(c) Library (iii) John Hopkins 19. Match the following titles with their
Review University Press class numbers according to CC 6th edition:
(d) Library (iv) University of List - I List — II
Trends Chicago Press
(a) Blog (i) Tim Vanderhook and (a) ETD domain (i) METS
(b) Wikis Justin Timberlake (b) Inage domain (ii) CCO
(c) (ii) Google (c) Cultural objects (iii) ConCore
Linkedin (iii) Word Cunningham (d) Learning (iv) VRA-Core
(d) (iv) Reid Hoffman and his objects
Myspace friends
Code:
Code: (a) (b) (c) (d)
(a) (b) (c) (d) (1) (i) (ii) (iii) (iv)
(1) (ii) (iii) (iv) (i) (2) (i) (ii) (iv) (iii)
(2) (i) (ii) (iii) (iv) (3) (iii) (ii) (i) (iv)
(3) (iv) (iii) (ii (i) (4) (i) (iv) (ii) (iii)
(4) (iii) (i) (iv) (ii) Answer: (4)
Answer: (1) 26. Match the following:
24. Match the following:
list - I List - II
List - I List - II
(a) Infomix (i) Image software
(a) Chester Carton (i) e-Book (b) Omni (ii) Remote login
(b) Brewstu Kable (ii) Xerox Copier page software
(c) Michael S. Hart (iii) NDLTD (c) Tiff (iii DBMS software
(d) Edward Fox (iv) Internet viewer (iv) OCR software
Archive (d) Team
viewer
Code:
(a) (b) (c) (d) Code:
(1) (ii) (iv) (i) (iii) (a) (b) (c) (d)
(2) (iv) (iii) (ii) (i) (1) (ii) (i) (iii) (iv)
(3) (iv) (i) (iii) (ii) (2) (iii) (iv) (i) (ii)
(4) (i) (ii) (iii) (iv) (3) (i) (ii) (iii) (iv)
(4) (iv) (iii) (ii) (i)
Diwakar Education Hub Page 153
UGC NET Library Science Unitwise MCQ
Answer: 1
(a) Kinesics (i) Use of touch to
communication communication 34. Which fixes the place of a subject
relative to other subjects in a scheme of
(b) Hap tics (ii) Use of
classification?
communication Interpersonal space
1. Class Number
(c) Proxemics (iii) Facial Expression,
2. Call Number
communication gestures, eye
3. Book Number
(d) Iconics movement
4. Accession Number
communication (iv) Interpretation of
Answer: 1
symbolism
35. A person who designs a scheme of
Code: library classification is called
(a) (b) (c) (d) 1. Classification
(1) (i) (iii) (ii) (iv) 2. Classifier
3. Librarian
(2) (iii) (iv) (ii) (i) 4. Information officer
(3) (ii) (ii) (i) (iv) Answer: 1
(4) (iii) (i) (ii) (iv) 36. Which fixes the place of a subject
Answer: (4) relative to other subjects in a scheme of
31. Anesthesiology is obtained by which classification?
mode of formation of subjects? 1. Class Number
1. Loose Assemblage 2. Call Number
2. Fission 3. Book Number
3. Fusion 4. Accession Number
4. Distillation Answer: 1
Answer: D 37. The first textbook on classification
32. “Statistics for librarians” is obtained by “Classification, theoretical’ and Practical”
which mode of formation of subjects? is written by
1. Clusters 1. WCB Sayers
2. Fusion 2. E C Richardson
3. Loose Assemblage 3. E W Hume
4. Distillation 4. JD Brown
Answer: 3 Answer: 1
33. A person who designs a scheme of 38. Who is referred to as the first
library classification is called grammarian of library classification
1. Classifications 1. E C Richardson
2. Classifier 2. WCB Sayers
3. Librarian 3. Melville Dewey
4. Information officer 4. SR Ranganathan
101. ‘Cutter’s Author Table’ for Book 106. An increase in the level of ‘specificity’
Number was devised in __. of indexing languages results in increased
1. 1879 in __.
2. 1902 1. Recall
3. 1895 2. Precision
4. 1880 3. Noise
Answer: 1880 4. Both Recall and Precision
102. Ranganathan’s book number formula Answer: Precision
is based on _____. 107. Roget’s International Thesaurus is
1. Cutter-Sanborn Three Figure Author a__.
Table 1. List of scientific terms
2. Biscoe Time Numbers 2. Book of technical terms
3. Rider’s Two Symbol Book Number 3. Book of synonyms
4. Merrill Book Numbers 4. Classified list of terms
Answer: Biscoe Time Numbers Answer: Classified list of terms
103. 'Biscoe Time Numbers' - a 108. In Sear’s List of Subject Headings,
chronological scheme for book number preferred headings are indicated by __.
was first published in __. 1. Making them as preferred headings
1. 1880 2. Printing them in bold type
2. 1882 3. Italicizing them
3. 1885 4. Underlining them
4. 1890 Answer: Printing them in bold type
Answer: 1885 109. “An information retrieval system will
104. Method of Residue is used to find out tend not to be used whenever it is more
__. painful and troublesome for a customer to
1. Personality Facet have information than for him not to have
2. Matter Facet it”. The statement is known as the __.
3. Energy Facet 1. Amadahl’s Law
4. Time Facet 2. Mooer’s Law
Answer: Personality Facet 3. Heap’s Law
4. Zipf’s Law
105. Dr. S. R. Ranganathan undertool a
comparative study of five cataloguing Answer: Mooer’s Law
codes in the works of __. 110. CONSER is ___.
1. Definition of Cataloguing 1. A cooperative online serials
2. Principles of Cataloguing cataloguing program
3. Headings and Canons 2. A source of high quality bibliographic
4. Objectives of Cataloguing records for serials
Answer: Headings and Canons 3. A source of high quality
documentation and training
Diwakar Education Hub Page 162
UGC NET Library Science Unitwise MCQ
D. Tracing Answer: C
Answer: A 183. The Machine-Readable Cataloguing
178. The AACR-2 was edited by — was firstly started by —
A. Gorman & Winkler A. British Library
B. Whittaker & Bliss B. Library of Congress
C. Andrew Brown C. NISCAIR
D. None of the above D. National Library
Answer: A Answer: C
179. IInd part of AACR-2 has — 184. The two prominent inner forms of
catalogue are —
A. 13 chapters
A. Classified & Alphabetical
B. 6 chapters
B. Classified & Dictionary
C. 4 appendix
C. Name & Classified
D. All of the above
D. Alphabetical &Alphetico-based
Answer: B
Answer: C
180. Which filing rules had their origins in
the report of a Working Party on computer 185. In Ranganathan՚s classified catalogue,
filing set up by the Library Association there are five types of entries: Main entry,
Cataloguing and Indexing Group? Cross Reference Entry, Class Index Entry,
Book Index Entry and other is —
A. LC
A. Name Index
B. ALA
B. Title Index
C. BLAISE
C. Subject Index
D. Berghoeffer
D. Cross Reference Index
Answer: C
Answer: D
181. The internationally agreed upon
number given to a book is called — 186. The 2nd edition of Cataloguing Practice
published in —
A. ISBN
A. 1945
B. ISDN
B. 1955
C. ISSN
C. 1975
D. ISMN
D. 1951
Answer: A
Answer: D
182. C. C. F. stands for —
187. Computer Aided Subject System
A. Current Classification Format
(COMPASS) was introduced for —
B. Current Communication Format
A. BNB
C. Common Communication Format
B. C. l. P.
D. Common Classification Format
Diwakar Education Hub Page 170
UGC NET Library Science Unitwise MCQ
Answer: A A. Title
216. In Colon Classification, 7th edition, the B. Author
only Greek letter used is — C. Subject
A. etah D. Publisher
B. gamma Answer: C
C. beta 221. Which sequence of subjects facilitates
D. delta readers not only in getting documents but
Answer: A also helps them know the strength &
weakness of the collection?
217. According to Dr. S. R. Ranganathan,
the terms hospitality in array & hospitality A. Filiatory
in chain represent the capacity of — B. Helpful
A. idea system C. Parallel
B. practical system D. Evolutionary
C. national system Answer: C
D. verbal system 222. It is the ordinal number which fixes
Answer: C the place of a document in a library
relative to other documents having the
218. Colon Classification was a rigidly
same class number —
faceted scheme before —
A. Accession number
A. 4th edition
B. Year Number
B. 5th edition
C. Book Number
C. 6th edition
D. Call Number
D. 7th edition
Answer: D
Answer: D
223. The amount of literature published or
219. The four canons of which plane deal
likely to be published on a subject is —
with the language & terminology aspects
in a A. literary warrant
scheme of classification? B. users warrant
A. Idea C. collocation
B. Verbal D. dilatory sequence
C. Practical Answer: A
D. Notational 224. The total number of indicator digits
used in the notational system of the
Answer: D
7th edition of Colon Classification is —
220. This arrangement helps bring together
A. six (6)
on the shelves documents on one & the
same subject followed by those of related B. fourteen (14)
subjects is — C. sixty (60)
Diwakar Education Hub Page 174
UGC NET Library Science Unitwise MCQ
A. self-list D. 14
B. accession register Answer: A
C. catalogue 257. Loose leaf form of library catalogue is
D. bibliography known as —
Answer: B A. sheaf form
253. It is an inventory record of a library B. card form
which records bibliographical data of items C. visible form
arranged exactly the way the items are D. cyclostyled form
arranged on the shelves of a library in
Answer: C
various rooms, halls or floors —
258. In the 19th century the most common
A. Book list
physical form of library catalogue was the
B. Accession list —
C. Catalogue A. sheaf form
D. Self-list B. found register form
Answer: D C. printed book form
254. The first edition of Ranganathan՚s D. cyclostyled form
Classified Catalogue Code appeared in —
Answer: A
A. 1930
259. The microform catalogues are being
B. 1934 used extensively since
C. 1964 A. 1960՚s
D. 1945 B. 1970՚s
Answer: B C. 1980s
255. British Museum Cataloguing Rules is D. 1990՚s
also known as —
Answer: B
A. Panizzi 91 Rules
260. Which form of library catalogue refers
B. Jewett՚s Rules to the arrangement of catalogue entries in
C. Cutter՚s Rules a logical and systematic order to fall into a
D. A. A. Rules helpful sequence for storage & retrieval?
Answer: A A. Outer
256. The first part of AACR II R is denoted B. Inner
into how many chapters containing C. Alphabetical
descriptive rules — D. Classified
A. 10 Answer: B
B. 12 261. Name catalogue is almost used in —
C. 13 A. U. S. A.
B. 1971 B. 1956
C. 1973 C. 1961
D. 1975 D. 1968
Answer: B Answer: A
271. The Machine-Readable Cataloguing 276. In Bibliographic data formats, codes
Project was first launched by the — used to identify different data elements in
A. British Library the record is known as —
B. Library of Congress A. Record label
C. National Library B. Directory
D. NISCAIR C. Data fields
Answer: B D. Content designer
272. The classified Catalogue consists of — Answer: D
A. two parts 277. The system in which the main entry
and added entry carry the same
B. three parts
information about the document is —
C. four parts
A. Unit Card system
D. five parts
B. Additional Card system
Answer: A
C. Combined Card system
273. Which catalogue is a variation &
D. MARC Card system
extension of an author catalogue?
Answer: A
A. Subject
278. The first edition of CCF was published
B. Classified
in the year —
C. Name
A. 1962
D. Alphabetico-classes
B. 1974
Answer: C
C. 1984
274. The catalogue where all the entries
D. 1976
are arranged in a single alphabetical order
is — Answer: C
A. author catalogue 279. In AACR-2R, the courts are entered
under their —
B. dictionary catalogue
A. name directly
C. subject catalogue
B. name of chief of Justice
D. title catalogue
C. name of Govt.
Answer: B
D. jurisdiction
275. ALA Filling Rules was first published in
the year — Answer: C
A. 1942
A. 2 Answer: A
B. 3 294. Post-Coordinate Indexing Systems are
C. 4 also called as —
D. 8 A. POPSI
Answer: B B. KWIC
290. Which contain more than one unit C. Coordinate Indexing System
concept in them & a number of terms may D. Chain Indexing
be used to fully describe these concepts? Answer: C
A. Multi-work concept 295. A device for searching through a
B. Complex subject fragment of the search term so that it can
C. Compound subject match related terms starting with the
same terms is called as —
D. Meta subject
A. Boolean search
Answer: B
B. Truncation
291. Subject heading lists & thesauri are
two types of ________ indexing language. C. Thesaurus
A. natural D. Indexing language
B. free. Answer: A
C. controlled 296. Concept of Theasuro-Facet has been
developed by —
D. uncontrolled
A. Ranganathan
Answer: C
B. Jean Aitkinson
292. The indexing system in which
coordination of terms in the index C. Derek Austin
descriptions are decided before any D. Ganesh Bhattacharya
particular request is made, is known as — Answer: B
A. coordinate indexing system 297. K. W. A. C. stands for —
B. post-coordinate indexing system A. Keyboard Associate Context
C. descriptive indexing system B. Keyword & Context
D. pre-coordinate indexing system C. Keyboard Abbreviated Context
Answer: D D. Keyword Added Context
293. Which type of indexing model PRECIS Answer: B
& POPSI are?
298. Computer Added Subject System
A. Post-Coordinate (COMPASS) was introduced for BNB in the
B. Pre-Coordinate year —
C. Natural A. 1981
D. Free B. 1991
C. 1994 B. Entity
D. 1997 C. Division
Answer: B D. Assortment
299. Which is the world՚s largest & most Answer: D
comprehensive bibliographic database? 304. Any sub-aggregate of the entities
A. First search formed by the division of the entities of a
B. World cat universe is called as —
C. Prompt cat A. Group
D. O. C. L. C. Access Services B. Class
Answer: D C. Universe
300. The World Cat Service is provided by D. Entity
— Answer: A
A. R. L. I. N.
B. L. C.
C. W. L. N.
D. O. C. L. C Unit -6 MCQs
Answer: D
1. How to handle grievances?
301. It is a system of terms used to denote
a. Grievance in writing / taking to
the classes or ranked isolates in a scheme
employee directly for speaking truth /
for classification —
ensure confidentiality and handle the case
A. Terminology within tie frame
B. Classification b. Treat each case as important, and obtain
C. Taxonomy grievances in writing / examine company’s
D. Notion position / identify violations / do not hold
Answer: C back the remedy, if the company’s wrong +
(a) above
302. The terms that define the basic
c. Get all the facts (relevant) about the
concepts which are germane to the very
grievance / examine the personnel record
nature of classification process are —
of the aggrieved worker / gather
A. Assumed information from the union representative
B. Fundamental properly + (b) above
C. Normative d. Identify grievance / previous record of
D. Associative the worker / companies’ rules and prompt
Answer: C redressal of grievances, if genuine.
303. Classification in Sense 2 is — Answer: (c)
A. Universe 2. The core elements of HRM are –
(ii) Staffing – providing the competency (i) Keep ahead in the talent war
matrix required to face future challenges (ii) Attract & induce the right kind of
(iii) Employee Development – identify cost people she is looking for
effective & modem methods of training for (iii) Enhance her ability to get quality
skill & competency development resumes to choose from
(iv) Performance Management – (iv) Retain her existing employee pool
Developing an entire gamut of per-
(v) Subsequently see a dip in employee
formance linked measures to align
turnover
individual performance to the overall
corporate performance (a) i, ii, iii, iv
(v) Employee Rewards – with emphasis on (b) i, ii, iii, iv, v
pay for performance & developing an (c) i, ii, iv, v
incentive scheme that would reduce fixed (d) None of the above
costs at the same time being motivating Answer: (b)
(vi) Maintaining quality of Work Life & 9. How an Individual Training needs are
Discipline – with the impact of global identified?
workforce it is necessary to develop a
linked work-life discipline for all (i) Performance Appraisals
employees in the organisation (ii) Interviews
(a) i, ii, iii, iv (iii) Questionnaires
(b) ii, iii, iv, v (iv) Employee Engagement surveys
(c) iii, iv, v, vi (v) Training Feedback
(d) All of the above (a) i, ii, iii, iv
Answer: (d) (b) only iii
7. What are the objectives of HRM? (c) i, ii, iv, v
(i) Societal Objectives (d) Both (b) and (c)
(ii) Organisational Objectives Answer: (d)
(iii) Functional Objectives 10. Training & Development together helps
(iv) Personal Objectives. in –
(v) Statistical Objectives. (i) Removing performance deficiencies
(a) i, ii, iii, iv (ii) Offer Greater stability
(b) ii, iii, iv, v (iii) Flexibility & capacity for growth
(c) i, ii, iv, v (iv) Reduces accidents, wastages &
damages to machinery
(d) All of the above
(v) Reduces dissatisfaction, absenteeism &
Answer: (a)
complaints
8. How can a good employment brand help
(a) i, ii, iii
HR?
