November, 2017

 

UGC NET - Question Paper-III with answer   

 

Library & Information Science 

1. Identify the author of “Essays of an Information Scientist” from among the following.

(1) F.W. Lancaster

(2) Derek J. de Solla Price

(3) Eugene Garfield

(4) B.C. Vickery

Answer- (3)

2. Who has coined the term “Information Society” from the following?

(1) B.C. Brookes

(2) Fritz Machlup

(3) B.C. Vickery

(4) N.J. Belkin

Answer- (2)

3. Dance’s Helical Spiral Communication model is a

(1) Classical

(2) Linear

(3) Non-Linear

(4) Multi-dimensional

Answer- (3)

4. What was the theme of IFLA World Library and Information Congress 2017

(1) Connections. Collaboration. Community

(2) Dynamic Libraries- Access, Development and Transformation

(3) Libraries, Citizens, Societies- Confluence of knowledge

(4) Libraries. Solidarity. Society

Answer- (4)

5. Which of the following is a collaborative network of Reference Librarians

(1) World Cat

(2) eSS

(3) Question Point

(4) Google Scholar

Answer- (3)

6. Resource Description and Access (RDA) is divided into how many sections

(1) 9

(2) 10

(3) 11

(4) 12

Answer- (2)

7. p, q, r in the schema of operators in PRECIS belongs to

(1) Core elements

(2) Extra-core concepts

(3) Dependent elements

(4) Special classes of action

Answer- (3)

8. According to APA Style Manual, a section at the end of a paper that includes information that is too detailed for the text of the paper itself and would “burden the reader” or be “distracting” or “in appropriate” is called

(1) Appendix

(2) Bibliography

(3) References

(4) Tables

Answer- (1)

9. Who coined the word “Management theory jungle”

(1) Henry Fayol

(2) F.W. Taylor

(3) Heinz Weihrich

(4) Harold Koontz

Answer- (4)

10. Which of the following case require the application of new ISSN

(1) Change of publisher

(2) Change in publication medium and title

(3) Change in location of publication

(4) Change in editorial policy

Answer- (2)

11. Which of the following organizations have introduced “Dig by” – a new mobile application available as a part of “Worldshare Management Service”

(1) Library of Congress

(2) NISCAIR

(3) OCLC

(4) UTLAS

Answer- (3)

12. Percentage (%) sign is used in an URL to represent

(1) Space

(2) Date

(3) Time

(4) Person

Answer- (1)

13. FRBRoo version 2 is based on

(1) FRBR model alone

(2) FRAD model alone

(3) FRBR and FRAD models only

(4) FRBR, FRAD and FRSAD models

Answer- (4)

14. Which one of the following is not Image format?

(1) TIFF

(2) MPEG

(3) JPEG

(4) GIF

Answer- (2)

15. Which of the following does not come under the domain of Descriptive bibliometrics (Descriptive Studies)?

(1) Geographical Distribution of Documents

(2) Nature of Information Conveyed

(3) Subject Distribution

(4) Medium of Communication

Answer- (2)

16. “Half-life” in the context of literary growth is used to indicate

(1) Rate of obsolescence

(2) Rate of growth

(3) Degree of scatter

(4) Information explosion

Answer- (1)

17. Which sampling method is not suitable, if unit members are homogenous?

(1) Simple random

(2) Cluster

(3) Stratified

(4) Systematic

Answer- (2)

18. Hermeneutics, principle is primarily related with

(1) Interpretation of texts

(2) Interrelation between data and knowledge

(3) Human experience

(4) Human behavious

Answer- (1)

19. How may Working Groups are constituted under National Mission on Libraries, India

(1) Two

(2) Three

(3) Four

(4) Five

Answer- (3)

20. Who is responsible for development and maintenance of UGC official website

(1) MHRD

(2) DoE

(3) NIC

(4) INFLIBNET

Answer- (4)

 

21. Which of the following are the necessary elements of an information society?

(a) Confidentiality

(b) Vulnerability

(c) Integrity

(d) Availability

Code

(1) (b), (c) and (d) are correct

(2) (a), (b) and (c) are correct

(3) (a), (c) and (d) are correct

(4) (a), (b) and (d) are correct

Answer- (3)

