100% found this document useful (5 votes)
5K views138 pages

Computer Technology - Library Automation & Digitization

Uploaded by

pooja komari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
100% found this document useful (5 votes)
5K views138 pages

Computer Technology - Library Automation & Digitization

Uploaded by

pooja komari
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 138

BASED ON THE UGC-NET NEW SYLLABUS

JUNE 2019

UGC-NET/SLET MCQs
Library & Information Science
Library Info

Library Info
With Assertion & Reason Questions,
Notes & Descriptions
Revised

UNIT-VII & VIII Ed. 2021

COMPUTER TECHNOLOGY:
LIBRARY AUTOMATION &
DIGITIZATION

BY AQUIL AHMED
Preface

National Eligibility Test (NET) of UGC or State Eligibility Test (SET) has become compulsory to get
employment in Universities and Colleges in India. In order to help aspiring professionals to appear for
this exam, I have prepared this E-book containing probable important MCQs based on the new UGC
/NTA–NET Syllabus for June 2019 onwards.
Library Info

Library Info
The present e-book contains MCQs based on the UNIT-VII & VIII of UGC-NET new syllabus along with
about 50 Assertion & Reason Verbal Reasoning questions, detailed and necessary notes and descriptions.

It is hoped that the e-book will serve a useful purpose and help a vast number of LIS professionals to
qualify NET/SLET and other competitive examinations in order to get better job opportunities and
become a qualified library professionals.

- Editor
Content

Preface ii

New Syllabus for UGC-NET Library & Information Science iii-vii


Library Info

Library Info
UNIT – VII (Computer Technology) 1-66

UNIT – VIII (Library Automation & Digitization) 67-130


NEW SYLLABUS FOR NTA UGC NET LIBRARY AND
INFORMATION SCIENCE EXAM 2019

The UGC has revised the pattern and scheme of exam from December 2018. The pattern of exam has
been changed from 3 papers (Paper I, II & III) to 2 papers (Paper I & II). Now, there are 50 MCQs in
Paper 1 and 100 MCQs in Paper 2. Each question carries 2 marks without any NEGATIVE marking
Library Info

Library Info
for wrong answer.

According to NEW SYLLABUS (June 2019 onwards) and new pattern (since December 2018), the exam
would be computer based (Online Mode). The Paper 2 will have 100 Multiple Choice Questions (MCQs)
based on the chosen subject. The objective type questions will include multiple choices, matching type,
true/false and assertion-reasoning type etc.

The New Syllabus of Library and Information Science for UGC NET Exam June 2019
onward will be as follows:
Unit – I
1. Data, Information, Knowledge and Wisdom.
2. Information Life Cycle – Generation, Collection, Storage and Dissemination.
3. Role of Information in Planning, Management, Socio-economic, Cultural, Educational and
Technological Development.
4. Information Science – Relationship with other subjects, Information Society and Knowledge Society.
5. Communication – Concept, Types, Theories, Models, Channels and Barriers; Trends in Scholarly
Communication.
6. Information Industry – Generators, Providers and Intermediaries.
7. IPR and Legal Issues – Categories, Conventions, Treaties, Laws.
8. Plagiarism: Concept and Types.
9. Right to Information Act (RTI); Information Technology Act.
10. National Knowledge Commission; National Mission on Libraries.

Unit – II
1. Historical Development of Libraries in India; Committees and Commissions on Libraries in India.
2. Types of Libraries – Academic, Public, Special and National.
3. Library Legislation and Library Acts in Indian States; The Press and Registration of Books Act; The
Delivery of Books and Newspapers (Public Libraries) Act.
4. Laws of Library Science.
5. Library and Information Science Profession – Librarianship as a Profession, Professional Skills and
Competences; Professional Ethics.
6. Professional Associations – National – ILA, IASLIC, IATLIS; International – IFLA, ALA, CILIP,
ASLIB, SLA; Role of UGC, RRRLF and UNESCO in Promotion and Development of Libraries.
7. Library and Information Science Education in India.
8. Library Public Relations and Extension Activities.
9. Type of Users – User Studies, User Education.
10. Information Literacy – Areas, Standards, Types and Models; Trends in Information Literacy.

Unit – III
Library Info

Library Info
1. Information Sources – Nature, Characteristics, Types and Formats.
2. Sources of Information – Primary, Secondary and Tertiary; Documentary and Non-Documentary.
3. Primary Information Sources (Print and Electronic) – Journals, Conference Proceedings, Patents,
Standards, Theses & Dissertations, Trade Literature.
4. Secondary Information Sources (Print and Electronic) – Dictionaries, Encyclopedias, Bibliographies,
Indexing & Abstracting, Statistical sources, Handbooks and Manuals.
5. Tertiary Information Sources (Print and Electronic)- Directories, Year Books, Almanacs.
6. Reference Sources – Bibliographical, Biographical, Educational, Language and Geographical.
7. Electronic Information Resources – Subject Gateways, Web Portals, Bulletin Boards, Discussion
Forums /Groups.
8. Databases: Bibliographic, Numeric, Full text, Multimedia; Open Access Databases.
9. Institutional and Human Resources.
10. Evaluation of Reference Sources and Web Resources.

Unit – IV
1. Community Information Services.
2. Reference Service – Concept and Types; Referral Services
3. Alerting Services – CAS, SDI, Inter Library Loan and Document Delivery.
4. Mobile based Library Services and Tools – Mobile OPAC, Mobile Databases, Mobile Library Website,
Library Apps, Mobile Library Instructions, Augmented Reality, SMS Alerts, Geo-Location, Reference
Enquiry.
5. Web 2.0 and 3.0 – Library 2.0- Concept, Characteristics, Components; Instant Messaging, RSS Feeds,
Podcasts, Vodcasts, Ask a Librarian
6. Collaborative Services- Social Networks, Academics Social Networks, Social Tagging, Social
Bookmarking.
7. Web – Scale Discovery Services
8. National Information Systems and Networks: NISCAIR, DESIDOC, SENDOC, ENVIS, INFLIBNET,
DELNET, NICNET, ERNET, National Knowledge Network (NKN), Biotechnology Information
System Network
9. International Information Systems and Networks: INIS, AGRIS, INSPEC, MEDLARS, BIOSIS, ERIC,
Patent Information System (PIS), Biotechnology Information System (BIS).
10. Library Resource Sharing and Library Consortia – National and International.

Unit – V
1. Universe of Knowledge – Nature and Attributes; Modes of Formation of Subjects.
2. Knowledge Organisation – Classification – Theories, Cannons, and Principles; Simple Knowledge
Organisation System (SKOS), Taxonomies, Folksonomy, Trends in Classification.
3. Mapping of Subjects in Library Classification Schemes – DDC, UDC and CC.
4. Knowledge Organisation: Cataloguing – Cannons and Principles; Centralized and Co-operative
Catalogue; Library Cataloguing Codes: CCC and AACR – II.
5. Standards of Bibliographic Record Formats and Description – ISBD, MARC 21, CCF, RDA, FRBR,
Bibframe.
6. Standards for Bibliographic Information Interchange & Communication – ISO 2709, Z39.50, Z39.71.
Library Info

Library Info
7. Metadata Standards: Dublin Core; MARC21, METS, MODES, EAD.
8. Indexing Systems and Techniques: Assigned – Pre-coordinate; Post-Coordinate; Derived- Title-based;
Vocabulary Control.
9. Abstracting – Types and Guidelines.
10. Information Retrieval System – Features, Components, Models and Evaluation.

Unit – VI
1. Management – Principles, Functions and Schools of thought.
2. Library and Information Centers Management – Book Selection Tools and Principles; Library
Acquisition, Technical Processing, Circulation, Serial Control, Maintenance and Stock Verification;
Preservation and Conservation; Hazards and Control Measures of Library Materials.
3. Human Resource Management – Planning, Job Analysis, Job Description, Job Evaluation, Selection,
Recruitment, Motivation, Training and Development, Performance Appraisal; Staff Manual.
4. Financial Management in Libraries – Sources of Finance, Resource Mobilization, Budgeting Methods;
Cost Effective and Cost Benefit Analysis, Annual Reports & Statistics; Library Authority and
Committee.
5. Project Management – SWOT, PEST, PERT / CPM.
6. Total Quality Management (TQM) – Concepts, Principles and Techniques, Six Sigma; Evaluation of
Services of Libraries and Information Centers.
7. Library Building, Furniture and Equipments; Green Library Building; Information Commons; Makers
Space; Security and Safety.
8. Management Information System (MIS), MBO, Change Management, Disaster Management, Crisis
Management.
9. Knowledge Management – Principles, Tools, Components and Architecture.
10. Marketing of Library Products and Services – Plan, Research, Strategies, Mix, Segmentation, Pricing
and Advertising; Management Consultancy.

Unit – VII
1. Computer Technology – Character Representation (ASCII, ISCII, Unicode); Computer Hardware,
Software; Storage Devices; Input and Output Devices.
2. Types of Software – System Software, Application Software.
3. Programming Languages – Object Oriented, Procedural, High Level, Scripting; Web Languages.
4. Telecommunication – Transmission Channels, Mode, and Media, ISDN, PSDN, Multiplexing,
Modulation, Standards and Protocols.
5. Wireless Communication – Media, Wi-fi, Li-fi, Satellite Communication, Mobile Communication.
6. Computer Networks – Topologies, Types of Networks – LAN, MAN, WAN.
7. Internet – Web browsers, WWW, E-mail; Search Engines, Meta and Entity Search engines.
8. Internet Protocols and Standards – HTTP, SHTTP, FTP, SMTP, TCP/IP, URI, URL.
9. Hypertext, Hypermedia, Multimedia, Video conferencing, Virtual Reality, Augmented Technologies.
10. Data Security, Network Security, Firewalls, Cryptographic Techniques, Anti-virus software, Anti-
spyware, Intrusion Detection System.
Library Info

Library Info
Unit – VIII
1. Library Automation – Areas, Planning, Selection of Hardware and Software, Implementation and
Evaluation; Standards for Library Automation.
2. Barcode, RFID, QR Code, Biometric, Smartcard: Features and Applications.
3. Digitization – Planning, Selection of Materials, Hardware, Software, Process, Issues.
4. Digital Library: Genesis, Characteristics, Types, Architecture; Standards, Formats and Protocols, DOI.
5. Digital Preservation – Need, Purpose, Standards, Methods, Techniques, Projects (National and
International).
6. Digital Library Initiatives – National and International.
7. Institutional Repositories – Need, Purpose, Types and Tools; Institutional Repositories in India;
ROAR, DOAR, SHARPA-ROMIO.
8. Content Management Systems – Architecture, Data Integration, CMS Software – Selection,
Implementation and Evaluation.
9. Application of Artificial Intelligence, Expert Systems and Robotics in Libraries; Social Mobile
Analytics Cloud (SMAC); Cloud Computing.
10. Ontology – Tools (RDF, RDFS, Potege); Semantic Web, Linked Data, Big Data, Data Mining, Data
Harvesting.

Unit – IX
1. Research – Concept, Purpose, Functions, Scope and Ethics; Types of Research – Basic and Applied,
Interdisciplinary and Multidisciplinary.
2. Research Methods: Historical, Descriptive, Experimental and Delphi.
3. Research Design – Selection of Research Problem, Review of Literature; Formulation of Research
Problem; Hypothesis – Formulation, Types and Testing; Sampling Techniques.
4. Methods of Data Collection: Questionnaire, Interview, Observation, Library Records, Scales and
Checklist.
5. Data Analysis and Interpretation – Presentation of Data; Statistical Methods/ Techniques.
6. Statistical Packages – Spreadsheet, SPSS, Bibexcel, ‘R’ Statistics.
7. Research Report Writing and Citation Tools – Structure, Style, Contents, Guidelines; Style Manuals;
Online Citation Tools; Reference Style Management Tools; Anti-plagiarism Tools; Evaluation of
Research Report.
8. Metric Studies in LIS – Bibliometrics, Scientometric, Webometrics, Altmetrics;
9. Impact Factors – Journal, Institutional and Authors; h-Index, g-Index, i10 Index.
10. Trends in Library and Information Science Research.
Unit –X
1. Academic Library and Information System.
2. Public Library and Information System.
3. Special Library and Information System.
4. Health Science Library and Information System.
Library Info

Library Info
5. Corporate Library and Information System.
6. Agricultural Library and Information System.
7. Engineering and Technological Library and Information System.
8. Archive, Museums and Oriental Libraries.
9. Community Information System.
10. Information Services and System for Persons with Disability, Children and Women.
Computer
C Technology: Library Automation & Digitization Unit -VII

1. EZproxy is a product of ___. B. Desk calculator


A. UTLAS C. Analytical Engine
B. OCLC D. Tabulator
C. RLIN
D. Library of Congress Answer: A (Digital calculating machine)

Answer: B (OCLC) Notes: Blaise Pascal, the French mathematician,


invented a mechanical calculator in 1642. The machine
Library Info

Library Info
Notes: Ezproxy is a web proxy server used by libraries was called ‘Arithmetic Machine’ or ‘Pascaline’.
to give access from outside the library’s computer
network to restricted access websites that authenticate 6. Groupware is a __.
users by IP address. It was initially released in 1999. A. Blog
B. System software
2. IP authenticated access facilitates users to access C. Collaborative software
__. D. Search Engine
A. Through login credentials
B. Through suitable server path without login Answer: C (Collaborative Software)
C. Through different paths Notes: Groupware refers to programs that help people
D. Through different places work together collectively while located remotely from
Answer: A (Through login credentials) each other. Programs that enable real time collaboration
are called synchronous groupware.
3. Which type of computers is most suitable for use
in the libraries? 7. Windows, Linux, Unix etc. are examples of __.
A. Analog A. System softwares
B. Super B. Application softwares
C. Digital C. Softwares
D. Hybrid D. Operating systems

Answer: C (Digital) Answer: D (Operating systems)

4. IBM 360 belongs to __. 8. Which of these is a multi user open source
A. Mini computer operating system?
B. Micro computer A. MS-DOS
C. Mainframe computer B. UNIX
D. Super computer C. LINUX
D. WINDOWS
Answer: C (Mainframe computer)
Answer: C (LINUX)
Notes: The IBM System/360 (S/360) is a family of
mainframe computer systems that was announced Notes: Linux is an open-source multi-user operating
by IBM on April 7, 1964. It was the first family of systems based on the Linux kernel, an operating system
computers designed to cover the complete range of kernel first released on September 17, 1991 by Linus
applications, from small to large, both commercial and Torvalds, a Finnish-American software engineer.
scientific. 9. OCR stands for __.
5. In 1642, Blaise Pascal constructed a __. A. Optical Chart Recognition
A. Digital calculating machine B. Optical Character Recognition
1 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Operating Character Reader c. (c), (d), (b) and (a)


D. Operating Character Recognition d. (d), (b), (c) and (a)

Answer: B (Optical Character Recognition) Answer: D

10. Which one of the following is meant for Word Notes: A metasearch engine (or aggregator) is
processing? a search tool that uses another search engine's data to
A. Dbase produce its own results from the Internet. The first
Library Info

Library Info
B. LibSys person to incorporate the idea of meta searching
C. WordStar was Colorado State University's Daniel Dreilinger. He
D. CDS/ISIS developed SearchSavvy that can search up to 20
different search engines and directories at once. The
Answer: C (WordStar) other meta search engines that followed are:
Metacrawler (Eric Selberg, 1995); Hotbot (1996);
11. MS-DOS is a __.
Skyscanner (2001); Kayak (Steve Hafner, 2004);
A. Single user open source
B. Multi user open source CiteSeerX (2007).
C. Single user 14. Vivisimo – a meta search engine was founded by
D. Multi user ___.
Answer: C (Single user) A. Carnegie Mellon University
B. Stanford University
12. Which is not a Meta Search engine? C. University of California
A. Dogpile D. Oxford University
B. Mamma
C. Metacrawler Answer: A (Carnegie Mellon University)
D. Alta vista 15. Which of the following is a meta search engine?
Answer: D (Alta vista) A. Vivisimo
B. Google
Notes: A meta search engine does not use crawler for C. Yahoo
compiling their own searchable database. These search D. Bing
engines utilise databases maintained by other individual
search engines. When a query is put before this type of Answer: A (Vivisimo)
search engine, it forwards that query to other search Notes: Vivisimo, a metasearch engine was founded in
engines. Examples of such search engines are: Dogpile, 2000 at Carnegie Mellon University. It is acquired by
Ask Jeeves, Inference Find, MetaCrawler, Profusion, IBM in 2012.
Surfwax, Mamma.
16. Arrange the following in chronological order of
13. Arrange the following metasearch engines in their origin:
ascending order of their year of launching: a) Unix
a) Seerx b) MS-DOS
b) Skyscanner c) Linux
c) Kayak d) Windows
d) Metacrawler A. (a), (d), (c) and (b)
a. (a), (d), (c) and (b) B. (b), (a), (d), and (c)
b. (c), (a), (d), and (b) C. (c), (d), (b) and (a)
2 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. (d), (a), (b) and (c) C. WiFi Internet Microwave Access


D. Whatsapp Interface for Multiple Access
Answer: B
Answer: A (Worldwide Interoperability for
Notes: MS-DOS stands for Microsoft Disk Operating Microwave Access)
System, developed by Microsoft and initially released in
1981, Windows (Microsoft, 1985); Linux ( Linus Notes: WiMAX (Worldwide Interoperability for
Torvalds, 1991). Microwave Access) is a family of wireless
Library Info

Library Info
broadband communication standards based on the IEEE
17. Windows version of CDS/ISIS is named as __. 802.16 set of standards.
A. WINISIS
B. WISIS 21. Which one of the following is the IEEE standard
C. Windows ISIS for Wimax?
D. WINCDS A. IEEE 802.3
B. IEEE 802.11
Answer: A (WINISIS) C. IEEE 802.15
18. CDS/ISIS was distributed in India by __. D. IEEE 802.16
A. INSA Answer: D (IEEE 802.16)
B. INSDOC
C. NISCAIR 22. The bit number as defined in IP address in
D. NISSAT Internet Protocol Version 4 is __.
A. 16
Answer: D (NISSAT) B. 128
19. What is meant by Session Initiation Protocol C. 64
D. 32
(SIP)?
A. Communication protocol for signaling Answer: D (32)
B. Offers end to end pocket delivery
C. Transmits data as datagram Notes: Internet Protocol version 4 (IPv4) is the fourth
D. Copy files from one host to another version of the Internet Protocol (IP). IPv4 uses a 32-bit
address space. IPv4 was the first version deployed for
Answer: A (Communication protocol for signaling) production in the ARPANET in 1983.
Notes: The Session Initiation Protocol (SIP) is 23. Which among the following is correct about
a signaling protocol used for initiating, maintaining, and IPv4?
terminating real-time sessions that include voice, video A. IPv4 is a 32-Bit IP Address
and messaging applications. SIP is used for signaling and B. IPv4 is a numeric address, and its binary bits
controlling multimedia communication sessions in are separated by a dot (.)
applications of Internet telephony for voice and video C. Both A and B
calls, in private IP telephone systems, in instant D. None of the above
messaging over Internet Protocol (IP) networks as well
as mobile phone calling over LTE (VoLTE). Answer: C (Both A and B)

20. WIMAX stands for __. Notes: IPv4 is 32 bit binary number used to identify
A. Worldwide Interoperability for Microwave machines connected to a network.
Access
B. Wireless Internet for Multi Access
3 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

24. Which among the following is correct about Notes: The Information Technology Act, 2000 (also
IPv6? known as ITA-2000, or the IT Act) is an Act of
A. IPv6 is 128 Bit IP Address the Indian Parliament (No 21 of 2000) notified on 17
B. IPv6 is an alphanumeric address whose October 2000. It is the primary law in India dealing
binary bits are separated by a colon (:). with cybercrime and electronic commerce. The original
C. Both A and B Act contained 94 sections, divided into 13 chapters and
D. None of the above 4 schedules.
Library Info

Library Info
Answer: C (Both A and B) 27. Which section of the ‘IT Act, 2000’ describes
the ‘Punishment for sending offensive messages
Notes: IPv6 (Internet Protocol version 6) is the most through communication service, etc.’?
recent version of the Internet Protocol initiated in 1994. A. Sec. 44A
With 128-bit binary number address space, it is also B. Sec. 66A
called IPng (Internet Protocol next generation). IPv6 C. Sec. 52 A
is an alphanumeric address whose binary bits are D. Sec. 43 A
separated by a colon (:). It also contains hexadecimal.
Answer: B (Sec. 66A)
25. Cybernetics is the study of control and
communication between ___. Notes: A major amendment to IT Act 2000 was made in
A. Hardware and Software 2008. It introduced Section 66A which penalized
B. Man and Machine sending "offensive messages". It also introduced
C. Machine and Machine Section 69, which gave authorities the power of
D. Software and Internet "interception or monitoring or decryption of any
information through any computer resource".
Answer: B (Man and Machine)
28. Which section of the ‘IT Act, 2000’ gives the
Notes: Cybernetics is a transdisciplinary approach for authority power to ‘intercept or monitor or
exploring regulatory systems—their structures, decrypt any information through any computer
constraints, and possibilities. Norbert Wiener defined resource’?
cybernetics in Cybernetics: Or Control and A. Sec. 66
Communication in the Animal and the Machine in 1948 B. Sec. 54
as "the scientific study of control and communication in C. Sec. 69
the animal and the machine." In other words, it is the D. Sec. 72
scientific study of how humans, animals and machines
control and communicate with each other. Answer: C (Sec. 69)

26. Which section of the ‘IT Act, 2000’ describes Notes: Under Chapter 11 of IT Act 2000, Section 69
the provision for ‘Compensation for failure to deals with the powers to issue directions for interception
protect data’? or monitoring or decryption of any information through
A. Sec. 33 any computer resource.
B. Sec. 43A
C. Sec. 52A 29. URI stands for __.
D. Sec. 44 A. Uniform Resource Identity
B. Uniform Resource Identifier
Answer: B (Sec. 43A) C. Unique Resource Identity
D. Unique Resource Identifier

4 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: B (Uniform Resource Identifier) A. HTML


B. URL
Notes: Uniform Resource Identifier (URI) is a string of C. HTTP
characters used to identify a name or a resource (text D. Domain Name
document, image file, etc) on the Internet. A URI
identifies a resource either by location, or a name. It has Answer: B (URL)
two specializations or subset known as URL and URN.
33. The term ‘Virtual Library’ was coined by __.
Library Info

Library Info
30. Which of the following is an example of URN ? A. Paul Zurkowski
A. URI B. Michael Casey
B. URL C. Tim Berners Lee
C. DOI D. Mark Zuckerberg
D. ISBN
Answer: C (Tim Berners Lee)
Answer: D (ISBN)
Notes: The term ‘Virtual Library’ was first coined by
Notes: A Uniform Resource Name (URN) is a subset of Tim Berners Lee in 1991 at Geneva.
URI that identifies a resource by name in a particular
namespace. However, it does not imply location or 34. Who invented the World Wide Web (WWW) _.
availability of the identified resource. For example, in A. Paul Zurkowski
the International Standard Book Number (ISBN) B. Michael Casey
system, ISBN 0-486-27557-4 identifies a specific edition C. Tim Berners Lee
of Shakespeare's play Julius Caesar. The URN for that D. Mark Zuckerberg
edition would be urn:isbn:0-486-27557-4. However, it Answer: C (Tim Berners Lee)
gives no information as to where to find a copy of that
book. Notes: WWW (World Wide Web) was invented in 1989
by Tim Berners Lee while working at CERN. He is also
31. In the World Wide Web, name the acronym that regarded as the ‘Father of Internet’.
describes the internet address of a file__.
A. ULA 35. The term ‘Internet of Things’ was coined by __.
B. RELUR A. Kevin Ashton
C. URI B. Andy Grove
D. URL C. L. J. Cook
D. Allan M. Schiffman
Answer: D (URL)
Answer: A (Kevin Ashton)
Notes: A URL (Uniform Resource Locator), also a
Notes: Internet of Things (LoT) is the concept of
subset of URI, is a unique identifier used to locate and
connecting any device to the Internet and to other
retrieve a resource on the internet. It is also referred to
connected devices. It is a giant network of connected
as a web address. URLs consist of multiple parts --
things and people – all of which collect and share data
including a protocol and domain name -- that tell a web
about the way they are used and about the environment
browser how and where to retrieve a resource. Uniform
around them. The term ‘Internet of things (LoT)’ was
Resource Locator (URL) was invented by Tim
first coined by Kevin Ashton of Procter & Gamble, in
Berners Lee.
1999.
32. What tells the browser software exactly where to
look for the information being requested?
5 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

36. Network access to a shared pool of configurable B. Larry Page


computing resources is called as __. C. J. Bill Gates
A. Client server D. Linus Tolward
B. Crowd sourcing
C. Cloud computing Answer: A (Edgar F. Codd)
D. Consortium Notes: Edgar F. Codd (1923-2003) was an English
Answer: C (Cloud Computing) computer scientist worked for IBM, invented the
Library Info

Library Info
relational database management systems and given the
Notes: Cloud computing is a model for enabling ‘12 Rules for Relational Database’. Codd's twelve rules
convenient, on-demand network access to a shared pool are a set of thirteen rules (numbered zero to twelve).
of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be 40. User-friendly interface caters to ___.
rapidly provisioned and released with minimal a) Human-computer interaction
management effort or service provider interaction. b) Individual users with customization
c) Simplify execution of operations
37. Which of the following makes a network/web d) Basis for computer-computer interface
insecure? A. a and b are correct
A. Encryption B. a, b and d are correct
B. Network Interface Card (NIC) C. b, c and d are correct
C. Static keys D. a and c are correct
D. None of the above
Answer: D
Answer: C (Static keys)
41. Which storage medium helps in accessing data
Notes: A static key is one we use more than once over a more quickly?
long period of time. Static keys are often considered less A. RAM
secure than using an Ephemeral key (that changes each B. ROM
time). C. Cache
D. EPROM
38. Ability to read, write and interact across a range
of platforms, tools and media is called ___. Answer: C (Cache)
A. Digital literacy
B. Information literacy 42. Name the storage medium (compatible with
C. Trans literacy speed of CPU) for storing instructions or data
D. Micro literacy temporarily during processing __.
A. RAM
Answer: C (Trans literacy) B. ROM
C. Cache
Notes: Transliteracy is the ability to read, write and D. EPROM
interact across a range of platforms, tools and media
from signing and orality through handwriting, print, TV, Answer: C (Cache)
radio and film, to digital social networks.
Notes: Cache stores recently used information so that it
39. The ’12 Rules for Relational Database’ were can be quickly accessed at a later time. Common types
given by __. of caches include browser cache, disk cache,
A. Edgar F. Codd memory cache, and processor cache.

6 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

43. Which is the most important part of computer the Linux operating system, the Apache HTTP
terminal? Server, the MySQL relational database management
A. ALU system (RDBMS), and the PHP programming
B. CPU language. A similar Web Server Bundle for Microsoft
C. CU Windows operating systems is known as WAMP
D. Output (Windows, Apache, MySQL, PHP/Perl/Python) and an
equivalent installation on MacOS is known as MAMP
Answer: B (CPU)
Library Info

Library Info
(MacOS, Apache, MySQL, PHP/Perl/Python) and
Notes: The most important part of all computers is the SAMP (Solaris, Apache, MySQL, PHP/Perl/Python) on
CPU (central processing unit). Solaris and XAMPP (X for Cross Platform,
Apache, MariaDB/MySQL, PHP, Perl ) for Cross
44. Keyboard, mouse, scanner and cursor etc. of Platform Web Server Service Pack.
computer are the __.
A. Input devices 47. WAMP software bundle is created by __.
B. Memory devices A. Romain Bourdon
C. Output devices B. Linus Tolward
D. Storage devices C. Tim Berners Lee
D. None of the above
Answer: A (Input devices)
Answer: A (Romain Bourdon)
45. PDA stands for __.
A. Personal Digital Assistance Notes: WAMP refers to a software stack for
B. Personal Digital Archive the Microsoft Windows operating system, created by
C. Personal Document Archive Romain Bourdon and consisting of Windows, Apache
D. Program Download Accessories web server, MySQL database and PHP programming
language. Another variant WIMP (Windows, Internet
Answer: A (Personal Digital Assistance) Information Services (IIS), MySQL, PHP) is a similar
package where the Apache is replaced by Internet
Notes: Personal digital assistant (PDA) is a term for a Information Services (IIS).
small, handheld device computer that provides
computing and information storage and retrieval 48. Identify the components of ‘LAMP’ given below:
capabilities for personal or business use, often for a) Linux
keeping schedules, calendars and address book b) Acrobat
information handy. It is now being replaced by c) MYSQL
Smartphones. d) Perl/PHP

46. LAMP stands for __. A. a, b, and c are correct


A. Library Archives Management Programme B. c, b and d are correct
B. Laser Analysis and Multimedia Performance C. a, c, and d are correct
C. Linux, Apache, MySQL, PHP D. c, a and b are correct
D. Library Automation Management Protocol
Answer: C
Answer: C (Linux, Apache, MySQL, PHP)
49. Which of the following is not a language of
Notes:LAMP (Linux, Apache, MySQL, PHP/Perl/Pyth DBMS?
on) is a web service stack, named as an acronym of the A. DDL
names of its original four open-source components:
7 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. DML Answer: D (Light pens)


C. PASCAL
D. TCL Notes: Light Pen (similar to the pen) is a pointing device
which is used to select a displayed menu item or draw
Answer: C (Pascal) pictures on the monitor screen of a computer. It is a
small, photosensitive computer input device which is
Notes: DBMS languages are of following types: DDL connected to a computer and moved by hand over an
(Data Definition Language); DML (Data Manipulation output display in order to manipulate information in the
Library Info

Library Info
Language); DCL (Data Control Language) and TCL computer.
(Transaction Control Language).
54. Which is output device of computer?
50. Pascal Programming language was developed by A. Joy stick
__. B. Key board
A. Niklaus Wirth C. Mouse
B. Romain Bourdon D. Plotter
C. Linus Tolward
D. Edgar F. Codd Answer: D (Plotter)

Answer: A (Niklaus Wirth) 55. In OSI model which layer is in between Physical
layer and Network layer?
Notes: Pascal is an imperative and procedural A. Data link layer
programming language, designed by Niklaus Wirth and B. Transport layer
first appeared in 1970. It was named in honour of the C. Presentation layer
French mathematician, philosopher and physicist Blaise D. Session layer
Pascal.
Answer: A (Data link layer)
51. Which year was OSI introduced?
A. 1928 56. Which of the following tasks is not done by data
B. 1982 link layer?
C. 1984 A. Framing
D. 1974 B. Error control
C. Flow control
Answer: B (1982) D. Channel coding
52. 1 Gigabyte (GB) is __. Answer: D (Channel coding)
A. 1024 Bytes
B. 1024 KB Notes: Data-link layer is responsible for implementation
C. 1024 MB of point-to-point flow and error control mechanism.
D. 1024 GB Data-link layer uses the techniques of error control
simply to ensure and confirm that all the data frames or
Answer: C (1024 MB) packets are transmitted or transferred from sender to
53. Which among the following is a pointing receiver with certain accuracy.
device? 57. Identify the top most layer of the OSI model
A. Touch screen among the following:
B. Sensors A. Network Layer
C. Scanning device B. Transport Layer
D. Light pens
8 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Presentation Layer However, because of its dependency on hub, if hub fails,


D. Application Layer the entire network breaks down.

Answer: D (Application Layer) 61. For large networks, which topology is used?
A. Bus
58. In OSI model, network layer is ___. B. Star
A. The topmost layer C. Ring
B. Just above the Transport Layer D. None of the above
Library Info

Library Info
C. Just above the Physical Layer
D. Just above the Data link Layer Answer: B (Star)

Answer: D (Just above the Data link Layer) 62. The topology in which the ends of the network
wires are connected to terminators is :
Notes: The Open Systems Interconnection (OSI) model A. Star
was developed by International Organization for B. Bus
Standardization (ISO). The Seven Layers of OSI C. Hybrid
Model from lowest are: 1. Physical Layer, 2. Data Link D. Mesh
Layer 3. Network Layer 4. Transport Layer 5. Session
Layer 6. Presentation Layer, and 7. Application Layer. Answer: B (Bus)
Physical Layer is the lowest layer in the model.
Notes: A bus topology is a topology for a Local
59. Open Systems Interconnection (OSI) model was Area Network (LAN) in which all the nodes are
an effort to ___. connected to a single cable. At each end of the cable a
A. Standardize networking terminator is fitted to stop signals reflecting back down
B. Provide internet connectivity the bus.
C. Provide E-mails
D. Standardize bibliographic description 63. Which topology requires multipoint
connections?
Answer: A (Standardize Networking) A. Mesh
B. Bus
60. A Central controller or a hub is a feature of __. C. Star
A. Star Topology D. Ring
B. Mesh Topology
C. Ring Topology Answer: B (Bus)
D. Bus Topology
Notes: In bus topology, there is a single cable to which
Answer: A (Star Topology) all the network nodes are connected. So whenever a
node tries to send a message or data to other nodes, this
Notes: A star topology is a topology for a Local data passes through all other nodes in the network. In
Area Network (LAN) in which all nodes are individually this topology, it is easy to connect computer or
connected to a central connection point, like a hub or a peripherals and also it requires less cable than a star
switch. Easy to install and maintain as new nodes can be topology. Terminators are required at both ends of the
added and removed to and from the central hub without backbone cable. Entire network shuts down if there is a
affecting the network. A star topology is costly because break in the main cable and also it is difficult to identify
it takes more cable than bus topology but the benefit is the problem if the entire network shuts down. However,
that if a cable fails, only one node will be brought down. failure of one computer does not affect the rest of the
network.
9 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

64. Terminators are used in __ topology? B. Bi-directional


A. Star C. Duplex
B. Ring D. None of the above
C. Bus
D. None of the above Answer: A (Unidirectional)

Answer: C (Bus) Notes: In Ring topology, each computer is connected to


the next computer and the last computer is connected to
Library Info

Library Info
65. In which topology, if the computer cable is the first, making a ring shape of computer network. It
broken, networks broke down? uses token to pass the information from computer to
A. Bus another. A large Ring topology network uses a number
B. Ring of repeaters, because if someone wants to send some
C. Star data to the last node, the data will have to pass through
D. None of the above all the other nodes in the network to reach the
destination. Hence, to prevent data loss repeaters are
Answer: A (Bus) used in the network to boost signals and send the token
Notes: Computer cable in a bus topology is called and data to the next node. The transmission of data in
Backbone cable. this network is unidirectional as bit by bit in a
sequential manner. In ring topology, all the computers
66. Which network topology is considered passive? have equal access to the network. However, failure of
A. Star one computer can affect the whole network and also
B. Bus adding and removing computers disturbs the network.
C. Ring Furthermore, in order for all computers to communicate
D. Mesh with each other, all computers must be turned on. Thus,
troubleshoot is difficult in the ring network. Ring
Answer: B (Bus) network is highly dependent on wire which connects
different components. Generally Rings are implemented
67. In which topology, the most flexibility in how
using twisted pair and fiber-optic cable. The ring is
devices are wired is possible?
classified as an active topology because there is no
A. Bus networks
termination point in the ring.
B. Star networks
C. Ring networks 70. In Ring Topology, the data can be transmitted
D. None of the above only if the computer possesses __.
A. Token
Answer: A (Bus networks)
B. Packet
68. Which topology has the toughest fault C. Data
identification? D. Access Method
A. Mesh
Answer: A (Token)
B. Star
C. Bus 71. Which network topology is most likely to
D. Ring contain multiple hubs?
A. Ring topology
Answer: C (Bus)
B. Star topology
69. Flow of data in a ring topology is __. C. Tree topology
A. Unidirectional D. Mesh topology
10 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: C (Tree topology) 76. In which of the following mode each packet of a
message needs to follow the same path from a
Notes: Tree topology is a variation of star topology. sender to receiver?
Tree topology consists of multiple hubs, one is primary A. Circuit Switching
hub and remaining are secondary hubs. B. Message switching
C. A virtual approach to packet switching
72. How are the computers linked in tree topology?
D. Datagram approach to packet switching
A. All computers are linked directly
Library Info

Library Info
B. All computers are linked together Answer: D (Datagram approach to packet switching)
C. All computers are linked indirectly
D. All computers are linked hierarchically 77. What does Z39.50 protocol used for __?
A. Accessing websites
Answer: D B. Sending data to servers
C. Connecting to switching devices
73. In data transfer process, which of the following
D. Accessing bibliographic databases
has multiple bridges between different parts?
A. Firewalls Answer: D (Accessing Bibliographic Databases)
B. Switching packets
C. Hubs Notes: Z39.50 is an international standard client-server,
D. Softwares application layer communications protocol for searching
and retrieving information from a database over a
Answer: C (Hubs) TCP/IP computer network. It is covered by ANSI/NISO
standard Z39.50, and ISO Standard 23950. The
74. What is RJ45?
A. A network cable connector standard’s maintenance agency is the Library of
B. A node Congress.
C. An electronic coupler 78. Which of the following are protocol standards?
D. A video display unit for signaling and a) Z39.50
controlling multimedia b) Z39.71
Answer: A (A network cable connector) c) Z39.05
d) Z39.81
Notes: RJ45 (Registered Jack) is a type of connector A. a, b and d are correct
commonly used for Ethernet networking. It looks similar B. a, c and d are correct
to a telephone jack, but is slightly wider. Since Ethernet C. b, c and d are correct
cables have an RJ45 connector on each end, Ethernet D. a, b, c, and d are correct
cables are sometimes also called RJ45 cables.
Answer: A
75. The technology that allows a phone call to be
Notes: ANSI/NISO Z39.50 (ISO 23950) – 2003
routed over network wires is __.
(International Standard client-server, application layer
A. VOIP
B. Tele conferencing communication protocol for searching and retrieving
C. Video Conferencing information from a database over a TCP/IP computer
D. Fast Ethernet network); ANSI/NISO Z39.71-2006 (Revised 2011) is a
holdings display standard protocol for bibliographical
Answer: A (VOIP) records; ANSI/NISO Z39.81 – 2001 (Revised now,
ANSI/NISO Z39.83 – 2012) is a Circulation Interchange
Protocol.
11 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

79. Arrange the following coding standards by the A. Indian Script Code for Information
year of their origin: Interchange
a) ASCII B. International Script Code for Information
b) Unicode Interchange
c) ISCII C. Indian Smart Code for Information
d) EBCDIC Interchange
D. International Smart Code for Information
Library Info

Library Info
A. (a), (d), (c) and (b) Interchange
B. (c), (a), (d), and (b)
C. (c), (d), (b) and (a) Answer: A (Indian Script Code for Information
D. (d), (a), (b) and (c) Interchange)

Answer: A Notes: Indian Script Code for Information Interchange


(ISCII) is the 8 character code for Indian languages
Notes: ASCII (American Standard Code for Information which suggests the encoding for all Indian languages
Interchange, 1963); EBCDIC (Extended Binary Coded that originate from Brahmi script. In 1991, The Bureau
Decimal Interchange Code, 1963-64); ISCII (Indian of Indian Standards adopted the Indian Standard Code
Script Code for Information Interchange, 1986-88); for Information Interchange. ISCII was evolved by a
Unicode (1988). standardization committee under the Department of
Electronics during 1986-88. C-DAC was an active
80. The decimal representation for character ‘A’ in member of the committee. The ISCII document is
ASCII is __. available as IS13194:1991 from the BIS offices.
A. 67
B. 63 83. Tim Berners Lee, Father of WWW is closely
C. 65 associated with __.
D. 69 a) European Organization for Nuclear
Research (CERN)
Answer: C (65) b) National Centre for Super Computing
Applications (NCSA)
Notes: The decimal representation of characters in
ASCII is as follows: 0-9 (48-57) and (A –Z (65-90). c) World Wide Web Consortium (W3C)
d) Web Science Research Initiative (WSRI)
81. Who among the following is related with
Unicode development? A. a, b and d are correct
A. Joe Becker B. a, c and d are correct
B. E. Garfield C. b, c and d are correct
C. Ted Nelson D. a, b, c, and d are correct
D. Bill Gates
Answer: B
Answer: A (Joe Becker)
84. Gopher is a __.
Notes: Joe Beckar published a draft proposal for a 16 bit A. Tool to access computer
character code called ‘Unicode’ in 1988. However, the B. Tool to access catalogue
first volume of Unicode standard was published in 1991 C. Tool to access internet
and the second volume in 1992 by Unicode Consortium. D. Tool to analyse Network

82. ISCII stands for __. Answer: C (Tool to access Internet)

12 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: The Gopher protocol is a communications Yahoo!, Yandex, Bing and results from other popular
protocol designed for distributing, searching, and search engines.
retrieving documents in Internet Protocol networks. was
invented by a team led by Mark P. McCahill at 88. Which of the following search engines is merged
the University of Minnesota. with Science Direct?
A. CiteseerX
85. Which search engine was exclusively meant for B. Alta Vista
searching scientific information? C. Dogpile
Library Info

Library Info
A. Google D. Scirus
B. Alta-Vista
Answer: D (Scirus)
C. Dogpile
D. SCIRUS 89. Baidu is a local search engine of __.
A. United States
Answer: D (Scirus)
B. Singapur
Notes: Scirus was a comprehensive science-specific C. United Kingdom
search engine, first launched in 2001. The search engine D. China
which was owned and operated by Elsevier has no
Answer: D (China)
longer been exists since February 2014.

