NTA UGC NET Library and Information Science Paper 2 Solved Question Paper 2014 June: To score better marks in the NTA UGC NET Library and Information Science, you should have depth knowledge of the entire subject.
You can boost your preparation by referring to NTA UGC NET Library and Information Science Question Paper 2 2014 June. It will give you information about the important chapters and concepts covered in all chapters.
You must have NTA UGC NET Library and Information Science Solved Question Papers along with the latest Library and Information Science Syllabus to enhance your semester exam preparation.
Here we provide you with the complete guide on NTA UGC NET Library and Information Science Paper 2 Solved Question Paper 2014 June.
NTA UGC NET Library and Information Science Paper 2 Solved Question Paper 2014 June
NTA UGC NET Library and Information Science Solved Question Papers are the best study materials to score good marks in the Library and Information Science exam.
Practicing these NTA UGC NET Library and Information Science previous year question papers assist the students in getting a clear idea about the question paper pattern and types of questions asked in the exam.
You can check the complete NTA UGC NET Library and Information Science Paper 2 Solved Question Paper 2014 June.
1. Books of Unknown or doubtful authorship is known as:
(A) Apograph
(B) Incunabulla
(C) Apocryphal books
(D) Blue Books
Answer:Â (C)
2. If we plot ‘recall’ and precision on ‘X’ and ‘Y’ axis to draw a graph, then we get a
(A) Downward sloping straight line
(B) Upward sloping straight line
(C) ‘a’ shaped curve
(D) Hyperbola
Answer:Â (Wrong question)
3. The term ‘Literary warrant’ for book classification was introduced by
(A) W.C.B. Sayers
(B) Wyndham Hulme
(C) J.D. Brown
(D) H.E. Bliss
Answer:Â (B)
4. Under which approach of Wersig-Neveling’s information theory, information is seen as static relations between physical objects which may be perceived or not?
(A) The meaning approach
(B) The structural approach
(C) The process approach
(D) The knowledge approach
Answer:Â (B)
5. Which information theory focuses on the purpose of communication is, to inform, instruct or motivate the receiver?
(A) Shannon’s Theory
(B) Weaver’s Theory
(C) Ackoff’s Theory
(D) Yovit’s Theory
Answer:Â (C)
6. ‘Noise’ in Information retrieval is due to
(A) Precision
(B) Recall
(C) Relevant Information
(D) Redundant Information
Answer:Â (D)
7. In which scheme of classification, special auxiliaries denote locally recurrent characteristics?
(A) Dewey Decimal Classification
(B) Universal Decimal Classification
(C) Bibliographic Classification
(D) Colon Classification
Answer:Â (B)
8. Which of the following makes a network insecured?
(A) Encryption
(B) Network Interface Card (NIC)
(C) Password Capture
(D) Static Keys
Answer:Â (C)
9. Whose model of communication of knowledge suggests that communication is an open system?
(A) G. Garbner
(B) Juger Hebermans
(C) Shannon & Weaver
(D) M. Foucault
Answer:Â (A)
10. ‘Trans Border Data Flow’ means
(A) Exchange of documents between countries
(B) Free flow of information between countries
(C) Flow of information between countries
(D) Exchange of electronic information between countries
Answer:Â (CD)
11. Which of the following three types of basic languages are used in computer programming?
(A) Procedural, Non-procedural and Unconditional
(B) Zero, Low and High levels
(C) Machine, Assembly and High level languages
(D) COBOL, BASIC and C
Answer:Â (D)
12. FRBR Model consists of which of the following four entities?
(A) Personality, Matter, Energy, Space
(B) Work, Expression, Manifestation, Item
(C) Book, Form, Availability, Type
(D) Action, Place, Impact, Category
Answer:Â (B)
13. The primary distinction between RDA and AACR is
(A) Structural
(B) Relational
(C) Non-structural
(D) Combinational
Answer:Â (A)
14. Which of the following are reasons for obsolescence of information?
(i) Information is considered invalid.
(ii) Information is valid but mostly available online.
(iii) Works are extensively cited.
(iv) Information is valid but inadequate for exploration.
Codes:
(A) (i) and (ii) are correct.