22. Which of the following components are essential for National Information Policy?

(a) Legislation framework

(b) E-Journal consortium

(c) Digital repositories

(d) National bibliography

Code

(1) (a) and (b) are correct

(2) (a) and (d) are correct

(3) (b) and (c) are correct

(4) (b) and (d) are correct

Answer- (2)

 

23. SWAYAM, the free online education was developed by

(a) IIT, Madras

(b) AICTE

(c) IIM, Ahmedabad

(d) MHRD, Govt. of India

Code

(1) (b) and (d) are correct

(2) (c) and (d) are correct

(3) (a) and (b) are correct

(4) (a) and (d) are correct

Answer- (1)

 

24. Which of the following are the activities of National Mission on Libraries

(a) CIP Project

(b) Capacity Building

(c) Library Assistance Programme

(d) Setting up of Model Libraries

Code

(1) (a) and (d) are correct

(2) (b) and (d) are correct

(3) (b) and (c) are correct

(4) (c) and (d) are correct

Answer- (2)

 

25. Which of the following indicate the purpose of reference list in a thesis / dissertation

 

(a) Allows author to credit the work of others that directly influenced the present work.

(b) Gives interested readers the information necessary to identify and retrieve the sources.

(c) An expansive list that covers works that are consulted.

(d) Recommends to the interested readers the works that are not cited in the text.

Code

(1) (a) and (b) are correct

(2) (b) and (c) are correct

(3) (c) and (d) are correct

(4) (b) and (d) are correct

Answer- (1)

 

26. Which of the following are the products of Chemical Abstract services

(a) Sci Finder

(b) Sci Val

(c) Methods Now

(d) Analytical Services

Code

(1) (a) and (c) are correct

(2) (b) and (d) are correct

(3) (a), (b) and (c) are correct

(4) (b), (c) and (d) are correct

Answer- (1)

27. Which of the following roles does a library have in the information transfer cycle

(a) Information organization and control

(b) Primary distribution

(c) Secondary Publication

(d) Secondary distribution

Code

(1) (b) and (d) are correct

(2) (b) and (c) are correct

(3) (a) and (d) are correct

(4) (a) and (b) are correct

Answer- (3)

28. Who among the following are associated with established theories of reference service

(a) C.M. Winchell

(b) James I Wyer

(c) Daniel Brophy

(d) Samuel Rothstein

Code

(1) (a) and (b) are correct

(2) (b) and (d) are correct

(3) (c) and (d) are correct

(4) (a) and (c) are correct

Answer- (2)

29. Which of the following are related to ‘Sugamya Pustakalaya’?

(a) An online platform that makes accessible the content available to ‘print disabled people’.

(b) Created by Department of Empowerment of persons with disabilities (Divyangjan), Ministry of Social Justice and Empowerment, GOI.

(c) Powered by TCS Access.

(d) Maintained by National Association for the Blind (India).

Code

(1) (a), (b) and (d) are correct

(2) (a), (b) and (c) are correct

(3) (b), (c) and (d) are correct

(4) (a), (c) and (d) are correct

Answer- (2)

30. ‘Entropy’ in the context of ‘Information Science’ is

(a) Measure which cannot be normalised by dividing it by information length.

(b) Measure of unpredictability of the state or equivalently, of its average information content.

(c) Average amount of information produced by a probabilistics stochastic source of data.

(d) Way to measure diversity.

Code

(1) (a), (b) and (d) are correct

(2) (a), (b) and (c) are correct

(3) (a), (c) and (d) are correct

(4) (b), (c) and (d) are correct

Answer- (4)

 

31. Controlled vocabularies fall broadly into following categories

(a) Subject Heading Lists

(b) Thesauri

(c) Folksonomies

(d) Ontologies

Code

(1) (a) and (c) are correct

(2) (b), (c) and (d) are correct

(3) (a), (b) and (d) are correct

(4) (c) and (d) are correct

Answer- (3)

 

32. Which of the following are the components of a barcode symbol?

(a) Antenna

(b) Quiet zone

(c) Transponder

(d) Start character

Code

(1) (a) and (c) are correct

(2) (b) and (c) are correct

(3) (b) and (d) are correct

(4) (a) and (d) are correct

Answer- (3)

 

33. ‘Embargo’ in the context of ‘Book Trade’ is

(a) A limitation on access, to older resources by the publishers.

