November, 2017
UGC NET - Question Paper-III with answer
Library & Information Science
1. Identify the author of “Essays of an Information Scientist” from among the following.
(1) F.W. Lancaster
(2) Derek J. de Solla Price
(3) Eugene Garfield
(4) B.C. Vickery
Answer- (3)
2. Who has coined the term “Information Society” from the following?
(1) B.C. Brookes
(2) Fritz Machlup
(3) B.C. Vickery
(4) N.J. Belkin
Answer- (2)
3. Dance’s Helical Spiral Communication model is a
(1) Classical
(2) Linear
(3) Non-Linear
(4) Multi-dimensional
Answer- (3)
4. What was the theme of IFLA World Library and Information Congress 2017
(1) Connections. Collaboration. Community
(2) Dynamic Libraries- Access, Development and Transformation
(3) Libraries, Citizens, Societies- Confluence of knowledge
(4) Libraries. Solidarity. Society
Answer- (4)
5. Which of the following is a collaborative network of Reference Librarians
(1) World Cat
(2) eSS
(3) Question Point
(4) Google Scholar
Answer- (3)
6. Resource Description and Access (RDA) is divided into how many sections
(1) 9
(2) 10
(3) 11
(4) 12
Answer- (2)
7. p, q, r in the schema of operators in PRECIS belongs to
(1) Core elements
(2) Extra-core concepts
(3) Dependent elements
(4) Special classes of action
Answer- (3)
8. According to APA Style Manual, a section at the end of a paper that includes information that is too detailed for the text of the paper itself and would “burden the reader” or be “distracting” or “in appropriate” is called
(1) Appendix
(2) Bibliography
(3) References
(4) Tables
Answer- (1)
9. Who coined the word “Management theory jungle”
(1) Henry Fayol
(2) F.W. Taylor
(3) Heinz Weihrich
(4) Harold Koontz
Answer- (4)
10. Which of the following case require the application of new ISSN
(1) Change of publisher
(2) Change in publication medium and title
(3) Change in location of publication
(4) Change in editorial policy
Answer- (2)
11. Which of the following organizations have introduced “Dig by” – a new mobile application available as a part of “Worldshare Management Service”
(1) Library of Congress
(2) NISCAIR
(3) OCLC
(4) UTLAS
Answer- (3)
12. Percentage (%) sign is used in an URL to represent
(1) Space
(2) Date
(3) Time
(4) Person
Answer- (1)
13. FRBRoo version 2 is based on
(1) FRBR model alone
(2) FRAD model alone
(3) FRBR and FRAD models only
(4) FRBR, FRAD and FRSAD models
Answer- (4)
14. Which one of the following is not Image format?
(1) TIFF
(2) MPEG
(3) JPEG
(4) GIF
Answer- (2)
15. Which of the following does not come under the domain of Descriptive bibliometrics (Descriptive Studies)?
(1) Geographical Distribution of Documents
(2) Nature of Information Conveyed
(3) Subject Distribution
(4) Medium of Communication
Answer- (2)
16. “Half-life” in the context of literary growth is used to indicate
(1) Rate of obsolescence
(2) Rate of growth
(3) Degree of scatter
(4) Information explosion
Answer- (1)
17. Which sampling method is not suitable, if unit members are homogenous?
(1) Simple random
(2) Cluster
(3) Stratified
(4) Systematic
Answer- (2)
18. Hermeneutics, principle is primarily related with
(1) Interpretation of texts
(2) Interrelation between data and knowledge
(3) Human experience
(4) Human behavious
Answer- (1)
19. How may Working Groups are constituted under National Mission on Libraries, India
(1) Two
(2) Three
(3) Four
(4) Five
Answer- (3)
20. Who is responsible for development and maintenance of UGC official website
(1) MHRD
(2) DoE
(3) NIC
(4) INFLIBNET
Answer- (4)
21. Which of the following are the necessary elements of an information society?
(a) Confidentiality
(b) Vulnerability
(c) Integrity
(d) Availability
Code
(1) (b), (c) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (a), (b) and (d) are correct
Answer- (3)