86. Which of the following search engine was Notes: Baidu founded in 2000 by Robin Li and
merged with Yahoo? headquartered in Beijing is the most popular search
engine in China.
A. Dogpile
B. Scirus 90. Khoj is an online directory or search engine
C. Alta-Vista sponsored by __.
D. CiteseerX A. Rediff India
Answer: C (Alta Vista) B. Indiatimes
C. Sify Limited
Notes: AltaVista was a Web search engine established D. None of the above
in 1995. It was purchased by Yahoo! in 2003, which
retained the brand, but based all AltaVista searches on Answer: C (Sify Limited)
its own search engine. On July 8, 2013, the service was Notes: Khoj is a search engine or online directory that
shut down by Yahoo!. can search different types of data related to India. It is
87. Which of the following is metasearch engine? offered by Sify Limited.
A. Dogpile 91. Which of the following is not a switching
B. Scirus system?
C. Alta-Vista A. Packet
D. CiteseerX B. Circuit
Answer: A (Dogpile) C. Router
D. Message
Notes: Dogpile, created and developed in 1996 by
Aaron Flin, is a metasearch engine for information on Answer: C (Router)
the World Wide Web that fetches results from Google, Notes: Switched communication networks are those in
which data transferred from source to destination is
13 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

routed between various intermediate nodes. There are 3 C. Packet switching


common switching techniques: (i) Circuit Switching D. Stackable switching
(ii)Message Switching, and (iii) Packet Switching
Answer: C (Packet Switching)
92. Multiplexing is used in ___.
A. Packet switching Notes: Shortcomings of message switching gave birth to
B. Circuit switching an idea of packet switching. The entire message is
C. Data switching broken down into smaller chunks called packets. The
Library Info

Library Info
D. Packet switching and data switching switching information is added in the header of each
packet and transmitted independently and reassembled
Answer: B (Circuit Switching) again at the destination. The internet uses packet
switching technique.
Notes: When two nodes communicate with each other
over a dedicated communication path, it is called 95. Packet switching is __.
circuit switching. There is a need of pre-specified route A. A store and forward switching system
from which data will travels and no other data is B. A circuit switching system
permitted. In circuit switching, to transfer the data, C. An electro mechanical switching system
circuit must be established in advance so that the data D. A crossbar switching system
transfer can take place. Circuit switching was designed
for voice applications. Telephone is the best suitable Answer: A (A store and forward switching system)
example of circuit switching. Before a user can make a Notes: Packet Switching uses Store and
call, a virtual path between caller and callee is Forward technique while switching the packets. In
established over the network. telecommunications, store − and − forward packet
93. Telegraph network is the example of __. switching is a technique where the
A. Packet switching data packets are stored in each intermediate node,
B. Message switching before they are forwarded to the next node. The
C. Circuit switching intermediate node checks whether the packet is
D. None of the above error−free before transmitting, thus ensuring integrity of
the data packets.
Answer: B (Message Switching)
96. The sharing of a medium and its link by two or
Notes: In Message switching, the whole message is more devices is called ___.
treated as single data unit and routed/transferred in its A. Full duplexing
entirety from the source node to the destination node, B. Multiplexing
one hop at a time. During message routing, every C. Full duplexing and half duplexing
intermediate switch in the network stores the whole D. Half duplexing
message. If the entire network's resources are engaged
or the network becomes blocked, the message-switched Answer: B (Multiplexing)
network stores and delays the message until ample Notes: Multiplexing is a method using which one can
resources become available for effective transmission of send multiples signals through a shared medium at
the message. Telegraph network for the transmission of the same time. This helps in using less resources and
telegrams are the example of switching network. thus saving the cost of sending messages.
94. Data transmission over Internet works on: 97. Telegraph Multiplexer was invented by __.
A. Circuit switching A. S.F.B Morse
B. Message switching
14 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. Emile Baudot C. WDM


C. Graham Bell D. MDM
D. Konrad Zuse
Answer: A (FDM)
Answer: B (Emile Baudot)
101. Operating system developed by Google for
Notes: Émile Baudot, French telegraph engineer and mobile phone is called:
inventor of the first means of digital communication A. Opera
Library Info

Library Info
Baudot code, was one of the pioneers of B. Android
telecommunications. He invented a multiplexed printing C. Apple
telegraph system that used his code and allowed multiple D. Linux
transmissions over a single line.
Answer: B (Android)
98. In optical communication, multiplexing is
referred to as ___. Notes: Android is a mobile operating system developed
A. FDM by Google, first released in 2008. It is based on a
B. WDM modified version of the Linux kernel and other open
C. TDM source software, and is designed primarily for touch
D. CDMA screen mobile devices such as smart phones and tablets.

Answer: B (WDM) 102. D-Base is ___.


A. Application Software
Notes: In fiber-optic communications, wavelength- B. System Software
division multiplexing (WDM) is a technology C. Internal Software
which multiplexes a number of optical carrier signals D. External Storage
onto a single optical fiber by using different
wavelengths (i.e., colors) of laser light. This technique Answer: A (Application Software)
enables bidirectional communications over one strand of 103. ASCII has how many codes?
fiber, as well as multiplication of capacity. In other A. 526
words, A WDM system uses a multiplexer at B. 265
the transmitter to join the several signals together and C. 256
a demultiplexer at the receiver to split them apart. D. 233
99. Which analog multiplexing technique usually Answer: C (256)
involves signals in the visible light frequencies?
A. FDM 104. Email address is made up of __.
B. TDM A. Single part
C. WDM B. Two parts
D. MDM C. Three parts
D. Four parts
Answer: C (WDM)
Answer: B (Two parts)
100. Which analog multiplexing technique usually
involve signals that are NOT in the visible light Notes: An email address is a unique identifier for
frequencies? an email account. It is used for both to send and receive
A. FDM email messages over the Internet. Every email address
B. TDM has two main parts: a username and domain name. The
15 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

username comes first, followed by an at (@) symbol, D. None of the above


and then domain name.
Answer: B (Joint Photographic Experts Group)
105. Which one of the following statement is NOT
correct for digital signature? Notes: JPEG (Joint Photographic Experts Group) is a
A. It is a mechanism for authentication file format for compressing image files, became standard
B. It cannot be duplicated in 1992.
C. It is created by encrypting information
Library Info

Library Info
109. GIF (Graphics Interchange Format) employs:
D. It is the scanned image of one’s signature A. Flexible compression
Answer: D (It is the scanned image of one’s signature) B. No compression
C. Loss compression
Notes: A digital signature is an authentication D. Lossless compression
mechanism that enables the creator of the message to
attach a code that acts as a signature. Answer: D (Lossless compression)

106. Percentage (%) sign is used in an URL to Notes: GIF is an image file format commonly used for
represent: images on the web. Unlike the JPEG image format,
A. Space GIFs uses lossless compression that does not degrade
B. Date the quality of the image.
C. Time 110. Which of the following are proprietary file
D. Person formats?
Answer: A (Space) a) MrSID
b) GIF
Notes: URLs cannot contain spaces. URL encoding c) RAR
normally replaces a space with a plus (+) sign or with %. d) TIFF
A. a, and d are correct
107. Which one of the following is not image format? B. c and d are correct
A. TIFF C. a and c are correct
B. MPEG D. b and d are correct
C. JPEG
D. GIF Answer: C

Answer: B (MPEG) Notes: RAR (short for Roshan Archive) is a


proprietary archive file format developed by Russian
Notes: The Moving Picture Experts Group (MPEG) is a software engineer Eugene Roshal that supports data
working group of authorities, formed in 1988 by ISO compression, error recovery and file spanning.
and IEC to set standards for audio and video Multiresolution Seamless Image Database (MrSID) is
compression & transmission. It was established with the a closed, proprietary format for storing images originally
initiative of Hiroshi Yasuda and Leonardo developed at the US Government's Los Alamos National
Chiariglione. Laboratory.
108. JPEG- a file format for compressing image files 111. Which of the following is an open source
stands for __. graphic designing software?
A. Joint Picture Experts Group A. Pen
B. Joint Photographic Experts Group B. Vista
C. Joint Photo Experts Group
16 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Adobe Sun Microsystems acquisition by Oracle Corporation, it


D. Inkscape was renamed Oracle Solaris.

Answer: D (Inkscape) Microsoft Edge first released in 2015, is a graphical


web browser of Microsoft for Windows 10 replacing
Notes: Inkscape, first released in 2003 is a free and IE.
open-source vector graphics editor used to create vector
images. 115. Ubuntu is primarily ___.
Library Info

Library Info
A. An application software
112. Which of the following are embedded B. A web browser
processors? C. An operating system
a) Micro Controller D. A database
b) Digital Signal Processor
c) Cor 2 extreme Answer: C (An Operating System)
d) Intel Xeon
Notes: Ubuntu is a free and open-source Linux
A. a, b, and d are correct distribution based on Debian. It was developed by
B. a, c and d are correct Canonical Ltd and first released in 2004.
C. a and d are correct
116. The purpose of the ____ protocol is to provide a
D. b and d are correct bi-directional communication facility.
Answer: A A. FTP
B. TELNET
113. Arrange in sequence the following steps C. SMTP
followed in programming: D. Z39.50
a) Programming code
b) Programming documentation Answer: B (Telnet)
c) Program Test Notes: Telnet (TELecommunication NETwork),
d) Program Design initially developed in 1969, is an application layer
protocol used on the Internet or local area network to
A. (a), (d), (c) and (b)
provide a bidirectional interactive text-oriented
B. (c), (a), (d), and (b)
communication facility using a
C. (c), (d), (b) and (a) virtual terminal connection. In other words, TELNET is
D. (d), (a), (c) and (b) used for remote login for a system.
Answer: D
117. UDP is an internet protocol stands for __.
114. Which is not a web browser? A. User Datagram Protocol
A. Google Chrome B. User Defined Protocol
B. Solaris C. Universal Data Protocol
C. Apple Safari D. Utility Data Protocol
D. Microsoft Edge Answer: A (User Datagram Protocol)
Answer: B (Solaris) Notes: In computer networking, the User Datagram
Notes: Solaris is a Unix operating system originally Protocol (UDP) is one of the core members of
developed by Sun Microsystems in 1993. In 2010, after the Internet protocol suite. The protocol was designed

17 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

by David P. Reed in 1980 and works under Transport layer of OSI model. Its protocols include the Hypertext
layer protocol of OSI model. Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Post Office Protocol 3 (POP3), Simple Mail Transfer
118. Which of the following is NOT an internet Protocol (SMTP) and Simple Network Management
protocol? Protocol (SNMP).
A. NMP
B. HTTP 121. What layer in the TCP/IP model is equivalent to
C. FTP the Transport layer of the OSI model?
Library Info

Library Info
D. SMTP A. Process/Application layer
B. Host-to-Host layer
Answer: C (NMP) C. Internet layer
119. How many layers are there in TCP/IP Model? D. Network Access/Link Layer
A. 2 Answer: B (Host-to-Host Layer)
B. 4
C. 5 Notes: The Host-to-Host layer is equivalent to the
D. 7 Transport layer of the OSI model. It is the third layer in
TCP/IP model. The protocols in this layer include TCP
Answer: B (4) and UDP.
Notes: TCP/IP, or the Transmission Control 122. Which layers of the OSI reference model are
Protocol/Internet Protocol, is a suite of host to host layers?
communication protocols used to interconnect network a) Transport layer
devices on the internet. The Defense Advanced Research b) Network layer
Projects Agency (DARPA), the research branch of the c) Session layer
U.S. Department of Defense, created the TCP/IP model d) Data Link Layer
A. a and b
in the 1970s for use in ARPANET, a wide area network
B. a, and c
that preceded the internet. The TCP/IP model, also
C. b and c
called DoD model, is a concise version of the OSI
D. c and d
model. It originally contains four layers, unlike seven
layers in the OSI model. The layers are: (i) Answer: B
Process/Application Layer (ii) Host-to-Host/Transport
Layer (iii) Internet Layer, and (iv) Network Access/Link 123. Which layer in the TCP/IP model is equivalent
Layer. to the Network layer of OSI model?
A. Process/Application layer
120. Which layers in the OSI model is equivalent to B. Host-to-Host layer
the Process/Application layer of TCP/IP model? C. Internet layer
A. Application layer D. Network Access/Link Layer
B. Presentation layer
C. Session layer Answer: C (Internet Layer)
D. All the above
Notes: The Internet layer is equivalent to the Network
Answer: D (All the above) layer of the OSI model. It is the second layer in TCP/IP
model. The protocols in this layer include IP and the
Notes: Process/Application layer is the top most layer of Internet Control Message Protocol (ICMP), which is
four layer TCP/IP model. It combines the functions of used for error reporting.
Application layer, Presentation layer and Session
18 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

124. Which layers in the OSI model is equivalent to Notes: An RDBMS is a DBMS designed specifically
the Network Process/Link layer of TCP/IP model? for relational databases. A relational database refers to
A. Physical layer a database that stores data in a structured format,
B. Data Link layer using rows and columns. This makes it easy to locate
C. Both A and B and access specific values within the database. It is
D. None of the above "relational" because the values within each table are
related to each other. The term "relational database" was
Answer: C (Both A and B)
Library Info

Library Info
invented by Edgar F. Codd at IBM in 1970.
Notes: Network Process/Link layer is the lowest layer 128. Which of the following is a search engine?
(First layer) in the TCP/IP model. It combines the A. Internet Explorer
functions of Data link layer and Physical layer of OSI B. Mozilla Firefox
model. The protocols in this layer include Ethernet for C. Google Chrome
local area networks (LANs). D. Google Scholar
125. The TCP/IP layer that is responsible for Answer: D (Google Scholar)
providing the communication and packet services
is the __. Notes: Google Scholar, first launched in November
A. Transport Layer 2004, is a freely accessible web search engine that
B. Internet Layer indexes the full text or metadata of scholarly literature.
C. Application Layer
D. Data Link Layer 129. Common network topologies are__.
A. Bus and Ring
Answer: A (Transport Layer) B. Mesh and Ring
C. Star
126. Relational database is __. D. Both A and C
A. A work which has some relationship with
another work Answer: D (Both A and C)
B. A symbol representing relationship between
two concepts 130. Bus, ring and star topologies are mostly used in
C. Manipulation commands which relate __.
records in different fields A. LAN
D. A mechanism which transfer database from B. MAN
one field to another field C. WAN
D. None of the above
Answer: C
Answer: A (LAN)
127. The expansion of RDBMS is __.
A. Research Database Management System 131. The network topology in which nodes are
B. Rational Database Management System connected to a central hub is known as:
C. Relational Database Management System A. Ring Topology
D. Reference Database Management System B. Bus Topology
C. Star Topology
Answer: C (Relational Database Management D. Mesh Topology
System)
Answer: C (Star Topology)

132. FDDI is a ___.


19 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Bus Network network. This topology is the most robust and


B. Ring Network reliable. It ensures the data privacy and security,
C. Mesh Network because every message travels along a dedicated
D. Star Network link.
Answer: B (Ring Network) 135. Which computer network topology uses routers?
Notes: Fiber Distributed Data Interface (FDDI) is a A. Bus
Library Info

Library Info
standard for data transmission in a local area network. It B. Ring
uses optical fiber as its standard underlying physical C. Mesh
medium. A FDDI network contains two rings, one as a D. Tree
secondary backup in case the primary ring fails. Answer: C (Mesh)
133. The Topology with highest reliability is____. 136. The network topology that supports bi-
A. Bus Topology directional links between each possible node is __.
B. Star Topology A. Tree
C. Ring Topology B. Star
D. Mesh Topology C. Mesh
Answer: D (Mesh Topology) D. Ring

Notes: In the mesh topology each computer is connected Answer: C (Mesh)


to each of the other computers. If you have six 137. In computer network, short message that travels
computers you would need five network cards in each around the communication medium is called _.
computer to connect to all the other computers in the A. Ring
LAN. To add computers to the network you would have B. Baud
to add a cable run and a network card to each computer. C. Mesh
This topology requires the most cable and hardware to D. Token
keep the network running that makes it the most
expensive. However, on the plus side, if any link or Answer: D (Token)
computer goes down there are always multiple paths to
get the data through. It also ensures the data privacy and 138. ‘Jitter’ refers to __.
security, because every message travels along a A. Errorless delivery
dedicated link. This makes the topology most robust B. Variation in the packet arrival time
and reliable. C. Timely delivery of message
D. None of the above
134. In which topology, each computer is connected
to every other computer? Answer: B (Variation in the packet arrival time)
A. Ring
Notes: Jitter, or network jitter, is the variance in time
B. Bus
delay in milliseconds (ms) between data packets over
C. Star
a network. It is a disruption in the normal sequence of
D. Mesh
sending data packets. The technical term for jitter is
Answer: D (Mesh) “packet delay variance”.

Notes: In the mesh topology each computer is 139. Which of the following is a component of
hypertext?
connected to each of the other computers in the
20 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Audio 143. Arrange the following chronologically according


B. Text to their development:
C. Video a) Vaccum tube
D. Audio-video b) Microchip
c) Transistor
Answer: B (Text) d) Integrated Circuit
140. Who enunciated the term hypertext?
Library Info

Library Info
A. E. Garfield A. (a), (c), (d) and (b)
B. Raj Reddy B. (c), (a), (d), and (b)
C. Ted Nelson C. (c), (d), (b) and (a)
D. (d), (a), (b) and (c)
D. Bill Gates

Answer: C (Ted Nelson) Answer: A

144. Arrange the following chronologically, as per


Notes: Ted Nelson, an American Information
Technology Scientist is credited with coining several their development:
new words. ‘Hypertext and ‘Hypermedia’ coined in a) Punched card
1963 and first published in 1965. He also coined the b) Optical disc
c) Magnetic disc
terms: Transclusion, Virtuality, Interwingularity and
d) Floppy disc
didonics.

141. ‘Bing’ is a __. A. (a), (c), (d) and (b)


A. Web browser B. (c), (a), (d), and (b)
B. Internet Browser C. (c), (d), (b) and (a)
C. Metasearch Engine D. (d), (a), (b) and (c)
D. Search Engine
Answer: A
Answer: D (Search Engine)
145. Select the right sequence of the following
Notes: Bing, launched in 2009, is a web search engine devices according to their storage capacity in
owned and operated by Microsoft. descending order:

142. The term ‘Cyberspace’ was first used by: A. CD, DVD, Floppy Disc, Punched Card
A. Andrew Pollock B. DVD, CD, Floppy Disc, Punched Card
B. William Gibson C. Punched Card, Floppy Disc, CD, DVD
C. John Postal D. Floppy Disc, Punched Card, CD, DVD
D. Joe Flower
Answer: B
Answer: B (William Gibson)
146. ‘Google Earth’ is __.
Notes: William Gibson, an American fiction writer, A. Web image
notably coined the term "cyberspace" in his short story B. Search engine
"Burning Chrome" (1982) and later popularized the C. Virtual globe
concept in his acclaimed debut novel Neuromancer D. Webmap search
(1984).
Answer: C (Virtual Globe)

21 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Google Earth first released in 2001. Answer: D (10)

147. In computer terminology, the term ‘bug’ stands Notes: In computing, a digital object identifier (DOI) is
for __. a persistent identifier or handle used to identify objects
A. Error in programming uniquely. DOIs are in wide use mainly to identify
B. Computer virus academic, professional, and government information,
C. Error in Humanware Selection such as journal articles, research reports and data sets,
D. Error in Humanware Selection and official publications. The developer and
Library Info

Library Info
administrator of the DOI system is the International
Answer: A (Error in Programming) DOI Foundation (IDF), which introduced it in 2000. A
DOI takes the form of a character string divided into two
148. An Application Program Interface (API)
language is used for ___. parts, a prefix and a suffix, separated by a slash. The
A. Network Management prefix identifies the registrant of the identifier, and the
B. Graphical User Interface suffix is chosen by the registrant and identifies the
C. Relational Interface in Database specific object associated with that DOI.
Management 151. The International body that coordinates the
D. Database Management System assignment of unique domain names, protocol
Answer: B (Graphical User Interface) address is ___.
A. IGF
Notes: The graphical user interface (GUI) is a form B. IANA
of user interface that allows users to interact with C. ICANN
electronic devices through graphical icons and audio D. ISP
indicator such as primary notation, instead of text-based
user interfaces, typed command labels or text navigation. Answer: C (ICANN)

149. The web address that acts as permanent Notes: Established in 1998, the Internet Corporation
identifier is ___. for Assigned Names and Numbers (ICANN) is a non-
A. URL profit public-benefit corporation, responsible, at the
B. DOI overall level, for the administration of three sets of
C. PURL unique identifier systems for the internet: domain
D. UDI names, numerical internet protocol (IP) addresses,
and a third type that serves to identify so-called port and
Answer: C (PURL) parameter numbers.

Notes: The PURL (Persistent Reform Resource Locator) 152. The loss in signal power as light travels down
that redirects requests to the proper location of a user’s the fiber is called __.
requested web resource. It is meant to remain constant A. Attenuation
despite an ever changing Web infrastructure. The PURL B. Propagation
concept was developed at OCLC in 1995. C. Scattering
D. Interruption
150. DOI always starts with the digits ___.
A. 40 Answer: A (Attenuation)
B. 30
C. 20 Notes: Attenuation refers to any reduction in the
D. 10 strength of a signal. It occurs with any type of signal,

22 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

whether digital or analog. It is a natural consequence of C. Cyber criminals use botnets to instigate
signal transmission over long distances. malicious activities such as credentials leaks,
unauthorized access, data theft and DDoS
153. Virus is software which can __. attacks
A. Manipulate data D. All are correct
B. Replicate itself
C. Damage computer Answer: D
D. All the above
Library Info

Library Info
Notes: A botnet is a collection of Internet-connected
Answer: D (All the above) devices such as computers, smartphones or IoT devices
whose security have been breached and controlled by a
154. An attempt to make a computer resource third party. Each compromised device, known as a "bot",
unavailable to its intended user is called __. is created when a device is penetrated by a malicious
A. Denial of Service (DoS) Attack software. The controller of a botnet is able to direct the
B. Virus Attack activities of these compromised computers through
C. Worm Attack communication channels. Cyber criminals use botnets to
D. Bot-net Attack instigate botnet attacks, which include malicious
Answer: A (Denial of Service (DoS) Attack) activities such as credentials leaks, unauthorized access,
data theft and DDoS attacks.
Notes: A DoS (Denial of Service) Attack is an attack
which is perpetrated for the purpose of making a target 156. Jubilee Project is associated with what?
machine or network resource unavailable for its intended A. Evaluation of electronic information
services
users. The attack is usually made to temporarily or
B. Public library survey
indefinitely suspend a service of a host connected to
internet and thereby deny legitimate users access to a C. Strategic management of libraries
resource such as accessing a website, network, emails, D. Scale development
etc or making it extremely slow. This type of attack is Answer: A (Evaluation of electronic information
usually implemented by hitting the target resource such services)
as a web server with too many requests at the same time.
This results in the server failing to respond to all the 157. Identify the odd one out:
requests. The effect of this can either be crashing the A. Bluetooth
servers or slowing them down. B. RFID
C. VSAT
DDoS (Distributed Denial of Service) Attack is an D. Wi-Fi
attack in which the attack comes from multiple sources
having different IP addresses. Basically a DDoS attack is Answer: C (VSAT)
a DoS attack in which the attack is perpetrated using
several source IP addresses. 158. Which protocol helps in searching and retrieving
information from remote computer databases?
155. Which among the below statement is correct A. SMTP
regarding Botnet? B. Z39.50
A. a collection of internet-connected devices C. FTP
infected by malware D. Telnet
B. The word ‘botnet’ is a combination of ‘robot’
and ‘network’ Answer: B (Z39.50)

23 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

159. A router ___. Answer: D


A. Forward data packets between
telecommunication networks 161. Which layer of the OSI model is mostly
concerned with the syntax of the data?
B. Receives a signal and retransmits it at a
A. Session layer
higher level B. Presentation layer
C. Helps in interfacing with another network C. Network layer
D. Essentially translates protocols D. Data link layer
Library Info

Library Info
Answer: A Answer: B (Presentation Layer)

Notes: A router is a device that connect multiple Notes: This layer, also called syntax layer, is primarily
networks (two LANs or WANs or a LAN and its ISP’s responsible for making the data presentable for
network) and forward data packets destined either for its applications to consume. The functions of this layer are
own networks or other networks. Router operates in data representation, encryption and decryption,
network layer of OSI model and transmits data in the converting machine dependent data to machine
independent data and compression of data.
form of packets whereas bridge operates in data link
layer of OSI model and transmits data in the form of 162. The Network layer concerns with __.
frames. Bridge has only two ports (single input and A. Frames
single out port) and reads the MAC address of a device B. Bits
whereas router has more ports compare to a bridge and C. Packets
reads the IP address of a device. D. None of the above

Devices used in each layer are as follows: Answer: C (Packets)


Application layer: Gateways, Firewalls, all end devices
like PC’s, Phones, Servers. 163. The Physical layer concerns with __.
Presentation layer : Gateways, Firewalls, PC’s. A. Bit-by-bit delivery
Session layer: Gateways, Firewalls, PC’s. B. Process to process delivery
Transport layer: Gateways, Firewalls. C. Application to Application delivery
Network layer: Routers, Brouters, 3-layer switches. D. None of the above
Data-link layer: Bridges, Modems, Network cards, 2-
layer switches. Answer: A (Bit by bit delivery)
Physical layer or below: Hubs, Repeaters, Cables,
Fibers, Wireless. 164. OSI Layer that is used to deal with the
mechanical and electrical specifications is __.
160. Select the correct combinations: A. Physical layer
a) Repeaters – Helps in strengthening the B. Data Link layer
signals C. Network layer
b) Gateways – Allows dissimilar networks to D. Transport layer
communicate
c) Routers – Allows similar networks to Answer: A (Physical layer)
communicate
d) Switches – Allows data to be transferred Notes: This layer includes the physical equipment
within the network involved in the data transfer, such as the cables and
A. a, b, and d are correct switches. This is also the layer where the data gets
B. a, c and d are correct converted into a bit stream, which is a string of 1s and
0s. In short, this layer provides a physical medium
C. a and d are correct
through which bits are transmitted.
D. a, b, c, and d are correct

24 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

165. OSI Layer that is responsible for transferring 169. Transmission data rate is decided by __.
frames is __. A. Network layer
A. Application layer B. Data Link layer
B. Presentation layer C. Physical layer
C. Data Link Layer D. Transport layer
D. Session Layer
Answer: C (Physical layer)
Answer: C (Data Link Layer)
Notes: Physical layer is a layer 1 device which deals
Library Info

Library Info
166. Segmentation and reassembly is the with network cables or the standards in use like
responsibility of __. connectors, pins, electric current used etc. Basically the
A. Presentation layer transmission speed is determined by the cables and
B. Session layer connectors used. Hence it is physical layer that
C. Transport layer determines the transmission speed in network.
D. Network layer
170. In OSI model, dialogue control and token
Answer: C (Transport layer) management are responsibilities of __.
A. Application layer
Notes: Transport layer is responsible for end to end B. Data Link layer
communication between the two devices. It takes data C. Session layer
from the session layer and breaks it into segments before D. Presentation layer
sending it to Network layer. Transport layer working on
receiving device is responsible for reassembling of the Answer: C (Session layer)
segments into data the session layer can consume.
Notes: Session layer, also known as a network dialog
167. Which layer links the network support layers controller, is responsible for creating, maintaining,
and user support layers? synchronizing the interaction between communicating
A. Transport Layer applications. This layer allows two systems to start
B. Session Layer communication with each other in half-duplex or full-
C. Data Link Layer duplex. Thus, the session layer establishes, controls, and
D. Network Layer ends sessions occurring between communicative
applications.
Answer: A (Transport Layer)
171. Which of the following facets are associated
Notes: Physical, data link and network layers are with the session layer?
network support layers and session, presentation and a) Dialog control
application layers are user support layers. Transport b) Token management
layer is in the middle that links them. c) Semantics of the information transmitted
d) Synchronization
168. Which layer provides services to users? A. a, b, and d are correct
A. Application layer
B. Presentation layer B. a, c and d are correct
C. Session layer C. a and d are correct
D. Data Link layer D. b and d are correct

Answer: A (Application layer) Answer: A

Notes: In networking, a user mainly interacts with 172. The device that is required to translate digital
application layer to create, send and receive information signals into analogue form and back again is
to/from other computer or network. called a __.
A. Modem
B. Router
25 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Connector c) Google
D. Switch d) Hotbot
A. a and b
Answer: A (Modem)
B. a, and c
Notes: Modem (modulator-demodulator) is a C. b and c
hardware device that converts data into a format suitable D. c and d
for a transmission medium so that it can be transmitted
from one computer to another. A modem modulates one Answer: A
Library Info

Library Info
or more carrier wave signals to encode digital
information for transmission and demodulates signals to 177. Arrange the following layers of networking of
decode the transmitted information. The goal is to OSI model in the sequence of their functioning:
produce a signal that can be transmitted easily and a) Network layer
decoded reliably to reproduce the original digital data. b) Physical layer
c) Transport layer
173. Device which is used to connect computer with d) Data Link layer
telephone line for internet connection is called __.
A. Hard Disc
B. Pen Drive A. (a), (b), (c) and (d)
C. MODEM B. (c), (a), (d), and (b)
D. Compact Disc C. (c), (d), (b) and (a)
D. (b), (d), (a) and (c)
Answer: C (MODEM)
Answer: D
174. Select the correct statements:
A. Modem works at Data Link Layer whereas 178. Arrange the following in ascending order:
Router works at Network Layer a) Exa Byte
B. Modem contains two ports only, whereas b) Peta Byte
Router contains multiple ports
c) Zetta Byte
C. Modem can work independently without a
router, but router needs a modem to d) Yotta Byte
establish connections
D. All are correct A. (a), (b), (c) and (d)
B. (b), (a), (c), and (d)
Answer: D C. (c), (d), (b) and (a)
D. (d), (a), (b) and (c)
175. ‘Internet Governance Guide for Libraries’ is a
publication of __. Answer: B
A. ALA
B. IFLA Notes: Bit (Short for ‘Binary digit’, the smallest unit of
C. UNESCO data in a computer; a bit has a single binary value, either
D. OCLC 0 or 1) – Nibble (4 bits) – Byte (8 bits) – Kilobyte (1024
bytes, 103) – Megabyte (1024 KB, 106) – Gigabyte (1024
Answer: B (IFLA) MB, 109) – Terabyte (1024 GB, 1012) – Petabyte (1024
TB, 1015) – Exabyte (1024 PB, 1018) – Zettabyte (1024
176. Which of the following search engines have
EB, 1021) – Yottabyte (1024 ZB, 1024).
facilities for Boolean search, truncation, proximity
search, and phrase search? 179. For faster communication of data ___ is used.
a) Alta Vista A. Microwave transmission
b) AOL Search B. Optical fiber
26 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Coaxial cable B. Transmission of magnetic tapes


D. Free transmission C. Transmission of telegraphic codes
D. Transmission of documents
Answer: B (Optical fiber)
Answer: D (Transmission of documents)
180. Arrange the following in ascending order
according to their storage capacity: 184. What is called a measure of the amount of
a) Magnetic Disc information that can be transmitted in a given
Library Info

Library Info
b) CD-ROM time?
c) Magnetic Tape A. Speed
d) Floppy Disc B. Rate
A. (a), (d), (c) and (b) C. Bandwidth
B. (c), (a), (d), and (b) D. Frequencies
C. (c), (d), (b) and (a)
D. (d), (c), (a) and (b) Answer: C (Bandwidth)

Answer: D Notes: The maximum amount of data transmitted over


an internet connection in a given amount of time. It is
181. IBM stands for ___. measured in bits per second.
A. International Bibliographic Management
B. International Business Machines 185. What is the unit of the rate of communication
C. International Bibliographic Data data on the channel?
Management A. pbs
D. International Business Management B. bps
C. bsp
Answer: B (International Business Machines) D. bbs

Notes: IBM Corporation began in 1911, at Endicott, Answer: B (bps)


New York, as the Computing-Tabulating-Recording
Company (CTR) and was renamed as "International Notes: Bps is a unit used for measuring the speed of
Business Machines" in 1924. It is also known by the transmission of data on a network of computers – that is
nickname ‘Big Blue’. the amount of information sent or received in a given
amount of time. A bit is a single unit of digital
182. DVD stands for __. information, represented by either a 1 or a 0. The total
A. Digital Versatile Disc number of bits per second (bps) that can be transmitted
B. Digital Volatile Disc over a network link represents the bandwidth of that
C. Digital Venerable Disc link.
D. Digital Varying Disc
186. In the context of Information transmission, the
Answer: A (Digital Versatile Disc) term ‘bandwidth’ denotes:
A. A protocol
Notes: DVD (Digital Versatile Disc or Digital Video B. Network topology
Disc) is a digital optical disc storage format invented and C. Channel capacity
developed in 1995 and first released in late 1996 in D. Transmission media
Japan.
Answer: C (Channel Capacity)
183. Facsimile transmission is ___.
A. Transmission of micro-films
27 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Bandwidth refers to ‘channel capacity’. In other Notes: The speed with which data is getting transmitted
words, Network bandwidth is the capacity of a wired or in computer is called data transmission speed. It is
wireless network communications link to transmit commonly measured in bits per second. To be more
the maximum amount of data from one point to specific, it is measured in megabits (million bits)
another over a computer network or internet connection per second which is usually abbreviated as Mbps.
in a given amount of time -- usually, per second.
190. Which of the following may contain devices
187. The term ‘Bandwidth’ refers to ______. such as protocol translators?
Library Info