(b) Perpetual ban on the access of the given resources of a publisher.

(c) A limitation on access to resources placed by publishers.

(d) A limitation on access to the resources usually to prevent the cancellation of individual

subscription.

Code

(1) (c) and (d) are correct

(2) (a) and (b) are correct

(3) (a) and (c) are correct

(4) (a), (c) and (d) are correct

Answer- (1)

 

34. Which of the following are Research Information Management System

(a) Pure

(b) Quetext

(c) Converis

(d) VIVO

Code

(1) (a), (b) and (d) are correct

(2) (a), (b) and (c) are correct

(3) (a), (c) and (d) are correct

(4) (b), (c) and (d) are correct

Answer- (3)

 

35. Which of the following are the open access initiatives of INFLIBNET?

(a) Shodhganga

(b) e-Shodh Sindhu

(c) Infoport

(d) IndCat

Code

(1) (a) and (b) are correct

(2) (b) and (c) are correct

(3) (c) and (d) are correct

(4) (a) and (c) are correct

Answer- (4)

 

36. Which of the following are embedded processors?

(a) Micro Controller

(b) Digital Signal Processor

(c) Cor 2 extreme

(d) Intel Xeon

Code

(1) (a), (b) and (d) are correct

(2) (b), (c) and (d) are correct

(3) (a), (b) and (c) are correct

(4) (a), (c) and (d) are correct

Answer- (1)

 

37. Jubilee (JISC User Behaviour in Information Seeking- Longitudinal Evaluation of Electronic Information Services ) seeks to 

(a) Predict, monitor and characterise ISB in relation to EIS (Electronic Information Services).

(b) Provide illuminative and contextual pictures built up overtime to users and non-users.

(c) Evaluate materials of rarity in nature.

(d) Adjudge the quality of hard copies of e-reference tools served to readers in a given library over a period of time.

Code

(1) (c) and (d) are correct

(2) (a) and (b) are correct

(3) (b) and (c) are correct

(4) (a) and (d) are correct

Answer- (2)

 

38. Arrange the following state Public Library Acts according to their year of enactment

(a) Chhattisgarh Public Libraries Act

(b) Haryana Public Libraries Act

(c) Orissa Public Libraries Act

(d) Lakshadweep Public Libraries Act

Code

(1) (b), (c), (d), (a)

(2) (d), (b), (c), (a)

(3) (c), (b), (d), (a)

(4) (a), (b), (c), (d)

Answer- (1)

 

39. Arrange in sequence the following public libraries according to their year of origin

(a) Connemara Public Library

(b) Delhi Public Library

(c) Calcutta Public Library

(d) Baroda Central Library

Code

(1) (c), (a), (d), (b)

(2) (c), (d), (b), (a)

(3) (a), (b), (d), (c)

(4) (a), (d), (b), (c)

Answer- (1)

40. Arrange the following laws / principles from lower to higher level as propounded by

S.R. Ranganathan.

(a) Fundamental Laws

(b) Canons

(c) Principles

(d) Basic Laws

Code

(1) (c), (b), (a), (d)

(2) (a), (b), (c), (d)

(3) (b), (d), (a), (c)

(4) (d), (c), (b), (a)

Answer- (1)

 

41. Arrange year-wise development of the following indexing systems

(a) Relational Indexing by J.E.L. Farradane

(b) Chain Indexing by S.R. Ranganathan

(c) Subject Indexing by J.E. Coates

(d) PRECIS by Derek Austin

Code

(1) (b), (a), (c), (d)

(2) (a), (b), (c), (d)

(3) (c), (d), (b), (a)