22. Which of the following components are essential for National Information Policy?
(a) Legislation framework
(b) E-Journal consortium
(c) Digital repositories
(d) National bibliography
Code
(1) (a) and (b) are correct
(2) (a) and (d) are correct
(3) (b) and (c) are correct
(4) (b) and (d) are correct
Answer- (2)
23. SWAYAM, the free online education was developed by
(a) IIT, Madras
(b) AICTE
(c) IIM, Ahmedabad
(d) MHRD, Govt. of India
Code
(1) (b) and (d) are correct
(2) (c) and (d) are correct
(3) (a) and (b) are correct
(4) (a) and (d) are correct
Answer- (1)
24. Which of the following are the activities of National Mission on Libraries
(a) CIP Project
(b) Capacity Building
(c) Library Assistance Programme
(d) Setting up of Model Libraries
Code
(1) (a) and (d) are correct
(2) (b) and (d) are correct
(3) (b) and (c) are correct
(4) (c) and (d) are correct
Answer- (2)
25. Which of the following indicate the purpose of reference list in a thesis / dissertation
(a) Allows author to credit the work of others that directly influenced the present work.
(b) Gives interested readers the information necessary to identify and retrieve the sources.
(c) An expansive list that covers works that are consulted.
(d) Recommends to the interested readers the works that are not cited in the text.
Code
(1) (a) and (b) are correct
(2) (b) and (c) are correct
(3) (c) and (d) are correct
(4) (b) and (d) are correct
Answer- (1)
26. Which of the following are the products of Chemical Abstract services
(a) Sci Finder
(b) Sci Val
(c) Methods Now
(d) Analytical Services
Code
(1) (a) and (c) are correct
(2) (b) and (d) are correct
(3) (a), (b) and (c) are correct
(4) (b), (c) and (d) are correct
Answer- (1)
27. Which of the following roles does a library have in the information transfer cycle
(a) Information organization and control
(b) Primary distribution
(c) Secondary Publication
(d) Secondary distribution
Code
(1) (b) and (d) are correct
(2) (b) and (c) are correct
(3) (a) and (d) are correct
(4) (a) and (b) are correct
Answer- (3)
28. Who among the following are associated with established theories of reference service
(a) C.M. Winchell
(b) James I Wyer
(c) Daniel Brophy
(d) Samuel Rothstein
Code
(1) (a) and (b) are correct
(2) (b) and (d) are correct
(3) (c) and (d) are correct
(4) (a) and (c) are correct
Answer- (2)
29. Which of the following are related to ‘Sugamya Pustakalaya’?
(a) An online platform that makes accessible the content available to ‘print disabled people’.
(b) Created by Department of Empowerment of persons with disabilities (Divyangjan), Ministry of Social Justice and Empowerment, GOI.
(c) Powered by TCS Access.
(d) Maintained by National Association for the Blind (India).
Code
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (b), (c) and (d) are correct
(4) (a), (c) and (d) are correct
Answer- (2)
30. ‘Entropy’ in the context of ‘Information Science’ is
(a) Measure which cannot be normalised by dividing it by information length.
(b) Measure of unpredictability of the state or equivalently, of its average information content.
(c) Average amount of information produced by a probabilistics stochastic source of data.
(d) Way to measure diversity.
Code
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (b), (c) and (d) are correct
Answer- (4)
31. Controlled vocabularies fall broadly into following categories
(a) Subject Heading Lists
(b) Thesauri
(c) Folksonomies
(d) Ontologies
Code
(1) (a) and (c) are correct
(2) (b), (c) and (d) are correct
(3) (a), (b) and (d) are correct
(4) (c) and (d) are correct
Answer- (3)
32. Which of the following are the components of a barcode symbol?
(a) Antenna
(b) Quiet zone
(c) Transponder
(d) Start character
Code
(1) (a) and (c) are correct
(2) (b) and (c) are correct
(3) (b) and (d) are correct
(4) (a) and (d) are correct
Answer- (3)
33. ‘Embargo’ in the context of ‘Book Trade’ is
(a) A limitation on access, to older resources by the publishers.
(b) Perpetual ban on the access of the given resources of a publisher.
(c) A limitation on access to resources placed by publishers.
(d) A limitation on access to the resources usually to prevent the cancellation of individual
subscription.