Diwakar Education Hub Page 185
UGC NET Library Science Unitwise MCQ
16. Arrange the following components of (b) National Index of Translation (ii) ISI
communication in correct sequence of Philadelphia
information flow. (c) Current Contents (iii)
(i) Message Bowker-Sour, UK
(ii) Source (d) LISA (iv)
National Library Kolkata
(iii) Medium
Codes:
(iv) Receiver
(a) (b) (c) (d)
Codes:
(A) (iv) (i) (iii) (ii)
(A) (i) (iii) (iv) (ii) (B) (ii) (iii) (iv) (i)
(B) (ii) (iv) (iii) (i) (C) (iv) (i) (ii) (iii)
(C) (ii) (i) (iii) (iv) (D) (i) (ii) (iii) (iv)
Answer: (C)
(D) (iv) (i) (ii) (iii)
Answer: (C) 19. Match the following
17. Match the following List-I List-
List-I List- II
II (a) POSDCORB (i) Mc
(a) Librametry (i) Greger
Dubrov and Karenhas (b) Prenatal Cataloguing (ii)
(b) Bibliometrics (ii) Abraham Maslow
Pritchard (c) X and Y theory (iii)
(c) Scientometrics (iii) S. R. Luther Gullick
Ranganathan (d) Theory of Motivation (iv) S. R.
(d) Informetrics (iv) Otto Ranganathan
Nache Codes:
Codes: (a) (b) (c) (d)
(a) (b) (c) (d) (A) (ii) (iii) (i) (iv)
(A) (ii) (i) (iii) (iv) (B) (iv) (iii) (ii) (i)
(B) (iii) (ii) (iv) (i) (C) (iii) (iv) (i) (ii)
(C) (iii) (ii) (i) (iv) (D) (i) (ii) (iv) (iii)
(D) (i) (iv) (iii) (ii) Answer: (C)
Answer: (C) 20. Assertion (A): Operators using ‘AND’,
‘OR’ and ‘NOT’ are mostly used in online
18. Match the following: IR.
List-I List- Reason (R): User interfaces cannot
II transform the natural language input into
(a) INB (i) Boolean search Query
INSDOC, New Delhi
Diwakar Education Hub Page 187
UGC NET Library Science Unitwise MCQ
(D) (iii) (iv) (ii) (i) 30. Arrange the following catalogue codes
Answer: (B) in chorological order of its development.
27. Arrange the following Act according to (i) AACR-I
the year of enactment (ii) Rules for Dictionary Catalogue
(A) Copyright Act, The patent Act, (iii) CCC
information Tech. Act, IPR Act (iv) ALA Code
(B) The patent Act, C, information Tech. Codes:
Act, IPR Act
(A) (iii) (ii) (iv) (i)
(C) Copyright Act, IPR Act, The patent Act,
(B) (i) (ii) (iv) (iii)
information Tech. Act
(C) (iv) (i) (iii) (ii)
(D) Copyright Act, The patent Act, IPR Act,
information Tech. Act (D) (iii) (iv) (ii) (i)
Answer: (C) Answer: (A)
28. Assertion (A): ISO 9000 is a quality 31. The book “functions of Executive” was
framework which calls for documentation written by……………….
to adopt TQM in a Library. A. henry fayol
Reason (R): ISO 9000 is a valuable B. f.w. taylor
component of TQM C. maryparker follet
Codes: D. chester i barnard
(A) (A) is true and (R) is false Answer: D. chester i barnard
(B) (R) is true but (A) is false 32. …………….is the character of
(C) Both (A) and (R) are false communication, in a formal organization
by virtue of which it is accepted by a
(D) Both (A) and (R) are true
member of the organization as governing
Answer: (D) the action he contributes
29. Assertion (A): Cost and price are one A. responsibility
and the same. B. authority
Reason (R): Cost is what it costs to do C. accountability
something, whereas price is a matter of
D. power
strategic decision.
Answer: B. authority
Codes:
33. …………..developed the “Need Hierarchy
(A)(A) is false, (R) is true
Theory” to explain human behaviour
(B) (A) is true, (R) is false within an organization.
(C) Both (A) and (R) are true A. a.h.maslow
(D) Both (A) and (R) are false B. douglas mc. gregor
Answer: (A) C. herzberg
D. rensis likert
91. MBO establishes a ………………… 96. ………deals with the right actions of
A. community of interest individuals
B. centralized organization A. sincerity
C. rigid organisation structure B. rules
D. all of these formatted: font: times new C. ethics
roman, 12 pt, not bold, font color: auto D. all of these
formatted: font: times new roman, 12 pt, Answer: C. ethics
not bold, font color: auto
97. Ethics is a ……..
Answer: A. community of interest A. social science
92. KRA in MBO stands for……………. B. science of conduct
A. kerala rural academy
C. normative science
B. key result areas
D. all of these
C. key resources availability
Answer: D. all of these
D. none of these
98. The word ‘moral’ is derived from the
Answer: B. key result areas Latin word ……….
93. The word ‘Ethics’ is derived from Greek A. moralis
word ………. B. morilitic
A. ethios
C. monatic
B. ethikos
D. none of these
C. ethoes
Answer: A. moralis
D. none of these
99. Human nature is………….
Answer: B. ethikos A. learned
94. Ethics is a ….…. B. programmed
A. pure science
C. inherited
B. normative science
D. all of these.
C. inexact science
Answer: C. inherited
D. none of these
100. ….. is a process designed to focus on
Answer: B. normative science customer expectations, preventing
95. Ethics means ………. problems, building commitment to quality
A. character amongst all managers and staffs, and
B. manner promoting open and transparent decision
making.
C. custom
A. planning
D. all of these
B. tqm
Answer: D. all of these
C. marketing
D. none of the above
firm over its rivals are called (a) Worker, who should be given humanly
_______________. treatment at work.
(a) core competency (b) Mutual cooperation between employer
(b) core competence and employee in solving the common
problems.
(c) competitive advantage
(c) Integration of people into a work
(d) competency
situation that motivates them to work
Answer: (a) together to achieve productivity and also
128. Human Resource planning is economic, psychological and social
compulsory for ______________. satisfaction.
(a) effective employee development (d) None of the above.
programme Answer: (c)
(b) base for recruitment 132. Which of the following is a method of
(c) base for selection policy collection of information for job analysis?
(d) all of these (a) Questionnaire method
Answer: (d) (b) Ratio analysis
129. Job analysis, HR planning, (c) Optimisation models
recruitment, selection, placement, (d) Trend analysis
inductions and internal mobility are few
Answer: (a)
important functions which come under the
heading of______________ of HRM. 133. ___________ provides information on
the human attributes in terms of
(a) integration function
education, skills, aptitudes, and experience
(b) development necessary to perform a job effectively.
(c) maintenance (a) job description
(d) procurement function (b) job specification
Answer: (d) (c) job analysis
130. Directing is one of the important (d) job evaluation
functions of HRM which comes
Answer: (b)
under___________.
134. Who laid the foundation of HRM
(a) managerial function
practice?
(b) operative function
(a) Elton Mayo
(c) technical function
(b) Roethlisberger and Dickinson
(d) behavioral function
(c) Peter Drucker and Douglas McGregor
Answer: (a)
(d) David C. McClelland.
131. Whom does Human relation approach
Answer: (c)
refer to?
135. How HRM has become a highly (a) Training and development of
specialised job? employees for their growth.
(a) It is concerned with obtaining and (b) Maintenance of good industrial
maintaining a satisfied work force. relations and workers’ high morale for
(b) It maximises the output and higher productivity
satisfaction of the employees. (c) Further researches in behavioural
(c) Promote group satisfaction and science, new ideas in man, management
individual development. and advances in the field of training and
development.
(d) Optimum utilisation of man-power by
motivation and improving the efficiency. (d) None of the above.
Ans.(b) Answer: (c)
136. Job specification includes 140. What is the importance of
_____________. controlling?
(a) Physical characteristics (a) Ensure that activities are in accordance
with the terms of the plan.
(b) Psychological characteristics
(b) An important mental process on the
(c) Personal characteristics
part of a manager
(d) all of these
(c) Power to influence people’s behaviour
Answer: (d)
(d) Process of regulating the activities.
137. TQM’s major emphasis is
Answer: (a)
on___________ .
141. What is a decision in management?
(a) Product quality
(a) Reaching at a proper conclusion after
(b) Company profitability
consideration.
(c) Customer delight
(b) A decision involves choosing of
(d) Employee training alternatives.
Answer: (a) (c) A decision is the outcome of a group of
138. Ability to perform exceptionally well people or an individual.
and increase the stock of targeted (d) None of the above.
resources within the firm is called
Answer: (a)
___________.
142. An employee-working in a unit or
(a) productivity
plant who is a citizen of the country in
(b) efficient which the unit or plant is located but
(c) effective where the unit or plant is operated by an
(d) competency organisation headquartered in another
country _____________.
Answer: (d)
(a) Home Country National
139. What is the scope of HRM?
(b) Host Country National
(d) behavioural function 171. What are the major hurdles that
Answer: (a) require immediate action by HRM for the
progress of Indian economy?
167. The content of job description
involves_______________. (a) Dishonesty and corruption
(a) job title, condition of work (b) Lack of interest in work and production
loss,
(b) educational qualification, skills
(c) Unemployment and poverty
(c) both a and b
(d) Combating inflation and holding the
(d) none of the above
price-line of essential commodities.
Answer: (a)
Answer: (c)
168. How can one distinguish between the
172. Who is generally known as “the father
Japanese management system and other
of modern management theory”?
management systems?
(a) Henry Fayol
(a) It encourages to perform constantly
and consistently. (b) Frederick W. Taylor
(b) Primarily concerned with high (c) Frank Gilbreth
performance and quality standards. (d) Chester Bernard
(c) It is a system in contrast to American Answer: (a)
management system. 173. Which of the following is considered
(d) None of the above. the first wage incentive plan in modern
Answer: (c) industrial era?
169. In-basket training is involved in (a) Halsey plan
(a) vestibule training (b) Taylor’s differential piece-rate plan
(b) on-the job training (c) Barth plan
(c) simulation (d) Gantt Task plan
(d) coaching Answer: (b)
Answer: (c) 174. Concept of MBO was first developed
by
170. To calculate the number of persons
required for various jobs with reference to (a) Peter Drucker
a planned output is called (b) Douglas McGregor
________________. (c) Henry Fayol
(a) work load analysis (d) Clayton P. Alderfer
(b) workforce analysis Answer: (a)
(c) job analysis 175. Industrial discipline ordinarily does
(d) forecasting not imply
Answer: (a) (a) observance of company’s rules and
regulations
(b) cooperating with management and co- (d) all of the above
workers Answer: (d)
(c) active participation in union activities 180. International staffing does not give
(d) smooth discharge of duties and much emphasis on the consideration of
responsibilities (a) cultural adaptability
Answer: (c) (b) global experience
176. A strike called by a section of (c) family flexibility
workers/union members without
(d) political consciousness
authorisation from proper authority of the
union is called Answer: (d)
(a) sectional strike 181. The objectives of workers’
participation in management do not
(b) jurisdictional strike
ordinarily include
(c) wild cat strike
(a) promotion of collective bargaining
(d) sympathetic strike
(b) promotion of industrial harmony
Answer: (c)
(c) promotion of industrial democracy
177. Which is a form of participative
(d) promotion of productivity
management?
Answer: (a)
(a) information-sharing
182. The advantages of staffing from
(b) associative participation
amongst the host country nationals
(c) consultative participation generally do not include
(d) all of the above (a) reduction of language barriers
Answer: (d) (b) reduction of living cost
178. Social factor having a potent bearing (c) greater control over the activities of the
on HRM practices in India includes organisation
(a) caste system (d) better understanding of host country’s
(b) doctrine of karma laws and regulations
(c) c8ustoms and traditions Answer: (c)
(d) all of the above 183. Which form of participative
Answer: (a) management promotes “semi-autonomous
work-groups”?
179. T&D programme in international HRM
should give due attention to (a) quality of work life
(a) promotion of efficiency of personnel in (b) quality circle
the host country (c) TQM
(b) understanding of the cultural (d) quality group
environment of the host country Answer: (c)
(c) improvement of technical expertise
d. Sharing the financial decision making settle / respect rights and responsibilities
powers with representative of workers of other party, is covered under –
Answer: (b) a. Effective bargaining method
216. What is the role of the trade-union in b. Essentials for effective bargaining
collective bargaining? c. Types of bargaining
a. To protect jobs and real earnings d. Areas of bargaining
b. Better conditions of work life for Answer: (b)
workers
221. Managerial functions, in personnel
c. Fighting against any possible, management can be –
exploitations
a. Planning / Organising / directing and
d. All above controlling
Answer: (d) b. Recruitment / placement / employment
217. Which kind of workers participation / Development and motivation
makes the workers as shareholders of the c. Compensation / maintenance of health /
company? employers’ welfare
a. Participation at Board Level d. Both (a) + (b) only
b. Participation through ownership Answer: (d)
c. Participation through complete control 222. Discuss unfair management practices
d. Participation through work councils –
Answer: (b) a. Noncompliance with promotional and
218. Special allowances are not payable for transfer policies
– b. Smooth handling of grievances
a. Photostat copier Operators c. Timely payment of wages / salaries
b. Adding machine Operators d. Both (b) + (c)
c. Addressographs Answer: (a)
d. All above 223. In a ____________, teams are formed
Answer: (d) and team members report to two’ or more
managers.
219. Why grievances should be redressed?
(a) Formal Organization
a. Affects the individual
(b) Informal Organization
b. Affects the management
(c) Matrix Organisation
c. Collective disputes conversion
(d) Divisional Organization
d. All above
Answer: (c)
Answer: (d)
224.________ refers to the attitudinal and
220. The employer-employees should have
behavioural characteristics of a group and
mutual trust / confidence / willingness to
is concerned with how groups form, their
structure and process, and how they (d) None of the above
function, Answer: (c)
(a) Group dynamics 228. _________ involves all the
(b) Organic structure performance monitoring, measurement,
(c) Functional Structure management being outsourced from a
third party or an external organisation.
(d) Matrix organization
(a) Human Resource Outsourcing
Answer: (a)
(b) Human Resource Management
225. Benchmarking is
(c) Human Resource Business Process
(a) T the process of comparing the business
Outsourcing
processes & performance metrics including
cost, cycle time, productivity to another (d) Performance Management Outsourcing
that is widely considered to be an industry Answer: (d)
leader 229. Performance Management System is
(b) A process in which the organisations –
evaluate various aspects of their processes (a) A formal, structured system of
in relation to the best practice companies’ measuring, evaluating job related
processes usually within the peer group behaviours & outcomes to discover
defined for the purposes of comparison reasons of performance & how to perform
(c) Both (a) and (b) effectively in future so that the employee,
(d) None of the above organisation & society all benefit
Answer: (c) (b) A process of looking both to the future
& to the past, in the context of the
226. Reengineering starts with a —
collective performance of all the
(a) High-level assessment of the employees in an organisation
organisation’s mission
(c) The process of establishing goals,
(b) Strategic goals assessing employees & implement the
(c) Customer demands annual performance appraisal process
(d) All of the above (d) All of the above
Answer: (d) Answer: (d)
227. Change Management is – 230. Key Performance Indicators (KPI)
(a) It is a systematic approach in dealing is/are –
with change from the individual & (a) A specific, agreed measure of
organisational level achievement within a KRA, which go on to
(b) A gradual process of approach in the make up the goals and objectives
workplace due to new policies, technology, measured under the performance
or even a new boss appraisal process.
(c) Both (a) and (b)
(b) objective, independent and (b) A set of programs, functions & activities
standardized measures of performance not designed & carried out for maximum
ratings or judgments of performance efficiency
(c) specific, measurable, attainable, (c) Both (a) and (b)
realistic & time bound which help to (d) None of the above
determine how much the KRA’s are met
Answer: (c)
(d) All of the above
234. Job Rotation can be defined as –
Answer: (d)
(a) Lateral transfer of employees among a
231. Human Resource Planning (HRP) number of different positions and tasks
process is – within jobs which requires different skills
(a) A process, by which an organisation and responsibilities
ensures that it has the right number & kind (b) It helps to understand the different
of people at the right place, at the right steps into creating a product or delivery
time, capable of effectively & efficiently
(c) It permits individuals to gain experience
completing those tasks that will help the
in various phases of the business
organisation achieve its overall objectives
(d) All of the above
(b) A process of forecasting an
organisation’s future demand for & supply Answer: (d)
of the right type of people in the right 235. Personnel Management is-
numbers (a) A managerial function of planning,
(c) A sub-system in the total organisational organising, directing, controlling, and
planning & facilitates the realisation of the coordinating the operative functions so
company’s objectives by providing the that their individual objectives and
right type & right number of personnel organisational goals are achieved
(d) All of the above (b) A function which deals in recruitment,
Answer: (d) development, compensation, integration,
utilisation & maintenance of people
232. Who is responsible to manage
change? (c) An aspect of relationship between and
among the people and is concerned about
(a) Employees
their well-beings as individuals and as
(b) Management group
(c) Executives (d) All of the above
(d) (b) & (c) Answer: (d)
Answer: (d) 236. When does the bargaining process
233. HRM refers to – begins?
(a) A management function that helps (a) The charter of demands of the workers
managers to attract, set expectations & are not fulfilled
develop members for an organization.
