1.
Identify the author of “Essays of an Information Scientist” from among the
following.
(1)
F.W. Lancaster
(2)
Derek J. de Solla Price
(3)
Eugene Garfield
(4)
B.C. Vickery
Answer: (3)
2.
Who has coined the term “Information Society” from the following?
(1)
B.C. Brookes
(2)
Fritz Machlup
(3)
B.C. Vickery
(4)
N.J. Belkin
Answer: (2)
3.
Dance’s Helical Spiral Communication model is a-
(1)
Classical
(2)
Linear
(3)
Non-Linear
(4)
Multi-dimensional
Answer: (3)
4.
What was the theme of IFLA World Library and Information Congress 2017?
(1)
Connections. Collaboration. Community
(2)
Dynamic Libraries: Access, Development and Transformation
(3)
Libraries, Citizens, Societies: Confluence of knowledge
(4)
Libraries. Solidarity. Society
Answer: (4)
5.
Which of the following is a collaborative network of Reference Librarians?
(1)
World Cat
(2)
eSS
(3)
Question Point
(4)
Google Scholar
Answer: (3)
6.
Resource Description and Access (RDA) is divided into how many sections?
(1)
9
(2)
10
(3)
11
(4)
12
Answer: (2)
7.
p, q, r in the schema of operators in PRECIS belongs to:
(1)
Core elements
(2)
Extra-core concepts
(3)
Dependent elements
(4)
Special classes of action
Answer: (3)
8.
According to APA Style Manual, a section at the end of a paper that includes
information that is too detailed for the text of the paper itself and would
“burden the reader” or be “distracting” or “in appropriate” is called:
(1)
Appendix
(2)
Bibliography
(3)
References
(4)
Tables
Answer: (1)
9.
Who coined the word “Management theory jungle”?
(1)
Henry Fayol
(2)
F.W. Taylorwww.netugc.com
(3)
Heinz Weihrich
(4)
Harold Koontz
Answer: (4)
10.
Which of the following case require the application of new ISSN?
(1)
Change of publisher
(2)
Change in publication medium and title
(3)
Change in location of publication
(4)
Change in editorial policy
Answer: (2)
11.
Which of the following organizations have introduced “Dig by” – a new mobile
application available as a part of “Worldshare Management Service”?
(1)
Library of Congress
(2)
NISCAIR
(3)
OCLC
(4)
UTLAS
Answer: (3)
12.
Percentage (%) sign is used in an URL to represent:
(1)
Space
(2)
Date
(3)
Time
(4)
Person
Answer: (1)
13.
FRBRoo version 2 is based on:
(1)
FRBR model alone
(2)
FRAD model alone
(3)
FRBR and FRAD models only
(4)
FRBR, FRAD and FRSAD models
Answer: (4)
14.
Which one of the following is not Image format?
(1)
TIFF
(2)
MPEG
(3)
JPEG
(4)
GIF
Answer: (2)
15.
Which of the following does not come under the domain of Descriptive
bibliometrics (Descriptive Studies)?
(1)
Geographical Distribution of Documents
(2)
Nature of Information Conveyed
(3)
Subject Distribution
(4)
Medium of Communication
Answer: (2)
16.
“Half-life” in the context of literary growth is used to indicate:
(1)
Rate of obsolescence
(2)
Rate of growth
(3)
Degree of scatter
(4)
Information explosion
Answer: (1)
17.
Which sampling method is not suitable, if unit members are homogenous?
(1)
Simple random
(2)
Cluster
(3)
Stratified
(4)
Systematic
Answer: (2)
18.
Hermeneutics, principle is primarily related with:
(1)
Interpretation of texts
(2)
Interrelation between data and knowledge
(3)
Human experience
(4)
Human behavious
Answer: (1)
19.
How may Working Groups are constituted under National Mission on Libraries,
India?
(1)
Two
(2)
Three
(3)
Four
(4)
Five
Answer: (3)
20.
Who is responsible for development and maintenance of UGC official website?
(1)
MHRD
(2)
DoE
(3)
NIC
(4)
INFLIBNET
Answer: (4)
21.
Which of the following are the necessary elements of an information society?