Code
(1) (c) and (d) are correct
(2) (a) and (b) are correct
(3) (a) and (c) are correct
(4) (a), (c) and (d) are correct
Answer- (1)
34. Which of the following are Research Information Management System
(a) Pure
(b) Quetext
(c) Converis
(d) VIVO
Code
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (b), (c) and (d) are correct
Answer- (3)
35. Which of the following are the open access initiatives of INFLIBNET?
(a) Shodhganga
(b) e-Shodh Sindhu
(c) Infoport
(d) IndCat
Code
(1) (a) and (b) are correct
(2) (b) and (c) are correct
(3) (c) and (d) are correct
(4) (a) and (c) are correct
Answer- (4)
36. Which of the following are embedded processors?
(a) Micro Controller
(b) Digital Signal Processor
(c) Cor 2 extreme
(d) Intel Xeon
Code
(1) (a), (b) and (d) are correct
(2) (b), (c) and (d) are correct
(3) (a), (b) and (c) are correct
(4) (a), (c) and (d) are correct
Answer- (1)
37. Jubilee (JISC User Behaviour in Information Seeking- Longitudinal Evaluation of Electronic Information Services ) seeks to
(a) Predict, monitor and characterise ISB in relation to EIS (Electronic Information Services).
(b) Provide illuminative and contextual pictures built up overtime to users and non-users.
(c) Evaluate materials of rarity in nature.
(d) Adjudge the quality of hard copies of e-reference tools served to readers in a given library over a period of time.
Code
(1) (c) and (d) are correct
(2) (a) and (b) are correct
(3) (b) and (c) are correct
(4) (a) and (d) are correct
Answer- (2)
38. Arrange the following state Public Library Acts according to their year of enactment
(a) Chhattisgarh Public Libraries Act
(b) Haryana Public Libraries Act
(c) Orissa Public Libraries Act
(d) Lakshadweep Public Libraries Act
Code
(1) (b), (c), (d), (a)
(2) (d), (b), (c), (a)
(3) (c), (b), (d), (a)
(4) (a), (b), (c), (d)
Answer- (1)
39. Arrange in sequence the following public libraries according to their year of origin
(a) Connemara Public Library
(b) Delhi Public Library
(c) Calcutta Public Library
(d) Baroda Central Library
Code
(1) (c), (a), (d), (b)
(2) (c), (d), (b), (a)
(3) (a), (b), (d), (c)
(4) (a), (d), (b), (c)
Answer- (1)
40. Arrange the following laws / principles from lower to higher level as propounded by
S.R. Ranganathan.
(a) Fundamental Laws
(b) Canons
(c) Principles
(d) Basic Laws
Code
(1) (c), (b), (a), (d)
(2) (a), (b), (c), (d)
(3) (b), (d), (a), (c)
(4) (d), (c), (b), (a)
Answer- (1)
41. Arrange year-wise development of the following indexing systems
(a) Relational Indexing by J.E.L. Farradane
(b) Chain Indexing by S.R. Ranganathan
(c) Subject Indexing by J.E. Coates
(d) PRECIS by Derek Austin
Code
(1) (b), (a), (c), (d)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (c), (a), (b)
Answer- (1)
42. Arrange, from among the following, the areas of access-points in their proper sequence as given in ISBD
(a) Notes
(b) Series
(c) Edition
(d) Material Specific details
Code
(1) (a), (b), (c), (d)
(2) (c), (d), (b), (a)
(3) (b), (c), (d), (a)
(4) (d), (c), (b), (a)
Answer- (2)
43. Arrange the following connecting symbols of CC- 6th ed. according to their increasing ordinal value
(a) ) (arrester)
(b) ← (backward arrow)
(c) → (forward arrow)
(d) 0 (zero)
Code
(1) (b), (c), (d), (a)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (a), (c), (b)
Answer- (2)
44. Identify the correct sequence of indicator digits of Intra Facet Phase Relation as used in
CC (6th edition).