(b) Discontinuation of services & concerted 239. __________ consists of the learning
actions by the workers which results in low opportunities designed to help employees
output and monetary loss to grow.
(c) The employer cannot afford to neglect (a) Training
these actions which results in monetary (b) Development
loss
(c) Banking operations
(d) All of the above
(d) None of the above
Answer: (d)
Answer: (b)
237. Cause of Genuine Grievance can be –
240. Joint Management Councils are
(a) Discrimination, lost opportunity, established in an organisation which
Injustice etc. done to the employee employs –
(b) Harmony, Mutual trust & (a) 100 employees
understanding
(b) 300 employees
(c) Reasonable Charter of demands
(c) 400 employees
(d) All of the above
(d) 500 employees or more
Answer: (a)
Answer: (d)
238. Define the subject matter of Training
241. ROI Stands for —
(a) Organisations need staff at all levels to
(a) Return on Insurance
be self-sufficient, resourceful, creative &
autonomous, but they face the challenge (b) Return on Investment
in instilling confidence, initiative & (c) Rate on Insurance
problem solving capabilities (d) Risk on Insurance
(b) Performance & capability are Answer: (b)
ultimately dependent on people’s attitude
242. The term “Learning Organisation”
and emotional maturity. Helping them to
means –
achieve on a personal level provides a
platform for trust and emotional con- (a) People of all Levels, individually or
tracting with the organisation collectively are continually increasing their
capacity to produce results, they care
(c) When people develop confidence,
about
integrity & more knowledge, they
automatically become proactive, solution- (b) A collective ideal, a vision
focused, responsive which has implications (c) It promotes culture of Learning, a
across a whole team with multiplying community of learners, and it ensures that
effect individual learning enriches & enhances
(d) All of the above the organisation as a whole
Answer: (d) (d) All of the above
Answer: (d)
243. Line Management is –
294. Management can be considered 298. …..is undertaken to find out the one
as……………….. best way of doing the thing
A. exact science A. job analysis
B. inexact science B. merit rating
C. psuedo science C. job enrichment
D. b or c D. none
Answer: D. b or c Answer: A. job analysis
295. …………………..is that phase of business 299. The principle of Unity of command is
enterprise that concerns itself with the contrary to Taylors……………………..
overall determination of institutional A. rule of thumb
objectives and the policies necessary to be
B. unity of direction
followed in achieving those objectives.
C. functional foremanship
A. management
D. none of these
B. administration
Answer: C. functional foremanship
C. both of these
300. According to …………..principle, each
D. none
group of activities with the same objective
Answer: B. administration must have one head and one plan
296. ……..has defined the basic problem of A. unity of direction
managing as the art of “knowing exactly B. unity of command
what you want men to do and then see
C. eitherof these
that they do it in the best and cheapest
way” D. none
A. henry fayol Answer: A. unity of direction
B. f.w. taylor 301. Everything which goes to increase the
importance of subordinates role
C. mary parker follet
is……………….
D. none of these
A. decentralization
Answer: B. f.w. taylor
B. centralization
297. According to functional foreman ship,
C. either a or b
the speed boss, Inspector, foreman and
gang boss are entrusted with D. none
the……………………… aspect of work. Answer: A. decentralization
A. planning 302. The Book “ Functions of Executive”
B. organizing was written by …………………..
C. doing A. p.f. drucker
D. none of these B. chester barnard
Answer: C. doing C. herbert simon
B. f.w. taylor B) Both (A) and (R) are correct and (R) is
C. mary parker follet not the correct explanation of (A).
D. none ofthese C) (A) is True but (R) is False.
Answer: C. mary parker follet D) (A) is False but (R) is True.
Answer: A
3. Direction: In the questions given below,
there are two statements marked as
Assertion (A) and Reason (R). Choose the
Unit -7 MCQs correct option out of the choices given
below in each question
1. Direction: In the questions given below,
there are two statements marked as Assertion (A): Recycle Bin is a reserved
Assertion (A) and Reason (R). Choose the space where files and folders you no
correct option out of the choices given longer want can be disposed off.
below in each question Reason (R): When you move a file to the
Assertion (A): Operating system is a Recycle Bin, it will be immediately deleted
software program that enables the from your computer.
computer hardware to communicate and A) Both A and R are correct and R is correct
operate with the computer software. explanation of (A).
Reason (R): Windows is an open source B) Both (A) and (R) are correct and (R) is
operating system not the correct explanation of (A).
A) Both A and R are correct and R is correct C) (A) is True but (R) is False.
explanation of (A). D) (A) is False but (R) is True.
B) Both (A) and (R) are correct and (R) is Answer: A
not the correct explanation of (A).
4. Direction: In the questions given below,
C) (A) is True but (R) is False. there are two statements marked as
D) (A) is False but (R) is True. Assertion (A) and Reason (R). Choose the
Answer: B correct option out of the choices given
below in each question
2. Direction: In the questions given below,
there are two statements marked as Assertion (A): In Windows you can create
Assertion (A) and Reason (R). Choose the user accounts.
correct option out of the choices given Reason (R): You can only have one user
below in each question account on a Windows computer.
Assertion (A): Directory is a container that A) Both A and R are correct and R is correct
is used to contain folders and file. explanation of (A).
Reason (R): File system provides a way of B) Both (A) and (R) are correct and (R) is
organising a drive. not the correct explanation of (A).
A) Both A and R are correct and R is correct C) (A) is True but (R) is False.
explanation of (A).
Diwakar Education Hub Page 225
UGC NET Library Science Unitwise MCQ
D) (A) is False but (R) is True. 7. Given below are two statements. one
Answer: C labelled as Assertion (A) and the other as
Reason (R):
5. Direction: In the questions given below,
there are two statements marked as Assertion (A): An Intranet is a private
Assertion (A) and Reason (R). Choose the network for sharing computing resources
correct option out of the choices given and information within an organization
below in each question Reason (R): Intranet is a private version of
Assertion (A): Windows is application the Internet
software. In light of the above two statements.
choose the correct answer from the
Reason (R): Microsoft edge is used for
options given below
searching the computer.
1. Both A) and R) are true and R) is the
A) Both A and R are correct and R is correct
correct explanation of A)
explanation of (A).
2. Both A) and R) are true but R) is not the
B) Both (A) and (R) are correct and (R) is
correct explanation of A)
not the correct explanation of (A).
3. A) is true but R) is false
C) (A) is True but (R) is False.
4. A) is false but R) is true
D) (A) is False but (R) is True.
Answer: 2
Answer: D
8. Given below are two statements. one
6. Given below are two statements – One
labelled as Assertion (A) and the other as
is labelled as Assertion (A) and other is
Reason (R):
labelled as Reason (R):
Assertion: A keyboard is used to type data
Assertion (A) : The internet is a collection
or instructions and for some other
of interconnected computer networks,
functions.
linked by transmission medium such as
copper wires, fiber-optic cables, wireless Reason: Keyboard is a popular input
connections etc. device.
Reason (R) : World Wide Web is a (A) Both assertion (A) and reason (R) are
collection of interconnected documents. true and reason (R) is the correct
explanation of assertion (A).
In the right of the above two statement,
choose the correct answer: (B) Both assertion (A) and reason (R) are
true but reason (R) is not the correct
1. Both (A) and (R) are true and (R) is
explanation of assertion (A).
the correct explanation of (A)
(C) Assertion (A) is true but reason (R) is
2. Both (A) and (R) are true and (R) is
false.
not the correct explanation of (A)
(D) Assertion (A) is false but reason (R) is
3. Both (A) is true. But (R) is false.
true.
4. Both (A) is false. But (R) is true.
Answer: A
Answer: 2
9. Given below are two statements. one Reason: Your operating system firstly
labelled as Assertion (A) and the other as saves any windows settings that you
Reason (R): changed and writes information that is
Assertion: You can use the taskbar and currently stored in memory to your hard
Smart button to easily navigate through disk.
Windows 7. (A) Both assertion and reason are true and
Reason: Both features are always available reason is the correct explanation of
on your desktop. assertion .
(A) Both assertion and reason are true and (B) Both assertion and reason are true but
reason is the correct explanation of reason is not the correct explanation of
assertion. assertion.
(B) Both assertion and reason are true but (C) assertion is true but reason is false
reason is not the correct explanation of (D) assertion is false but reason is true
assertion . Answer: A
(C) Assertion is true but reason is false. 12. Given below are two statements. one
(D) Assertion is false but reason is true. labelled as Assertion (A) and the other as
Answer: A Reason (R):
10. Given below are two statements. one Assertion: Versatility is a feature where
labelled as Assertion (A) and the other as computer can perform variety of function
Reason (R): with precise accuracy.
Assertion: While specifying the file names Reason: Computers can work in different
in search box, Wild Cards can be used. areas, do different jobs and can process
different type of data
Reason: The '*' is a Wild Card Character.
A. Both Assertion and Reason are true and
(A) Both assertion and reason are true and
Reason is the correct explanation of
reason is the correct explanation of
Assertion.
assertion.
B. Both Assertion and Reason are true and
(B) Both assertion and reason are true but
Reason is not the correct explanation of
reason is not the correct explanation of
Assertion
assertion .
C. Assertion is true and Reason is wrong.
(C) Assertion is true but reason is false.
D. Both Assertion and Reason are wrong.
(D) Assertion is false but reason is true.
Answer: A
Answer: B
13. Arrange the following writing materials
11. Given below are two statements. one
in the order of their evolution
labelled as Assertion (A) and the other as
Reason (R): (i) Iron
Assertion: When you are finished working (ii) Stone
in Windows 7, you properly shut down (iii) Papyrus
your computer.
Diwakar Education Hub Page 227
UGC NET Library Science Unitwise MCQ
48. The smallest unit of data in computer is is the designated port address. All the
________________ other options are invalid.
a) Byte 51. The input machine which originated in
b) Nibble the United States around 1880s is a
c) Bit ___________
d) KB a) Mouse
Answer: c b) Joystick
Explanation: A bit is defined as the c) Keyboard
smallest unit of data in a computer system. d) Bar Code Reader
It is used as a short form of Binary Digit. A Answer: c
bit can have only two values 0 or 1. A Explanation: A keyboard is an input device
nibble comprises of 4 bits, a byte is a which originated in the 1880s and is used
collection of 8 bits whereas KB (Kilobyte) is to give instructions to the computer in the
equal to 1024 bytes. form of letters and numbers. Mouse is
49. One nibble is equivalent to how many used for the selection of various objects on
bits? the screen, joystick is mainly used for
a) 2 gaming purpose and bar code readers are
b) 4 used for reading the bar-codes.
c) 8 52. What does the COMPUTER stand for?
d) 1 a) Commonly Operated Machines Used in
Answer: b Technical and Educational Research
Explanation: A nibble is defined as a unit of b) Commonly Occupied Machines Used in
data which comprises of 4 binary digits or Technical and Educational Research
half of 8-bit byte. Therefore, 1 nibble = 4 c) Commonly Operated Machines Used in
bits. A bit is the smallest unit of data in a Technical and Environmental Research
computer system. A byte = 8 bits, d) Commonly Oriented Machines Used in
therefore, half of a byte=4 bits=a nibble. Technical and Educational Research
50. Which of the following describes the Answer: a
correct format of an input instruction? Explanation: The word COMPUTER is an
a) IN 82 abbreviation for the terms “Commonly
b) INPUT 82 Operated Machines Used in Technical and
c) INP 82 Educational Research”. The word
d) 82 INP COMPUTER also relates to the word
Answer: a COMPUTE which means to calculate. So,
Explanation: The input/output instructions initially it was thought that a computer is a
are used to transfer information between device which is used to perform
external peripherals and the CPU. The calculations.
correct format of an input instruction is: IN 53. 1 yottabyte = ______________
8-bit port address. a) 1024 TB
Here, IN 82 is the correct option, where 82 b) 1024 EB
Answer: d Answer: c
Explanation: Super Video Graphics Array is Explanation: The drum printers have a
a type of Visual Display Unit.It supports solid cylindrical drum with characters
1024 by 768 pixels with 16 million different embossed on its surface in the form of
operations. circular bands. It can only print a
59. The devices that used to give single or predefined set of characters.
multiple colored images and drawings are 62. A ___________________ monitor looks
____________ like a television and are normally used
a) Monitors with non-portable computer systems.
b) Printers a) CRT
c) Plotters b) LCD
d) VDUs c) LED
Answer: c d) Flat Panel Monitors
Explanation: Plotters are the devices which Answer: a
are used to give colored images. They use Explanation: A CRT (or the Cathode Ray
ink pens or ink jets for drawing. Pens of Tube) Monitor looks like a television
different colors and shades are used for ideally. The flat panel monitors are thinner
shading and styling. and lighter in comparison.
60. A special request originated from some 63. Which of the following is not a function
device to the CPU to acquire some of its of the Output Unit?
time is called ___________ a) It produces results that can be easily
a) Disturbance understood by the user
b) Attenuation b) It accepts the results produced by the
c) Interrupt computer
d) Noise c) It supplies the data and instructions to
Answer: c the outside world
Explanation: An interrupt is a kind of d) It supplies the data and instructions to
request which takes control of the system the computer for further processing
bus for some time, then performs all the Answer: d
operations and gives back control to the Explanation: The output unit is responsible
CPU. It is usually identified by some for giving the results to the user in the
number and is handled by the interrupt form of a printed report or visual display. It
controller. is not responsible for giving the
61. Line Printers that print one line at a instructions back to the CPU for
time are _________ processing.
a) Laser Printers 64. PCI stands for _________
b) Inkjet Printers a) Peripheral Component Interconnect
c) Drum Printers b) Partial Component Interconnect
d) Chain Printers c) Peripheral Component Interaction
d) Partial Component Interaction
Answer: a
Explanation: PCI is a high-bandwidth bus
that can function as a peripheral bus.
Compared with others, it delivers better
system performance.
65. Components that provide internal
storage to the CPU are ______
a) Registers
b) Program Counters
c) Controllers
d) Internal chips a) Primary and major
b) Primary and Secondary
Answer: a c) Minor and Major
Explanation: The Registers are the fast d) Main and virtual
storage units. They are responsible for
Answer: b
storing intermediate computational results
in the CPU. The registers can be user Explanation: There are two types of
memories in a computer system: The
accessible or inaccessible.
Primary Memory and the Secondary
66. Saving data and instructions to make Memory.
them readily available is the job of The primary memory can be directly
__________ accessed by the CPU whereas the
a) Storage Unit secondary memory cannot be directly
b) Cache Unit accessed.
c) Input Unit
d) Output Unit 68. Which of the following is used to hold
running program instructions?
Answer: a a) Primary Storage
Explanation: The storage unit is b) Virtual Storage
responsible for storing the data. It makes c) Internal Storage
the instructions readily available for d) Minor Devices
additional or initial processing whenever
required. The cache is a software Answer: a
Explanation: The primary storage is
component that stores data to serve the
responsible for holding the data,
data requests in future. It can contain the
result of some earlier computations. intermediate results and the results of
ongoing processes or jobs. Virtual storage
67. The two basic types of memory in a is the main memory storage required for
computer are ________ saving a large amount of data for future
reference. The other options are invalid.
69. Which of the following is non-volatile
storage?
a) Backup
b) Secondary
random access memory, disc drives, and (e) None of the above
other hardware. Answer: Option (b)
90. What type of storage can’t be deleted? Explanation: Memory is a temporary
(a) A CD-ROM storage device and storage is a permanent
(b) Magnetic tape storage storage device.
(c) A floppy disk 93. A USB communication device is
referred to as a _________ if it offers data
(d) All of the above
encryption for a safe wireless connection
(e) None of the above for laptop users.
Answer: (a) (a) USB wireless network adapter
Explanation: A pre-pressed optical (b) wireless switch
compact disc that contains data is known
(c) wireless hub
as a CD-ROM. The term is an acronym for
Compact Disc Read-Only Memory, a kind (d) router
of flash memory. Data stored in CD-ROMs (e) None of these
can be read by computers, but cannot be Answer: Option (a)
deleted.
Explanation: Even if your device lacks a
91. Word 2007 files have the file extension wireless network card, you can still
: connect wirelessly to networks via a USB
(a) .gif adapter. Once you’ve bought a USB
(b) .txt adapter, you’ll need to check to see if it
instantly connects to a wireless network.
