LIBRARY & INFORMATION SCIENCE
PAPER – III
Note : This paper contains seventy five (75) objective type questions of two (2) marks each. All questions are compulsory.
1. Identify the author of ‘Essays of an Information Scientist’ from among the following.
(1) F.W. Lancaster
(2) Derek J. de Solla Price
(3) Eugene Garfield
(4) B.C. Vickery
2. Who has coined the term ‘Information Society’ from the following ?
(1) B.C. Brookes
(2) Fritz Machlup
(3) B.C. Vickery
(4) N.J. Belkin
3. Dance’s Helical Spiral communication model is a :
(1) Classical
(2) Linear
(3) Non-Linear
(4) Multi-dimentional
4. What was the theme of IFLA World Library and Information Congress 2017 ?
(1) Connections. Collaboration. Community
(2) Dynamic Libraries : Access, Development and Transformation
(3) Libraries, Citizens, Societies : Confluence for knowledge
(4) Libraries. Solidarity. Society
5. Which of the following is a collaborative network of Reference Librarians ?
(1) World Cat
(2) eSS
(3) Question Point
(4) Global Scholar
6. Resource Description and Access (RDA) is divided into how many sections ?
(1) 9
(2) 10
(3) 11
(4) 12
7. p, q, r in the schema of operators in PRECIS belong to :
(1) Core elements
(2) Extra-core concepts
(3) Dependent elements
(4) Special classes of action
8. According to APA Style Manual, a section at the end of a paper that includes information that is too detailed for the text of the paper itself and would “burden the reader” or be “distracting” or “in appropriate” is called :
(1) Appendix
(2) Bibliography
(3) References
(4) Tables
9. Who coined the word “Management theory jungle” ?
(1) Henry Fayol
(2) F.W. Taylor
(3) Heinz Weihrich
(4) Harold Koontz
10. Which of the following cases require the application of a new ISSN ?
(1) Change in publisher
(2) Change in publication medium and title
(3) Change in location of publication
(4) Change in editorial policy
11. Which of the following organisations have introduced “Dig by”- a new mobile application available as a part of ‘Worldshare Management Service’ ?
(1) Library of Congress
(2) NISCAIR
(3) OCLC
(4) UTLAS
12. Percentage (%) sign is used in an URL to represent :
(1) Space
(2) Date
(3) Time
(4) Person
13. FRBRoo version 2 is based on :
(1) FRBR model alone
(2) FRAD model alone
(3) FRBR and FRAD models only
(4) FRBR, FRAD and FRSAD models
14. Which one of the following is not Image format ?
(1) TIFF
(2) MPEG
(3) JPEG
(4) GIF
15. Which of the following does not come under the domain of Descriptive bibliometrics (Descriptive Studies) ?
(1) Geographical Distribution of Documents
(2) Nature of Information Conveyed
(3) Subject Distribution
(4) Medium of Communication
16. ‘Half-life’ in the context of literary growth is used to indicate :
(1) Rate of obsolescence
(2) Rate of growth
(3) Degree of scatter
(4) Information explosion
17. Which sampling method is not suitable, if unit members are homogenous ?
(1) Simple random
(2) Cluster
(3) Stratified
(4) Systematic
18. Hermeneutics, principle is primarily related with :
(1) Interpretation of texts
(2) Interrelation between data and knowledge
(3) Human experience
(4) Human behaviour
19. How many Working Groups are constituted under National Mission on Libraries, India ?
(1) Two
(2) Three
(3) Four
(4) Five
20. Who is responsible for development and maintenance of UGC official website ?
(1) MHRD
(2) Do E
(3) NIC
(4) INFLIBNET
21. Which of the following are the necessary elements of an information society ?
(a) Confidentiality
(b) Vulnerability
(c) Integrity
(d) Availability
Code :
(1) (b), (c) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (a), (b) and (d) are correct
22. Which of the following components are essential for National Information Policy ?
(a) Legislation framework
(b) E-Journal consortium
(c) Digital repositories
(d) National bibliography
Code :
(1) (a) and (b) are correct
(2) (a) and (d) are correct
(3) (b) and (c) are correct
(4) (b) and (d) are correct
23. SWAYAM, the free online education was developed by :
(a) IIT, Madras
(b) AICTE
(c) IIM, Ahmedabad
(d) MHRD, Govt. of India
Code :
(1) (b) and (d) are correct
(2) (c) and (d) are correct
(3) (a) and (b) are correct
(4) (a) and (d) are correct
24. Which of the following are the activities of National Mission on Libraries ?
(a) CIP Project
(b) Capacity Building
(c) Library Assistance Programme
(d) Setting up of Model Libraries
Code :
(1) (a) and (d) are correct
(2) (b) and (d) are correct
(3) (b) and (c) are correct
(4) (c) and (d) are correct
25. Which of the following indicate the purpose of reference list in a thesis / dissertation ?
(a) Allows author to credit the work of others that directly influenced the present work.
