CBSE NET Library-Science September-2013 Solved Paper III

  1. Which one of the following is not the feature of H-index?

    1. Mathematically simple index

    2. Applied to any level of aggregation

    3. Publication that are hardly ever cited dont influence it.

    4. Sensitive to performance change.

    Answer: d

  2. An Application Program Interface (API) language is used for

    1. Network Management

    2. Graphical user Interface

    3. Relational Interface in Data Base Management

    4. Database Management System

    Answer: b

  3. The correlational coefficient is

    1. A strength of relationship between two variables.

    2. A typical relationship between two variables.

    3. A linear relationship between two variables.

    4. Non-linear relationship between two variables.

    Answer: a

  4. The following is a collaborative network of Reference Librarians

    1. Worldcat

    2. INDEST

    3. Question point

    4. Global scholar

    Answer: c

  5. Which of the following is not a synchronous virtual reference service?

    1. Chat

    2. E-mail

    3. Video-conferencing

    4. Voice over IP

    Answer: b

  6. Which of the bibliometric law describes the frequency of publications by author?

    1. Zipf's law

    2. Bradford's law

    3. Lotka's law

    4. None of the above

    Answer: c

  7. Indian patents on all areas are published in

    1. India: A reference annual

    2. Indian chemical patent index

    3. Gazette of India, Part-III

    4. None of the above

    Answer: c

  8. Which of the following does not protect intellectual property?

    1. Encryption of data

    2. Digital watermark

    3. Uniquely encoded licences

    4. Plug-ins

    Answer: d

  9. “World directory of sources of Patents” is published by

    1. Bowker-Saur, U. S. A.

    2. WIPO

    3. Patent Information System, India

    4. Derwent, London

    Answer: b

  10. ‘Web of Science’ covers

    1. Sciences

    2. Socal Sciences

    3. Arts of Humanities

    4. All the above

    Answer: d

  11. What does encrypting a file mean?

    1. Set the read only property

    2. Hiding the file

    3. Set a password

    4. Scrambling the contents

    Answer: d

  12. Which of the following identifies user by a login permission to a licensed site.

    1. Authorization

    2. Authentication

    3. Digital signature

    4. All of the above

    Answer: b

  13. Papyras was used as a writing material by

    1. Summarians

    2. Italians

    3. Egyptians

    4. Assyrians

    Answer: c

  14. The intrinsic value of information lies in its

    1. Procurement

    2. Processing and Storage

    3. Communication and Retrieval

    4. Usage

    Answer: d

  15. Identification of an e-article and paying for full-text is known as

    1. Pay-per-view

    2. Consortium

    3. Campus license

    4. E-subscription

    Answer: a

  16. Which of the following web resource for LIS has been compiled by academic librarians of universities of California?

    1. Infomine

    2. Internet Public Library

    3. Internet Library for Librarians

    4. Current Informed Librarian

    Answer: a

  17. Who said, “Public Library is the responsibility of Local and National Authorities. It must be supported by specific legislation and financed by National and Local Govnerments”

    1. S. R. Ranganathan

    2. Gopala Rao Ekbote

    3. Sinha Committee

    4. UNESCO Manifesto

    Answer: d

  18. The formula K (S) + ΔI = K (S + ΔS) for summation of information is propounded by

    1. Claude Shannon

    2. George Gerbner

    3. Charles Osgood

    4. Mandy Brooks

    Answer: d

  19. ‘Library Technology Project (LTP) Reports’ are published by ________.

    1. ILA

    2. ALA

    3. CILIP

    4. SLA

    Answer: b

  20. Which Education Commission observed “Nothing can be more damaging to a growing department than to neglect its library or give it a low priority”

    1. Kothari Education Commission

    2. Radhakrishnan Education Commission

    3. Calcutta University Commission

    4. Mudaliar Commission on Secondary Education

    Answer: a

  21. International Advisory Committee on Documentation, Libraries and Archives (UNESCO) was established in

    1. 1966

    2. 1967

    3. 1968

    4. 1969

    Answer: b

  22. Which law of Library Science states that information is basic input to human growth and development?

    1. Fourth Law

    2. Third Law

    3. Second Law

    4. Fifth Law

    Answer: b

  23. “Pro Quest” is ________.