Library Info
A. The amount of data that can be sent through A. Routers
communication media B. Concentrators
B. The amount of data in the multimedia file C. Gateway
C. The speed of transmission of data D. Repeater
D. Number of bands available in the computer
Answer: C (Gateway)
Answer: A
Notes: A gateway is a piece of networking
Notes: In computing, bandwidth is the maximum hardware used in telecommunications networks that
amount of data transfer across a given path. It measures allows data to flow from one discrete network to
how much data (capacity of wired or wireless network) another. In another words, it allows dissimilar
can be sent over a specific connection in a given amount networks to communicate. Gateways are distinct
of time. Bandwidth is not a measure of network from routers or switches in that they communicate
speed. using a more than one protocol to connect a bunch of
networks and can operate at any of the seven layers of
188. ‘BAUD’ rate means __. the OSI model. A network gateway provides
A. The number of bits transmitted per unit time interoperability between networks and contains
B. The number of bytes transmitted per unit devices, such as protocol translators, impedance
time matchers, rate converters, fault isolators,
C. The rate at which the signal changes or signal translators.
D. None of the above
191. In data transfer process, which of the following
Answer: C (The rate at which the signal changes) is used for strengthening the signals?
Notes: Bit rate and Baud rate, are terms that often used A. Hubs
in data communication. Bit rate is simply the number of B. Repeater
bits (i.e., 0’s and 1’s) transmitted per unit time. While C. Switching packets
Baud rate is the number of signal units transmitted D. Firewalls
per unit time that is needed to represent those bits. Answer: B (Repeater)
189. Unit for measuring speed of data transmission is Notes: A repeater is an electronic device in a
___. communication channel that receives a signal, increases
A. Bit rate its power and retransmits it, allowing it to travel further
B. Baud rate so that the signal can cover longer distances or be
C. Cycle rate received on the other side of an obstruction. An
D. Jet rate important point to be noted about repeaters is that they
Answer: A (Bit rate) do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at

28 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

the original strength by taking high input power and Answer: C (Multiple ports)
providing low output power. Repeater is a 2 port device
and operates under Physical Layer. Notes: A hub is basically a multiport repeater works
on the Physical layer of OSI model. A hub connects
192. Select the correct options about Amplifier: multiple wires coming from different branches, for
a) Amplifier takes low input power and example, the connector in star topology which connects
provides high output power. different stations. Hubs cannot filter data, so data
b) Amplifier is an electronic device having 4 packets are sent to all connected devices. In other
Library Info

Library Info
ports words, collision domain of all hosts connected through
c) Amplifier increases the amplitude of the Hub remains one. Also, they do not have intelligence to
signal with the noise find out best path for data packets which leads to
d) Amplifier is used in wireless inefficiencies and wastage.
communication.
A. a, b, and d are correct 194. BABYLON is computer software for __.
B. a, c and d are correct A. Digital library
C. a and d are correct B. Library management system
D. b and d are correct C. Translation
D. Statistical Calculation
Answer: B
Answer: C (Translation)
Notes: Amplifier is used for increasing the amplitude
or strength of the signal, if the previously transmit Notes: Babylon is a computer dictionary and translation
signal is found weak. It uses electric power from program developed by the Israeli company Babylon
a power supply to increase the amplitude of a signal Software Ltd. The company was established in 1997 by
applied to its input terminals, producing a proportionally the Israeli entrepreneur Amnon Ovadia.
greater amplitude signal at its output. Some important 195. Identify the statement that is not true about
difference between Repeater and Amplifier are: (i)
ISDN:
Repeater takes high input power and provides low output
A. ISDN is not limited to transmission of voice
power, whereas Amplifier takes low input power and
only
provides high output power. (ii) Repeater is generally B. ISDN is simply a point-to-point solution like
used in static (stationary) environment whereas a leased line
Amplifier is generally used in Mobile and Remote area C. ISDN is purely digital communication
network. (iii) Repeater regenerates the signal so that the
D. ISDN can provide simultaneous voice, video
noise can be reduced or eliminated whereas Amplifier and text transmission
increases the amplitude of the signal with the noise. (iv)
Repeater works on the physical layer of OSI model Answer: B (ISDN is simply a point-to-point solution
whereas Generally Amplifier is used in wireless like a leased line)
communication. However, both are electronic devices,
having 2 ports. 196. Which of the following are ISDN services?
a) RSS
193. Hubs are networking device having __. b) Teletext
A. One port c) Voice mail
B. Two ports d) Video conference
C. Multiple ports A. a and b are correct
D. None of the above B. a, b and d are correct
C. b, c and d are correct
29 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. a and c are correct D. L. J. Cook

Answer: C Answer: B (Vic Hayes)

197. Which of the following are features of ISDN? Notes: Vic Hayes is considered as the “father of WiFi”
a) Second generation hyper media because he chaired the committee who introduced the
b) Web 2.0 technology concept of an international standard for wireless
c) Suite of digital services networking, known as the IEEE 802.11 standard.
Library Info

Library Info
d) Work in OSI model
201. A Wi-fi network uses __ waves to transmit
A. c, and d are correct signals?
B. a, and c are correct A. Mechanical
C. b and c are correct B. Radio
D. b and d are correct C. Sound
D. Light
Answer: A
Answer: B (Radio)
198. Which is not applicable to extensible Markup
Languages? 202. Li-Fi stands for __.
A. It is compatible with SGML A. Light Fidelity
B. It is usable over internet B. Low Fidelity
C. XML documents are easy to create C. Large Fidelity
D. It has to do with semantics to data D. Loss Fidelity

Answer: D (It has to do with semantics to data) Answer: A (Light Fidelity)

199. Which of the following technologies use Notes: Li-Fi (Light Fidelity) is wireless
electronic waves at radio frequency for data communication technology, which utilizes light to
transmission? transmit data between devices. The term was first
A. Li-fi introduced by Harald Haas in 2011. In technical terms,
B. Wi-fi Li-Fi is a light communication system that is capable of
C. Optical cables transmitting data at high speeds over the visible
D. Twisted pairs light, ultraviolet, and infrared spectrums. However,
Wi-fi is a family of wireless networking technologies,
Answer: B (Wi-fi) based on the IEEE 802.11 family of standards, which
are commonly used for local area networking of devices
Notes: Wi-Fi (Wireless Fidelity) is a family of wireless and Internet access. Wi-Fi is a trademark of the non-
network protocols, based on the IEEE 802.11 family of profit Wi-Fi Alliance. In contrast to Li-Fi, it uses Radio
standards, which are commonly used for local area waves to transmit data between devices.
networking of devices and Internet access. Wi-Fi is a
trademark of the non-profit Wi-Fi Alliance, founded in 203. Identify unguided media of telecommunication
1999. from the following:
a) Optical fibre cable
200. Who is considered as the ‘Father of Wi-Fi’? b) Infrared
A. Tim Berners Lee c) Microwave
B. Vic Hayess d) Co-Axial Cable
C. Seymour Roger Cray A. a and b are correct
30 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

B. a, b and d are correct D. TCP


C. b, c and d are correct
D. b and c are correct Answer: B (PGP)

Answer: D 207. SNMP stands for ___.


A. Simple Network Management Protocol
Notes: An unguided transmission transmits the B. Single Network Management Protocol
electromagnetic waves without using any physical C. Systematic Network Management Protocol
Library Info

Library Info
medium. Therefore it is also known as wireless D. Solid Network Management Protocol
transmission. Unguided transmission is broadly
classified into three categories: (i) Radio waves (ii) Answer: A (Simple Network Management Protocol)
Microwaves, and (iii) Infrared. Notes: Simple Network Management Protocol
204. POP stands for ___. (SNMP) is an Internet Standard protocol for collecting
A. Print Office Protocol and organizing information about managed devices
B. Post Office Protocol on IP networks and for modifying that information to
C. Pre Office Protocol change device behavior. Devices that typically support
D. Post Object Protocol SNMP include cable modems, routers, switches, servers,
workstations, printers, and more. SNMP is widely used
Answer: B (Post Office Protocol) in network management for network monitoring.

Notes: In computing, the Post Office Protocol (POP) is 208. Which of the following is not file hosting
an application-layer Internet standard protocol used by e- service?
mail clients to retrieve e-mail from a mail server. POP A. One Drive
version 3 (POP3), 1988 is the version in common use. B. Google Drive
C. Live Drive
205. PGP Stands for ___. D. Xbox Live
A. Pretty Good Privacy
B. Post Good Protocol Answer: D (Xbox Live)
C. Pretty Grand Privacy
D. Pre Good Protocol 209. Identify the feature of proprietary software:
a) Continuity and Development
Answer: A (Pretty Good Privacy) b) Ease of use
c) Transparency
Notes: Pretty Good Privacy (PGP) initially released in d) Documentation and Support
1991, is an encryption program that provides
cryptographic privacy and authentication for data A. a and b are correct
communication. PGP is used for signing, encrypting, and B. a, b and d are correct
decrypting texts, e-mails, files, directories, and whole C. b, c and d are correct
disk partitions and to increase the security of e-mail D. a and c are correct
communications.
Answer: B
206. The protocol used to provide security to emails
is known as __. 210. Joystick is ___.
A. POP A. An input device
B. PGP B. An output device
C. SNMP C. A storage device

31 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. A processing device Answer: A (Two digits)

Answer: A (An input device) Notes: Computers operates in binary which is a numeric
system that only uses two digits - 0 and 1. This means
211. The function of Firewall is to ___. they store data and perform calculations using only zeros
A. Open parts to all IP and ones.
B. Enable user privacy
C. Enable anonymous surfing 215. In Binary number system, digit 7 is represented
Library Info

Library Info
D. Filter the IP Packets by __.
A. 101
Answer: D (Filter the IP Packets) B. 001
Notes: In computing, a firewall is a network security C. 111
system that monitors and controls incoming and D. 100
outgoing network traffic based on predetermined Answer: C (111)
security rules. It acts as a packet filter that inspects all
packets transferred between computers. 216. In Binary number system, digit 9 is represented
by:
212. Who among the following was the beginner of A. 1000
Internet? B. 1001
A. NICNET C. 1010
B. ALANET D. 1011
C. ARPANET
D. LISNET Answer: B (1001)

Answer: C (ARPANET) 217. Decimal number ‘100’ is represented in binary


as:
Notes: The first workable prototype of the Internet came A. 00100111
in the late 1960s with the creation of ARPANET, or the B. 11101100
Advanced Research Projects Agency Network. C. 01010011
Originally funded by the U.S. Department of Defense, D. 1100100
ARPANET used packet switching to allow multiple
computers to communicate on a single network. Answer: D (1100100)

213. The communication protocol used by Internet is 218. Which one is the correct ‘Binary number’ for
__. Decimal ‘115’?
A. HTTP A. 1100011
B. WWW B. 1010111
C. TCP/IP C. 1111111
D. FTP D. 1110011

Answer: C (TCP/IP) Answer: D (1110011)

214. Binary system of computers consists __. Notes: An easy method of converting decimal to binary
A. Two digits number equivalents is to write down the decimal number
B. Four digits and to continually divide-by-2 (two) to give a result and
C. Six digits a remainder of either a “1” or a “0” until the final result
D. Eight digits equals zero.
32 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

219. In the binary system of numbers, 100 represents 223. Which of the following programming
the decimal number __. language is exclusively used for Artificial
A. 12 Intelligence?
B. 7 A. C
C. 5 B. J2EE
D. 4 C. Prolog
D. JAVA
Answer: D (4)
Library Info

Library Info
Answer: C (Prolog)
220. The concept of ‘artificial intelligence’ belongs to
Notes: Prolog is a logic programming language
___ generation.
associated with artificial intelligence and computational
A. Second
linguistics. It was first developed in 1972 by French
B. Third
Scientists Alain Colmerauer and Robert Kowalski.
C. Fourth
D. Fifth
224. Identify the fifth generation programming
Answer: D (Fifth) languages from the following:
a) Java
Notes: Artificial intelligence (AI) is the simulation of
b) Mercury and OPS5
human intelligence processes by machines, especially
c) PROLOG
computer systems. The term ‘Artificial Intelligence’ was
d) SQL
first coined in 1956 by John McCarthy. He is also
A. a and b are correct
known for developing Lisp programming language
B. b and c are correct
and creating the term ‘Circumscription’ - a non-
C. c and d are correct
monotonic logic to formalize the common
D. a and c are correct
sense assumption that things are as expected unless
otherwise specified. Answer: B
221. Which of the following feature incorporated in Notes: While fourth-generation programming
Fifth Generation of Computers? languages are based on algorithm written by
A. Artificial Intelligence programmer to build specific programs, fifth-generation
B. Integrated circuits languages are constraint-based and logic programming,
C. Multiple access designed to make the computer solve a given problem
D. Federation of databases without the programmer. Fifth-generation languages are
mainly used in artificial intelligence research.
Answer: A (Artificial Intelligence)
OPS5 and Mercury and PROLOG are examples of
222. Artificial Intelligence can be used in every fifth-generation languages. Prolog, designed by Alain
sphere of life because of its __. Colmerauer, Robert Kowalski is a logic
A. Ability to think like human beings programming language associated with artificial
B. Ability to work in hazardous places intelligence
C. Ability to work in artificial environments
225. Who among the following is considered ‘the
D. All the above
farther of Supercomputing’?
Answer: A A. Seymour Cray
B. Tim Berners Lee
C. Michael Casey
33 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. Lillian Cray Answer: A (Vijay Pandurang Bhatkar)

Answer: A (Seymour Cray) Notes: Vijay P. Bhatkar is the architect of India's


national initiative in supercomputing where he led the
Notes: Seymour Roger Cray (1925-1996) was an development of Param supercomputers. He developed
American electrical engineer and supercomputer the first Indian supercomputer, the PARAM 8000, in
architect who designed a series of computers that were 1991 and later the PARAM 10000 in 1998.
the fastest in the world.
Library Info

Library Info
230. Crawlers are related to ___.
226. Optic fibres are made of __. A. Search Engines
A. Fine glass stands B. Directories
B. Copper Wires C. Protocols
C. Alloy D. Networks
D. Polyester strings
Answer: A (Search Engines)
Answer: A (Fine glass stands)
Notes: A Web crawler sometimes called a spider or
227. The type of connectivity options provided by spiderbot that systematically browses the World Wide
Internet Service Providers are __. Web, typically for the purpose of Web indexing. It is
A. Dial-up generally used by Search engine.
B. Leased lines
C. VSAT 231. The first page of the website is called as:
D. All the above A. Home Page
B. Title Page
Answer: D (All the above) C. Cover Page
228. WAIS stands for __. D. Half-Title Page
A. Wide Area Internet Service Answer: A (Home Page)
B. Wide Area Information Server
C. Whole Area Internet Service 232. Major problems of ‘Information Technology’
D. Wide Area Internet Server are:
a) Information overload
Answer: B (Wide Area Information Server) b) Information insecurity
Notes: Wide Area Information Server is a client–server c) Lack of innovative technologies
d) Lack of control over communication
text searching system that uses the ANSI Standard
A. a and b are correct
Z39.50 Information Retrieval Service Definition and
Protocol Specifications for Library Applications, to B. a, c and d are correct
search and index databases on remote computers. It was C. b, c and d are correct
D. a, b, and d are correct
developed in 1988 by Thinking Machines
Corporation (TMC) of Cambridge, Massachusetts. Answer: D
229. Who developed the first Indian Supercomputer? 233. Which of the following is a file format for E-
A. Vijay Pandurang Bhatkar documents?
B. A. P. J Abdul Kalam A. HTTP
C. M. Vijayan B. TCP/IP
D. None of the above C. FTP

34 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

D. HTML Answer: B (It is continuous)

Answer: D (HTML) 238. ‘A piece of program code, that spreads by


making copies of itself’ is an ___.
Notes: Hyper Text Markup Language, first released in A. Virus
1993, is the standard markup language for documents B. File Format
designed to be displayed in a web browser. C. Email
D. Bandwidth
Library Info

Library Info
234. DOS, UNIX, LINUX, Windows are examples of
__. Answer: A (Virus)
A. Application Software
B. System software 239. ‘Cryptography’ is related with ___.
C. Computer language A. Research Design
D. Operating system B. Library Classification
C. Information Security
Answer: D (Operating System) D. TQM
235. File management is a work of __? Answer: C (Information Security)
A. Operating system
B. Middle ware Notes: Cryptography is a method of protecting
C. Utility software information and communications through the use of
D. GUI codes so that only those for whom the information is
intended can read and process it. It is the practice and
Answer: A (Operating System) study of techniques for secure communication. The
Notes: File management is the process of manipulating first use of the term cryptograph dates back to the 19th
files (creating, modifying and deleting) in a computer century—originating from The Gold-Bug, a novel
system. Operating system is used to manage files of a by Edgar Allan Poe.
computer system. 240. ‘One Drive’ is operated by ___.
236. SQL stands for ___. A. Alphabet
A. Structured Query Language B. Microsoft
C. Google
B. Soft Query Language
C. Standard Query Language D. Whatsapp
D. Slanted Query Language Answer: B (Microsoft)
Answer: A (Structured Query Language) Notes: OneDrive, first released in August 2007, is a file
Notes: SQL is a domain-specific language used in hosting service and synchronization service operated by
programming and designed for managing data held in a Microsoft as part of its suite of Office Online services.
relational database management system (RDMS). 241. When a cracker attempts to misuse or steal data
237. The significant characteristic of an analogue from system is called:
signal is ___. A. Intrusion
B. Instruction
A. It is discrete
B. It is continuous C. Interpolation
C. It transmits fast D. Innovation
D. It has less noise Answer: A (Intrusion)
35 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

242. Twisted pair cable have maximum segment Answer: A (URL)


length:
A. 50 m 246. What is called the e-mail which is neither
B. 10 m expected nor requested by the receiver?
C. 1000 m A. E-Mail
D. 100 m B. False Mail
C. Junk Mail
Answer: D (100 m) D. Sea Mail
Library Info

Library Info
Notes: The unshielded twisted pair cables can Answer: C (Junk Mail)
have maximum segment length of 100 meters. The
unshielded twisted pair (UTP) cabling is used for 247. Which type of protocol is used by www to
variety of electronic communications. Twisted-pair transmit data?
cabling was invented by Alexander Graham Bell in A. TCP
1881. B. HTTP
C. IP
243. The search engine developed by Alan Emtage D. UDP
was:
A. Veronica Answer: B (HTTP)
B. ALIWEB Notes: HTTP is the protocol used to transmit all data
C. Archie present on the World Wide Web.
D. Infoseek
248. A set of rules which allows different devices to
Answer: C (Archie) hold conversations, what is that called in the field
Notes: Archie was the first tool created by Alan of communication?
Emtage and L. Peter Deutsch in 1990 at McGill A. Agreement
University for indexing FTP achieve, and is considered B. Protocol
C. Treaty
the first basic search engine.
D. Memorandum
244. Infoseek was a popular __.
Answer: B (Protocol)
A. Gateway
B. Search Engine Notes: A communication protocol is a set of rules or
C. Browsing procedures that allow two or more electronic devices of
D. Highway a communications system to transmit information.
Answer: B (Search Engine) 249. What is the component of a search engine which
automatically retrieves documents from the web
Notes: Infoseek was a popular internet search engine
page?
founded in 1994 by Steve Kirsch. It was closed in 1999.
A. Spider
245. The Internet Addresses are also known as __. B. Archiver
A. URL C. Builder
B. OCR D. Searcher
C. MICR
Answer: A (Spider)
D. UDP

36 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Spider - A program that automatically retrieves Notes: Fourth Generation of computers was between
webpages and follows the links on them to retrieve 1971 – 1980. These computers used the VLSI
more webpages. Spiders are used by search engines to technology or the Very Large Scale Integrated (VLSI)
retrieve publicly accessible webpages for indexing, and circuits technology. Therefore they were also known as
they can also be used to check for links to webpages that the microprocessors. Intel was the first company to
no longer exist. develop a microprocessor. The first “personal
computer” or PC developed by IBM in 1981,
250. Phases of Third generation computers belong to
Library Info

Library Info
belonged to this generation. VLSI circuits had almost
the year __. about 5000 transistors on a very small chip and were
A. 1940-1945 capable of performing many high-level tasks and
B. 1952-1964 computations. These computers were thus very compact
C. 1946-1952 and thereby required a small amount of electricity to run.
D. 1964-1971
252. Yahoo! search engine was developed at __.
Answer: D (1964-1971) A. Stanford University
Notes: Development & History of Computer generations B. Carnegie Mellon University
are: C. McGill University
D. Cambridge University
First Generation – (1940 – 1956): Vacuum Tubes;
Answer: A (Stanford University)
(Machine language)

Second Generation – (1956 – 1963): Transistors; (Low- Notes: Yahoo! started at Stanford University by Jerry
level programming languages such as Assembly Yang and David Filo (both electrical engineering
language) graduate students) in 1994 that became a web portal and
search engine.
Third Generation – (1964 – 1971): Integrated Circuits;
(Structured high-level programming languages such 253. Which of the following are true about a web
as C, COBOL and FORTRAN) portal:
a) A portal contains personalized aggregated
Fourth Generation – (1971 – 1980): Very Large Scale information
Integrated (VLSI) Circuits, i.e. Microprocessors; ("Non- b) It requires Login details to access
procedural" high-level programming languages, such as c) Web portal contents can be changed by
object-oriented languages) authorized users
d) Act as the gateway to the specific
Fifth Generation – (1980 – Present): Artificial knowledge domain
Intelligence; Ultra Large Scale Integration (ULSI) A. a and b are correct
Technology; (Logic programming) B. a, b, c and d are correct
C. b, c and d are correct
251. Development of all personal computers took
D. a and c are correct
place in __.
A. Third Generation Computer Answer: B
B. Second Generation Computer
C. Fifth Generation Computer Notes: A web portal is a web-based solution that
D. Fourth Generation Computer contains personalized aggregated content, available for
authorized users. It acts as a gateway to the specific
Answer: D (Fourth Generation Computer) knowledge domain, restricted to authorized users who

37 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

have Login (username password) details. There is a diagnose network communication issues. ICMP is
two way communication between users and portal and mainly used to determine whether or not data is reaching
its content can be changed by authorized users. Web its intended destination in a timely manner. Commonly,
portals are sometimes classified as the ICMP protocol is used on network devices, such as
horizontal and vertical. A horizontal portal is used as a routers to generate error messages to the source IP
platform to several companies in the same economic address when network problems prevent delivery of IP
sector. A vertical portal is a specialized entry point to a packets.
Library Info

Library Info
specific market or industry subject area, or interest.
Whereas a website is a web-based solution that consists 257. ICMP is primarily used for __.
of web pages containing publicly available content, A. Error and diagnostic functions
available for all without restrictions. It is accessible to B. Addressing
all via URL and no one can change its content except C. Forwarding
admin. D. None of the above

254. A customize website (often based on restrictions Answer: A (Error and diagnostic functions)
of domain articles) that immerses information
258. Which of the statement (s) is /are false?
from a wide array of sources in a consistent and a) XML overcomes the limitations in HTML to
unified manner is known as __. support a structured way of organizing
A. A collection of interlinked webpages
content
B. Web portal
b) XML specification is not case sensitive
C. Online portal while HTML specification is case sensitive
D. Website c) XML supports user defined tags while
Answer: B (Web portal) HTML uses pre-defined tags
d) XML tags need not be closed while HTML
255. Google Search engine was developed in __. tags must be closed
A. 1995 A. b only
B. 1997 B. a only
C. 1998 C. b and d only
D. 1999 D. c and d only

Answer: B (1997) Answer: C

Notes: Google search engine was originally developed 259. Bluetooth is the wireless technology for __.
as a research project in 1997 by Larry Page, Sergey A. Local area network
Brin, and Scott Hassan of Stanford University. B. Personal area network
C. Broadcast network
256. Which protocol does Ping use? D. Metropolitan area network
A. TCP
B. ARP Answer: B (Personal area network)
C. ICMP
D. Boot P Notes: Bluetooth is a wireless technology used for
building Personal Area Network (PANs) for exchanging
Answer: C (ICMP) data between fixed and mobile devices over short
distances using short-wavelength UHF radio waves. The
Notes: ICMP (Internet Control Message Protocol) is development of Bluetooth was initiated in 1989 by Nils
an internet layer protocol used by network devices to Rydbeck, CTO at Ericsson Mobile.
38 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

260. The term ‘cookie’ was first coined by__. B. WDM


A. Ted Nelson C. TDM
B. Lou Montulli D. FDM & WDM
C. L. J. Cook
D. Tim Berners-Lee Answer: Multiplexers are used in both Analog and
Digital Multiplexing techniques. TDM (Time Division
Answer: B (Lou Montulli) Multiplexing) is a method used for digital signals.
Whereas FDM (Frequency Division Multiplexing) and
Library Info

Library Info
Notes: The term “cookie” was coined by web browser WDM (Wavelength Division Multiplexing) are used
programmer Lou Montulli. He was one among the team for analog signals. TDM are of two types:
who invented the first browser ‘Lynx’ for the World Asynchronous TDM and Synchronous TDM. TDM is
Wide Web. He was also instrumental for inventing used in applications like ISDN (Integrated Services
‘HTTP Cookie’. Digital Network) and PSTN (Public Switched Telephone
261. GitHub is a platform for developer to ___. Network).
a) Share source code 264. LANs (Local Area Networks) can be connected
b) Compile source code by device called:
c) Track changes and visioning of the software A. Bridges
d) Host static web pages B. Routers
C. Modems
A. a and b are correct D. Ethernet Cards
B. a, c and d are correct
C. b, c and d are correct Answer: A (Bridges)
D. a and c are correct
Notes: In telecommunication networks, a bridge is a
Answer: B product that connects a local area network (LAN) to
another Local Area Network (LAN) that uses the same
Notes: GitHub is a California-based web-based hosting protocol. In other words, a bridge is a type of computer
service, founded in 2008. network device that provides interconnection with
262. Which multiplexing technique transmits analog other bridge networks that use the same protocol.
signals? Bridge devices work at the data link layer of the Open
a) FDM System Interconnect (OSI) model, connecting two
b) TDM different networks together and providing
c) WDM communication between them.
d) STDM 265. Which of the following devices is used to
connect different network segments and manage
A. a and b are correct the traffic between them?
B. a, c and d are correct A. Switch
C. b, c and d are correct B. Gateway
D. a and c are correct C. Bridge
Answer: D D. Repeater

263. Which multiplexing technique used to transmit Answer: C (Bridge)


digital signals? Notes: Repeater regenerates data and used to increase
A. FDM the length of network whereas bridge is used for traffic
39 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

filtering.... i.e. for dividing a larger network into multiple A. 2006


segments. B. 2007
C. 2008
266. Apache is a __. D. 2009
A. Webserver
B. DBMS Answer: C (2008)
C. Search Engine
D. Gateway Notes: Dropbox is a file hosting service operated by the
Library Info

Library Info
American company Dropbox, Inc., headquartered in
Answer: A (Webserver) San Francisco, California, that offers cloud storage, file
synchronization, personal cloud, and client software. It
Notes: Apache, is free and open-source cross-platform was first released in September 2008.
web server software, released under the terms of Apache
License 2.0 in 1995. 270. OneDrive is a file hosting service of __.
A. Google
267. Identify online storage and searching devices B. Microsoft
from the following: C. Apple
a) Sugarsync D. None of the above
b) Opendrive
c) Dropbox Answer: B (Microsoft)
d) Wipersync
A. a and b are correct Notes: OneDrive (formerly known as SkyDrive,
B. a, c and d are correct Windows Live SkyDrive) is a file hosting and
C. b, c and d are correct synchronization service operated by Microsoft and first
D. a, b, and c are correct released in August 2007.

Answer: D 271. Arrange the following in the order of their


emergence :
268. Sugarsync, a cloud based online storage and a) Integrated circuit
searching device was first released in __. b) Transister
A. November 2009 c) Vacuum Tube
B. November 2010 d) Chip
C. August 2009 A. (a), (d), (c) and (b)
D. August 2010 B. (c), (a), (d), and (b)
C. (c), (b), (a) and (d)
Answer: A (November 2009) D. (d), (a), (b) and (c)
Notes: SugarSync is a cloud service that enables active Answer: C
synchronization of files across computers and other
devices for file backup, access, syncing, and sharing 272. Sybase was related to __.
from a variety of operating systems, such as Android, A. Search protocol
iOS, Mac OS X, and Windows devices. It was initially B. Indexing and Retrieval software
released in November 2009 by California (US) based J2 C. Web servers
Global Company. D. Database Management Software

269. Dropbox, a file hosting service was first released Answer: D (Database Management Software)
in ___.

40 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Notes: Sybase, founded in California (US) in 1984, was b) Set of communication standards
an enterprise software and services company that c) Creates and combines packets
produced software to manage and analyze information in d) Program to visit web pages
relational databases. Sybase was acquired by SAP in
2010; SAP ceased using the Sybase name in 2014. A. a and b are correct
B. a, b and d are correct
273. Which of the following is not a plagiarism C. c and d are correct
detection system?
Library Info

Library Info
D. a and c are correct
A. Copy Leaks
B. Viper Answer: C
C. Paper Rater
D. Zebra Notes: Integrated Services Digital Network (ISDN),
first defined in 1988, is a set of communication
Answer: D (Zebra) standards for simultaneous digital transmission of voice,
video, data, and other network services over the
Notes: Zebra is an open source, general-purpose traditional circuits of the public switched telephone
structured text indexing and retrieval engine. It reads network.
structured records in a variety of input formats (eg.
email, XML, MARC) and allows access to them through 277. Which of the following facilitate formal
exact Boolean search expressions and relevance-ranked communication on the web?
free-text queries. a) Wikis
b) Chat
274. ISO-9960 is related with? c) RSS feeds
A. Standard for encoding data on CD-ROM d) Split screens
B. Standard for Computer Hardware A. a and b are correct
C. Standard for Information processing B. a, b and d are correct
D. Standard for Networking C. c and d are correct
Answer: A (Standard for Encoding Data on CD- D. a and c are correct
ROM) Answer: D
275. Lycos is a ___. 278. Which of the following facilitate informal
A. Search engine communication on the web?
B. Programming language a) Wikis
C. Database b) Chat
D. Database vendor c) RSS feeds
Answer: A (Search engine) d) Split screens
A. a and b are correct
Notes: Lycos, Inc., is a web search engine and web B. a, b and d are correct
portal established in 1994, at Carnegie Mellon C. b and d are correct
University. It was the first to attain commercial D. a and c are correct
search engine success.
Answer: C
276. Which of the following are not the features of
ISDN? 279. A collaborative Web site where visitors can add,
a) Simultaneous digital transmission delete, or modify content, including the work of
previous authors, is a:
41 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Blog b) Ithenticate
B. Wiki c) Tulips
C. Domain d) Veri Guide
D. RSS Feed A. a and b are correct
B. a, b and d are correct
Answer: B (Wiki) C. c and d are correct
Notes: A wiki is a knowledge base website on which D. a and c are correct
Library Info

Library Info
users collaboratively modify and structure content Answer: B
directly from the web browser. A wiki is run using wiki
software, otherwise known as a wiki engine. The online Notes: Turnitin is a commercial, Internet-based
encyclopedia project Wikipedia is the most popular plagiarism detection service launched in 1997 by
wiki-based website which is a collection of hundreds of iParadigms LLC. The company also offers a similar
wikis. Ward Cunningham, the developer of the first plagiarism-detection service for newspaper editors and
wiki software, WikiWikiWeb. book and magazine publishers called iThenticate.
VeriGuide is also a plagiarism detection system
280. Who are associated with the development of OSI Developed by The Chinese University of Hong Kong.
Model?
a) Charles Bachman 282. Check for Plag – An Indian plagiarism detection
b) ISO system was developed by __.
c) MIT, USA A. C-DAC
d) UCLA, California B. NIC
A. a and b are correct C. Infokart India Pvt. Ltd.
B. a, b and d are correct D. INFLIBNET
C. c and d are correct
D. a and c are correct Answer: C (Infokart India Pvt. Ltd.)

Answer: A Notes: Check-For-Plag (CFP)- A unique MAKE IN


INDIA Initiative to curb plagiarism globally is a product
Notes: The Open Systems Interconnection of Infokart India Pvt. Ltd, New Delhi.
model (OSI model) is a conceptual model that
characterizes and standardizes the communication 283. Arrange the following in the order of
functions of a telecommunication or computing system. development:
The model is a product of the Open Systems a) GML
Interconnection project at the International b) Hypermedia
Organization for Standardization (ISO). The standard c) SGML
is usually referred to as Open Systems Interconnection d) Memex
Reference Model, OSI Reference Model, or simply OSI A. d, b, a, c
model and was published in 1984 as the ISO 7498. OSI B. b, d, c, a
had two major components- the Basic Reference Model C. c, b, d, a
or seven-layer model given by Charles Bachman, and a D. a, b, c, d
set of specific protocols. Answer: A
281. Which of the following are plagiarism detection Notes: Memex (1945); Hypermedia (1965); GML
software? (1969); SGML (1986)
a) Turnitin

42 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

284. SGML Stands for ___. Notes: The memex is the name of the
A. Standard Generalized Markup Language hypothetical proto-hypertext system that Vannevar
B. Simple Generalized Markup Language Bush described in his 1945 article "As We May
C. Single General Markup Language Think". Bush envisioned the memex as an
D. Standard Group Markup Language electromechanical device in which individuals would
compress and store all of their books, records, and
Answer: A (Standard Generalized Markup communications, "mechanized so that it may be
Language)
Library Info

Library Info
consulted with exceeding speed and flexibility".
Notes: The Standard Generalized Markup 288. Identify the methods used for plagiarism
Language (SGML; ISO 8879:1986) is a standard for detection :
defining generalized markup languages for documents a) Term occurrence analysis
processing. It is an extended version of GML. b) API Testing
285. GML (Generalized Markup Lanaguage) was c) Citation-based plagiarism detection
d) Local similarity assessment
developed by __.
A. a and b are correct
A. Apple
B. Microsoft B. a, c and d are correct
C. IBM C. c and d are correct
D. a and c are correct
D. World Wide Web Consortium (W3C)

Answer: C (IBM) Answer: B

289. Which of the following associations have


Notes: GML was developed by IBM in 1969.
sponsored the Text Encoding Initiatives (TEI) ?
286. HTML (Hypertext Markup Language) was a) ACL
developed by: b) ACRL
A. Apple c) ALLC
B. Microsoft d) ACH
C. IBM
D. World Wide Web Consortium (W3C) A. a and b are correct
B. a, c and d are correct
Answer: D (World Wide Web Consortium (W3C) C. c and d are correct
D. a and c are correct
Notes: Hypertext Markup Language (HTML) is the
standard markup language for creating web pages Answer: B
and web applications. It is extended version of SGML
and first released in the year 1993. Notes: The Text Encoding Initiative (TEI) Consortium
is an international organization whose mission is to
287. The term ‘Memex’ was first coined by: develop and maintain guidelines for the digital encoding
A. Ted Nelson of literary and linguistic texts. The Consortium publishes
B. Vannevar Bush the Text Encoding Initiative Guidelines for Electronic
C. Michael Buckland Text Encoding and Interchange: an international and
D. J.C.R. Licklider interdisciplinary standard that is widely used by
libraries, museums, publishers, and individual scholars
Answer: B (Vannevar Bush)
to represent all kinds of textual material for online
research and teaching. The first draft (known as “P1”) of
43 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

the Guidelines published in June 1990 and latest P5 294. Which topology of computer network provides
version of Guidelines came out in 2007. faster server access?
a) Bus Network Topology
290. Which of the following is not the component of b) Ring Network Topology
a search engine? c) Multiple Ring Network Topology
A. Spider d) Star Network Topology
B. Index
C. Search or retrieval mechanism
Library Info

Library Info
A. a and b are correct
D. Natural language technique B. a, c and d are correct
Answer: D (Natural Language Technique) C. b and d are correct
D. a and c are correct
291. In which layer MAC address of a computer is
assigned to network interface? Answer: C
A. Physical layer 295. Internet filtering is __.
B. Data Link Layer A. A form of censorship
C. Network Layer B. Acceptable user policy
D. Transport Layer C. Access to inappropriate material
D. Blocking internet facility
Answer: B (Data Link Layer)

292. RDBMs are advantageous as they : Answer: A (A form of censorship)


a) Manage and Maintain Notes: Internet filtering is a more gentle way of saying
b) Represent data in the form of tables “censorship”. Internet censorship is the control or
c) Facilitate handling of objects rather than suppression of what can be accessed, published, or
record viewed on the Internet.
d) Are developed with mathematic theory of
relations 296. Which one of the following protocol is used in
A. b and d are correct file transfer over internet?
B. a, c and d are correct A. FTP
C. c and d are correct B. SMTP
D. a and c are correct C. POP
D. TCP/IP
Answer: A
Answer: A (FTP)
293. Arrange in sequence, the steps in programming :
a) Program code Notes: The File Transfer Protocol (FTP) is a
b) Program Documentation standard network protocol used for the transfer
c) Program test of computer files between a client and server on
d) Program design a computer network. The original specification for the
a. (a), (d), (c) and (b) File Transfer Protocol was written by Abhay
b. (c), (a), (d), and (b) Bhushan and published in 1971. FileZilla is an open
c. (c), (d), (b) and (a) source FTP solution.
d. (d), (a), (c) and (b)
297. FTP is used for __.
Answer: D A. Uploading files only
B. Downloading files only
44 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Both A and B mail server. POP3 is generally used to support single


D. None of the above client by storing email on the server until we check
email by opening remote email boxes. Internet Message
Answer: C (Both A and B) Access Protocol (IMAP) is an Internet standard
Notes: FTP (File Transfer Protocol), is a protocol used protocol used by email clients to retrieve email messages
from a mail server over a TCP/IP connection.
to upload files from a workstation to a FTP server or
Multipurpose Internet Mail Extensions (MIME) is an
download files from a FTP server to a workstation.
Library Info

Library Info
Whereas HTTP (Hyper Text Transfer Protocol) is a Internet standard that extends the format of email
protocol used to transfer files from a Web server onto a messages to support text in character sets other than
browser in order to view a Web page that is on ASCII, as well as helps in sending attachments of audio,
video, images, and application programs.
the Internet.

