UGC Net
UGC Net
Previous Year
UGC NET
Library and Information Science
December 2024
Abdul Moid
PhD, AMU, Aligarh
4. Which type of plagiarism occurs when a person combines phrases or ideas from multiple
sources into a single work without attribution?
1. Patch work plagiarism
2. Self-plagiarism
3. Verbatim plagiarism
4. Minimalistic plagiarism
Patchwork plagiarism (also known as mosaic plagiarism) occurs when someone combines
phrases, ideas, or text from multiple sources into a single work without proper attribution.
The result is a "patchwork" of copied content that is presented as original work, even though it is
derived from various sources.
Self-plagiarism occurs when an individual reuses their own previously published work or
ideas without proper citation or disclosure. It is considered unethical because it misrepresents
old work as new.
Verbatim plagiarism is the direct copying of text word-for-word from a source without quotation
marks or proper attribution. It is one of the most blatant forms of plagiarism.
Minimalistic plagiarism is not a recognized type of plagiarism. It might refer to minor or less
obvious instances of plagiarism, but it is not a standard term in academic or ethical discussions.
Materials with cultural importance: While some ephemeral materials may have cultural
significance, this is not a defining characteristic of ephemeral literature.
Ephemeral literature refers to written or printed materials that are typically produced for short-
term use and are not intended to be retained or preserved for long periods. These materials are
often transient in nature and serve immediate, practical purposes. Examples of ephemeral
literature include:
While ephemeral literature is not usually intended for long-term retention, some items may gain
historical or cultural significance over time and be preserved in archives or collections.
Source: https://www.ifla.org/g/environment-sustainability-and-libraries/ifla-green-library-
definition/
9. According to Colon Classification, which ACI is used to form class number for
"Biography of Prime Minister"?
1. w
2. v
3. y7
4. y1
10. Arrange books published by Dr. S. R. Ranganathan in chronological order of their year
of publication.
1. Elements of Library Classification
2. Prolegomena to Library Classification
3. Colon Classification
4. Library Manual
5. Classification and International Documentation
Choose the most appropriate answer from the options given below:
1. C, D, B, A, E
2. C, A, B, D, E
3. C, B, A, E, D
4. E, D, C, B, A
Publication
Book Name
Year
1. The Five Laws of Library Science 1931
2. Colon Classification 1933
a. 2nd edition 1939
b. 3rd edition 1950
c. 4th edition 1952
d. 5th edition 1957
e. 6th edition 1960
3. Classified Cataloguing Code 1934
4. Library Administration 1935
5. Prolegomena to Library Classification 1937
a. 2nd edition 1957
b. 3rd edition 1967
6. Suggestion for the Organization of Libraries in India 1946
7. Classification and Communication 1951
8. Philosophy of Library Classification 1951
9. Library Manual 1951
10. Library Book Selection 1952
a. 2nd edition 1966
11. Heading and Canons 1955
12. Reference Service 1961
13. Documentation and its Facets 1963
14. Ramanujan: The Man and the Mathematician 1967
15. Documentation: Genesis and Development 1973
16. A Librarian Looks Back: An Autobiography of Dr. S. R
1992
Ranganathan
17. Arrange the following metrics in chronological order of their year of inception:
A. SNIP
B. CiteScore
C. Eigenfactor
D. Crindes
E. Altmetric
Choose the most appropriate answer from the options given below:
1. C, A, E, B, D
2. D, B, C, A, E
3. B, E, D, C, A
4. E, A, C, D, B
→ Eigenfactor: Incepted in 2007
→ SNIP: Introduced in 2010
→ Altmetric: Established in 2011
→ CiteScore: Launched in 2016
→ Crindes: Released in 2017
19. The original issue of Oxford English Dictionary was issued under the title-
1. International Dictionary' of the English Language
2. New English Dictionary on Historical Principles
3. Dictionary of English Language on Historical Principles
4. Comprehensive English Dictionary on Historical Principles
→ The Oxford English Dictionary was first conceived in the mid-19th century and began
publication in 1884 under the title "A New English Dictionary on Historical Principles"
(NED).
→ It was later renamed the Oxford English Dictionary (OED) in 1933 when the first edition
was completed and reissued in 12 volumes.
→ The OED is renowned for its comprehensive coverage of the English language, including
the history and evolution of words.
21. Which statement is not the about the difference between Mendeley and Zotero?
1. Mendeley has more extensive filtering options than Zotero
2. Mendeley offers broader accessibility options, Zotero is available as a website only
3. Mendeley provides more versatile support system including online chat, helping guides
and a blog, Zotero mainly on its FAQ.
4. Mendeley's advantage over Zotero is direct reference formatting on the platform
23. In Shannon and Weaver's model of communication, what is the primary function of the
'encoder'?
1. To interpret the message
2. To transmit the message
3. To convert the message into signals
4. To receive the message
Source: https://www.communicationtheory.org
→ Transmitter - This is also known as the encoder. This is the person or machine used to
convert the message into a signal that can be relayed from a sender to a receiver. The model
was initially created to explain how communication occurs using radio waves and binary
numbers in computers and telephones.
24. Match the Digital Library Standards with their respective purpose.
LIST-I LIST-II
(Digital library standard) (Purpose)
A. Dublin Core I. Digital Object Packaging
B. OAI-PMH II. Persistent Identification
C. METS III. Metadata Description
D. DOI IV. Data Harvesting
Choose the correct answer from the options given below:
1. A-I, B-III, C-IV, D-II
2. A-II, B-IV, C-I, D-III
3. A-III, B-II, C-IV, D-l
4. A-III, B-IV, C-I, D-II
Dublin Core
→ Year Established: 1995
→ A set of standardized metadata elements used to describe digital and physical resources.
→ Designed for cross-domain information retrieval and resource discovery.
→ Includes 15 core elements such as Title, Creator, Subject, Description, Publisher, Date,
Format, Identifier, and Language.
→ Widely used in libraries, archives, and digital repositories.