(b) Gives interested readers the information necessary to identify and retrieve the sources.
(c) An expansive list that covers works that are consulted.
(d) Recommends to the interested readers the works that are not cited in the text.
Code :
(1) (a) and (b) are correct
(2) (b) and (c) are correct
(3) (c) and (d) are correct
(4) (b) and (d) are correct
26. Which of the following are the products of Chemical Abstract services ?
(a) Sci Finder
(b) Sci Val
(c) Methods Now
(d) Analytical Services
Code :
(1) (a) and (c) are correct
(2) (b) and (d) are correct
(3) (a), (b) and (c) are correct
(4) (b), (c) and (d) are correct
27. Which of the following roles does a library have in the information transfer cycle ?
(a) Information organization and control
(b) Primary distribution
(c) Secondary Publication
(d) Secondary distribution
Code :
(1) (b) and (d) are correct
(2) (b) and (c) are correct
(3) (a) and (d) are correct
(4) (a) and (b) are correct
28. Who among the following are associated with established theories of reference service ?
(a) C.M. Winchell
(b) James I Wyer
(c) Daniel Brophy
(d) Samuel Rothstein
Code :
(1) (a) and (b) are correct
(2) (b) and (d) are correct
(3) (c) and (d) are correct
(4) (a) and (c) are correct
29. Which of the following are related to ‘Sugamya Pustakalaya’ ?
(a) An online platform that makes accessible the content available to ‘print disabled people’.
(b) Created by Department of Empowerment of persons with disabilities (Divyangjan) Ministry of Social Justice and Empowerment, GOI.
(c) Powered by TCS Access.
(d) Maintained by National Association for the Blind (India).
Code :
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (b), (c) and (d) are correct
(4) (a), (c) and (d) are correct
30. ‘Entropy’ in the context of ‘Information Science’ is :
(a) Measure which cannot be normalised by dividing it by information length.
(b) Measure of unpredictability of the state or equivalently, of its average information content.
(c) Average amount of information produced by a probabilistics stochastic source of data.
(d) Way to measure diversity.
Code :
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (b), (c) and (d) are correct
31. Controlled vocabularies fall broadly into following categories :
(a) Subject Heading Lists
(b) Thesauri
(c) Folksonomies
(d) Ontologies
Code :
(1) (a) and (c) are correct
(2) (b), (c) and (d) are correct
(3) (a), (b) and (d) are correct
(4) (c) and (d) are correct
32. Which of the following are the components of a barcode symbol ?
(a) Antenna
(b) Quiet zone
(c) Transponder
(d) Start character
Code :
(1) (a) and (c) are correct
(2) (b) and (c) are correct
(3) (b) and (d) are correct
(4) (a) and (d) are correct
33. ‘Embargo’ in the context of ‘Book Trade’ is :
(a) a limitation on access, to older resources by the publishers.
(b) perpetual ban on the access of the given resources of a publisher.
(c) a limitation on access to resources placed by publishers.
(d) a limitation on access to the resources usually to prevent the cancellation of individual subscription.
Code :
(1) (c) and (d) are correct
(2) (a) and (b) are correct
(3) (a) and (c) are correct
(4) (a), (c) and (d) are correct
34. Which of the following are Research Information Management System ?
(a) Pure
(b) Quetext
(c) Converis
(d) VIVO
Code :
(1) (a), (b) and (d) are correct
(2) (a), (b) and (c) are correct
(3) (a), (c) and (d) are correct
(4) (b), (c) and (d) are correct
35. Which of the following are the open access initiatives of INFLIBNET ?
(a) Shodhganga
(b) e-Shodh Sindhu
(c) Infoport
(d) IndCat
Code :
(1) (a) and (b) are correct
(2) (b) and (c) are correct
(3) (c) and (d) are correct
(4) (a) and (c) are correct
36. Which of the following are embedded processors ?
(a) Micro Controller
(b) Digital Signal Processor
(c) Cor 2 extreme
(d) Intel Xeon
Code :
(1) (a), (b) and (d) are correct
(2) (b), (c) and (d) are correct
(3) (a), (b) and (c) are correct
(4) (a), (c) and (d) are correct
37. Jubilee (JISC User Behaviour in Information Seeking : Longitudinal Evaluation of Electronic Information Services ) seeks to :
(a) Predict, monitor and characterise ISB in relation to EIS (Electronic Information Services).