(c) .docx
The user guide contains information about
(d) .exe this.
(e) None of these 94. What is seek time?
Answer: (c) (a) time to position the head over the
Explanation: A .docx file is a text document proper cylinder
created in Microsoft Word. The format (b) time to position the head over the
evolved into a new standard for text proper sector
documents with the introduction of Word
(c) time to position the head over the
version 2007.
proper track
92. Memory and storage are different in
(d) Disk drive to locate information on disk
that memory is _______ and storage is
______ . (e) None of the above
(a) Slow, fast Answer: (d)
(b) Temporary, Permanent Explanation: The amount of time needed
for a hard disc controller to find a
(c) Permanent, Temporary
particular piece of stored data is known as
(d) All of the above the seek time. Other delays include
and prevent the computer system files (d) Vital Information Resources Under
from being corrupt? Search
(a) Disk cleanup Answer: (c)
(b) Disk defragmenter 137. A computer virus that attacks an
(c) Antivirus antivirus program to prevent detection of
the virus in the computer system is
(d) All
(a) Worm
Answer: (c)
(b) Retrovirus
133. Which among the following is not a
type of utility system software? (c) Trojan
(a) Antivirus (d) Ghost virus
(b) Firewalls Answer: (b)
(c) Disk defragmenter 138. Which utility software or program is
used to reduce the size of files to increase
(d) MS-DOS
the amount of disk space in the computer
Answer: (d) system?
134. Which utility software is used to (a) Disk cleanup
protect the computer system from
(b) File compression
hackers?
(c) Disk fragmentation
(a) Antivirus
(d) Troubleshooting program
(b) Firewall
Answer: (b)
(c) AUP
139. Which of the following Windows
(d) Backup wizard
utilities scans the entire hard drive and
Answer: (b) erase (or delete) any unnecessary files
135. What are the main functions of such as temporary files from the Internet,
system utility? and cookies downloaded while visiting
(a) Disk cleanup webpages?
(b) Disk defragmentation (a) Disk defragmenter
(c) System Restore and Disk compression (b) Disk cleanup
(d) Antivirus (Virus protection) (c) Backup and Restore wizard
(e) All of the above (d) All of the above
Answer: (e) Answer: (b)
136. What is the full form of a Virus? 140. In which of the following, a person is
constantly followed/chased by another
(a) Very Information Record User Search
person or group of several peoples?
(b) Very Interchanged Result Until Source
a. Phishing
(c) Vital Information Resources Under
b. Bulling
Siege
them. In some cases where the virus packet, it immediately burns or terminates
already resides in the user's computer, it that data packet. In short, we can also say
can be easily removed by scanning the that it is the first line of defense of the
entire system with antivirus help. system to avoid several kinds of viruses.
145. Which one of the following is a type 147. Which of the following refers to
of antivirus program? stealing one's idea or invention of others
a. Quick heal and use it for their own benefits?
b. Mcafee a. Piracy
c. Kaspersky b. Plagiarism
d. All of the above c. Intellectual property rights
Answer: d d. All of the above
Explanation: Antivirus is a kind of software Answer: d
program that helps to detect and remove Explanation: The stealing ideas or the
viruses form the user's computer and invention of others and using them for
provides a safe environment for users to their own profits can also be defined in
work on. There are several kinds of several different ways, such as piracy,
antivirus software are available in the intellectual property rights, and plagiarism.
market, such as Kaspersky, Mcafee, Quick 148. In ethical hacking and cyber security,
Heal, Norton etc., so the correct answer is there are _______ types of scanning:
D.
a. 1
146. It can be a software program or a
b. 2
hardware device that filters all data
packets coming through the internet, a c. 3
network, etc. it is known as the_______: d. 4
a. Antivirus Answer: c
b. Firewall Explanation: There are usually three types
c. Cookies of scanning in ethical hacking and cyber
security. Therefore the correct answer is C.
d. Malware
149. In system hacking, which of the
Answer: b
following is the most crucial activity?
Explanation: There are two types of
a. Information gathering
firewalls - software programs and
hardware-based firewalls. These types of b. Covering tracks
firewalls filter each and every data packet c. Cracking passwords
coming from the outside environment such d. None of the above
as network; internet so that any kind of
Answer: c
virus would not be able to enter in the
user's system. In some cases where the Explanation: While trying to hack a system,
firewall detects any suspicious data the most important thing is cracking the
passwords.
Diwakar Education Hub Page 251
UGC NET Library Science Unitwise MCQ
150. Which of the following are the types form unknown sources. We can also
of scanning? consider it the first line of defense of the
a. Network, vulnerability, and port computer system.
scanning 153. Code Red is a type of ________
b. Port, network, and services a. An Antivirus Program
c. Client, Server, and network b. A photo editing software
d. None of the above c. A computer virus
Answer: a d. A video editing software
Explanation: The vulnerability, port, and Answer: c
network scanning are three types of Explanation: Cod Red is a type of Computer
scanning. virus that was first discovered on 15 July in
151. Which one of the following is actually 2001 as it attacks the servers of Microsoft.
considered as the first computer virus? In a couple of next days, it infects almost
a. Sasser 300,000 servers.
b. Blaster 154. Which of the following can be
considered as the elements of cyber
c. Creeper
security?
d. Both A and C
a. Application Security
Answer: c
b. Operational Security
Explanation: The Creeper is called the first
c. Network Security
computer virus as it replicates itself (or
clones itself) and spread from one system d. All of the above
to another. It is created by Bob Thomas at Answer: d
BBN in early 1971 as an experimental Explanation: Application security,
computer program. operational security, network security all
152. To protect the computer system are the main and unforgettable elements
against the hacker and different kind of of Cyber Security. Therefore the correct
viruses, one must always keep _________ answer is D.
on in the computer system. 155. Which of the following are famous
a. Antivirus and common cyber-attacks used by
b. Firewall hackers to infiltrate the user's system?
c. Vlc player a. DDos and Derive-by Downloads
d. Script b. Malware & Malvertising
Answer: b c. Phishing and Password attacks
Explanation: It is essential to always keep d. All of the above
the firewall on in our computer system. It Answer: d
saves the computer system against Explanation: DDoS (or denial of service),
hackers, viruses, and installing software malware, drive-by downloads, phishing
Diwakar Education Hub Page 252
UGC NET Library Science Unitwise MCQ
number of users exceeds the network's that filters each and every data packet
limit? coming from the network, internet. It can
a. Reliability also be considered as a device installed at
the boundary of an incorporate to protect
b. Performance
form unauthorized access. Sometimes
c. Security firewall also refers to the first line of
d. Longevity defense against viruses, unauthorized
Answer: d access, malicious software etc.
Explanation: When the numbers of users 164. When was the first computer virus
on a network get increased and exceed the created?
network's limit, therefore the performance a. 1970
is one of the factors of the network that is b. 1971
hugely impacted by it.
c. 1972
162. In the computer networks, the
d. 1969
encryption techniques are primarily used
for improving the ________ Answer: b
a. Security Explanation: In 1970, the world's first
computer virus was created by Robert
b. Performance
(Bob) Thomas. This virus was designed as it
c. Reliability creates copies of itself or clones itself and
d. Longevity spreads one computer to another. So the
Answer: a correct answer will be 1970.
Explanation: Encryption techniques are 165. Which of the following is considered
usually used to improve the security of the as the world's first antivirus program?
network. So the correct answer will be A. a. Creeper
163. Which of the following statements is b. Reaper
correct about the firewall? c. Tinkered
a. It is a device installed at the d. Ray Tomlinson
boundary of a company to prevent
Answer: b
unauthorized physical access.
Explanation: Reaper is considered as the
b. It is a device installed at the
world's first antivirus program or software
boundary of an incorporate to protect it
as it can detect the copies of a Creeper (the
against the unauthorized access.
world's first man-made computer virus)
c. It is a kind of wall built to prevent and could delete it as well.
files form damaging the corporate.
166. Which one of the following principles
d. None of the above. of cyber security refers that the security
Answer: b mechanism must be as small and simple as
Explanation: A firewall can be the type of possible?
either a software or the hardware device a. Open-Design
Explanation: The cipher algorithm is used 177. Which of the following isn’t a type of
to create an encrypted message by taking transmission mode?
the input as understandable text or "plain a) physical
text" and obtains unreadable or "cipher b) simplex
text" as output. It is usually used to protect c) full duplex
the information while transferring one d) half duplex
place to another place. Answer: a
175. The term "CHAP" stands for Explanation: There are three modes of
__________ transmission: simplex, half duplex and full
a. Circuit Hardware Authentication duplex. Transmission modes tell the
Protocols direction of signal flow between two
devices.
b. Challenge Hardware Authentication
Protocols 178. A transmission that generally involves
dedicated circuits.
c. Challenge Handshake Authentication
a) simplex
Protocols
b) half duplex
d. Circuit Handshake Authentication c) full duplex
Protocols d) semi-duplex
Answer: c Answer: a
Explanation: The term "CHAP" stands for Explanation: The answer is simplex.
the Challenge Handshake Authentication Simplex generally involves dedicated
Protocols. In computer networks, it can be circuits. TV broadcasting is an example.
defined as an authentication scheme that 179. A transmission mode that can
avoids the transfer of unencrypted transmit data in both the directions but
passwords over the network. The "CHAP" transmits in only one direction at a time.
is one of the many authentication schemes a) simplex
used by the Point To Point Protocol (PPP), b) half duplex
which is a serial transmission protocol for c) full duplex
wide networks Connections (WAN). d) semi-duplex
176. A term that defines the direction of Answer: b
flow of information between devices. Explanation: The half duplex mode
a) interconnectivity supports two way traffic but only in one
b) intra connectivity direction at a time. The interactive
c) transmission mode transmission of data within a time sharing
d) transmission system may be best suited to half-duplex
Answer: c lines.
Explanation: The term transmission mode 180. A communication between a
defines the direction of flow of computer and a keyboard involves
information between two communication ____________ duplex transmission.
devices. It tells the direction of signal flow. a) simplex
c) IE b) title
d) Mozilla c) head
Answer: b d) style
Explanation: Others except web are web Answer: c
browsers. Web is a type of server. Explanation: The head segment contains a
Application that works on client requests. generic info about the document. The head
225. Both client and server release section must come before the body section
_________ connection after a page has in an HTML document.
been transferred. 229. A tag similar to that of the italic tag.
a) IP a) <strong>
b) TCP b) <cite>
c) Hyperlink c) <code>
d) Network d) <i>
Answer: b Answer: b
Explanation: The answer is TCP. TCP stands Explanation: <cite> is a container tag in
for Transmission Control Protocol. Servers html that is citation generally in italics.
receive requests from clients. Other tags like <em>or emphasize is also
226. In HTML, the tags that tell the used for this purpose.
browser how to display the page. 230. A _________ partitions a web browser
a) markup window so that multiple web documents
b) style can be displayed simultaneously.
c) body a) Frame
d) head b) set
Answer: a c) Frameset
Explanation: Markup is a general term d) div
used to refer the types of tags in HTML. Answer: c
The markup tags tell the browser how to Explanation: A frameset partitions a web
display the page. browser window so that multiple web
227. FTP stands for? documents can be displayed
a) File Text Protocol simultaneously. Frameset can have
b) File Transfer Protocol attributes like cols.
c) Firm Transfer Protocol 231. The _________ attribute specifies the
d) File Transplant Protocol web page to be placed in the frame
Answer: b initially.
Explanation: FTP stands for File Transfer a) name
Protocol. It is a type of internet service use b) src
for the transmission of files. c) cols
d) rows
228. A section in HTML that contains
generic information about the document. Answer: b
a) body Explanation: The src attribute or the
source specifies the web page to be placed However, they also warn of the dangers of
in the frame initially. It may be making assumptions about the validity of
subsequently overwritten. any one analytic method.
232. ______________the ability to access, 235. A type of analysis that attends to the
analyzes, evaluate and produce media. repetition and frequency of features, their
a) Literacy proportions within the text, and
b) Internet consequent assumptions about
c) Media significance.
d) Media Literacy a) Media
Answer: d b) Content
Explanation: It is media literacy. It is the c) Linguistic
ability to access, analyze, evaluate and d) Network
produce media. It is the process of Answer: b
becoming active, rather than passive, Explanation: The answer is Content.
consumers of media. Linguistic analysis might concentrate on
233. Media literacy can help youth and the potential effects of style of address.
adults understand how media shapes our Content analysis attends to the repetition
culture. and frequency of features, their
a) True proportions within the text, and
b) False consequent assumptions about
significance.
Answer: a
Explanation: The statement is true. Media 236. __________ analysis regards texts as
literacy also develops our critical thinking. collections of signs or paradigms and
It also helps in the better understanding of possible meanings, operating within the
how media shapes our culture. bounds of various codes.
a) Semiotic
234. The analysis of _________ is a process
b) Style
of deconstruction that investigates the
c) Linguistic
operations of texts, their constructions,
d) Text
the ways they produce meanings, what
those meanings may be. Answer: a
a) Media Explanation: Semiotic analysis regards
b) Web texts as collections of signs or paradigms
c) IE and possible meanings, operating within
d) Text the bounds of various codes.
Answer: d 237. This part of image analysis refers to
Explanation: The analysis of texts is a those primary signs, often part of the
process of deconstruction that investigates technique of photography, which are
the operations of texts, their about how the image is made.
constructions, the ways they produce a) Treatment
meanings, what those meanings may be. b) Position
c) Content c) Plot
d) Media d) Characters
Answer: a Answer: b
Explanation: Treatment in image analysis Explanation: Identification describes the
refers to those primary signs, often part of effect of involving the reader with the
the technique of photography, which is story, of constructing it as truth. It
about how the image is made. produces a meaning of truth, a belief in the
238. In image analysis, this part refers to validity of the text and of all the other
objects represented within the image, meanings that we make from it.
which may signify to us because of, for 241. The notion of norms also links to the
example, their symbolic power or because idea that representations are given force
of their composition in relation to each through a process of:
other. a) naturalization
a) Treatment b) identification
b) Position c) media
c) Content d) casting
d) Media Answer: a
Answer: c Explanation: The notion of norms also links
Explanation: Content refers to objects to the idea that representations are given
represented within the image. Treatment force through a process of naturalization.
in image analysis refers to those primary 242. The media texts may throw up
signs, often part of the technique of discourses and are called ____________
photography, which are about how the a) Binary oppositions
image is made. b) Violations
239. _________ are about storytelling and c) Oppositions
story meaning. d) Media Illiteracy
a) narratives Answer: a
b) plot Explanation: Some texts may also throw up
c) content discourses and their meanings if you
d) storyline attend to what are called binary
Answer: a oppositions. The discourse is also marked
Explanation: Narratives are about by what it is not, by what it is opposed to.
storytelling and story meaning. Media 243. In terms of image analysis, it is
texts tell stories; they have a narrative. important to attend to primary level signs
240. __________ describes the effect of in visual codes, most obviously for
involving the reader with the story, of examples of still photography.
constructing it as truth. a) True
a) Narration b) False
b) Identification Answer: a
Explanation: The statement is true. This
278. An attack in which the site is not 282. Attack in which a user creates a
capable of answering valid request. packet that appears to be something else.
a) Smurfing a) Smurfing
b) Denial of service b) Trojan
c) E-mail bombing c) E-mail bombing
d) Ping storm d) Spoofing
Answer: b Answer: d
Explanation: The answer is Denial of Explanation: The attack is a spoofing
service. In case of denial of service attacks, attack. It is when a user creates a packet
a computer site is bombarded with a lot of that appears to be something else or from
messages. someone else.
279. Creating a computer or paper audit 283. A technique in which a program
that can help detect wrong doings. attacks a network by exploiting IP
a) Auditing broadcast addressing operations.
b) Validation a) Smurfing
c) RSN b) Denial of service
d) Verification c) E-mail bombing
Answer: a d) Ping storm
Explanation: The answer is auditing. It is Answer: a
done to keep an eye on wrong doings. Explanation: Smurfing is a technique in
Auditing can be used as a deterrent. which a program attacks a network by
280. An indirect form of surveillance. exploiting IP broadcast addressing
a) Honey pot operations.
b) Logical 284. An attack in which the user receives
c) Security unwanted amount of e-mails.
d) Intrusion a) Smurfing
Answer: a b) Denial of service
Explanation: Honey pot is an indirect form c) E-mail bombing
of surveillance. Network personnel create d) Ping storm
a trap, watching for unscrupulous acts. Answer: c
281. A malicious code hidden inside a Explanation: In the case of denial of e-mail
seemingly harmless piece of code. bombing, a user sends an excessive
a) Worm amount of unwanted e-mail to someone.
b) Bomb 285. These ciphers replace a character or
c) Trojan Horse characters with a different character or
d) Virus characters, based on some key.