→ Supports interoperability between systems.
OAI-PMH (Open Archives Initiative Protocol for Metadata Harvesting)
→ Year Established: 1999
→ A protocol for harvesting metadata from repositories.
→ Enables interoperability between digital archives and repositories.
→ Uses Dublin Core as a default metadata format but supports other formats.
→ Based on HTTP and XML.
→ Key operations: Identify, ListMetadataFormats, ListSets, ListIdentifiers, ListRecords, and
GetRecord.
→ Facilitates the creation of large-scale digital libraries by aggregating metadata.
METS (Metadata Encoding and Transmission Standard)
→ Year Established: 2001
→ A standard for encoding descriptive, administrative, and structural metadata for digital
objects.
→ Developed and maintained by the Library of Congress.
→ Used for packaging digital library objects, such as books, images, or audio files.
→ Includes sections for:
25. Which of the following is not true about Dianst as an architecture for digital library?
1. It is a protocol for service communication in digital library architecture.
2. It has structured document model.
3. It specifies operational characteristics of core digital services
4. It provides centralized architecture for digital library
→ DIANST stands for "Digital Information Access Network Standard" and is a protocol
designed for communication between different digital library services. It facilitates
interoperability between various digital libraries by providing a standardized way to
exchange information.
→ Key features of DIANST:
• Distributed architecture: Unlike a centralized system, DIANST promotes a distributed
architecture where different digital libraries can interact with each other through the
protocol, allowing for flexibility and scalability.
• Structured document model: DIANST utilizes a structured document model to
represent digital objects, making it easier to search and retrieve specific information
within documents.
• Service communication: The protocol defines how different digital library services can
communicate and exchange data with each other.
→ Therefore, while DIANST does have a structured document model, specifies operational
characteristics of core digital services, and acts as a protocol for service communication,
it does not inherently provide a centralized architecture for a digital library; instead, it
facilitates communication in a distributed digital library environment.
List of awards given by CILIP (UK) based on the information you provided:
1. Yoto Carnegie Medals for Writing and Illustration
• Description: The UK's oldest children's book awards, recognizing outstanding writing and
illustration in books for children and young people.
• Established: 1936 (Carnegie Medal for Writing), 1955 (Kate Greenaway Medal for
Illustration).
• Renamed: In 2022, the awards were rebranded as the Yoto Carnegie Medals following
sponsorship by Yoto.
2. Aspire Award
• Description: A bursary awarded to early-career professionals to attend the CILIP Conference.
• Years Active: 2011–2018.
• Purpose: Supported by donations, it aimed to help members at the start of their careers.
3. Honorary Fellowship
• Description: The highest recognition for individuals who have made an outstanding
contribution to the library and information world.
• Example: Honorary Fellowship presentation in 2017.
4. Mentor of the Year Award
• Description: Recognizes outstanding CILIP mentors who help others expand their knowledge
and skills in the sector.
• Example: 2018 winner Yvette Jeal.
5. CILIP Cymru Wales Team of the Year Award
• Description: Celebrates the achievements of teams working within library and information
services in Wales.
• Status: A relatively new award.
6. Tir na n-Og Award
• Description: Recognizes excellence in children’s literature in Wales.
• Established: 1976.
• Purpose: Honors and promotes books for children and young people.
27. Match the following theories of classification with their respective propounder
LISM LIST-II
(Theory) (Propounder)
A. Descriptive Theory I. J. D. Brown
B. One Place II. E. C. Richardson
C. Criteria of Classification III. E. W. Hume
D. Literary Warrant IV. Henry Bliss
28. Choose the correct answer from the options given below:
1. A-IV B-I, C-II, D-III
2. A-II, B-III, C-IV, D-I
3. A-IV, B-III, C-II, D-I
4. A-III, B-IV, C-II, D-I
29. Arrange the following IPR related international treaties in the order of their adoption.
A. Berne Convention
B. TRIPS Agreement
C. Paris Convention
D. WIPO Copyright Treaty
E. Patent Cooperation Treaty
Choose the most appropriate answer from the options given below:
1. A, C, E, B, D
2. C, A, E, B, D
3. A, B, C, D, E
4. C, A, E, D, B
Listed of Intellectual Property Rights (IPR) related international treaties:
1. Paris Convention (1883)
• Full Name: Paris Convention for the Protection of Industrial Property.
• Adopted: March 20, 1883.
• Focus: Protection of industrial property, including patents, trademarks, and industrial
designs.
• Key Feature: Established the principle of "national treatment" and "right of priority."
2. Berne Convention (1886)
• Full Name: Berne Convention for the Protection of Literary and Artistic Works.
• Adopted: September 9, 1886.
• Focus: Protection of literary and artistic works (copyright).
• Key Feature: Introduced the principle of "automatic protection" without the need for
registration.
3. Patent Cooperation Treaty (1970)
• Full Name: Patent Cooperation Treaty.
• Adopted: June 19, 1970.
30. Arrange the following public library developments in India in chronological order.
A. Report submission of the National Policy on Library and Information System (NAPLIS)
B. Launch of the National Mission on Libraries (NML)
C. Enactment of the Public Libraries Act in Tamil Nadu
D. Establishment of the Raja Rammohan Roy Library Foundation (RRRLF)
E. Formation of the Delhi Public Library under UNESCO assistance.
Choose the most appropriate answer from the options given below:
1. C, E, A, B, D
2. D, A, C, B, E
3. C, E, D, A, B
4. D, C, A, B, E
• Significance: It plays a key role in providing financial assistance and guidance to state central
libraries and rural libraries.
4. Report submission of the National Policy on Library and Information System (NAPLIS)
(1986)
• Year: 1986.
• Details: The National Policy on Library and Information System (NAPLIS) report was
submitted by the Working Group appointed by the Government of India.
• Significance: It aimed to create a comprehensive framework for the development of library
and information services in India.
5. Launch of the National Mission on Libraries (NML) (2014)
• Year: 2014.