    1. Traditional Commercial Publisher

    2. Scholarly Society Publisher

    3. Electronic Aggregator

    4. Publisher of Higher Learning Institutions

    Answer: c

  24. Which of the following is/are part (s) of classified catalogue?

    1. An author-title file

    2. Subject file arranged by library classification

    3. An alphabetical index to the subject file

    4. All of the above

    Answer: d

  25. The main components of an RFID system include

    1. Handheld Reader, RFID label prnter, server and External book return

    2. RFID tags, readers or sensors, Antenna and server

    3. RFID label printer, sensors, antenna and server

    4. RFID tags, server, external book return, sensors

    Answer: b

  26. Which of the following is not the component of a search engine?

    1. Spider

    2. Index

    3. Search of retrieval mechanism

    4. Natural language technique

    Answer: d

  27. ‘Communities’ is a component of following digital library software

    1. GSDL

    2. D space

    3. Fedora

    4. i-core

    Answer: b

  28. Which one of the following is not an operation involved in quality circles?

    1. Problem identification

    2. Problem selection

    3. Solution recommendation

    4. Problem shifting

    Answer: d

  29. In a database table, the category of information is called _______.

    1. Tuple

    2. Field

    3. Record

    4. All the above

    Answer: b

  30. The web address that acts as permanent identifier is ______.

    1. URL

    2. DOI

    3. PURL

    4. UDI

    Answer: c

  31. Who developed the sense making approach for human information behaviour which is implemented in terms of four constituent elements?

    1. T. D. Wilson

    2. B. Dervin

    3. D. Ellis

    4. C. C. Kuhlthau

    Answer: b

  32. MARC records contain

    1. Description of library materials

    2. Searchable headings

    3. Elements to organize collection

    4. List of index terms

    Codes:

    1. 1, 2, 3 are correct.

    2. 2, 3, 4 are correct.

    3. 3, 4, 1 are correct.

    4. 4, 1, 2 are correct.

    Answer: a

  33. RDBMs are advantageous as they:

    1. Manage and Maintain

    2. Represent data in the form of tables

    3. Facilitate handling of objects rather than records

    4. Are developed with mathematic theory of relations

    Codes:

    1. 1, 4 are correct.

    2. 2, 3 are correct.

    3. 2, 4 are correct.

    4. 3, 4 are correct.

    Answer: c

  34. When a library is planning for a new building project, which of the following technique (s)| is| are applicable to the plan and control the complex, long-term project?

    1. PERT

    2. TQM

    3. CPM

    4. MBO

    Codes:

    1. 1 and 3 are correct.

    2. 2 and 3 are correct.

    3. 1 and 4 are correct.

    4. 2 is correct.

    Answer: a

  35. Which of the following leadership style (s) are suitable for change management with persuation and inclusiveness?

    1. Authority

    2. Systems of Management

    3. Contingency

    4. Management

    Codes:

    1. 1, 2 are correct.

    2. 2, 3 are correct.

    3. 2, 4 are correct.

    4. 2 is correct.

    Answer: c

  36. Arrange in sequence, the steps in programming:

    1. Program code

    2. Program Documentation

    3. Program test

    4. Program design

    Codes:

    1. 3 2 1 4

    2. 4 1 3 2

    3. 4 3 2 1

    4. 2 4 1 3

    Answer: b

  37. Which of the following is/are the major activities/services of a library and networks in India?

    1. Consortium purchase

    2. Indexing of Internet resources

    3. Document delivery

    4. Staff training

    Codes:

    1. 1, 3, 4 are correct.

    2. 2, 3, 4 are correct.

    3. 1, 2, 3 are correct.

    4. 1, 2, 3, 4 are correct.

    Answer: a

  38. The normal curve in a distribution is

    1. Symmetrical, bell shaped continuously curve

    2. Asymmetrical, bell shaped continuously curve

    3. Symmetrical, bell shaped curve which does not touch the ‘X’ axis

    4. Bell shaped curve

    Codes:

    1. 1 and 4 are correct.

    2. 1 and 3 are correct.

