UGC NET Solved Question Paper-III [November 2017] Library and Information Science [Que. 41 to 75]

UGC NET Exam Date: 5th November, 2017 [Que. 41 to  75]

UGC NET Paper-III Solved Question Paper-November 2017

41. Arrange year-wise development of the following indexing systems:
(a) Relational Indexing by J.E.L. Farradane
(b) Chain Indexing by S.R. Ranganathan
(c) Subject Indexing by J.E. Coates
(d) PRECIS by Derek Austin

Code:
(1) (b), (a), (c), (d)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (c), (a), (b)
Answer: (1)

42. Arrange, from among the following, the areas of access-points in their proper sequence as given in ISBD.
(a) Notes
(b) Series
(c) Edition
(d) Material Specific details

Code:
(1) (a), (b), (c), (d)
(2) (c), (d), (b), (a)
(3) (b), (c), (d), (a)
(4) (d), (c), (b), (a)
Answer: (2)

43. Arrange the following connecting symbols of CC- 6th ed. according to their increasing ordinal value:
(a) ) (arrester)
(b) ← (backward arrow)
(c) → (forward arrow)
(d) 0 (zero)

Code:
(1) (b), (c), (d), (a)
(2) (a), (b), (c), (d)
(3) (c), (d), (b), (a)
(4) (d), (a), (c), (b)
Answer: (2)

44. Identify the correct sequence of indicator digits of Intra Facet Phase Relation as used in CC (6th edition).
(1) j k m n r
(2) j k m r o
(3) i j k m n
(4) j k m n q
Answer: (1)

45. Arrange in sequence the following subject classes according to their occurance in the schedules of DDC, 21st Ed.
(a) Food Technology
(b) Public Finance
(c) General Encyclopaedias
(d) Bibliographies

Code:
(1) (d), (b), (c), (a)
(2) (d), (c), (b), (a)
(3) (c), (b), (a), (d)
(4) (c), (a), (b), (d)
Answer: (2)

46. Arrange in sequence the Maslow’s hierarchy of needs:
(a) Social
(b) Esteem
(c) Physiological
(d) Safety

Code:
(1) (c), (d), (a), (b)
(2) (d), (b), (a), (c)
(3) (d), (a), (c), (b)
(4) (c), (a), (b), (d)
Answer: (1)

47. Arrange in sequence the following document titles alphabetically word by word :
(a) Bookfinder
(b) Bookkeeping made simple
(c) Book bytes
(d) Books that changed the world

Code:
(1) (a), (b), (c), (d)
(2) (b), (c), (d), (a)
(3) (c), (a), (b), (d)
(4) (c), (d), (a), (b)
Answer: (3)

48. Arrange the steps of the 8W’S Literacy Model in correct order as given by Annette Lamb:
(a) Webbing
(b) Wishing
(c) Wondering
(d) Weaving

Code:
(1) (c), (a), (b) and (d)
(2) (b), (a), (c) and (d)
(3) (c), (a), (d) and (b)
(4) (c), (b), (a) and (d)
Answer: (3)

49. Match the following sources with their corresponding functions:

List – I List – II
(a) Counter (i) Tracking e-resources usage statistics
(b) Affinity string (ii) Impact factor
(c) Link resolver (iii) Tracking online usage by user categories
(d) Journal of citation report (iv) Number of times users’ connectivity to a resource

Code:

.           (a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (ii)        (iv)       (iii)       (i)
(3)        (i)         (iii)      (iv)       (ii)
(4)        (iv)       (ii)        (i)         (iii)
Answer: (3)

50. Match the following consortiums with their corresponding locations:

List – I List – II
(a) UGC-DAE Consortium (i) Manesar (Gurgaon)
(b) ERMED-India Consortium (ii) Gandhinagar, (Ahmedabad)
(c) DeLCON-DBT’s E-Library Consortium (iii) Indore
(d) e-Shodh Sindhu (iv) New Delhi

Code:

.           (a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (iv)       (iii)       (ii)        (i)
(3)        (i)         (ii)        (iii)      (iv)
(4)        (ii)        (i)         (iv)       (iii)
Answer: (1)