• Details: The National Mission on Libraries (NML) was launched by the Ministry of Culture,
Government of India, to modernize and improve public library services.
• Significance: It focuses on digitization, infrastructure development, and capacity building in
public libraries.
1. BlogSpot (1999)
• Year: 1999.
• Details: BlogSpot (later rebranded as Blogger) was launched by Pyra Labs as one of the
earliest blogging platforms.
• Significance: It allowed users to create and manage blogs easily, contributing to the rise of
the blogging culture.
2. LinkedIn (2003)
• Year: 2003.
• Details: LinkedIn was founded by Reid Hoffman and a team of professionals as a platform
for professional networking.
• Significance: It became the leading social network for career development, job searching,
and professional connections.
3. ResearchGate (2008)
• Year: 2008.
• Details: ResearchGate was launched by Ijad Madisch, Sören Hofmayer, and Horst
Fickenscher as a platform for scientists and researchers to share papers, collaborate, and
network.
• Significance: It became a key tool for academic and scientific collaboration.
4. Twitter (2006)
• Year: 2006.
• Details: Twitter was created by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams as a
microblogging platform.
• Significance: It revolutionized real-time communication and became a major platform for
news, trends, and public discourse.
5. Snapchat (2011)
• Year: 2011.
• Details: Snapchat was founded by Evan Spiegel, Bobby Murphy, and Reggie Brown as a
multimedia messaging app with disappearing messages.
• Significance: It introduced the concept of ephemeral content and became popular among
younger users.
• Conversely, a narrow folksonomy arises when users, typically fewer in number and
sometimes including the item's creator, assign unique tags to an item, with each tag being
used only once.
33. Match the following State Library Acts in order of their enactment.
LIST-I LIST-II
(States) (Year of enactment)
A. Mizoram I. 2002
B. Odisha II. 2009
C. Bihar III. 1993
D. Arunachal Pradesh IV. 2008
Choose the correct answer from the options given below:
1. A-III, B-I, C-IV, D-II
2. A-III, B-IV C-II, D-I
3. A-I, B-II, C-IV D-III
4. A-IV, B-III, C-II, D-I
3. Karnataka 1965
4. Maharashtra 1967
6. Manipur 1988
7. Kerala 1989
8. Haryana 1989
9. Mizoram 1993
34. Which is the correct sequence in the chronological order of their publication.
A. Jewett's Cataloguing Code
B. Cutter's Cataloguing Code
C. AACR
D. Classified Cataloguing Code
E. Anglo-American/Joint Code
Choose the most appropriate answer from the options given below:
1. A, B, E, D, C
2. B, E, D, A, C
3. D, E, A, C, B
4. A, D, C, E, B
35. In Universal Decimal Classification (UDC) connecting symbol square bracket [ ] is used
for__
1. Language
2. Place
3. Form
4. Subgrouping
: colon relation
36. Which of the following sources can be consulted to know the impact factor of journal
publication?
A. EBSCO
B. Web of Science
C. ScienceDirect
D. SCOPUS
E. JSTOR
Choose the most appropriate answer from the options given below:
1. A, B and C only
2. B and E only
3. C and D only
4. B and D only
Library and Information Science Abdul Moid, PhD, AMU
25 UGC NET DEC 2024
● Web of Science: This is a primary source for finding the Journal Impact Factor (JIF), which
is calculated and published annually in the Journal Citation Reports (JCR) by Clarivate
Analytics.
● SCOPUS: While it does not provide the traditional Impact Factor, it offers the SCImago
Journal Rank (SJR) and CiteScore, which are alternative metrics for evaluating journal
impact.
The Impact Factor (IF) is a metric used to evaluate the relative importance of a journal within
its field. It is calculated based on the average number of citations received per paper published in
that journal during the two preceding years. Here's the formula and an example:
Example:
Let’s assume we are calculating the Impact Factor for Journal XYZ for the year 2023.
1. Citations in 2023 to articles published in 2021 and 2022:
o Citations to 2021 articles: 150
o Citations to 2022 articles: 200
o Total citations = 150 + 200 = 350
2. Number of citable articles published in 2021 and 2022:
o Citable articles in 2021: 100
o Citable articles in 2022: 120
o Total citable articles = 100 + 120 = 220
3. Impact Factor (IF) for 2023:
Key Notes:
● The Impact Factor is calculated and published annually in the Journal Citation Reports
(JCR) by Clarivate Analytics.
● Only citable items (e.g., research articles, reviews) are included in the denominator. Non-
citable items like editorials, letters, or news items are excluded.
● The Impact Factor is widely used but has limitations, such as being influenced by a small
number of highly cited papers and not accounting for differences in citation practices across
fields.
Alternative Metrics: If you are using SCOPUS, you might encounter CiteScore or SCImago
Journal Rank (SJR):
Example: If a journal receives 5,000 citations over 4 years and publishes 1,000 documents, its
CiteScore is 5.0.
SCImago Journal Rank (SJR): This metric considers both the number of citations and the
prestige of the citing journals (weighted by their SJR scores). It is more complex to
calculate.
37. Which of the following are true about document type definition (DTD)?
A. ADTD defines the structure and attributes of an XML document.
B. With DTD, independent group of people can agree on a standard for interchanging data.
C. If DTD is declared inside XML file, it must be wrapped inside the <!DTD> definition.
D. The Library of Congress has made available a DTD to convert MARC records to XML.
E. DTD is used to ensure the authenticity of data transmitted across the web.
Choose the most appropriate answer from the options given below:
1. A, B and D only
2. A, C and E only
3. B, D and E only
4. B, C and D only
● A document type definition (DTD) is a specification file that contains set of markup
declarations that define a document type for an SGML-family markup language (GML,
SGML, XML, HTML). The DTD specification file can be used to validate documents.
● A DTD defines the valid building blocks of an XML document. It defines the document
structure with a list of validated elements and attributes. A DTD can be declared inline
inside an XML document, or as an external reference.
● A namespace-aware version of DTDs is being developed as Part 9 of ISO DSDL
(Document Schema Definition Languages). DTDs persist in applications that need
special publishing characters, such as the XML and HTML Character Entity References,
which derive from larger sets defined as part of the ISO SGML standard effort. XML uses
a subset of SGML DTD.
● As of 2009, newer XML namespace-aware schema languages (such as W3C XML Schema
and ISO RELAX NG) have largely superseded DTDs as a better way to validate XML
structure.
● The Library of Congress developed this DTD as part of their efforts to standardize the
exchange of bibliographic information in a digital environment.
● the Library of Congress provides a Document Type Definition (DTD) that allows users to
convert MARC records (bibliographic data format) into XML format, which is known as
38. CERT-In (The Indian Computer Emergency Response Team) has been designated to
perform the following functions:
A. Collection, analysis and dissemination of information on cyber incidents.
B. Forecast and alert of cyber security incidents.
C. Issue guidelines, activities, vulnerability notes and white papers relating to information
security practices.
D. Emergence measures for handling national disaster management incidents.
E. Coordination of cyber incidents response activities.
Choose the most appropriate answer from the options given below:
1. A, C, D and E only
2. B, C, D and E only
3. A, B, C and E only
4. A, B, D and E only
➔ CERT-In is operational since January 2004. The constituency of CERT-In is the Indian
Cyber Community. CERT-In is the national nodal agency for responding to computer
security incidents as and when they occur. In the Information Technology Amendment Act
2008, CERT-In has been designated to serve as the national agency to perform the
following functions in the area of cyber security:
o Collection, analysis and dissemination of information on cyber incidents.
o Forecast and alerts of cyber security incidents
o Emergency measures for handling cyber security incidents
o Coordination of cyber incident response activities.
o Issue guidelines, advisories, vulnerability notes and whitepapers relating to information
security practices, procedures, prevention, response and reporting of cyber incidents.
o Such other functions relating to cyber security as may be prescribed
39. What protocol is specifically designed for secure HTTP communication by adding
SSL/TLS encryption?
1. FTP
2. SMTP
3. TCP/IP
4. SHTTP
HTTPS uses an encryption protocol to encrypt communications. The protocol is called Transport
Layer Security (TLS), although formerly it was known as Secure Sockets Layer (SSL). This
protocol secures communications by using what's known as an asymmetric public key
infrastructure.
✓ NASSDOC,
✓ Research Surveys,
ICSSR 1969 New Delhi, India ✓ Fellowships and Grants,
✓ Journal Publications,
✓ Capacity Building Programs.
✓ WIPO GREEN,
✓ WIPO Arbitration and Mediation
Center, Global Innovation Index
WIPO 1967 Geneva, Switzerland
(GII),
✓ Accessible Books Consortium
(ABC)
41. Arrange the following library associations in chronological order of their establishment
year.
A. Indian Library Association 1933
B. Bengal Library Association 1925
C. Punjab Library Association 1929
D. Maharashtra Library Association 1921
E. Madras Library Association 1927
Choose the most appropriate answer from the options given below:
1. D, E, B, C, A
2. E, D, C, B, A
3. B, C, D, A, E
4. A, B, C, D, E
● The Delhi Library Association (DLA) is guided by an elected Executive Committee, its
policy-making body.
● The General Body, consisting of life members, ordinary members, and institution members,
elects a General Secretary and 15 Executive Committee members every two years.
● Founded on March 10, 1939, and registered under the Societies Act xxi of 1860 (registration
number 161/1940-41), DLA adopted its constitution, rules, and regulations in May 1940.
● It went through a period of inactivity after the country's partition in 1947 but was revived in
1953.
● DLA has six primary objectives:
o To promote the library movement in Delhi.
International Advocacy Advocates for libraries at global forums like the United
Nations, UNESCO, and WIPO. Promotes the role of libraries
in achieving the UN Sustainable Development Goals (SDGs).
Library Map of the World An online platform that provides data and stories about how
libraries contribute to the SDGs.
IFLA Trend Report Identifies emerging trends in the information society and their
implications for libraries.
IFLA Green Library Award Recognizes libraries that demonstrate environmental
sustainability and promote green practices.
Major Programs
World Library and IFLA's annual international conference that brings together
Information Congress (WLIC) library professionals from around the world to share
knowledge, best practices, and innovations.
IFLA International Leaders A leadership development program for emerging library
Programme professionals to build skills and networks.
Building Strong Library A capacity-building program to strengthen library
Associations (BSLA) associations in developing countries.
International Advocacy Supports libraries in advocating for their role in national and
Programme (IAP) international policy-making.
IFLA WLIC Fellowship Provides opportunities for library professionals from
Programme developing countries to attend the WLIC.
FAIFE (Committee on Promotes intellectual freedom and opposes censorship in
Freedom of Access to libraries.
Information and Freedom of
Expression)
Key Guidelines and Standards
IFLA School Library Provides a framework for developing and managing school
Guidelines libraries to support education.
IFLA Public Library Service Offers best practices for delivering high-quality public library
Guidelines services.
IFLA Digital Reference Standards for providing digital reference services in libraries.
Guidelines
IFLA Cataloguing Principles Guidelines for creating consistent and interoperable
cataloging systems.
IFLA Preservation and Best practices for preserving and conserving library materials.
Conservation Guidelines
IFLA Multicultural Library Encourages libraries to serve multicultural communities and
Manifesto promote cultural diversity.
IFLA Guidelines for Library Recommendations for making libraries accessible to
Services to Persons with individuals with dyslexia.
Dyslexia
IFLA Guidelines for Supports lifelong learning and professional development for
Continuing Professional library staff.
Development
Special Projects
Marrakesh Treaty Supports libraries in implementing the Marrakesh Treaty to
Implementation improve access to published works for visually impaired
persons.
IFLA Repository An open-access repository for IFLA publications, including
conference papers, reports, and guidelines.
IFLA Library Stat of the A series of infographics highlighting library statistics and
Week their impact on communities.