    3. 2 and 4 are correct.

    4. 1 is correct.

    Answer: b

  39. Arrange the following MARC formats in order of year of their emergence:

    1. CAN MARC

    2. US MARC

    3. LC MARC

    4. MARC 21

    Codes:

    1. 1 2 3 4

    2. 2 3 4 1

    3. 3 1 2 4

    4. 4 2 3 1

    Answer: c

  40. Arrange in sequence the following committees in order of that year of commencement:

    1. Library Committee

    2. Committee on national network system for university libraries

    3. Review committee on Library Science

    4. Curriculum Development Committee on Library and Information Science

    Codes:

    1. 1 2 3 4

    2. 3 4 2 1

    3. 3 2 1 4

    4. 1 3 2 4

    Answer: d

  41. Match the following:

    List-I List-II
    1. Every unit of population has equal chance of being selected

    2. Every nth case is selected from the list of population

    3. Units are randomly selected from the subgroups

    4. Geographic area based units

    1. Systematic sampling

    2. Cluster sampling

    3. Random sampling

    4. Stratified sampling

    • A
    • B
    • C
    • D
      • 1
      • 4
      • 3
      • 2
      • 4
      • 2
      • 1
      • 3
      • 3
      • 1
      • 4
      • 2
      • 2
      • 3
      • 4
      • 1

    Answer: c

  42. Match the following:

    List-I List-II
    1. Approach of measuring two opposite sets of items

    2. Approach of measurement yielding a single score

    3. Approach of measurement adopting bipolar objective rating to study a social phenomenon

    4. Approach to measure interaction pattern among close associates in a variety of groups

    1. Semantic differential scale

    2. Cumulative scale

    3. Sociometric scale

    4. Summated scale

    • A
    • B
    • C
    • D
      • 2
      • 3
      • 1
      • 4
      • 3
      • 1
      • 4
      • 2
      • 1
      • 2
      • 4
      • 3
      • 4
      • 2
      • 1
      • 3

    Answer: d

  43. Match the following:

    List-I List-II
    1. Approach of measuring two opposite sets of items

    2. Approach of measurement yielding a single score

    3. Approach of measurement adopting bipolar objective rating to study a social phenomenon

    4. Approach to measure interaction pattern among close associates in a variety of groups

    1. Semantic differential scale

    2. Cumulative scale

    3. Sociometric scale

    4. Summated scale

    • A
    • B
    • C
    • D
      • 4
      • 1
      • 3
      • 2
      • 4
      • 3
      • 1
      • 2
      • 3
      • 1
      • 2
      • 4
      • 2
      • 1
      • 3
      • 4

    Answer: b

  44. Match the following:

    List-I List-II
    1. Algorith

    2. Flow charts

    3. Program code

    4. Program test

    1. Instruction to the computer

    2. Debuggng

    3. Pictorially represented direction lines

    4. Set of explicit and finite steps

    • A
    • B
    • C
    • D
      • 2
      • 3
      • 4
      • 1
      • 3
      • 1
      • 4
      • 2
      • 4
      • 3
      • 1
      • 2
      • 1
      • 2
      • 4
      • 3

    Answer: c

  45. Match the following:

    List-I List-II
    1. Cumulative Book Index

    2. Publisher's weekly

    3. Publishing in India

    4. Book seller

    1. DK Publishers & Distributors

    2. Whitaker

    3. Wilson

    4. RR Bowker

    • A
    • B
    • C
    • D
      • 2
      • 1
      • 4
      • 3
      • 3
      • 4
      • 1
      • 2
      • 1
      • 3
      • 2
      • 4
      • 4
      • 2
      • 1
      • 3

    Answer: b

  46. Match the following:

    List-I List-II
    1. INDEST AICTE

    2. CSIR consortia

    3. UGC Infonet

    4. IIM consortia

    1. Centrally funded

    2. Open

    3. Shared Budget

    4. Closed group

    • A
    • B
    • C
    • D
      • 2
      • 4
      • 1
      • 3
      • 1
      • 3
      • 2
      • 4
      • 3
      • 2
      • 4
      • 1
      • 4
      • 3
      • 1
      • 2

    Answer: a

  47. Match the following:

    List-I List-II
    1. Special library

    2. Public library

    3. National library

    4. Academic library

    1. Provides bibliographical services

    2. Conservation of knowledge

    3. Popularisation of Govt. Information

    4. Critical compilation

    • A
    • B
    • C
    • D
      • 1
      • 3
      • 4
      • 2
      • 2
      • 4
      • 1
      • 3
      • 3
      • 4
      • 1
      • 2
      • 4
      • 3
      • 1
      • 2

    Answer: d

  48. Match the following language and their function:

    List-I List-II
    1. Procedural

    2. Special purpose

    3. Practical extraction report

    4. Hyper text mark up

    1. Scan arbitrary files and extra information

    2. Manipulate data and change memory

    3. Create documents to view with web server

    4. Data base queries

    • A
    • B
    • C
    • D
      • 2
      • 4
      • 1
      • 3
      • 1
      • 3
      • 2
      • 4
      • 3
      • 4
      • 1
      • 2
      • 2
      • 3
      • 4
      • 1

    Answer: a

  49. Match the following:

    List-I List-II
    1. Information over load

    2. Variation in quality and reliability

    3. Multiplicity of language

    4. Information scatter

    1. Indexing and abstracting

    2. Translation

    3. Reviews and digests

    4. Alert services

    • A
    • B
    • C
    • D
      • 1
      • 2
      • 3
      • 4
      • 4
      • 3
      • 2
      • 1
      • 2
      • 4
      • 3
      • 1
      • 3
      • 1
      • 2
      • 4

    Answer: b

  50. Match the following:

    List-I List-II
    1. Coding

    2. Noise

    3. Entropy

    4. Equivocation

    1. Received signal not the one transmitted

    2. Measure of closeness of relationship

    3. Message to a signal

    4. Measure of uncertainty

    • A
    • B
    • C
    • D
      • 4
      • 2
      • 3
      • 1
      • 2
      • 3
      • 4
      • 1
      • 1
      • 2
      • 3
      • 4
      • 3
      • 1
      • 4
      • 2

    Answer: d

  51. Match the following:

    List-I List-II
    1. Information Theory

    2. Theory of Signs

    3. Triadic Relationships

    4. Doctrine of Signs

    1. Ogden and Richards

    2. Locke

    3. Shannon

    4. Morris

    • A
    • B
    • C
    • D
      • 2
      • 3
      • 4
      • 1
      • 3
      • 4
      • 1
      • 2
      • 1
      • 3
      • 4
      • 2
      • 2
      • 1
      • 3
      • 4

    Answer: b

  52. Match the following:

    List-I List-II
    1. Intra-Facet Relation

    2. Intra-Array Phase Relation

    3. Intra-Facet Phase Relation

    4. Inter-Subject Phase Relation

    1. S: 5210t3

    2. Q 20 m4

    3. SO b2

    4. X. 440j56

    • A
    • B
    • C
    • D
      • 4
      • 1
      • 2
      • 3
      • 4
      • 2
      • 3
      • 1
      • 2
      • 3
      • 1
      • 4
      • 1
      • 4
      • 3
      • 2

    Answer: a

  53. Match the following:

    List-I List-II
    1. Organisational chart

    2. Flow charts

    3. Activity charts

    4. Decision table

    1. Identification of responsibility for specific tasks

    2. Examine specific detailed procedure

    3. Division of responsibility & functions

    4. Diagrams composed of symbols and directional lines

    • A
    • B
    • C
    • D
      • 1
      • 4
      • 2
      • 3
      • 2
      • 3
      • 4
      • 1
      • 3
      • 4
      • 1
      • 2
      • 4
      • 2
      • 3
      • 1

    Answer: c

  54. Match the following:

    List-I List-II
    1. Information should be as accurate as possible

    2. Get the best title on any subject but add midiocres that are well read.

    3. Know the community's character and interest

    4. Consider the duration as well as intensity of the demand

    1. Broadus

    2. Haines

    3. McColvin

    4. Drury

    • A
    • B
    • C
    • D
      • 3
      • 4
      • 2
      • 1
      • 2
      • 3
      • 1
      • 4
      • 1
      • 2
      • 4
      • 3
      • 4
      • 1
      • 3
      • 2

    Answer: a

  55. Match the functions performed by different layers of OSI model:

    List-I List-II
    1. Delivery of Packets from source of destination

    2. Data transmission rate

    3. Access to network resources

    4. Provide hop-topop delivery

    1. Application layer

    2. Data link layer

    3. Network layer

    4. Physical layer

    • A
    • B
    • C
    • D
      • 1
      • 3
      • 2
      • 4
      • 2
      • 4
      • 1
      • 3
      • 3
      • 4
      • 1
      • 2
      • 3
      • 1
      • 4
      • 2

    Answer: c

  56. Match the following:

    List-I List-II
    1. Gender

    2. Information Technology

    3. Usership in lbraries

    4. Logical set of attributes

    1. Dependent variable

    2. Variable

    3. Binomial variable

    4. Independent variable

    • A
    • B
    • C
    • D
      • 1
      • 4
      • 2
      • 3
      • 3
      • 4
      • 1
      • 2
      • 2
      • 1
      • 4
      • 3
      • 4
      • 3
      • 2
      • 1

    Answer: b

  57. Match the following:

    List-I List-II
    1. The assessment device that appears to measure the subject matter it purports to

    2. The assessment device in which individual's test score predicts the probable behavior on a second variable

    3. The assessment device which adequately measures the major dimensions of the behavior under consideration

    4. The assessment device which appears to measure the general elements it purports to measure

    1. Content validity

    2. Construct validity

    3. Criterionrelated validity

    4. Face validity

    • A
    • B
    • C
    • D
      • 1
      • 2
      • 4
      • 3
      • 2
      • 1
      • 3
      • 4
      • 4
      • 3
      • 1
      • 2
      • 3
      • 1
      • 2
      • 4

    Answer: c

  58. Match the following:

    List-I List-II
    1. Behaviour studies

    2. Use studies

    3. User studies

    4. Information flow studies

    1. Extent of use of facilities/services

    2. Pattern of Science communication

    3. Interaction of user with communication system

    4. Use of communication medium

    • A
    • B
    • C
    • D
      • 1
      • 4
      • 2
      • 3
      • 3
      • 4
      • 1
      • 2
      • 2
      • 3
      • 1
      • 4
      • 2
      • 4
      • 3
      • 1

    Answer: b

  59. Match the following:

    List-I List-II
    1. National Library of the World

    2. Special Libraries

    3. Scientific and Technical Libraries

    4. Handbook of Special Libraries

    1. Wilfred Ashworth

    2. LJ Strauss

    3. A Esdaile

    4. CM Lewis

    • A
    • B
    • C
    • D
      • 1
      • 4
      • 3
      • 2
      • 2
      • 3
      • 4
      • 1
      • 3
      • 4
      • 2
      • 1
      • 4
      • 2
      • 3
      • 1

    Answer: c

  60. Match the following:

    List-I List-II
    1. Halftone

    2. Threshold

    3. Emulation

    4. Migration

    1. Translate instructions from original software to new platforms

    2. Imaging with varying densities

    3. Transfer of digital materials

    4. Minimum level to detect a signal

    • A
    • B
    • C
    • D
      • 1
      • 3
      • 4
      • 2
      • 3
      • 2
      • 4
      • 1
      • 2
      • 4
      • 1
      • 3
      • 2
      • 1
      • 3
      • 4

    Answer: c

    • Assertion (A): Colon classification is the most successful classification schemes in India.
    • Reason (R): The most important factor behind the success of any classification scheme is the revision and publication of different editions at regular intervals.
    1. Both A and R are true.

    2. A is true but R is false.

    3. A is false but R is true.

    4. Both A and R are false.

    Answer: c

    • Assertion (A): Proliferation of LIS schools in India produced mediocre professionals.
    • Reason (R): Curriculum and teaching techniques have not been upgraded at university level.
    1. Both A and R are partially true.

    2. Both A and R are false.

    3. A is true and R is false.

    4. A is false and R is true.

    Answer: a

    • Assertion (A): Several Library Science departments in India have shifted to integrated MLIS program.
    • Reason (R): MLIS Program (integrated) is a right solution to knowledge explosion in the field.
    1. Both A and R are false.

    2. A is true and R is false.

    3. Both A and R are true.

    4. A is false and R is true.

    Answer: b

    • Assertion (A): UGC is financially supporting all academic libraries.
    • Reason (R): UGC is primarily responsible for the overall development of libraries of higher education in India.
    1. A is false and R is true.

    2. A is true and R is false.

    3. Both A and R are true.

    4. Both A and R are false.

    Answer: a

    • Assertion (A): The entire scholarly publishing system is in danger of eroding due to increasing influence of predatory publishing.
    • Reason (R): Many prey on Junior researchers and graduate students with personalized messages praising their earlier work and inviting them to submit a new manuscript.
    1. A is true but R is false.

    2. A is false but R is true.

    3. Both A and R are false.

    4. Both A and R are true.

    Answer: d

    • Assertion (A): Metrics based evaluation is not suitable for assessing research performance of individual.
    • Reason (R): Construction of citation profiles depend upon the databases used.
    1. Both A and R are true.

    2. Both A and R are false.

    3. A is true, but R is false.

    4. A is false, but R is true.

    Answer: a

    • Assertion (A): Effective methods of communicating in H. R. Management of libraries still remains elusive.
    • Reason (R): The management do not have the needed direction of approach, precision of thoughts and their expression and empathy.
    1. A is true, R is false.

    2. Both A and R are false.

    3. A is true, R is partially true.

    4. A is false, R is true.

    Answer: c

    • Assertion (A): UDC is used in subject gateways for resource discovery with high recall.
    • Reason (R): In online environment, a faceted scheme has a distinct advantage over an enumerative one.
    1. A is true but R is false.

    2. A is true, R is partially true.

    3. A is false, R is true.

    4. A is partially true, R is true.

    Answer: a

    • Assertion (A): MARC should never be used outside the context of the cataloguing rules.
    • Reason (R): MARC is simply a coding scheme for entering bibliographic information into computer records.
    1. Both A and R are true.

    2. A is true but R is false.

    3. A is false but R is true.

    4. Both A and R are false.

    Answer: a

    • Assertion (A): Library Associations in India striving hard for the enactment of Library Acts.
    • Reason (R): Library Acts help in systematic development of libraries.
    1. Both A and R are true.

    2. Both A and R are false.

    3. A is true, R is false.

    4. A is false, R is true.

    Answer: d

    • Assertion (A): It is a time to separate the copyright issues for scholarly works from entertainment works.
    • Reason (R): The scholarly works are public funded fact based, collaborative and intellectual heritage of the institution.
    1. A is false and R is true.

    2. Both A and R are true but (R) is not the correct explanation of (A).

    3. Both A and R are false.

    4. A is true but R is false.

    Answer: b

    • Assertion (A): With quick and comprehensive availability of informative through internet resources, need for reference service with a human touch is decreasing.
    • Reason (R): Internet resources can satisfy all types of information needs of information seekers.
    1. A is true and R is false.

    2. Both A and R are false.

    3. A is false and R is true.

    4. A and R are true.

    Answer: a

    • Assertion (A): Scholar frequency to visit academic libraries has decreased tremendously over the period of last two decades.
    • Reason (R): E-scholarly resources are easily accessible to everyone from anywhere anytime.
    1. Both A and R are true.

    2. Both A and R are false.

    3. A is true, but R is false.

    4. A is false, but R is true.

    Answer: c

    • Assertion (A): H-index lacks sensitivity to performance changes.
    • Reason (R): It can never decrease and is insensitive to number of citations received.
    1. Both A and R are false.

    2. Both A and R are true.

    3. A is true but R is false.

    4. A is false, but R is true.

    Answer: b

    • Assertion (A): Z 39.50 standard protocol enables communication among networked computers through a single search interface.
    • Reason (R): Z 39.50 application in library consortia environment can enhance resource sharing.
    1. Both A and R are true.

    2. Both A and R are false.

    3. A is true and R is false.

    4. A is false and R is true.

    Answer: a