298. SMTP stands for ___. 300. Usenet is __.


A. Simple Mail Transfer Protocol A. A provider of news
B. A low-cost dial-up netowork
B. Single Mail Transfer Protocol
C. Used to forward jobs and files through
C. Sample Mail Transfer Protocol
D. None of the above several hosts
D. None of the above
Answer: A (Simple Mail Transfer Protocol)
Answer: A (A provider of news)
Notes: Simple Mail Transfer Protocol (SMTP) is
a communication protocol for electronic mail (e-mail) Notes: Usenet is a worldwide distributed discussion
system available on computers. In other words, it is a
transmission. Mail servers and other message transfer
network where people exchange news. Users read and
agents use SMTP to send and receive mail messages. As
an Internet standard, SMTP was first defined in post messages (collectively termed news) to one or more
1982 and updated in 2008. categories, known as newsgroup. Its main purpose is to
offer a network where users can post information freely,
299. Which of the following is an email protocol? which is then distributed. This allows others to access
a) SMTP the information easily and as quickly as possible. Usenet
b) POP3 was conceived in 1979 and created in 1980 by two
c) IMAP-4 graduate students of Duke University in North Carolina,
d) MIME Jim Ellis and Tom Truscott worked on their idea of
A. a and b are correct connecting different computers to exchange information
B. a, and c are correct within the UNIX community, and thus created a network
C. b and d are correct that allowed the exchange of information and served as a
D. a, b, c, and d are correct bulletin-board.

Answer: D 301. BIOS contain:


a) Operating system program
Notes: Simple Mail Transfer Protocol (SMTP) is b) Bootstrap Program
a communication protocol for electronic mail (e-mail) c) Application System Program
transmission. Mail servers and other message transfer d) Convert Character to Code Program
agents use SMTP to send and receive mail messages A. a and b are correct
efficiently and reliably over internet. Post Office B. a, c and d are correct
Protocol version 3 (POP3) is an application layer C. b and d are correct
protocol used by e-mail clients to retrieve e-mail from a D. a and c are correct
45 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: C d) Archiving facility


A. a and b are correct
302. Program which is used to control system B. a, c and d are correct
performance is classified as __. C. b and d are correct
A. Experimental program D. a and c are correct
B. System program
C. Specialized program Answer: C
D. Organized program
Library Info

Library Info
307. Which of the following are the components of
Answer: B Search Engine?
a) Spider
303. Rich Text Format (RTF) is concerned with: b) TCP/IP
a) Formatting features like Font type, size, etc. c) Search Mechanism
b) Transporting text documents across different d) Index
computers A. a and b are correct
c) Multimedia formatting B. a, c and d are correct
d) Formatting based on binary concept C. b and d are correct
A. a and b are correct D. a and c are correct
B. a, c and d are correct
C. b and d are correct Answer: B
D. a and c are correct
Notes: A search engine normally consists of four
Answer: A components e.g. search interface, crawler (also known
as a spider), indexer, and database.
304. Template is a __.
A. Structured specification 308. The general image file formats are:
B. Recursive routine a) TIFF
C. Assembler program b) JPEG
D. I/O measure c) MPEG
d) PNG
Answer: A (Structured specification) A. a and b are correct
305. A technique displaying graphic information on B. a, b and d are correct
screen, pixel by pixel with bits held in main C. b and d are correct
memory is: D. a and c are correct
A. Bit handling Answer: B
B. Bit mapping
C. Bit pattern Notes: The Moving Picture Experts Group (MPEG) is a
D. Bit matrix working group of authorities that was formed by ISO
and IEC to set standards for audio and video
Answer: B (Bit mapping) compression and transmission. It was established in
306. Which of the following are criteria for Web 1988 by the initiative of Hiroshi Yasuda and Leonardo
evaluation? Chiariglione.
a) Revision 309. From the following, identify the mobile
b) Response time applications for image recognition developed by
c) Format Google:
46 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

a) Google Goggles Notes: COBOL is an acronym for COmmon Business


b) Google Specs Oriented Language. COBOL is a high-level
c) Google Glass programming language very first developed by
d) Google Lens CODASYL Committee (Conference on Data Systems
A. a and b are correct Languages) in 1959.
B. a, and d are correct
C. b and d are correct 312. Which of the following is not a programming
language?
Library Info

Library Info
D. a and c are correct
A. ASCII
Answer: B B. COBOL
C. BASIC
Notes: Google Goggles was an image recognition D. FORTRAN
mobile app developed by Google in 2009. It was
used for searches based on pictures taken by Answer: A (ASCII)
handheld devices. Notes: ASCII (American Standard Code for Information
Google Lens is an image recognition technology Interchange), is a character encoding standard for
developed by Google in 2017, designed to bring up electronic communication. The first edition of the
relevant information related to objects it identifies standard was published in 1963.
using visual analysis based on a neural network.
313. C++ was developed by __.
A. Bjarne Stroustrup
310. Arrange the following according to their year of
B. Leonardo Chiariglione
development.
C. Lou Montulli
a) Java
D. James Gosling
b) Visual Basic
c) C++ Answer: A (Bjarne Stroustrup)
d) COBOL
Notes: C++ is a general-purpose programming
A. (a), (d), (c) and (b) language that was developed by Bjarne Stroustrup as an
B. (c), (a), (d), and (b) extension of the C language. The first edition was
C. (c), (d), (b) and (a) released in 1985.
D. (d), (c), (b) and (a)
314. JAVA programming language was developed by
Answer: D __.
A. Bjarne Stroustrup
Notes: COBOL (1959); C++ (1985); Visual Basic B. Leonardo Chiariglione
(1991); JAVA (1995) C. Lou Montulli
D. James Gosling
311. COBOL stands for ___.
A. Common Business Oriented Language Answer: D (James Gosling)
B. Current Business Oriented Language
C. Current Business Oriental language Notes: Java is a general-purpose programming
D. Common Binary Oriented Language language that is class-based, object-oriented. It was first
developed by James Gosling at Sun Microsystems (later
Answer: A (Common Business Oriented Language) acquired by Oracle) in 1995.

315. Visual Basic was developed by __.


47 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. Oracle Corporation mostly developed by Microsoft and initially released in


B. Sun Microsystems 1981.
C. Microsoft Corporation
D. None of the above 320. BIOS is a __.
A. Application program
Answer: C (Microsoft Corporation) B. System software
C. Booting software
Notes: Visual Basic is a third-generation event-driven D. Plagiarism software
Library Info

Library Info
programming language from Microsoft, first released in
1991. Answer: C (Booting software)

316. Auto abstracting involves use of computers to: Notes: BIOS ( Basic Input Output System) is a booting
A. Structure the content of an abstract software stored on a small memory chip on
B. Prepare indicative abstract the motherboard. It helps to get the computer system
C. Pickup significant words starts and manages data flow between the computer's
D. Arrange words in order operating system and attached devices such as hard disk,
keyboard, mouse and printer.
Answer: A
321. The term “QWERTY” is connected to which of
317. Transistors were used in which generation of the following devices?
computers? A. Monitor
A. First generation B. Scanner
B. Second generation C. CD-ROM
C. Third generation D. Keyboard
D. None of the above
Answer: D (Keyboard)
Answer: B (Second Generation)
Notes: QWERTY is a keyboard design for Latin-
318. How different nodes in a network are connected script alphabets. The name comes from the order of
and how they communicate are determined? the first six keys on the top left letter row of the
A. By Network connectivity keyboard (Q W E R T Y). The QWERTY design is
B. By Network topology based on a layout created by Christopher Latham
C. By Network Compatibility Sholes and sold to E. Remington and Sons in
D. None of the above 1873.
Answer: B (By Network Topology) 322. The output quality of a printer is measured by
319. MS-DOS stands for __. __.
A. Machine Disk Operating System A. Digits per inch
B. Machine Document Operating System B. Dots per inch
C. Microsoft Disk Operating System C. Dots per mm
D. Microsoft Document Operating System D. Dots per cm

Answer: C (Microsoft Document Operating System) Answer: B (Dots per inch)

Notes: MS-DOS (Microsoft Disk Operating System) is Notes: Dots per inch (DPI) is a measure of dot density
an operating system for x86-based personal computers in printing, video or image scanning. In particular, it
measures the number of individual dots that can be

48 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

placed in a line within the span of 1 inch. The more dots D. Artificial intelligence
the image has the higher the quality of the print. Another
term used frequently is Pixel per inch (PPI) which is Answer: D (Artificial intelligence)
associated with screens of digital devices. 327. Which of the following are the characteristics of
323. The term ‘Open source’ was coined by: Google’s ‘featured snippets’ in search?
A. Tim Berners Lee a) Full text answer to a query
B. Christine Peterson b) Quick direct answer to a query
Library Info

Library Info
C. Peter Merholz c) Extracted from a web page
D. Michael Casey d) Displayed at the bottom of a search

Answer: B (Christine Peterson) A. b, and c are correct


B. c, b and d are correct
Notes: Open source software is a type of computer C. a, c, and d are correct
software in which source code is released under a license D. a and b are correct
in which the copyright holder grants users the rights to
study, change and distribute the software to anyone for Answer: A
any purpose. The Open Source Initiative (OSI) was
formed in February 1998 by Eric Raymond and Bruce 328. What is full form of DBMS?
Perens. A. Data Base Management Services
B. Data Base Management Systems
324. Who invented OSI Model in 1982 __. C. Data Base Manager Services
A. BSO D. Data Base Managing Systems
B. ISI
C. Indian Standard Organisation Answer: B (Data Base Management Systems)
D. International Standard Organisation 329. Informix is a __.
Answer: D (International Standard Organisation) A. Image software
B. Remote login software
Notes: The seven layers of OSI Model are: Physical C. DBMS software
Layer, Data Link Layer, Network Layer, Transport D. OCR software
Layer, Session Layer, Presentation Layer, and
Application Layer Answer: C (DBMS Software)

325. Major two characteristics of open source are: Notes: DBMS (Database management system) is used
A. Free copyright & free distribution to create and maintain the structure of a database, and
B. Open and no IPR then to enter, manipulate and retrieve the data it stores.
C. Free distribution and open source code A database management system (DBMS) is computer
D. Free license and no IPR software that manages databases, it may use any of a
variety of database models, such as the hierarchical
Answer: C (Free distribution and open source code) DBMS, network DBMS and relational DBMS.
Charles Bachman was known for the early development
326. The IT used for simulation of the human thought of DBMS in 1960’s. IBM Informix is a relational
is known as __. database management system, originally developed by
A. Thinking simulation Informix Corporation, whose Informix Software
B. Third generation computers subsidiary was acquired by IBM in 2001.
C. Thought process mechanism

49 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

330. OmniPage is a ___. Answer: B (Remote Login Software)


A. Image software
B. Remote login software Notes: TeamViewer is proprietary software for remote
C. DBMS software control, desktop sharing, online meetings, web
D. OCR software conferencing and file transfer between computers.

Answer: D (OCR Software) 334. Vadlo is a search engine for ___.


A. Science and engineering
Library Info

Library Info
Notes: OmniPage is an Optical Character Recognition B. Life science literature
(OCR) application available from Kofac Inc which C. Library science literature
acquired its rights in 2019 from Nuance D. Social science and humanities
Communications. It was one of the first OCR programs
to run on personal computers. Answer: B (Life Science Literature)

331. Data Recognition technology, OCR is used for Notes: Vadlo is an academic, open-access, free search
__. engine created to locate Life Sciences research
A. Reading mark present in a pre-defined information by searching across specific categories such
position as protocols, online tools, seminars/powerpoint &
B. Identifying signs and characters and creates databases. It was created by Life in Research, LLC.
an editable word document of the scanned 335. Athenus search engine is related to __
document. A. Science and engineering
C. Selecting character in a word document and B. Life science literature
converting into signs and symbols C. Library science literature
D. None of the above D. Social science and humanities
Answer: B Answer: A (Science and Engineering)
332. OMR stands for __. Notes: Athenus – a Science and Engineering Search
A. Optical Machine Recognition Engine was originally launched in 1999 as 'Engwho: The
B. Optical Mark Recognition Engineering Search Engine'. In 2004, Engwho was
C. Online Machine Recognition acquired by thinknew and re-launched as Athenus.com
D. Online Mark Recognition
336. Ethnologue- a reference publication on __.
Answer: B (Optical Mark Recognition) A. Psychology
Notes: OMR stands for Optical Mark Recognition or B. Social Sciences
Optical Mark Reading. This popular recognition C. Languages
technology is used for collecting data from “fill-in-the- D. Science and Engineering
bubble” forms such as educational tests, surveys, Answer: C (Languages)
assessments, evaluations, and many other multiple
choice forms. Notes: Ethnologue: Languages of the World is an
annual reference publication in print and online that
333. Team viewer is a __. provides statistics and other information on the living
A. Image software languages of the world. It was first issued in 1951, and
B. Remote login software is now published annually by SIL International, a U.S.-
C. DBMS software based, worldwide, Christian non-profit organization.
D. OCR software
50 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

337. ‘iWork’ is an office suite of application created A. a, b, and d are correct


by: B. c, b and d are correct
A. IBM C. a, c, and d are correct
B. Apache Foundation D. c, a and b are correct
C. Apple
D. Microsoft Corporation Answer: A

Answer: C (Apple) Notes: The UNIX operating system (OS) consists of a


Library Info

Library Info
kernel layer, a shell layer and a utilities and applications
Notes: iWork is an office suite of applications created by layer. These three layers create a portable, multiuser,
Apple Inc. for its macOS and iOS operating systems, multitasking operating system.
and also available cross-platform through the iCloud
website. It was first released in 2005. 341. Identify the web 3.0 features from the following:
a) Blogs
338. ‘OpenOffice’ is developed by __. b) Folksonomy
A. IBM c) Semantic web
B. Apache Foundation d) Net vibes
C. Apple A. b, and d are correct
D. Microsoft Corporation B. c, b and d are correct
C. c, and d are correct
Answer: B (Apache Foundation) D. a and b are correct
Notes: Apache OpenOffice is an open-source office Answer: C
productivity software suite. It is one of the successor
projects of OpenOffice.org. It was first released in 2001. 342. Identify the characteristics of Library 1.0 :
a) User tagging
339. LANs are distinguished from other types of b) Read only catalogue
Networks by the following characteristics : c) Print newsletter mailed out
a) Full time connectivity to local service. d) Information as conversation
b) Unlimited geographic operation. A. b, and d are correct
c) Data transfer rate B. b and c are correct
d) Low cost and cabling transmission media. C. c, and d are correct
D. a and b are correct
A. a, b, and c are correct
B. c, b and d are correct Answer: B
C. a, c, and d are correct
D. c, a and b are correct 343. Yahoo mail is an email service launched in __.
A. 1996
Answer: C B. 1997
C. 1998
340. Which of the following are the different layers D. 1999
of UNIX operating system?
a) Kernel Answer: B (1997)
b) Shell
c) Format Notes: Yahoo! Mail is an email service launched in
d) Application 1997 through the American parent company Yahoo!.

51 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Yahoo Mail provides four different email plans: three for Notes: A public switched data network (PSDN) is a
personal use and another for businesses. network for providing data services via a system of
multiple wide-area networks. It is an alternate to WAN.
344. Gmail service was launched in the year: A PSDN may use a variety of switching technologies,
A. 2002 including packet switching, circuit switching,
B. 2004 and message switching. Sometimes it is also called
C. 2006 packet-switched data network.
D. 2008
Library Info

Library Info
348. Who among the following was associated with
Answer: B (2004) the development of HTTP?
A. Ted Nelson
Notes: Gmail is a free email service developed by Paul
Buchheit for Google. Gmail started as a limited beta B. Tim Berners Lee
release on April 1, 2004. C. Jason Stockman
D. Michael Casey
345. ProtonMail service was started in __.
A. 2014 Answer: B (Tim Berners Lee)
B. 2015 Notes: The Hypertext Transfer Protocol (HTTP) is
C. 2016 an application protocol used for data communication for
D. 2017 the World Wide Web. It is used to create hyperlinks and
Answer: A (2014) develop hypertext documents. It was initially released in
1991.
Notes: ProtonMail is an end-to-end encrypted email
service founded in 2014 at the CERN research facility 349. String of text that are links to other pages are
by Andy Yen, Jason Stockman, and Wei Sun. called:
A. Hyperlinker
346. Hushmail service was started in the year: B. Multimedia
A. 1996 C. Hypermedia
B. 1997 D. Hyperlinks
C. 1998
D. 1999 Answer: D (Hyperlinks)

Answer: C (1998) 350. What does HTTPS stands for __.


A. Hypertext Transfer Protocol Secure
Notes: Hushmail started in 1998, is an encrypted B. Hypertext Transfer Protocol Safe
proprietary web-based email service offering PGP- C. Hypertext Transfer Protocol Security
encrypted e-mail. It ensures to provide authenticated, D. Hypertext Transfer Protocol Safety
encrypted messages in both directions.
Answer: A (Hypertext Transfer Protocol Secure)
347. PSDN stands for __.
A. Public Switched Data Network Notes: Hypertext Transfer Protocol Secure (HTTPS)
B. Private Switched Data Network is an extension of the Hypertext Transfer
C. Pilot Switched Data Network Protocol (HTTP). It is used for secure communication
D. Popular Switched Data Network over a computer network. In HTTPS, the communication
protocol is encrypted using Transport Layer Security
Answer: A (Public Switched Data Network) (TLS). HTTPS URLs begin with "https://" and
use port 443 by default, whereas, HTTP URLs begin
52 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

with "http://" and use port 80 by default. HTTP is not D. None of the above
encrypted and thus is vulnerable to cyber attacks
whereas HTTPS is encrypted and secure. Answer: B (RAM and ROM)

Secure Hypertext Transfer Protocol (S-HTTP) Notes: Computer memory is of two types: (i) Primary
developed by Eric Rescorla and Allan M. Schiffman, memory - often called internal memory or system
and published in 1999, is an obsolete alternative to memory which is located close to the CPU on a
the HTTPS protocol for encrypting web communications computer. Primary memory includes RAM (Random
Library Info

Library Info
carried over HTTP. Access Memory) and ROM (Read Only Memory). (ii)
Secondary memory - is usually physically located within
351. The smallest unit in the computer that represents a separate storage device, such as a hard disk drive or
information is __. solid state drive (SSD).
A. Byte
B. Bit 355. Example of Primary memory:
C. Character A. Hard disc
D. Digit B. CD
C. DVD
Answer: B (Bit) D. RAM

352. A binary object which can have a value of 0 or 1 Answer: D (RAM)


is called:
A. Byte Notes: Computer memory is of two basic type –
B. Bit Primary memory (RAM and ROM) and
C. Decimal Secondary memory (hard drive,CD,etc.). Random
D. Octal Access Memory (RAM) is primary-volatile memory and
Read Only Memory (ROM) is primary-non-
Answer: B (Bit) volatile memory. It is also called as read
write memory or the main memory or the primary
353. Nibble contains __. memory.
A. 16 bit
B. 8 bit 356. Which storage media allows sequential access
C. 1024 bit only?
D. 4 bit A. Magnetic disc
B. Optical disc
Answer: D (4 bit) C. Floppy disc
D. Magnetic tape
Notes: A bit (short for binary digit) is the smallest unit
of data in a computer. A bit has a single binary value, Answer: D (Magnetic tape)
either 0 or 1. ... 8 bits = 1 byte, and half a byte
(four bits) is called a nibble. In some systems, the term 357. Which of the following file format is NOT a
octet is used for an eight-bit byte. Hence nibble can be a video file format?
half octet as well (4 bits). A. .AW
B. .MOV
354. The internal memory units of computer are __. C. .MP4
A. ROM and RUM D. .JPEG
B. RAM and ROM
C. RAM and WROM Answer: C (.JPEG)

53 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

358. Which among the following comes under Notes: The RAM is a volatile memory, it means
Primary Storage? information written to it can be accessed as long as
a) RAM power is on. As soon as the power is off, it cannot be
b) ROM accessed. So this means RAM computer memory
c) Cache essentially empty. RAM holds data and processing
d) Magnetic Tape instructions temporarily until the CPU needs it.
A. a and d are correct
B. b and c are correct 361. Which of the following is an example of non-
Library Info

Library Info
C. a b, and c are correct volatile memory?
D. All are correct A. ROM
Answer: C B. VLSI
C. LSI
Notes: Primary storage is also called as ‘Main Memory’ D. RAM
which are connected directly or indirectly to the Central
Processing Unit (CPU) of the computer and helped in Answer: A (ROM)
reading instructions and executing them. Examples of
Notes: Read only memory (ROM) is a non volatile
Primary storage are: RAM, ROM and Cache.
memory. It means the information stored in it, is not lost
359. The computer memory used for temporary even if the power supply goes off. It is used for the
storage of data and program is called: permanent storage of information. Information cannot be
A. RAM written into a ROM by the users/programmers. In other
B. ROM words the contents of ROMs are decided by the
C. PROM manufactures. It is used in embedded systems or where
D. EPROM the programming needs no change. ROM are of three
types: PROM (Programmable read-only memory) – It
Answer: A (RAM) can be programmed by user. Once programmed, the data
and instructions in it cannot be changed. EPROM
Notes: RAM (Random Access Memory) is a volatile
(Erasable Programmable read only memory) – It can
memory that temporarily stores the programs and data in
be reprogrammed. To erase data from it, expose it to
use that the CPU requires during execution of a program.
ultra violet light. To reprogram it, erase all the previous
It requires power to store data and loses data when
data. EEPROM (Electrically erasable programmable
power is turned off. RAM is further classified into two
read only memory) – The data can be erased by
types- SRAM (Static Random Access
applying electric field, no need of ultra violet light. We
Memory) and DRAM (Dynamic Random Access
can erase only portions of the chip.
Memory). Static RAM (SRAM) is faster than dynamic
RAM (DRAM) as the access time for DRAM is more as 362. The computer memory, which can be
compared to that of SRAM. programmed once, but cannot be reprogrammed,
is __.
360. The computer memory which is essentially
A. PROM
empty is:
B. SRAM
A. RAM
C. RAM
B. ROM
D. EPROM
C. PROM
D. EPROM Answer: A (PROM)
Answer: A (RAM)

54 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

363. The computer memory which can be Notes: ROM retains the data when power is off/on/down
reprogrammed is __. because it has to read the data from memory only and it
A. ROM is done in every condition. It is non-volatile memory.
B. PROM
C. EPROM 367. In EBCDIC, a character is represented by ___.
D. All the above A. One bit
B. Four bit
Answer: C (EPROM) C. Eight bit
Library Info

Library Info
D. Sixteen bit
Notes: The EPROM (Erasable Programmable Read
Only Memory) was invented by Dov Frohman of Intel Answer: C (Eight bit)
in 1971. EPROMs are Erasable Programmable ROMs
which can be erased using Ultra Violet radiation and re- Notes: Extended Binary Coded Decimal Interchange
programmed. Code (EBCDIC) is an eight-bit character encoding used
mainly on IBM mainframe and IBM midrange computer
364. The major disadvantage of RAM is __. operating systems.
A. Its access speed is too slow
B. Its matrix size is too big 368. Which one of the following work both as an
C. It is volatile input and output devices?
D. High power consumption a) VDU
b) Modems
Answer: C (It is volatile) c) Network Cards
d) Facsimile
Notes: RAM is volatile memory. Thus, RAM stores the A. a and d are correct
data as long as it is powered on and once the power goes B. b and c are correct
out, it loses its data. C. a and b are correct
D. All are correct
365. RAM is also known as __.
A. RWM
B. MBR Answer: D
C. MAR
Notes: Other examples of both input and output devices
D. ROM
are: Touch Screen, Headsets, Audio Card/Sound Cards
Answer: A (RWM)
369. Which of the followings are input devices?
Notes: A Random Access Memory (RAM) is a volatile e) Cameras
chip memory in which both read and write operations f) Barcode Reader
can be performed. Since it is volatile, therefore it stores g) Joystick
data as long as power is on. RAM is also known as h) Scanner
RWM (Read Write Memory). A. a and d are correct
B. b and c are correct
366. ROMs retain data when __. C. a and b are correct
A. Power is on D. All are correct
B. Power is off Answer: D
C. System is down Notes: Other examples of Input devices are: Keyboard,
D. All the above Microphone, Mouse, Touchpads, OMR, OCR, Punch
Card Reader, MICR, Webcam, Trackball, Light Pen,
Answer: D (All the above) Optical Barcode Reader (OBR)
55 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

370. Which input device cannot be used to work in 374. A computer program that converts one by one
MS Office? instruction into a machine language is called:
A. Light Pen A. Interpreter
B. Scanner B. Simulator
C. Mouse C. Compiler
D. Joy Stick D. None of the above
Answer: D Answer: A (Interpreter)
Library Info

Library Info
Notes: A Joystick is a cursor control device used in Notes: To convert a program written in high level
computer games and assistive technology. language (i.e English or other languages) into Machine
language or Code (ie. 0’s or 1’s), we need a compiler or
371. Which of the followings are output devices? Interpreter. One of the differences between compiler and
a) Monitor interpreter is – Interpreter translates a program one
b) Plotters statement at a time, while Compiler scans the entire
c) Projectors program and translates it as a whole into machine code.
d) Head Phone
375. Who among the following first proposed the
A. a and d are correct
'hash coding'?
B. b and c are correct
C. a and b are correct A. D. Ellis
D. All are correct B. H. P. Luhn
Answer: D C. Mortimer Taube
D. Derek Austin
Notes: Other example of output devices are: Printers,
Speakers, Film Recorder, Microfiche Answer: B (H. P. Luhn)

372. Plotter is an output device used for __. Notes: Hash codes are used in hashing, which is a way
A. Punching card to speed up access to an element in a table of data. The
B. Punching graphs idea of using hash-based searches was first proposed in
C. Punching magnetic tape 1953 by H. P. Luhn from IBM.
D. Punching paper tape
376. What is the correct order of decreasing
Answer: B (Punching graphs) efficiency of the following categories of
Notes: A plotter is a computer hardware device much computers?
like a printer that is used for printing vector graphics a) Personal computer
drawings. Instead of toner, plotters use a pen, pencil, b) Mainframe computer
marker, or another writing tool to draw multiple, c) Super computer
continuous lines onto paper rather than a series of dots d) Mini Computer
like a traditional printer. A plotter is typically used for A. (a), (d), (c) and (b)
printing large-format graphs or maps.
B. (c), (b), (d), and (a)
373. Who devised Mouse system for computer? C. (c), (d), (b) and (a)
A. Intel D. (d), (a), (b) and (c)
B. Douglas Engelbart
C. IBM Answer: B
D. Ted Hoelf
377. Arrange the following open source software in
Answer: B (Douglas Engelbart) chronological order of their development:

56 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

a) Firefox B. b and c are correct


b) Linux Kernel C. a and b are correct
c) OpenOffice D. All are correct
d) Perl Answer: D
A. (a), (d), (c) and (b)
Notes: ISO 25964 is an International Standard for
B. (c), (b), (d), and (a)
Thesauri.
C. (c), (d), (b) and (a)
Library Info

Library Info
D. (d), (b), (c) and (a) 381. W3C was set up in the year ___.
A. 1992
Answer: D
B. 1994
Notes: Perl (1987); Linux Kernel (1991); OpenOffice C. 1998
(2001); Firefox (2002) D. 2000

378. Select the correct combinations: Answer: B (1994)


a) Search engine – Crawler
Notes: W3C (World Wide Web Consortium) setup in
b) URL – Webpage
1994 is the main international organization for
c) Firewall – Protecting unauthorized access to
developing protocols and guidelines that ensures long-
Internet
term growth for the World Wide Web.
d) HTTP - Internet Standard for Information
Transmission 382. In the context of IP address, which of the
A. a and d are correct following is correct?
B. b and c are correct
A. IP number is assigned to the PC
C. a and b are correct
D. All are correct B. IP number is assigned to the organization
C. IP number is assigned to the network
Answer: D
interface card
D. None of the above
379. Select the correct combinations:
a) Vacuum Tube – First Generation Computer Answer: C
b) Pendrive – Flash memory
383. Which of the following is a visual search
c) DVD – Optical storage
engine?
d) Transistor – Second Generation Computer
A. Google
A. a and d are correct
B. b and c are correct B. Google scholar
C. a and b are correct C. Altavista
D. All are correct D. Kartoo
Answer: D
Answer: D (Kartoo)

380. Select the correct combinations: Notes: Kartoo was a metasearch engine based in France
a) ISO 25964 – Thesaurus development which displayed a visual interface and the search results
b) ISO 2709 – Exchange of bibliographic data were presented as a "map". It was operated from 2001 to
c) Z 39.50 – Searching and retrieving early 2010.
information from bibliographic databases
384. Satellite Communication works through __.
d) Z 39.85 – DC metadata encoding
A. Radar
A. a and d are correct
B. Transponder
57 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

C. Receptor 388. Which of the following is not correct about


D. Transmitter change in computer from one generation to the
next?
Answer: B (Transponder) A. Speed of processing increases
Notes: A communications satellite's transponder is the B. Computer size is decreased
C. Memory/storage capacities decreases
series of interconnected units that form a
D. All the above
communications channel between the receiving and the
Library Info

Library Info
transmitting antennas. It is mainly used in satellite Answer: C
communication to transfer the received signals.
Notes: Each generation of computer is characterized by
385. In the communication satellite, which of the a major technological development. With every next
following is used to amplify and retransmit generation, computer size decreased, speed of processing
signals? increased and memory or storage capacities increased.
A. Transmitter
B. Transponder 389. First generation of computer had used:
C. Amplifier A. Magnetic tape and transistors
D. De-amplifier B. Vacuum tubes and magnetic drum
C. Integrated Circuits
Answer: B (Transponder) D. None of the above
Notes: Transponder is a wireless communication device Answer: B (Vacuum tubes and magnetic drum)
that upon receiving a signal, automatically retransmit the
signal at a different frequency. Transponders are Notes: The first generation of computers used vacuum
generally used in satellite communications and in tubes for circuitry and magnetic drums for memory and
location, identification and navigation systems. they were very big in size. Example: ENIAC and
UNIVAC were first generation computers.
386. Unicode is standard related with ___.
A. Character encoding in computer system 390. Which one is the first generation computer?
B. Digital library system A. Micro computer
C. Information retrieval system B. UNIVAC-I
D. Library classification C. Super Computer
D. ENIAC
Answer: A (Character encoding in computer system)
Answer: D (ENIAC)
387. Select the correct combinations:
a) Open Office – Apache Foundation Notes: ENIAC (Electronic Numerical Integrator and
b) MS-Office – Microsoft Corporation Computer), designed and developed by John
c) Lotus Note – IBM Mauchly and J. Presper Eckert of the University of
d) iWork – Apple Pennsylvania, United States in 1945 was the first
A. a and d are correct electronic general-purpose digital computer.
B. b and c are correct
C. a and b are correct Subsequently, UNIVAC I (UNIVersal Automatic
D. All are correct Computer I), designed and developed in 1951
Answer: D principally by J. Presper Eckert and John Mauchly,
the inventors of the ENIAC.

391. Which agency used computer first in India?


58 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

A. National Library, Calcutta 393. The method of communication in which


B. ISI, Calcutta transmission takes place in both the directions, but
C. INSDOC only in one direction at a time is called:
D. DRTC A. Simplex
B. Full Duplex
Answer: B (ISI, Calcutta) C. Half Duplex
D. Two Wire Circuits
Notes: In India, the first computer HEC-2M was
Library Info

Library Info
imported & installed at Indian Statistical Institute Answer: C (Half Duplex)
(ISI), Calcutta in 1955 by the initiative of P C
Mahalanobis who started a journal called ‘Sankhya: the Notes: Transmission mode describes the direction and
Indian Journal of Statistics’. flow of signal between two connected devices. There are
three modes of transmission: Simplex, Half duplex,
However, before the import of HEC-2M, Samarendra and Full duplex. The main difference between simplex,
Kumar Mitra, a Bengali Scientist is given credit to half duplex, and full duplex is that in a simplex mode of
design in 1954, India's first computer (a small electronic transmission the communication is unidirectional (one-
way). Only one of the two devices on a link can
analog computer) at the Indian Statistical Institute
transmit, the other can only receive. Example: Radio &
(ISI), Calcutta. Television Broadcasting, Computer to printer
communication
TIFRAC (Tata Institute of Fundamental Research
In the half-duplex mode of transmission the
Automatic Calculator) was the first mainframe general-
communication is two directional but the channel is
purpose computer developed in India, at the Tata alternately used by both the connected device. In other
Institute of Fundamental Research in Mumbai in 1960. words, in a half-duplex system, both parties can
communicate with each other, but not simultaneously;
Subsequently, in 1964, the ISI, Calcutta under the the communication is one direction at a time. Exa:
leadership of Samarendra Kumar Mitra developed the walkie-talkie .
first second-generation indigenous digital computer On the other hand, in the full duplex mode of
of India called ISIJU-I in joint collaboration transmission, the communication is bi-directional, and
with Jadavpur University (JU), Calcutta. the channel is used by both the connected device
simultaneously. An example of a full-duplex device is
392. Bibexcel is developed by __. a telephone.
A. Olle Persson
B. Chris Argyris
394. Communication between a computer and a
C. Vroom keyboard involves __.
D. Frederick Herzberg A. Simplex
B. Half-duplex
Answer: A (Olle Persson) C. Full-duplex
D. Automatic
Notes: BibExcel is designed to assist a user
in analysing bibliographic data, or any data of a textual Answer: A (Simplex)
nature formatted in a similar manner. The idea is to
generate data files that can be imported to Excel, or any 395. A television broadcast is an example of __
program that takes tabbed data records, for further transmission.
processing. A. Simplex
B. Half-duplex
C. Full duplex
D. Automatic

59 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

Answer: A (Simplex) a) HTTP – Tim Berners Lee


396. In ___ transmission, the channel capacity is b) FTP – Abhay Bhusan
shared by both communicating devices at all c) S-HTTP - Eric Rescorla and Allan M.
times. Schiffman
A. Simplex d) SMTP – Robert E. Kahn and Vintcerf
B. Half-duplex A. a and d are correct
C. Full-duplex B. a, b and c are correct
D. All the above C. b and c are correct
D. All are correct
Library Info

Library Info
Answer: C (Full-duplex)
Answer: D
397. Which transmission mode generally involves
dedicated circuits? 400. The tag 300 in MARC 21 indicates:
A. Simplex A. Edition statement
B. Half-duplex B. Physical description
C. Full-duplex C. General note
D. None of the above D. Series statement
Answer: A (Simplex) Answer: B (Physical description)
Notes: Simplex transmission generally involves 401. Select the correct combinations:
dedicated circuits. Examples of simplex mode of a) Internet Explorer – 1995
communications are: communication between a b) Mozilla Firefox – 2002
computer and a keyboard, Loudspeaker system, Fire c) Google Chrome – 2008
alarm systems etc. d) Safari - 2003
398. Select the correct combinations: A. c, and d are correct
a) Class A IP – Support large network with B. a, and c are correct
many devices C. b and c are correct
b) Class B IP – Supports medium-sized
D. a, b, c, and d are correct
networks
c) Class C IP – Supports small networks with Answer: D
fewer than 256 devices
d) Class D IP – Reserved for multicast groups Notes: Internet Explorer (Microsoft Corporation, 1995);
Opera (Opera Software, 1995); Mozilla Firefox (Mozilla
A. a and d are correct
B. b and c are correct Corporation, 2002); Safari (Apple, 2003); Google
C. a and b are correct Chrome (Google, 2008)
D. All are correct
402. Select the correct combinations:
Answer: D
a) Java – James A . Gosling
Notes: A classful network is a network b) C – Dennis Ritchie
addressing architecture used in the Internet from 1981
c) Lisp – John McCarthy
until the introduction of Classless Inter-Domain
Routing in 1993. The method divides the IP d) Python – Guido van Rossum
address space for Internet Protocol version 4 (IPv4) A. a and d are correct
into five address classes based on the leading four B. b and c are correct
address bits. Classes A, B, and C provide addresses for C. a and b are correct
networks of three different network sizes (Large, D. All are correct
Medium and Small respectively as defined above). Class Answer: D
D is reserved for multicast networking and the class E
IP address is reserved for future or experimental Notes: Java (James A Gosling, 1995); C (Dennis
purposes. Ritchie, 1971-73); Lisp (John McCarthy, 1958); Python
399. Select the correct combinations: (Guido van Rossum, 1989).
60 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII
Library Info

Library Info
Assertion
&
Reasoning

61 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

1. Assertion (A): Results from popular web search Reason (R) : The graphical display at the
engines are usually having high recall, but an beginning of the program prolongs the life of
indexing database can provide high precision. monitor.
Reason (R): Indexing databases use controlled A. (A) is true, but (R) is false
vocabulary which is a carefully selected list of B. (A) is false, but (R) is true
words and phrases which are used to tag units of C. Both (A) and (R) are true
information (document or work) so that they D. Both (A) and (R) are false
Library Info

Library Info
may be more easily retrieved.
Answer: A
A. (A) is true, but (R) is false 5. Assertion (A) : Internet can replace libraries.
B. (A) is false, but (R) is true Reason (R) : Google searches will satisfy the
C. Both (A) and (R) are true
maximum users needs.
D. Both (A) and (R) are false

Answer: C A. (A) is true, but (R) is false


B. (A) is false, but (R) is true
2. Assertion (A): SGML is a system for defining C. Both (A) and (R) are true
markup languages. D. Both (A) and (R) are false
Reason (R): HTML uses the SGML constructs.
Answer: D
A. (A) is true, but (R) is false 6. Assertion (A) : A combination of hypertext and
B. (A) is false, but (R) is true Hypermedia contains text, images, sounds and
C. Both (A) and (R) are true
other information.
D. Both (A) and (R) are false
Reason (R): Hypermedia information is
Answer: C represented in a linear fashion.