IFLA Climate Change Promotes the role of libraries in addressing climate change
Initiative through education and community engagement.
Additional Information
IFLA Library Map of the A representative source of basic library statistics and a robust
World tool providing country-level data and a worldwide
comparison of different library performance metrics by
region. Designed and developed by Community Attributes
Inc.
Source: https://librarymap.ifla.org/
43. Which of the following statements are true about topologies in computer networks?
A. Star topology relies on a central hub for communication.
B. Mesh topology eliminates the need for a central node.
C. Bus topology is most fault tolerate topology.
D. Ring topology connects devices in a closed loop.
E. Tree topology is a hierarchical topology where multiple star networks are connected with
a central hub.
Choose the most appropriate answer from the options given below:
1. A, B, D and E only
2. A, C, D and E only
3. B, C, D and E only
4. A, B, C and D only
Source: https://digitalmediaglobe.com/
A "topology" in computer networking refers to the arrangement of devices within a network,
defining how they are connected and communicate with each other; the most common topologies
include: Bus, Star, Ring, Mesh, and Tree, each with its own advantages and disadvantages
depending on the network size and complexity.
Bus Topology:
● Structure: All devices are connected to a single cable (the "bus") which acts as the
communication backbone; data travels along this cable to reach its destination.
● Pros: Simple to set up, cost-effective for small networks.
● Cons: Single point of failure (if the cable breaks, the entire network is down), difficult to
troubleshoot, not suitable for large networks.
Star Topology:
● Structure: All devices are connected to a central hub or switch, which acts as the
communication center.
● Pros: Easy to manage, adding or removing devices is simple, fault isolation is easier.
● Cons: If the central hub fails, the entire network is affected.
Ring Topology:
● Structure: Devices are connected in a closed loop, with data passing from one device to the
next in a single direction.
● Pros: Efficient data flow, no collisions.
● Cons: If one device fails, it can disrupt the entire network, making it difficult to add or remove
devices.
Mesh Topology:
● Structure: Each device is connected to every other device in the network, creating multiple
redundant paths for data transmission.
● Pros: Highly reliable, fault tolerant, good for large, complex networks.
● Cons: Requires a large number of cables, complex to set up and manage.
Tree Topology:
● Structure: Resembles a tree structure, with a hierarchical arrangement of devices where nodes
are connected to parent nodes.
● Pros: Scalable for large networks, easy to expand by adding new branches.
● Cons: Can be complex to manage, a failure at the root node can affect large portions of the
network.
44. Which of the following platforms provide a mobile application for library patrons to
track their book loans?
A. Tidal
B. Libby
C. Spotify
D. Overdrive
E. Borrow Box
Choose the most appropriate answer from the options given below:
1. A, C and E only
2. A, B and D only
3. B, D and E only
4. B, C and D only
45. Even being a member of “Advisory Committee for Libraries,” who could not participate
in committee work at all.
A. A. J. Mathai
B. T. D. Waknis
C. B. S. Kesavan
D. S. S. Saith
E. D. R. Kalia
Choose the most appropriate answer from the options given below:
1. A and E only
2. B and D only
3. C and E only
4. B and C only
➔ PRECIS is an acronym for PREserved Context Index System or PREserved Context Indexing
System. PRECIS is a computer assisted pre-coordinate subject indexing system developed by
Derek Austin in 1968 as a result of long research which the Classification Research Group
(CRG) undertook to give a new general classification for information control. In 1969 British
librarians Derek Austin and Peter Butcher issued PRECIS: A rotated subject index system,
published by the Council of the British National Bibliography. This appears to be the first
published report on an innovative method for adding subject data in the form of descriptors to
the computerized MARC record. This system is considered as the most important development
in alphabetical approach to subject specification in recent years.
➔ Concept of PRECIS
The concept of PRECIS deals with terms, strings, and role operators.
Term: A term is a verbal representation of a concept. It may consist of one or more words.
String: An ordered sequence of component terms, excluding articles, connectives, prepositions,
etc., preceded by role operators is called a string. The string represents the subject of the document.
Role Operators: The Operators are the code symbols which show the function of the component
term and fix its position in the strings. These role operators are meant for the guidance of the
indexers only and do not appear in the index entry.
Preparation of String
The main or the most important activity in PRECIS indexing is the formation of the string. The
preparation of string constitutes the following points:
o Context dependence
o One-to-one relationship
o Provision of role operators
The component terms are arranged in such a way that they are context dependent, at the same time
they are interrelated to each other.
Format of Entry
In order to achieve the goal of The Predicate Transformation PRECIS makes the use of
context dependency and one- Format is used when the term inverted format when any
to-one relation, PRECIS has representing an agent (3) term is provided the role
adopted a display format, appears as a lead term operators (4), (5) or (6) and
which constitutes three parts: prefixed by one of the these terms appear as Lead
operators 2 or s or t. When terms. When it happens so,
Lead: ‘Lead’ position serves such a situation arises, 2 or s the dependent elements are
as the users’ approach term, or t is shifted to Display presented in italics (or
by which a user may search position from the Qualifier underlined if handwritten)
the index. position. after a hyphen and the terms
in the Qualifier position are
➔ PRECIS was first adopted by BNB, later on, a number of agencies went to accept the system.
Among the other national bibliographies that adopted PRECIS are Australia, Malaysia, and
South Africa.
➔ Besides these, a number of libraries in Britain are practicing it. A number of pilot projects are
also practicing and for creating indexes to statistical, public and other records.
➔ PRECIS was replaced at the British National Bibliography (BNB) by COMPASS in 1996,
which was later replaced by Library of Congress Subject Headings.
49. Arrange the following steps in a logical sequence to be performed by the acquisition
module of any LMS.
A. Received documents
B. Duplicate checking
C. Preparing and mailing orders
D. Processing invoice and accessioning of documents
E. Verification and modification of actual bibliographic information
Choose the most appropriate answer from the options given below:
1. C, D, B, E, A
2. B, C, A, E, D
3. B, C, E, D, A
4. A, C, B, D, E
50. Arrange the following databases according to their year of launch/inception in ascending
order.