(4) (d), (c), (a), (b)

Answer- (1)

42. Arrange, from among the following, the areas of access-points in their proper sequence as given in ISBD

(a) Notes

(b) Series

(c) Edition

(d) Material Specific details

Code

(1) (a), (b), (c), (d)

(2) (c), (d), (b), (a)

(3) (b), (c), (d), (a)

(4) (d), (c), (b), (a)

Answer- (2)

43. Arrange the following connecting symbols of CC- 6th ed. according to their increasing ordinal value

(a) ) (arrester)

(b) ← (backward arrow)

(c) → (forward arrow)

(d) 0 (zero)

Code

(1) (b), (c), (d), (a)

(2) (a), (b), (c), (d)

(3) (c), (d), (b), (a)

(4) (d), (a), (c), (b)

Answer- (2)

44. Identify the correct sequence of indicator digits of Intra Facet Phase Relation as used in

CC (6th edition).

(1) j k m n r

(2) j k m r o

(3) i j k m n

(4) j k m n q

Answer- (1)

45. Arrange in sequence the following subject classes according to their occurance in the schedules of DDC, 21st Ed.

(a) Food Technology

(b) Public Finance

(c) General Encyclopaedias

(d) Bibliographies

Code

(1) (d), (b), (c), (a)

(2) (d), (c), (b), (a)

(3) (c), (b), (a), (d)

(4) (c), (a), (b), (d)

Answer- (2)

46. Arrange in sequence the Maslow’s hierarchy of needs

(a) Social

(b) Esteem

(c) Physiological

(d) Safety

Code

(1) (c), (d), (a), (b)

(2) (d), (b), (a), (c)

(3) (d), (a), (c), (b)

(4) (c), (a), (b), (d)

Answer- (1)

 

47. Arrange in sequence the following document titles alphabetically word by word 

(a) Bookfinder

(b) Bookkeeping made simple

(c) Book bytes

(d) Books that changed the world

Code

(1) (a), (b), (c), (d)

(2) (b), (c), (d), (a)

(3) (c), (a), (b), (d)

(4) (c), (d), (a), (b)

Answer- (3)

48. Arrange the steps of the 8W’S Literacy Model in correct order as given by Annette Lamb

(a) Webbing

(b) Wishing

(c) Wondering

(d) Weaving

Code

(1) (c), (a), (b) and (d)

(2) (b), (a), (c) and (d)

(3) (c), (a), (d) and (b)

(4) (c), (b), (a) and (d)

Answer- (3)

49. Match the following sources with their corresponding functions

List – I

(a) Counter

(b) Affinity string

(c) Link resolver

(d) Journal of citation report

 

List - II

(i) Tracking e-resources usage statistics

(ii) Impact factor

(iii) Tracking online usage by user categories

(iv) Number of times users’ connectivity to a resource

Code

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (ii) (iv) (iii) (i)

(3) (i) (iii) (iv) (ii)

(4) (iv) (ii) (i) (iii)

Answer- (3)

 

50. Match the following consortiums with their corresponding locations

List – I

(a) UGC-DAE Consortium

(b) ERMED-India Consortium

(c) DeLCON-DBT’s E-Library Consortium

(d) e-Shodh Sindhu

 

List - II

(i) Manesar (Gurgaon)

(ii) Gandhinagar, (Ahmedabad)

(iii) Indore

(iv) New Delhi

 

Code

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (iv) (iii) (ii) (i)

(3) (i) (ii) (iii) (iv)

(4) (ii) (i) (iv) (iii)

Answer- (1)

 

51. Match the following leading Abstracting and Indexing tools/Databases with their corresponding Publishers/Content Providers

List – I

(a) LISA

(b) ILSA

(c) LISTA

(d) Indian Science Abstracts

 

List - II

(i) NISCAIR

(ii) EBSCO

(iii) IASLIC

(iv) ProQuest

Code

(a) (b) (c) (d)

(1) (iv) (iii) (ii) (i)

(2) (i) (ii) (iii) (iv)

(3) (ii) (iv) (i) (iii)

(4) (iii) (i) (iv) (ii)

Answer- (1)

52. Match the following threats to ‘information society’ with the corresponding concept

List – I

(a) Compromises intellectual Property

(b) Deliberate acts of theft

(c) Deliberate acts of information extortion

(d) Deliberate acts of espionage or trespass

List - II

(i) Confiscation of equipment or information

(ii) Unauthorized access to data

(iii) Piracy

(iv) Blackmail of information disclosure.