(1) j k m n r
(2) j k m r o
(3) i j k m n
(4) j k m n q
Answer- (1)
45. Arrange in sequence the following subject classes according to their occurance in the schedules of DDC, 21st Ed.
(a) Food Technology
(b) Public Finance
(c) General Encyclopaedias
(d) Bibliographies
Code
(1) (d), (b), (c), (a)
(2) (d), (c), (b), (a)
(3) (c), (b), (a), (d)
(4) (c), (a), (b), (d)
Answer- (2)
46. Arrange in sequence the Maslow’s hierarchy of needs
(a) Social
(b) Esteem
(c) Physiological
(d) Safety
Code
(1) (c), (d), (a), (b)
(2) (d), (b), (a), (c)
(3) (d), (a), (c), (b)
(4) (c), (a), (b), (d)
Answer- (1)
47. Arrange in sequence the following document titles alphabetically word by word
(a) Bookfinder
(b) Bookkeeping made simple
(c) Book bytes
(d) Books that changed the world
Code
(1) (a), (b), (c), (d)
(2) (b), (c), (d), (a)
(3) (c), (a), (b), (d)
(4) (c), (d), (a), (b)
Answer- (3)
48. Arrange the steps of the 8W’S Literacy Model in correct order as given by Annette Lamb
(a) Webbing
(b) Wishing
(c) Wondering
(d) Weaving
Code
(1) (c), (a), (b) and (d)
(2) (b), (a), (c) and (d)
(3) (c), (a), (d) and (b)
(4) (c), (b), (a) and (d)
Answer- (3)
49. Match the following sources with their corresponding functions
List – I
(a) Counter
(b) Affinity string
(c) Link resolver
(d) Journal of citation report
List - II
(i) Tracking e-resources usage statistics
(ii) Impact factor
(iii) Tracking online usage by user categories
(iv) Number of times users’ connectivity to a resource
Code
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (ii) (iv) (iii) (i)
(3) (i) (iii) (iv) (ii)
(4) (iv) (ii) (i) (iii)
Answer- (3)
50. Match the following consortiums with their corresponding locations
List – I
(a) UGC-DAE Consortium
(b) ERMED-India Consortium
(c) DeLCON-DBT’s E-Library Consortium
(d) e-Shodh Sindhu
List - II
(i) Manesar (Gurgaon)
(ii) Gandhinagar, (Ahmedabad)
(iii) Indore
(iv) New Delhi
Code
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iv) (iii) (ii) (i)
(3) (i) (ii) (iii) (iv)
(4) (ii) (i) (iv) (iii)
Answer- (1)
51. Match the following leading Abstracting and Indexing tools/Databases with their corresponding Publishers/Content Providers
List – I
(a) LISA
(b) ILSA
(c) LISTA
(d) Indian Science Abstracts
List - II
(i) NISCAIR
(ii) EBSCO
(iii) IASLIC
(iv) ProQuest
Code
(a) (b) (c) (d)
(1) (iv) (iii) (ii) (i)
(2) (i) (ii) (iii) (iv)
(3) (ii) (iv) (i) (iii)
(4) (iii) (i) (iv) (ii)
Answer- (1)
52. Match the following threats to ‘information society’ with the corresponding concept
List – I
(a) Compromises intellectual Property
(b) Deliberate acts of theft
(c) Deliberate acts of information extortion
(d) Deliberate acts of espionage or trespass
List - II
(i) Confiscation of equipment or information
(ii) Unauthorized access to data
(iii) Piracy
(iv) Blackmail of information disclosure.
Code
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iv) (ii) (iii) (i)
(3) (i) (ii) (iii) (iv)
(4) (iii) (i) (iv) (ii)
Answer- (4)
53. Match the following
List – I
(a) Political Map
(b) Route Map
(c) Physical Map
(d) Thematic Map
List - II
(i) Features of land
(ii) Roads and bridges, etc.
(iii) Limiting territorial boundaries
(iv) Mining, agriculture, etc.