A. Hathi Trust
B. DOAJ
C. ScienceOpen
D. SSRN
E. NDLTD
Choose the most appropriate answer from the options given below:
1. A, C, B, E, D
2. D, E, B, A, C
3. A, B, C, D, E
4. B, E, A, C, D
51. Match the following databases with their metadata service provider.
LIST-I LIST-II
(Database) (Hosting Institutions/ Body)
A. Aminer I. Harvard University
B. Astrophysics Data System II. DAI & University of Cologne
C. ATLA Religion Database III. Tringhua University
D. Arachne IV. EBSCO
Choose the correct answer from the options given below:
1. A-III, B-II, C-I, D-IV
2. A-IV, B-III, C-I, D-II
3. A-II, B-I, C-III, D-IV
4. A-III, B-I, C-IV, D-II
→ AMiner (formerly ArnetMiner) is a free online service used to index, search, and mine
big scientific data.
→ It was initiated and created by Professor Jie Tang from Tsinghua University, China in
March 2006.
→ The Astrophysics Data System (ADS) is a digital library portal for researchers in
astronomy and physics, operated by the Smithsonian Astrophysical Observatory
(SAO) under a NASA grant, Havard University.
→ The Atla Religion Database (ATLA RDB) is an index of academic journal articles in
the area of religion. It is updated monthly and published by the American Theological
Library Association. EBSCO is its provider/hosting body.
→ iDAI.objects arachne (short form: Arachne) is the central object-database
(administrator: Reinhard Förtsch) of the German Archaeological Institute (DAI) and the
Cologne Digital Archaeology Laboratory (CoDArchLab) at the University of Cologne.
→ DBLP is a computer science bibliography website. Starting in 1993 at Universität Trier
in Germany, it grew from a small collection of HTML files and became an organization
hosting a database and logic programming bibliography site.
→ CogPrints is an electronic archive in which authors can self-archive papers in any area of
cognitive science. CogPrints is moderated by Stevan Harnad. The archive was
launched in 1997 and now contains over 2000 freely downloadable articles.
→ The Collection of Computer Science Bibliographies (1993–2023) was one of the oldest
(if not the oldest) bibliography collections freely accessible on the Internet.
→ CiteSeerX (formerly called CiteSeer) is a public search engine and digital library for
scientific and academic papers, primarily in the fields of computer and information
science. CiteSeer was created by researchers Lee Giles, Kurt Bollacker and Steve
Lawrence in 1997 while they were at the NEC Research Institute (now NEC Labs),
Princeton, New Jersey, US.
→ SSRN was founded in 1994 by Michael C. Jensen and Wayne Marr, both financial
economists.
→ arXiv (pronounced as "archive"—the X represents the Greek letter chi ⟨χ⟩ is an open-
access repository of electronic preprints and postprints (known as e-prints) approved for
posting after moderation, but not peer review.
52. What is the primary goal during the "preservation" phase of the information life cycle?
1. To ensure information is made accessible and used effectively.
2. To ensure that information is stored securely and backed up.
3. To archive and protect information for long term retention.
4. To delete outdated and unnecessary information.
54. Arrange the following stages of planning for retrospective conversion process.
A. Carefully draw documents procedures for efficient workflow.
B. Identify the necessary training for the staff.
C. Clearly identify the objectives.
D. Identify the equipments requirements.
E. Specify standards to be used.
Choose the most appropriate answer from the options given below:
1. A, B, C, D, E
2. B, D, C, E, A
3. A, E, B, D, C
4. C.A, E, D, B
55. Which of the following are the necessary elements of an information society?
A. Confidentiality
B. Vulnerability
C. Integrity
D. Personality
E. Availability
Choose the most appropriate answer from the options given below:
1. A, C and E only
2. B, C and D only
3. C, D and E only
4. B, D and E only
57. Which of the following organizations is responsible for managing 'Open DOAR'?
1. The National Library of Medicine
2. University of Nottingham
3. The British Library
4. National Science Foundation
58. A key challenge in scholarly communication today is the increasing concern about in the
academic publishing industry, particularly regarding access costs and "pay wall" model.
1. Open Access
2. Profitability
3. Ethics
4. Sustainability
61. Arrange the following Indexing Systems chronologically as per their inception.
A. PubMed
B. Google Scholar
C. IEEXplore
D. DOAJ
E. PsycInfo
Choose the most appropriate answer from the options given below:
1. E, A, C, D, B
2. A, E, B, D, C
3. C, E, D, A, B
4. B, C, A, D, E
→ PsycINFO - Established in 1967.
→ PubMed - Launched in 1996 as part of the National Library of Medicine's online
services.
→ IEEE Xplore - Established in 2000, providing access to electrical engineering and
computer science literature.
→ DOAJ - Launched in 2003, providing access to open access journals.
→ Google Scholar - Launched in 2004 as a freely accessible search engine for academic
content.
62. Which of the following retrieval metrics is a harmonic mean of recall and precision?
1. Cumulative gain
2. Discounted cumulative gain
3. Normalized discounted cumulative gain
4. F1 Score
→ The F1 score combines the values of precision and recall by calculating their harmonic
mean, effectively providing a single metric that balances the importance of both aspects.
→ Cumulative Gain (CG): This metric simply sums up the relevance scores of retrieved
results, without considering their ranking order.
→ Discounted Cumulative Gain (DCG): This metric is similar to CG but penalizes lower
ranked relevant results by applying a discount factor.
→ Normalized Discounted Cumulative Gain (nDCG): This metric is a normalized
version of DCG, allowing for comparison between different query sets.
64. If an academic library reports a significant increase in the use of digital resources but a
decline in the borrowing of print materials, what can be inferred?