(B) (ii) and (iii) are correct.
(C) (i) and (iv) are correct.
(D) (ii) and (iv) are correct.
Answer:Â (C)
15. Which of the following are news summaries?
(i) Data India
(ii) Times of India Index
(iii) New York Times Index
(iv) Asian Recorder
Codes:
(A) (i), (ii) and (iii) are correct.
(B) (ii) and (iii) are correct.
(C) (ii) (iii) and (iv) are correct.
(D) (i) and (iv) are correct.
Answer:Â (D)
16. Which of the following are Web-zine?
(i) Email Magazine
(ii) E-Conference
(iii) Online Bulletin
(iv) Electronic News Letter
Codes:
(A) (i), (iii) and (iv)
(B) (i), (ii) and (iii)
(C) (ii), (iii) and (iv)
(D) (i), (ii) and (iv)
Answer:Â (A)
17. Which of the following are not the Models of communication?
(i) Vintage Model
(ii) Lasswell’s Model
(iii) Epidemic Model
(iv) Garbner’s Model
Codes:
(A) (i) & (iv) are correct.
(B) (ii) & (iii) are correct.
(C) (i) & (iii) are correct.
(D) (iii) & (iv) are correct.
Answer:Â (C)
18. In reference service, assimilation means:
(i) Recording the retrieved information
(ii) Sharing reference service experience with colleagues
(iii) Furnishing the exact information
(iv) Acquaintance with reference material
Codes:
(A) (i) and (ii) are correct.
(B) (i) and (iv) are correct.
(C) (ii) and (iii) are correct.
(D) (ii) and (iv) are correct.
Answer:Â (A)
19. The notation used to increase the capacity of an array are:
(i) Empty digit
(ii) Emptying digit
(iii) Indicator digit
(iv) Speciator
Codes:
(A) (i) and (ii) are correct.
(B) (iii) and (iv) are correct.
(C) (i), (ii) and (iii) are correct.
(D) (i), (ii) and (iv) are correct.
Answer:Â (A)
20. Which of the following are the functions of the physical layer in OSI Model?
(i) Defines protocol for flow control.
(ii) Reliable sending of data packets.
(iii) Defines electrical specifications.
(iv) Functional and procedural means of transferring data.
Codes:
(A) (iii) and (iv) are correct.
(B) (ii), (iii) and (iv) are correct.
(C) (i) and (iv) are correct.
(D) (i) and (iii) are correct.
Answer:Â (Wrong Question)
21. Rich Text Format (RTF) is concerned with
(i) Formatting features like Font type, size, etc.
(ii) Transporting text documents across different computers.
(iii) Multimedia formatting.
(iv) Formatting based on binary concept.
Codes:
(A) (ii) and (iii) are correct.
(B) (iii) and (iv) are correct.
(C) (i) and (ii) are correct.
(D) (i) and (iv) are correct.
Answer:Â (C)
22. Which of the following are non probability sampling?
(i) Quota sampling
(ii) Judgement Sampling
(iii) Cluster Sampling
(iv) Multi-stage sampling
Codes:
(A) (i) and (iv) are correct.
(B) (ii) and (iii) are correct.
(C) (i) and (ii) are correct.
(D) (iii) and (iv) are correct.