Code
(a) (b) (c) (d)
(1) (iv) (i) (ii) (iii)
(2) (i) (ii) (iii) (iv)
(3) (iii) (ii) (i) (iv)
(4) (ii) (iii) (i) (iv)
Answer- (3)
54. The MARC Field 264 has different second indicator values to indicate separate data elements in RDA. Match these second indicator values with the respective data elements
List – I
(a) −0
(b) −1
(c) −2
(d) −3
List - II
(i) Distribution statement
(ii) Publication statement
(iii) Manufacture statement
(iv) Production statement
Code
(a) (b) (c) (d)
(1) (iv) (ii) (i) (iii)
(2) (iii) (ii) (iv) (i)
(3) (ii) (iv) (iii) (i)
(4) (i) (ii) (iii) (iv)
Answer- (1)
55. Match the following mechanisms of information processing with corresponding service as given by S. Seetharama
List – I
(a) Announcement
(b) Evaluation
(c) Document access
(d) Accretion
List - II
(i) Translation Service
(ii) Current Awareness Service
(iii) Indexing Service
(iv) State-of-the-art report
Code
(a) (b) (c) (d)
(1) (iii) (ii) (iv) (i)
(2) (ii) (iv) (i) (iii)
(3) (i) (iii) (ii) (iv)
(4) (iv) (i) (iii) (ii)
Answer- (2)
56. Match the following queries with corresponding type of reference service
List – I
(a) Communication with Library Staff through VoIP
(b) Reference query through e-mail
(c) Use of e-resources seeking answers
(d) Webforms
List - II
(i) Asynchronous reference service
(ii) Online reference service
(iii) Virtual Reference Desk
(iv) Reference interview
Code
(a) (b) (c) (d)
(1) (iv) (iii) (i) (ii)
(2) (i) (ii) (iv) (iii)
(3) (iii) (i) (ii) (iv)
(4) (ii) (iv) (iii) (i)
Answer- (3)
57. Match the following with corresponding explanation
List – I
(a) Embargo
(b) Big Deal
(c) Front List
(d) Standing order
List - II
(i) Publisher’s list of new titles
(ii) Authorization for regular shipment of new editions of specific products
(iii) Publisher’s restriction one-resource access
(iv) large bundled e-journal package of single publisher on discounted price
Code
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (i) (iv) (iii) (ii)
(3) (iv) (ii) (i) (iii)
(4) (ii) (iii) (i) (iv)
Answer- (1)
58. Match the following NISO (National Information Standard Organisation) standards with their corresponding descriptions applicable to Libraries
List – I
(a) Z 39.41
(b) Z 39.63
(c) Z 39.84
(d) Z 39.85
List - II
(i) Dublin core Metadata Element set
(ii) Syntax for Digital Object Identifier (DOI)
(iii) Inter library loan data elements
(iv) Printed information on spines
Code
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (iii) (ii) (iv) (i)
(3) (iv) (iii) (ii) (i)
(4) (ii) (i) (iii) (iv)
Answer- (3)
59. Match the following
List – I
(a) Counter
(b) PLoS
(c) ORCID
List - II
(i) Article metric
(ii) Author metric
(iii) All metric
(d) Social Media citations
(iv) Journal metric
Code
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (iv) (i) (ii) (iii)
(3) (ii) (iv) (iii) (i)
(4) (i) (iv) (ii) (iii)
Answer- (2)
60. Match the following Office Products with their corresponding Producers/Organisations
List – I
(a) Open Office
(b) MS-Office
(c) Lotus Note
(d) iWork
List - II
(i) IBM
(ii) Apache Foundation
(iii) Apple
(iv) Microsoft Corporation
Code
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (ii) (iv) (i) (iii)
(3) (i) (iv) (iii) (ii)
(4) (iv) (ii) (i) (iii)
Answer- (2)
61. Match the following statements with corresponding research process
List – I
(a) What is the role of MOOCs in imparting LIS education?
(b) EDUCAUSE (2013) “Selective institutions can be democratized via MOOCs”.
(c) MOOCs programmes will replace distance Learning in LIS
(d) Though MOOCs is advantageous, majority respondents preferred distance learning
List - II
(i) Hypothesis
(ii) Analytical statement
(iii) Formulation of the problem
(iv) Literature study
Code
(a) (b) (c) (d)
(1) (iii) (iv) (i) (ii)
(2) (ii) (iii) (iv) (i)
(3) (iv) (ii) (iii) (i)
(4) (i) (ii) (iv) (iii)
Answer- (1)
62. Match the following Online Survey Development Cloud based Software Applications/tools with their corresponding founders
List – I
(a) Survey Monkey
(b) Type Form
(c) Client Heartbeat
(d) Survey Gizmo
List - II
(i) Christian Vanek and Scott Mc Daniel- (Colorado, USA)
(ii) Gordon Tan-Brisbane (Austria)
(iii) Robert Munoz and David Okuniev-Barcelona (Spain)
(iv) Ryan Finley- Sanmateo, California (USA)
Code
(a) (b) (c) (d)
(1) (i) (ii) (iii) (iv)
(2) (iv) (iii) (ii) (i)
(3) (ii) (iv) (i) (iii)
(4) (iii) (i) (iv) (ii)
Answer- (2)
63. Match the following with their corresponding year of launching
List – I
(a) National Mission on Manuscripts
(b) National Mission on Libraries
(c) National Mission on Monuments and Antiquities
(d) National Knowledge Network
List - II
(i) 2003
(ii) 2007
(iii) 2012
(iv) 2010
Code
(a) (b) (c) (d)
(1) (i) (iii) (ii) (iv)
(2) (iv) (iii) (ii) (i)
(3) (iii) (ii) (i) (iv)
(4) (ii) (iv) (iii) (i)
Answer- (1)
64. Assertion (A)- The copyright system, born and bred for print technology, faces a technological revolution in its environment.