51. Match the following leading Abstracting and Indexing tools/Databases with their corresponding Publishers/Content Providers:
List – I                                      List – II
(a) LISA                                   (i) NISCAIR
(b) ILSA                                   (ii) EBSCO
(c) LISTA                                  (iii) IASLIC
(d) Indian Science Abstracts       (iv) ProQuest

Code:
.           (a)        (b)        (c)       (d)
(1)        (iv)       (iii)       (ii)        (i)
(2)        (i)         (ii)       (iii)       (iv)
(3)        (ii)        (iv)       (i)        (iii)
(4)        (iii)       (i)        (iv)       (ii)
Answer: (1)

52. Match the following threats to ‘information society’ with the corresponding concept:

List – I

List – II

(a) Compromises intellectual Property (i) Confiscation of equipment or information
(b) Deliberate acts of theft (ii) Unauthorized access to data
(c) Deliberate acts of information extortion (iii) Piracy
(d) Deliberate acts of espionage or trespass (iv) Blackmail of information disclosure.

Code:
.           (a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (iv)       (ii)        (iii)       (i)
(3)        (i)        (ii)        (iii)       (iv)
(4)        (iii)       (i)        (iv)       (ii)
Answer: (4)

53. Match the following:

List – I List – II
(a) Political Map (i) Features of land
(b) Route Map (ii) Roads and bridges, etc.
(c) Physical Map (iii) Limiting territorial boundaries
(d) Thematic Map (iv) Mining, agriculture, etc.

Code:
.           (a)        (b)        (c)        (d)
(1)        (iv)       (i)         (ii)        (iii)
(2)        (i)         (ii)        (iii)       (iv)
(3)        (iii)       (ii)        (i)         (iv)
(4)        (ii)        (iii)       (i)         (iv)
Answer: (3)

54. The MARC Field 264 has different second indicator values to indicate separate data elements in RDA. Match these second indicator values with the respective data elements:

List – I List – II
(a) −0 (i) Distribution statement
(b) −1 (ii) Publication statement
(c) −2 (iii) Manufacture statement
(d) −3 (iv) Production statement

Code:
.           (a)        (b)        (c)        (d)
(1)        (iv)       (ii)        (i)         (iii)
(2)        (iii)       (ii)        (iv)       (i)
(3)        (ii)        (iv)       (iii)       (i)
(4)        (i)         (ii)       (iii)       (iv)
Answer: (1)

55. Match the following mechanisms of information processing with corresponding service as given by S. Seetharama:

List – I List – II
(a) Announcement (i) Translation Service
(b) Evaluation (ii) Current Awareness Service
(c) Document access (iii) Indexing Service
(d) Accretion (iv) State-of-the-art report

Code:
.           (a)        (b)       (c)       (d)
(1)        (iii)       (ii)       (iv)        (i)
(2)        (ii)        (iv)       (i)         (iii)
(3)        (i)         (iii)      (ii)        (iv)
(4)        (iv)       (i)        (iii)       (ii)
Answer: (2)

56. Match the following queries with corresponding type of reference service:

List – I

List – II

(a) Communication with Library Staff through VoIP (i) Asynchronous reference service
(b) Reference query through e-mail (ii) Online reference service
(c) Use of e-resources seeking answers (iii) Virtual Reference Desk
(d) Webforms (iv) Reference interview

Code:
.           (a)        (b)      (c)        (d)
(1)        (iv)       (iii)      (i)        (ii)
(2)        (i)        (ii)      (iv)       (iii)
(3)        (iii)      (i)       (ii)        (iv)
(4)        (ii)       (iv)      (iii)       (i)
Answer: (3)

57. Match the following with corresponding explanation:

List – I

List – II

(a) Embargo (i) Publisher’s list of new titles
(b) Big Deal (ii) Authorization for regular shipment of new editions of specific products
(c) Front List (iii) Publisher’s restriction one-resource access
(d) Standing order (iv) large bundled e-journal package of single publisher on discounted price