Answer:Â (C)
23. Arrange the following in the ascending order of their first year of publication:
(i) BNB
(ii) INB
(iii) Compendex
(iv) Roget’s Thesaurus of English words
Codes:
(A) (iv), (iii), (i), (ii)
(B) (iii), (ii), (iv), (i)
(C) (ii), (iv), (i), (iii)
(D) (i), (iii), (ii), (iv)
Answer:Â (A)
24. Arrange the following ISBDs according to their year of formulation:
(i) ISBD (PM)
(ii) ISBD (CF)
(iii) ISBD (M)
(iv) ISBD (S)
Codes:
(A) (iii), (ii), (i), (iv)
(B) (iii), (iv), (i), (ii)
(C) (iv), (i), (iii), (ii)
(D) (iv), (ii), (iii), (i)
Answer:Â (B)
25. Arrange the following in the chronological order of their first year of publication:
(i) Arts and Humanities Index
(ii) Social Science Citation Index
(iii) ISI Web of Science
(iv) Science Citation Index
Codes:
(A) (iv), (ii), (i), (iii)
(B) (ii), (iii), (iv), (i)
(C) (iii), (ii), (i), (iv)
(D) (iv), (i), (iii), (ii)
Answer:Â (A)
26. Arrange the following Library Acts according to the year of their enactment:
(i) Arunachal Pradesh
(ii) Bihar
(iii) Lakshadweep
(iv) Rajasthan
Codes:
(A) (ii), (iv), (iii), (i)
(B) (iv), (i), (ii), (iii)
(C) (ii), (iii), (i), (iv)
(D) (iv), (iii), (ii), (i)
Answer:Â (D)
27. Arrange the following processes of research in order:
(i) Theory Building
(ii) Reflecting and Integrating of Idea
(iii) Research Design
(iv) Review of Literature
Codes:
(A) (iv), (iii), (ii), (i)
(B) (iii), (i), (iv), (ii)
(C) (ii), (iv), (iii), (i)
(D) (i), (ii), (iv), (iii)
Answer:Â (A)
28. Match the following:
List – I                                    List – II
a. CILIPÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â i. 1972
b. ASLIBÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â ii. 2002
c. ALAÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â iii. 1876
d. COMLAÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â iv. 1924
Codes:
a          b          c          d
(A)       ii          iv         iii         i
(B)       iv         iii         ii          i
(C)       iii         iv         i           ii
(D)       ii          iii         iv         i
Answer:Â (A)
29. Match the following:
List – I                                                            List – II
a. Phenomenon                                                i. Physical Media for grouping of Information
b. Spectrum                                                     ii. Facts or Occurrence
c. Modes                                                         iii. Transfer Process
d. Diffusion                                                    iv. A broad range of varied but related ideas
Codes:
a          b          c          d
(A)       i           iii         iv         ii
(B)       ii          iv         i           iii
(C)       ii          iii         iv         i
(D)       iv         i           iii         ii
Answer:Â (B)
30. Match the following:
List – I                                                                        List – II
a. Union Catalogue                                                     i. Primary sources
b. Pamphlets & Brochures                                          ii. Unpublished sources
c. Indexing & Abstracting Sources                             iii. Tertiary sources
d. Memoirs of diaries                                                  iv. Secondary sources
Codes:
a          b          c          d
(A)       iv         iii         ii          i
(B)       ii          iv         iii         i
(C)       iii         i           iv         ii
(D)       i           ii          iv         iii
Answer:Â (C)
31. Match the following:
List – I                                                                        List – II
a. Fundamentals of Reference Service                       i. A.J. Walford
b. Introduction to Reference works                            ii. S.R. Ranganathan
c. Reference service                                                    iii. F.N. Cheney and W.J. Williams
d. Guide to Reference Books                                                 iv. William A Katz
Codes:
a          b          c          d
(A)       ii          i           iv         iii
(B)       iii         iv         i           ii
(C)       iv         ii          iii         i
(D)       iii        iv         ii          i
Answer:Â (D)
32. Match the following:
List – I                                                                                                List – II
a. Information on important recent happenings of India                    i. India – A Reference Annual
b. Total number of foreigners visited in India in 2012                       ii. Keesing’s Record of
World Events
c. Name of Prime Minister of India                                                    iii. Statistical Yearbook
d. Postal Address of Anna Hazare                                                     iv. Who’s Who
Codes:
a          b          c          d
(A)       iv         i           ii          iii
(B)       ii          iii         i           iv
(C)       iii         ii          i           iv
(D)       i           iv         iii         ii
Answer:Â (B)
33. Match the following:
List – I                                                List – II
a. Scaler Chain                                    i. Direct dealing with subordinates
b. Espirit de Corps                              ii. Production, efficiency and prevention of waste
c. Scientific Management                   iii. Emphasis on Team Work
d. Span of control                               iv. Top to Bottom
Codes:
a          b          c          d
(A)       iv        iii         ii          i
(B)       iii         iv         i           ii
(C)       iv         ii          iii         i
(D)       ii          iii         i           iv
Answer:Â (A)
34. Match the following:
List – I                                                            List – II
a. Check Card                                                  i. Reader’s Ticket
b. Kardex                                                        ii. Three Card System
c. Newark System                                           iii. Periodicals
d. Browne System                                          iv. Borrower’s Card
Codes:
a          b          c          d
(A)       ii          iii         iv         i
(B)       iii         iv         i           ii
(C)       ii          iv         iii         i
(D)       iv         i           ii          iii
Answer:Â (A)
35. Match the following:
List – I                                                List – II
a. Skewness                                         i. Numbers of frequently appearing variables
b. Modality                                         ii. Degree of association between two/ more variables
c. F-distribution                                  iii. Structure of distribution
d. Correlation                                      iv. Ratio of two Chi square variables
Codes:
a          b          c          d
(A)       i           iv         ii          iii
(B)       iii         i           iv         ii
(C)       iv         ii          iii         i
(D)       ii          iii         i           iv
Answer:Â (B)
36. Assertion (A): Mail survey, a data collection technique in which questionnaires are mailed to potential respondents, who in then fill and return at their convenience become obsolete.