Code

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (iv) (ii) (iii) (i)

(3) (i) (ii) (iii) (iv)

(4) (iii) (i) (iv) (ii)

Answer- (4)

53. Match the following

List – I

(a) Political Map

(b) Route Map

(c) Physical Map

(d) Thematic Map

List - II

(i) Features of land

(ii) Roads and bridges, etc.

(iii) Limiting territorial boundaries

(iv) Mining, agriculture, etc.

Code

(a) (b) (c) (d)

(1) (iv) (i) (ii) (iii)

(2) (i) (ii) (iii) (iv)

(3) (iii) (ii) (i) (iv)

(4) (ii) (iii) (i) (iv)

Answer- (3)

 
54. The MARC Field 264 has different second indicator values to indicate separate data elements in RDA. Match these second indicator values with the respective data elements

List – I

(a) −0

(b) −1

(c) −2

(d) −3

 

List - II

(i) Distribution statement

(ii) Publication statement

(iii) Manufacture statement

(iv) Production statement

Code

(a) (b) (c) (d)

(1) (iv) (ii) (i) (iii)

(2) (iii) (ii) (iv) (i)

(3) (ii) (iv) (iii) (i)

(4) (i) (ii) (iii) (iv)

Answer- (1)

 

55. Match the following mechanisms of information processing with corresponding service as given by S. Seetharama

List – I

(a) Announcement

(b) Evaluation

(c) Document access

(d) Accretion

List - II

(i) Translation Service

(ii) Current Awareness Service

(iii) Indexing Service

(iv) State-of-the-art report

Code

(a) (b) (c) (d)

(1) (iii) (ii) (iv) (i)

(2) (ii) (iv) (i) (iii)

(3) (i) (iii) (ii) (iv)

(4) (iv) (i) (iii) (ii)

Answer- (2)

 

56. Match the following queries with corresponding type of reference service

List – I

(a) Communication with Library Staff through VoIP

(b) Reference query through e-mail

(c) Use of e-resources seeking answers

(d) Webforms

 

List - II

(i) Asynchronous reference service

(ii) Online reference service

(iii) Virtual Reference Desk

(iv) Reference interview

Code

(a) (b) (c) (d)

(1) (iv) (iii) (i) (ii)

(2) (i) (ii) (iv) (iii)

(3) (iii) (i) (ii) (iv)

(4) (ii) (iv) (iii) (i)

Answer- (3)

57. Match the following with corresponding explanation

List – I

(a) Embargo

(b) Big Deal

(c) Front List

(d) Standing order

 

List - II

(i) Publisher’s list of new titles

(ii) Authorization for regular shipment of new editions of specific products

(iii) Publisher’s restriction one-resource access

(iv) large bundled e-journal package of single publisher on discounted price

Code

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (i) (iv) (iii) (ii)

(3) (iv) (ii) (i) (iii)

(4) (ii) (iii) (i) (iv)

Answer- (1)

 

58. Match the following NISO (National Information Standard Organisation) standards with their corresponding descriptions applicable to Libraries

List – I

(a) Z 39.41

(b) Z 39.63

(c) Z 39.84

(d) Z 39.85

 

List - II

(i) Dublin core Metadata Element set

(ii) Syntax for Digital Object Identifier (DOI)

(iii) Inter library loan data elements

(iv) Printed information on spines

Code

(a) (b) (c) (d)

(1) (i) (ii) (iii) (iv)

(2) (iii) (ii) (iv) (i)

(3) (iv) (iii) (ii) (i)

(4) (ii) (i) (iii) (iv)

Answer- (3)

 