(b) Provide illuminative and contextual pictures built up overtime to users and non-users.
(c) Evaluate materials of rarity in nature.
(d) Adjudge the quality of hard copies of e-reference tools served to readers in a given library over a period of time.
Code :
(1) (c) and (d) are correct
(2) (a) and (b) are correct
(3) (b) and (c) are correct
(4) (a) and (d) are correct
38. Arrange the following state Public Library Acts according to their year of enactment :
(a) Chhattisgarh Public Libraries Act
(b) Haryana Public Libraries Act
(c) Orissa Public Libraries Act
(d) Lakshadweep Public Libraries Act
Code :
(1) (b), (c), (d), (a)
(2) (d), (b), (c), (a)
(3) (c), (b), (d), (a)
(4) (a), (b), (c), (d)
39. Arrange in sequence the following public libraries according to their year of origin.
(a) Connemara Public Library
(b) Delhi Public Library
(c) Calcutta Public Library
(d) Baroda Central Library
Code :
(1) (c), (a), (d), (b)
(2) (c), (d), (b), (a)
(3) (a), (b), (d), (c)
(4) (a), (d), (b), (c)
40. Arrange the following laws / principles from lower to higher level as propounded by S.R. Ranganathan.
(a) Fundamental Laws
(b) Canons
(c) Principles
(d) Basic Laws
Code :
(1) (c), (b), (a), (d)
(2) (a), (b), (c), (d)
(3) (b), (d), (a), (c)
(4) (d), (c), (b), (a)
41. Arrange year-wise development of the following indexing systems :
(a) Relational Indexing by J.E.L. Farradane
(b) Chain Indexing by S.R. Ranganathan
(c) Subject Indexing by J.E. Coates
(d) PRECIS by Derek Austin
Code :
(1) (b), (a), (c), (d)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (c), (a), (b)
42. Arrange, from among the following, the areas of access-points in their proper sequence as given in ISBD.
(a) Notes
(b) Series
(c) Edition
(d) Material Specific details
Code :
(1) (a), (b), (c), (d)
(2) (c), (d), (b), (a)
(3) (b), (c), (d), (a)
(4) (d), (c), (b), (a)
43. Arrange the following connecting symbols of CC- 6th ed. according to their increasing ordinal value :
(a) ) (arrester)
(b) ← (backward arrow)
(c) → (forward arrow)
(d) 0 (zero)
Code :
(1) (b), (c), (d), (a)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (a), (c), (b)
44. Identify the correct sequence of indicator digits of Intra Facet Phase Relation as used in CC (6th edition).
(1) j k m n r
(2) j k m r o
(3) i j k m n
(4) j k m n q
45. Arrange in sequence the following subject classes according to their occurance in the schedules of DDC, 21st Ed.
(a) Food Technology
(b) Public Finance
(c) General Encyclopaedias
(d) Bibliographies
Code :
(1) (d), (b), (c), (a)
(2) (d), (c), (b), (a)
(3) (c), (b), (a), (d)
(4) (c), (a), (b), (d)
46. Arrange in sequence the Maslow’s hierarchy of needs :
(a) Social
(b) Esteem
(c) Physiological
(d) Safety
Code :
(1) (c), (d), (a), (b)
(2) (d), (b), (a), (c)
(3) (d), (a), (c), (b)
(4) (c), (a), (b), (d)
47. Arrange in sequence the following document titles alphabetically word by word :
(a) Bookfinder
(b) Bookkeeping made simple
(c) Book bytes
(d) Books that changed the world
Code :
(1) (a), (b), (c), (d)
(2) (b), (c), (d), (a)
(3) (c), (a), (b), (d)
(4) (c), (d), (a), (b)
48. Arrange the steps of the 8W’S Literacy Model in correct order as given by Annette Lamb :
(a) Webbing
(b) Wishing
(c) Wondering
(d) Weaving
Code :
(1) (c), (a), (b) and (d)
(2) (b), (a), (c) and (d)
(3) (c), (a), (d) and (b)
(4) (c), (b), (a) and (d)
49. Match the following sources with their corresponding functions :
50. Match the following consortiums with their corresponding locations :
51. Match the following leading Abstracting and Indexing tools/Databases with their corresponding Publishers/Content Providers :
52. Match the following threats to ‘information society’ with the corresponding concept :
53. Match the following :
54. The MARC Field 264 has different second indicator values to indicate separate data elements in RDA. Match these second indicator values with the respective data elements :
55. Match the following mechanisms of information processing with corresponding service as given by S. Seetharama :
56. Match the following queries with corresponding type of reference service :
57. Match the following with corresponding explanation :
58. Match the following NISO (National Information Standard Organisation) standards with their corresponding descriptions applicable to Libraries :
59. Match the following :
60. Match the following Office Products with their corresponding Producers/Organisations :
61. Match the following statements with corresponding research process :
62. Match the following Online Survey Development Cloud based Software Applications/tools with their corresponding founders :
63. Match the following with their corresponding year of launching :
64. Assertion (A) : The copyright system, born and bred for print technology, faces a technological revolution in its environment.