Reason (R): Survey-Monkey, the free online survey tool has totally replaced the traditional Mail survey.
Codes:
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Answer:Â (D)
37. Assertion (A): Case situations are seldom comparable and as such the information gathered in case studies is often not comparable.
Reason (R): The subject under case study are usually described in terms of the characteristics exhibited by the subject/case itself.
Codes:
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Answer:Â (A)
38. Assertion (A): Intellectual Property Rights facilitate free flow of information.
Reason (R): Effective free flow of information is the pre-requisite for knowledge society.
Codes:
(A) (A) is true, but (R) is false.
(B) (A) is false, but (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false
Answer:Â (B)
39. Assertion (A): The total output of Indian publications is reflected in ‘Indian National Bibliography’.
Reason (R): A number of publishers in India are defaulters and do not deposit their publications as per Delivery of Books and Newspapers (Public Libraries) Act.
Codes:
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is true, but (R) is false.
(D) (A) is false, but (R) is true.
Answer:Â (D)
40. Assertion (A): No library is self sufficient in terms of resources even in electronic age.
Reason (R): Resource sharing and consortia initiatives are essential to meet user needs.
Codes:
(A) (A) is true and (R) is false.
(B) (A) is false and (R) is true.
(C) Both (A) and (R) are true.
(D) Both (A) and (R) are false.
Answer:Â (C)
41. Assertion (A): Interviewing is essential to supplement the research data collected through questionnaire.
Reason (R): Interview is the most suitable technique to collect data as all respondents cooperate more during interview.
Codes:
(A) (A) is false, but (R) is true.
(B) Both (A) and (R) are true.
(C) Both (A) & (R) are false.
(D) (A) is true, but (R) is false.
Answer:Â (D)
42. Assertion (A): Indexing and abstracting services fulfil the 4th Law of Library Science.
Reason (R): These services serve as the substitute to the primary journals.
Codes:
(A) (A) is true, but (R) is false.
(B) Both (A) & (R) are false.
(C) Both (A) & (R) are true.
(D) (A) is false, but (R) is true.
Answer:Â (A)
43. Assertion (A): All classification schemes adopt ‘phase relations’.
Reason (R): Subject formation by loose assemblage leads to complex subjects and isolates.
Codes:
(A) (A) is true, but (R) is false.
(B) Both (A) and (R) are true.
(C) Both (A) and (R) are false.
(D) (A) is false, but (R) is true.
Answer:Â (D)
44. Assertion (A): RSS (Rich Site Summary) is considered as an alternate to the SDI Service.
Reason (R): RSS Feeds enable us to syndicate data automatically.
Codes:
(A) Both (A) and (R) are true.
(B) Both (A) and (R) are false.
(C) (A) is false, but (R) is true.
(D) (A) is true, but (R) is false.
Answer:Â (A)
45. Assertion (A): Majority of academic libraries in India are lagging behind in switching over as technology-oriented service institutions.
Reason (R): The apex academic bodies and library Associations have not taken the lead role to devise standards and policies.
Codes:
(A) (A) is true, (R) is false.