Answer: c a) Polyalphabetic substitution based
Explanation: The answer is Trojan horse. b) Transposition-based
Trojan horse is a code that is present in a c) Substitution based
program that appears harmless. d) Mono alphabetic substitution based
Answer: d Answer: c
Explanation: In mono alphabetic Explanation: Public key cryptography has 2
substitution-based cipher, a character is keys. They are private key and a public
replaced with some other character or key. The public key encrypts the message.
multiple characters, based on some key. The private key decrypts the message.
286. Encryption is the study of creating and 290. DES stands for?
using decryption techniques. a) Data Encryption Standard
a) True b) Data Encryption Statistics
b) False c) Data Encryption System
Answer: b d) Data Encryption Sequence
Explanation: The statement is false. Answer: a
Cryptography is the study of creating and Explanation: DES stands for Data
using encryption and decryption Encryption Standard. It was created in
techniques. 1977 and went into operation from 1990s.
287. A type of cipher that uses multiple 291. Under DES, the data encryption
alphabetic strings. standard took a 64-bit block of data and
a) Substitution based subjected it to ______ levels of encryption.
b) Transposition-based a) 64
c) Polyalphabetic substitution based b) 8
d) Mono alphabetic substitution based c) 16
Answer: c d) 4
Explanation: These ciphers are similar to Answer: c
that of mono alphabetic ciphers. Multiple Explanation: The answer is 16. It was
strings are used to encode the plain text. subjected to 16 levels of encryption. DES is
288. An encryption technique with 2 keys the data encryption standard.
is ______________ 292. Triple-DES has ______ keys.
a) Monoalphabetic Cipher a) 1
b) Cryptography b) 2
c) Private key cryptography c) 5
d) Public key cryptography d) 4
Answer: d Answer: b
Explanation: It is called as public key Explanation: There are 2 keys in triple DES
cryptography. It has 2 keys: a private key as well. The private and the public key. It
and a public key. can also have 3 unique keys.
289. In public key cryptography, a key that 293. Encryption standard that is selected
decrypts the message. by the US government to replace DES.
a) public key a) AES
b) unique key b) BES
c) private key c) CES
d) security key d) DES
a) A Library model equipped with up- 52. National Digital Preservation Program
to-date technology & resources and is sponsored by __.
designed for social construction of a) Indian Institute of Technology
knowledge and shared learning (Kharagpur)
b) A department under British Library b) Ministry of Electronic and
c) A sister organization of Creative Information Technology, GOI
Commons c) Ministry of Culture, GOI
d) None of the above d) National Library of India
Answer: A Library model equipped with Answer: Ministry of Electronic and
up-to-date technology & resources and Information Technology, GOI
designed for social construction of
53. Moving Picture Experts Group (MPEG)
knowledge and shared learning
is used to compress __.
49. A language defined for ontologies
a) Frames
development that provides description for
b) Images
classes and properties of RDF resources is
c) Audio
called:
d) Video
a) RDF/XML
Answer: Video
b) OWL
c) Turtle 54. 780 tag in MARC 21 is used for __.
d) RDF Schema a) Added Entry - Uncontrolled Related
Answer: OWL b) Added Entry - Analytical Title
c) Preceding Entry
50. OWL Stands for __.
d) Succeeding Entry
a) Web Ontology Language
Answer: Preceding Entry
b) Online Website Language
c) Onsite Wide Language 55. In OTT media service, OTT stands for
d) Ontology Website Language __.
Answer: Web Ontology Language a) Over-the-telecommunication
b) Over-the-television
51. SWORD Stands for __.
c) Over-the-top
a) Simple Web-Service Offering d) Over-the-table
Repository Deposit
Answer: Over-the-top
b) Simplified Web Organization
Repository Discovery 56. Which of the following committee was
c) Simple Web-Service Offering appointed on issues related to Net
Resource Deposit Neutrality in India?
d) Simplified Web Organization a) R. S. Sharma
Repository Deposit b) A. K. Bhargava
Answer: Simple Web-Service Offering c) Vijay Bhatkar
Repository Deposit d) Rahul Khullar
Answer: A. K. Bhargava
57. The easiest way to bring Internet video Answer: Ring topology
to one's desktop or download is known as 62. Which of the following is a method for
__. enabling authentication based on the URL?
a) Flogging a) Shibboleth
b) Podcasting b) Kerberos
c) Vodcasting c) Digital Signature
d) Blogging d) Referring URL
Answer: Vodcasting Answer: Referring URL
58. DORIA (Digital Object Management 63. An Application Program Interface (API)
System) is a digital library project of __. language is used for __.
a) British Library a) Network Management
b) Library of Congress b) Graphical User Interface
c) Stanford University Libraries c) Relational Interface in database
d) Helsinki University Library management
Answer: Helsinki University Library d) Database management system
59. In Network layer, the data packets Answer: Graphical User Interface
uses __ of devices to transfer data. 64. Knowledge Graph Infoboxes are used
a) MAC address in __.
b) IP address a) Yahoo
c) URL b) Altavista
d) PURL c) Google
Answer: IP address d) Rediff
60. Digital Object Identifier (DOI) is an __. Answer: Google
a) Internet based global network and 65. RSS Feed is generally arranged in __.
resolution system a) Alphabetical order
b) Internet based global naming and b) Chronological order
resolution system c) Reverse chronological order
c) Internet based global network and d) Subject wise
repository system
Answer: Reverse chronological order
d) Internet based global naming and
repository system 66. RSS Feed is coded in __.
Answer: Internet based global naming and a) HTML
resolution system b) SGML
c) XML
61. Which among the following is
d) TIFF
considered 'Active topology'?
Answer: XML
a) Ring topology
b) Bus topology 67. The Network layer concern with __.
c) Star topology a) Frames
d) All the above b) Bits
Diwakar Education Hub Page 286
UGC NET Library Science Unitwise MCQ
(d) 7 a. 1985
Answer: 5 b. 1982
c. 1980
97. ‘Fair use’ is the norm for determining
d. None Of The Above
the legality of
Answer: 1985
a. Producing the second edition of a
book 102. What is a bug?
b. Photocopying an entire book a. Computer Virus
c. Making available a book to another b. Error in Computer Configuration
library on inter-library loan c. Error in a Programme
d. Prescribing a book as a text book d. None of these
Answer: Photocopying an entire book Answer: Error in a Programme
98. ________ is a process of helping 103. ISO-9960 is related with?
employees in an organization to acquire a. Standard for encoding data on CD-
new skills and competence on a continuing ROM
basis b. Standard for Computer Hardware
a. Total Quality Management c. Standard for Information Processing
b. Management Information System d. Standard for Networking
c. Financial Resources Development Answer: Standard for encoding data on CD-
d. None of the above ROM
Answer: Total Quality Management 104. Information retrieval is fastest from
99. On which of the following technologies a. Floppy Disk
semantic web is not based? b. Magnetic Tape
a. RDF c. Hard Disk
b. Ontologies d. None Of The Above
c. Cloud seeding Answer: Hard Disk
d. none of the above
105. The CD alphabets in CDS/ISIS stands
Answer: Cloud seeding for
100. What are three types of basic a. Computerized Documentation
languages used in computer programming? b. Condensed Disk
a. Zero, low and high levels c. Confirmed Disc
b. COBOL, BASIC and PROLOG d. Compact Disc
c. Machine, Assembly and high level Answer: Computerized Documentation
languages
106. Following is not a social bookmarking
d. None Of The Above
site:
Answer: Machine, Assembly and high level
a. Digg
languages
b. Delicious
101. When CD-ROM was prepared and c. Sqidoo
made? d. None of the above
c) Passive a) Up to 10cms
d) None of the above b) Up to 60cms
Answer: c c) 10 to 15 meters
161. In which RFID tag, the range is less? Answer: c
a) Active 167. For high frequency and low frequency
b) Semi-passive RFID tags the working principle is based on
c) Passive ____________
d) None of the above a) Inductive coupling
Answer: c b) Electromagnetic coupling
c) Both a and b
162. How many components does the RFID
d) None of the above
reader consist of?
Answer: a
a) One
b) Two 168. For ultra-high frequency RFID tags the
c) Three working principle is based on
d) Four ____________
Answer: c a) Inductive coupling
b) Electromagnetic coupling
163. In which frequency range does the
c) Both a and b
RFID system operate?
d) None of the above
a) High-frequency
Answer: b
b) Low-frequency
c) Ultra high-frequency 169. What are the strengths of RFID?
d) All of the above a) Advanced technology
Answer: d b) Small in size, easy to use
c) Has high memory capacity
164. What is the range of RFID tags which
d) All of the above
is using the low frequency?
Answer: d
a) Up to 10cms
b) Up to 60cms 170. What is the standard form of EPC?
c) Up to 80cms a) Electronic Product Code
d) Up to 10cms b) Electrical Product Code
Answer: a c) Electronic Process Code
d) None of the above
165. What is the range of RFID tags which
is using the high frequency? Answer: b
a) Up to 10cms 171. What is the standard form of PML?
b) Up to 1meter a) Process Markup Language
c) Up to 80cms b) Physical Markup Language
Answer: b c) Product Markup Language
d) None of the above
166. What is the range of RFID tags which
are using the ultra-high frequency? Answer: b
172. In which of the following line of sight Answer: b. Small Search Space
is required? Explanation: Blind Search is also known as
a) RFID uninformed search, and it does not contain
b) Barcode any domain information such as closeness,
c) Both a and b location of the goal, etc. Hence the most
d) None of the above appropriate situation that can be used for
Answer: b the blind search is Small-search Space.
173. Artificial Intelligence is about_____. 176. The application/applications of
Artificial Intelligence is/are
a. Playing a game on Computer
a. Expert Systems
b. Making a machine Intelligent
b. Gaming
c. Programming on Machine with your
Own Intelligence c. Vision Systems
d. Putting your intelligence in Machine d. All of the above
Answer: b. Making a machine Intelligent. Answer: d. All of the above
Explanation: Artificial Intelligence is a Explanation: All the given options are the
branch of Computer science, which aims to applications of AI.
create intelligent machines so that 177. Among the given options, which
machine can think intelligently in the same search algorithm requires less memory?
manner as a human does. a. Optimal Search
174. Who is known as the -Father of AI"? b. Depth First Search
a. Fisher Ada c. Breadth-First Search
b. Alan Turing d. Linear Search
c. John McCarthy Answer: b. Depth First Search
d. Allen Newell Explanation: The Depth Search Algorithm
Answer: c. John McCarthy or DFS requires very little memory as it
Explanation: John McCarthy was a pioneer only stores the stack of nodes from the
in the AI field and known as the father of root node to the current node.
Artificial intelligence. He was not only the
known as the father of AI but also invented
the term Artificial Intelligence.
175. Select the most appropriate situation
for that a blind search can be used.
a. Real-life situation
b. Small Search Space
c. Complex game
d. All of the above
178. If a robot is able to change its own Explanation: In the year 1950,
trajectory as per the external conditions, mathematician and computing
then the robot is considered as the__ pioneer Alan Turing introduced a test to
a. Mobile determine whether a machine can think
like a human or not, which means it can
b. Non-Servo
demonstrate intelligence, known as
c. Open Loop the Turing Test. It was based on
d. Intelligent the "Imitation game" with some
Answer: d. Intelligent modifications. This technique is still a
measure of various successful AI projects,
Explanation: If a robot is able to change its
own trajectory as per the external with some updates.
conditions, then the robot is considered 181. The component of an Expert system
intelligent. Such type of agents come is_________.
under the category of AI agents or Rational a. Knowledge Base
Agents. b. Inference Engine
179. Which of the given language is not c. User Interface
commonly used for AI?
d. All of the above
a. LISP
Answer: d. All of the above
b. PROLOG
Explanation: Expert system is a part of AI
c. Python and a computer program that is used to
d. Perl solve complex problems, and to give the
Answer: d. Perl decision-making ability like human. It does
this with the help of a Knowledge base,
Explanation: Among the given languages,
Perl is not commonly used for AI. LISP and Inference engine, and User interface, and
PROLOG are the two languages that have all these are the components of an Expert
System.
been broadly used for AI innovation, and
the most preferred language is Python for
AI and Machine learning.
180. A technique that was developed to
determine whether a machine could or
could not demonstrate the artificial
intelligence known as the___
182. Which algorithm is used in the Game
a. Boolean Algebra
tree to make decisions of Win/Lose?
b. Turing Test
a. Heuristic Search Algorithm
c. Logarithm
b. DFS/BFS algorithm
d. Algorithm
c. Greedy Search Algorithm
Answer: b. Turing Test
d. Min/Max algorithm
c. Emulation b. GIF
d. Replication c. JPEG
Answer: b d. TIFF
b. Refreshing a) SHERPA/FACT
c. Migration b) SHERPA/RoMEO
c) SHERPA/Juliet
d. Analogue backups
Answer: b
Answer: a
212. Which one of the creative commons
207. “Technology Preservation” is also
licenses are considered for commercial
referred to as:
use?
a. Version Migration
a) BY-NC-ND
b. Backward Compatibility b) BY-ND
c. Computer Museum c) BY-NC
d. Digital Archaeology Answer: b
Answer: c 213. What is/are the main barrier(s) in
208. Bethesda's statement on Open Access using the Open Educational Resources
Publishing took place in the year? (OER)?
a) 2001 a) Lack of time
b) 2002 b) Lack of awareness
c) 2003 c) Low internet connectivity
d) 2005 d) All of the above
Answer: c Answer: d
209. Which one of the following copyright 214. When the National Repository of
licenses is enclosed with software in Open Educational Resources (NROER) was
plastic-wrapped packaging? launched?
a) Shrink Wrap License a) 13 August 2014
b) Browse Wrap License b) 13 August 2013
c) Implied License c) 13 April 2014
d) Express Written Contractual License d) 13 April 2013
Answer: a Answer: b
210. Which one of the following 215. Which one of the following institutes
permissions is not related to Open did not took part in the first phase of the
Licensing? National Programme on Technology
a) Revise Enhanced Learning (NPTEL)?
b) Redistribute a) Indian Institute of Technology Delhi
c) Retain b) Indian Institute of Science
d) Revoke c) Indian Institute of Technology Patna
Answer: d d) Indian Institute of Technology
Guwahati
211. Which service of SHERPA is involved
Answer: c
in copyright and open access self-archiving
policies for academic journals?
216. What is/are the project(s) and 221. In a Click Wrap Agreement, a user
program(s) relating to INFLIBNET? must agree to terms and conditions before
a) IRINS using the product or service.
b) VIDWAN a) True
c) e-PGPathshala b) False
d) All of the above Answer: a
Answer: d 222. Two major characteristics of open
217. The MHRD has formed e-ShodhSindhu source software licenses are
by merging three consortia initiatives, a) Open and no IPR
namely UGC-INFONET, N-LIST, and b) Free copyright & free distribution
_________. c) Free distribution and open source
a) INDEST-AICTE code
b) INDCAT d) Free license and no IPR
c) DelCON Answer: c
d) NKRC
223. EULA stands for
Answer: a
a) E-monitoring Library for Academics
218. When did NPTEL begin offering open b) End User Logistics Association
online courses or MOOCs? c) Electronic Usage of Library
a) 2014 Acquisitions
b) 2015 d) End User License Agreement
c) 2016 Answer: d
d) 2017
224. When did the NPTEL begin its Phase
Answer: a II?
219. What is the name of the publisher a) 2010
who participated in the TULIP program? b) 2009
a) Springer c) 2008
b) Elsevier d) 2007
c) SAGE Answer: b
d) JSTOR
225. Which one of the following is the
Answer: b commonly used OER repository?
220. In which year, the Journal Rankings a) COL-DOER
and Impact Factor (IF) metrics were b) OER Commons
introduced by the Science Citation Index? c) Wikimedia Commons
a) 1991 d) All of the above
b) 1964 Answer: d
c) 1972
226. Which search engine is commonly
d) 1986
used to find, locate and retrieve OER?
Answer: b
a) Bing
235. Which of the following can be Explanation: The term KDD or Knowledge
considered as the correct process of Data Discovery Database is refers to a broad
Mining? process of discovering the knowledge in
a. Infrastructure, Exploration, Analysis, the data and emphasizes the high-level
Interpretation, Exploitation applications of specific Data Mining
techniques as well.
b. Exploration, Infrastructure, Analysis,
Interpretation, Exploitation 238. The adaptive system management
refers to:
c. Exploration, Infrastructure,
Interpretation, Analysis, Exploitation a. Science of making machine performs
the task that would require intelligence
d. Exploration, Infrastructure, Analysis,
when performed by humans.
Exploitation, Interpretation
b. A computational procedure that
Answer: a
takes some values as input and produces
Explanation: The process of data mining some values as the output.
contains many sub-processes in a specific
c. It uses machine learning techniques,
order. The correct order in which all sub-
in which programs learn from their past
processes of data mining executes is
experience and adapt themself to new
Infrastructure, Exploration, Analysis,
conditions or situations.
Interpretation, and Exploitation.
d. All of the above.
236. Which of the following is an essential
process in which the intelligent methods Answer: c
are applied to extract data patterns? Explanation: Generally, adaptive system
a. Warehousing management refers to using machine
learning techniques. In which the programs
b. Data Mining
learn from their past experience and adapt
c. Text Mining themselves for new conditions and events.
d. Data Selection 239. For what purpose, the analysis tools
Answer: b pre-compute the summaries of the huge
Explanation: Data mining is a type of amount of data?
process in which several intelligent a. In order to maintain consistency
methods are used to extract meaningful b. For authentication
data from the huge collection ( or set) of
c. For data access
data.
d. To obtain the queries response
237. What is KDD in data mining?
Answer: d
a. Knowledge Discovery Database
Explanation: Whenever a query is fired,
b. Knowledge Discovery Data
the response of the query would be put
c. Knowledge Data definition very earlier. So, for the query response,
d. Knowledge data house the analysis tools pre-compute the
Answer: a summaries of the huge amount of data. To
243. As companies move past the with Hadoop would give a better
experimental phase with Hadoop, many understanding of data.
cite the need for additional capabilities, 246. Hadoop is a framework that works
including _______________ with a variety of related tools. Common
a) Improved data storage and information cohorts include ____________
retrieval a) MapReduce, Hive and HBase
b) Improved extract, transform and load b) MapReduce, MySQL and Google Apps
features for data integration c) MapReduce, Hummer and Iguana
c) Improved data warehousing d) MapReduce, Heron and Trumpet
functionality
Answer: a
d) Improved security, workload
Explanation: To use Hive with HBase you’ll
management, and SQL support
typically want to launch two clusters, one
Answer: d to run HBase and the other to run Hive.
Explanation: Adding security to Hadoop is
247. Point out the wrong statement.
challenging because all the interactions do
a) Hardtop processing capabilities are huge
not follow the classic client-server pattern.
and its real advantage lies in the ability to
244. Point out the correct statement. process terabytes & petabytes of data
a) Hadoop do need specialized hardware b) Hadoop uses a programming model
to process the data called “MapReduce”, all the programs
b) Hadoop 2.0 allows live stream should conform to this model in order to
processing of real-time data work on the Hadoop platform
c) In the Hadoop programming framework c) The programming model, MapReduce,
output files are divided into lines or used by Hadoop is difficult to write and
records test
d) None of the mentioned d) All of the mentioned
Answer: b Answer: c
Explanation: Hadoop batch processes data Explanation: The programming model,
distributed over a number of computers MapReduce, used by Hadoop is simple to
ranging in 100s and 1000s. write and test.
245. According to analysts, for what can 248. What was Hadoop named after?
traditional IT systems provide a foundation a) Creator Doug Cutting’s favorite circus
when they’re integrated with big data act
technologies like Hadoop? b) Cutting’s high school rock band
a) Big data management and data mining c) The toy elephant of Cutting’s son
b) Data warehousing and business d) A sound Cutting’s laptop made during
intelligence Hadoop development
c) Management of Hadoop clusters
Answer: c
d) Collecting and storing unstructured data
Explanation: Doug Cutting, Hadoop
Answer: a creator, named the framework after his
Explanation: Data warehousing integrated child’s stuffed toy elephant.
Such as, It is Sunday today. This sentence 259. Ways to achieve AI in real-life
can be either true or false only. are_________.
257. First order logic Statements a. Machine Learning
contains______. b. Deep Learning
a. Predicate and Preposition c. Both a & b
b. Subject and an Object d. None of the above
c. Predicate and Subject Answer: c. Both a &b
d. None of the above Explanation: Machine Learning and Deep
Answer: c. Predicate and Subject Learning are the two ways to achieve AI in
Explanation: The first-order logic is also real life.
known as the First-order predicate logic, 260. The main tasks of an AI agent
which is another way of knowledge are_______.
representation. The FOL statements a. Input and Output
contain two parts that are subject and
b. Moment and Humanly Actions
Predicate.
c. Perceiving, thinking, and acting on
For e.g., X is an Integer; In this, X is Subject
the environment
and Is an Integer is Predicate.
d. None of the above
Answer: c. Perceiving, thinking, and acting
on the environment
Explanation: The AI agent is the rational
agent that runs in the cycle of Perceive,
think, and act.
258. A knowledge-based agent can be
defined with _____ levels. 261. The probabilistic reasoning depends
upon____________.
a. 2 Levels
a. Estimation
b. 3 Levels
b. Observations
c. 4 Levels
c. Likelihood
d. None of the above
d. All of the above
Answer: b. 3 Levels
Answer: d. All of the above
Explanation: The knowledge-based agents
have the capability of making decisions Explanation: The probabilistic reasoning is
and reasoning to act efficiently. It can be used to represent uncertain knowledge,
viewed at three different levels, which are: where we are not sure about the
predicates. It depends Upon Estimation,
o Knowledge Level
Observation, and likelihood of objects.
o Logical Level
262. The inference engine works on
o Implementation Level ______.
(a) The amount of data that can be sent 292. Which of the following is an example
through communication media of 'microblogging'?
(b) The amount of data in the (a) Word Press
multimedia file (b) Blogspot
(c) The speed of transmission of data (c) Live Journal
(d) Number of bands available in the (d) Twitter
computer
Answer: Twitter
Answer: The amount of data that can be
293. Which of the OSI Model is mostly
sent through communication media
concerned with syntax of the data?
288. Who invented the relational model of
(a) Session layer
Database Management System?
(b) Presentation layer
(a) Edgar F. Codd (c) Network Layer
(b) H. E. Haines (d) Data Link Layer
(c) Tim Berners Lee
Answer: Presentation layer
(d) Charles Bachman
294. Identify the electronic depository in
Answer: Edgar F. Codd
which librarians of the participating
289. Who invented the concept of ‘Deep institutions have the right to put their
Web'? words in managing the depository?
(a) Andy Grove (a) PORTICO
(b) John C. Flanagan (b) LOCKSS
(c) Michael Bergman (c) CLOCKSS
(d) Larry Arvin (d) PubMed
Answer: Michael Bergman Answer: CLOCKSS
290. The purpose of the ____ protocol is 295. The Network layer concerns with __.
to provide a bi-directional communication
(a) Frames
facility.
(b) Bits
(a) FTP (c) Packets
(b) TELNET (d) None of the above
(c) SMTP
Answer: Packets
(d) Z39.50
296. Segmentation and reassembly is the
Answer: TELNET
responsibility of __.
291. The term ‘cookie’ was first coined
(a) Transport layer
by__.
(b) Session layer
(a) Ted Neslson (c) Network layer
(b) Lou Montulli (d) Presentation layer
(c) L. J. Cook
Answer: Transport layer
(d) Tim Berners-Lee
297. 'SLIM' Library Management Software
Answer: Lou Montulli
is developed by __.
4. (A) - (IV), (B) - (III), (C) - (II), (D)-(I) c) Consistency in the way of thesis writing
Answer: 4 d) Well defined abstract
2. Which of the following are remote data Select the answers from the codes given
collection procedures? below:
(A) Third-party interview a. b), c) and d)
(B) Pop-ups b. a), b), c) and d)
(C) Database e-mail c. a), b) and c)
(D) Instant messaging d. a), b) and d)
(E) Panel discussions Answer: B. a), b), c) and d)
Choose the correct answer from the 5. Which one among the following
options given below : statements is correct in context to
research?
1. (A), (B), (C) only
a) Research refers to a series of systematic
2. (B), (C), (D) only
activity or activities undertaken to find out
3. (C), (D), (E) only the solution to a problem.
4. (A), (B), (E) only b) It is a systematic, logical and unbiased
Answer: 2 process wherein verification of
hypotheses, data analysis, interpretation
3. Arrange the following stages of
processing of data in a correct sequence: and formation of principles can be done.
c) It is an intellectual inquiry or quest
(A) Coding towards truth,
(B) Editing d) It enhances knowledge.
(C) Tabulation Select the correct answer from the codes
(D) Classification given below:
(E) Using Percentages a. a), b), c) and d)
Choose the correct answer from the b. a), b) and c)
options given below: c. b), c) and d)
1. (A), (B), (C), (D), (E) d. a), c) and d)
2. (D), (A), (B), (C), (E) Answer: A. a), b), c) and d)
3. (C), (D), (A), (B), (E) 6. Match List I with List II
4. (B), (A), (D), (C), (E)
List I List II
Answer: 4
4. What does a good thesis involve? Tests of Reliability Description
a) Reducing punctuations as well as Delivering a
grammatical errors to minimalist Test and re- questionnaire in two
b) Correct reference citations A. I.
test parts, separately, to
a sample group.
3. Statement I is correct but Statement Select the correct answer from the
II is incorrect following options:
4. Statement I is incorrect but 1. i), iii) and iv)
Statement II is correct 2. i), ii) and iii)
Answer: 1 3. ii), iii) and v)
Explanation: 4. ii). iv) and v)
Statement I: Answer: 1 : i), iii) and iv)
Ethnography is the scientific study Explanation:
of individual civilizations.
Qualitative research: It is grounded in the
Ethnographic research based on assumption that individuals construct
fieldwork, ethnographers examine social reality in the form of meanings and
and understand culture, its interpretations, and that these
universalities, and its variations. constructions tend to be transitory and
Therefore, Statement I is correct. situational.
Statement II: A qualitative interview is the Qualitative research typically involves
research method used for one-on-one qualitative data, i.e., data obtained
interaction is necessary and in-depth through methods such as interviews, on-
information is needed from the site observations, and focus groups that
participant. are in narrative rather than numerical
Qualitative methods are more form. Such data are analyzed by looking
flexible, as it allows for themes and patterns.
greater instinctive and adaptation of 15. Which from the following are parts of
the interaction between the the purpose of quantitative research?
researcher and the study participant. A. Understanding of cultural traditions
Thus, Statement II is correct. B. Discovery of relationships among
14. Identify the qualitative research variables
designs from the list given below: C. Interpretation of human relationships
i) Exploring common experiences of D. Confirmation of hypotheses
individuals to develop a theory
E. Generalization of results to other
ii) Controlling. manipulating. observing and situations
measuring the effect
1. A, C and D
iii) Exploring the shared culture of a group
2. A, B and E
of people
3. B, C and D
iv) Exploring individual stories to describe
the lives of people 4. B, D and E
v) Extending generalizations from sample Answer: 4
to population Explanation: Quantitative research is the
process of collecting and analyzing
numerical data. It can be used to find Reason (R): Formal requirements and their
patterns and averages, make predictions, observance help promote standardization
test causal relationships, and generalize and objectivity.
results to wider populations. In the light of the above statements,
16. Match List I with List II choose the most appropriate answer from
the options given below:
List I
List II 1. Both (A) and (R) are true and (R) is
Referencing
Format of Citation the correct explanation of (A)
Style
2. Both (A) and (R) are true and (R) is
Author, date... NOT the correct explanation of (A)
(Sharma, Kailesh
3. (A) is true but (R) is false
(A) APA Style (I) suggested
photochromatic effect 4. (A) is false but (R) is true
(2006)) Answer: 1 : Both (A) and (R) are true and
(R) is the correct explanation of (A)
(Author Surname,
(B) MLA Style (II) Year)..... (Sharma, A research thesis is a report on
2006) a research project or study or an extended
analysis of a topic.
Number in square Assertion (A): Format and styles of
Chicago brackets..... This theory
(C) (III) referencing in a research thesis are formal
Style was first put forward in requirements.
2006 [10]
Format and styles of referencing in a
Authorname in text, research thesis are important to show the
allows footnotes.... reader that the researcher has done
(D) IEEE Style (IV)
Sharma develops this proper research is done by listing sources.
argument (67-69) it is also used to get information.
Choose the correct answer from the Reason (R): Formal requirements and their
options given below: observance help promote standardization
1. (A)-(III), (B)-(II), (C)-(IV), (D)-(I) and objectivity.
2. (A)-(I), (B)-(III), (C)-(II), (D)-(IV) A good thesis should be clear and
3. (A)-(II), (B)-(IV), (C)-(I), (D)-(III) unambiguous and should have a logical
structure that should assist the reader's
4. (A)-(IV), (B)-(I), (C)-(III), (D) -(II)
understanding of the argument being
Answer: 3 : (A)-(II), (B)-(IV), (C)-(I), (D)-(III) presented not obscure it.
17. Given below are two statements: One In order to achieve this objective, the
is labeled as Assertion (A) and the other is layout, and physical appearance of the
labeled as Reason (R): thesis should conform to a set pattern.
Assertion (A): Format and styles of Therefore, Both (A) and (R) are true and (R)
referencing in a research thesis are formal is the correct explanation of (A)
requirements.
Diwakar Education Hub Page 322
UGC NET Library Science Unitwise MCQ
18. Which of the following are the basic (b) Sanjay (ii) CMC
rules of APA style of referencing format? (c) Granthalaya (iii) UNESCO
(a) Italicize titles of shorter works such as (d) Maitrayee (iv) DESIDOC
journal articles or essays
(a) (b) (c) (d)
(b) Invert authors' names (last name first)
(A) (i) (iii) (ii) (iv)
(c) Italicize titles of longer works such as
(B) (ii) (iii) (iv) (i)
books and journals
(C) (iv) (i) (ii) (iii)
(d) Alphabetically index reference list
(D) (iii) (iv) (i) (ii)
Select the correct answer from the codes
given below: Answer: (D)
1. (a) and (b) 21. Arrange the following in correct order :
2. (b), (c) and (d) (i) Deductive phase
3. (c) and (d) (ii) Empirical phase
4. (a), (b), (c) and (d) (iii) Verification phase
Answer: 2 (iv) Hypothesizing phase
19. Match the following: (A) (i), (ii), (iv), (iii)
List I List (B) (iv), (i), (ii), (iii)
II (C) (iii), (i), (iv), (ii)
(i) DDC (w) (D) (ii), (iv), (i), (iii)
15th ed. Answer: (D)
(ii) SLSH (x) 22. Which of the following guides are used
34th ed. in maintenance section of the library ?
(iii) DDC, Abridged (y) (i) Gangway guides
23rd ed.
(ii) Shelf guides
(iv) LCSH (z) (iii) Tier guides
20th ed.
(iv) User guides
Codes:
Codes :
(i) (ii) (iii) (iv)
(A) (i), (ii) and (iv) are correct.
(A) (y) (x) (z) (w)
(B) (i), (ii) and (iii) are correct.
(B) (y) (z) (x) (w)
(C) (ii), (iii) and (iv) are correct.
(C) (w) (y) (z) (x)
(D) (i), (iii) and (iv) are correct.
(D) (y) (z) (w) (x)
Answer: (B)
Answer: (D)
23. Which of the following are ‘TQM’ tools
20. Match the following :
?
List I List II (i) Fishbone Diagram
(a) CDS/ISIS (i) NISCAIR
Diwakar Education Hub Page 323
UGC NET Library Science Unitwise MCQ
29. Match the following : 31. On what basis did Jean Piaget give his
List – I List – II theory of cognitive development of
humans?
a. DCMES i. Defined Functional
Requirements of Records a. Evaluation Research
b. MARC ii. Rules for b. Fundamental Research
Bibliographic Records c. Applied Research
c. RDA iii. Retrieval and d. Action Research
Data Exchange Answer: b) Fundamental Research
d. FRBR iv. Coding Scheme for Explanation: Jean Piaget, in his cognitive-
computerized Bibliographic Records developmental theory, proposed the idea
Codes : that children can actively construct
abcd knowledge simply by exploring and
manipulating the world around them.
(A) iii iv ii i
32. What are the core elements of a
(B) iv ii iii i
dissertation?
(C) i ii iii iv
a. Introduction; Data Collection; Data
(D) ii iv i iii Analysis; Conclusions and
Answer: (A) Recommendations
30. Match the following dialogue systems : b. Executive Summary; Literature
List – I List – II Review; Data Gathered; Conclusions;
a. Menu i. Computer recognizable Bibliography
dialogues c. Research Plan; Research Data;
Analysis; References
b. Icons ii. Communicating with computers
with everyday language d. Introduction; Literature Review;
c. Natural language iii. List of options Research Methodology; Results;
available Discussions and Conclusions
63. The main feature of secondary source 67. The techniques by which we can study
of data is that _________. an individual's personality by observing
a. It provides first-hand information to his/her style of life, behaviour, manner,
the researcher thoughts and feelings is called-
b. It is more reliable compared to 1. Inventory
primary data 2. Case history
c. It implies that the data is collected
3. Rating scale
from its original source
d. It involves collecting data from 4. Projective
existing sources that had gathered Answer: 2
primary data beforehand for their 68. _______ includes data concerning the
research purpose family background and educational
Answer: d development.