(a)
Confidentiality
(b)
Vulnerability
(c)
Integrity
(d)
Availability
Code:
(1)
(b), (c) and (d) are correct
(2)
(a), (b) and (c) are correct
(3)
(a), (c) and (d) are correct
(4)
(a), (b) and (d) are correct
Answer: (3)
22.
Which of the following components are essential for National Information
Policy?
(a)
Legislation framework
(b)
E-Journal consortium
(c)
Digital repositories
(d)
National bibliography
Code:
(1)
(a) and (b) are correct
(2)
(a) and (d) are correct
(3)
(b) and (c) are correct
(4)
(b) and (d) are correct
Answer: (2)
23.
SWAYAM, the free online education was developed by:
(a)
IIT, Madras
(b)
AICTE
(c)
IIM, Ahmedabad
(d)
MHRD, Govt. of India
Code:
(1)
(b) and (d) are correct
(2)
(c) and (d) are correct
(3)
(a) and (b) are correct
(4)
(a) and (d) are correct
Answer: (1)
24.
Which of the following are the activities of National Mission on Libraries?
(a)
CIP Project
(b)
Capacity Building
(c)
Library Assistance Programme
(d)
Setting up of Model Libraries
Code:
(1)
(a) and (d) are correct
(2)
(b) and (d) are correct
(3)
(b) and (c) are correct
(4)
(c) and (d) are correct
Answer: (2)
25.
Which of the following indicate the purpose of reference list in a thesis /
dissertation?
(a)
Allows author to credit the work of others that directly influenced the present
work.
(b)
Gives interested readers the information necessary to identify and retrieve the
sources.
(c)
An expansive list that covers works that are consulted.
(d)
Recommends to the interested readers the works that are not cited in the text.
Code:
(1)
(a) and (b) are correct
(2)
(b) and (c) are correct
(3)
(c) and (d) are correct
(4)
(b) and (d) are correct
Answer: (1)
26.
Which of the following are the products of Chemical Abstract services?
(a)
Sci Finder
(b)
Sci Val
(c)
Methods Now
(d)
Analytical Services
Code:
(1)
(a) and (c) are correct
(2)
(b) and (d) are correct
(3)
(a), (b) and (c) are correct
(4)
(b), (c) and (d) are correct
Answer: (1)
27.
Which of the following roles does a library have in the information transfer
cycle?
(a)
Information organization and control
(b)
Primary distribution
(c)
Secondary Publication
(d)
Secondary distribution
Code:
(1)
(b) and (d) are correct
(2)
(b) and (c) are correct
(3)
(a) and (d) are correct
(4)
(a) and (b) are correct
Answer: (3)
28.
Who among the following are associated with established theories of reference
service?
(a)
C.M. Winchell
(b)
James I Wyer
(c)
Daniel Brophy
(d)
Samuel Rothstein
Code:
(1)
(a) and (b) are correct
(2)
(b) and (d) are correct
(3)
(c) and (d) are correct
(4)
(a) and (c) are correct
Answer: (2)
29.
Which of the following are related to ‘Sugamya Pustakalaya’?
(a)
An online platform that makes accessible the content available to ‘print
disabled people’.
(b)
Created by Department of Empowerment of persons with disabilities (Divyangjan),
Ministry of Social Justice and Empowerment, GOI.
(c)
Powered by TCS Access.
(d)
Maintained by National Association for the Blind (India).
Code:
(1)
(a), (b) and (d) are correct
(2)
(a), (b) and (c) are correct
(3)
(b), (c) and (d) are correct
(4)
(a), (c) and (d) are correct
Answer: (2)
30.
‘Entropy’ in the context of ‘Information Science’ is:
(a)
Measure which cannot be normalised by dividing it by information length.
(b)
Measure of unpredictability of the state or equivalently, of its average
information content.
(c)
Average amount of information produced by a probabilistics stochastic source of
data.
(d)
Way to measure diversity.
Code:
(1)
(a), (b) and (d) are correct
(2)
(a), (b) and (c) are correct
(3)
(a), (c) and (d) are correct
(4)
(b), (c) and (d) are correct
Answer: (4)
31.
Controlled vocabularies fall broadly into following categories:
(a)
Subject Heading Lists
(b)
Thesauri
(c)
Folksonomies
(d)
Ontologies
Code:
(1)
(a) and (c) are correct
(2)
(b), (c) and (d) are correct
(3)
(a), (b) and (d) are correct
(4)
(c) and (d) are correct
Answer: (3)
32.