(B) (A) is false, (R) is true.
(C) Both (A) and (R) is true.
(D) Both (A) and (R) are false.
Answer:Â (C)
Read the passage given below and answer the questions based on your understanding of the passage (Question Nos. 46 – 50):
As the global information landscape increasingly facilitate the sharing, repurposing and dissemination of information, the ways in which students are accustomed to interacting with information resources are also changing. For some new students to universities, their understanding of referencing is based solely on fear (McGowan, 2005) and many are familiar with the basic concept of plagiarism. Some students bring with them the academic process that served them well at school – however, these are not suitable at Universities (Chanock, 2008). Students understand they should not copy words without referencing, but fail to grasp the reasons why; the reasons are not explicit and often cloaked in unfamiliar and impenetrable academic language. Pak’s (2003) review of literature proved as a handy summation of the investigations, research, and thinking about plagiarism prior to the implementation of various plagiarism detection software products. There are three main schools of thought in referencing and plagiarism discourse. A punitive approach which focuses on the idea that students often deliberately engage in plagiarism and that the appropriate response is one of punishment (Blum, 2009; Sutherland – Smith, 2010; Bilic – Zulle, et. al. 2008). A Restorative Justice approach, however, suggests that plagiarism is in fact an act against a community (in this case, a community of students), and that steps need to be taken to restore a level of balance (Wenzel; et. al. 2010; Karp and Conrad, 2005; Karp, 2009; Dickson, etc. al. 2009).
An educational approach that espouses that the best method of reducing plagiarism is to educate and support students. Marking criteria and assessment tasks should be linked to building referencing skills (especially in the first year) and ensure that the students learn these skills in a discipline related context (Jaschik; 2008). The approach of both the University of Southern Queensland (USQ) and Swinburne University of Technology is clearly aligned with the third school of thought. Students lack proper understanding of the purposes of referencing. For them, referencing and citing is linked to just words, not ideas (Jackson, 2006), so referencing is regarded as separate to the writing process, instead of an integral part. To help students develop good writing and referencing practices, it is useful if universities help them understand the research culture of tertiary study. Faculties need to make their referencing rules explicit and lectures should provide useful exemplars within courses.
46. Understanding of new students on Referencing is based on
(A) Plagiarism
(B) Fear
(C) Ability to write
(D) Insatiable desire to learn
Answer:Â (B)
47. An appropriate response to deliberate act of plagiarism according to punitive school of thought is
(A) to debar the student from library use
(B) to orient the student about plagiarism
(C) to award punishment
(D) to make him learn about referencing
Answer:Â (C)
48. To restore a ‘level of balance’ is advocated/reflected in
(A) Deterrent Approach
(B) Reformative Approach
(C) Punitive Approach
(D) Restorative Approach
Answer:Â (D)
49. ‘Educational approach’ which aims at reducing plagiarism should be linked with
(A) Building referencing skills of the students
(B) inculcating reading habits of the students
(C) building students as information literate
(D) ignorance of the students on methods of social research
Answer:Â (A)
50. Lack of understanding of students about referencing is linked to their
(A) Ideas
(B) Words
(C) Experience
(D) Intuition
Answer:Â (B)
Year Wise NTA UGC NET Library And Information Science Paper 2 Solved Question Papers
Year Wise NTA UGC NET Library And Information Science Paper 2 Solved Question Papers from June 2006 till today are given below.
Download Year Wise NTA UGC NET Library And Information Science Paper 2 Solved Question Papers |
UGC NET Library and Information Science Paper 2 Solved Question Paper 2020 June |
UGC NET Library and Information Science Paper 2 Solved Question Paper 2019 December |
UGC NET Library and Information Science Paper 2 Solved Question Paper 2019 June |
UGC NET Library and Information Science Paper 2 Solved Question Paper 2018 December |
UGC NET Library and Information Science Paper 2 Solved Question Paper 2018 July |
UGC NET Library and Information Science Paper 2 Solved Question Paper 2014 June
|
We have covered the NTA UGC NET Library and Information Science Paper 2 Solved Question Paper 2014 June.
If you have any questions about NTA UGC NET Library and Information Science Solved Question Papers, please let us know in the comment section.