64. Which one of the following stages of 1. Case study
the marketing research process is most 2. General behaviour
expensive ?
3. Genetic approach
1. Data analysis 4. Adequacy
2. Data collection
Answer: 1
3. Developing the research plan 69. A researcher wants to study the
4. Report writing association between gender and using a
Answer: 2 mobile phone. Data collected for this study
65. A researcher wants to study the will be ______
association between gender and using a 1. Quantitative data
mobile phone. Data collected for this study 2. Qualitative data
will be ______ 3. Continuous data
1. Quantitative data
4. Classified data
2. Qualitative data
Answer: 2
3. Continuous data 70. Name the method which deals with
4. Classified data only one person at a time and promotes
Answer: 2 his adjustment
66. Which data is cheaper to collect? 1. Case study
1. Primary data 2. Questionnaire
2. Secondary data 3. Clinical method
3. New Data 4. Experimental mental
4. Collective data Answer: 2
Answer: 2 71. Which data is cheaper to collect?
1. Primary data
Answer: D B) Variable
116. Which of the sampling technique is C) Concept
most appropriate when the population is D) Data
dispersed over a large geographic area and
Answer: A
no sampling frame or list is available?
121. The effectiveness of an experimental
A) Multi-stage sampling
variable is examined by comparing it with
B) Area sampling another variable, known as ………………..?
C) Cluster sampling A) Confounding variable
D) Systematic random sampling B) Ordinal variable
Answer: A C) Controlled variable
117. Who defined “systematic effort to D) Categorical variable
gain new knowledge we call research”?
Answer: C
A) Martin Albrow
122. Which of these is not a method of
B) Eric Anderson data collection
C) L.V. Redman and A.V.H. Morry A) Observation
D) Barry Barnes B) social survey
Answer: C C) Interview Schedule
118. The sample survey and experimental D) ethnography
method are the most typical examples of
Answer: C
…………….?
123. Who defined “an interview involves
A) Quantitative research
an interviewer reading questions to
B) Qualitative research respondents and recording their answers”?
C) Historical research A) Monette
D) case study B) John Porter
Answer: A C) John Scott
119. Blue print of a research process is D) W P Thompson
known as ………………….?
Answer: A
A) Research Draft
124. Which of the following should a
B) Analytical layout researcher careful for when preparing a
C) Abstract questionnaire?
D) Research design A) Double barreled questions
Answer: D B) Complex Questions
120. …………………..as a tentative statement C) Question sequencing
about something D) all of the above
A) Hypothesis Answer: D
143. Which of the following is a major B) How you pick the items from the
function of literature review population
A) Gives theoretical foundation to your C) Classification of sample
research D) A list of the all items in your population
B) Connecting with existing knowledge’s Answer: D
C) Bringing clarity and focus to your 148. What is the expansion of APA?
research problem
A) Autonomous Physical Association
D) all of the above
B) American Physiological Authority
Answer: D
C) American Psychological Association
144. Which of the following term is usually
D) Anthropological physiological authority
expressed as a short question about the
relationship between two or more Answer: C
variables? 149. Who defined “Research is a
A) Research objectives systematic, controlled, empirical and
critical investigation of hypothetical
B) Research problem
relations among natural phenomena?”
C) Hypothesis
A) Kerlinger
D) Concepts
B) Howard S Becker
Answer: B
C) Perter Blau
145. Interviews are conducted using a
D) Kingsley Davis
series of preset questions and extremely
standardized recording techniques, it is Answer: A
called ………………? 150. Discovery, definition, and
A) Structured interview experimentation is the sequential process
of ………………..?
B) Conversational interview
D) Applied research
C) Unstructured Interview
B) Exploratory research
D) Informal interview
C) Action research
Answer: A
D) Descriptive research
146. Participant observation is a main data
collection tool of ………………? Answer: B
A) Social survey 151. The functions of social science
research are …………………?
B) Interview
A) Prediction
C) Ethnography
B) Diagnosis of problems and their analysis
D) Content analysis
C) Development of planning
Answer: C
D) All of the above
147. What is sampling frame?
Answer: D
A) The number of items
245. The list of special terms and phrases Ans: a) All of the above.
used is given in the form of a: 250. The last state of research process is:
a) Foot Note. a) Review of literature.
b) Quotations. b) Report writing.
c) Glossary. c) Research design.
d) Bibliography. d) Analysis of data.
Ans: c) Glossary. Ans: b) Report writing.
246. An abstract is a: 251. A long essay on a single piece of work
a) Synopsis. is called:
b) Quotations. a) Research report.
c) Glossary. b) Monograph.
d) Bibliography. c) Dissertation.
Ans: a) Synopsis. d) Book.
247. In research methodology, Ans: b) Monograph.
interpretation is the search of: 252. Thesis is also known as:
a) Statistical data. a) Research report.
b) Research problem. b) Monograph.
c) Research findings. c) Dissertation.
d) Research plan. d) Book.
Ans: c) Research findings. Ans: c) Dissertation.
248. Interpretation should be: 253. A detailed disclosure on the subject
a) Subjective. under study is called:
b) Objective. a) Research report.
c) Integrity. b) Monograph.
d) None of the above. c) Dissertation or thesis.
Ans: a) Subjective. d) Book.
249. Which of the following statements are Ans: c) Dissertation or thesis.
true about interpretation of data? 254. Which of the following is not true
a) Interpretation can’t proceed without about e-journals?
analysis. a) They are distributed through digital
b) Analysis and interpretation are methods.
interdependent. b) They also have editors or editorial
c) The data to be interpreted should be boards.
homogeneous in nature. c) They are publications of serial nature.
a) All of the above. d) They are always free of cost.
Ans: d) They are always free of cost. Ans: b) A brief summary of the findings of
255. In which of the following, reporting the report.
format is formally prescribed ? 260. When academicians are called to
a) Doctoral level thesis. deliver lecture or presentation to an
audience on certain topics or a set of
b) Conference of researchers.
topics of educational nature, it is called
c) Workshops and seminars.
a) Training Program.
d) Symposia.
b) Seminar.
Ans: a) Doctoral level thesis.
c) Workshop.
256. Which of the following is an optional
d) Symposium.
supplement of a research paper?
Ans: b) Seminar.
a) Foot Note.
261. The core elements of a dissertation
b) Appendix.
are:
c) Glossary.
a) Introduction; Data Collection; Data
d) Bibliography. Analysis; Conclusions and
Ans: b) Appendix. Recommendations.
257. In a thesis, figures and tables are b) Executive Summary; Literature review;
included in Data gathered; Conclusions; Bibliography.
a) the appendix. c) Research Plan; Research Data; Analysis;
b) a separate chapter. References.
c) the concluding chapter. d) Introduction; Literature Review;
d) the text itself. Research Methodology; Results; Discussion
and Conclusion.
Ans: a) the appendix.
Ans: a) Introduction; Data Collection; Data
258. A thesis statement is Analysis; Conclusions and
a) an observation. Recommendations.
b) a fact. 262. A written format of a research work is
c) an assertion. known as:
d) a discussion. a) Research Paper.
Ans: c) an assertion. b) Monograph.
259. An abstract contains: c) Project report.
a) A brief summary of research problems. d) Research report.
b) A brief summary of the findings of the Ans: d) Research report.
report. 263. Row headings of a table is known as:
c) A brief analysis of data. a) Stum.
d) A brief interpretation of data. b) Stub.
we study society from the bottom, then Explanation: Tippit table was first
move upward to make the theories. published by L.H.C Tippett in 1927.
306. How is random sampling helpful? 309. In order to pursue the research, which
a. Reasonably accurate of the following is priorly required?
b. An economical method of data a. Developing a research design
collection b. Formulating a research question
c. Free from personal biases c. Deciding about the data analysis
d. All of the above procedure
Answer: d) All of the above d. Formulating a research hypothesis
Explanation: In random sampling, for each Answer: b) Formulating a research
element of the set, there exist a possibility question
to get selected. Explanation: Before starting with research,
307. A research intends to explore the it is necessary to have a research question
result of possible factors for the or a topic because once the problem is
organization of effective mid-day meal identified, then we can decide the research
interventions. Which research method will design.
be most appropriate for this study? 310. The format of thesis writing is the
a. Descriptive survey method same as in
b. Historical method a. Writing of Seminar representation
c. Ex-post facto method b. Preparation of research
paper/article
d. Experimental method
c. A research dissertation
Answer: c) Ex-post facto method
d. Presenting a workshop/conference
Explanation: Mainly in the ex-post facto
paper
method, the existing groups with qualities
are compared on some dependent Answer: c) A research dissertation
variable. It is also known as quasi- Explanation: The format of thesis writing is
experimental for the fact that instead of similar to that of a research dissertation, or
randomly assigning the subjects, they are we can simply say that dissertation is
grouped on the basis of a particular another word for a thesis.
characteristic or trait. 311. Which one among the following
308. Tippit table refers to as _________ statements is false in the context of
a. Table of random digits participatory research?
b. The table used in sampling methods a. It recognizes knowledge as power
c. The table used in statistical b. It is a collective process of inquiry
investigations c. It emphasizes people as experts
d. All of the above d. Its sole purpose is the production of
Answer: d) All of the above knowledge
Answer: d) Its sole purpose is the b. R&D can enhance people's standard
production of knowledge of living in the country
Explanation: Participatory action research c. R&D reflects the actual economic
is a kind of research that stresses and social conditions being prevailed
participation and action. in the country
312. Which one among the following d. All the above
statement is true in the context of the Answer: d) All of the above.
testing of hypotheses?
315. What does the longitudinal research
a. It is only the alternative hypotheses approach actually deal with?
that can be tested.
a. Long-term research
b. It is only the null hypotheses that
b. Short-term research
can be tested.
c. Horizontal research
c. Both the alternative and the null
hypotheses can be tested. d. None of the above
d. Both the alternative and the null Answer: a) Long-term research
hypotheses cannot be tested. Explanation: In general, the longitudinal
Answer: b) It is only the null hypothesis approach is long-term research in which
that can be tested. the researchers keep on examining similar
individuals to detect if any change has
Explanation: Hypotheses testing evaluates
occurred over a while.
its plausibility by using sample data.
316. What do you understand by the term
313. What are the conditions in which
"Anusandhan"?
Type-I error occurs?
a. Goal-oriented
a. The null hypotheses get accepted
even if it is false b. Following an aim
b. The null hypotheses get rejected c. Attaining an aim
even if it is true d. Praying to achieve an aim
c. Both the null hypotheses as well as Answer: b) Following an aim
alternative hypotheses are rejected 317. Evaluation Research is concerned with
d. None of the above __________
Answer: b) The null hypotheses get a. How well are we doing?
rejected even if it is true b. Why are we doing?
Explanation: The Type-I Error can be c. What are we doing?
defined as the first kind of error. d. None of the above
314. Research and Development become Answer: a) How well are we doing?
the index of development of the country.
Which of the following reasons are true Explanation: Instead of focusing on the
with regards to this statement? process, the evaluation research measures
a. R&D targets human development
Diwakar Education Hub Page 361
UGC NET Library Science Unitwise MCQ
the consequences of the process, for Answer: b) To bring out the holistic
example, if the objectives are met or not. approach to research
318. Which of the following does not Explanation: Particularly in
correspond to characteristics of research? interdisciplinary research, it combines two
a. Research is not passive or more hypothetical disciplines into one
activity.
b. Research is systematic
321. The main aim of the scientific method
c. Research is not a problem-oriented
in the research field is to _________
d. Research is not a process
a. Improve data interpretation
Answer: d) Research is not a process
b. Confirm triangulation
Explanation: Research is an inspired and
c. Introduce new variables
systematic work that is undertaken by the
researchers to intensify expertise. d. Eliminate spurious relations
319. Which of the following options are Answer: d) Eliminate spurious relations
the main tasks of research in modern Explanation: Scientific research aims to
society? build knowledge by hypothesizing new
a. To learn new things theories and discovering laws.
b. To keep pace with the advancement 322. A researcher is interested in studying
in knowledge the prospects of a particular political party
in an urban area. So, what tool should he
c. To systematically examine and
prefer for the study?
critically analyze the
investigations/sources with the a. Rating Scale
objective b. Interview
d. All of the above c. Questionnaire
Answer: d) All of the above d. Schedule
Explanation: Research is an inspired and Answer: c) Questionnaire
systematic work that is undertaken by the Explanation: Since it is an urban area, so
researchers to intensify expertise. there is a probability of literacy amongst a
320. What is the main aim of greater number of people. Also, there
interdisciplinary research? would be numerous questions over the
a. To over simplify the problem of ruling period of a political party, which
research cannot be simply answered by rating. The
rating can only be considered if any
b. To bring out the holistic approach to
political party has done some work, which
research
is why the Questionnaire is used.
c. To create a new trend in research
323. The conclusions/findings of which
methodology
type of research cannot be generalized to
d. To reduce the emphasis on a single other situations?
subject in the research domain
a. Casual Comparative Research
Diwakar Education Hub Page 362
UGC NET Library Science Unitwise MCQ
(c) Books are for use (3) (a), (c), (b), (d)
(d) Every book its reader (4) (d), (a), (c), (b)
Code: Answer: (3)
(1) (b), (c), (d), (a) 11. Arrange the following e-book sites
(2) (c), (d), (a), (b) according to the chronological order of
their origin:
(3) (a), (b), (c), (d)
(a) Project Gutenberg
(4) (d), (a), (b), (c)
(b) Open Library
Answer: (1)
(c) Google Books
9. Arrange the following Information
Sources according to their first year of (d) DOAB
Publication: Code:
(a) Ulrich’s International Periodical (1) (a), (c), (b), (d)
Directory (2) (b), (a), (c), (d)
(b) Guide to Indian Periodical Literature (3) (c), (b), (d), (a)
(c) Library Literature (4) (d), (c), (a), (b)
(d) Indian Science Abstracts Answer: (1)
Code: 12. Arrange the following entities
(1) (a), (c), (b), (d) according to FRBR Model:
(2) (b), (c), (d), (a) (a) Item
(3) (c), (a), (b), (d) (b) Expression
(4) (d), (a), (b), (c) (c) Work
Answer: (1) (d) Manifestation
10. Arrange the following according to the Code:
year of their first publication: (1) (c), (b), (d), (a)
(a) Bibliotheca Universalis by Konard (2) (d), (a), (b), (c)
Gesner
(3) (c), (d), (a), (b)
(b) Catalogue of Books in the 15th century
(4) (c), (a), (b), (d)
by the British Museum
Answer: (1)
(c) The Bibliographic Instructive Rare Books
by G.E. Bura 13. Which of the following Sections
Constitute the parts of main entry
(d) Union catalogue of learned periodical
according to CCC (Ed.5) ?
Publications in South Asia by S.R.
Ranganathan (a) Leading Section
Code: (b) Title Section
(1) (a), (b), (d), (c) (c) Format Section
(2) (b), (a), (d), (c) (d) Note Section
(3) (A) is true, but (R) is false. in any popular citation style like APA, MLA,
(4) (A) is false, but (R) is true. or Chicago style.
Answer: (2) Reason (R): Web-based solutions related
to online reference management have
29. Assertion (A): Serial crisis led to the
become freely available to the global
formation of library consortia around the
researchers engaged in collaborative
world.
research project.
Reason (R): Serial crisis arises due to the
Code:
situation in which budget of the library
for subscription of Journals remains static (1) Both (A) and (R) are false.
in spite of rising subscription cost (2) Both (A) and (R) are true.
of Journals which in turn affect the (3) (A) is false but (R) is true.
collection development policy of
(4) (A) is true but (R) is false.
the libraries.
Answer: (2)
Code:
32. Assertion (A): Dr. Eugene Garfields
(1) Both (A) and (R) are true.
original invention still continues to serve
(2) Both (A) and (R) are false. as a reliable and efficient guide to the
(3) (A) is true but (R) is false. sprawling world of research.
(4) (A) is false but (R) is true. Reason (R): Garfield was not only honored
Answer: (1) for his work in developing the field of
Citation Analysis, but also his subsequent
30. Assertion (A): Plagarism is the wrongful
contribution in founding ISI (1960)
appreciation and stealing and publication
that developed and launched SCI (1964)
of another author’s language, thought,
consequently led to the development of
ideas or expressions.
numerous citation databases of first order
Reason (R): Plagarism is in itself a crime, including ‘Web of Science’, all of which
and thus constitute copyright brought him an idiomatic identity in the
infringement. research world till the date.
Code: Code:
(1) (A) is true, but (R) is false. (1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true. (2) (A) is false, but (R) is true.
(3) Both (A) and (R) are false. (3) Both (A) and (R) are true.