Which of the following are the components of a barcode symbol?
(a)
Antenna
(b)
Quiet zone
(c)
Transponder
(d)
Start character
Code:
(1)
(a) and (c) are correct
(2)
(b) and (c) are correct
(3)
(b) and (d) are correct
(4)
(a) and (d) are correct
Answer: (3)
33.
‘Embargo’ in the context of ‘Book Trade’ is:
(a)
A limitation on access, to older resources by the publishers.
(b)
Perpetual ban on the access of the given resources of a publisher.
(c)
A limitation on access to resources placed by publishers.
(d)
A limitation on access to the resources usually to prevent the cancellation of
individual
subscription.
Code:
(1)
(c) and (d) are correct
(2)
(a) and (b) are correct
(3)
(a) and (c) are correct
(4)
(a), (c) and (d) are correct
Answer: (1)
34.
Which of the following are Research Information Management System?
(a)
Pure
(b)
Quetext
(c)
Converis
(d)
VIVO
Code:
(1)
(a), (b) and (d) are correct
(2)
(a), (b) and (c) are correctwww.netugc.com
(3)
(a), (c) and (d) are correct
(4)
(b), (c) and (d) are correct
Answer: (3)
35.
Which of the following are the open access initiatives of INFLIBNET?
(a)
Shodhganga
(b)
e-Shodh Sindhu
(c)
Infoport
(d)
IndCat
Code:
(1)
(a) and (b) are correct
(2)
(b) and (c) are correct
(3)
(c) and (d) are correct
(4)
(a) and (c) are correct
Answer: (4)
36.
Which of the following are embedded processors?
(a)
Micro Controller
(b)
Digital Signal Processor
(c)
Cor 2 extreme
(d)
Intel Xeon
Code:
(1)
(a), (b) and (d) are correct
(2)
(b), (c) and (d) are correct
(3)
(a), (b) and (c) are correct
(4)
(a), (c) and (d) are correct
Answer: (1)
37.
Jubilee (JISC User Behaviour in Information Seeking: Longitudinal Evaluation of
Electronic Information Services ) seeks to :
(a)
Predict, monitor and characterise ISB in relation to EIS (Electronic
Information Services).
(b)
Provide illuminative and contextual pictures built up overtime to users and
non-users.
(c)
Evaluate materials of rarity in nature.
(d)
Adjudge the quality of hard copies of e-reference tools served to readers in a
given library over a period of time.
Code:
(1)
(c) and (d) are correct
(2)
(a) and (b) are correct
(3)
(b) and (c) are correct
(4)
(a) and (d) are correct
Answer: (2)
38.
Arrange the following state Public Library Acts according to their year of
enactment:
(a)
Chhattisgarh Public Libraries Act
(b)
Haryana Public Libraries Act
(c)
Orissa Public Libraries Act
(d)
Lakshadweep Public Libraries Act
Code:
(1)
(b), (c), (d), (a)
(2)
(d), (b), (c), (a)
(3)
(c), (b), (d), (a)
(4)
(a), (b), (c), (d)
Answer: (1)
39.
Arrange in sequence the following public libraries according to their year of
origin.
(a)
Connemara Public Library
(b)
Delhi Public Library
(c)
Calcutta Public Library
(d)
Baroda Central Library
Code:
(1)
(c), (a), (d), (b)
(2)
(c), (d), (b), (a)
(3)
(a), (b), (d), (c)
(4)
(a), (d), (b), (c)
Answer: (1)
40.
Arrange the following laws / principles from lower to higher level as propounded
by
S.R.
Ranganathan.
(a)
Fundamental Laws
(b)
Canons
(c)
Principles
(d)
Basic Laws
Code:
(1)
(c), (b), (a), (d)
(2)
(a), (b), (c), (d)
(3)
(b), (d), (a), (c)
(4)
(d), (c), (b), (a)
Answer: (1)
41.
Arrange year-wise development of the following indexing systems:
(a)
Relational Indexing by J.E.L. Farradane
(b)
Chain Indexing by S.R. Ranganathan
(c)
Subject Indexing by J.E. Coates
(d)
PRECIS by Derek Austin
Code:
(1)
(b), (a), (c), (d)
(2)
(a), (b), (c), (d)
(3)
(c), (d), (b), (a)
(4)
(d), (c), (a), (b)
Answer: (1)
42.