59. Match the following

List – I

(a) Counter

(b) PLoS 

(c) ORCID

List - II

(i) Article metric

(ii) Author metric

(iii) All metric

(d) Social Media citations

(iv) Journal metric

Code

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (iv) (i) (ii) (iii)

(3) (ii) (iv) (iii) (i)

(4) (i) (iv) (ii) (iii)

Answer- (2)

 

60. Match the following Office Products with their corresponding Producers/Organisations

List – I

(a) Open Office

(b) MS-Office

(c) Lotus Note

(d) iWork

 

List - II

(i) IBM

(ii) Apache Foundation

(iii) Apple

(iv) Microsoft Corporation

Code

(a) (b) (c) (d)

(1) (i) (ii) (iii) (iv)

(2) (ii) (iv) (i) (iii)

(3) (i) (iv) (iii) (ii)

(4) (iv) (ii) (i) (iii)

Answer- (2)

61. Match the following statements with corresponding research process

List – I

(a) What is the role of MOOCs in imparting LIS education?

(b) EDUCAUSE (2013) “Selective institutions can be democratized via MOOCs”.

(c) MOOCs programmes will replace distance Learning in LIS

(d) Though MOOCs is advantageous, majority respondents preferred distance learning

List - II

(i) Hypothesis

(ii) Analytical statement

(iii) Formulation of the problem

(iv) Literature study

 

Code

(a) (b) (c) (d)

(1) (iii) (iv) (i) (ii)

(2) (ii) (iii) (iv) (i)

(3) (iv) (ii) (iii) (i)

(4) (i) (ii) (iv) (iii)

Answer- (1)

62. Match the following Online Survey Development Cloud based Software Applications/tools with their corresponding founders

List – I

(a) Survey Monkey

(b) Type Form

(c) Client Heartbeat

(d) Survey Gizmo

List - II

(i) Christian Vanek and Scott Mc Daniel- (Colorado, USA)

(ii) Gordon Tan-Brisbane (Austria)

(iii) Robert Munoz and David Okuniev-Barcelona (Spain)

(iv) Ryan Finley- Sanmateo, California (USA)

Code

(a) (b) (c) (d)

(1) (i) (ii) (iii) (iv)

(2) (iv) (iii) (ii) (i)

(3) (ii) (iv) (i) (iii)

(4) (iii) (i) (iv) (ii)

Answer- (2)

63. Match the following with their corresponding year of launching

List – I

(a) National Mission on Manuscripts

(b) National Mission on Libraries

(c) National Mission on Monuments and Antiquities

(d) National Knowledge Network

List - II

(i) 2003

(ii) 2007

(iii) 2012

(iv) 2010

Code

(a) (b) (c) (d)

(1) (i) (iii) (ii) (iv)

(2) (iv) (iii) (ii) (i)

(3) (iii) (ii) (i) (iv)

(4) (ii) (iv) (iii) (i)

Answer- (1)

 

64. Assertion (A)- The copyright system, born and bred for print technology, faces a technological revolution in its environment.
Reason (R)- The old print technology’s broadcast model of one to many communication is replaced with many to many global connectivity.

Code

(1) (A) is true, but (R) is false.

(2) (A) is false, but (R) is true.

(3) Both (A) and (R) are true.

(4) Both (A) and (R) are false.

Answer- (3)

65. Assertion (A)- Avoidance of difficult reference questions are usually an outcome of momentary panic in the face of a seemingly impenetrable question.
Reason (R)- Reference never adhere to few helpful tips such as developing handy-referral systems, both with in and outside the reference area, and fail to establish a context for the questions to counter such panic attack.

Code

(1) (A) is true, but (R) is false.

(2) (A) is false, but (R) is true.

(3) Both (A) and (R) are false.

(4) Both (A) and (R) are true.

Answer- (1)

66. Assertion (A)- In collection development, pamphlets do not require frequent review like books and journals.
Reason (R)- Pamphlet’s information value is likely to be short lived, their physical format is usually flimsy and subject to rapid deterioration.

Code

(1) (A) is true, but (R) is false.