A. The library users prefer digital formats for convenience.
B. The library's physical collection is outdated.
C. There is a lack of awareness about print resources among users.
D. The library has not focused on promoting its physical collection.
E. Digital resources are more accessible and easier to use compared to print materials.
Choose the most appropriate answer from the options given below:
1. A, B and D only
2. A, C and D only
3. A, C and E only
4. A, B and E only
65. Match the following Standard Subdivisions (Table-1) of DDC (19th edition) with their
notation.
LIST-I LIST-II
(Standard Sub-division) (Notation)
A. Serials Publication I. -07
B. Philosophy and Theory II. -05
C. Collection III. -01
D. A Study and Teaching IV. -08
Choose the correct answer from the options given below:
1. A-I, B-IV, C-II, D-III
2. A-II, B-III, C-IV, D-I
3. A-IV, B-III, C-I, D-II
4. A-I, B-II, C-III, D-IV
66. Match the paradigms of programming languages with their respective features.
LIST-II LIST-I
(Feature) (Paradigm)
A. Object-oriented I. Based on mathematical functions
B. Functional II. Sequential execution of instructions
C. Procedural III. Encapsulation and inheritance
D. Declarative IV. Describes what to do, not how to do it
Choose the correct answer from the options given below:
1. A-II, B-IV, C-I, D-III
2. A-IV, B-III, C-II, D-I
3. A-III, B-I, C-II, D-IV
4. A-I, B-II, C-III, D-IV
→ Object-oriented: Key features include "objects" which encapsulate data and behavior,
allowing for inheritance and code reuse through class structures.
→ Functional: Focuses on functions as first-class citizens, where functions can be passed as
arguments and returned as results, often with a focus on immutability and avoiding side
effects, resembling mathematical functions.
→ Procedural: Programs are structured as a series of steps, with functions called in a
sequential order, essentially describing the "how to" of a problem.
→ Declarative: Describes the desired outcome without specifying the exact steps to achieve
it, emphasizing "what to do" rather than "how to do it".
69. Which of the following is an objective of the West Bengal Public Libraries Act, 1979?
1. To develop libraries as educational resources.
2. To introduce library automation.
3. To provide library services in rural areas.
4. To establish a public library network.
→ Following the IFLA Strategy 2024-2029, the award will help in advancing the profession
through illuminating the role of libraries and librarians in the advancement of
sustainability standards and the promotion of specialized knowledge within professional
practice.
→ The prize is awarded in two categories:
o Category 1: Best Green Library / Grand Scale Project
o Category 2: Best Green Library Project
71. Information technology used with human intelligence simulation is used in the creation
of:
1. Artificial Intelligence System
2. Machine Learning System
3. Learning Management System
4. Expert System
Intellectual Entities: These represent the conceptual or logical content, such as a digital
collection, dataset, or work, which is to be preserved. It’s the highest-level concept in the
preservation model.
Objects: These are the actual digital representations (files or bitstreams) that are preserved.
Objects are the tangible entities that get stored and managed.
Events: These are actions or processes that occur to digital objects (such as creation, migration,
or format transformation) and are crucial to track for preserving the digital object’s integrity over
time.
Rights: This entity deals with the intellectual property rights and access control associated with
digital objects, ensuring proper management and protection of rights.
Agents: These represent the individuals or organizations responsible for the creation,
management, or preservation of digital objects, including software tools used to process or
migrate data.
73. Which multiplexing technique divides the available bandwidth into fixed-size time slots?
1. Wavelength Division Multiplexing (WDM)
2. Code Division Multiplexing (CDM)
3. Time Division Multiplexing (TDM)
4. Frequency Division Multiplexing (FDM)
→ Time Division Multiplexing (TDM) works by allocating specific time slots to each
individual signal, allowing them to be transmitted sequentially over the same channel.
→ Wavelength Division Multiplexing (WDM) separates signals based on different
wavelengths of light, not time slots.
→ Code Division Multiplexing (CDM) distinguishes signals using unique codes, not time
slots.
→ Frequency Division Multiplexing (FDM) divides the bandwidth into different
frequency ranges, not time slots.
✓ Definition: The p-value is the probability of obtaining results as extreme as the observed
results (or more extreme) if the null hypothesis is true.
✓ Null Hypothesis: The p-value is used to assess the strength of evidence against the null
hypothesis (usually stating there is no effect or no difference).
✓ Low p-value (≤ 0.05): A small p-value suggests strong evidence against the null
hypothesis, leading to its rejection. This indicates that the observed data is unlikely under
the assumption of the null hypothesis.
✓ High p-value (> 0.05): A large p-value suggests weak evidence against the null
hypothesis, meaning we fail to reject it. It implies that the observed data is likely under
the null hypothesis.
✓ Not the Probability of the Null Hypothesis: The p-value does not tell us the probability
that the null hypothesis is true. It only helps to determine whether or not we can reject it
based on the data.
✓ Threshold (Significance Level): Researchers often use a threshold, commonly 0.05, to
decide whether the p-value is small enough to reject the null hypothesis. If p ≤ 0.05, we
reject the null hypothesis; if p > 0.05, we fail to reject it.
✓ Context Matters: The interpretation of the p-value depends on the context of the study
and the sample size. A very small p-value could be due to a large sample size, even for a
trivial effect.
✓ Limitations: The p-value does not provide information about the magnitude of an effect
or the practical significance of the results. It only indicates whether the results are
statistically significant or not.
→ The p-value is used in the context of null hypothesis testing to quantify the statistical
significance of a result, the result being the observed value of the chosen statistic.
→ The lower the p-value is, the lower the probability of getting that result if the null
hypothesis were true.
→ A result is said to be statistically significant if it allows us to reject the null hypothesis.
→ The chance that one commits type-l errors is known as the type-l error rate or
significance level (p-value) this number is conventionally and arbitrarily set to 0.05 (5%).
→ In simple words, the p-value is the probability of type-1 error computed after data
analysis is done
→ If the p-value is below your threshold of significance (typically p < 0.05), then you can
reject the null hypothesis, but this does not necessarily mean that your alternative
hypothesis is true.