Arrange, from among the following, the areas of access-points in their proper
sequence as given in ISBD.
(a)
Notes
(b)
Series
(c)
Edition
(d)
Material Specific details
Code:
(1)
(a), (b), (c), (d)
(2)
(c), (d), (b), (a)
(3)
(b), (c), (d), (a)
(4)
(d), (c), (b), (a)
Answer: (2)
43.
Arrange the following connecting symbols of CC- 6th ed. according to their
increasing ordinal value:
(a)
) (arrester)
(b)
← (backward arrow)
(c)
→ (forward arrow)
(d)
0 (zero)
Code:
(1)
(b), (c), (d), (a)
(2)
(a), (b), (c), (d)
(3)
(c), (d), (b), (a)
(4)
(d), (a), (c), (b)
Answer: (2)
44.
Identify the correct sequence of indicator digits of Intra Facet Phase Relation
as used in
CC
(6th edition).
(1)
j k m n r
(2)
j k m r o
(3)
i j k m n
(4)
j k m n q
Answer: (1)
45.
Arrange in sequence the following subject classes according to their occurance
in the schedules of DDC, 21st Ed.www.netugc.com
(a)
Food Technology
(b)
Public Finance
(c)
General Encyclopaedias
(d)
Bibliographies
Code:
(1)
(d), (b), (c), (a)
(2)
(d), (c), (b), (a)
(3)
(c), (b), (a), (d)
(4)
(c), (a), (b), (d)
Answer: (2)
46.
Arrange in sequence the Maslow’s hierarchy of needs:
(a)
Social
(b)
Esteem
(c)
Physiological
(d)
Safety
Code:
(1)
(c), (d), (a), (b)
(2)
(d), (b), (a), (c)
(3)
(d), (a), (c), (b)
(4)
(c), (a), (b), (d)
Answer: (1)
47.
Arrange in sequence the following document titles alphabetically word by word :
(a)
Bookfinder
(b)
Bookkeeping made simple
(c)
Book bytes
(d)
Books that changed the world
Code:
(1)
(a), (b), (c), (d)
(2)
(b), (c), (d), (a)
(3)
(c), (a), (b), (d)
(4)
(c), (d), (a), (b)
Answer: (3)
48.
Arrange the steps of the 8W’S Literacy Model in correct order as given by Annette
Lamb:
(a)
Webbing
(b)
Wishing
(c)
Wondering
(d)
Weaving
Code:
(1)
(c), (a), (b) and (d)
(2)
(b), (a), (c) and (d)
(3)
(c), (a), (d) and (b)
(4)
(c), (b), (a) and (d)
Answer: (3)
49.
Match the following sources with their corresponding functions:
List – I
|
List - II
|
(a) Counter
|
(i) Tracking e-resources usage statistics
|
(b) Affinity string
|
(ii) Impact factor
|
(c) Link resolver
|
(iii) Tracking online usage by user categories
|
(d) Journal of citation report
|
(iv) Number of times users’ connectivity to a
resource
|
Code:
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (ii) (iv) (iii) (i)
(3) (i) (iii) (iv) (ii)
(4) (iv) (ii) (i) (iii)
Answer: (3)
50.
Match the following consortiums with their corresponding locations:
List – I
|
List - II
|
(a) UGC-DAE Consortium
|
(i) Manesar (Gurgaon)
|
(b) ERMED-India Consortium
|
(ii) Gandhinagar, (Ahmedabad)
|
(c) DeLCON-DBT’s E-Library Consortium
|
(iii) Indore
|
(d) e-Shodh Sindhu
|
(iv) New Delhi
|
Code:
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iv) (iii) (ii) (i)
(3) (i) (ii) (iii) (iv)
(4) (ii) (i) (iv) (iii)
Answer: (1)
51.
Match the following leading Abstracting and Indexing tools/Databases with their
corresponding Publishers/Content Providers:
List
– I List - II
(a)
LISA (i) NISCAIR
(b)
ILSA (ii) EBSCO
(c)
LISTA (iii) IASLIC
(d)
Indian Science Abstracts (iv) ProQuest
Code:
(a) (b) (c) (d)
(1) (iv) (iii) (ii) (i)
(2) (i) (ii) (iii) (iv)
(3) (ii) (iv) (i) (iii)
(4) (iii) (i) (iv) (ii)
Answer: (1)
52.
