Maharashtra SET Exam (MH-SET)-2020 Solved Question Paper-Library & Information Science [Que.61-75]

MH-SET Question Paper 2020-Que. 61 to Que. 75

Maharashtra SET 2020 Solved Question Paper- Library & Information Science

Following are the solved question and Answers of the Maharashtra SET 2020 of subject Library & Information Science.
Que No. 61 to Que. No. 75 with Answer

61. Flow diagram, PERT and CPM are known as the techniques of ___.
(A) Work analysis
(B) Leadership
(C) Survey
(D) Communication
Answer: (A) Work Analysis

62. Theory X and Theory Y were propounded by_____?
(A) F. W. Taylor
(B) Abraham Maslow
(C) Peter Drucker
(D) Douglas McGregor
Answer: (D) Douglas McGregor

Explanation:

  • Theory X and Theory Y’ was first introduced by Douglas McGregor – a MIT professor, in his book The Human Side of Enterprise’ published in 1960.

63. Edward Deming was _____________.
(A) a Chinese professor
(B) an American professor
(C) a Japanese professor
(D) a British professor
Answer: (B) an American professor

64. Inserting spurious data or information into an organization’s system to disrupt or overload services is called:
(A) Interruption
(B) Interception
(C) Modification
(D) Fabrication
Answer: (D) Fabrication

65. Assertion (A): Social networking tools are effective for marketing of library products and  services.
    Reason (R): They help to reach out users anywhere and at anytime.

(A) Both (A) and (R) are true
(B) Both (A) and (R) are false
(C) (A) is true and (R) is false
(D) (A) is false and (R) is true
Answer: (A) Both (A) and (R) are true

66. Arrange the following measures according to their Bytes contained in them:
(a) Exabyte
(b) Yottabyte
(c) Zettabyte
(d) Petabyte

(A) (a), (b). (c) and (d)
(B) (c). (a), (b) and (d)
(C) (d). (a), (c) and (b)
(D) (a), (c), (c) and (d)
Answer: (C) (d). (a), (c) and (b)

Explanation: These are the memory measuring units of computer. Byte is a basic unit for measuring computer information. A byte is usually made of eight bits & Yottabyte is a very large number that human can evaluate.

  • Petabyte (1024 TB. 1015)
  • Exabyte (1024 PB. 1018)
  • Zettabyte (1024 EB, 1021)
  • Yottabyte (1024 ZB, 1024)

67. Arrange the following steps in programming in a proper logical sequence:
(a) Program code
(b) Program documentation
(c) Program test
(d) Program design

(A) (a), (b), (c) and (d)
(B) (b). (a), (c) and (d)
(C) (d). (a), (c) and (b)
(D)(c). (a), (b) and (d)
Answer: (C) (d). (a), (c) and (b)

68. Match the following:
(a) Fumigation ——————— (i) Acquisition
(b) Buidling library collection —– (ii) Preservation
(c) Kardex system —————– (iii) Reference service
(d) Information desk————— (iv) Recording of periodicals

(A) (a)-(iv). (b)-(iii), (c)-(ii), (d)-(i)
(B) (a)-(iii), (b)-(i), (c)-(iv), (d)-(ii)
(C) (a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
(D) (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii)
Answer: (D) (a)-(ii), (b)-(i), (c)-(iv), (d)-(iii)

69. Assertion (A): There is no difference between information management and knowledge management.
    Reason (R): Information and knowledge are sometimes used synonymously.

(A) (A) is true but (R) is false
(B) (A) is false but (R) is true
(C) Both (A) and (R) are true
(D) Both (A) and (R) are false
Answer: (B) (A) is false but (R) is true

70. Assertion (A): RDA is a new content standard for cataloguing and replaces AACR2.
     Reason (R): AACR2 is not a content standard.

(A) (A) is true but (R) is false
(B) (A) is false but (R) is true
(C) Both (A) and (R) are true
(D) Both (A) and (R) are false
Answer: (A) (A) is true but (R) is false

71. Which of the following facets are associated with the session layer?
(a) Diaglog control
(b) Token management
(c) Semantics of the information transmitted
(d) Synchronization

(A) a. b, and d are correct
(B) a, c and d are correct
(C) a and c are correct
(D) c and d are correct
Answer: (A) a. b, and d are correct

72. An attempt to make computer resources unavailable to its intended user is called :
(A) Virus attack
(B) Worm attack
(C) Denial-of-Service Attack
(D) Botnet process
Answer: (C) Denial-of-Service Attack

73. Which layers of the OSI reference model are host to host layers?
(a) Transport layer
(b) Network layer
(c) Session layer
(d) Data Link Layer

(A) (a) and (b) are correct
(B) (b) and (c) are correct
(C) (a) and (c) are correct
(D) (b) and (d) are correct
Answer: (C) (a) and (c) are correct

74. Program which is used to control system performance is classified as________?
(A) Experimental program
(B) System program
(C) Specialized program
(D) Organized program
Answer: (B) System program

75. LOCKSS is an initiative of which university ?
(A) MIT university
(B) Stanford university
(C) University of Waikato
(D) University of Southampton
Answer: (B) Stanford University

Also Read:

For Quick Updates & Alert Join our: Telegram Channel

Visits: 755

Leave a Reply

Your email address will not be published. Required fields are marked *