Reason (R) : The old print technology’s broadcast model of one to many communication is replaced with many to many global connectivity.
Code :
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
65. Assertion (A) : Avoidance of difficult reference questions are usually an outcome of momentary panic in the face of a seemingly impenetrable question.
Reason (R) : Reference never adhere to few helpful tips such as developing handy-referral systems, both with in and outside the reference area, and fail to establish a context for the questions to counter such panic attack.
Code :
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
66. Assertion (A) : In collection development, pamphlets do not require frequent review like books and journals.
Reason (R) : Pamphlet’s information value is likely to be short lived, their physical format is usually flimsy and subject to rapid deterioration.
Code :
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
67. Assertion (A) : The content-based indexing techniques enable identification of wanted persons in photographs of crowds.
Reason (R) : The content-based indexing system uses all sorts of characteristics of the image to guess what it is about.
Code :
(1) (A) is true but (R) is false.
(2) (A) is false but (R) are true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
68. Assertion (A) : In Gold Open Access, costs are not transferred to authors.
Reason (R) : Gold Open Access journals publish peer-reviewed articles without paid subscription barriers for their readers.
Code :
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
69. Assertion (A) : In recent years, QR codes have become ubiquitous and may replace the use of bar codes.
Reason (R) : QR is a two – dimensional code with large capacity for storage. These codes hold information both horizontally and vertically and can be scanned by users with their smart phones at ease.
Code :
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
70. Assertion (A) : Librarians usually prefer to provide access to e-content for the users via a proxy server, allowing authorized library users to access content from outside the physical confines of a library.
Reason (R) : Proxy-server access is possible without IP-address recognition.
Code :
(1) Both (A) and (R) are true.
(2) Both (A) and (R) are false.
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.
71. Assertion (A) : ‘Web Assembly’, a standard that enables applications to run securely in browsers (without the use of Plug-ins) is a people-friendly application in using Web.
Reason (R) : A web language transforms the way people use their devices and the web making applications are more accessible to people at ease all over the globe.
Code :
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
72. Assertion (A) : Grounded Theory methods in Qualitative research start from same set of assumptions as traditional Quantitative research design.
Reason (R) : The inductive nature of these Grounded Theory methods allows the key issues emerge rather than force them into pre conceived categories.
Code :
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) Both (A) and (R) are false.
(4) (A) is false, but (R) is true.
73. Assertion (A) : The fundamental need of a hypothesis is to guide sound research.
Reason (R) : Without hypothesis, research is focused and do not become a random empirical wandering.
Code :
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
74. Assertion (A) : Traditional Knowledge Resource Classification(TKRC) is an innovative structured classification system useful for the systematic arrangement, dissemination and retrieval of all subjects.
Reason (R) : It is structured, based on International Patent Classification.
Code :
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
75. Identify the resource sharing and document delivery principles as given by IFLA.
(a) Each country should accept responsibility for providing access to its own publications to any other country.
(b) Supplying libraries should accept requests submitted in hardcopy only.
(c) From the moment a library dispatches an item to a requesting library until it returns the supplying library is responsible for any loss or damage incurred.
(d) Each country should aim to develop an efficient national resource sharing system.
Code :
(1) (a) and (b) are correct.
(2) (b) and (c) are correct.
(3) (a) and (d) are correct.
(4) (b) and (d) are correct.
Latest Govt Job & Exam Updates: