January 12, 2014

UGC NET JUNE 2012 PAPER II


1. Who was the Chairman of ‘National Policy on Library & Information Systems’ (1986) ?

2. The significance of the year 2011 for LIS education in India is

3. Digital Reference Service can be offered through

4. “Biotechnology” is formed as a result of

5. The order of significance of “Thing, Material and Action” among various components of a compound subject was expanded by

6. Relational Database is

7. “Shodhganga” is a repository of

8. Which of the following tests can be employed for hypothesis testing ?

9. ‘RRRLF’ falls under the :

10. “Internet Public Library” is being maintained by

11. What are the major driving forces behind an ‘Information society’ ?
(i) R T I
(ii) I. C. T.
(iii) Internet
(iv) I. T. ACT
Codes :

12. Which libraries are functioning as depository libraries ?
(i) Delhi Public Library
(ii) Connemara Public Library
(iii) British Council Library
(iv) Central Reference Library
Codes :

13. Which of the following are ‘Inclusive geographical sources’
(i) Maps
(ii) Atlases
(iii) Encyclopaedias
(iv) Yearbooks
Codes :

14. Which principles are corollary to Wallpicture principle ?
(i) Cow-calf principle
(ii) Principle of later-in-time
(iii) Whole – organ principle
(iv) All of the above
Codes :

15. The factors that influence computer file organisation are
(i) Speed of access
(ii) Storage space
(iii) Fixed length fields
(iv) File volatility
Codes :

16. Major problems of ‘Information Communication Technology’ are
(i) Information overload
(ii) Information insecurity
(iii) Lack of innovative technologies
(iv) Lack of control over communication
Codes:

17. Which of the following are ‘Open Source Content Management Systems’?
(i) Drupal
(ii) Atex
(iii) Joomla
(iv) OpenCms Codes :

18. Which of the following are not styles of citation? (i) Anglo American Cataloguing Rules
(ii) MLA Handbook for Writers of Research Papers
(iii) Chicago Manual of Style
(iv) Little Science Big Science
Codes :

19. Which of the following are Schools of Management thought ?
(i) Scientific Management School
(ii) Human Behavioural School
(iii) Classical School
(iv) School of Authority
Codes :

20. Assertion (A) : Users can have access to large number of e-journals.
Reason (R) : Users are not aware of using e-journals.
Codes :

21. Assertion (A) : Book selection must be done judiciously.
Reason (R) : Resource sharing is the need of the hour.
Codes :

22. Assertion (A) : Primary sources provide most authentic information for research.
Reason (R) : Primary sources are highly unorganised.
Codes :

23. Assertion (A) : Abstracting services facilitate literature review.
Reason (R) : Literature review summarises major findings of various studies.
Codes :

24. Assertion (A) : “Name Authority File” should be used in a library.
Reason (R) : All works of an author should be collocated.
Codes :

25. Assertion (A) : Classification plays a significant role in online retrieval.
Reason (R) : Classification played an important role in manual system.
Codes :

26. Assertion (A) : If changes cannot be adopted to its framework, the organisational equilibrium will be imbalanced.
Reason (R) : Organisation works in an environment which is marked by dynamic characteristics.
Codes :

27. Assertion (A) : There is need to continuous evaluation and appreciation of value of libraries.
Reason (R) : There is economic pressure on public budget.
Codes :

28. Assertion (A) : System analysis identifies the flow of work. Reason (R) : System analysis is not necessary if the library is automated.
Codes :

29. Arrange the following associations according to their year of establishment :
(i) IASLIC
(ii) ASLIB
(iii) ALA
(iv) SLA
Codes :

30. Arrange the following according to their year of enactment in India :
(i) Freedom of Information Act
(ii) Right to Information Act
(iii) Copyright Act (Revised)
(iv) Information Technology Act
Codes :

31. Arrange the following publications according to their year of origin.
(i) Social Science Citation Index
(ii) L I S A
(iii) Library Literature and Information Science
(iv) Library Journal
Codes :

32. Arrange the following according to their year of origin :
(i) Broad System of Ordering
(ii) Classification in Online Systems
(iii) Automated Keyword Classification
(iv) Classification Research Group
Codes:

33. Arrange the following according to their year of origin :
(i) Bradford’s Law
(ii) Lotka’s Law
(iii) Statistical Bibliography
(iv) Zipf’s Law
Codes :

34. “Prevention of Cholera in India” generates following index terms according to modified ‘Chain Indexing’, arrange them in correct order
(i) India
(ii) Cholera
(iii) Disease
(iv) Treatment
(v) Medicine
Codes :

35. Arrange the following according to their year of first publication :
(i) Encyclopaedia Britannica
(ii) Encyclopaedia Americana
(iii) Encyclopaedia of Library and Information Science
(iv) McGraw-Hill Encyclopaedia of Science and Technology
Codes :

36. Arrange the following according to their year of establishment :
(i) NIC
(ii) DESIDOC
(iii) NISCAIR
(iv) NASSDOC
Codes :

37. Arrange the following Public Library Acts according to their year of enactment :
(i) Uttar Pradesh PL Act
(ii) Arunachal Pradesh PL Act
(iii) Orissa PL Act
(iv) Gujarat PL Act
Codes :

38. Match the following :

LIST 1 LIST 2
(a) Obligation of the State (i) First Law
(b) Shelf Arrangement & Catalogue (ii) Second Law
(c) Open Access & Shelf Arrangement (iii) E-consortia
(d) Library location/hours (iv) Fourth Law
Codes : (a) (b) (c) (d)

39. Match the following :

LIST 1 LIST 2
(a) Asian Recorder (i) Location of specific volume of journal
(b) Union Catalogue of Scientific Serials (ii) Articles on Green Revolution
(c) Books-in- Print (iii) Obituary of Dev - Anand
(d) Social Science Index (iv) Availability of books
Codes : (a) (b) (c) (d)

40. Match the following :

LIST 1 LIST 2
(a) User orientation (i) Bibliographic service
(b) Information repackaging (ii) Reference service
(c) Translation (iii) Digest series
(d) Indexing (iv) Support service
Codes : (a) (b) (c) (d)

41. Match the following :

LIST 1 LIST 2
(a) Textual representation (i) Pascal
(b) Computer language (ii) Gopher
(c) Network tool (iii) Boolean operators
(d) Searching technique (iv) ASCI
Codes : (a) (b) (c) (d)

42. Match the following :

LIST 1 LIST 2
(a) Law of Parsimony (i) Classification
(b) Principle of Osmosis (ii) F. W. Lancaster
(c) Paperless Society (iii) Overall economy
(d) APUPA pattern (iv) Reclassification
Codes : (a) (b) (c) (d)

43. Match the following :

LIST 1 LIST 2
(a) Hubs (i) A physical layer device used to interconnect the media segments of an extended network
(b) Repeater (ii) A physical layer device that connects multiple computers each via a dedicated cable
(c) Bus Topology (iii) Multiple bridges known for transfer of data between different parts
(d) Switches (iv) A straight line data highway that carries network information from one network station to another
Codes : (a) (b) (c) (d)

44. Match the following :

LIST 1 LIST 2
(a) RRRLF (i) Delhi
(b) Connemara Public Library (ii) Patna
(c) NISCAIR (iii) Kolkata
(d) Khuda Baksh Oriental Public Library (iv) Chennai
Codes : (a) (b) (c) (d)

45. Match the following :

LIST 1 LIST 2
(a) Right man at right library (i) Annual financial statement
(b) Budget (ii) Deployment
(c) Journal (iii) TQM
(d) Identifying user’s views and expectations (iv) ISSN
Codes : (a) (b) (c) (d)

46. Read the passage given below, and answer the questions based on your understanding of the passage. (Question Nos. 46-50) The primary concern with the longevity of digital documents is the “viewing problem” (Besser, 2000). Unlike analog or physical information, which tends to exist independent of human involvement, digital information needs constant intervention to survive. History has shown that digital documents are problematic by default. Whereas we can actually look at the Sistine Chapel ceiling, painted 500 years ago, it is difficult if not impossible to simply view documents on 8-in. Floppy disks created in the last 20 years, even if there has been an immediate, proactive role in preserving them. Without concerted effort on the part of archivists and preservationists, digital objects quickly become obsolete or inaccessible due to unforeseen, although anticipated, advances in information technology. The variable media art community currently utilizes four digital preservation strategies, all focused on the end product. The first three methods have technical origins and are based on general digital preservation practices. Related to “the viewing problem”, they are : refreshing, the upgrade of storage mechanisms; migration, the premeditated upgrade of file formats; and emulation, which focuses on development of operating systems able to run obsolete media. The fourth option, developed by and for the new media art community, is reinterpretation (Depocas et al., 2003), where the curators attempt to recreate a work given comprehensive documentation of the original artefact. Migration and emulation are the two primary methods in managing the problem of obsolete file formats (Waters & Garrett, 1996). Migration focuses on the files themselves, periodically updating files in new software formats. The second method of preservation is emulation, which can be either at the system or the software level. System emulation focuses on developing systems that mimic the hardware used to create or run the original artefact.
Q.NO 46. Why digital objects become inaccessible quickly ?

47. Reinterpretation is a digital preservation strategy where curator intends to

48. What is the focus of system emulation ?

49. Which of the following is true about migration preservation strategy ?

50. Refreshing preservation strategy focuses on

Score =
Correct answers:

No comments:

Post a Comment