(2) (A) is false, but (R) is true.

(3) Both (A) and (R) are true.

(4) Both (A) and (R) are false

Answer- (2)

 

67. Assertion (A)- The content-based indexing techniques enable identification of wanted persons in photographs of crowds.
Reason (R)- The content-based indexing system uses all sorts of characteristics of the image to guess what it is about.

Code

(1) (A) is true but (R) is false.

(2) (A) is false but (R) are true.

(3) Both (A) and (R) are false.

(4) Both (A) and (R) are true.

Answer- (4)

68. Assertion (A)- In Gold Open Access, costs are not transferred to authors.
Reason (R)- Gold Open Access journals publish peer-reviewed articles without paid subscription barriers for their readers.

Code

(1) (A) is true, but (R) is false.

(2) (A) is false, but (R) is true.

(3) Both (A) and (R) are true.

(4) Both (A) and (R) are false.

Answer- (2)

69. Assertion (A)- In recent years, QR codes have become ubiquitous and may replace the use of bar codes.
Reason (R)- QR is a two - dimensional code with large capacity for storage. These codes hold information both horizontally and vertically and can be scanned by users with their smart phones at ease.

Code

(1) (A) is true, but (R) is false.

(2) (A) is false, but (R) is true.

(3) Both (A) and (R) are true.

(4) Both (A) and (R) are false

Answer- (2)

70. Assertion (A)- Librarians usually prefer to provide access to e-content for the users via a proxy server, allowing authorized library users to access content from outside the physical confines of a library.
Reason (R)- Proxy-server access is possible without IP-address recognition.

Code-

(1) Both (A) and (R) are true.

(2) Both (A) and (R) are false.

(3) (A) is true, but (R) is false.

(4) (A) is false, but (R) is true.

Answer- (3)

71. Assertion (A)- ‘Web Assembly’, a standard that enables applications to run securely in browsers (without the use of Plug-ins) is a people-friendly application in using Web.
Reason (R)- A web language transforms the way people use their devices and the web making applications are more accessible to people at ease all over the globe.

Code-

(1) (A) is true, but (R) is false.

(2) Both (A) and (R) are true.

(3) (A) is false, but (R) is true.

(4) Both (A) and (R) are false.

Answer- (2)

72. Assertion (A)- Grounded Theory methods in Qualitative research start from same set of assumptions as traditional Quantitative research design.
Reason (R)- The inductive nature of these Grounded Theory methods allows the key issues emerge rather than force them into pre conceived categories.

Code-

(1) (A) is true, but (R) is false.

(2) Both (A) and (R) are true.

(3) Both (A) and (R) are false.

(4) (A) is false, but (R) is true

Answer- (4)

73. Assertion (A)- The fundamental need of a hypothesis is to guide sound research.
Reason (R)- Without hypothesis, research is focused and do not become a random empirical wandering.

Code-

(1) (A) is true, but (R) is false.

(2) (A) is false, but (R) is true.

(3) Both (A) and (R) are true.

(4) Both (A) and (R) are false.

Answer- (1)

74. Assertion (A)- Traditional Knowledge Resource Classification (TKRC) is an innovative structured classification system useful for the systematic arrangement, dissemination and retrieval of all subjects.
Reason (R)- It is structured, based on International Patent Classification.

Code-

(1) (A) is true, but (R) is false.

(2) Both (A) and (R) are true.

(3) (A) is false, but (R) is true.

(4) Both (A) and (R) are false.

Answer- (3)

 

75. Identify the resource sharing and document delivery principles as given by IFLA.

(a) Each country should accept responsibility for providing access to its own publications to any other country.

(b) Supplying libraries should accept requests submitted in hardcopy only.

(c) From the moment a library dispatches an item to a requesting library until it returns the supplying library is responsible for any loss or damage incurred.

(d) Each country should aim to develop an efficient national resource sharing system.

Code-

(1) (a) and (b) are correct.

(2) (b) and (c) are correct.

(3) (a) and (d) are correct.

(4) (b) and (d) are correct.

Answer- (3)