Match the following threats to ‘information society’ with the corresponding
concept:
List – I
|
List - II
|
(a) Compromises intellectual Property
|
(i) Confiscation of equipment or information
|
(b) Deliberate acts of theft
|
(ii) Unauthorized access to data
|
(c) Deliberate acts of information extortion
|
(iii) Piracy
|
(d) Deliberate acts of espionage or trespass
|
(iv) Blackmail of information disclosure.
|
Code:
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iv) (ii) (iii) (i)
(3) (i) (ii) (iii) (iv)
(4) (iii) (i) (iv) (ii)
Answer: (4)
53.
Match the following:
List – I
|
List - II
|
(a) Political Map
|
(i) Features of land
|
(b) Route Map
|
(ii) Roads and bridges, etc.
|
(c) Physical Map
|
(iii) Limiting territorial boundaries
|
(d) Thematic Map
|
(iv) Mining, agriculture, etc.
|
Code:
(a) (b) (c) (d)
(1) (iv) (i) (ii) (iii)
(2) (i) (ii) (iii) (iv)
(3) (iii) (ii) (i) (iv)
(4) (ii) (iii) (i) (iv)
Answer: (3)
54.
The MARC Field 264 has different second indicator values to indicate separate
data elements in RDA. Match these second indicator values with the respective
data elements:
List – I
|
List - II
|
(a) −0
|
(i) Distribution statement
|
(b) −1
|
(ii) Publication statement
|
(c) −2
|
(iii) Manufacture statement
|
(d) −3
|
(iv) Production statement
|
Code:
(a) (b) (c) (d)
(1) (iv) (ii) (i) (iii)
(2) (iii) (ii) (iv) (i)
(3) (ii) (iv) (iii) (i)
(4) (i) (ii) (iii) (iv)
Answer: (1)
55.
Match the following mechanisms of information processing with corresponding
service as given by S. Seetharama:
List – I
|
List - IIwww.netugc.com
|
(a) Announcement
|
(i) Translation Service
|
(b) Evaluation
|
(ii) Current Awareness Service
|
(c) Document access
|
(iii) Indexing Service
|
(d) Accretion
|
(iv) State-of-the-art report
|
Code:
(a) (b) (c) (d)
(1) (iii) (ii) (iv) (i)
(2) (ii) (iv) (i) (iii)
(3) (i) (iii) (ii) (iv)
(4) (iv) (i) (iii) (ii)
Answer: (2)
56.
Match the following queries with corresponding type of reference service:
List – I
|
List - II
|
(a) Communication with Library Staff through VoIP
|
(i) Asynchronous reference service
|
(b) Reference query through e-mail
|
(ii) Online reference service
|
(c) Use of e-resources seeking answers
|
(iii) Virtual Reference Desk
|
(d) Webforms
|
(iv) Reference interview
|
Code:
(a) (b) (c) (d)
(1) (iv) (iii) (i) (ii)
(2) (i) (ii) (iv) (iii)
(3) (iii) (i) (ii) (iv)
(4) (ii) (iv) (iii) (i)
Answer: (3)
57.
Match the following with corresponding explanation:
List – I
|
List - II
|
(a) Embargo
|
(i) Publisher’s list of new titles
|
(b) Big Deal
|
(ii) Authorization for regular shipment of new
editions of specific products
|
(c) Front List
|
(iii) Publisher’s restriction one-resource access
|
(d) Standing order
|
(iv) large bundled e-journal package of single
publisher on discounted price
|
Code:
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (i) (iv) (iii) (ii)
(3) (iv) (ii) (i) (iii)
(4) (ii) (iii) (i) (iv)
Answer: (1)
58.
Match the following NISO (National Information Standard Organisation) standards
with their corresponding descriptions applicable to Libraries:
List – I
|
List - II
|
(a) Z 39.41
|
(i) Dublin core Metadata Element set
|
(b) Z 39.63
|
(ii) Syntax for Digital Object Identifier (DOI)
|
(c) Z 39.84
|
(iii) Inter library loan data elements
|
(d) Z 39.85
|
(iv) Printed information on spines
|
Code:
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (iii) (ii) (iv) (i)
(3) (iv) (iii) (ii) (i)
(4) (ii) (i) (iii) (iv)
Answer: (3)
59.