Reason (R)- The old print technology’s broadcast model of one to many communication is replaced with many to many global connectivity.
Code
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer- (3)
65. Assertion (A)- Avoidance of difficult reference questions are usually an outcome of momentary panic in the face of a seemingly impenetrable question.
Reason (R)- Reference never adhere to few helpful tips such as developing handy-referral systems, both with in and outside the reference area, and fail to establish a context for the questions to counter such panic attack.
Code
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
Answer- (1)
66. Assertion (A)- In collection development, pamphlets do not require frequent review like books and journals.
Reason (R)- Pamphlet’s information value is likely to be short lived, their physical format is usually flimsy and subject to rapid deterioration.
Code
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false
Answer- (2)
67. Assertion (A)- The content-based indexing techniques enable identification of wanted persons in photographs of crowds.
Reason (R)- The content-based indexing system uses all sorts of characteristics of the image to guess what it is about.
Code
(1) (A) is true but (R) is false.
(2) (A) is false but (R) are true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
Answer- (4)
68. Assertion (A)- In Gold Open Access, costs are not transferred to authors.
Reason (R)- Gold Open Access journals publish peer-reviewed articles without paid subscription barriers for their readers.
Code
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer- (2)
69. Assertion (A)- In recent years, QR codes have become ubiquitous and may replace the use of bar codes.
Reason (R)- QR is a two - dimensional code with large capacity for storage. These codes hold information both horizontally and vertically and can be scanned by users with their smart phones at ease.
Code
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false
Answer- (2)
70. Assertion (A)- Librarians usually prefer to provide access to e-content for the users via a proxy server, allowing authorized library users to access content from outside the physical confines of a library.
Reason (R)- Proxy-server access is possible without IP-address recognition.
Code-
(1) Both (A) and (R) are true.
(2) Both (A) and (R) are false.
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.
Answer- (3)
71. Assertion (A)- ‘Web Assembly’, a standard that enables applications to run securely in browsers (without the use of Plug-ins) is a people-friendly application in using Web.
Reason (R)- A web language transforms the way people use their devices and the web making applications are more accessible to people at ease all over the globe.
Code-
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
Answer- (2)
72. Assertion (A)- Grounded Theory methods in Qualitative research start from same set of assumptions as traditional Quantitative research design.
Reason (R)- The inductive nature of these Grounded Theory methods allows the key issues emerge rather than force them into pre conceived categories.
Code-
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) Both (A) and (R) are false.
(4) (A) is false, but (R) is true
Answer- (4)
73. Assertion (A)- The fundamental need of a hypothesis is to guide sound research.
Reason (R)- Without hypothesis, research is focused and do not become a random empirical wandering.
Code-
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer- (1)
74. Assertion (A)- Traditional Knowledge Resource Classification (TKRC) is an innovative structured classification system useful for the systematic arrangement, dissemination and retrieval of all subjects.
Reason (R)- It is structured, based on International Patent Classification.
Code-
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
Answer- (3)
75. Identify the resource sharing and document delivery principles as given by IFLA.
(a) Each country should accept responsibility for providing access to its own publications to any other country.
(b) Supplying libraries should accept requests submitted in hardcopy only.
(c) From the moment a library dispatches an item to a requesting library until it returns the supplying library is responsible for any loss or damage incurred.
(d) Each country should aim to develop an efficient national resource sharing system.
Code-
(1) (a) and (b) are correct.
(2) (b) and (c) are correct.
(3) (a) and (d) are correct.
(4) (b) and (d) are correct.
Answer- (3)