The OpenURL Framework Standard defines an architecture for creating OpenURL Framework
Applications. An OpenURL Framework Application is a networked service environment, in
which packages of information are transported over a network. These packages have a
description of a referenced resource at their core, and they are transported with the intent of
obtaining context-sensitive services pertaining to the referenced resource. To enable the
recipients of these packages to deliver such context-sensitive services, each package describes
the referenced resource itself, the network context in which the resource is referenced, and the
context in which the service request takes place.
76. Abstract that provides important information about original, summerising the original,
principal arguments and principal data, is known as:
1. Critical abstract
2. Indicative abstract
3. Informative abstract
4. Highlight abstract
Types of Abstracts:
1. Descriptive Abstract: A brief summary (50-100 words) outlining the purpose, scope, and
focus of the document. It gives an overview but is less helpful for assessing relevance
compared to informative abstracts.
2. Listing Abstract: Organized as a list, presenting content in a clear, itemized format.
3. Slanted Abstract: Focuses on specific sections of a document, emphasizing areas of
particular interest or relevance for a specific audience.
4. Pseudo Abstract: A placeholder or preliminary summary for a paper that hasn’t been written
yet.
5. Informative Abstract: Provides a complete summary of the document, covering the
background, methods, findings, and conclusions. Typically, around 250 words.
6. Critical Abstract: Analyzes and assesses the paper's content with detailed commentary,
often including comparisons. Usually longer (400-500 words).
7. Highlight Abstract: A brief abstract used to attract attention, but not a comprehensive
summary. It’s rare in academic use.
77. Match the different types of storage technology with their unique characteristics.
LIST-I (Storage Technology) SSD RAM LIST-II (Characteristics)
A. SSD I. Uses magnetic platters
B. RAM II. Non-volatile Flash memory
C. HDD III. Volatile memory with quick access
D. ROM IV. Permanent Firmware Storage
81. Match the different profounders of digital archive platforms with the respective
platforms created by them.
LIST-I (Propounders) LIST-II (Platform)
A. Herbert Van de Sompel Paul I. ArXiv
B. Ginsparg Paul II. Subversive Proposal
C. Michael S. Hart III. Open Archive Initiative
D. Steven Harnad IV. Project Guttenberg
Choose the correct answer from the options given below:
1. A-IV, B-II, C-III, D-I
2. A-III, B-I, C-II, D-IV
3. A-II, B-IV, C-III, D-I
4. A-III, B-I, C-IV, D-II
1. arXiv
• Description: A preprint repository for scholarly papers in fields such as physics,
mathematics, computer science, quantitative biology, statistics, and related disciplines.
• Purpose: Facilitates rapid dissemination of research findings before formal peer review.
• Founded: 1991 by Paul Ginsparg.
• Access: Free and open to the public.
• Website: https://arxiv.org
2. Subversive Proposal
• Description: A seminal proposal by Stevan Harnad in 1994 advocating for the self-archiving
of scholarly research papers by authors to make them freely accessible online.
• Key Idea: Scholars should deposit their peer-reviewed research in open-access repositories to
bypass traditional publishing barriers.
• Impact: Laid the groundwork for the open-access movement and institutional repositories.
• Related Concept: Green Open Access (self-archiving in repositories).
4. Project Gutenberg
• Description: A digital library offering over 60,000 free eBooks, primarily consisting of
public domain works.
• Purpose: To make literature and knowledge freely accessible to the public.
• Founded: 1971 by Michael S. Hart.
• Content: Includes classic literature, historical texts, and reference works.
• Access: Free and open to the public.
• Website: https://www.gutenberg.org
82. Arrange the following subjects according to the "Principle of increasing complexity" as
per Colon Classification (Ed. 6th Rev. Ed.):
1. Biogeography
2. Anthropogeography
3. Political geography
4. Mathematical geography
5. Economic geography
Choose the most appropriate answer from the options given below:
6. A, C, D, B, E
7. B, C, E, A, D
8. D, A, B, C, E
9. A. B. C, D. E
83. Which of the following accurately describe the process of digitisation in libraries?
A. It requires adherence to metadata standards for discoverability.
B. It involves converting analog materials to digital formats.
C. It ensures permanent access to all digital content without preservation efforts.
D. It involves selecting suitable hardware and software for the process.
E. It requires to get permission from National Digital Library of India (NDLI).
Choose the most appropriate answer from the options given below:
1. A, C, D and E only
2. B, C, D and E only
3. A, B, C and D only
4. A, B, D and E only
ERNET- 1986, C-DOT- 1984, C-DAC- 1988, NKN- 2010, NMEICT- 2009
86. Arrange the following layers of semantic web from bottom to top:
A. Logic
B. Ontology
C. Proof
D. RDF
E. Trust
Choose the most appropriate answer from the options given below:
1. A, D, C, B, E
2. D, B, A, C, E
3. E, C, D, B, A
4. D, A, C, B, E
87. The 'High Level Committee' of National Mission on Libraries was set up by Ministry of
Culture wide notification no.18-4/2009-Lib (Pt.) dated
1. 2nd March 2012
2. 4th May 2012
3. 12th July 2012
4. 21st December 2012
Component wise purpose of NML as follows:
o National Virtual Library of India (NVLI)
o Setting up of NML Model Libraries
o Quantitative and Qualitative Survey
o Capacity Building
89. Match the institutions with the name of the person on whom the central libraries of these
institutions are named.
LIST-I (Institutions) LIST-II (Names of Persons)
A. Indian Institute of Science, Bengaluru I. Vikram Sarabhai
B. Indian Institute of Management, Ahmedabad II. Sayaji Rao Gaikwad
C. Jawaharlal Nehru University, New Delhi III. J. R. D. Tata
D. Banaras Hindu University, Varanasi IV. Dr. B. R. Ambedkar
Choose the correct answer from the options given below:
1. A-IV, B-I, C-III, D-II
2. A-III, B-I, C-IV, D-II
3. A-III, B-IV, C-II, D-I
4. A-II, B-I, C-III, D-IV