(4) Both (A) and (R) are true. (4) Both (A) and (R) are false.
Answer: (4) Answer: (3)
31. Assertion (A): The Mendeley is one of 33. Assertion (A): In technical writing, style
the most preferred online reference manuals and citation standards are
managers which can store bibliographic essential in structuring and maintaining
records as well as full text documents and uniformity of research report.
help in creating bibliographical references
Reason (R): The Quality of research can be (3) Both (A) and (R) are true.
achieved only by standardising the (4) Both (A) and (R) are false.
structure of research report, but not by the
Answer: (2)
content.
36. Assertion (A): In recent times, it is
Code:
easier to copy, and paste the contents
(1) Both (A) and (R) are true. from a digital documents for which people
(2) Both (A) and (R) are false. knowingly avoid to credit the sources.
(3) (A) is true, but (R) is false. Increased access to digital documents has
provided a means for increase
(4) (R) is true, but (A) is false.
of plagiarism.
Answer: (3)
Reason (R): Software assisted detection
34. Assertion (A): Delphi Techniques in tools like ithenticate, turnitin etc. now
Social Science Research do not give allow vast collection of online documents
weightage to consensus. to be compared to each other
Reason (R): Consensus opinions expressed making successful detection of plagiarism.
by the panel of experts is valuable in Code:
drawing inferences.
(1) Both (A) and (R) are false.
Code:
(2) (A) is true, but (R) is false.
(1) (A) is true, but (R) is false.
(3) (R) is true, but (A) is false.
(2) (A) is false, but (R) is true.
(4) Both (A) and (R) are true.
(3) Both (A) and (R) are true.
Answer: (4)
(4) Both (R) and (A) are false.
37. Assertion (A): F.W. Lancaster’s
Answer: (2) cocksure prediction of a paperless society
35. Assertion (A): In social research, a high by the end of 20th century holds no good.
proportion of refusals to answer a research Reason (R): Transition from print
always occurs solely due to inadequate dominance to paperless ascendancy,
interview instructions or poor change from scroll to codex and
interview training. introduction of movable type were not
Reason (R): Within the questionnaire or only the few historical shifts, but were also
interview, even a substantive number hugely significant innovations. Inspite
of questions often remain unanswered of rapid technological changes, the future
making difficult for the researcher to state libraries will still accommodate a very large
an exact figure and forcing him to restudy print collection. However, the propelling
the questions carefully as fault might lie vision of an informationdriven paperless
upon a poor transition. society, though seems inevitable to avoid
Code: space, staff, and cost crunch, may buy
more time to become a reality.
(1) (A) is true, but (R) is false.
Code:
(2) (A) is false, but (R) is true.
(1) (A) is true, but (R) is false. (D) Both (A) and (R) are true, and (R) is not
(2) (A) is false, but (R) is true. the correct explanation
(3) Both (A) and (R) are true. Answer: (A)
(4) Both (A) and (R) are false. 41. The call number for a document
consists of three elements namely Class
Answer: (2)
Number, Book Number and
38. Assertion (A): The curriculum of LIS
A. Collection Numbers
education in India is mostly unsteady as
local LIS requirements vary. B. Accession Numbers
Reason (R): Adoption of UGC model C. Serial Numbers
syllabus is not mandatory for the LIS D. Reference Numbers
schools in India. Answer: A
Code: 42. An ordinal number, which fixes the
(1) (A) is true, but (R) is false. place of a subject relative to other subjects
(2) (A) is false, but (R) is true. in a scheme of classification is known as —
(3) Both (A) and (R) are true. A. Collection Number
(4) Both (A) and (R) are false. B. Accession number
Answer: (3) C. Call Number
39. Assertion (A): Periodical collection is D. Class Number
extensively used in University Libraries. Answer: D
Reason (R): Academia of University 43. An ordinal number which fixes the
Libraries are engaged in research work. place of a document in a library relative to
(A) (A) is true, but (R) is false the documents having the same number is
known as —
(B) (A) is false, but (R) is true
A. accession number
(C) Both (A) and (R) are true, and (R) is the
correct explanation B. collection number
(D) Both (A) and (R) are false C. book number
Answer: (C) D. call number
40. Assertion (A): Marketing libraries is Answer: D
necessary to promote the use of library 44. The amount of literature published or
products and services likely to be published on a subject is
Reason (R): Information commodities are known as —
not saleable and cannot be consumed A. users warrant
(A) (A) is true, but (R) is false B. literary warrant
(B) (A) is false, but (R) is true C. collocation
(C) Both (A) and (R) are true D. dilatory sequence
Answer: B
63. The first conference of Indian Library 68. RRRLF is the nodal agency for
Association was organised — promoting
A. on October 13,1933 (a) Academic Libraries
B. in 1976 (b) Special Libraries
(c) Public Libraries
C. on September 12,1933
(d) Corporate Libraries
D. in 1971
Answer: Public Libraries
Answer: C
69. HeadQuarters of RRRLF Located in
64. Find out the correct sequence of the
(a) Chennai
following forms of Main Class Literature
(b) Mumbai
according to Colon Classification (sixth
(c) New Delhi
reprint edition):
(d) Kolkata
(1) Poetry, Fiction, Campu, Oration
Answer: Kolkata
(2) Poetry, Fiction, Oration, Campu
70. Present chairman of RRRLF is
(3) Poetry, Oration, Fiction, Campu
(a) Shri Gangapuram Kishan Reddy
(4) Fiction, Poetry, Campu, Oration (b) Mahalaxmi Ramakrishnan
Answer: (2) (c) K. Sreenivasarao
65. RRRLF established in the year (d) Brij Kishore Sharma
(a) 1965 Answer: Shri Gangapuram Kishan Reddy (
(b) 1972 Nov 2022) Question write
(c) 1984 71. Eastern Zonal office of RRRLF Located
(d) 1991 in
Answer: 1972 (a) Kolkata
66. RRRLF established in the year also Raja (b) Guwahati
Rammohun Roy's (c) Patna
(d) Siliguri
(a) Centenary year of the birth
(b) Bi -Centenary year of the birth Answer: Kolkata
(c) Tricentenary of the death 72. RRRLF established and fully financed
(d) Centenary year of the death by
Answer: Bi -Centenary year of the birth (a) Ministry of finance
67. RRRLF's supreme policy-making body (b) Ministry of education
is called the Foundation. It consists of (c) Ministry of culture
(a) 7 members (d) Ministry of human resource
(b) 9 members development
(c) 22 members Answer: Ministry of culture
(d) 15 members 73. Select the incorrect pair of RRRLF's
Answer: 22 members assistance under Matching schemes
(a) For developed States - 50: 50
(b) Developing and lagging states - 60: 77. According to Census 2001 which kind
40 of disability is more in India?
(c) North-Eastern States - 80: 20 (a) Hearing Handicapped
(d) None of the above (b) Arm Handicapped
Answer: North-Eastern States - 80: 20 (c) Visual Handicapped
74. Assistance under Non Matchings (d) Mental Disability
schemes are given fully from the RRRLF's Answer: Hearing Handicapped
own resources except 78. Which one of the following tool allows
(a) Assistance towards building up of blind users to avail library services?
adequate stock of books through (a) WYNN
central selection (b) Kurzweil 3000
(b) Assistance to voluntary (c) Library Website
organisations (NGOs) providing (d) Jaws Pro Talking Software
public library services.
Answer: Jaws Pro Talking Software
(c) Assistance to centrally sponsored
libraries 79. Who is responsible to regulate the
(d) Assistance towards Establishment of training policies and programmes in the
RRRLF Children's Corner field of rehabilitation of persons with
disabilities
Answer: Assistance to voluntary
organisations (NGOs) providing public (a) University Grants Commission
library services. (b) Rehabilitation Council of India
(c) Ministry of Skill Development
75. Which policy is developed by Ministry
(d) Ministry of Social Justice and
of Social Justice and Empowerment?
Empowerment
(a) Persons with Disability Act, 1995
Answer: Rehabilitation Council of India
(b) Integrated Education for Disabled
Children 80. W3C Stands for?
(c) National Policy for Persons with (a) World Wide Web Circulation
Disabilities, 2006 (b) World Wide Web Construction
(d) Right to Education (c) World Wide Web Consortium
Answer: National Policy for Persons with (d) World Wide Web Computers
Disabilities, 2006 Answer: World Wide Web Consortium
76. According to Census 2001 how many 81. TEPSE is Stands for
persons are having one or other kind of (a) Teacher Preparation in Special
disability? Environment
(a) 20 Million (b) Training & Preparation in Special
(b) 22 Million Education
(c) 21 Million (c) Teacher Programs in Special
Answer: 21 Million Education
(d) Teacher Preparation in Special
Education
Diwakar Education Hub Page 376
UGC NET Library Science Unitwise MCQ
(a) High Engineering for Persons with (d) Digital application information
Special Needs Differently-abled system
Persons Answer: Digital accessible information
(b) Helping Environment for Persons system
with Special Needs Differently-abled
93. WYNN is which type of software used
Persons
by Learning Disabliities?
(c) Hope Ear Phone for Persons with
Special Needs Differently-abled (a) Download, Upload and Rewriting
Persons Software
(d) Higher Education for Persons with (b) Solid, Retial and Wholesale Software
Special Needs Differently-abled (c) Scanning, Reading and Writing
Persons Software
(d) Holding, Listing and Wholmark
Answer: Higher Education for Persons with
Software
Special Needs Differently-abled Persons
Answer: Scanning, Reading and Writing
90. National Institute of Rehabilitation
Software
Training & Research is Where Situated?
94. Which is the major metadata type
(a) New Delhi.
used for authentication in Preservation
(b) Cuttack
Description Information?
(c) Dehradun
(d) Kolkata (a) Reference Information
(b) Provenance Information
Wrong! You have selected wrong answer.
(c) Context Information
Answer: Cuttack (d) Fixity Information
91. IGNOU, New Delhi has established the Answer: Fixity Information
National Centre for Disability Studies in
95. The online information search services
November ………….. with the mission “to
like DIALOG, BRS Search and STN worked
provide quality education at the doorsteps
on
of the learners including persons with
disabilities”. (a) Host-terminal Technology
(b) Client-Server Architecture
(a) 2006
(c) Information Technology
(b) 2005
(d) Digital Library
(c) 2007
(d) 2008 Answer: Host-terminal Technology
Answer: 2006 96. The primary objective of cost-benefit
analysis is
92. DAISY Stands for
(a) to find out direct and indirect cost of
(a) Digital accessible innovative system
developing the information system
(b) Digital accessible information system
(b) to determine the tangible benefits of
(c) Disabilty accessible information
the information system
system
164. Which of the following is a specialist b) Third party includes a public authority
who elicits information and expertise from also.
other professionals and translates it into a c) Both (a) & (b) are true.
set of rules or frames for an expert
d) Neither (a) nor (b) is true.
system?
Answer: c
1. Knowledge translator
168. The basic object of the Right to
2. Knowledge analyst
Information Act 2005 is:
3. Knowledge engineer
a) To empower the citizens,
4. Expert analyst
b) Promote transparency and
5. Systems analyst accountability in the working of the
Answer: Knowledge engineer Government
165. Which of the following refers to rule- c) Contain corruption,
based AI tolerates imprecision by using d) All the above
non-specific terms called membership
Answer: d
functions to solve problems?
169. Which of the following is not correct?
1. Genetic algorithms
a) The CPIO cannot seek the assistance of
2. Fuzzy logic
any other officer for proper discharge of
3. Hybrid system his or her duties
4. Expert system b) The CPIO may seek the assistance of any
5. Neural network other officer for proper discharge of his or
6. Virtual reality system her duties
Answer: Fuzzy logic c) Every CPIO shall deal with requests from
persons seeking such information and
166. The set of processes developed in an
render reasonable assistance to the
organization to create, gather, store,
persons seeking such information
transfer, and apply knowledge, best
describes: d) CPIO should provide information if not
exempted within 30 days
1. organizational learnings
Answer: a
2. knowledge management
170. 'Herald of Library Science' is
3. organizational memory
published since __.
4. knowledge assets
1. 1958
5. business process engineering
2. 1956
Answer: knowledge management
3. 1962
167. With reference to the RTI Act, which
4. 1964
of the following statement/s is/ are true?
Answer: 1962
a) A third party is a person other than the
citizen making a request
171. Annals of Library and Information 176. When entities are books or other
Studies (ALIS) is published since __. items of information, their classification is
1. 1952 known as —
2. 1954 A. Book
3. 1956 B. Library
4. 1958 C. Depth
Answer: 1954 D. Broad
172. 'Yojana' journal started publishing in Answer: B
the year __. 177. The subject that has a basic facet &
1. 1954 one or more isolate facets —
2. 1955 A. Complex
3. 1957 B. Compound
4. 1959 C. Basic
Answer: 1957 D. Specific
173. 'Indian Science Abstracts' is published Answer: A
since __. 178. Which sequence means placing
1. 1965 together closely related classes?
2. 1964 A. Parallel
3. 1959 B. Alphabetical
4. 1969 C. Filiatory
Answer: 1965 D. Helpful
174. Which of the following are NOT Answer: C
ranking parameters used in NIRF? 179. A sequence of Coordinate Classes
1. Research and Professional Practices arranged in some definite order is called
2. Outreach and Inclusivity A. an arrary
3. Social and Cultural Activities B. a chain
4. Perception C. a category
Answer: Social and Cultural Activities D. a facet
175. First NIRF Ranking was released on Answer: D
__. 180. classification are contemptuously
1. 4th April 2016 described as mark & park systems.
2. 29th September 2015 A. Facet
3. 29th September 2016 B. Enumerative
4. 4th April 2015 C. Freely faceted
Answer: 4th April 2016 D: Rigidly faceted
254. Which law states that “An 258. The Dewey Decimal Classification
information retrieval system will tend not divides human knowledge into
to be used whenever it is more painful and (A) 10 basic categories.
troublesome for a customer to have
(B) 100 basic categories.
information than for him not to have it” ?
(C) 1000 basic categories.
(A) Bradford’s Law
(D) 10000 basic categories.
(B) Mooer’s Law
Answer: (A)
(C) Ziff’s Law
259. Call Number of a Book Means
(D) Lotka’s Law
(A) Book Number
Answer - (B)
(B) Class Number
255. Who is the compiler of Web-
Bibliography of Rabindranath Tagore? (C) Both (A) and (B) are true
(A) Bengal Library Association (D) None of the above
(B) RRRLF Answer: (C)
(C) National Library of India 260. Accession Number means
(D) IASLIC (A) Call Number of a book
Answer - (B) (B) Unique Number for a book inside a
particular library.
256. Who are the publishers of ‘Year Book
on Human Rights’? (C) Book Number
(A) United Nations (D) Class number
(B) Ministry of Law, Govt. of India Answer: (B)
(C) Europa Publishers 261. How many digits have in the ISSN
(D) R.R. Bowker (A) 10
Answer - (A) (B) 8
257. ASTINFO stands for (C) 13
(A) Asian Scientific and Technological (D) 15
Information Network Answer: (B)
(B) Association of Scientific and 262. Main use of Shelf list is
Technological Information Scientists in (A) Cataloging
Asia
(B) Circulation
(C) International Network for Exchange of
(C) Stock Verification
Science and Technology Information
(D) Book Selection
(D) Regional Network for the Exchange of
Information and Experience in Science and Answer: (C)
Technology in Asia and the Pacific 263. Posting the right person at the right
Answer - (D) place is called ________
(D) Descriptive and Statistical 278. What are the standard size of the
Answer: (D) Accession Register is
273. How many columns are there in the (A) 16” * 12”
accession register? (B) 16” * 13”
(A) 10 (C) 16” * 11”
(B) 12 (D) 16” * 18”
(C) 14 Answer: (B)
(D) 16 279. A good library building is an outcome
Answer: (C) of librarian and.
274. PPBS relates to (A) Registrar
(A) Book selection (B) Building Corporation
(B) Journal selection (C) Finance Officer
(C) Budgeting (D) Architect
(D) Library records Answer: (D)
Answer: (C) 280. ________ are the storage areas for
the various types of documents kept in a
275. Zero based budget is concerned with
library.
(A) Present
(A) Tasks .
(B) Past
(B). Racks
(C) Future
(C) Stacks
(D) Remote future
(D) Desks
Answer: (C)
Answer: (C)
276. Another term of PERT is
281. Study carrels are exclusive areas
(A) CPM meant for
(B) POSDCORB (A) Students
(C) MBO (B) Public
(D) HRM (C) Women
Answer: (A) (D) Researchers
277. POSDCORB is related to Answer: (D)
(A) Library cataloguing 282. Library catalogue cards are filed in
(B) Library reference service specially designed drawers called
(C) Library administration (A) Charging tray
(D) Library automation (B) Catalogue cabinet
Answer: (C) (C) Display rack .
(D) Filling equipment