Match the following:
List – I
|
List - II
|
(a) Counter
|
(i) Article metric
|
(b) PLoS ALMs
|
(ii) Author metric
|
(c) ORC ID
|
(iii) All metric
|
(d) Social Media citations
|
(iv) Journal metric
|
Code:
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iv) (i) (ii) (iii)
(3) (ii) (iv) (iii) (i)
(4) (i) (iv) (ii) (iii)
Answer: (2)
60.
Match the following Office Products with their corresponding
Producers/Organisations:
List – I
|
List - II
|
(a) Open Office
|
(i) IBM
|
(b) MS-Office
|
(ii) Apache Foundation
|
(c) Lotus Note
|
(iii) Apple
|
(d) iWork
|
(iv) Microsoft Corporation
|
Code:
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (ii) (iv) (i) (iii)
(3) (i) (iv) (iii) (ii)
(4) (iv) (ii) (i) (iii)
Answer: (2)
61.
Match the following statements with corresponding research process:www.netugc.com
List – I
|
List - II
|
(a) What is the role of MOOCs in imparting LIS
education?
|
(i) Hypothesis
|
(b) EDUCAUSE (2013) “Selective institutions can be
democratized via MOOCs”.
|
(ii) Analytical statement
|
(c) MOOCs programmes will replace distance Learning
in LIS
|
(iii) Formulation of the problem
|
(d) Though MOOCs is advantageous, majority
respondents preferred distance learning
|
(iv) Literature study
|
Code:
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (ii) (iii) (iv) (i)
(3) (iv) (ii) (iii) (i)
(4) (i) (ii) (iv) (iii)
Answer: (1)
62.
Match the following Online Survey Development Cloud based Software
Applications/tools with their corresponding founders:
List – I
|
List - II
|
(a) Survey Monkey
|
(i) Christian Vanek and Scott Mc Daniel- (Colorado,
USA)
|
(b) Type Form
|
(ii) Gordon Tan-Brisbane (Austria)
|
(c) Client Heartbeat
|
(iii) Robert Munoz and David Okuniev-Barcelona
(Spain)
|
(d) Survey Gizmo
|
(iv) Ryan Finley- Sanmateo, California (USA)
|
Code:
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (iv) (iii) (ii) (i)
(3) (ii) (iv) (i) (iii)
(4) (iii) (i) (iv) (ii)
Answer: (2)
63.
Match the following with their corresponding year of launching:
List – I
|
List - II
|
(a) National Mission on Manuscripts
|
(i) 2003
|
(b) National Mission on Libraries
|
(ii) 2007
|
(c) National Mission on Monuments and Antiquities
|
(iii) 2012
|
(d) National
Knowledge Network
|
(iv) 2010
|
Code:
(a) (b) (c) (d)
(1) (i) (iii) (ii) (iv)
(2) (iv) (iii) (ii) (i)
(3) (iii) (ii) (i) (iv)
(4) (ii) (iv) (iii) (i)
Answer: (1)
64.
Assertion (A): The copyright system,
born and bred for print technology, faces a technological revolution in its
environment.
Reason (R): The old print
technology’s broadcast model of one to many communication is replaced with many
to many global connectivity.
Code:
(1)
(A) is true, but (R) is false.
(2)
(A) is false, but (R) is true.
(3)
Both (A) and (R) are true.
(4)
Both (A) and (R) are false.
Answer: (3)
65.
Assertion (A): Avoidance of
difficult reference questions are usually an outcome of momentary panic in the
face of a seemingly impenetrable question.
Reason (R): Reference never
adhere to few helpful tips such as developing handy-referral systems, both with
in and outside the reference area, and fail to establish a context for the
questions to counter such panic attack.
Code:
(1)
(A) is true, but (R) is false.
(2)
(A) is false, but (R) is true.
(3)
Both (A) and (R) are false.
(4)
Both (A) and (R) are true.
Answer: (1)
66.
Assertion (A): In collection
development, pamphlets do not require frequent review like books and journals.
Reason (R): Pamphlet’s
information value is likely to be short lived, their physical format is usually
flimsy and subject to rapid deterioration.