Code:
.           (a)        (b)       (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (i)         (iv)       (iii)       (ii)
(3)        (iv)       (ii)        (i)         (iii)
(4)        (ii)        (iii)       (i)         (iv)
Answer: (1)

58. Match the following NISO (National Information Standard Organisation) standards with their corresponding descriptions applicable to Libraries:

List – I List – II
(a) Z 39.41 (i) Dublin core Metadata Element set
(b) Z 39.63 (ii) Syntax for Digital Object Identifier (DOI)
(c) Z 39.84 (iii) Inter library loan data elements
(d) Z 39.85 (iv) Printed information on spines

Code:
.          (a)        (b)        (c)        (d)
(1)        (i)         (ii)       (iii)       (iv)
(2)        (iii)       (ii)       (iv)        (i)
(3)        (iv)       (iii)       (ii)        (i)
(4)        (ii)        (i)        (iii)       (iv)
Answer: (3)

59. Match the following:

List – I

List – II

(a) Counter (i) Article metric
(b) PLoS ALMs (ii) Author metric
(c) ORC ID (iii) All metric
(d) Social Media citations (iv) Journal metric

Code:
.           (a)        (b)        (c)        (d)
(1)        (iii)       (iv)       (i)         (ii)
(2)        (iv)       (i)         (ii)        (iii)
(3)        (ii)        (iv)       (iii)       (i)
(4)        (i)         (iv)       (ii)        (iii)
Answer: (2)

60. Match the following Office Products with their corresponding Producers/Organizations:

List – I

List – II

(a) Open Office (i) IBM
(b) MS-Office (ii) Apache Foundation
(c) Lotus Note (iii) Apple
(d) iWork (iv) Microsoft Corporation

Code:
.           (a)      (b)        (c)        (d)
(1)        (i)       (ii)        (iii)      (iv)
(2)        (ii)      (iv)       (i)        (iii)
(3)        (i)       (iv)       (iii)      (ii)
(4)        (iv)      (ii)        (i)        (iii)
Answer: (2)

61. Match the following statements with corresponding research process:

List – I

List – II

(a) What is the role of MOOCs in imparting LIS education? (i) Hypothesis
(b) EDUCAUSE (2013) “Selective institutions can be democratized via MOOCs”. (ii) Analytical statement
(c) MOOCs programmes will replace distance Learning in LIS (iii) Formulation of the problem
(d) Though MOOCs is advantageous, majority respondents preferred distance learning (iv) Literature study

Code:
.           (a)        (b)       (c)       (d)
(1)        (iii)       (iv)       (i)        (ii)
(2)        (ii)        (iii)      (iv)       (i)
(3)        (iv)       (ii)       (iii)       (i)
(4)        (i)         (ii)       (iv)       (iii)
Answer: (1)

62. Match the following Online Survey Development Cloud based Software Applications/tools with their corresponding founders:

List – I

List – II

(a) Survey Monkey (i) Christian Vanek and Scott Mc Daniel- (Colorado, USA)
(b) Type Form (ii) Gordon Tan-Brisbane (Austria)
(c) Client Heartbeat (iii) Robert Munoz and David Okuniev-Barcelona (Spain)
(d) Survey Gizmo (iv) Ryan Finley- Sanmateo, California (USA)

Code:
.           (a)        (b)      (c)       (d)
(1)        (i)        (ii)       (iii)       (iv)
(2)        (iv)       (iii)      (ii)        (i)
(3)        (ii)        (iv)      (i)        (iii)
(4)        (iii)       (i)        (iv)      (ii)
Answer: (2)

63. Match the following with their corresponding year of launching:

List – I

List – II

(a) National Mission on Manuscripts (i) 2003
(b) National Mission on Libraries (ii) 2007
(c) National Mission on Monuments and Antiquities (iii) 2012
 (d) National Knowledge Network (iv) 2010

Code:
.           (a)        (b)      (c)        (d)
(1)        (i)        (iii)      (ii)       (iv)
(2)        (iv)       (iii)      (ii)       (i)
(3)        (iii)      (ii)       (i)         (iv)
(4)        (ii)       (iv)      (iii)        (i)
Answer: (1)

64. Assertion (A): The copyright system, born and bred for print technology, faces a technological revolution in its environment.
Reason (R): The old print technology’s broadcast model of one to many communication is replaced with many to many global connectivity.

Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer: (3)

65. Assertion (A): Avoidance of difficult reference questions are usually an outcome of momentary panic in the face of a seemingly impenetrable question.
Reason (R): Reference never adhere to few helpful tips such as developing handy-referral systems, both with in and outside the reference area, and fail to establish a context for the questions to counter such panic attack.

Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
Answer: (1)

66. Assertion (A): In collection development, pamphlets do not require frequent review like books and journals.
Reason (R): Pamphlet’s information value is likely to be short lived, their physical format is usually flimsy and subject to rapid deterioration.

Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false
Answer: (2)

67. Assertion (A): The content-based indexing techniques enable identification of wanted persons in photographs of crowds.
Reason (R): The content-based indexing system uses all sorts of characteristics of the image to guess what it is about.

Code:
(1) (A) is true but (R) is false.
(2) (A) is false but (R) are true.
(3) Both (A) and (R) are false.
(4) Both (A) and (R) are true.
Answer: (4)

68. Assertion (A): In Gold Open Access, costs are not transferred to authors.
Reason (R): Gold Open Access journals publish peer-reviewed articles without paid subscription barriers for their readers.

Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer: (2)

69. Assertion (A): In recent years, QR codes have become ubiquitous and may replace the use of bar codes.
Reason (R): QR is a two – dimensional code with large capacity for storage. These codes hold information both horizontally and vertically and can be scanned by users with their smart phones at ease.

Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false
Answer: (2)

70. Assertion (A): Librarians usually prefer to provide access to e-content for the users via a proxy server, allowing authorized library users to access content from outside the physical confines of a library.
Reason (R): Proxy-server access is possible without IP-address recognition.

Code:
(1) Both (A) and (R) are true.
(2) Both (A) and (R) are false.
(3) (A) is true, but (R) is false.
(4) (A) is false, but (R) is true.
Answer: (3)

71. Assertion (A): ‘Web Assembly’, a standard that enables applications to run securely in browsers (without the use of Plug-ins) is a people-friendly application in using Web.
Reason (R): A web language transforms the way people use their devices and the web making applications are more accessible to people at ease all over the globe.

Code:
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
Answer: (2)

72. Assertion (A): Grounded Theory methods in Qualitative research start from same set of assumptions as traditional Quantitative research design.
Reason (R): The inductive nature of these Grounded Theory methods allows the key issues emerge rather than force them into pre conceived categories.

Code:
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) Both (A) and (R) are false.
(4) (A) is false, but (R) is true
Answer: (4)

73. Assertion (A): The fundamental need of a hypothesis is to guide sound research.
Reason (R): Without hypothesis, research is focused and do not become a random empirical wandering.

Code:
(1) (A) is true, but (R) is false.
(2) (A) is false, but (R) is true.
(3) Both (A) and (R) are true.
(4) Both (A) and (R) are false.
Answer: (1)

74. Assertion (A): Traditional Knowledge Resource Classification (TKRC) is an innovative structured classification system useful for the systematic arrangement, dissemination and retrieval of all subjects.
Reason (R): It is structured, based on International Patent Classification.

Code:
(1) (A) is true, but (R) is false.
(2) Both (A) and (R) are true.
(3) (A) is false, but (R) is true.
(4) Both (A) and (R) are false.
Answer: (3)

75. Identify the resource sharing and document delivery principles as given by IFLA.

(a) Each country should accept responsibility for providing access to its own publications to any other country.
(b) Supplying libraries should accept requests submitted in hardcopy only.
(c) From the moment a library dispatches an item to a requesting library until it returns the supplying library is responsible for any loss or damage incurred.
(d) Each country should aim to develop an efficient national resource sharing system.

Code:
(1) (a) and (b) are correct.
(2) (b) and (c) are correct.
(3) (a) and (d) are correct.
(4) (b) and (d) are correct.

Answer: (3)

Visits: 66