3. Assertion (A) : With the introduction of A. (A) is true, but (R) is false
Internet, need for reference librarians has been B. (A) is false, but (R) is true
minimized to fulfill the users reference needs. C. Both (A) and (R) are true
Reason (R) : FAQ facility on internet is D. Both (A) and (R) are false
substituting the need for human interface in
libraries. Answer: A

7. Assertion (A) : Open Systems Interconnection


A. (A) is true, but (R) is false allows connectivity of ICT components.
B. (A) is false, but (R) is true Reason (R) : Network Printer goes slow if it is
C. Both (A) and (R) are partially true OSI compatible.
D. Both (A) and (R) are false

Answer: C A. (A) is true, but (R) is false


B. (A) is false, but (R) is true
4. Assertion (A): BIOS is a set of programs that C. Both (A) and (R) are true
handles startup operations in a computer such as D. Both (A) and (R) are false
power on, self tested and low level control for
hardware. Answer: A

62 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

8. Assertion (A): RSS (Rich Site Summary) is C. Both (A) and (R) are true and (R) is the
considered as an alternate to the SDI Service. correct explanation
Reason (R): RSS Feeds enable us to syndicate D. Both (A) and (R) are true but (R) is not
data automatically. the correct explanation

A. (A) is true, but (R) is false Answer: D


B. (A) is false, but (R) is true 12. Assertion (A): Measuring the Internet and in
Library Info

Library Info
C. Both (A) and (R) are true particular the web is a difficult task.
D. Both (A) and (R) are false Reason (R): Web is considered as a new
Answer: C publishing medium with inadequate editorial
process.
9. Assertion (A) : Internet access provides
information in abundance. A. (A) is true, but (R) is false
Reason (R) : Information available on internet B. (A) is false, but (R) is true
always lacks authenticity. C. Both (A) and (R) are true and (R) is the
correct explanation
A. (A) is true, but (R) is false D. Both (A) and (R) are true but (R) is not
B. (A) is false, but (R) is true the correct explanation
C. Both (A) and (R) are true
D. Both (A) and (R) are false Answer: C

Answer: A 13. Assertion (A): Indian libraries are making


optimum use of social networking.
10. Assertion (A) : Libraries are facing a threat and Reason (R): Social networking has wider role in
dissemination of information
are bound to disappear soon.
Reason (R) : Internet and WWW provide access A. (A) is true, but (R) is false
to Oceans of information Worldwide. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: B
D. Both (A) and (R) are false
14. Assertion (A) : Librarians usually prefer to
Answer: B provide access to e-content for the users via a
proxy server, allowing authorized library users
11. Assertion (A): XML, just like HTML is a meta to access content from outside the physical
language that is capable of containing confines of a library.
extendable elements. Reason (R) : Proxy-server access is possible
without IP-address recognition.
Reason (R): XML develop and deploy new
specific mark up, enabling automatic authoring
A. (A) is true, but (R) is false
and processing of networked information.
B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false
D. Both (A) and (R) are false
B. (A) is false, but (R) is true
Answer: A

63 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

15. Assertion (A): ‘Web Assembly’, a standard that 18. Assertion (A): There are no problems in a
enables applications to run securely in browsers retrieval system in which indexers use natural
(without the use of Plug-ins) is a people-friendly language terms to describe subject matter.
application in using Web. Reason (R): The complete text of a document
Reason (R): A web language transforms the may be stored in a machine readable form.
way people use their devices and the web
making applications are more accessible to A. (A) is true, but (R) is false
Library Info

Library Info
people at ease all over the globe. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: B
D. Both (A) and (R) are false 19. Assertion (A): Library Standards are essential
Answer: C for interaction and collaboration among
libraries.
16. Assertion (A): Web 2.0 is a good set of Reason (R): Z39.50 Protocol virtually has
economic, social and technological trend that reduced the efforts of both classifier and the
collectively form the basis of the next generation cataloguer and hereby made the use of standards
of the Internet. vulnerable.
Reason (R): More than just the latest
technology buzzword, Web 2.0 is a A. (A) is true, but (R) is false
transformative force that is propelling libraries B. (A) is false, but (R) is true
towards a new way to offer services. C. Both (A) and (R) are true
D. Both (A) and (R) are false
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true Answer: C
C. Both (A) and (R) are true 20. Assertion (A): In Indian scenario, a larger
D. Both (A) and (R) are false chunk of Librarians can hardly handle IT related
Answer: C matters, either due to lack of proper
infrastructure or adequate training.
17. Assertion (A): Google search is considered as Reason (R): Taking third party help in
the biggest threat to contemporary libraries. managing the software through ‘cloud
Reason (R): Now-a-days, users taking help computing’ platform has become inevitable.
from Reference Librarian for factual queries has
considerably decreased. A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
A. (A) is true, but (R) is false C. Both (A) and (R) are true
B. (A) is false, but (R) is true D. Both (A) and (R) are false
C. Both (A) and (R) are true
D. Both (A) and (R) are false Answer: A

Answer: B 21. Assertion (A): There has been a demand for


data exchange between library catalogues and

64 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

databases with records of documentary Reason (R): Access via IP-address presents
information. challenge in controlling the distribution of
Reason (R) : Interoperatability leads to password to non-affiliates.
information reuse as a requisite to access data,
and takes into account quality, contents, A. (A) is true, but (R) is false
knowledge, products and services. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
Library Info

Library Info
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: D
D. Both (A) and (R) are false 25. Assertion (A): Web search engines get their
Answer: C information by crawling from site to site.
Reason (R): The ‘Spider’ checks for the
22. Assertion (A): Librarians usually prefer to standard file name spider.avi addressed to it
provide access to e-content for the users via a before sending certain information back to the
proxy server, allowing authrorized library users indexed.
to access content from outside the physical A. (A) is true, but (R) is false
confines of a library. B. (A) is false, but (R) is true
Reason (R): Proxy-server access is possible C. Both (A) and (R) are true
without IP-address recognistion. D. Both (A) and (R) are false

A. (A) is true, but (R) is false Answer: A


B. (A) is false, but (R) is true
26. Statement (A): Static RAM (SRAM) is faster,
C. Both (A) and (R) are true expensive and consumes more power
D. Both (A) and (R) are false Statement (B): Dynamic RAM (DRAM) is
Answer: A faster, expensive and consumes more power.
A. (A) is true, but (B) is false
23. Assertion (A) : Libraries are changing in the B. (A) is false, but (B) is true
wake of emerging ICT environment. C. Both (A) and (B) are true
Reason (R) : Libraries are adopting new D. Both (A) and (B) are false
competencies to operate services in the
environment of information super highways. Answer: A

27. Statement (A): ROM is used when computer


A. (A) is true, but (R) is false starts booting
B. (A) is false, but (R) is true Statement (B): ROM memory cannot be easily
C. Both (A) and (R) are true modified.
D. Both (A) and (R) are false

Answer: C A. (A) is true, but (B) is false


B. (A) is false, but (B) is true
24. Assetion (A): Access to e-collection of a library C. Both (A) and (B) are true
via login and password recognition is mostly D. Both (A) and (B) are false
used than access via IP-address
Answer: C

65 AQUIL AHMED
Computer
C Technology: Library Automation & Digitization Unit -VII

28. Assertion (A): On decompression of a


compressed zip file, the data loss is minimal.
Reason (R): Zip data compression technique is
based on lossy compression.
A. Both (A) and (R) are true and (R) is the
correct explanation of (A)
B. Both (A) and (R) are true and (R) is
Library Info

Library Info
NOT the correct explanation of (A)
C. (A) is true but (R) is false
D. (A) is false but (R) is true

Answer: C

66 AQUIL AHMED
Library Info

UNIT -VIII

Library Info
Computer Technology: Library Automation & Digitization Unit -VIII

1. E-Granthalaya is developed by ____. 4. Which are the following characteristics of Open


A. NCERT Journal Systems (OJS)?
B. CSIR a) Facilitate writing platform to author
C. DRDO b) Facilitate paper submission
D. NIC c) Facilitate peer reviewing
d) Facilitate golden access model
Answer: D (NIC)
Library Info

Library Info
Notes: E-Granthalaya- an integrated LMS, was started A. c, and d are correct
as an in-house project at ‘Karnataka State Centre of NIC, B. a, and c are correct
Bangalore and first version of the software designed for C. b and c are correct
D. b and d are correct
the public libraries came out in 2003.Later on, NIC
headquarter, New Delhi took over the development of Answer: C
the software. Ver 4.0 (2015) is a ‘Cloud Ready
Application’ and provides a Web-based data entry Notes: Open Journal Systems (OJS) was designed to
solution with a centralized database for cluster of facilitate the development of open access, peer-
libraries. It is UNICODE compliant software that reviewed publishing, providing the technical
supports data entry in local languages. infrastructure not only for the online presentation of
journal articles, but also an entire editorial management
2. Who coined the term ‘automation’? workflow, including: article submission, multiple rounds
A. Tim Berners Lee of peer-review, and indexing.
B. D. S. Harder
C. Ray Tomlinson 5. F1000 is now a part of __.
D. Ted Nelson A. Taylor & Francis Group
B. Elsevier
Answer: B (D. S. Harder) C. Emerald Publishing
D. McGraw-Hill
Notes: D.S. Harder, General Motor Company, USA, was
first coined the term ‘Automation’ in the year 1936. The Answer: A (Taylor & Francis Group)
word ‘Automation’ has been derived from the Greek
word ‘Automose’, meaning something which has the Notes: Faculty 1000 ( F1000) is a publisher of services
power of spontaneous motion or self movement. for life scientists and clinical researchers. F1000 was
founded in United Kingdom (Headquarter in London)
3. Who developed ‘Open Journal Systems’ (OJS)? in the year 2000 by publishing entrepreneur Vitek
A. Public Knowledge Project Tracz. It was acquired by Taylor & Francis Group,
B. The Knowledge Foundation an Informa Company, in January 2020.
C. IFLA
D. OCLC 6. F1000 Research is an open access, peer review
scientific publishing platform mainly in the field
Answer: A (Public Knowledge Project) of __.
A. Social Sciences
Notes: Open Journal Systems (OJS) is an open-source
software for the management of peer-reviewed academic B. Life Sciences
journals, and is created by the Public Knowledge C. Engineering and Technology
D. Humanities
Project, released originally in 2001 under the GNU
General Public License. Answer: B (Life Sciences)

67 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Faculty of 1000 (F1000) launched the first ‘open D. a, b, c, and d are correct
research publishing platform’ called ‘F1000
Research’ in the year 2013 that mainly covers the life Answer: B
sciences. In July 2017, F1000 launched Open Research Notes: Open educational resources (OER) are freely
Central (ORC), a "central portal for open research accessible, openly licensed text, media, and other digital
publishing" that runs on F1000 Research Platform. assets that are useful for teaching, learning, and research
7. EDI refers to __. purposes. David Wiley is one of the pioneers of OER
Library Info

Library Info
A. Electronic Data Interchange who suggested 5 core principles for OER: (i) Re-use (ii)
B. Essential Data Interchange Re-distribute (iii) Revise (iv) Re-mix (v) Retain
C. Economic Data Interpretation 11. Which licensing is mostly widely used for OER
D. Educational Data Interchange content?
Answer: A (Electronic Data Interchange) A. GNU General Public License
B. BSD License
Notes: Electronic Data Interchange (EDI) is C. Creative Commons License
the electronic interchange of business information using D. DRM License
a standardized format; a process which allows one
company to send information to another company Answer: C (Creative Commons License)
electronically rather than with paper. Notes: First release on 16th December 2002, a Creative
8. 'Open Journal System' is an example of which of Commons (CC) license is one of several public
the following open access models? copyright licenses that enable the free distribution of an
A. Green otherwise copyrighted "work". A CC license is used
B. Red when an author wants to give other people the right to
C. Gold share, use, and build upon a work that they (the author)
D. Platinum have created. Creative Commons (CC) is a United States
non-profit corporation founded in 2001.
Answer: D (Platinum)
12. The term OER (Open Educational Resources)
9. OER stands for __. was first adopted by UNESCO in __.
A. Online Educational Resources A. 2000
B. Open Educational Resources B. 2002
C. Online Electronic Resources C. 2004
D. Open Electronic Resources D. 2005

Answer: B (Open Education Resources) Answer: B (2002)

10. Which among the following are 5 principles of Notes: Open Educational Resources (OER) movement
OER as suggested by David Wiley? was started with the establishment of the project MIT
a) Re-use OpenCourseWare at MIT ( Massachusetts Institute of
b) Re-distribute Technology) in 2001. The term ‘Open Educational
c) Revise Resources (OER) was adopted at UNESCO’s 2002
d) Re-design Forum on the Impact of Open Courseware for Higher
A. a, b and d are correct Education in Developing Countries.
B. a, b and c are correct
C. b, c and d are correct 13. Select the correct combinations:
68 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

a) OA Gold – Publishing in open access Notes: Woodblock Printer (220AD); Movable Type
journals with or without author charges (1040 AD); Screen Printer (1911); Dot-Matrix Printer
b) OA Green – Publishing in Institutional (1925)
Repositories
c) OA Platinum – Publishing in open access 15. TKDL is developed and managed by __.
journals with no charge to the authors A. National Library and RRRLF
d) Coursera – Platform for offering online B. CSIR and RRRLF
C. CSIR and AYUSH
Library Info

Library Info
programs/courses
A. a, and b are correct D. AYUSH and National Library
B. a, b and c are correct Answer: C (CSIR and AYUSH)
C. b, c and d are correct
D. a, b, c and d are correct Notes: The Traditional Knowledge Digital Library
(TKDL) setup in 2001, is a digital knowledge repository
Answer: D of the traditional knowledge, especially about medicinal
Notes: Open Access Journals is usually of two different plants and formulations used in Indian systems of
types based on their fee vs. no fee aspect: Gold Open medicine.
Access (OA Gold) is where an author publishes their 16. LOCKSS (Program), an international
article in an online open access journal usually with community initiative by ___.
some author fees (APC - Article Processing
A. MIT Library
Charges). On the contrary, Platinum Open Access (OA B. Stanford University
Platinum) refers to open access journals that don't charge C. University of Waikato
any author fees (APC - Article Processing Charges).
D. University of Southampton
They are usually financed by a university or research
organization. In contrast, Green Open Access (OA Answer: B (Stanford University)
Green) is where an author publishes their article in any
journal and then self-archives a copy in a freely Notes: LOCKSS (Lots of Copies Keep Stuff Safe)
accessible institutional or specialist online archive program, founded in 1999 by Dr. David S.H. Rosenthal
known as a repository, or on a website. and Victoria Reich under the auspices of Stanford
University, develops and supports open source software
14. Arrange the following printing technologies for digital preservation. LOCKSS is a real time backup
according to their emergence: solution. It provides access to stored content whenever
a) Movable type publisher sites are unavailable, even for a brief period of
b) Dot-Matrix printer downtime.
c) Woodblock printing
d) Screen printing 17. CLOCKSS program is related to ____.
A. Computer virus
A. (d), (c), (b) and (a) B. Institutional repository
B. (c), (a), (d), and (b) C. Long term digital preservation
C. (c), (d), (b) and (a) D. Programming language
D. (d), (a), (b) and (c)
Answer: C (Long term digital preservation)
Answer: B
Notes: CLOCKSS (Controlled LOCKSS), founded as
a project in 2006, is a collaboration of world’s leading
academic publishers and research libraries, providing

69 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

sustainable dark archive to ensure the long term 20. FOLIO Open Library Project is a collaborative
survival of web-based scholarly content. Digital content efforts of __.
is stored in the CLOCKSS archive with no user access A. Open Library Foundation (OLF)
unless a “trigger” event occurs. B. Index Data
C. EBSCO
18. Portico digital preservation service is part of __. D. All the above
A. Elsevier
B. McGraw-Hill Answer: D
Library Info

Library Info
C. ITHAKA
D. EBSCO Notes: FOLIO is an open, extensible library services
platform, aims to reimagine library software through a
Answer: C (ITHAKA) unique collaboration of libraries, developers and
vendors. FOLIO (folio.org) is a creative collaboration
Notes: PORTICO digital preservation service, started between OLF, EBSCO Information Services, and Index
in 2002 as project by JSTOR and launched in 2005, is Data to deliver a new library services platform to
now a part of ITHAKA, a not-for-profit organization transform library technology. Index Data was
helping the academic community use digital commissioned to perform the development of the core
technologies to preserve the scholarly content (journals, infrastructure components of FOLIO beginning in late
e-books, digitized collections) accessible to researchers, 2015. The Open Library Foundation is the
scholars, and students in the future. Portico and administrative home of FOLIO Project.
CLOCKSS are dark archive, preserving digital content
for the long term. Access to CLOCKSS content is 21. PubMed Central (PMC) is a digital archive of
similar to the Portico model. The difference between __.
Portico and CLOCKSS is that Portico archives digital A. Biomedical literature
content in Standard format, whereas CLOCKSS B. Social Science literature
preserves content in the publisher's original format (not a C. Computer Science literature
standard archival format). Portico is a proprietary D. All the above
software and has centralized, hosted platform, while
CLOCKSS is an open source software and has Answer: A (Biomedical literature)
distributed, peer to peer platform with error detection. Notes: PubMed Central (PMC), started in 2000 by
19. KB e-Depot is a digital information preservation United States National Library of Medicine (NLM) is
system of ___. a free digital repository that archives open access full-
A. France text scholarly articles that have been published within
B. England the biomedical and life sciences journal literature.
C. Netherlands PubMed Central is very distinct from PubMed. PubMed
D. Australia Central (PMC) is a free digital archive of full articles,
accessible to anyone from anywhere via a web browser.
Answer: C (Netherlands) On the other hand, PubMed is a free searchable database
of biomedical citations and abstracts, started in
Notes: Koninklijke Bibliotheek (KB), National Library January 1996 and offered free to the public starting in
of the Netherlands started a project of digital June 1997.
Information Archiving System ‘e-Depot’ in 2002 for
long term preservation of digital publications in the 22. Digitization of various cultural resources is
country. possible through:
a) Scanners

70 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

b) Digital cameras B. Bits, bytes, fields, files, records and


c) Video cameras databases
d) Smart & Mobile Phones C. Bits, bytes, records, fields, files and
A. a, b and d are correct databases
B. a, b and c are correct D. Bits, bytes, fields, records, files and
C. b, c and d are correct databases
D. a, b, c, and d are correct
Answer: D
Library Info

Library Info
Answer: D
26. Which is the proper hierarchy in the
23. Which of the following steps are involved in the organization of data?
selection of documents for digitization? A. Database - File - Record - Field - Character -
a) Checking for copyright Bit – Byte
b) Checking the research significance of the B. Database - Record - File - Field - Byte -
document Character – Bit
c) Checking for price C. Database - File - Record - Character - Field -
d) Checking the condition of document Byte – Bit
A. a, b and d are correct D. Database - File - Record - Field - Character -
B. a, b and c are correct Byte – Bit
C. b, c and d are correct
D. a, b, c, and d are correct Answer: D

Answer: A Notes: A database is a collection of files, a file is made


up of records, a record is made up of fields, a field is
24. New Genlib originated from which country? made up of characters, a character is made up of bytes
A. India and a byte is made up of bits (bit is short form for binary
B. New Zealand digit).
C. America
D. France 27. UNIMARC was developed by __.
A. Library of Congress
Answer: A (India) B. IFLA
C. FID
Notes: NewGenlib, an integrated library management D. UNESCO
system developed by Sidhartha Errabolu and L.J.
Haravu from Verus Solutions Pvt Ltd., first released Answer: B (IFLA)
in 2005. Domain expertise is provided by Kesavan
Institute of Information and Knowledge Management Notes: The UNIMARC Bibliographical format was first
(KIIKM), Hyderabad – a non-profit trust created in the created and proposed by IFLA in 1977, with the title
memory of B. S. Kesavan, the first librarian of National UNIMARC: Universal MARC format. The primary
Library of India. NewGenLib was declared free and purpose of UNIMARC is to facilitate the international
open source under GNU GPL in January 2008. exchange of data in machine-readable form between
national bibliographic agencies. This was followed by a
25. Select the correct sequence of data storage second edition of UNIMARC in 1980 and a UNIMARC
hierarchy: Handbook in 1983. The third and current edition was
A. Bytes, bits, fields, records, files and published in 2008, in book format.
databases
28. UNIMARC is based on __.
71 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. ISSN by Unicode. The current maintenance agency for MARC


B. ISBN 21 is the Library of Congress.
C. ISBD
D. METS 30. MARC 21 provides how many types of data
communication formats?
Answer: C (ISBD) A. 2
B. 4
29. CANMARC and US-MARC are merged C. 5
Library Info

Library Info
together with __. D. 7
A. CCF
B. UNIMARC Answer: C (5)
C. UK-MARC
D. MARC-21 Notes: There are five MARC 21 data communication
formats: Bibliographic Data Format, Authority Data
Answer: D (MARC-21) Format, Classification Data Format, Holdings Data
Format and Community Information Data Format.
Notes: MARC is an acronym
for MAchine Readable Cataloging. MARC 31. Which of the following are the parts of MARC
standards are a set of digital formats for the description record structure?
of items catalogued by libraries. The original MARC a) Check digit
format was developed at the Library of Congress in b) Leader
1965-66 leading to a pilot project by an American c) Directory
Computer Scientist, Henriette Avram, known as d) Record Terminator
MARC I, which had the aim of investigating the A. a, b and d are correct
feasibility of producing catalogue data in machine- B. a, b and c are correct
readable form. The second pilot project was initiated in C. b, c and d are correct
1968 called MARC II. MARC II was later split into two D. a, b, c, and d are correct
formats - BNB MARC (later UK MARC) and US
MARC. The USMARC format becomes the U. S. Answer: C
National Standard in 1971 (ANSI Z39.2) and an Notes: MARC bibliographic record structure consists of
International Standard in 1973 (ISO 2709). three main components: the Leader, the Directory, and
MARC 21 was created in 1999 as a result of the the variable fields. The Leader is fixed in length at 24
harmonization of USMARC, UKMARC and character positions and is the first field of a MARC
CANMARC (Canadian MARC) formats. MARC21 is record. The leader data elements contain numbers or
based on the international standard Format for coded values that primarily provide information for the
Information Exchange (ISO 2709) and its American processing of the record. Following the leader is
counterpart, the NISO/ANSI standard Z39.2, which the directory, which is an index to the location of
allows users of different software products to the variable fields (both control and data fields) within
communicate with each other and to exchange data. the record. Each entry is 12 character positions in
MARC 21 allows the use of two character sets, either length. In MARC Structure, Directory is followed by
MARC-8 or Unicode encoded as UTF-8. MARC-8 is variable fields that are of two types: (a) Variable
based on ISO 2022 and allows the use of Hebrew, Control fields – Variable control fields (00X fields)
Cyrillic, Arabic, Greek, and East Asian scripts. MARC may contain either a single data element or a series of
21 in UTF-8 format allows all the languages supported fixed-length data elements identified by relative
character position; (b) Variable Data Fields - Following

72 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

the control fields are data fields, which contain general D. a, b, c, and d are correct
data. Variable Data fields are identified by a 3 character
field tag. Each field contains indicators and subfield Answer: D
codes, as well as data and at the end a Field Terminator 35. Select the correct combinations of MARC-21
(FT). A Record Terminator (RT), ASCII control elements with corresponding tags:
character 1D(hex), is used as the final character of the a) ISBN – 020
record. b) ISSN – 022
Library Info

Library Info
32. As per ISO-2709 the sequence of elements in c) Cataloguing source – 040
bibliographic record structure is __. d) Language Code – 041
a) Directory A. a, b and d are correct
b) Data fields B. a, b and c are correct
c) Record label C. b, c and d are correct
d) Record separator D. a, b, c, and d are correct
A. (a), (b), (c) and (d) 36. Select the correct combinations of MARC 21
B. (c), (a), (b), and (d) elements with corresponding tags:
C. (c), (d), (a) and (b) a) Personal Main Entry – 100
D. (d), (a), (b) and (c) b) Personal Subject Heading – 600
c) Personal Added Entry – 700
Answer: B d) Subject Added Entry (Topical Term) – 650
A. a, b and d are correct
Notes: Record label – Directory – Data fields – Record B. a, b and c are correct
separator C. b, c and d are correct
D. a, b, c, and d are correct
33. Select the correct combinations of MARC 21
elements with corresponding tags: Answer: D
a) Personal Main Entry – 100
b) Personal Subject Heading – 600 37. Select the correct combinations of MARC-21
c) Personal Added Entry – 700 elements with corresponding tags:
d) Subject Added Entry (Topical Term) – 650 a) Uniform Title – 240
A. a, b and d are correct b) Main Title Statement – 245
B. a, b and c are correct c) Varying Form of Title – 246
C. b, c and d are correct d) Former Title – 247
D. a, b, c, and d are correct A. a, b and d are correct
B. a, b and c are correct
Answer: D C. b, c and d are correct
D. a, b, c, and d are correct
34. Select the correct combinations of MARC-21
elements with corresponding tags: Answer: D
a) Uniform Title – 240
b) Main Title Statement – 245 38. Select the correct combinations of MARC-21
c) Varying Form of Title – 246 elements with corresponding tags:
d) Former Title – 247 a) ISBN – 020
A. a, b and d are correct b) ISSN – 022
B. a, b and c are correct c) Cataloguing source – 040
C. b, c and d are correct d) Language Code – 041

73 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. a, b and d are correct Hopkins and its second edition was published in 1988 in
B. a, b and c are correct two volumes called CCF/B (Common Communication
C. b, c and d are correct Format for Bibliographic Information) and CCF/F
D. a, b, c, and d are correct (Common Communication Format for Factual
Information). The structure of CCF is the
Answer: D implementation of ISO-2709. It consists of the
following: a) Record b) Directory c) Data Fields
39. Select the correct combinations of MARC-21
Library Info

Library Info
elements with corresponding tags: 42. Arrange the following software according to the
a) Library of Congress Call No. – 050 chronological sequence of their launching:
b) Universal Decimal Classification No. – 080 a) KOHA
c) Dewey Decimal Classification No. – 082 b) New Genlib
d) ISBN Number – 020 c) CDS/ISIS
A. a, b and d are correct d) LibSys
B. a, b and c are correct
C. b, c and d are correct A. (a), (b), (c) and (d)
D. a, b, c, and d are correct B. (c), (a), (d), and (b)
Answer: D C. (c), (d), (a) and (b)
D. (d), (a), (b) and (c)
40. Select the correct combinations of MARC-21
elements with corresponding tags: Answer: C
a) Edition Statement – 250 Notes: CDS/ISIS (1985, UNESCO); LibSys (1988,
b) Imprint Details – 260 LibSys Corporation, Gurgaon); KOHA (2000, Katipo
c) Physical Description – 300 Communications); NewGenlib (2005, Verus Solutions
d) Series Statement – 490 Pvt Ltd. )
A. a, b and d are correct
B. a, b and c are correct 43. Arrange the following software according to
C. b, c and d are correct their chronological sequence of their launching:
D. a, b, c, and d are correct a) Sanjay
b) SLIM
Answer: D c) SOUL
41. CCF was developed by __. d) E-Granthalaya
A. ILA A. (a), (b), (c) and (d)
B. ALA B. (b), (a), (c), and (d)
C. IFLA C. (c), (d), (a) and (b)
D. UNESCO D. (d), (a), (b) and (c)

Answer: C (UNESCO) Answer: B

Notes: SLIM (First released in 1988; Algorithm


Notes: Common Communication Format (CCF),
developed by UNESCO/PGI is a structure format for Consultants Pvt Ltd. established in Pune in 1986);
creating bibliographical records and for exchanging Sanjay (1995; DESIDOC); SOUL (2000; INFLIBNET);
records between groups of information agency and E-Granthalaya (2003; NIC)
libraries. The first edition of CCF was published in 1984 44. Select the Library automation systems
under the editorship of Peter Simmons and Alan developed by DESIDOC:
74 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. DELMS digital data encoded in RFID tags or smart labels are


B. Suchika captured by a reader via radio waves.
C. Sanjay
D. All the above 47. Identify the following Institutional
Archives/Repositories freely available:
Answer: D a) Project MUSE
b) Web of Science
Notes: DELMS (Defence LibraryManagement System) c) E-prints
Library Info

Library Info
was developed by DESIDOC in 1988. Sanjay Library d) Open DOAR
Software, is developed by DESIDOC in 1995. The
software was based on CDS/ISIS and sponsored and A. a, and b are correct
marketed by NISSAT. Suchika software was developed B. b, and c are correct
in 1996 by DESIDOC. C. c and d are correct
45. Which among the following library management D. a, and d are correct
software were developed by INFLIBNET? Answer: C
a) ILMS
b) CATMAN 48. Project MUSE- an online database of academic
c) SOUL journals and electronic books was founded in
d) Granthalaya 1993 at ___.
A. a, and d are correct A. Oxford University
B. a, and c are correct B. Stanford University
C. b, and d are correct C. University of Southampton
D. c, and d are correct D. John Hopkins University

Answer: B Answer: D (John Hopkins University)

Notes: CATMAN and Granthalaya Library management Notes: Project MUSE, a non-profit collaboration
systems were developed by INSDOC (NISCAIR). between libraries and publishers, is an online database
of peer-reviewed academic journals and electronic books
46. Advantages of RFID over barcode technology on social sciences and humanities. It was founded in
are: 1993 at John Hopkins University, United States and
a) No line of sight required for reading available on subscriptions through EBSCO, Elsevier and
b) Multiple items can be read with a single ProQuest.
scan
c) Individual items are not identified 49. METS digital content standard is developed by
d) Each tag can carry a lot of data __.
A. Library of Congress
A. a, b and d are correct B. OCLC
B. a, b and c are correct C. British Library
C. b, c and d are correct D. ISO
D. a, b, c, and d are correct
Answer: A (Library of Congress)
Answer: A
Notes: METS (Metadata Encoding and Transmission
Notes: RFID is an acronym for “Radio-Frequency Standard) is a Library of Congress standard used to
IDentification” and refers to a technology whereby describe digital objects. This includes bibliographic,
75 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

administrative and structural information about the metadata and structural information while ALTO
digitised material, as well as a list of files. contains content and physical information.

50. ‘MODS’ in the context of digital standard stands 53. OpenDOAR is a ___.
for __. A. Directory of Academic Open Access
A. Metadata Object Description Schema Repositories
B. Multiple Object Digital Schema B. Directory of Public Libraries
C. Metadata Object Digital Schema C. Directory of Special Open Access
Library Info

Library Info
D. Multiple Object Description Schema Repositories
D. Directory of Public Libraries Open Access
Answer: A (Metadata Object Description Schema) Repositories
Notes: Metadata Object Description Schema (MODS) Answer: A (Directory of Academic Open Access
is a schema for a bibliographic element set that may be Repositories)
used for a variety of purposes, and particularly for
library applications. The standard is maintained by the Notes: OpenDOAR: Directory of Open Access
Library of Congress. Repositories is a UK-based website that lists
academic open access repositories. It is maintained by
51. ‘Linux’ is an example of __. the University of Nottingham under the SHERPA
A. Application software (Securing a Hybrid Environment for Research
B. System software Preservation and Access) – an organization set up in
C. Library software 2002 to support open access institutional
D. None of the above repositories based in UK universities.
Answer: B (System Software) 54. Indentify the services provided under SHERPA
Notes: Linux is free and open source operating system Project, UK?
a) SHERPA/RoMEO
developed by Linus Torvalds and first released in
September 1991 under GPL license. b) SHERPA/JULIET
c) OpenDOAR
52. ‘ALTO’ Digital Library Standard is developed d) SHERPA Search
by __. A. a, b and d are correct
A. OCLC B. a, b and c are correct
B. Library of Congress C. b, c and d are correct
C. ISI D. a, b, c, and d are correct
D. ISO
Answer: D
Answer: B (Library of Congress)
Notes: SHERPA/RoMEO – Publisher’s copyright &
Notes: ALTO (Analyzed Layout and Text Object) is a archiving policies; SHERPA/JULIET – Research
standardized a XML Schema that is used to store Funders archiving mandates and guidelines; OpenDOAR
technical metadata for describing the layout and content – worldwide directory of open access repositories;
of physical text resources, such as pages of a book or a SHERPA Search – simple full text search of UK
newspaper. It is designed to be used as an extension repositories.
schema for use with the Library of
Congress' Metadata Encoding and Transmission 55. SHERPA/RoMEO project was funded by:
Schema (METS) XML Schema, where METS provides A. OCLC
B. JISC
76 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. British Library Notes: RealAudio (.ra) is a proprietary audio format


D. W3C developed by RealNetworks and first released in April
1995. Audio Interchange File Format (.aiff) is an audio
Answer: B (JISC) file format standard used for storing sound data for
Notes: The RoMEO Project (Rights MEtadata for Open personal computers and other electronic audio devices.
The format was developed by Apple Inc. in 1988.
archiving) was a JISC funded project (2002/3) at the
University of Loughborough to investigate the rights 58. TIFF stands for __.
Library Info

Library Info
issues surrounding the self-archiving of research in the A. Tagged Image File Format
UK community under the Open Archive Initiative B. Tiled Image File Format
Protocol for Metadata Harvesting (OAI-PMH). C. Total Image File Format
56. Which among the following colors are used to D. Tabular Image File Format
highlight publishers’ archiving policies under Answer: A (Tagged Image File Format)
SHERP/RoMEO Project?
a) Green Notes: TIFF (Tagged Image File Format) is an image
b) Blue file format mostly used for containing high quality
c) Yellow graphics. TIF format was a creation of Aldus
d) White Corporation and later acquired by Adobe.
A. a, and b are correct
B. b, and c are correct 59. Identify the correct sound file formats:
C. b, c and d are correct a) .MOV
D. a, b, c, and d are correct b) .WAV
c) .MID
Answer: D d) .MPG

Notes: The four different colors are used to highlight A. a, and b are correct
four different categories of archiving rights under B. b, and c are correct
SHERPA/RoMEO project: Green - can archive both pre- C. c and d are correct
print and post-print; Blue - can archive post-print; D. a, and d are correct
Yellow - can archive pre-print; and White - archiving not
formally supported. Answer: B

57. Identify the Audio File Format for Digital 60. Which of the following are not general image
libraries: file format?
a) .tif a) DOC
b) .jfif b) MPEG
c) .aiff c) MP4
d) .ra d) PNG

A. a, and b are correct A. a, and b are correct


B. b, and c are correct B. b, and c are correct
C. c and d are correct C. c and d are correct
D. a, and d are correct D. a, and c are correct

Answer: C Answer: D

77 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

61. e-Gyankosh – a national digital repository is C. Norman Joseph Woodland and Bernard
implemented by __. Silver
A. UGC D. None of the above
B. NIC
C. IGNOU Answer: C (Norman Joseph Woodland and Bernard
D. RRRLF Silver)

Answer: C (IGNOU) Notes: Barcode is a method of representing data in a


Library Info

Library Info
visual, machine-readable form. Initially, barcodes
62. Which of the following organization have represented data by varying widths and spacings of
introduced ‘Digby’- a new mobile application parallel lines. These barcodes are referred to as linear or
available as a part of ‘Worldshare Management one-dimensional (1D) that can be scanned by an optical
Service’? scanners, called barcode readers. Norman Joseph
A. Library of Congress Woodland and Bernard Silver invented the barcode
B. NISCAIR based on Morse code around 1949. However, the
C. OCLC technology was patented in 1952. Later, a matrix code,
D. UTLAS also termed as 2-Dimentional barcode (2D Code) were
devised which represent more data per unit area. One of
Answer: C (OCLC) the examples of matrix code is QR Code.
Notes: Digby is a mobile application that was made 65. Identify the content management software from
available in 2017 by OCLC as part of library’s the following:
WorldShare Management Service (WMS) subscription. A. Library Manager
B. Eprint
63. Which of the following are the components of a
barcode symbol? C. Drupal
a) Antenna D. LibSys
b) Quiet Zone Answer: C (Drupal)
c) Transponder
d) Start Character Notes: Drupal, a free open source software content
management system written in PHP and distributed
A. a, b, and d are correct under the GNU General Public License. Originally
B. a, c and d are correct written and developed by Dries Buytaert in May 2000
C. a and d are correct and currently developed and maintained by Drupal
D. b and d are correct Community.

Answer: D 66. The first public version of the content


management system – ‘Ghost’ was released with
Notes: A bar code symbol typically consists of which one of the following names?
five parts: a quiet zone, a start character, data A. Content Pro
characters (including an optional check character), a B. Typo3
stop character, and another quiet zone. C. Grav
64. Who among the following invented the barcode D. Kerouac
technology? Answer: D (Kerouac)
A. Sir William Herschel
B. Denso Wave
78 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Ghost, a free and open source content A. DRTC


management system, written in javaScript and first B. National Library of India
public version released in October 2013 with the name C. IGNCA
‘Kerouac’. D. NISCAIR

67. Which among the following are the content Answer: A (DRTC)
management systems?
a) TYPO3 Notes: Librarian’s Digital Library (LDL) has been
Library Info

Library Info
b) Drupal developed by DRTC, which contains full text of
c) Ghost papers/articles related to Indian Librarianship.
d) Grav Presently it contains full text papers submitted in
A. a, and d are correct DRTC seminars, papers submitted by LIS
B. a, b and c are correct professionals and Students Theses/Dissertations.
C. b, c and d are correct 70. National Digital Library of India is being
D. a, b, c, and d are correct developed by:
Answer: D A. IIT Delhi
B. IIT Roorkee
Notes: TYPO3 is a free and open-source Web content C. IIT Bombay
management system written in PHP and developed by D. IIT Kharagpur
TYPO3 Association. It is released under the GNU
General Public License. TYPO3 was initially authored Answer: D (IIT Kharagpur)
by Kasper Skårhøj in 1997 and initially released in 71. National Digital Library of India is part of the
1998. online services of the ___.
Grav is a free software, self-hosted content management A. Indian Institute of Technology, Delhi
system (CMS) written in the PHP programming B. Indian Institute of Technology, Kharagpur
language. The software was initially released in 2014 C. Indian Institute of Technology, Roorkee
under MIT License. D. Indian Institute of Technology, Kanpur

68. ‘NALANDA’ is the digital library initiative of Answer: B (Indian Institute of Technology,
__. Kharagpur)
A. DRTC Notes: Ministry of Human Resource Development
B. National Library of India (MHRD) under its National Mission on Education
C. NIT, Calicut through Information and Communication Technology
D. NISCAIR (NMEICT) has initiated the National Digital Library of
Answer: C (NIT, Calicut) India (NDL India) pilot project at Indian Institute of
Technology, Kharagpur.
Notes: Nalanda Digital Library is part of National
Institute of Technology, Calicut Library and offers free 72. WordNet is ___.
eBooks in PDF and HTML formats in Engineering, A. A networking programme
Classic Fiction, History, Biography, Psychology, B. A thesaurus
Philosophy, Homeopathy etc. C. An ontology
D. A library network
69. ‘Librarian’s Digital Library (LDL)’ is the
initiative of __. Answer: C (An ontology)

79 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: WordNet is a lexical database for the English 76. How many license conditions are available
language developed by George Armitage Miller in under Creative Commons?
1985 at Princeton University. It groups English words A. Two
into sets of synonyms called synsets, provides short B. Three
definitions and usage examples, and records a number of C. Four
relations among these synonym sets. WordNet is thus a D. Five
combination of dictionary and thesaurus.
Answer: C (Four)
Library Info

Library Info
73. PDF files are in __.
A. Web Format Notes: Creative Commons (CC) is an American non-
B. Film Format profit organization founded in 2001 by Lawrence Lessig.
C. Image Format There are six main Creative Commons licenses based on
D. Text Format four conditions: (i)Attribution (BY); (ii) Share-Alike
(SA); (iii)Non-Commercial (NC); and (iv)No Derivative
Answer: D (Text Format) Works (ND).

Notes: The Portable Document Format (PDF) is a file 77. ‘Tibetan and Himalayan Digital Library’ is
format developed by Adobe in the 1993 to present hosted by ___.
documents, including text formatting and images. PDF A. Stanford University
was standardized as an open format, ISO 32000, in B. University of North Bengal
2008, and no longer requires any royalties for its C. University of Delhi
implementation. D. University of Virginia

74. Which of the following are example s of WAN? Answer: D (University of Virginia)
a) DELNET
b) CALIBNET Notes: The Tibetan and Himalayan Library (THL),
c) PUNENET formerly the Tibetan and Himalayan Digital
d) INFLIBNET Library (THDL), is a multimedia guide and digital
library developed in 2000 by the University of
A. a, and d are correct Virginia focused on the languages, history and
B. a, b and c are correct geography of Tibet and the Himalayas.
C. b, c and d are correct 78. OAISTER is an example of digital libraries
D. a, b, c, and d are correct architecture based on ___.
Answer: A A. CORBA
B. Software Agents Architecture
75. Arrange the following in an ascending order: C. Federated Database System
a) Database D. Metadata Harvesting
b) Field
c) File Answer: D (Metadata Harvesting)
d) Record
79. Arrange in sequence, the following
A. (a), (d), (c) and (b) functional entities of the OAIS Reference
B. (c), (a), (d), and (b) Model that occur in the digital information
C. (b), (d), (c) and (a) life cycle:
D. (d), (a), (b) and (c) a) Administration
b) Archival storage
Answer: C
80 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

c) Access D. RFID tags, server, external book return,


d) Data management sensors
e) Ingest
A. (a), (d), (c), (b), (e) Answer: B
B. (c), (a), (d), (b), (e) 82. ‘Communities’ is a component of following
C. (b), (d), (c), (a), (e) digital library software:
D. (e), (b), (d), (c), (a) A. GSDL
Library Info

Library Info
Answer: D B. DSpace
C. Fedora
Notes: The Open Archival Information Systems (OAIS) D. I-Core
Reference Model is a conceptual model for a digital
archive. The OAIS Reference Model produced under the Answer: B (Dspace)
leadership of the Consultative Committee for Space Data Notes: DSpace, written in Java, is open source
Systems (CCSDS) was adopted as an ISO standard (ISO repository software, first released in November 2002, as
14721) in 2002. 2nd edition of this Reference Model a joint effort between developers from MIT and HP labs.
was published in 2012. The OAIS archive operates Presently DSpace project is being maintained and
within an external environment with three main developed by DuraSpace – a non profit organization
stackholders: (i) Management (ii) Producers, and (iii) came into existence after merging DSpace Foundation
Consumers. There are three different types of and Fedora Commons in 2009.
information packages that move within the OAIS: (i)
Submission Information Package (SIP), (ii) Archival 83. What is the purpose of handles in DSpace?
Information Package (AIP), and (iii) Dissemination A. A unique identifier of an item
Information Package (DIP). There are six functional B. A unique identifier of a bitstream
entities within the OAIS Archive – (i) Ingest (ii) C. A unique identifier of a metadata
Archival Storage (iii) Data Management (iv) Access (v) D. None of the above
Administration, and (vi) Preservation Planning.
Answer: A (A Unique identifier of an item)
80. Which digital library software was launched as
an experimental version for Android? Notes: DSpace uses Handles primarily as a means of
A. DSPACE assigning globally unique identifiers to objects. Each site
B. Greenstone running DSpace needs to obtain a unique Handle 'prefix'
C. E-Print from CNRI. Presently, Handles are assigned to
D. Fedora communities, collections, and items. Bundles and
bitstreams are not assigned Handles.
Answer: B (Greenstone)
84. Which among the following digital library
81. The main components of an RFID system software was developed at Cornell University?
include: A. FEDORA
A. Handheld Reader, RFID Label printer, B. E-Prints
server and External book return C. D-Space
B. RFID tags, readers or sensors, Antenna and D. GreenStone
server
C. RFID label printer, sensors, antenna and Answer: A (FEDORA)
server
Notes: FEDORA (Flexible Extensible Digital Object
Repository Architecture) Repository open source
81 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

software was originally designed and developed by Notes: An aperture card is a tabulating card with a single
researchers at Cornell University and the first version frame of 35mm film mounted within the open aperture.
was released in May 2003. FEDORA project is now Aperture cards were widely used by the engineering and
being supported by the DuraSpace not-for-profit architectural industries to preserve drawings, blueprints,
organization since its inception in 2009 after merging and maps. The standard aperture card measures 3¼
DSpace Foundation and Fedora Commons. inches wide x 7 3/8 inches in length (86mm x 187mm).

85. Duraspace provides cloud-based services related 89. What is the length of 16 mm roll film used for
Library Info

Library Info
to __. microfilm?
a) D-Space A. 90 feet or 110 feet
b) E-Prints B. 75 feet or 120 feet
c) NewGen Lib C. 120 feet or 200 feet
d) FEDORA D. 100 feet or 215 feet
A. a, and d are correct
B. c and d are correct Answer: D (100 feet or 215 feet)
C. b, and c are correct Notes: Microfilm comes in rolls that are either 100 feet
D. b and d are correct or 215 feet long. 100 foot film has normally 0.004 inches
Answer: A thickness, where as 215 foot film is normally 0.0025
inches in thickness. 16mm roll film is the standard size
86. Use of Microfilming is considerably reduced and most often used for office-sized 8.5×11″ / A4
due to: documents such as books, periodicals etc. 16mm
A. High cost involved in it microfilm measures about 5/8” wide. 35mm microfilm is
B. Need for use microfilm reader most often used for oversize documents such as
C. Availability of better technology in the form drawings, maps and newspapers.
of digitization
D. All of the above 90. What is the standard size of Microfiche?
A. 4 x 6 inches (105mm x 148mm)
Answer: D (All of the above) B. 3 x 5 inch (75mm x 125mm)
C. 2 x 4 inch (55mm x 100mm)
87. Opaque paper is a __. D. 2 x 3 inch (55mm x 75mm)
A. Ultra-white paper
B. Ultra-white thin paper Answer: A (4 x 6 inches (105mm x 148mm)
C. Transparent paper
D. Non-Transparent paper Notes: Microfiche are a series of microimages on a flat
sheet of 105mm film arranged in a grid pattern. The
Answer: D (Non-Transparent paper) content is filmed onto 105mm film stock, and then the
roll film is cut into sheets. The most common and
88. Which are widely used by the engineering and standard size of microfiche now being produced
architectural industries to preserve drawings, measures 4 x 6 inches (105mm x 148mm). The standard
blueprints and maps? 4 x 6 inches format is usually offered in a format of
A. Microfiche 60 or 98 pages per fiche. Although microfiche has a
B. Aperture cards much smaller storage capacity, microfiche sheets may be
C. Microfilm easier to organize because of their shape and form factor.
D. Ultrafiche
91. A standard microfiche can accommodate __.
Answer: B (Aperture cards) A. 75 pages
82 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. 80 pages ability of a human expert. Expert systems are designed


C. 98 pages to solve complex problems by reasoning through bodies
D. 105 pages of knowledge, represented mainly as ‘if–then rules’. The
first expert system ‘DENDRAL’ was introduced by
Answer: C (98 pages) Edward Feigenbaum and his team at Stanford
University, United States around 1965. Edward
Notes: A standard microfiche is 4″ x 5″ and can store
Feigenbaum is also called as ‘Father of Expert
about 98 letter-sized pages.
Systems’. An expert system is divided into two
Library Info

Library Info
92. Radio Frequency Identification is used in library subsystems: (i) the inference engine, and (ii)
for __. the knowledge base. The knowledge base represents
a) Circulation of documents facts and rules. The inference engine applies the rules to
b) Cataloguing of documents the known facts to deduce new facts.
c) Security of documents
d) Acquisition of documents 95. Inference Engine is a part of which information
system?
A. Management Information System
A. a, b and d are correct
B. a, b and c are correct B. Decision Support System
C. b, c and d are correct C. Expert System
D. Open System
D. a, and c are correct

Answer: D Answer: C (Expert System)

Notes: In the field of Artificial Intelligence, inference


93. Which among the following was the first expert
engine is a component of the system that applies logical
system?
A. PROSPECTOR rules to the knowledge base to deduce new information.
B. MYCIN The first inference engines were components
of expert systems. The typical expert system consisted
C. DENDRAL
D. ANSWER MAN of a knowledge base and an inference engine. Inference
engines work primarily in one of two modes either
Answer: C (DENDRAL) special rule or facts: forward chaining and backward
chaining. Forward chaining starts with the known facts
Notes: DENDRAL was a chemical-analysis expert and asserts new facts. Backward chaining starts with
system developed by Edward Feigenbaum and his goals, and works backward to determine what facts must
team at Stanford University, United States around 1965. be asserted so that the goals can be achieved.
94. Who is called the father of ‘Expert Systems’? 96. The logic ‘IF-THEN rules’ applied in __.
A. John Gaschnig A. Inference Engine
B. Nils Nilsson B. Decision support system
C. Richard Duda C. Management Information System
D. Edward Feigenbaum D. None of the above
Answer: D (Edward Feigenbaum) Answer: A (Inference Engine)
Notes: Expert systems were among the first truly Notes: The logic that an inference engine uses is
successful forms of artificial intelligence (AI) software. typically represented as IF-THEN rules. The general
In artificial intelligence (AI), an expert system is a
computer system that emulates the decision-making
83 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

format of such rules is IF <logical expression> THEN mineral exploration. It was developed between 1976 and
<logical expression>. 1981 by Richard Duda and his team in United States.

97. Which of the following are the basic 99. A set of best practices for publishing and
components of expert system? interlinking structured data on the web is known
a) User interface as:
b) Knowledge base A. Distributed data
c) Inference mechanism B. Web data
Library Info

Library Info
d) Schema C. Unmarked data
A. a, b and d are correct D. Linked data
B. a, b and c are correct
C. b, c and d are correct Answer: D (Linked data)
D. a, c, and d are correct 100. Which of the following is not related to Linked
Answer: B Open Data?
A. RDF
Notes: There are 5 components of Expert Systems: B. HTTP
(i)Knowledge Base (ii) Inference Engine (iii) C. URI
Knowledge acquisition and learning module (iv) User D. Z39.50
Interface (v) Explanation module
Answer: D (Z39.50)
98. Select the correct combinations from the
following: Notes: In computing, linked data is a structured data
A. MYCIN – Expert system in medicine which is interlinked with other data in order to become
B. DENDRAL – Chemical analysis expert more useful through semantic queries. It builds upon
system standard Web technologies such as HTTP, RDF and
C. PROSPECTOR – Mineral exploration URIs. The term ‘Linked Data’ was coined in 2006 by
expert system Tim Berners Lee, director of the World Wide Web
D. All the above Consortium (W3C). According to Tim Berners Lee,
“Linked Open Data (LOD) is Linked Data which is
Answer: D released under an open license, which does not impede
its reuse for free”.
Notes: There are numerous examples of expert systems.
DENDRAL was an Artificial Intelligence based expert 101. UMBEL stands for __.
system used essentially for chemical analysis.
MYCIN was an early backward chaining expert A. Upper Mapping and Binding Exchange
system that used artificial intelligence to identify Layer
bacteria causing severe infections. It was developed at B. Upper MARC and Binding Exchange
Stanford University during early 1970s. INTERNIST- Language
I was a computer-assisted diagnostic tool developed in C. Upper MARC and Binding Exchange
the early 1970s at the University of Pittsburgh. Layer
CADUCEUS was another medical expert D. Upper Mapping and Book Exchange
system finished in the mid-1980s by Harry Pople of the Language
University of Pittsburgh. PROSPECTOR is an expert
system designed for decision-making problems in Answer: A (Upper Mapping and Binding
Exchange Layer)

84 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: UMBEL provides a general vocabulary of PHP and licensed under GPL. ATutor was first released
classes and predicates for describing domain in late 2002.
ontologies, with the specific aim of promoting
interoperability with external datasets and domains. 105. What is CDS/ISIS?
It is a class structure used in Linked Data, along A. A word processing software
with OpenCyc, YAGO, and the DBpedia ontology. B. An information storage and retrieval system
UMBEL is written in the Semantic Web languages C. A spreadsheet
of SKOS and OWL 2. D. A programming language
Library Info

Library Info
102. Which one of the following is the Linked Open Answer: B (An Information storage and retrieval
Data Project of Thomson Reuters? software)
A. UMBEL
Notes: CDS/ISIS (Computerized Documentation
B. OpenCalais
System/Integrated Set of Information Systems) is a
C. GRID
generalized Information Storage and Retrieval Systems
D. Geo Names
developed, maintained and disseminated by UNESCO.
Answer: B (OpenCalais) First released in 1985 (Dos Based). A Window version
of CDS/ISIS (WINISIS) was first distributed for testing
Notes: OpenCalais, first launched in 2008, is a free in May 1995 and the first version officially released in
service by Thomson Reuters that automatically November 1998.
extracts semantic information from web pages in a
format that can be used on the semantic web. 106. Ontologies consist of the following components:
A. Label, Directory, Data and Separator
103. Which are Learning Management System from B. Substance, Attributes, Relations and
the following: Functions
a) Open Biblio C. Entities, Attributes, Relations and Functions
b) Moodle D. Concepts, Attributes, Relations and
c) A Tutor Instances
d) New Genlib (NGL)
Answer: D (Concepts, Attributes, Relations and
Instances)
A. a, b and d are correct
B. b and c are correct Notes: Most ontologies have components such as:
C. b, c and d are correct individuals (instances), classes (concepts), attributes,
D. a, b, c, and d are correct and relations.

Answer: B 107. Impartus is a __.


A. Plagiarism detection system
104. ATutor was first released in ___.
B. Automated audio recording system
A. 2000
C. Automated video capturing system
B. 2001
D. Grammar correction tool
C. 2002
D. 2003 Answer: C (Automated video capturing system)

Answer: C (2002) Notes: Impartus is a Bangalore-based private company


specialized in video technology. Founded in December
Notes: ATutor is an Open Source Web-based Learning
2013 by Alok Choudhary, Amit Mahensaria and Manish
Content Management System (LCMS), developed in
85 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Kumar, the flagship product of Impartus is an automated uses digital technology to preserve and protect these
lecture capture system that is typically used to record all texts, and make them accessible to scholars and seekers
classroom lectures based upon the pre-configured worldwide. Muktabodha was inaugurated in 1997 by
schedule. Gurumayi Chidvilasananda, spiritual head of the Siddha
Yoga path.
108. Evergreen Open Source ILS was developed by
__. 111. Considering all internet users in India equally
A. California Public Library System, USA without discriminating or charging differently by
Library Info

Library Info
B. Georgia Public Library System, USA user, content, site, platform, application, type of
C. Florida Public Library System, USA attached equipment or mode of communication is
D. None of the above known as __.
A. Preferential Net
Answer: B (Georgia Public Library System, USA) B. Favoured Net
Notes: The Evergreen ILA Project was started in 2006 C. Reactive Net
D. Net Neutrality
by the Georgia Public Library System to support 275
public libraries in the state of Georgia, US. It was Answer: D (Net Neutrality)
released as an open source ILS in 2000 under GNU GPL
License. 112. Identify the odd one which does not belong to
the group:
109. Knowledge Graph is related to ___. A. Lithography
A. Rediff B. Reflex Copying
B. Yahoo C. Thermography
C. Google D. Diazo Printing
D. Altavista
Answer: C (Thermography)
Answer: C (Google)
Notes: Reprographic methods can be grouped under
Notes: The Knowledge Graph is a knowledge three broad groups: (i) Photographic methods (Light
base used by Google and its services to enhance sensitive) (ii) Thermographic methods (Heat sensitive),
its search engine's results with information gathered and (iii) Electrostatic methods (Charge sensitive).
from a variety of sources. The information is presented
to users in an ‘infobox’ next to the search results. 113. Who among the following is the inventor of
Knowledge Graph infoboxes were added to Google's lithography printing?
search engine in May 2012. A. Alois Senefelder
B. Peter Merholz
110. Muktabodha, an Indian digital library deals with: C. E. Williams
A. Anthropology D. Jack Dorsey
B. Archeology
C. Indology Answer: A (Alois Senefelder)
D. Sociology
Notes: Lithography is a method of printing originally
Answer: C (Indology) based on the mixture of oil and water. The printing is
from a stone (lithographic limestone) or a metal plate
Notes: The Muktabodha Indological Research Institute with a smooth surface. It was invented in 1796 by
(MIRI), New Delhi, is dedicated to preserving the German author and actor Alois Senefelder as a cheap
philosophical and scriptural texts of classical India. t method of publishing theatrical works.
86 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

114. Which of the following is Asynchronous mode D. b and d are correct


of communication?
A. Instant messaging Answer: B
B. Email Notes: Web-zine is a "Web Magazine", a magazine
C. Video conferencing published on the internet.
D. Voip
117. Dolphin 4.3 is ___.
Answer: B (Email)
Library Info

Library Info
A. A fully integrated and multiuser library
Notes: The term asynchronous is usually used to automation software
describe communications in which data can be B. An operating system
transmitted intermittently (at regular intervals/not C. A database of South African Birds
continuously) rather than in a steady stream. In other D. A single user LIS Software
words, Asynchronous communications can be sent at
Answer: A (A fully integrated and multiuser library
any time without regard to whether or not the receiver is
automation software)
ready. Asynchronous communication is sometimes
called start-stop transmission. Examples: Email, Notes: Dolphin is a high performance, fully integrated
Webforms, Discussion Forums, text messaging, and multi user library automation software for
newsgroups, listservs (Mailing lists), blog, social media. Windows-98-ME-NT-2000 and XP. It is developed by
Dolphinox company based in Bhopal, Madhya Pradesh.
115. Which of the following is a synchronous
communication tool that can be used in e- 118. Who is believed to have coined the term ‘Cloud
learning? Computing’?
A. Emails A. Tim Berners Lee
B. Mailing lists B. Eric Schmidt
C. Newsgroups C. Ray Tomlinson
D. Instant Messaging D. Vint Cerf

Answer: D (Instant Messaging) Answer: B (Eric Schmidt)

Notes: Synchronous communication can be defined as Notes: Google CEO Eric Schmidt is said to have coined
real- time communication between two people. In this the term ‘Cloud Computing’ in the year 2006.
communication, "data is sent in a continuous stream at
constant rate." Examples: Instant messaging, Chat, 119. New Delivery application software ‘SaaS’
Video Conferencing, Voice over IP, Telephone Calls, (Software as a Service) is ___.
Webcams. A. Running remotely on a Web server which
the user can access by using a web browser
116. Which of the following are Web-zine? B. Installed and run on a user’s computer
a) Email Magazine C. Available only through a gateway
b) E-Conference D. A Hardware required for a WAN
c) Online Bulletin
d) Electronic News Letter Answer: A

Notes: Generally, cloud computing are of three types:


A. a, b, and d are correct
IaaS (Infrastructure as a Service), PaaS (Platform as a
B. a, c and d are correct
Service) and SaaS (Software as a Service). SaaS is a
C. a b, and c are correct
software distribution model in which a third-party
87 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

provider hosts applications and makes them available to (IaaS) cloud computing model for private, public
customers over the internet. A simple example of SaaS is and hybrid cloud platforms.
an online email service, like Gmail. If you use Gmail,
you are not hosting your own email server. Google is Azure is a cloud computing service created by
hosting it, and you are simply accessing it through your Microsoft Corporation in 2010 that offers three
browser-as-client. main cloud computing platform services: SaaS –
Software as a Service, IaaS – Infrastructure as a
120. Azure is a cloud computing platform of __. Service and PaaS – Platform as a Service.
Library Info

Library Info
A. Microsoft
B. Amazon 122. The @ sign representing ‘at’ in emails to
C. Google connect the username with destination thus
D. Hewlett Packard forming part of an email ID was first used by:
A. Alan Kay
Answer: A (Microsoft) B. Ray Tomlinson
C. Ted Nelson
Notes: Azure, initially released in February 2010, is a
D. Vint Cerf
cloud computing service created by Microsoft
Corporation for building, testing, deploying, and Answer: B (Ray Tomlinson)
managing applications and services through Microsoft-
managed data centers. Azure offers three main cloud Notes: Raymond Tomlinson was a pioneering American
computing platform services: SaaS – Software as a computer programmer who implemented the first email
Service. IaaS – Infrastructure as a Service. PaaS – program on the ARPANET system, the precursor to the
Platform as a Service. Internet, in 1971; he is internationally known and
credited as the inventor of email.
121. Which of the following are suitable examples of
IaaS? 123. Project Gutenberg is associated with __.
a) Eucalyptus A. E-Journals
b) OpenNebula B. E-books
c) FreshBooks C. Bibliographic database
d) Microsoft Azure D. Numeric database
A. a, b, and d are correct
Answer: B (E-Books)
B. a, c and d are correct
C. a b, and c are correct Notes: Project Gutenberg is the oldest digital library of
D. b and d are correct e-books. It was founded in 1971 by Michael S. Hart.
Answer: A 124. Which of the following helps in consistently
identifying an electronic object?
Notes: FreshBooks is accounting software, initially A. DOI
released in 2004 and operated by 2ndSite Inc. It is B. URL
web-based software as a service (SaaS) model, C. Web address
which can be accessed through a desktop or mobile D. Email ID
device.
Answer: A (DOI)
Eucalyptus and OpenNebula are open source
software that provides Infrastructure As A Service Notes: In computing, a Digital Object Identifier (DOI)
is a persistent identifier or handle used to uniquely

88 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

identify objects, standardized by the International C. Jorn Bargar


Organization for Standardization (ISO). It was first D. Peter Merholz
introduced in 2000 by International DOI Foundation
(IDF). Answer: C (Jorn Bargar)

125. ISO 26324: 2012 is a standard for ___. Notes: The term "weblog" was coined by Jorn Barger on
A. RFID in Libraries December 17, 1997.
B. DOI 130. Who has coined the term ‘blog’?
Library Info

Library Info
C. Dublin Core A. John Berger
D. Inter Library Transaction B. Peter Merholz
Answer: B (DOI) C. Michael Zeinne
D. David Weiner
126. Which of the following database programs is
used in DSpace? Answer: B (Peter Merholz)
A. PostgreSQL Notes: Peter Merholz, co-founder of ‘Adaptive Path’,
B. MSSQL has first coined the term ‘Blog’ in 1999. The term ‘Blog’
C. MySQL is a short form of ‘Weblog’.
D. None of the above
131. Who coined the term ‘Blogger’?
Answer: A (PostgreSQL) A. Evan Williams
127. ‘Dware-Dware Gyan Sampada’ is a ____. B. Jack Dorsey
A. Public Library Initiative C. Jorn Bargar
B. Digital Library Initiative D. Peter Merholz
C. UNESCO Initiative Answer: A (Evan Williams)
D. Institutional Repository
Notes: Evan Williams later popularized the term ‘Blog’
Answer: B (Digital Library Initiatives) and devised the term ‘blogger’.
Notes: Dware Dware Gyan Sampada is a mobile digital
132. A Blog usually provides:
library initiative of C-DAC, Noida.
a) a commentary on a particular subject.
128. Chitraksharika is a ___. b) a personal online diary.
A. An optical character recognition tool c) an online brand advertising of a
B. An image software particular individual or company.
C. An e-book reader d) an exclusive pre-paid publishing tool
D. None of the above and non-instructional and non-
Answer: A (An optical character recognition tool) illustrative resource for the scribes.

Notes: Chitraksharika ia an Optical Character A. a, b, and d are correct


Recognition for Devanagari Script developed by C- B. a, c and d are correct
DAC, Noida. C. a b, and c are correct
D. b and d are correct
129. The term ‘Weblog’ was coined by:
A. E. Williams Answer: C
B. Jack Dorsey
89 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: A weblog or blog is a listing of text, images, or D. Digital library is used by many at the same
other objects that are arranged in a chronological order time
that first started appearing in 1998. Blogs are often
maintained and run by a single individual, updated daily, Answer: C
or contain personal remarks about a topic, a personal 136. VuFind is the tool used for ___.
ramble, or an update on the person's life. A. Library Automation
133. Data mining is ___. B. Digital Library System
Library Info

Library Info
A. A technique for searching large scale databases C. Library Resource Discovery System
B. A database used for reporting D. Institutional Repository
C. A repository of an organization’s stored data Answer: C (Library Resource Discovery System)
D. The process of designing, building and
maintaining an organization’s database 137. Vufind is developed by __.
A. Oxford university
Answer: A (A technique for searching large scale B. Stanford University
database) C. University of Southampton
Notes: Data mining can be described as ‘specific D. Villanova University
analytic technique that examining large preexisting Answer: D (Villanova University)
databases in order to generate new information’.
Notes: VuFind is an open-source library search engine
134. Which among the following are common tasks that allows users to search and browse beyond the
involved in data mining process? resources of a traditional Online public access catalog
a) Anomaly detection (OPAC). VuFind was developed by Villanova
b) Clustering University and was initially released in July 2010.
c) Classification
d) Summarization 138. Which one of the following is NOT an open
A. a, b, and d are correct source discovery interface?
B. a, c and d are correct A. Blacklight
C. a b, and c are correct B. Vufind
D. All are correct C. eXtensible Catalog
D. Orchid
Answer: D (All are correct)
Answer: D (Orchid)
Notes: Data mining involves six common classes of
tasks: (i) Anomaly detection (ii) Association Rule Notes: VuFind is an open-source library resource
Learning (iii) Clustering (iv) Classification (v) discovery system that allows users to search and browse
Regression, and (vi) Summarization. beyond the resources of a traditional Online public
access catalog (OPAC). VuFind was developed
135. Which is not applicable to the Digital library? by Villanova University and was initially released in
A. Digital library is a logical extension of the July 2010.
traditional library
B. Digital library is a system that provides Blacklight, an open source discovery tool developed by
community of users with coherent access to University of Virginia in 2009.
a large repository of knowledge
C. Digital library is an organization that does eXtensible Catalog developed by the University of
not require the specialized staff Rochester River Campus Libraries, is an open source
90 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

system to provide easy access to all library resources, version came out in 1988 and its latest version is
both digital and non-digital. SLIM21.

139. Which of the following provides lossy 142. In a virtual library:


compression of images? A. There is no corresponding physical
A. GIF collection
B. JPEG B. Collection is available online as well as
C. PNG offline
Library Info

Library Info
D. MNG C. Collection is available online as well as print
form
Answer: B (JPEG) D. Collection is available on CD as well as
Notes: Joint Photographic Experts Group (JPEG), Print form
initially released in 1992, is a commonly used method Answer: A (There is no corresponding physical
of lossy compression for digital images, particularly for collection)
those images produced by digital photography The
degree of compression can be adjusted, allowing a 143. Virtual library is the output of __.
selectable tradeoff between storage size and image A. Virtual reality
quality. B. Computerization
C. Networking
140. Which of the following provides lossless D. Virtual efficiency
compression of images?
A. GIF Answer: A (Virtual reality)
B. JPEG
C. PNG Notes: Virtual Library refers to the scientifically
D. MNG managed collection of information resources and
services on site as well as off site that are available in a
Answer: C (PNG) virtual reality environment and accessible
electronically through the internet at any time from any
Notes: Portable Network Graphics (PNG) initially geographical location. Virtual Reality (VR) is an
released in 1996, is a raster-graphics file-format that illusive environment for the eyes, ears and other sense
supports lossless data compression. PNG was developed organs where user can experience the real world in an
as an improved, non-patented replacement for Graphics artificially created environment by the computer system.
Interchange Format (GIF). It is a state of real sensational feeling in an imaginary
141. Identify the odd one from the following: environment. The environment is so perfectly created
A. Koha and highly stimulated that one can experience just like a
B. Libsys real situation but with a full control over the
C. SLIM 21 environment. The virtual library is the output of
D. SOUL virtual reality, an illusive environment for the eyes in
which the user feels that as if he is moving inside the
Answer: A (Koha) library when he moves the mouse. When the user clicks
the book on a shelf, then the book floats from the shelf
Notes: SLIM (System for Library Information and opens up before him. The user can turn pages, copy
Management) is commercial ILS software developed by or make print the materials.
Algorithms Consultants Pvt. Ltd., Pune. The first
144. Systems study involves:

91 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Analysis only A. RRRLF


B. Analysis, evaluation and design B. The Asiatic Society of Mumbai
C. Analysis and design only C. Connemara Public Library, Chennai
D. Analysis and evaluation only D. National Library of India, Kolkata

Answer: B (Analysis, evaluation and design) Answer: B (The Asiatic Society of Mumbai)

145. When SOUL 2.0 was released? Notes: Asiatic Society of Mumbai launched its digital
Library Info

Library Info
A. January 2009 library initiative Granth Sanjeevani on 15 January 2018.
B. January 2010
C. July 2011 148. ‘Moodle’ is a __.
D. October 2012 A. OPAC
B. Library Management System
Answer: A (January 2009) C. Electronic Library System
D. Course Management System
Notes: Software for University Libraries (SOUL) is
an state-of-the-art integrated library management Answer: D (Course Management System)
software designed and developed by the INFLIBNET
Centre based on requirements of college and university Notes: Moodle is a free and open-source learning
libraries. The first version (SOUL 1.0) was released management system (LMS) written in PHP and
during CALIBER 2000. The latest version of the distributed under the GNU General Public License. It
software i.e. SOUL 2.0 was released in January 2009 was originally developed by Martin Dougiamas and the
and contains six modules: Acquisition, Cataloguing, first version released in August 2002.
Circulation, Serial Control, OPAC and Administration. 149. ‘Million Books on Web’ project was initiated
braries. This software works on the client server mode in by:
the windows environment using MS SQL server as back A. MIT, USA
end tool to store and retrieve data. network. INFLIBNET B. Pittsburg University
has established five service centres for SOUL in the C. Carnegie Mellon University
States at Mumbai, Patiala, Ahmedabad, Hyderabad D. Michigan University
and Bangalore.
Answer: C (Carnegie Mellon University)
146. The concept of Micro Photography was
developed by ___. Notes: The Million Book Project was a book
A. Johan Gutenberg digitization project led by Carnegie Mellon
B. Chester Cardson University from 2007–2008. Working with government
C. John Benjamin Dancer and research partners in India and China, the project
D. Ohi Battle scanned books in many languages, using OCR to enable
full text searching, and providing free-to-read access to
Answer: C (John Benjamin Dancer) the books on the web.
Notes: John Benjamin Dancer was a British scientific 150. In recent years people can approach government
instrument maker and inventor of microphotography- an departments or offices through internet and the
art of making photographs shrunk to microscopic scale. mechanism is known as:
He also pioneered stereography. A. E-Governance
147. Digital library initiative ‘ Granth Sanjeevani’ is B. E-Government
announced by: C. E-Commerce

92 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. E-Governing Body Answer: B (IaaS)

Answer: A (E-Governance) Notes: Hardware as a Service (HaaS) is the next form of


service available in cloud computing. Where SaaS
151. Audiotext services can be used for __. (Software as a Service) and PaaS (Platform as a Service)
A. Research papers are providing applications to customers, HaaS simply
B. Electronic Storage offers the hardware to its clients. Hardware as a service
C. Emails (HaaS) refers to managed services where computing
Library Info

Library Info
D. Horoscope power is leased from a central provider. This model is
Answer: D (Horoscope) similar to other service-based models, where users rent,
rather than purchase, a provider's tech assets HaaS is
Notes: Voice information services, also known as sometimes also called Infrastructure as a Service (IaaS).
audiotex or audiotext that uses a voice response
application permitting users to retrieve information over 155. In relation to DSpace, the full form of SWORD
the telephone. Audiotex is used to provide information is __.
that seldom changes or that must be available to large A. Smart Web Open Repository Deposit
number of callers. Examples of such messages include B. Simple Web Open Repository Deposit
time and temperature, travel directions, web addresses. C. Synchronous Web Open Repository Deposit
The service can be used for weather, horoscope, D. Simple Web Offering Repository Deposit
professional advice, fun chat etc. Answer: D (Simple Web Offering Repository Deposit)
152. The birth of virtual library happened at __. Notes: SWORD (Simple Web-service Offering
A. North America Repository Deposit) created in 2007, is
B. North Carolina an interoperability standard that allows digital
C. North India repositories to accept the deposit of content from
D. South Korea multiple sources in different formats.
Answer: B (North Carolina) 156. The term library automation generally
153. Which of the following Library Automation encompasses the computerization of __.
software is developed by Softlink? a) Bibliography compilation
A. Koha b) Acquisitions
B. E-Granthalaya c) Circulation
C. Alice d) Reference service
D. New Genlib
A. a and b are correct
Answer: C (Alice) B. a, c and d are correct
C. b, c and d are correct
Notes: Alice for Windows an integrated library D. b and c are correct
automation software package, developed in 1983, is the
product of Softlink, established in Brisbane, Australia. Answer: D

154. The other name of HaaS is: 157. Which of the following is a digital library
A. SaaS software used to create an in-house digital library?
B. IaaS A. LibSys
C. PaaS B. Greenstone
D. Web 2.0 C. Alice for Windows
93 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. SOUL B. Peter Merholz


C. Chester Cardson
Answer: B (Greenstone) D. John Benjamin Dancer
Notes: Greenstone is a suite of software tools for Answer: A (Doug Cutting)
building and distributing digital library collections on
the Internet or CD-ROM. It is open-source, multilingual Notes: Apache Lucene is a free and open-source
software, issued under the terms of the GNU General information retrieval software library, originally written
Library Info

Library Info
Public License. Greenstone is produced by the New completely in Java by Doug Cutting in 1999. It is
Zealand Digital Library Project at the University of supported by the Apache Software Foundation and is
Waikato. released under the Apache Software License.

158. Which one of these metadata sets is NOT 161. A repeater in a communication network helps a
predefined in GSDL? weakened or corrupted signal to:
A. Dublin Core A. Amplify
B. PREMIS B. Regenerate
C. RFC 1807 C. Resample
D. NZGLS D. Reroute

Answer: B (PREMIS) Answer: B (Regenerate)

Notes: GSDL allows several predefined Metadata Sets Notes: A repeater work in the physical layer. It takes the
such as: Dubline Core, RFC 1807, NZGLS (New weakened, corrupted signal and regenerates the signal bit
Zealand Government Locator Service), AGLS by bit.
(Australian Government Locator Service). All metadata
are stored in XML format with the documents. 162. Arrange the following e-book sites in reverse
chronological order of their origin:
159. Which search engine is used in KOHA? a) Google Books
b) Hathi Trust Digital Library
A. Lucene
c) Internet Archive
B. Solr d) Open Library
C. Zebra
D. Star A. (b), (a), (c) and (d)
B. (c), (a), (d), and (b)
Answer: C (Zebra)
C. (c), (d), (b) and (a)
Notes: Zebra is a high-performance, general-purpose D. (d), (a), (b) and (c)
structured text indexing and retrieval engine. It reads
Answer: B
structured records in a variety of input formats (eg.
email, XML, MARC) and allows access to them through Notes: Internet Archive (1996); Google Books (2004);
exact boolean search expressions. Zebra is free software, Open Library (2006); Hathi Trust Digital Library (2008)
available under the GPL license. It supports large
databases and data stored in Zebra can be accessed 163. Hathi Trust Digital Library is founded in __.
through Z39.50 clients. A. 2007
B. 2008
160. Lucene-full text information retrieval software C. 2009
was originally developed by: D. 2010
A. Doug Cutting

94 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: B (2008) 168. Which one of the following List options is not
available in Koha?
Notes: HathiTrust was founded in October 2008 by the A. Direct List
thirteen universities of the Committee on Institutional B. Public List
Cooperation and the University of California. C. Private List
D. Open List
164. Which digital project is intended to ‘one web
page for every book ever published’? Answer: A (Direct List)
Library Info

Library Info
A. Open Library
B. Internet Archive 169. Which is/are not true about NDLTD?
C. Hathi Trust Digital Library a) It is a Digital Library of Thesis and
D. None of the above Dissertations.
b) It supports federated search facility
Answer: A (Open Library) c) It also provide a browsing interface
separately
Notes: Open Library launched in 2006 by Internet
Archive, is an online project of digital library index, d) Browsing interface contain Index and
intended to create "one web page for every book ever Abstracts only
published"
A. a, and d are correct
165. DOAB stands for __. B. b and c are correct
A. Database of Open Access Books C. b, c and d are correct
B. Directory of Open Access Books D. d only
C. Database of Online Available Books
Answer: D
D. Directory of Online Available Books

Answer: B (Directory of Open Access Books) Notes: The Networked Digital Library of Theses and
Dissertations (NDLTD) established in 1996, is a
166. DSpace is basically an open source software collaborative effort of universities around the world to
available under __. promote creating, archiving, distributing and accessing
A. GNU/GPL distribution licence Electronic Theses and Dissertations (ETDs). Since 1998,
B. New York software distribution licence an annual symposium on ETD is being organized. The
C. Berkeley software distribution licence 22nd ETD 2019 symposium will be held in Porto,
D. MIT software distribution licence Portugal, 6-8 November, 2019 with the theme ‘Fruits of
Knowledge’.
Answer: C (Berkeley Software Distribution (BSD)
Licence) 170. Which of the following sets are exclusive
examples of union catalogue of ETD database?
167. Which of the following format is not supported a) NDLTD and IndCat
in DSpace? b) NDLTD and Vidyanidhi
A. .dvi c) Shodhganga and WorldCat
B. .tex d) Shodhganga and OATD
C. .djvu A. a and b are correct
D. .fm B. b and d are correct
C. b, c and d are correct
Answer: C (.djvu)
D. b and c are correct

95 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: B Answer: D (All are correct)

Notes: Vidyanidhi (Meaning 'Treasure of Knowledge' in Notes: The five V's of Big Data are: Velocity, Volume,
Sanskrit) is a digital library initiative to facilitate the Value, Variety, and Veracity.
creation, archiving and accessing of doctoral theses.
Developed and maintained at University of Mysore, 174. Which ‘‘V’’ of Big Data is concerned with the
Mysore since 2000 with the initial support of NISSAT. usefulness of data?
A. Velocity
Library Info

Library Info
OATD – Open Access Theses and Dissertations by B. Variety
OATD.org C. Veracity
D. Value
171. Who among the following is related to NDLTD?
A. Chester Carlson Answer: D (Value)
B. Brewster Kahle
C. Michael S. Hart 175. Hadoop – a software framework for storage and
D. Edward Fox processing of very large data sets are developed
by __.
Answer: D (Edward Fox) A. Apache Software Foundation
B. IBM
Notes: Edward Fox serves as Executive Director and C. Microsoft Corporation
Chairman of the Board for NDLTD. D. NISO
172. The large volumes of high velocity, complex Answer: A (Apache Software Foundation)
and variable data are termed as:
A. Big data Notes: Apache Hadoop first released in April 2006 is
B. Linked data an open source software framework for distributed
C. Semantic data storage and processing of big data using the
D. Ontology-based data MapReduce programming model.

Answer: A (Big data) 176. Who among the following has the world’s
largest Hadoop clusters?
Notes: Big data is an evolving term that describes A. Facebook
a large volume of structured, semi-structured and B. Datamatics
unstructured data that has the potential to be mined for C. Apple
information and used in machine learning projects and D. None of the above
other advanced analytics applications.
Answer: A (Facebook)
173. Which among the following are the
characteristics of Big data? Notes: Facebook has many Hadoop clusters, the largest
a) Volume among them is the one that is used for Data
b) Variety warehousing.
c) Velocity
d) Veracity 177. Identify from the following the Silver Halide
A. a, b, and d are correct process used in reprography :
B. b and c are correct a) Exposure
C. b, c and d are correct b) Miniature
D. All are correct c) Developing
d) Rinsing
96 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. a and b are correct D. 2008


B. a, c and d are correct
C. b, c and d are correct Answer: B (2006)
D. b and c are correct
Notes: Twitter was created by Jack Dorsey, Noah
Answer: B Glass, Biz Stone, and Evan Williams in March 2006 and
launched in July 2006. It was founded in California,
178. Identify from the following, the digital United States.
Library Info

Library Info
library projects were implemented by C-DAC
182. How many characters are now allowed in a
(Agency) Noida : single tweet?
a) Creation of Vidwan database A. 140
b) Print your own book – Mobile Digital B. 160
Library C. 240
c) Creation of Shodhsindhu D. 280
d) Creation of Digital Library of Books in
President House Answer: D (280)
A. a and b are correct
B. a, c and d are correct Notes: Tweets were originally restricted to 140
characters, but on November 7, 2017, this limit was
C. b, and d are correct
doubled (280 characters) for all languages except
D. b and c are correct Chinese, Japanese, and Korean.
Answer: C
183. Instagram was originally developed by:
A. Tim Berners Lee
179. Green Stone-3, multilingual, multiplatform and
B. Mark Zuckerberg
highly configurable digital software is written in:
C. Kevin Systrom and Mike Krieger
A. JAVA
D. Andrew McCollum and Dustin Moskovitz
B. C++
C. COBOL
Answer: C (Kevin Systrom and Mike Krieger)
D. BASIC
Notes: Instagram is a photo and video-sharing social
Answer: A (JAVA)
networking service owned by Facebook, Inc. It was
created by Kevin Systrom and Mike Krieger, and
180. Which of the following is an example of
launched in October 2010. In April 2012, Facebook
Microblogging ?
acquired Instagram.
A. Word Press
B. Blog spot
184. ‘Instagram’ is acquired by __.
C. Live Journal
D. Twitter A. Whatsapp
B. Yahoo
Answer: D (Twitter) C. Facebook
D. Google
Notes: Microblogging is a web service that allows the
subscriber to broadcast short messages to other Answer: C (Facebook)
subscribers of the service. Examples of Microblogging
sites are: Tumblr, Twitter, Friendfeed, Plurk. Notes: Instagram, owned by Facebook and created by
Kevin Systrom and Mike Krieger, launched in October
181. Twitter was launched in ___. 2010.
A. 2005
B. 2006
C. 2007
97 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

185. ‘Instagram’ was acquired by Facebook in the launched in 2007. However the company Google Inc.
year: (Now Google LLC since 2017) was founded in
A. 2008 September 1998 and headquartered in California, United
B. 2010
States.
C. 2012
D. 2014 189. Google Scholar was first launched in __.
A. 2004
Answer: C (2012) B. 2005
Library Info

Library Info
C. 2006
186. Telegram software was first released in __. D. 2007
A. 2011
B. 2013 Answer: A (2004)
C. 2015
D. 2016 Notes: Google Scholar is a freely accessible web search
engine that indexes the full text or metadata of scholarly
Answer: B (2013) literature across an array of publishing formats and
disciplines. It was first launched on 20th November 2004.
Notes: Telegram, a cloud-based instant
messaging and voice over IP service was developed by 190. Ray Kurzweil, an American inventor is related
two brothers Nikolai Durov and Pavel Durov. Written in to:
C++, it was initially released in August 2013 under GNU A. Computer Programming language
GPL License. The company Telegram LLC is based in B. URL
London. C. OCR
D. None of the above
187. Facebook was first launched in the year __.
Answer: C (OCR)
A. 2003
B. 2004 Notes: Raymond Kurzweil is involved in fields such
C. 2005 as optical character recognition (OCR), text-to-speech
D. 2006 synthesis, speech recognition technology, and electronic
keyboard instruments. In 1974, Kurzweil founded
Answer: B (2004) Kurzweil Computer Products, Inc. and led development
Notes: Facebook is a California based social networking of the first omni-font optical character recognition
service company. It was developed by Mark system, a computer program capable of recognizing text
Zuckerberg and his friends and first launched in written in any normal font.
February 2004.
191. Kurzweil Data Entry Machine (KDEM) is
188. Google Search engine was developed in __. meant:
A. 1997 A. to produce texts for visually impaired
B. 1996 B. to design digital project for all
C. 1998 C. to retrieve information for all.
D. 1999 D. to design information product for all

Answer: A (1997) Answer: A (to produce texts for visually impaired)

Notes: Google search engine was originally developed Notes: Raymond Kurzweil invented the Kurzweil Data
as a research project by Larry Page, Sergey Brin, Entry Machine (KDEM) in 1977. It is an OCR machine
and Scott Hassan of Stanford University. It was first
98 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

that works as an input device to produce texts for the Answer: D (Subfield indicators)
blinds.
196. A situation where a digital resource is no
192. DOAJ (Directory of Open Access Journals) was longer readable is called:
initially set up at ___. A. Digital divide
A. Stanford University B. Digital Representation
B. Oxford University C. Digital Rendering
C. Lund University D. Digital Obsolescence
Library Info

Library Info
D. Cambridge University
Answer: D (Digital Obsolescence)
Answer: C (Lund University)
Notes: Digital obsolescence is a situation where a
Notes: The Directory of Open Access Journals (DOAJ) digital resource is no longer readable because of its
is a website that hosts a community-curated list of open archaic (old) format: the physical media, the reader
access journals, maintained by Infrastructure Services (required to read the media), the hardware, or the
for Open Access (IS4OA). It was initially started in 2003 software that runs on it is no longer available.
at Lund University. Infrastructure Services for Open
197. EUAL stands for ___.
Access (IS4OA) took over the maintenance of DOAJ in
A. E-monitoring library for Academics
2013.
B. End User Logistics Association
C. Electronic Usage of Library Acquisitions
193. A University providing Open Access to D. End User License Agreement
Sanskrit dissertations through Internet:
A. Jawaharlal Nehru University Answer: D (End User License Agreement)
B. Delhi University
C. University of Calcutta Notes: In proprietary software, an end-user license
D. University of Madras agreement (EULA) or software license agreement is
the contract between the licensor and purchaser,
Answer: B (Delhi University) establishing the purchaser's right to use the software.

194. To make a program safe, one should take 198. Semantic Web is based on which of the
care of: following:
A. Strong authentication and access a) RDF
controls b) Ontologies
B. Error checking controls c) URI
C. Do risk analysis d) Cloud seeding
D. Vendor’s credibility A. a and b are correct
B. a, b and d are correct
Answer: A (Strong authentication and access C. c and d are correct
controls) D. a, b, and c are correct

195. In CDS/ISIS ‘delimiters’ means: Answer: D


A. Field address
B. Field repeatability Notes: The Semantic Web is an extension of the World
C. Field format Wide Web through standards by the World Wide Web
Consortium (W3C).The standards promote common
D. Subfield indicators
data formats and exchange protocols on the Web, most
99 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

fundamentally the Resource Description Framework Answer: D


(RDF). According to the W3C, "The Semantic Web
provides a common framework that allows data to be Notes: Web 2.0 is the name used to describe the second
shared and reused across application, enterprise, and generation of the World Wide Web, where it moved
community boundaries". The term was first coined by from static HTML pages to a more interactive and
Tim Berners Lee for a Web of Data that can be dynamic web experience. Web 2.0 is focused on the
processed by machine. ability for people to collaborate and share information
online via social media, blogging and Web-based
Library Info

Library Info
Cloud seeding, often called weather modification, is a communities. It promoted user generated content and
scientific process intended to enhance rain and snow, participatory culture by making Web as an interactive
reduce hail damage, and alleviate fog. The technique that experience rather one-way conversation as in the past.
uses dry ice, silver iodide and salts to enhance ice crystal The term "Web 2.0" was coined by Darcy DiNucci in
formation in clouds for artificial rain. her article ‘Fragmented Future’ published in January
1999 and later popularized by Tim O'Reilly and Dale
199. Which of the following are the Semantic Web Dougherty. Examples of the types of Web 2.0 tools
technologies? include: Social networking sites (eg. Facebook,
LinkedIn); Blogs (eg. Wordpress); Microblogs (eg.
a) SKOS Twitter); Wikis (eg. MediaWiki and PBworks); Social
b) AJAX
bookmarks/tags (e.g. Delicious and Diigo); Media
c) SPARQL
d) UTF Sharing tools (e.g. YouTube and Flickr); Web-based
A. a and b are correct Office tools (e.g. Google Apps’s documents,
B. a, b and d are correct presentations, calendar); Enterprise social network
C. c and d are correct system (ESN) (e.g. Yammer, Jive).
D. a, and c are correct
201. Which one of the following is NOT a
bookmarking website?
Answer: D
A. Delicious.com
Notes: The term ‘semantic web’ refers to W3C’s vision B. Netvouz.com
of the web of linked data. Semantic Web technologies C. Diigo.com
enable people to create data stores on the web, build D. Revish.com
vocabularies, and write rules for handling data. Linked
Answer: D (Revish.com)
data are empowered by technologies such as RDF,
SPARQL (an RDF query language), OWL (Web Notes: Delicious, founded by Joshua Schachter and
Ontology Language), and SKOS (Simple Knowledge Peter Gadjokov in 2003 and acquired by Yahoo! in
Organization System). 2005, was a social bookmarking web service for
storing, sharing, and discovering web bookmarks.
200. Which of the following are not web 2.0 Tools?
a) Ontologies Netvouz is a social bookmarking service that allows to
b) Facebook save favorite links online and access them from
c) Intelligent Web anywhere.
d) RSS Feeds
Diigo, first launched in 2006, is a social bookmarking
A. a and b are correct
website that allows signed-up users to bookmark and tag
B. a, b and d are correct
Web pages.
C. c and d are correct
D. a, and c are correct
100 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

202. Arrange the following social networking tools open-source wiki software which allows users to create
according to their year of launching in ascending and collaboratively edit "pages" or entries via a web
order: browser. . It was developed for use on Wikipedia in
a) Twitter 2002, and given the name "MediaWiki" in 2003.
b) Facebook
c) LinkdIn 205. Who among the following is the developer of
d) Pinterest PBworks – collaborative editing software?
A. Chester Cardson
Library Info

Library Info
A. (d), (c), (b) and (a)
B. (c), (a), (d), and (b) B. Ohi Battle
C. (c), (b), (a) and (d) C. David Weekly
D. (d), (a), (b) and (c) D. Lee Daniel Crocker

Answer: C Answer: C (David Weekly)

Notes: LinkedIn (2003); Facebook (2004); Twitter Notes: PBworks is a commercial real-time collaborative
(2006); Pinterest (2010). editing system used for the creation of Wikis, developed
by David Weekly in 2005.
203. RSS Feed was first created by __.
A. Dan Libby and Ramanathan V. Guha 206. Which of the following are the advantages of
B. Alois Senefelder and Jack Dorsey RFID technology in libraries?
C. Peter Merholz and E. Williams a) Tags can be read inside a case.
D. None of the above b) Hundred of tags can be read at a time
c) Cheaper than Barcode
Answer: A (Dan Libby and Ramanathan V. Guha) d) More security and Privacy
A. a and b are correct
Notes: RSS (originally RDF Site Summary; later, two B. a, b and d are correct
competing approaches emerged, which used the C. c and d are correct
acronyms Rich Site Summary and Really Simple D. a, and c are correct
Syndication respectively) is a type of web feed which
allows users and applications to access updates to Answer: A
websites in a standardized, computer-readable format.
These feeds can allow a user to keep track of many 207. Which of the following are limitations of digital
different websites in a single news aggregator. RDF Site libraries?
Summary, the first version of RSS, was created by Dan a) Full text searching
Libby and Ramanathan V. Guha at Netscape in March b) Operational searching
1999. c) Rights management
d) Hyper text linking
204. Mediawiki is developed by __. A. a and b are correct
A. Magnus Manske and Lee Daniel Crocker B. a, b and d are correct
B. David Weekly and Ramit Sethi C. c and d are correct
C. Ohi Battle and Chester Cardson D. b, and c are correct
D. None of the above
Answer: D
Answer: A (Magnus Manske and Lee Daniel Crocker)
208. Which of the following web resource for LIS
Notes: MediaWiki, developed by Magnus Manske has been compiled by academic librarians of
and improved by Lee Daniel Crocker, is a free and universities of California?
101 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Infomine 212. The distinct characteristic(s) of digital objects


B. Internet Public Library are:
C. Internet Library for Librarians A. Physical Medium
D. Current Informed Librarian B. Logical process
C. Conceptual recognition
Answer: A D. All the above
Notes: Selected and maintained by librarians from Answer: D (All the above)
Library Info

Library Info
several California universities, INFOMINE is a catalog
of over 100,000 scholarly web resources. The project 213. ‘Pi’ is the e-book reading device by __.
started in 1994. A. Amazon
B. Sony
209. What is/are common feature/s between RFID & C. Infibeam
Barcode Technology? D. Nokia
a) Read more than one item at a time
b) Able to locate specific items on shelves Answer: C (Infibeam)
c) Programmable
d) Read while item is moving Notes: Infibeam, founded by Vishal Mehta in 2007, is
A. a and b are correct an online retailer for books, electronics, and automobiles
B. a, b and d are correct in India. In 2010, Infibeam launched ‘Pi’, India’s first e-
C. c and d are correct book reader.
D. All the above are correct 214. Kindle is the e-book reading device by _.
Answer: D A. Amazon
B. Sony
210. Report on ‘the development of digital libraries C. Infibeam
of the past decade’ is categorized as: D. Apple
A. Review Report
B. Trend Report Answer: A (Amazon)
C. Research Report Notes: Kindle is a series of e-readers designed and
D. State of the art report marketed by Amazon and was first launched in
Answer: B (Trend Report) November 2007.

211. Digital library function incorporate: 215. Which format is not used by e-book reader?
a) Creating and capturing A. BRF
b) Storage and management B. EPUB
c) Search and access C. PDF
d) Abstracting and reviewing D. RTF

Answer: A (BRF)
A. a and b are correct
B. a, b and c are correct Notes: Braille Ready Format (BRF) is ASCII text files
C. c and d are correct that represent finished braille pages.
D. b, and c are correct
216. Registry of Open Access Repositories (ROAR)
Answer: B is funded by:
A. ISO
102 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. JISC 220. What are the standardized encoding modes used


C. UNESCO in QR Code?
D. OCLC a) Numeric
b) Alphanumeric
Answer: B (JISC) c) Byte/binary
Notes: The Registry of Open Access Repositories d) Kanji
(ROAR) is a searchable international database indexing A. a, b and d are correct
Library Info

Library Info
the creation, location and growth of open access B. a, b and c are correct
institutional repositories and their contents. ROAR was C. b, c and d are correct
created by EPrints at University of Southampton, UK, D. a, b, c, and d are correct
in 2003 with funding from JISC (Joint Information Answer: D
Systems Committee). It began as the Institutional
Archives Registry and was renamed Registry of Open Notes: The QR code system was invented in 1994 by the
Access Repositories in 2006. Japanese company Denso Wave. A QR code uses four
standardized encoding modes (numeric, alphanumeric,
217. ROARMAP stands for ___. byte/binary, and kanji) to store data efficiently.
A. Registry of Open Access Repository
Mandates and Policies 221. SQRC stands for __.
B. Registry of Open Archives Repository A. Small Quick Response Code
Mission and Policies B. Single Quick Response Code
C. Registration of Online Archives & C. Secure Quick Response Code
Repository Mission and Policies D. None of the above
D. None of the above
Answer: C (Secure Quick Response Code)
Answer: A (Registry of Open Access Repository
Mandates and Policies) Notes: SQRC is a type of QR Code equipped with
reading restricting function. This can be used to store
218. Which type of Barcode is used in QR code? private information and to manage company's internal
A. One dimensional information.
B. Two dimensional
C. Three dimensional 222. Which among the following are the features of
D. None of the above SQRC?
A. Locking up of encoded data
Answer: B (Two dimensional) B. Composite of public and private data
C. Appearance and apparent properties of regular
219. QR Code stands for ___. QR Code retained
A. Quick Registration Code D. All the above
B. Quick Response Code
C. Quality Readable Code Answer: D (All the above)
D. Quick & Readymade Code
223. How many correction levels are available with
Answer: B (Quick Response Code) QR Code?
A. 3
Notes: Quick Response Code (QR Code) is a type B. 4
of matrix barcode (or two-dimensional barcode) first C. 5
designed in 1994 in Japan. D. 6
103 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Answer: B (4) (Reed-Solomon code). The position detection patterns


are arranged at three corners of the QR codes. The
Notes: There are 4 error correction levels used for QR position of QR code is detected with the position
codes, with each one adding different amounts of detection patterns that allow high-speed reading.
“backup” data depending on how much damage the QR
code is expected to suffer in its intended environment. However, Micro QR code was standardized as JIS-X-
Level L (low) – up to 7% damage; Level M (Medium) – 0510 in 2004 and has only one position detection
up to 15% damage; Level Q (Quartile) – up to 25% pattern.
Library Info

Library Info
damage; and Level H (High)– up to 30% damage.
227. ISO/IEC 18004: 2000 is the international
224. Version 40 of QR code have which level of error standard for developing __.
correction? A. QR code
A. Level L B. Biometric
B. Level M C. MARC
C. Level Q D. Bibliographic record
D. Level H
Answer: A (QR code)
Answer: A (Level L)
228. Reed-Solomon Codes that are used for error
225. Version 40 QR code contains how many correcting in QR Codes were first introduced in
characters? ___.
A. 57x57 A. 1959
B. 117x117 B. 1960
C. 117x177 C. 1961
D. 177x177 D. 1962

Answer: D (177x177) Answer: B (1960)

226. Position Detection pattern are arranged at __ Notes: Reed–Solomon codes are a group of error-
corners of the QR code. correcting codes that were introduced by Irving S.
A. 1 Reed and Gustave Solomon in 1960. There are two basic
B. 2 types of Reed–Solomon codes, original view
C. 3 and BCH view.
D. 4
229. Who among the following is credited to invent
Answer: C (3) biometric technology?
A. Norman Joseph Woodland
Notes: QR code (Quick response code) is a matrix 2D B. Bernard Silver
code for high-speed reading developed by DENSO C. Sir William Herschel
WAVE in 1994. It was registered to the ITS standard of D. Denso Wave
the AIMI in 1997 and to ISO/IEC standards in 2000.
The smallest element (black or white square) of the QR Answer: C (Sir William Herschel)
code is called “a module”. A QR code is composed of a
combination of black and white modules, position Notes: Sir William Herschel is credited to first devise
detection patterns, timing patterns, and used the fingerprint technology while working as a
format information that contains error correction level magistrate in Bengal (India) in around 1858.
and mask numbers, data area and error correction code 230. SMAC stands for __.
104 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Social, mobile, analytics and cloud Notes: Launched in 2009, the World Digital Library
B. Simple Machine Automated Code (WDL) was a project of the U.S. Library of Congress,
C. Simple Mobile Automation Code with the support of UNESCO. The WDL repository
D. Social Machine Automated Code sought to preserve and share some of the world’s most
important cultural objects, increasing access to cultural
Answer: A (Social, mobile, analytics and Cloud) treasures and significant historical documents to enable
discovery, scholarship, and use.
Notes: SMAC (social, mobile, analytics and cloud) is the
Library Info

Library Info
concept that the convergence of four technologies is 234. What is the tagline of W3C?
currently driving business innovation. A. Connecting people through web
B. Search smarter
231. The World Wide Web Consortium (W3C) - the
main international standards organization for C. Leading the web to its full potential
the World Wide Web was founded by: D. Secure and free web accessibility
A. Paul Zurkowski Answer: C (Leading the web to its full potential)
B. Michael Casey
C. Tim Berners Lee 235. Which of the following are the criteria for
D. Mark Zuckerberg defined open standard in W3C (2006)?
a) Transparency and impartiality
Answer: C (Tim Berners Lee) b) Maintenance and Relevance
232. Who among the following have given the c) Availability and Openness
concept of ‘Library 2.0’? d) Security and Preservation
A. a and b are correct
A. Paul Zurkowski
B. a, b and d are correct
B. Michael Casey
C. Tim Berners Lee C. c and d are correct
D. Mark Zuckerberg D. a, b, and c are correct

Answer: D
Answer: B (Michael Casey)

Notes: ‘Library 2.0’ is a term coined by Michael Casey 236. Which technique allows embedding of a visible
or invisible copyright notices or other verification
on his LibrayCrunch blog. ‘Library 2.0’ can be defined
messages in digital documents?
as ‘the application of interactive, collaborative, and
multi-media web-based technologies to web-based A. Digital embargo
library services and collections’. The focus is on user- B. Digital Document protecting
centered change and participation in the creation of C. Digital watermarking
D. Digital clipboarding
content and community.

233. World Digital Library (WDL) was launched in Answer: C (Digital Watermarking)
the year __. Notes: Digital Watermarking is the technique of
A. 2007 embedding some identification information known as
B. 2009 watermark into the digital data by its owner. Digital
C. 2011 Watermarking can be used as a tool for discovering
D. 2012 unauthorized data reuse and also for copyright
Answer: B (2009) protection.

105 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

237. Which among the following institutions are 239. Which language is used for developing RDF?
related with the development of E-prints digital A. RDF/HTML
repository software? B. HTML/RDF
A. MIT Library C. RDF/SGM
B. Stanford University D. RDF/XML
C. University of Waikato
D. University of Southampton Answer: D (RDF/XML)
Library Info

Library Info
Answer: D (University of Southampton) Notes: RDF documents are written in XML. The XML
language used by RDF is called RDF/XML.
Notes: EPrints is free and open-source software for
building open access of scientific journals. EPrints has 240. RDFS (Resource Description Framework
been developed at the University of Southampton Schema) was first published in __.
School of Electronics and Computer Science in 2000 and A. 1998
released under a GPL license. B. 1999
C. 2000
238. Resource Description Framework (RDF) D. 2005
consists which of the following?
a) Subject Answer: A (1998)
b) Thread Notes: RDFS (Resource Description Framework
c) Predicate Schema) is a set of classes with certain properties using
d) Object the RDF extensible knowledge representation data
model, providing basic elements for the description
A. a, b, and c are correct of ontologies. The first version was published by the
B. c, b and d are correct World-Wide Web Consortium (W3C) in April 1998, and
C. a, c, and d are correct the final W3C recommendation was released in February
D. c, a and b are correct 2004.
Answer: C 241. Ontology is __.
Notes: The RDF data model is similar to classical A. Indexing method
conceptual modeling approaches (such as entity– B. Classification of digital information
relationship). It is based on the idea of C. Cataloguing of internet-based documents
making statements about resources (in particular web D. Documentation service
resources) in the form of expressions i.e. subject– Answer: B (Classification of digital information)
predicate–object, known as triples. The subject denotes
the resource, and the predicate denotes traits or aspects 242. 'Z39.50' refers to the International Standard __.
of the resource, and expresses a relationship between A. ISO 23950
the subject and the object. The Resource Description B. ISO 9960
Framework (RDF) is a family of World Wide Web C. ISO 26324
Consortium (W3C) specifications originally designed as D. ISO 2788
a metadata data model in 1997. RDF was adopted as a
W3C recommendation in 1999. The RDF 1.0 Answer: A (ISO 23950)
specification was published in 2004, the RDF 1.1
243. OWL stands for ___.
specification in 2014.
A. Web Ontology Language
B. Online Website Language
106 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. Onsite Wide Language A. Dries Buytaert


D. Ontology Website Language B. Dean Allen
C. Chester Cardson
Answer: A (Web Ontology Language) D. Ohi Battle
Notes: The Web Ontology Language (OWL) is a family Answer: B (Dean Allen)
of knowledge representation languages for authoring
ontologies. OWL is built upon the RDF and RDFS - Notes: Textpattern is a free and open-source content
Library Info

Library Info
the World Wide Web Consortium's (W3C) standard for management system based on PHP and MySQL,
objects. OWL and OWL 2 were released as W3C originally developed by Dean Allen and now developed
specifications in the year 2004 and 2009 respectively. by Team Textpattern. It was initially released in 2003.
Furthermore, TextDrive – an online hosting service was
244. Which among the following W3C standards are founded in 2004 by Dean Allen.
related with RDF?
a) RDFS 247. Concrete5 – an open source Content
b) RIF Management System is published under __.
c) OWL A. BSD License
d) RAF B. MIT License
A. a, b and d are correct C. GPL License
B. a, b and c are correct D. Apache License
C. b, c and d are correct
D. a, b, c, and d are correct Answer: B (MIT License)

Answer: B Notes: Concrete5 is an open-source content


management system (CMS), developed on PHP, for
Notes: The Rule Interchange Format (RIF) is a W3C publishing content on the World Wide Web and
Recommendation. RIF is part of the infrastructure for intranets. It is released under MIT License.
the semantic web, along with SPARQL, RDF, RDFS
and OWL. RIF became a W3C Recommendation on 248. Kentico is a ___.
June 22, 2010. A. Content Management System
B. Library Management System
245. Which of the following are free and open source C. Document Management System
Content Management Systems? D. Reference Management System
a) Text Pattern
b) Concrete 5 Answer: A (Content Management System)
c) Content Verse
Notes: Kentico is a proprietary Web Content
d) Kentico Management System developed on ASP.NET. It is
developed by Kentico Software Company which was
A. a, b, and c are correct founded by Petr Palas in 2004.
B. c, b and d are correct
C. a, and b are correct 249. Contentverse is a __.
D. b and c are correct A. Database Management System
B. Library Management System
Answer: C C. Document Management System
246. ‘Textpattern’ an open source CMS was D. Reference Management System
originally developed by: Answer: C (Document Management System)
107 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Notes: Contentverse is a proprietary document 253. Select the correct combinations:


management system or CMS designed by Computhink, a) Joomla – Open Source Matters
Inc. for use in businesses. The software was originally b) Drupal – Dries Buytaert
released in 1998 as The Paperless Office and rebranded c) Thunder – Hubert Burda Media
in 2013 as Contentverse. d) Textpattern – Dean Allen
A. a, b, and c are correct
250. WordPress- a Content Management System was B. c, and d are correct
first released in __.
Library Info

Library Info
C. a, and b are correct
a) 2002 D. a, b, c, and d are correct
b) 2003
c) 2004 Answer: D
d) 2005
Notes: All the following are Content Management
Answer: B (2003) Systems (CMS): Joomla (Open Source Matters, 2005);
Drupal (Dries Buytaert, 2000); Thunder (Hubert Burda
Notes: WordPress is a free and open-source content Media, 2016) ; Textpattern (Dean Allen, 2003)
management system (CMS) based on PHP & MySQL.
WordPress was released on May 27, 2003, by its 254. The credit to develop the first ‘wiki’ goes to:
founders, Matt Mullenweg and Mike Little of WordPress A. Ward Cunningham
Foundation. B. Dries Buytaert
C. Johan Gutenberg
251. Who among the following is related with Drupal D. Chester Cardson
development?
A. Dries Buytaert Answer: A (Ward Cunningham)
B. Johan Gutenberg
C. Chester Cardson Notes: Ward Cunningham is an American computer
D. Ohi Battle programmer who developed the first wiki. He started
programming the software WikiWikiWeb in 1994 and
Answer: A (Dries Buytaert) installed it on the website of the software consultancy
Cunningham & Cunningham (c2.com). He has authored
Notes: Drupal is a free and open-source content a book about wikis, titled The Wiki Way.
management system written in PHP and distributed
under the GNU General Public License. It was originally 255. ‘Wikipedia’ owned by the non-profit ‘Wikipedia
written by Dries Buytaert and released in 2000. Foundation’ was launched on January 15, 2001
by:
252. Joomla is developed by __. A. Jimmy wells and Larry Sanger
A. Open Source Matters, Inc. B. Jimmy Wells and Vincent J. Aceto
B. International Standard Organization (ISO) C. Larry Sanger and W. Kathy
C. World Wide Web Consortium D. William A. Ford and W. Kathy
D. UNESCO
Answer: A (Jimmy Wells and Larry Sanger)
Answer: A (Open Source Matters, Inc.)
256. Reid Hoffman is related to the development of
Notes: Joomla! written in PHP, is a free and open- which among the following:
source content management system (CMS) for A. Facebook
publishing web content, developed by Open Source B. Linkedin
Matters, Inc. and first released in 2005. C. MySpace
108 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

D. Tumblr 260. A virtual library __.


a) Presupposes a physical existence
Answer: B (Linkedin) b) Collection of resources available on one or
Notes: Linkedin was founded on December 28, 2002, more computer systems with a single
and launched on May 5, 2003 by Reid Hoffman and his interface or entry point to the collection
c) Does not provide access to entire content of
friends. It is mainly used for professional networking.
a (digital) library via internet
257. ‘Anukriti’ is a __.
Library Info

Library Info
d) Provides user assistance services such as
A. Bibliographic India website reference, inter library loan, etc.
B. Indexing India website
C. Translating India website A. a, b, and c are correct
D. Abstracting India website B. b and d are correct
C. a, c, and d are correct
Answer: C (Translating India website) D. a and b are correct
Notes: ‘Anukriti’ a Translating India website is the Answer: B
outcome of collaboration among Central Institute of
Indian Languages, Mysore, Sahitya Akademi and 261. MySpace was founded in __.
National Book Trust, New Delhi. A. 2002
B. 2003
258. ‘Ambra’ an innovative open source platform (for C. 2004
publishing open access resource articles) is D. 2005
developed by:
A. OCLC Answer: B (2003)
B. DOAJ
C. PLOS Notes: MySpace is a California based Socia Networking
website founded in 2003.
D. WDL

Answer: C (PLOS) 262. Chester Carlson is related to __.


A. E-book
Notes: Ambra is an innovative Open Source platform for B. NDLTD
publishing Open Access research articles. It was C. Internet Archive
developed by PLOS (Public Library of Science) and is D. Xerox Copier
licensed under the MIT License.
Answer: D (Xerox Copier)
259. Identify the key salient traits of soft data:
a) Human intelligence Notes: Chester Floyd Carlson was an American
b) Certain and definite physicist who is best known for having invented the
process of electrophotography/xerography.
c) Opinions and contradictions
d) No scope for constructive criticisms 263. Who among the following is the founder of
A. a, and c are correct Internet Archive – a non-profit digital library?
B. c, b and d are correct E. Chester Carlson
C. c, and d are correct F. Brewster Kahle
D. c, a and b are correct G. Michael S. Hart
Answer: A H. Edward Fox

109 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

Answer: B (Brewster Kahle) papers, ask and answer questions, and find collaborators.
It was first launched in 2008 by Ijad Madisch.
Notes: Brewster Kahle, an American Computer
Engineer founded the Internet Archive – a non-profit 267. Oovoo is a __.
digital library in the year 1996 and headquartered in A. Video Networking site
California. He also founded the Alexa Internet – a web B. Social Networking site
traffic analysis and crawling company based in C. Academic Networking site
California. D. Photo Networking site
Library Info

Library Info
264. Internet Hall of Fame – a lifetime achievement Answer: A (Video Networking site)
award was started in the year __.
A. 2009 Notes: ooVoo was a video chat and a messaging app
B. 2012 developed by ooVoo LLC and owned by Krush
C. 2013 Technologies, LLC. The original Microsoft Windows
D. 2015 app was released in 2007.

Answer: B (2012) 268. The term ‘Podcast’ was first suggested by __.
A. Ben Hammersley
Notes: The Internet Hall of Fame is an annual B. Brewster Kahle
honorary lifetime achievement award administered by C. Edward Fox
the Internet Society (ISOC) in recognition of D. Michael S. Hart
individuals who have made significant contributions to
the development and advancement of the Internet. It was Answer: A (Ben Hammersley)
started in 2012 on the 20th Anniversary of ISOC. Notes: A podcast is an episodic series of
265. R G Score is an integral feature of __. digital audio files that a user can download to a personal
A. Google Scholar device for easy listening. In other words, A podcast is a
B. Scitation digital recording of music, news or other media that is
C. ResearchGate accessible and can be downloaded from the internet to a
D. Medline portable media player. Podcasts are similar to radio
programs but unlike radio programs, they are in the form
Answer: C (ResearchGate) of audio files. These are made accessible by a podcast
distributor in a series of audio files on a server as a web
Notes: The RG Score (ResearchGate Score) measures feed. The term ‘Podcast’, a combination of ‘ipod’ and
scientific reputation based on how your work is received ‘braodcast’ was first suggested by Ben Hammersley in
by your peers after listing on ResearchGate. 2004.
266. ResearchGate- an academic social networking 269. ‘Podcast’ means __.
site was first launched in __. A. Blog post containing audio files
A. 2006 B. Blog post containing video files
B. 2008 C. Blog post containing audio and video files
C. 2010 D. Blog post containing image files
D. 2011
Answer: A (Blog post containing audio files)
Answer: B (2008)
270. The easiest way to bring Internet video to one’s
Notes: ResearchGate is an academic social desktop or download is known as __.
networking site for scientists and researchers to share
110 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. Flogging beginning, middle or end of a message to obscure the


B. Podcasting fact’ before encryption.
C. Vodcasting
D. Blogging 273. Flickr is a ___.
A. Video Networking site
Answer: C (Vodcasting) B. Social Networking site
C. Academic Networking site
Notes: A vodcast is a podcast that contains video D. Photo Networking site
Library Info

Library Info
content, instead of solely audio. The term vodcast comes
from the combination of the words "video" and Answer: D (Photo Networking Site)
"podcast".
Notes: Flickr is an image hosting service. It was created
271. Which statements are true about Podcasting? by Ludicorp in 2004 and now owned by SmugMug.
a) An audio file on the internet
b) Accessed on a personal computer or portal 274. Which of the following are not social
MP3 Player networking tools?
c) Can be released episodically a) Intelligent web
d) Users can receive notification of new b) Facebook
episodes via subscriptions to RSS feeds. c) Skype
A. a, and c are correct d) Twitter
B. b and d are correct
C. c, and d are correct A. c, and d are correct
D. a b, c, and b are correct B. a, and c are correct
C. b and c are correct
Answer: D D. b and d are correct

272. Which of the following is an example of Answer: B


‘Information Padding’?
A. Inclusion of a source in the bibliography 275. Which of the following are academic social
which is relevant to your work and duly network?
consulted. a) Research Gate
B. Inclusion of a source in the bibliography b) DRUPAL
though not consulted, but required for c) Academia.edu
further reading. d) JOOMLA
C. Adding of necessary words or information to
a speech or piece of work making the same A. c, and d are correct
more shoter B. a, and c are correct
D. Adding of gratuitous and impertinent words C. b and c are correct
or information to a work or piece of writing D. b and d are correct
or speech extraneously making the same
Answer: B
more longer.
Notes: Academia.edu is a commercial social
Answer: D networking website for academics. The platform can be
Notes: In cryptography, padding is ‘adding used to share papers, monitor their impact, and follow
unnecessary, nonsense data or phrases to the the research in a particular field. It was founded by
Richard Price and first launched in September 2008.
111 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

276. Which of the following are reasons for digital Answer: C


divide?
a) Mobile number portability 279. Which of the following are open source ILMS?
b) Low internet penetration a) E-prints
c) Non-availability of ICT infrastructure b) GSDL
d) Familiarity with information technologies c) KOHA
d) NEW GENLIB
A. c, and d are correct
Library Info

Library Info
A. c, and d are correct
B. a, and c are correct B. a, and c are correct
C. b and c are correct C. b and c are correct
D. b and d are correct D. b and d are correct

Answer: C Answer: A

Notes: Digital divide is the uneven distribution in the 280. Select the correct combinations:
access to, use of, or impact of ICTs between any number a) Turnitin – Anti-plagiarism software
of distinct groups/community. In other words, digital b) Zoomerang – Online survey tool
divide refers to the gap between those able to benefit c) Ganesha – Digital Library Software
from the digital age and those who are not. d) A-Tutor – Learning Management System
A. c, and d are correct
277. Which of the following are not open source B. a, and c are correct
software? C. b and c are correct
a) KOHA D. a, b, c, and d are correct
b) LIBSYS
c) NEW GENLIB Answer: D
d) VIRTUA Notes: Ganesha Digital Library (GDL) is a digital
A. c, and d are correct library software developed by Knowledge Management
B. a, and c are correct Research Group (KMRG) Institute of Technology
C. b and c are correct Bandung (ITB), Indonesia.
D. b and d are correct
Zoomerang – an online survey tool established in 1999
Answer: D is now part of SurveyMonkey, the world’s leading web-
278. Which of the following are the performance based survey solutions.
indicators used to measure libraries in electronic 281. Which among the following plagiarism detection
measurement? software are totally free?
a) Accuracy of classification system a) Turnitin
b) Information content available on the b) Viper
network c) Urkund
c) Information tools and services d) EduBirdie
d) Quantum of staff in the library A. a and d are correct
B. b and c are correct
A. c, and d are correct C. a and b are correct
B. a, and c are correct D. b and d are correct
C. b and c are correct Answer: D
D. b and d are correct
112 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

282. Select the correct combinations: A. c, and d are correct


a) Granthalaya – NISCAIR B. a, and c are correct
b) Information Bank – DESIDOC C. b and c are correct
c) Conference Alert – NASSDOC D. a, b, c, and d are correct
d) Virtual Information Centre – ICICI
Knowledge Park Answer: D
A. a and d are correct
Notes: Data Harmony offers a full suite of software tools
B. b and c are correct
Library Info

Library Info
C. a and b are correct for managing metadata, including software for automatic
D. All are correct indexing and taxonomy management.

285. Select the correct combinations:


Answer: D
a) Google Scholar – Academic Search Engine
Notes: With a view to providing specialized information b) Amazon – Book acquisition
to Scientists at DRDO headquarters, Information Bank c) LIS-Forum – Mailing list for library
was set-up in 1972. The Bank has been assigned the role professionals
of collection and dissemination of information in a few d) Worldcat – Bibliographic database
selected fields of interest to the top management through A. c, and d are correct
the ‘weekly abstracts’. B. a, and c are correct
NASSDOC has been bringing out Social Science C. b and c are correct
Conference Alert: A Quarterly Calendar of forthcoming D. a, b, c, and d are correct
Conferences, seminars, Workshops etc. in social science
and other cognate disciplines. The main objective of this Answer: D
publication is to disseminate advance information about 286. CDS/ISIS uses __.
the forthcoming events. A. Fixed field length
283. Select the correct combinations: B. Variable field length
a) Koha – Zebra C. Controlled field length
b) DSpace – Lucene and Solr D. None of the above
c) Greenstone – Lucene and MGPP
d) VUFind – Solr Answer: B
A. c, and d are correct
287. JSTOR is an online system for archiving and
B. a, and c are correct
accessing academic journals. It is located in __.
C. b and c are correct
A. Germany
D. a, b, c, and d are correct
B. UK
Answer: D C. USA
D. Budapest
Notes: Zebra, Solr, Lucene and MGPP are open source
Search Indexing tools. Answer: C (USA)

284. Select the correct combinations: Notes: JSTOR (Journal Storage) is a digital
a) Data Harmony – Thesaurus library founded in 1995 by William G. Bowen in New
b) SUCHIKA – DESIDOC York, United States, and funded by Andrew W. Mellon
c) Librarian’s Index to the Internet – Subject Foundation. Originally containing digitized back
Directory issues of academic journals, it now also includes books
d) Dialindex – Database of Databases and other primary sources, and current issues of journals.

113 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

In 2009, JSTOR merged with and became a service D. Beverly Cleary


of ITHAKA, a not-for-profit organization that works to
advance and preserve knowledge and to improve Answer: A (Henriette Avram)
teaching and learning through the use of digital 290. Which of the following are the examples of
technologies. Web-based learning and education tools?
288. Select the correct combinations: a) Answer Tips
a) Survey Monkey – Ryan Finley – Sanmateo, b) Moodle
Library Info

Library Info
California, (USA) c) Revish
b) TypeForm – Robert Munoz and David d) Campusbug
Okuniev-Barcelona (Spain) A. c, and d are correct
c) Client Heartbeat – Gordon Tan –Brisbane B. a, and c are correct
(Austria) C. b and c are correct
d) Survey Gizmo – Christian Vanek and Scott D. a, b, and d are correct
McDaniel- Colorado (USA) Answer: D
A. c, and d are correct
B. a, and c are correct Notes: Campusbug is a provider of internet services for
C. a, b, c, and d are correct students. These services include online educational
D. b and c are correct assistance, social networking, an online marketplace, and
more. Their goal is to provide a single destination for the
Answer: C social and educational needs of today's students.
Notes: SurveyGizmo is an online survey software
Answer Tips is a tool/service for blogs and websites by
developed by Christian Vanek and Scott McDaniel in
answer.com.
2006 and headquartered in Boulder, Colorado (USA)
291. Arrange the following library software in
Typeform, founded in 2012 by Robert Munoz and
ascending order according to their year of
David Okuniev, is a Barcelona-based online software as
launching:
a service (SaaS) company that specializes in online form a) PhpMyLibrary
building and online surveys. b) ABCD
SurveyMonkey is online survey development cloud- c) Koha
based software as a service company. It was founded in d) NewGenLib
1999 by Ryan Finley and Chris Finley and
headquartered in California (USA) A. (d), (c), (b) and (a)
B. (c), (a), (d), and (b)
Client Heartbeat is a survey tool for measuring C. (c), (d), (b) and (a)
customer satisfaction. The company was founded by D. (d), (a), (b) and (c)
Gordan Tan in the year 2012 and headquartered in
Brisbane (Austria) Answer: B

289. Who is considered as the ‘mother of Notes: Koha (2000); PhpMyLibrary (2003); NewGenLib
MARC’(declared by Library of Congress in (2005); ABCD (2010)
2006)? 292. PhpMyLibrary automation software was
A. Henriette Avram developed in __.
B. Carla Hayden A. France
C. Laura Welch Bush
114 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. Philippines and now maintained by Hans Van der Weij, current


C. Russia project manager.
A. Germany
295. Which among the following is NOT
Answer: B (Philippines) included in XAMPP?
A. Apache
Notes: PhpMyLibrary is an open source PHP MySQL B. MySQL
based Library automation application. The program C. PERL
Library Info

Library Info
consists of cataloging, circulation, and Web OPAC D. Python
modules. It was developed by Polerio T. Babao III as
his academic undergraduate thesis in the Institute of Answer: D
Library and Information Science, University of the
Philippines, Diliman and first released for general use Notes: XAMPP a free and open source cross-
in 2003. platform web server package. It stands for:
X - stands for Cross Platform (Means you can
293. PhpMyBibli (PMB) open source ILS was install XAMPP on any Operating System); A –
developed in __. Apache Server; M – MySQL; P-PHP (Scripting
A. France language); P – PERL (Programming language)
B. Philippines
C. Russia 296. Select the correct combinations:
D. Germany a) ArXiv – Cornell University
b) JSTOR – Princeton University
Answer: A (France) c) Highwire & LOCKSS – Stanford University
d) GSDL – Waikato University
Notes: PMB (PhpMyBibli) is Web-based open
A. c, and d are correct
source ILS that uses XAMPP architecture. The
PMB ILS project was started by François B. a, and c are correct
Lemarchand in October 2002, the then Director of C. b and c are correct
the Public Library of Agneaux, France. Presently it D. a, b, c, and d are correct
is managed by PMB Services, an initiative to
Answer: D
support open source software. The first version was
released in the year 2003 and the current version is Notes: arXiv is an open-access repository of
4.1 (released in March 2014). electronic preprints (known as e-prints) of scientific
papers in the fields of mathematics, physics,
294. OpenBiblio – an open source integrated astronomy, electrical engineering, computer
library system was first created in the year __.
science, statistics, and economics, which can be accessed
A. 2000
online. It was developed by Paul Ginsparg, launched in
B. 2001
1991 and now hosted at Cornell University.
C. 2002
D. 2003 HighWire Press was founded by Stanford
University Libraries in 1995.
Answer: C (2002)
297. Select the correct combinations:
Notes: Openbiblio was created in 2002 by Dave a) Ning – Mark Andreessen & Gina Biomchini
Stevens. This free open source software is much b) First Programmer – Lady Lovelace Ada
popular with small and rural libraries worldwide c) RDF – Tim Berners Lee
d) Facebook – Mark Zuckerberg
115 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

A. c, and d are correct b) Lockss – Non-profit service that allows


B. a, and c are correct libraries to collect e-contents for digital
C. b and c are correct preservation
D. a, b, c, and d are correct c) Clockss – Non-profit digital preservation
service for participating libraries
Answer: D d) Chorus – Clearinghouse for open resources
of the U.S.
298. Select the correct combinations:
Library Info

Library Info
a) Blog – Peter Merholz A. c, and d are correct
b) Web 2.0 – D. Dougherty & Tim O’Reilly B. a, and c are correct
c) Wiki – H. G. Cunningham C. b and c are correct
D. a, b, c, and d are correct
d) Folksonomy – T. Vander Wall
A. c, and d are correct Answer: D
B. a, and c are correct
C. b and c are correct 302. Which of the following is not a remote access
D. a, b, c, and d are correct tool to access subscribed content outside an
organization network:
Answer: D A. OpenAthens
B. Virtual Private Network(VPN)
299. Select the correct combinations:
C. Ezproxy
a) RSS – Netscape
b) URL – Tim Berners Lee D. Primo
c) FRBR – Patrick Le Boeuf Answer: D (Primo)
d) Information Highway – Nam June Paik
A. c, and d are correct Notes: OpenAthens is an identity and access
B. a, and c are correct management service, supplied by Jisc (Joint Information
C. b and c are correct Systems Committee), a British not-for-profit information
D. a, b, c, and d are correct technology services company founded in 1993.

Answer: D EZproxy is a web proxy server used by libraries to give


access from outside the library's computer network to
300. Select the correct combinations: restricted-access websites that authenticate users by IP
a) Instagram – Facebook address. The software was originally written by Chris
b) Face Time – Apple Zagar in 1999 and later OCLC acquired it in 2008.
c) Tumblr – Yahoo
d) Picasa – Google Ex Libris Primo®, first released in 2006, provides a
A. c, and d are correct fast, comprehensive, and personalized discovery
B. a, and c are correct solution similar to ProQuest Summon Discovery
C. b and c are correct Solution (First released in 2009). A single search
D. a, b, c, and d are correct interface provides a gateway to a wealth of scholarly
content, including print, electronic and digital
Answer: D collections. Ex-Libris, founded in 1986, is an Israeli
301. Select the correct combinations: software (Jerusalem-based) company that provides
a) Portico – Preserves scholarly publications in cloud-based library software solutions. It was acquired
dark archives by ProQuest in October 2015.

303. Select the correct combinations:


116 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

a) Invenio – Digital Library System D. SOUL


b) Moodle – Course Management System
c) Share Point – Content Management System Answer: B (Knimbus)
d) PhpMyAdmin – Web Database Management Notes: Knimbus, headquartered in New Delhi is a
A. c, and d are correct dedicated knowledge discovery and collaborative space
B. a, and c are correct for researchers and scholars. Knimbus, was founded in
C. b and c are correct 2010 by entrepreneurs Rahul Agarwalla and Tarun
Library Info

Library Info
D. a, b, c, and d are correct Arora to address challenges faced by researchers in
Answer: D searching across and accessing multiple information
sources. Knimbus is an initiative to democratize
Notes: Invenio, initially developed by CERN, is an open information, by building a platform that enables
source software for the management of digital content in knowledge based communities globally through
an institutional repository. knowledge discovery and collaboration.

SharePoint, developed by Microsoft Corporation in 306. Select the correct combinations:


2001, is a web-based collaborative platform that a) Folksonomy – Thomas Vander Wal
integrates with Microsoft Office. It is a content b) Web Log – John Barger
management system used for developing websites. c) Net Neutrality – Tim Wu
d) Semantic Web – Tim Berners Lee
304. Which of the following are access authentication A. c, and d are correct
methods for digital collection? B. a, and c are correct
a) Shibboleth C. b and c are correct
b) Open ID D. a, b, c, and d are correct
c) Open URL
d) Counter Answer: D
A. c, and d are correct
B. a, and c are correct 307. Tagging in Web 2.0 application is called __.
C. b and c are correct A. Taxonomy
D. a, and b are correct B. Folksonomy
C. Syndication
Answer: D D. Directory

Notes: OpenID is an open standard and decentralized Answer: B (Folksonomy)


authentication protocol promoted by the non-profit
OpenID Foundation. Notes: Folksonomy is a user-generated system of
classifying and organizing online content into different
Shibboleth is a single sign-on log-in system for categories by the use of metadata such as electronic tags.
computer networks and the Internet, managed by In other words, Folksonomy is the system in which users
Shibboleth Consortium. The project started in 2000 and apply public tags to online items in order to make those
the first version was released in 2003. items easier for themselves or others to find later. The
practice is also called social tagging and social indexing.
305. Which of the following is an example of The term, Folksonomy was coined by Thomas Vander
Federated search engine? Wal in 2004.
A. Picaso
B. Knimbus 308. Project COUNTER was launched in __.
C. KOHA A. 2001
117 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. 2003 310. KOHA is written in which of the following


C. 2005 language?
D. 2006 A. C, C++
B. Java
Answer: B (2003) C. Karel ++
D. Perl
Notes: COUNTER (Counting Online Usage of
Networked Electronic Resources) is an international Answer: D (Perl)
Library Info

Library Info
initiative designed to serve librarians, publishers and
intermediaries by facilitating the recording and exchange 311. In context to modulation, PCM stands for ___.
of online usage statistics to an agreed set of international A. Pulse Code Modulation
standards and protocols. Project COUNTER, officially B. Phase Control Modulation
launched in March 2002 is a non-profit organization C. Popular Code Modulation
supported by a global community of library, publisher D. Penultimate Code Modulation
and vendor members, who contribute to the development
of the Code of Practice through working groups and Answer: A (Pulse Code Modulation)
outreach. COUNTER sets and maintains the standard Notes: Pulse-code modulation is a method used to
known as the Code of Practice (COP) which is to be digitally represent sampled analog signals. It is the
used with the ANSI/NISO Z39.93-2014 protocol, called standard form of digital audio in computers, compact
SUSHI, to retrieve usage data quickly. The first release
discs, digital telephony and other digital audio
of COUNTER Code of Practice for online journals and applications.
databases was happened in January 2003. Release 5 is
the current Code of Practice (COP5) and the 312. Select the correct combinations:
requirement for COUNTER compliance effective from a) Ex Libris – Alma
January of 2019. b) Polaris – Innovative Interfaces Inc.
c) Koha – Liblime
309. SUSHI protocol stands for ___.
d) DSpace – Duracloud
A. Standardized Usage Statistics Harvesting
A. c, and d are correct
Initiative
B. a, and c are correct
B. Standardized Universal Statistics Harvesting C. b and c are correct
Initiative D. a, b, c, and d are correct
C. Standard Usage Statistics Harvesting
Initiative Answer: D
D. None of the above
Notes: Ex-Libris Alma, released in 2012, is a cloud-
Answer: A (Standardized Usage Statistics Harvesting based library software services platform (SaaS) that
Initiative) provides libraries most cost-effect library management
solutions. It is now owned by ProQuest.
Notes: SUSHI stands for Standardized Usage Statistics
Harvesting Initiative. It is a standard protocol 313. Select the correct combinations:
(ANSI/NISO Z39.93-2007) first accepted by NISO as a) FEDORA – Cornell University
an Standard in 2007 and revised in 2014 that can be b) GSDL - University of Waikato
used by electronic resource management (ERM) systems c) E-Prints - University of Southampton
and other systems to automate the delivery of d) DSpace - Massachusetts Institute of
COUNTER usage statistics report in XML format. Technology
A. c, and d are correct
118 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

B. a, and c are correct Internet Archive that helps organizations to harvest,


C. b and c are correct build, and preserve collections of digital content.
D. a, b, c, and d are correct
317. Who among the following is the editor of the
Answer: D academic journal ‘Webology’?
A. Alireza Noruzi
314. Select the correct combinations: B. Mike Krieger
a) GSDL – 1996 C. Andrew McCollum
Library Info

Library Info
b) E-prints – 2000 D. Kevin Systrom
c) DSpace – 2002
d) FEDORA – 2003 Answer: A (Alireza Noruzi)
A. c, and d are correct
B. a, and c are correct Notes: Started in 2004 and edited by Alireza Noruzi
C. b and c are correct Webology is an international peer-reviewed academic
D. a, b, c, and d are correct journal in English devoted to the field of the World
Wide Web and serves as a forum for discussion and
Answer: D experimentation.

315. Arrange the following library software in 318. Jubilee Project is associated with __.
ascending order according to their year of first A. Public library survey
launching: B. Evaluation of electronic information
a) Koha services
b) Evergreen C. Strategic management of libraries
c) SOUL D. Scale development
d) NewGenLib
Answer: B (Evaluation of electronic information
A. (d), (c), (b) and (a) services)
B. (c), (a), (d), and (b) Notes: JUBILEE (JISC User Behaviour in Information
C. (c), (d), (b) and (a) seeking: Longitudinal Evaluation of Electronic
D. (d), (a), (b) and (c) Information Services) is one of two large-
Answer: B scale projects funded under the JISC's MEUB
Framework and started in 1999.
Notes: SOUL (February 2000); (Koha (July 2000);
NewGenLib (2005); Evergreen (2006) 319. Z39.50 protocol is used to __.
A. Preserve data for longer period
316. ‘Archive-It’ is a subscription based web B. Search and retrieve information from other
archiving service of ___. databases
A. Internet Archive C. access hidden/password protected data
B. OCLC D. locate and identify error in databases
C. RLG
D. SLA Answer: B (Search and retrieve information from
other databases)
Answer: A (Internet Archive)
320. Which among the following is NOT an Open
Notes: First deployed in 2006, Archive-It is a source ILS?
subscription based web archiving service from the A. Koha

119 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

B. Evergreen subjects. The project started in 1991 by Paul Ginsparg


C. NewGenLib and hosted at Cornell University.
D. E-Granthalaya
324. Who invented the concept of ‘Deep Web’?
Answer: D (E-Granthalaya) A. Andy Grove
B. John C. Flanagan
Notes: E-Granthalaya comes under freeware. Freeware C. Michael Bergman
means that though the software is free, but its source D. Larry Arvin
Library Info

Library Info
code is not openly available for modification.
Answer: C (Michael Bergman)
321. ‘Ask the Librarian’ is an example of __.
A. Internet Digital Library Notes: Deep web or hidden web or invisible web, in a
B. Virtual Library search context, was coined in the year 2001 by Michael
C. Real Time Digital Library Bergman. He divided the World Wide Web into two
D. None of the above parts:

Answer: C (Real Time Digital Library) Surface web (Visible Web)- the part that traditional
search engines indexes such as Google, Yahoo, Bing etc.
Notes: Ask a Librarian is a live virtual and Deep web - the part that is hidden from the
reference service that offers online reference assistance traditional search engines. The content of the deep web
to users. can be located and accessed through a direct URL or IP
address, but may require a password or other security
322. Webnet is a __.
access to get past public-website pages. Examples:
A. Institutional repository program
B. Web-hosting service provider Academic databases, Subscription based Information,
C. Digital library Medical record, Legal documents etc.
D. None of the above Dark Web: Dark web is a subset of Deep web that is not
Answer: B (Web-hosting service provider) regulated and whose IP addresses are intentionally
hidden. It consists of websites that use public interest,
Notes: Webnet is a Canadian website development and but require specific software for access and is not
hosting company having branches in various countries indexed by search engines to ensure anonymity. The
including India. stolen data is traded, sold and used for financial, political
or personal gain.
323. arXiv is a ___.
A. Repository of electronic preprints of scientific 325. Which agency looks after the maintenance of
papers SRU and SRW standards?
B. Instant messaging service A. OCLC
C. File extension B. Library of Congress
D. Video hosting service C. IFLA
D. British Library
Answer: A
Answer: B (Library of Congress)
Notes: ArXiv is a repository of electronic preprints of
scientific papers approved for posting after moderation, Notes: SRU (Search/Retrieve via URL) is a standard
but not full peer review. It consists of scientific papers in XML based search protocol for Internet search queries.
the fields of mathematics, physics, astronomy and other SRW (Search Retrieve Web Service) is a web service
for search and retrieval, a companion protocol to SRU.
120 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

Queries in SRU and SRW are expressed using The Integrated Public Sector Vocabulary (IPSV) is
the Contextual Query Language (CQL), a standard a controlled vocabulary for describing subject elements
syntax for representing queries. The Library of of metadata used in United Kingdom’s e-GMS (e-
Congress serves as the maintenance agency for these Government Metadata Standard) and was first
standards. released in April 2005. It merged earlier lists: the GCL
(Government Category List) and LGCL (Local
326. Memex device was first devised by __. Government Category List). It is fully compliant with
A. Vannevar Bush
Library Info

Library Info
ISO 2788.
B. John C. Flanagan
C. Mike Krieger 328. Ex-Libris Esploro – the research services
D. Andrew McCollum platform was launched in __.
A. 2015
Answer: A (Vannevar Bush) B. 2016
Notes: The memex is the name of the hypothetical C. 2018
proto-hypertext system that Vannevar Bush described D. 2019
in his 1945 The Atlantic Monthly article "As We May Answer: C (2018)
Think". A memex is a device in which an individual
stores all his books, records, and communications, and Notes: Ex-Libris Esploro launched in 2018 is a research
which is mechanized so that it may be consulted with service platform that paves the way to greater impact of
exceeding speed and flexibility. academic research by maximizing visibility, efficiency,
and compliance of research activities. Ex-Libris is an
327. Select the correct combinations” Israeli software company which provides cloud-based
a) AIRS – Taxonomy library software solutions. The company is now owned
b) IPSV – Thesaurus by ProQuest (since October 2015). The other products of
c) GCL – Government Category List Ex-Libris company includes: Alma (A SaaS Library
d) LGAL – Local Government Category List Services Platform, released in 2012); Primo (Discovery
A. c, and d are correct Service released in 2006); Rosetta (Digital Preservation
B. a, and c are correct and Asset management platform, released in 2009);
C. b and c are correct Leganto (Reading List Management Application,
D. a, b, c, and d are correct released in 2015); CampusM (Mobile campus app
Answer: D platform for academic institutions, acquired in 2015);
Aleph (Integrated Library System); Voyager (Integrated
Notes: The AIRS/211 LA County Taxonomy of Library System, acquired in 2006).
Human Services provides a standard language and
terminology for information and referral providers in 329. ESPIDA Institutional Digital Preservation
United States and Canada. It is a hierarchical system that Program is initiated at __.
contains more than 9,200 terms that cover the complete A. Stanford University
range of human services. 2-1-1 is a three digit telephone B. University of Glasgow
number used in the US and Canada that connects callers C. British Library
to a full range of community, social and government D. Helsinki University Library
services information. AIRS (Alliance for Information Answer: B (University of Glasgow)
and Referral Systems) is the accrediting body of the 2-
1-1 centers. Notes: The Effective Strategic model for the
Preservation and Disposal of Institutional Assets

121 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

(ESPIDA) is a plan to draw up a business-focused model B. a, and c are correct


for digital preservation at higher education institutions. C. b and c are correct
Based in the University of Glasgow, ESPIDA is funded D. a, b, c, and d are correct
by the Joint Information Systems Committee (JISC) and
runs until December 2006. Answer: D

330. Select the correct combinations: Notes: In 1968, Stanford University started two joint
a) DORIA – Helsinki University Library projects: BALLOTS (Bibliographic Automation of
Library Info

Library Info
b) LOCKSS – Stanford University Libraries Large Library Operations Using Time-Sharing
c) ESPIDA – University of Glassgow System) – a library automation programme and SPIRES
d) LIFE – British Library (Stanford Physics Information Retrieval System) – an
A. c, and d are correct information retrieval system.
B. a, and c are correct SRU (Search/Retrieval via URL) - is a standard XML-
C. b and c are correct based protocol developed by Library of Congress for
D. a, b, c, and d are correct search queries, utilizing CQL (Contextual Query
Answer: D Language).

Notes: DORIA (Digital Object Management System) 333. Select the correct combinations:
is a project set up by Helsinki University Library to a) SRW – Search/Retrieve Web Service
preserve and manage digital collections of Finnish b) SRU – Search/Retrieve via URL
Universities and Polytechnics. Helsinki University c) Z39.50 – Protocol for searching and
Library is also the National Library of Finland. retrieving information from a database
d) OAI-PMH – Open Archives Initiative
331. Arrange the following archives in a Protocol for Metadata Harvesting
chronological order according to their year of A. c, and d are correct
establishment: B. a, and c are correct
a) Portico C. b and c are correct
b) KB e-Depot D. a, b, c, and d are correct
c) LOCKSS
d) PMC Answer: D
A. (d), (c), (b) and (a) Notes: Z39.50 is an international standard client–
B. (c), (a), (d), and (b) server, application layer communications protocol for
C. (c), (d), (b) and (a) searching and retrieving information from
D. (d), (a), (b) and (c) a database over a TCP/IP computer network. It is
Answer: C covered by ANSI/NISO standard Z39.50,
and ISO standard 23950. The standard's maintenance
Notes: LOCKSS (1999); PMC (2000); KB e-Depot agency is the Library of Congress. The successors to
(2002); Portico (2005) Z39.50 are the twin protocols developed by Library of
Congress: SRU (Search/Retrieve via URL) and
332. Select the correct combinations: SRW (Search/Retrieve Web service)
a) Memex – Vannever Bush
b) BALLOTS – Stanford University 334. Classic Software Preservation Project (CLASP)
c) SRU – Library of Congress was set up by ___.
d) KWIC – H. P. Luhn A. British Library
A. c, and d are correct B. National Library of Medicine
122 AQUIL AHMED
Computer Technology: Library Automation & Digitization Unit -VIII

C. Internet Archive
D. IBM

Answer: C (Internet Archive)

Notes: The Classic Software Preservation Project


(CLASP) was set up in 2004 by the non-profit Internet
Archive to assist in the permanent archiving of retail
Library Info

Library Info
software dating from the late 1970s to the early 1990s.

123 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII
Library Info

Library Info
Assertion
&
Reasoning

124 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

1. Assertion (A): It is not economical to store and 4. Statement (A): ‘E-Granthalaya’ can be
read video data from secondary storage devices customized depending upon the requirement of
Reason (R): Video data requires enormous disk individual library
storage as image compression ratio is high Statement (B): ‘E-Granthalaya’ is freely
available software
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true A. (A) is true, but (B) is false
Library Info

Library Info
C. Both (A) and (R) are true B. (A) is false, but (B) is true
D. Both (A) and (R) are false C. Both (A) and (B) are true
D. Both (A) and (B) are false
Answer: B
Answer: B
2. Assertion (A): In recent years, QR codes have
become ubiquitous and may replace the use of 5. Assertion (A): System analysis identifies the
barcodes. components and flow of work.
Reason (R): QR is a two-dimentional code with Reason (R): System analysis is not necessary if
large capacity for storage. These codes hold library is automated.
information both horizontally and vertically and
can be scanned by users with their smart phones A. (A) is true, but (R) is false
at ease. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
A. (A) is true, but (R) is false D. Both (A) and (R) are false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true Answer: A
D. Both (A) and (R) are false 6. Assertion (A): Publishing in institutional
Answer: B repositories is the green route of open access.
Reason (R): Depositing in institutional
3. Assertion (A): ‘Web Assembly’, a standard that repositories restricts access to scholars of
enables applications to run securely in browsers respective institute.
(without the use of Plug-ins) is a people-friendly
application in using web. A. (A) is true, but (R) is false
Reason (R): A web language transforms the B. (A) is false, but (R) is true
way people use their devices and the web C. Both (A) and (R) are true
making applications are more accessible to D. Both (A) and (R) are false
people at ease all over the globe.
Answer: A
A. (A) is true, but (R) is false 7. Assertion (A): In the digital environment, the
B. (A) is false, but (R) is true users expect from the library the ability to
C. Both (A) and (R) are true connect broad range of information resources in
D. Both (A) and (R) are false a variety of formats with a single point access.
Answer: C Reason (R): Libraries already have much of
what is required in the digital environment.

A. (A) is true, but (R) is false

126 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

B. (A) is false, but (R) is true 11. Assertion (A): Digitization has proved to be
C. Both (A) and (R) are true possible for every format and medium held by
D. Both (A) and (R) are false library.
Reason (R): All libraries are making their text
Answer: A and visual collections digitized.
8. Assertion (A) : Semantic web is an extension of
A. (A) is true, but (R) is false
www in which web contents cannot be
Library Info

Library Info
expressed in natural language. B. (A) is false, but (R) is true
Reason (R) : Semantic web can be easily C. Both (A) and (R) are true
associated with spider web. D. Both (A) and (R) are false
A. (A) is true, but (R) is false Answer: A
B. (A) is false, but (R) is true
C. Both (A) and (R) are true 12. Assertion (A): Use of microfilming is becoming
D. Both (A) and (R) are false obsolete day by day.
Reason (R): ICT has developed digital
Answer: D technologies, which are quick, cheap and easy to
9. Assertion (A) : RFID technology is still not handle.
widely installed in Indian Library Environment.
A. (A) is true, but (R) is false
Reason (R) : the standardization, application
and innovation are constantly changing. B. (A) is false, but (R) is true
C. Both (A) and (R) are true
D. Both (A) and (R) are false
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true Answer: C
C. Both (A) and (R) are true and (R) is the
correct explanation of (A) 13. Assertion (A) : Deacidification is a measure to
D. Both (A) and (R) are true, but (R) is not preserve documents in any medium.
the correct explanation of (A) Reason (R) : Digital preservation needs a
different preservation care.
Answer: D

10. Assertion (A) : Modern Integrated Library A. (A) is true, but (R) is false
Management Softwares offer user friendly B. (A) is false, but (R) is true
Graphical User Interfaces (GUI) on the web. C. Both (A) and (R) are true
Reason (R) : Almost every module of modern D. Both (A) and (R) are false
Integrated Library Management Software is Answer: B
accessible through the internet.
14. Assertion (A): Library automation is at a slow
A. (A) is true, but (R) is false pace in Indian Libraries.
B. (A) is false, but (R) is true Reason (R): Lack of U.G.C. (India) support
C. Both (A) and (R) are true lead to this situation.
D. Both (A) and (R) are false
A. (A) is true, but (R) is false
Answer: C B. (A) is false, but (R) is true
C. Both (A) and (R) are true

127 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

D. Both (A) and (R) are false 18. Assertion (A): Students are among the most
prolific users of social network sites (SNS).
Answer: A Reason (R): Social network sites always help in
15. Assertion (A): The development of Institutional fulfilling their academic information needs.
Repositories in India is at a slow pace. A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
Reason (R): This can be attributed to the non-
C. Both (A) and (R) are true
availability of open source software and lack of
Library Info

Library Info
interest among the LIS professionals. D. Both (A) and (R) are false

Answer: A
A. (A) is true, but (R) is partially true
B. (A) is false, but (R) is true 19. Assertion (A): Many projects and initiatives are
C. Both (A) and (R) are true taken to create digital libraries.
D. Both (A) and (R) are false Reason (R): Digital library improves the
professional status of librarians.
Answer: A

16. Assertion (A): Making information available A. (A) is true, but (R) is false
using GSDL is effective than just putting it on B. (A) is false, but (R) is true
C. Both (A) and (R) are true
the web.
D. Both (A) and (R) are false
Reason (R): The information available in digital
form can be archived. Answer: A

A. (A) is true, but (R) is false 20. Assertion (A) : Information, not data, is the
B. (A) is false, but (R) is true fundamental fuel of the current Big Data
C. Both (A) and (R) are true and (R) is the Phenomenon.
correct explanation Reason (R) : The reason behind the quick
D. Both (A) and (R) are true, but (R) is not expansion of Big Data is the extensive degree to
the correct explanation which data are created, shared and utilised in
recent times.
Answer: D
A. (A) is true, but (R) is false
17. Assertion (A) : Present day libraries need to
B. (A) is false, but (R) is true
develop social networking tools for their library
websites. C. Both (A) and (R) are true
Reason (R) : It helps to reach out the patrons D. Both (A) and (R) are false
where they live and provide service at the point Answer: C
of need.
21. Assertion (A): Big data is a product of data
A. (A) is true, but (R) is false being generated constantly, automatically, and
B. (A) is false, but (R) is true rapidly.
C. Both (A) and (R) are true Reason (R): Due to the omnipresence of
D. Both (A) and (R) are false personal computing devices and smart phones,
individuals generate massive amount of data
Answer: C through e-commerce, e-communication, social
media, online searches and GPS navigation.

128 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

A. (A) is true, but (R) is false 25. Assertion (A) : Commercial Library
B. (A) is false, but (R) is true Management Softwares need to be discouraged
C. Both (A) and (R) are true in libraries to make the contemporary librarians
D. Both (A) and (R) are false free from the dictate of commercial vendors.
Reason (R) : Open source softwares (OSS) are
Answer: C more flexible and are free from much recurring
expenditure and wider user base of OSS helps in
22. Assertion (A) : Preprint archives, such as arxiv
Library Info

Library Info
and SSRN rapidly achieved prominence in the problem solving better.
field of scholarly communication. A. (A) is true, but (R) is false
Reason (R) : These archives contain Preprint B. (A) is false, but (R) is true
C. Both (A) and (R) are true
along with DOI.
D. Both (A) and (R) are false
A. (A) is true, but (R) is false Answer: C
B. (A) is false, but (R) is true
C. Both (A) and (R) are true 26. Assertion (A) : Digitization of documents is the
D. Both (A) and (R) are false most viable method for long-term preservation.
Reason (R) : Digital preservation ensures the
Answer: A accessibility and usability of documents forever.
23. Assertion (A) : Inclusion of DOAJ implies the
quality of an open access journals. A. (A) is true, but (R) is false
Reason (R) : DOAJ is an online directory that B. (A) is false, but (R) is true
C. Both (A) and (R) are true
indexes and provides access to open access and
D. Both (A) and (R) are false
peer viewed journals. Besides DOAJ has
tightened the listing criteria. Answer: A

A. (A) is true, but (R) is false 27. Assertion (A) : RDA is not a ‘content’ standard.
B. (A) is false, but (R) is true Reason (R) : RDA data are being used as the
C. Both (A) and (R) are true basis for a meta data element set.
D. Both (A) and (R) are false A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
Answer: C C. Both (A) and (R) are true
24. Assertion (A) : In Gold Open Access, costs are D. Both (A) and (R) are false
not transferred to authors. Answer: B
Reason (R) : Gold Open Access journals
publish peer-reviewed articles without paid 28. Assertion (A): Web 1.0 is 'Read only web'.
subscription barriers for their readers. Statement (B): 'Skype' is an example of Web
1.0.
A. (A) is true, but (R) is false A. (A) is true, but (B) is false
B. (A) is false, but (R) is true B. (A) is false, but (B) is true
C. Both (A) and (R) are true C. Both (A) and (B) are true
D. Both (A) and (R) are false D. Both (A) and (B) are false

Answer: B Answer: A

129 AQUIL AHMED


Computer Technology: Library Automation & Digitization Unit -VIII

29. Assertion (A): Social networking tools are


effective for marketing of library products and
services.
Reason (R): They help to reach out users
anywhere and at any time.
A. (A) is true, but (B) is false
B. (A) is false, but (B) is true
Library Info

Library Info
C. Both (A) and (B) are true
D. Both (A) and (B) are false

Answer: C

30. Assertion (A): Search engines search


documents for specified key-words, and returns
a list of documents where the keywords were
found.
Reason (R): Spider helps the search engines to
index the documents.
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true
D. Both (A) and (R) are false

Answer: C

31. Assertion (A): Work about Big data could also


be found in Library.
Reason (R): Library data needs to be
transformed into information or knowledge.
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true
D. Both (A) and (R) are false

Answer: C

32. Assertion (A): Cloud computing does not


facilitate external collaboration.
Reason (R): Cloud computing causes libraries
to provide innovative web services for users.
A. (A) is true, but (R) is false
B. (A) is false, but (R) is true
C. Both (A) and (R) are true
D. Both (A) and (R) are false

Answer: B

130 AQUIL AHMED

You might also like