Code:
(1)
(A) is true, but (R) is false.
(2)
(A) is false, but (R) is true.
(3)
Both (A) and (R) are true.
(4)
Both (A) and (R) are false
Answer: (2)
67.
Assertion (A): The content-based
indexing techniques enable identification of wanted persons in photographs of
crowds.
Reason (R): The
content-based indexing system uses all sorts of characteristics of the image to
guess what it is about.
Code:
(1)
(A) is true but (R) is false.
(2)
(A) is false but (R) are true.
(3)
Both (A) and (R) are false.
(4)
Both (A) and (R) are true.
Answer: (4)
68.
Assertion (A): In Gold Open Access,
costs are not transferred to authors.
Reason (R): Gold Open
Access journals publish peer-reviewed articles without paid subscription
barriers for their readers.
Code:
(1)
(A) is true, but (R) is false.
(2)
(A) is false, but (R) is true.
(3)
Both (A) and (R) are true.
(4)
Both (A) and (R) are false.
Answer: (2)
69.
Assertion (A): In recent years, QR
codes have become ubiquitous and may replace the use of bar codes.
Reason (R): QR is a two -
dimensional code with large capacity for storage. These codes hold information
both horizontally and vertically and can be scanned by users with their smart
phones at ease.
Code:
(1)
(A) is true, but (R) is false.
(2)
(A) is false, but (R) is true.
(3)
Both (A) and (R) are true.
(4)
Both (A) and (R) are false
Answer: (2)
70.
Assertion (A): Librarians usually
prefer to provide access to e-content for the users via a proxy server,
allowing authorized library users to access content from outside the physical
confines of a library.
Reason (R): Proxy-server
access is possible without IP-address recognition.
Code:
(1)
Both (A) and (R) are true.
(2)
Both (A) and (R) are false.
(3)
(A) is true, but (R) is false.
(4)
(A) is false, but (R) is true.
Answer: (3)
71.
Assertion (A): ‘Web Assembly’, a
standard that enables applications to run securely in browsers (without the use
of Plug-ins) is a people-friendly application in using Web.
Reason (R): A web language
transforms the way people use their devices and the web making applications are
more accessible to people at ease all over the globe.
Code:
(1)
(A) is true, but (R) is false.
(2)
Both (A) and (R) are true.
(3)
(A) is false, but (R) is true.
(4)
Both (A) and (R) are false.
Answer: (2)
72.
Assertion (A): Grounded Theory
methods in Qualitative research start from same set of assumptions as
traditional Quantitative research design.
Reason (R): The inductive
nature of these Grounded Theory methods allows the key issues emerge rather
than force them into pre conceived categories.
Code:
(1)
(A) is true, but (R) is false.
(2)
Both (A) and (R) are true.
(3)
Both (A) and (R) are false.
(4)
(A) is false, but (R) is true
Answer: (4)
73.
Assertion (A): The fundamental need
of a hypothesis is to guide sound research.
Reason (R): Without
hypothesis, research is focused and do not become a random empirical wandering.
Code:
(1)
(A) is true, but (R) is false.
(2)
(A) is false, but (R) is true.www.netugc.com
(3)
Both (A) and (R) are true.
(4)
Both (A) and (R) are false.
Answer: (1)
74.
Assertion (A): Traditional Knowledge
Resource Classification (TKRC) is an innovative structured classification
system useful for the systematic arrangement, dissemination and retrieval of
all subjects.
Reason (R): It is
structured, based on International Patent Classification.
Code:
(1)
(A) is true, but (R) is false.
(2)
Both (A) and (R) are true.
(3)
(A) is false, but (R) is true.
(4)
Both (A) and (R) are false.
Answer: (3)
75.
Identify the resource sharing and document delivery principles as given by
IFLA.
(a)
Each country should accept responsibility for providing access to its own
publications to any other country.
(b)
Supplying libraries should accept requests submitted in hardcopy only.
(c)
From the moment a library dispatches an item to a requesting library until it
returns the supplying library is responsible for any loss or damage incurred.
(d)
Each country should aim to develop an efficient national resource sharing
system.
Code:
(1)
(a) and (b) are correct.
(2)
(b) and (c) are correct.
(3)
(a) and (d) are correct.
(4)
(b) and (d) are correct.
Answer: (3)